WikiLeaks reveals CIA trove alleging wide-scale hacking

This file photo shows the seal of the Central Intelligence Agency at CIA headquarters in Langley, Virginia. (AP Photo/Carolyn Kaster, File)
Updated 08 March 2017
Follow

WikiLeaks reveals CIA trove alleging wide-scale hacking

WASHINGTON: WikiLeaks published thousands of documents Tuesday described as secret files about CIA hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung.
The documents describe clandestine methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep the private information of citizens and corporations safe from prying eyes. US government employees, including President Donald Trump, use many of the same products and Internet services purportedly compromised by the tools.
The documents describe CIA efforts — cooperating with friendly foreign governments and the US National Security Agency — to subvert the world’s most popular technology platforms, including Apple’s iPhones and iPads, Google’s Android phones and the Microsoft Windows operating system for desktop computers and laptops.
The documents also include discussions about compromising some Internet-connected televisions to turn them into listening posts. One document discusses hacking vehicle systems, indicating the CIA’s interest in hacking modern cars with sophisticated on-board computers.
WikiLeaks has a long track record of releasing top secret government documents, and experts who sifted through the material said it appeared legitimate.
Jonathan Liu, a spokesman for the CIA, said: “We do not comment on the authenticity or content of purported intelligence documents.” White House spokesman Sean Spicer also declined comment.

Missing from WikiLeaks’ trove are the actual hacking tools themselves, some of which were developed by government hackers while others were purchased from outsiders. WikiLeaks said it planned to avoid distributing tools “until a consensus emerges” on the political nature of the CIA’s program and how such software could be analyzed, disarmed and published.
Tuesday’s disclosure left anxious consumers who use the products with little recourse, since repairing the software vulnerabilities in ways that might block the tools’ effectiveness is the responsibility of leading technology companies. The revelations threatened to upend confidence in an Obama-era government program, the Vulnerability Equities Process, under which federal agencies warn technology companies about weaknesses in their software so they can be quickly fixed.
It was not immediately clear how WikiLeaks obtained the information, and details in the documents could not immediately be verified. WikiLeaks said the material came from “an isolated, high-security network” inside the CIA’s Center for Cyber Intelligence but didn’t say whether the files were removed by a rogue employee or whether the theft involved hacking a federal contractor working for the CIA or perhaps breaking into a staging server where such information might have been temporarily stored.
“The archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive,” WikiLeaks said in a statement.
Some technology firms on Tuesday said they were evaluating the information. Microsoft Corp. said it was looking into the report, while the maker of secure messaging app Signal said the purported CIA tools affected users’ actual phones and not its software design or encryption protocols.
The tools described in the documents carried bizarre names, including Time Stomper, Fight Club, Jukebox, Bartender, Wild Turkey, Margarita and “RickyBobby,” a racecar-driving character in the comedy film, “Talladega Nights.”
That RickyBobby tool, the documents said, was intended to plant and harvest files on computers running “newer versions of Microsoft Windows and Windows Server.” It operated “as a lightweight implant for target computers” without raising warnings from antivirus or intrusion-detection software. It took advantage of files Microsoft built into Windows since at least 10 years ago.
The files include comments by CIA hackers boasting in slang language of their prowess: “You know we got the dankest Trojans and collection tools,” one reads.
The documents show broad exchanges of tools and information among the CIA, NSA and other US intelligence agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom.
WikiLeaks claimed the CIA used both its Langley, Virginia, headquarters and the US consulate in Frankfurt, Germany, as bases for its covert hackers. The AP found that one purported CIA hack that imitates the Domain Name System — the Internet’s phone book — traced to an Internet domain hosted in Germany.

Jake Williams, a security expert with Augusta, Georgia-based Rendition Infosec who has experience dealing with government hackers, said the files’ extensive references to operation security meant they were almost certainly government-backed. “I can’t fathom anyone fabricated that amount of operational security concern,” he said. “It rings true to me.”
In an unusual move, WikiLeaks said it was withholding some secrets inside the documents. Among them, it said it had withheld details of tens of thousands of “CIA targets and attack machines throughout Latin America, Europe and the United States.”
WikiLeaks also said its data included a “substantial library” of digital espionage techniques borrowed from other countries, including Russia.
If the authenticity of the documents is officially confirmed, it would represent yet another catastrophic breach for the US intelligence community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material, including from the State Department and the Pentagon.
Tuesday’s documents purported to be from the CIA’s “Embedded Development Branch” discuss techniques for injecting malicious code into computers protected by the personal security products of leading international anti-virus companies. They describe ways to trick anti-virus products from companies including Russia-based Kaspersky Lab, Romania-based BitDefender, Dutch-based AVG Technologies, F-Secure of Finland and Rising Antivirus, a Chinese company.
In the new trove, programmers also posted instructions for how to access user names and passwords in popular Internet browsers like Microsoft Internet Explorer, Google Chrome and Mozilla Firefox. Under a list of references in one exchange, users were advised: “Be advised, the following may be low traffic sites, sites in which it might be a good idea to disable JavaScript, etc,” referring to a widely used Internet programming language. “Remember, practice safe browsing, kidz!” they were told.
Some documents were classified “secret” or “top secret” and not for distribution to foreign nationals. One file said those classifications would protect deployed hacks from being “attributed” to the US government. The practice of attribution, or identifying who was behind an intrusion, has been difficult for investigators probing sophisticated hacks that likely came from powerful nation-states.
___
Satter reported from Paris. Associated Press writers Stephen Braun, Vivian Salama, Frank Bajak, Tammy Webber and Michael Liedtke contributed to this report.


