WIKILEAKS Prove CIA Collects Location data From ALL Wifi Devices
Whistleblowing website adds to vault 7 series
Wikileaks has published more documents showing that ELSA malware is allegedly used by the US Intelligence Agency to collect geolocation data from WIFI enable device.
The whistleblowing website published new CIA documents from their Vault 7 series showing how the agency was using malware to get full geolocation information.
According to the Wikileaks press release
“Today, June 28th, 2017, WikiLeaks publishes documents from the ELSA project of the CIA. ELSA is a geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system … If it [device] is connected to the internet, the malware automatically tries to use public geo-location databases from Google or Microsoft to resolve the position of the device and stores the longitude and latitude data along with the timestamp,”
“Additional back-end software (again using public geo-location databases from Google and Microsoft) converts unprocessed access point information from exfiltrated logfiles to geo-location data to create a tracking profile of the target device,” WikiLeaks said.
Sputniknews reports The whistleblowing platform released what appears to be the CIA's user manual for the ELSA project as evidence.
The whistleblowing platform released what appears to be the CIA's user manual for the ELSA project as evidence.
WikiLeaks began releasing Vault 7 on March 7, with the first full part comprising 8,761 documents. The previous release took place on June 22 and was dedicated to the CIA "Brutal Kangaroo” hacking tool.