|
- Vault 7 - Wikipedia
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare
- Vault 7: CIA Hacking Tools Revealed - WikiLeaks
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U S Central Intelligence Agency Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency
- Ex-CIA hacker who leaked secrets to WikiLeaks sentenced to 40 years
Evidence at the trial showed Schulte worked for an elite CIA hacking unit, became disgruntled at work and may have leaked the material in a spiteful attempt to lash back at his colleagues
- Joshua Schulte, largest leaker of CIA material in history, sentenced to . . .
Schulte, 35, handed WikiLeaks a trove of CIA cyber espionage tools known as Vault 7, in what federal prosecutors called "some of the most heinous, brazen violations of the Espionage Act in American history "
- Ex-CIA engineer convicted for being WikiLeaks source in “Vault 7” leak . . .
Joshua Schulte has been convicted for committing the largest leak in the history of the CIA He sent WikiLeaks files and documents exposing security exploits the CIA used on iPhones,
- WikiLeaks CIA files: Are they real and are they a risk? - PBS
WikiLeaks CIA files: Are they real and are they a risk? WASHINGTON — WikiLeaks has published thousands of documents that the anti-secrecy organization said were classified files revealing
- CIA Statement on Claims by Wikileaks
The American public should be deeply troubled by any Wikileaks disclosure designed to damage the Intelligence Community’s ability to protect America against terrorists and other adversaries
- WikiLeaks CIA files: Are they real and are they a risk?
WASHINGTON (AP) — WikiLeaks has published thousands of documents that the anti-secrecy organization said were classified files revealing scores of secrets about CIA hacking tools used to break into targeted computers, cellphones and even smart TVs
|
|
|