Resources

US Intelligence Sources Discussed Poisoning Julian Assange, Court Told

Plans to poison or kidnap Julian Assange from the Ecuadorian embassy were discussed between sources in US intelligence and a private security firm that spied extensively on the WikiLeaks co-founder, a court has been told. Details of the alleged spying operation against Assange and anyone who visited him at the embassy were laid out on Wednesday at his extradition case, in evidence by a former employee of a Spanish security company, UC Global. Microphones were concealed to monitor Assange’s meetings with lawyers, his fingerprint was obtained from a glass and there was even a plot to obtain a nappy from a baby who had been brought on regular visits to the embassy, according to the witness, whose evidence took the form of a written statement.

The founder and director of UC Global, David Morales, had said that “the Americans” had wanted to establish paternity but the plan was foiled when the then employee alerted the child’s mother. Anonymity was granted on Tuesday to the former employee and another person who had been involved with UC Global, after the hearing was told they feared that Morales, or others connected to him in the US, could seek to harm them. Details of their written evidence were read out at the Old Bailey in London on Wednesday by Mark Summers QC, one of the lawyers for Assange, who is fighting extradition to the US on charges relating to leaks of classified documents allegedly exposing US war crimes and abuse.

WikiLeaks reveals CIA’s secret hacking tools and spy operations

“WikiLeaks has unleashed a treasure trove of data to the internet, exposing information about the CIA’s arsenal of hacking tools. Code-named Vault 7, the first data is due to be released in serialized form, starting off with “Year Zero” as part one. A cache of over 8,500 documents and files has been made available via BitTorrent in an encrypted archive. Password to the files is:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

The documents reveal that the CIA worked with MI5 in the UK to infect Samsung smart TVs so their microphones could be turned on at will. Investigations were carried out into gaining control of modern cars and trucks, and there is even a specialized division of the CIA focused on accessing, controlling and exploiting iPhones and iPads. This and Android zero days enables the CIA to “to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.”