Vault 7: CIA Hacking Tools Revealed - WikiLeaks In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency
WikiLeaks - Vault 7: Projects Today, September 7th 2017, WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents (proprietary hardware software manuals from Microchip Technology Inc ) The project was maintained between 2014 and 2015
WikiLeaks - Leaks Today, August 24th 2017, WikiLeaks publishes secret documents from the cyber operations the CIA conducts against liaison services - which includes NSA, DHS and FBI
WikiLeaks Today, 21 December 2018, WikiLeaks publishes a searchable database of more than 16,000 procurement requests posted by United States embassies around the world
WikiLeaks - CIA Director John Brennan emails Today, 21 October 2015 and over the coming days WikiLeaks is releasing documents from one of CIA chief John Brennan's non-government email accounts Brennan used the account occasionally for several intelligence related projects
CIA Assessment on Surviving Secondary Screening - page 1 - WikiLeaks CIA Assessment on Surviving Secondary Screening at Airports While Maintaining Cover WikiLeaks release: December 21, 2014 This is a secret document produced by the CIA's CHECKPOINT Identity and T ravel Intelligen ce Program to explain and advise CIA operatives on how to deal with secondary screening at airports, as they travel
WikiLeaks - Government Today, August 24th 2017, WikiLeaks publishes secret documents from the cyber operations the CIA conducts against liaison services - which includes NSA, DHS and FBI
CIA Assessment on Surviving Secondary Screening - WikiLeaks This is the second release within WikiLeaks' CIA Series, which will continue in the new year The two classified documents aim to assist CIA undercover officials to circumvent these systems around the world
WikiLeaks - Vault 8 Source code and analysis for CIA software projects including those described in the Vault7 series This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components
WikiLeaks How to contact WikiLeaks? What is Tor? Tips for Sources After Submitting Vault 7: CIA Hacking Tools Revealed Releases Documents Navigation: