When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a "blockbuster" on March 7 - a "Year" called

2025/05/1107:15:40 hotcomm 1747

When Snowden revealed that National Security Agency mass surveillance program has not yet completely passed, WikiLeaks dropped a "blockbuster" on March 7 - a secret document called "Year Zero".

This article is compiled by the WeChat public account "Central of the Communist Youth League" (ID: qtzy2014), CCTV News, Baidu Encyclopedia, News, and WeChat public accounts, which does not represent the views of the financial community website

This document contains 8761 documents, all from the internal system of the US CIA , introducing the scale and direction of the CIA's secret hacking project. WikiLeaks said that the CIA's current hacker tools including Trojan software, malware, viruses and weaponized hacker tools have been out of control.

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

1

WikiLeaks: CIA hacker tools invade all smart devices

Yes, you read that right, all the smart devices around us today: Whether it is Apple phones, Android phones, smart TVs and other smart products equipped with these systems, they are at risk of being monitored by the CIA, the US intelligence department.

How do they implement monitoring? This is the most core part of the 8,761 confidential documents leaked by WikiLeaks this time. These more than 8,000 documents introduce in detail how CIA controls your smart device by making various Trojan viruses, and even gives the specific source code of these programs. Through these "ten thousand" Trojan viruses, CIA can directly turn your smart devices into their spy tools to monitor your every move.

invasion of smart TV

One of the cases introduced in detail by "WikiLeaks" is the smart TV of South Korea's Samsung company. According to a June 2014 document, the CIA cooperated with the British MI5 to develop hacking software for Samsung smart TVs, turning the TV into a "fake shutdown" mode.

In this mode, people who watch TV will mistakenly think that the TV is turned off, but in fact the TV is turned on and has been converted into a wiretapping machine and sent to the CIA quietly.

The virus that invaded TV is called "Crying Angel". You can see the development notes in the published files.

Interestingly, "Crying Angel" is an alien creature in the British longevity science fiction drama "Doctor Who". When seen, this creature is like a static angel sculpture; but when a person looks away, the sculpture will come alive and begin to move towards the person. I don’t know if CIA was inspired by this fictional creature when he was naming.

invades smart devices such as mobile phones and

Even Apple phones and their smart devices that claim to be "the best security" cannot be spared. "WikiLeaks" pointed out that CIA's mobile development group has specially set up an iPhone project team. Because "iPhone is more popular among social, political, diplomatic and business elites", CIA has developed a virus program called "zero days", which can invade, steal and transmit user information stored on Apple devices.

Of course, Android phones are even worse. According to "WikiLeaks", CIA has mastered 24 Trojan programs that specifically target Android systems and can attack and steal user information on a large scale. These Trojan programs are no longer ordinary viruses, but have become a "weapon"...

invades various operating systems

In addition to smart devices, our traditional computer devices and various operating systems equipped on it, such as Microsoft Windows, Apple OSx and Linux, and even our routers are all the objects that CIA focuses on "care".

Among them, Windows systems are the "top priority" of CIA. They have developed "weaponized" virus software that can invade your computer through various channels such as CDs, USB flash drives, and the Internet, and can even hide the virus in a completely harmless picture file...

In October 2014, CIA plans to develop new viruses to invade the car control systems installed on cars and trucks. The document does not indicate the purpose of developing the virus, but WikiLeaks believes that this type of virus can greatly help CIA agent perform assassination operations.

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

Some people may be "lucky" and think that "WikiLeaks" is "bluffing" and scaring people. But I'm sorry! Many mainstream media in the United States have verified the information that was leaked this time, and they believe that it is very credible!

The Washington Post of the United States has specially produced a video to tell Americans what the information leaked by "WikiLeaks" means ↓↓

2

WikiLeaks: The US Consulate in Frankfurt is the "hacker center" of the CIA

In addition to surveillance means, the document also exposed the CIA's secret hacking base in Germany. CIA's hacking department is mainly located in Langley in , Virginia, U.S., but the exposed documents pointed out that the US Consulate in Frankfurt, Germany is actually also the CIA's secret hacking base.

, the base called "Center of Cyber ​​Intelligence Europe" (CCIE), is mainly responsible for hacking in Europe, Middle East and Africa. CIA hackers working at this center use diplomatic passports and their ostensible identity is a U.S. State Department staff member.

One of the documents exposed this time is a travel guide for CIA hackers who are heading to the Frankfurt base. The guide warns staff not to leave any "electronic or sensitive items" without anyone taking care of when checking in a hotel. "Although this can be regarded as paranoid, it is better to be safe than regret."

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

In addition to various tips, this guide also lists in detail how to answer when facing customs inquiries. For example:

Question: What is your purpose in this trip?

Answer: Provide technical consultation for embassies and consulates.

WikiLeaks noted that once CIA hackers enter Frankfurt, they can act at will in other Schengen countries. is aimed at some security systems that are not connected to the Internet, such as police databases. CIA agents need to enter the relevant places and manually install surveillance viruses on the device through USB or CD.

