Analysis & Opinions - Slate
Expect More Incidents Like WikiLeaks' Dump of CIA Hacking Tools
This is the second example of this happening - but it won't be the last.
Preview
"Is this going to be a thing now? Political rivals spy on one another all the time, but they seem increasingly willing to track down opponents’ espionage tools and leak them on the web. Last year, it was an older collection of malware likely built by, or for, the National Security Agency. This year, it’s the turn of the newly reorganized Central Intelligence Agency.
On Tuesday, WikiLeaks—once the bright hope of information freedom activists, now a spooky dropbox for occasional whistleblowers and Russian intelligence agents—leaked a collection of 8,761 documents and files (with possibly more to come) alleged to have come from within CIA between 2013 and 2016. The documents purport to describe malicious software tools and programs designed for gaining access to, and information from, computer systems like laptops, routers, and even internet-connected televisions..."
Want to Read More?
The full text of this publication is available via the original publication source.
For more information on this publication:
Please contact
Cyber Project
For Academic Citation:
Herr, Trey.“Expect More Incidents Like WikiLeaks' Dump of CIA Hacking Tools.” Slate, March 9, 2017.
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Video
- SNF Agora Institute
Election 2020 — Securing the Vote
Audio
- Pioneer Institute
Ballot Question 1: Risks & Regulations Regarding Right to Repair
Magazine Article
- Economist
Digital Dominance: A new global ranking of cyber-power throws up some surprises
In the Spotlight
Most Viewed
Policy Brief
- Quarterly Journal: International Security
The Future of U.S. Nuclear Policy: The Case for No First Use
Discussion Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Why the United States Should Spread Democracy
Preview
"Is this going to be a thing now? Political rivals spy on one another all the time, but they seem increasingly willing to track down opponents’ espionage tools and leak them on the web. Last year, it was an older collection of malware likely built by, or for, the National Security Agency. This year, it’s the turn of the newly reorganized Central Intelligence Agency.
On Tuesday, WikiLeaks—once the bright hope of information freedom activists, now a spooky dropbox for occasional whistleblowers and Russian intelligence agents—leaked a collection of 8,761 documents and files (with possibly more to come) alleged to have come from within CIA between 2013 and 2016. The documents purport to describe malicious software tools and programs designed for gaining access to, and information from, computer systems like laptops, routers, and even internet-connected televisions..."
Want to Read More?
The full text of this publication is available via the original publication source.- Recommended
- In the Spotlight
- Most Viewed
Recommended
Video - SNF Agora Institute
Election 2020 — Securing the Vote
Audio - Pioneer Institute
Ballot Question 1: Risks & Regulations Regarding Right to Repair
Magazine Article - Economist
Digital Dominance: A new global ranking of cyber-power throws up some surprises
In the Spotlight
Most Viewed
Policy Brief - Quarterly Journal: International Security
The Future of U.S. Nuclear Policy: The Case for No First Use
Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
Why the United States Should Spread Democracy


