“The Swiss firm made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican.But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages.”
«Most Americans are understandably shocked by what they view as an unprecedented attack on our political system. But intelligence veterans, and scholars who have studied covert operations, have a different, and quite revealing, view. ‘If you ask an intelligence officer, did the Russians break the rules or do something bizarre, the answer is no, not at all,” said Steven L. Hall, who retired in 2015 after 30 years at the C.I.A., where he was the chief of Russian operations. The United States “absolutely” has carried out such election influence operations historically, he said, “and I hope we keep doing it.’»
«The collaboration between the intelligence community and big, commercial science and tech companies has been wildly successful. When national security agencies need to identify and track people and groups, they know where to turn – and do so frequently. That was the goal in the beginning. It has succeeded perhaps more than anyone could have imagined at the time».
« Vault 7, une montagne qui accouche d’une souris ? C’est un peu ce que semblent dire certains experts en sécurité informatique à propos des révélations de Wikileaks sur la CIA. Nous avons compilé ces critiques pour les mettre en rapport avec les données que nous avons ».
Today, 21 October 2015 and over the coming days WikiLeaks is releasing documents from one of CIA chief John Brennan’s non-government email accounts. Brennan used the account occasionally for several intelligence related projects.