In order to prevent the monitor from doubting the United States, the CIA has formulated a series of regulations to confuse the public and cover up the eyes and ears. One of the documents shows that in order to avoid being involved with the United States, staff should not use the commonly used format of "month/day/year" when writing timestamps, but should use the common "year/month/day".

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

As of 2016, CIA's hacking department had more than 5,000 registered users and produced thousands of hacker-invading software, Trojans, viruses and other "weapon-type" malware.

At the official level, this department is affiliated to the CIA's Cyber ​​Intelligence Center (CCI), with four teams under the department. One of the groups is called the Engineering Development Group (EDG), which specializes in the development of malware and hacking tools.

is divided into embedded device group, automatic implantation group, remote development group, mobile development group, etc. according to the different characteristics of the intrusion target.

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

3

decryption "wiki"

Wikileaks (Wikileaks), also translated as Wikileaks, is a website specially established to expose corruption in government and enterprises. was founded in 2006, but it only made its first appearance on the Internet in January 2007. It has always boasted itself as: opposing over-expanding governments, supporting citizen activists, journalists and others challenging power. Since its operation, the website has caused headaches in many countries' governments and enterprises.

"Wiki Leak" is committed to revealing the secrets, but it "hiddenly" itself : The website did not publish its office address and phone number, nor did it list the names of the main operators of the website, and did not even leave the office email address. The outside world neither knows where its headquarters is nor who the employees are.

According to the Washington Post, the founder of the website is Australian journalist Julian Assange . The website is run by some journalists, technicians and activists, and the content can be described as "eclectic". There are five core managers, one of which is named Daniel Schmidt.Daniel Schmidt said in an interview that the message from "Wiki Leak" is that you either choose to be transparent or be "transparent".

WikiLeaks did not provide a detailed explanation on how to obtain these files, but said that "hackers and former employees who had previously attacked the US government had these files in their hands." "One of them provided the files to WikiLeaks.

4

"WikiLeaks" exposure event

Of course, this is not the first major leak of "WikiLeaks" . According to foreign media reports, we have roughly sorted out several major secrets leaked by "WikiLeaks" in recent years.

◆ In 2007, Guantanamo Prison Manual . The manual shows that prison administrator soldiers have the right to prevent Red Cross staff from visiting prisoners. Detainees who perform well can get a roll of toilet paper.

◆ In 2008, Palin's private email account content. US Republican Vice Presidential candidate Sarah Palin's Yahoo email was hacked and the letters in the email were published on the Internet. This email is exactly what Palin used as the governor of Alaska to handle various public affairs. The circulating emails also involve some personal emails Palin received after receiving McCain's nomination.

◆ In 2009, climatologists changed the content of the data without authorization. More than 1,000 emails from the Institute of Climate Research, University of East Anglia, England, showed that climatologists arbitrarily changed climate data to prove that global warming is mainly caused by human activities.

◆ In 2009, there were 500,000 9.11 text messages. According to Taiwan's "China Radio and Television News Network", it released more than 500,000 mobile text messages sent by Americans on the day of the 9/11 terrorist attack, including U.S. federal government and local officials.

◆ In 2010, the Iraq War record was released. WikiLeaks released a video of Iraqi civilians killed by the U.S. military during the 2007 Baghdad air strike on a website called Collateral MUrder. In July of the same year, it published an Afghan war diary, which contained more than 76,900 documents about the Afghan war, and none of these documents were made public to the public before that. In October, in cooperation with major commercial media companies, more than 400,000 documents were published, known as the Iraq War Records.

◆ In 2013, the prism gate leak incident. Snowden, the unveiler of the "Prism Gate" incident, issued a statement through the "WikiLeaks" website on July 1, 2013, criticizing US President Obama and the US government and threatening to disclose more secrets to the outside world.

◆ In 2015, the secret documents of the BRICS state. WikiLeaks has released some secret documents, pointing out that the United States has established a special organization to counter the increasing influence of the BRICS countries in the world economy. The secret document states that the United States and several countries have secretly held negotiations on the Trade in Services Agreement. According to 17 publicly confidential documents, the negotiations started as early as 2013, and the United States, the European Union, Turkey , Mexico , Austria , Pakistan and Israel all participated in the negotiations.

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

Some people may be "lucky" and think that "WikiLeaks" is "bluffing" and scaring people. But I'm sorry! Many mainstream media in the United States have verified the information that was leaked this time, and they believe that it is very credible!

The Washington Post of the United States has specially produced a video to tell Americans what the information leaked by "WikiLeaks" means ↓↓

2

WikiLeaks: The US Consulate in Frankfurt is the "hacker center" of the CIA

In addition to surveillance means, the document also exposed the CIA's secret hacking base in Germany. CIA's hacking department is mainly located in Langley in , Virginia, U.S., but the exposed documents pointed out that the US Consulate in Frankfurt, Germany is actually also the CIA's secret hacking base.

, the base called "Center of Cyber ​​Intelligence Europe" (CCIE), is mainly responsible for hacking in Europe, Middle East and Africa. CIA hackers working at this center use diplomatic passports and their ostensible identity is a U.S. State Department staff member.

