By: Chris Yalom | 04-20-2017 | News
Photo credit: Curaphotography |

CIA / FBI Launch Manhunt for Vault 7 Leaker

A manhunt is underway for a traitor within the ranks of the Central Intelligence Agency. It has been called one of the worst security breaches in the organization. A joint investigation between the CIA and FBI are conducted about the security breach which exposed thousands of top-secret documents that described CIA tools used to penetrate smartphones, smart TVs and computer systems.

Wikileaks referred "Vault 7" as the breach of the agency.

Sources say the investigation is looking for an insider, either a CIA employee or a contractor who has physical access to the files and that most of the files where stolen in a highly secured section of the agency. The agency has not publicly said how or when the information was stolen.

Because the classified information is stored in a highly secure section of the intelligence agency, hundreds of people have an access to the materials that is why, and investigators will have to go through all those names.

CIA did not comment on the authenticity of the information but experts say the files appear to be genuine.

The trove by the anti-secrecy organization Wikileaks was published last March.

As director of the CIA, Mike Pompeo rail against WikiLeaks and its founder Julian Assange in his first public comments just last week.

Pompeo said it is time to call out WikiLeaks for what it really is, a non-state hostile intelligence service often abetted by state actors like Russia.

Pompeo affirmed that the Russian military had used WikiLeaks to release emails and documents damaging to the US Democratic Party. He believed was a part Russia’s bid by Russia to influence the 2016 presidential election.

The implications of the leak caused a widespread panic in the tech industry. The Journal reported that the CIA's "attack code" could be used to infiltrate companies like Apple, Google, Samsung, and Microsoft. It can have unauthorized access to computers and smartphones especially if software updates meant to patch its vulnerabilities weren't available.


Share this article
Thoughts on the above story? Comment below!
0 comment/s
What do you think about this article?
Comment *

Recent News

Popular Stories