• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechWikiLeaks

Wikileaks Sets Conditions for Helping Tech Companies Close CIA Hacks

By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
March 18, 2017, 2:29 PM ET

Wikileaks this week contacted major tech companies including Apple and Google, and required them to assent to a set of conditions before receiving leaked information about security “zero days” and other surveillance methods in the possession of the Central Intelligence Agency. The communication, reported by Motherboard, came a week after Julian Assange’s initial statement that he would help the companies close security loopholes disclosed in a set of leaked CIA documents.

Wikileaks’ demands remain largely unknown, but may include a 90-day deadline for fixing any disclosed security vulnerabilities. According to Motherboard’s sources, at least some of the involved companies are still in the process of evaluating the legal ramifications of the conditions.

Get Data Sheet, Coins2Day ’s technology newsletter.

In a statement late Friday, WikiLeaks announced that some organizations, including Firefox maker Mozilla, have already decided to play ball. The statement also lays out one reason companies might be moving slowly to respond to what it calls an “industry standard responsible disclosure plan.”

Update on CIA #Vault7 "zero day" software vulnerabilities

Ref: https://t.co/h5wzfrReyypic.twitter.com/WEiyptlRu3

— WikiLeaks (@wikileaks) March 18, 2017

The security vulnerabilities were disclosed in CIA documents likely handed to Wikileaks via intelligence contractors. They include methods for penetrating Android and iPhone smartphones, desktop operating systems, routers, and web browsers. “Zero day” refers to deployments of malware or other hacks before an update or patch is created to resolve the vulnerability. Companies involved include Microsoft, Cisco, ZTE, Huawei, and others.

But Wikileaks’ public document release did not include code or full technical details of the vulnerabilities.

Big tech companies have had a fraught relationship with intelligence agencies in recent years, with prior revelations of surveillance programs leading to efforts to reassure consumers that their devices are safe from snoops. Apple, for its part, has said many of the vulnerabilities described in the documents have already been patched. However, the CIA documents include references to more than a dozen unpatched “zero day” exploits of Apple products.

About the Author
By David Z. Morris
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.