One of the documents exposed this time is a travel guide for CIA hackers who are heading to the Frankfurt base. The guide warns staff not to leave any "electronic or sensitive items" without anyone taking care of when checking in a hotel. "Although this can be regarded as paranoid, it is better to be safe than regret."

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

In addition to various tips, this guide also lists in detail how to answer when facing customs inquiries. For example:

Question: What is your purpose in this trip?

Answer: Provide technical consultation for embassies and consulates.

WikiLeaks noted that once CIA hackers enter Frankfurt, they can act at will in other Schengen countries. is aimed at some security systems that are not connected to the Internet, such as police databases. CIA agents need to enter the relevant places and manually install surveillance viruses on the device through USB or CD.

In order to prevent the monitor from doubting the United States, the CIA has formulated a series of regulations to confuse the public and cover up the eyes and ears. One of the documents shows that in order to avoid being involved with the United States, staff should not use the commonly used format of "month/day/year" when writing timestamps, but should use the common "year/month/day".

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

As of 2016, CIA's hacking department had more than 5,000 registered users and produced thousands of hacker-invading software, Trojans, viruses and other "weapon-type" malware.

At the official level, this department is affiliated to the CIA's Cyber ​​Intelligence Center (CCI), with four teams under the department. One of the groups is called the Engineering Development Group (EDG), which specializes in the development of malware and hacking tools.

is divided into embedded device group, automatic implantation group, remote development group, mobile development group, etc. according to the different characteristics of the intrusion target.

When Snowden revealed that the aftermath of the National Security Agency's massive surveillance program had not yet completely passed, WikiLeaks dropped a

3

decryption "wiki"

Wikileaks (Wikileaks), also translated as Wikileaks, is a website specially established to expose corruption in government and enterprises. was founded in 2006, but it only made its first appearance on the Internet in January 2007. It has always boasted itself as: opposing over-expanding governments, supporting citizen activists, journalists and others challenging power. Since its operation, the website has caused headaches in many countries' governments and enterprises.

"Wiki Leak" is committed to revealing the secrets, but it "hiddenly" itself : The website did not publish its office address and phone number, nor did it list the names of the main operators of the website, and did not even leave the office email address. The outside world neither knows where its headquarters is nor who the employees are.

According to the Washington Post, the founder of the website is Australian journalist Julian Assange . The website is run by some journalists, technicians and activists, and the content can be described as "eclectic". There are five core managers, one of which is named Daniel Schmidt.Daniel Schmidt said in an interview that the message from "Wiki Leak" is that you either choose to be transparent or be "transparent".

WikiLeaks did not provide a detailed explanation on how to obtain these files, but said that "hackers and former employees who had previously attacked the US government had these files in their hands." "One of them provided the files to WikiLeaks.

4

"WikiLeaks" exposure event

Of course, this is not the first major leak of "WikiLeaks" . According to foreign media reports, we have roughly sorted out several major secrets leaked by "WikiLeaks" in recent years.

◆ In 2007, Guantanamo Prison Manual . The manual shows that prison administrator soldiers have the right to prevent Red Cross staff from visiting prisoners. Detainees who perform well can get a roll of toilet paper.

◆ In 2008, Palin's private email account content. US Republican Vice Presidential candidate Sarah Palin's Yahoo email was hacked and the letters in the email were published on the Internet. This email is exactly what Palin used as the governor of Alaska to handle various public affairs. The circulating emails also involve some personal emails Palin received after receiving McCain's nomination.

◆ In 2009, climatologists changed the content of the data without authorization. More than 1,000 emails from the Institute of Climate Research, University of East Anglia, England, showed that climatologists arbitrarily changed climate data to prove that global warming is mainly caused by human activities.

◆ In 2009, there were 500,000 9.11 text messages. According to Taiwan's "China Radio and Television News Network", it released more than 500,000 mobile text messages sent by Americans on the day of the 9/11 terrorist attack, including U.S. federal government and local officials.

◆ In 2010, the Iraq War record was released. WikiLeaks released a video of Iraqi civilians killed by the U.S. military during the 2007 Baghdad air strike on a website called Collateral MUrder. In July of the same year, it published an Afghan war diary, which contained more than 76,900 documents about the Afghan war, and none of these documents were made public to the public before that. In October, in cooperation with major commercial media companies, more than 400,000 documents were published, known as the Iraq War Records.

◆ In 2013, the prism gate leak incident. Snowden, the unveiler of the "Prism Gate" incident, issued a statement through the "WikiLeaks" website on July 1, 2013, criticizing US President Obama and the US government and threatening to disclose more secrets to the outside world.

◆ In 2015, the secret documents of the BRICS state. WikiLeaks has released some secret documents, pointing out that the United States has established a special organization to counter the increasing influence of the BRICS countries in the world economy. The secret document states that the United States and several countries have secretly held negotiations on the Trade in Services Agreement. According to 17 publicly confidential documents, the negotiations started as early as 2013, and the United States, the European Union, Turkey , Mexico , Austria , Pakistan and Israel all participated in the negotiations.

hotcomm Category Latest News