Uganda’s presidential election experiences hours of delays at some polling stations

Updated 7 sec ago
Follow

Uganda’s presidential election experiences hours of delays at some polling stations

  • Some polling stations remained closed for up to four hours after the scheduled 7 a.m. start time due to “technical challenges“
  • The East African country of roughly 45 million people has 21.6 million registered voters

KAMPALA, Uganda: Uganda’s presidential election was plagued by widespread delays Thursday in addition to a days-long Internet shutdown that has been criticized as an anti-democratic tactic in a country where the president has held office since 1986.
Some polling stations remained closed for up to four hours after the scheduled 7 a.m. start time due to “technical challenges,” according to the nation’s electoral commission, which asked polling officers to use paper registration records to ensure the difficulties did not “disenfranchise any voter.”
President Yoweri Museveni, 81, faces seven other candidates, including Robert Kyagulanyi, a musician-turned-politician best known as Bobi Wine, who is calling for political change.
The East African country of roughly 45 million people has 21.6 million registered voters. Polls are expected to close at 4 p.m. Thursday, according to the electoral commission. Results are constitutionally required to be announced in 48 hours.
Impatient crowds gathered outside polling stations expressing concerns over the delays Thursday morning. Umaru Mutyaba, a polling agent for a parliamentary candidate, said it was “frustrating” to be waiting outside a station in the capital Kampala.
“We can’t be standing here waiting to vote as if we have nothing else to do,” he said.
Wine alleged there was electoral fraud occurring, noting that biometric voter identification machines were not working at polling places and claiming there was “ballot stuffing.”
“Our leaders, including Deputy President for Western Region, arrested. Many of our polling agents and supervisors abducted, and others chased off polling stations,” Wine wrote in a post on social media platform X.
Museveni told journalists he was notfied biometric machines were inoperable at some stations and he supported the electoral body’s decision to revert to paper registration records. He did not comment on the allegation of fraud.
Ssemujju Nganda, a prominent opposition figure and lawmaker seeking reelection in Kira municipality, told The Associated Press he had been waiting in line to vote for three hours.
Nganda also noted biometric machines were malfunctioning, in addition to the late arrival of balloting materials, and predicted the delays likely would lead to apathy and low turnout in urban areas where the opposition has substantial support.
“It’s going to be chaos,” he said Thursday morning.
Nicholas Sengoba, an independent analyst and newspaper columnist, said delays to the start of voting in urban, opposition areas favored the ruling party.
Museveni serving Africa’s third-longest presidential term
Uganda has not witnessed a peaceful transfer of presidential power since independence from British colonial rule six decades ago.
Museveni has served the third-longest term of any African leader and is seeking to extend his rule into a fifth decade. Some critics say removing him through elections remains difficult, but the aging president’s authority has become increasingly dependent on the military led by his son, Muhoozi Kainerugaba.
Museveni and Wine are reprising their rivalry from the previous election in 2021, when Wine appealed to mostly young people in urban areas. With voter turnout of 59 percent, Wine secured 35 percent of the ballots against Museveni’s 58 percent, the president’s smallest vote share since his first electoral campaign three decades ago.
The lead-up to Thursday’s election produced concerns about transparency, the possibility of hereditary rule, military interference and opposition strategies to prevent vote tampering at polling stations.
Uganda’s Internet was shut down Tuesday by the government communications agency, which cited misinformation, electoral fraud and incitement of violence. The shutdown has affected the public and disrupted critical sectors such as banking.
Heavy security deployed
There has been heavy security leading up to voting, including military units deployed on the streets this week.
Amnesty International said security forces are engaging in a “brutal campaign of repression,” citing a Nov. 28 opposition rally in eastern Uganda where the military blocked exits and opened fire on supporters, killing one person.
Museveni urged voters to come out in large numbers during his final rally Tuesday.
“You go and vote, anybody who tries to interfere with your freedom will be crushed. I am telling you this. We are ready to put an end to this indiscipline,” he said.
The national electoral commission chairperson, Simon Byabakama, urged tolerance among Ugandans as they vote.
“Let us keep the peace that we have,” Byabakama said late Wednesday. “Let us be civil. Let us be courteous. Let’s be tolerant. Even if you know that this person does not support (your) candidate, please give him or her room or opportunity to go and exercise his or her constitutional right.”
Authorities also suspended the activities of several civic groups during the campaign season. That Group, a prominent media watchdog, closed its office Wednesday after the interior ministry alleged in a letter that the group was involved in activities “prejudicial to the security and laws of Uganda.”
Veteran opposition figure Kizza Besigye, a four-time presidential candidate, remains in prison after he was charged with treason in February 2025.