. | . |
Assange says leaks show CIA's 'devastating incompetence' By Dario THUBURN London (AFP) March 9, 2017
WikiLeaks founder Julian Assange on Thursday accused the CIA of "devastating incompetence" for failing to protect its hacking secrets and said he would work with tech companies to develop fixes for them. "This is a historic act of devastating incompetence, to have created such an arsenal and then stored it all in one place," Assange said. "It is impossible to keep effective control of cyber weapons... If you build them, eventually you will lose them," Assange said. Assange was speaking in a press conference streamed live from Ecuador's embassy in London, where he has been living as a fugitive from justice since 2012. He said his anti-secrecy website had "a lot more information" about the Central Intelligence Agency's hacking operation but would hold off on publishing it until WikiLeaks had spoken to tech manufacturers. "We have decided to work with them to give them some exclusive access to the additional technical details we have so fixes can be developed and then pushed out. "Once this material is effectively disarmed by us we will publish additional details about what has been occurring," he added. - CIA questions Assange 'integrity' - On Tuesday, WikiLeaks published nearly 9,000 documents it said were part of a huge trove leaked from the CIA, describing it as the largest ever publication of secret intelligence materials. "This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA," it said. In Washington, the CIA, hit hard by the apparent leak of much of its cyber-spying arsenal, defended itself while criticizing the WikiLeaks founder. "As we've said previously, Julian Assange is not exactly a bastion of truth and integrity," said spokeswoman Heather Fritz Horniak. "Despite the efforts of Assange and his ilk, CIA continues to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries." - Assange: CIA was 'careless' - The documents showed that CIA hackers can turn a TV into a listening device, bypass popular encryption apps, and possibly control one's car. Most experts believe the materials to be genuine, and US media said Wednesday that the Federal Bureau of Investigation is opening a criminal probe into the leak. The investigation could focus on whether the CIA was sloppy in its controls, or, as The Washington Post reported, it could be "a major mole hunt" for a malicious leaker or turncoat inside the agency. WikiLeaks itself said the documents, hacking tools and code came from an archive that had circulated among US government hackers and private contractors. "The CIA has been so careless to produce this material. So do various cyber mafia already have it? Do foreign intelligence agencies already have it? It's quite possible numerous people already might have it," Assange said. WikiLeaks has stunned the US government with a series of publications of top secret political, diplomatic and intelligence materials in recent years. The CIA on Wednesday accused the group of endangering Americans, helping US rivals and hampering the fight against terror threats through its leaks. "The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the intelligence community's ability to protect America against terrorists and other adversaries." "Such disclosures not only jeopardise US personnel and operations, but also equip our adversaries with tools and information to do us harm," Horniak said. While refusing to confirm the authenticity of the documents WikiLeaks published, Horniak stressed that hacking is a normal part of its mission "to be innovative, cutting-edge, and the first line of defence in protecting this country from enemies abroad."
Tarragona, Spain (SPX) Mar 07, 2017 The Darknet is a part of the internet that people can access and use anonymously. This privacy and the ability to work away from prying eyes means that the network is frequently used for anonymous exchanges of sensitive information and for illegal activities such as drug trafficking, sharing child pornography or exchanging protected intellectual property free of charge. Cyberattacks are fr ... read more Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |