Vault 7 leak

GPTKB entity

Statements (110)
Predicate Object
gptkbp:instanceOf WikiLeaks publication
gptkbp:codename gptkb:Vault_7
https://www.w3.org/2000/01/rdf-schema#label Vault 7 leak
gptkbp:impact debate on government surveillance
public awareness of CIA cyber capabilities
concerns over software vulnerabilities
gptkbp:includes gptkb:Archimedes
gptkb:Gyrfalcon
gptkb:entomologist
gptkb:Elsa
gptkb:Dumbo
gptkb:AfterMidnight
gptkb:Angelfire
gptkb:BothanSpy
gptkb:Brutal_Kangaroo
gptkb:Cherry_Blossom
gptkb:CouchPotato
gptkb:EdiStalker
gptkb:ExpressLane
gptkb:HIVE
gptkb:Imperial
gptkb:Marble_Framework
gptkb:OutlawCountry
gptkb:Pandemic
gptkb:Scribbles
gptkb:UCL/Raytheon
gptkb:Weeping_Angel
gptkb:Year_Zero
gptkb:Athena
gptkb:Casanova
gptkb:Dark_Matter
gptkb:Highrise
gptkb:Protego
Leaked CIA hacking tools
gptkbp:leakedBy gptkb:Central_Intelligence_Agency
gptkb:WikiLeaks
gptkbp:location gptkb:United_States
gptkbp:mediaCoverage gptkb:BBC
gptkb:Reuters
gptkb:The_Guardian
gptkb:The_New_York_Times
gptkbp:publicationDate 2017-03-07
gptkbp:publishedBy gptkb:WikiLeaks
gptkbp:relatedTo gptkb:Edward_Snowden_leaks
Chelsea Manning leaks
gptkbp:revealedTo CIA ability to bypass encryption
CIA cyber operations
CIA exploits for Android
CIA exploits for Linux
CIA exploits for Windows
CIA exploits for iOS
CIA exploits for smart TVs
CIA malware development
CIA targeting of air-gapped computers
CIA targeting of antivirus software
CIA targeting of critical infrastructure
CIA targeting of enterprise networks
CIA targeting of messaging apps
CIA targeting of routers
CIA targeting of vehicle control systems
CIA use of DLL hijacking
CIA use of Tor network
CIA use of VPNs
CIA use of air-gapped laptops
CIA use of anonymization tools
CIA use of anti-forensic tools
CIA use of bootkits
CIA use of burner phones
CIA use of code injection techniques
CIA use of cover identities
CIA use of covert communication channels
CIA use of custom malware frameworks
CIA use of cutouts
CIA use of data exfiltration techniques
CIA use of dead drops
CIA use of disposable devices
CIA use of encrypted USB drives
CIA use of encrypted communications
CIA use of false flag techniques
CIA use of file deletion tools
CIA use of firmware exploits
CIA use of front companies
CIA use of insider threats
CIA use of keyloggers
CIA use of microphone access tools
CIA use of obfuscation techniques
CIA use of operational security measures
CIA use of persistence mechanisms
CIA use of physical access attacks
CIA use of privilege escalation techniques
CIA use of proxy servers
CIA use of remote access tools
CIA use of rootkits
CIA use of safe houses
CIA use of sandbox evasion techniques
CIA use of screenshot tools
CIA use of secure operating systems
CIA use of social engineering
CIA use of steganography
CIA use of supply chain attacks
CIA use of webcam access tools
CIA use of zero-day vulnerabilities
CIA ability to turn smart TVs into listening devices
gptkbp:subject gptkb:CIA
cybercrime
malware
surveillance
hacking tools
gptkbp:bfsParent gptkb:United_States_v._Schulte
gptkbp:bfsLayer 7