Statements (110)
Predicate | Object |
---|---|
gptkbp:instanceOf |
WikiLeaks publication
|
gptkbp:codename |
gptkb:Vault_7
|
https://www.w3.org/2000/01/rdf-schema#label |
Vault 7 leak
|
gptkbp:impact |
debate on government surveillance
public awareness of CIA cyber capabilities concerns over software vulnerabilities |
gptkbp:includes |
gptkb:Archimedes
gptkb:Gyrfalcon gptkb:entomologist gptkb:Elsa gptkb:Dumbo gptkb:AfterMidnight gptkb:Angelfire gptkb:BothanSpy gptkb:Brutal_Kangaroo gptkb:Cherry_Blossom gptkb:CouchPotato gptkb:EdiStalker gptkb:ExpressLane gptkb:HIVE gptkb:Imperial gptkb:Marble_Framework gptkb:OutlawCountry gptkb:Pandemic gptkb:Scribbles gptkb:UCL/Raytheon gptkb:Weeping_Angel gptkb:Year_Zero gptkb:Athena gptkb:Casanova gptkb:Dark_Matter gptkb:Highrise gptkb:Protego Leaked CIA hacking tools |
gptkbp:leakedBy |
gptkb:Central_Intelligence_Agency
gptkb:WikiLeaks |
gptkbp:location |
gptkb:United_States
|
gptkbp:mediaCoverage |
gptkb:BBC
gptkb:Reuters gptkb:The_Guardian gptkb:The_New_York_Times |
gptkbp:publicationDate |
2017-03-07
|
gptkbp:publishedBy |
gptkb:WikiLeaks
|
gptkbp:relatedTo |
gptkb:Edward_Snowden_leaks
Chelsea Manning leaks |
gptkbp:revealedTo |
CIA ability to bypass encryption
CIA cyber operations CIA exploits for Android CIA exploits for Linux CIA exploits for Windows CIA exploits for iOS CIA exploits for smart TVs CIA malware development CIA targeting of air-gapped computers CIA targeting of antivirus software CIA targeting of critical infrastructure CIA targeting of enterprise networks CIA targeting of messaging apps CIA targeting of routers CIA targeting of vehicle control systems CIA use of DLL hijacking CIA use of Tor network CIA use of VPNs CIA use of air-gapped laptops CIA use of anonymization tools CIA use of anti-forensic tools CIA use of bootkits CIA use of burner phones CIA use of code injection techniques CIA use of cover identities CIA use of covert communication channels CIA use of custom malware frameworks CIA use of cutouts CIA use of data exfiltration techniques CIA use of dead drops CIA use of disposable devices CIA use of encrypted USB drives CIA use of encrypted communications CIA use of false flag techniques CIA use of file deletion tools CIA use of firmware exploits CIA use of front companies CIA use of insider threats CIA use of keyloggers CIA use of microphone access tools CIA use of obfuscation techniques CIA use of operational security measures CIA use of persistence mechanisms CIA use of physical access attacks CIA use of privilege escalation techniques CIA use of proxy servers CIA use of remote access tools CIA use of rootkits CIA use of safe houses CIA use of sandbox evasion techniques CIA use of screenshot tools CIA use of secure operating systems CIA use of social engineering CIA use of steganography CIA use of supply chain attacks CIA use of webcam access tools CIA use of zero-day vulnerabilities CIA ability to turn smart TVs into listening devices |
gptkbp:subject |
gptkb:CIA
cybercrime malware surveillance hacking tools |
gptkbp:bfsParent |
gptkb:United_States_v._Schulte
|
gptkbp:bfsLayer |
7
|