This article is from the source 'rtcom' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at https://www.rt.com/news/382031-wikileaks-press-conference-assange/
The article has changed 5 times. There is an RSS feed of changes available.
Version 2 | Version 3 |
---|---|
#Vault7: Assange answering questions on WikiLeaks ‘Dark Matter’ release data dump (LIVE AUDIO) | #Vault7: Assange answering questions on WikiLeaks ‘Dark Matter’ release data dump (LIVE AUDIO) |
(35 minutes later) | |
Julian Assange is answering questions on WikiLeaks latest release in ‘Vault 7,’ named ‘Dark Matter.’ Assange is discussing the CIA’s ever changing role and the impact it’s having on world affairs. | |
Note: Some users are having intermittent issues with the live audio feed. | |
‘Dark Matter’ is just “a small example” of material to come, Assange said, speaking via Periscope. | |
READ MORE: #Vault7: WikiLeaks releases ‘Dark Matter’ batch of CIA hacking tactics for Apple products | READ MORE: #Vault7: WikiLeaks releases ‘Dark Matter’ batch of CIA hacking tactics for Apple products |
In light of these leaks, Assange warned how the CIA continues to be an agency that reports on the world and then “commits actions to overthrow governments and influence elections.” | |
“Since 9/11 the CIA has overtaken the NSA as the budgetary dominant intelligence agency within the US,” Assange said, resulting in increased “institutional ambitions” for the CIA to the point where it is now commanding air force resources, Assange claimed, citing their control of drones as an example. | |
“It is in some ways rivaling the FBI,” he said, “by being an armed force outside the United States, conducting interrogations, renditions and torture.” | |
When answering a question from Fox News on so-called “demands” made by WikiLeaks to tech companies before handing over details of the alleged CIA exploits, Assange answered that “demands [is] a strange word to use.” | |
“These exploits that are used by the CIA can affect millions of people so it has to be done cautiously. There has to be security channels involved and there has to be agreements that the vendors will in fact be responsive.” | |
Assange said WikiLeaks did not publish all details of the hacking techniques revealed in the leaks as it would result in both the “good guys” and the “bad guys” getting them at the same time. | |
The second release in the series details the techniques that WikiLeaks claims are employed by CIA assets to compromise Apple devices between the manufacturing line and the end user. |