1 ZANDANSHATAR GOMBOJAV APPOINTED AS PRIME MINISTER OF MONGOLIA WWW.MONTSAME.MN PUBLISHED:2025/06/13      2 WHAT MONGOLIA’S NEW PRIME MINISTER MEANS FOR ITS DEMOCRACY WWW.TIME.COM PUBLISHED:2025/06/13      3 ULAANBAATAR DIALOGUE SHOWS MONGOLIA’S FOREIGN POLICY CONTINUITY AMID POLITICAL UNREST WWW.THEDIPLOMAT.COM PUBLISHED:2025/06/13      4 THE UNITED NATIONS CHILDREN’S FUND (UNICEF) IN MONGOLIA, THE NATIONAL FOUNDATION FOR SUPPORTING THE BILLION TREES MOVEMENT, AND CREDITECH STM NBFI LLC HAVE JOINTLY LAUNCHED THE “ONE CHILD – ONE TREE” INITIATIVE WWW.BILLIONTREE.MN PUBLISHED:2025/06/13      5 NEW MONGOLIAN PM TAKES OFFICE AFTER CORRUPTION PROTESTS WWW.AFP.MN PUBLISHED:2025/06/13      6 GOLD, MINED BY ARTISANAL AND SMALL-SCALE MINERS OF MONGOLIA TO BE SUPPLIED TO INTERNATIONAL JEWELRY COMPANIES WWW.MONTSAME.MN PUBLISHED:2025/06/13      7 AUSTRIA PUBLISHES SYNTHESIZED TEXTS OF TAX TREATIES WITH ICELAND, KAZAKHSTAN AND MONGOLIA AS IMPACTED BY BEPS MLI WWW.ORBITAX.COM  PUBLISHED:2025/06/13      8 THE UNITED STATES AND MONGOLIA OPEN THE CENTER OF EXCELLENCE FOR ENGLISH LANGUAGE TEACHING IN ULAANBAATAR WWW.MN.USEMBASSY.GOV  PUBLISHED:2025/06/12      9 MONGOLIA'S 'DRAGON PRINCE' DINOSAUR WAS FORERUNNER OF T. REX WWW.REUTERS.COM PUBLISHED:2025/06/12      10 MONGOLIA’S PIVOT TO CENTRAL ASIA AND THE CAUCASUS: STRATEGIC REALIGNMENTS AND REGIONAL IMPLICATIONS WWW.CACIANALYST.ORG  PUBLISHED:2025/06/12      БӨӨРӨЛЖҮҮТИЙН ЦАХИЛГААН СТАНЦЫН II БЛОКИЙГ 12 ДУГААР САРД АШИГЛАЛТАД ОРУУЛНА WWW.MONTSAME.MN НИЙТЭЛСЭН:2025/06/15     ОРОН СУУЦНЫ ҮНЭ 14.3 ХУВИАР ӨСЖЭЭ WWW.EGUUR.MN НИЙТЭЛСЭН:2025/06/15     МОНГОЛ УЛСЫН 34 ДЭХ ЕРӨНХИЙ САЙДААР Г.ЗАНДАНШАТАРЫГ ТОМИЛЛОО WWW.MONTSAME.MN НИЙТЭЛСЭН:2025/06/13     SXCOAL: МОНГОЛЫН НҮҮРСНИЙ ЭКСПОРТ ЗАХ ЗЭЭЛИЙН ХҮНДРЭЛИЙН СҮҮДЭРТ ХУМИГДАЖ БАЙНА WWW.ITOIM.MN НИЙТЭЛСЭН:2025/06/13     МОНГОЛ БАНК: ТЭТГЭВРИЙН ЗЭЭЛД ТАВИХ ӨР ОРЛОГЫН ХАРЬЦААГ 50:50 БОЛГОЛОО WWW.EGUUR.MN НИЙТЭЛСЭН:2025/06/13     МОНГОЛ ДАХЬ НҮБ-ЫН ХҮҮХДИЙН САН, ТЭРБУМ МОД ҮНДЭСНИЙ ХӨДӨЛГӨӨНИЙГ ДЭМЖИХ САН, КРЕДИТЕХ СТМ ББСБ ХХК “ХҮҮХЭД БҮРД – НЭГ МОД” САНААЧИЛГЫГ ХАМТРАН ХЭРЭГЖҮҮЛНЭ WWW.BILLIONTREE.MN НИЙТЭЛСЭН:2025/06/13     ЕРӨНХИЙЛӨГЧИЙН ТАМГЫН ГАЗРЫН ДАРГААР А.ҮЙЛСТӨГӨЛДӨР АЖИЛЛАНА WWW.EAGLE.MN НИЙТЭЛСЭН:2025/06/13     34 ДЭХ ЕРӨНХИЙ САЙД Г.ЗАНДАНШАТАР ХЭРХЭН АЖИЛЛАНА ГЭЖ АМЛАВ? WWW.EGUUR.MN НИЙТЭЛСЭН:2025/06/13     “АНГЛИ ХЭЛНИЙ МЭРГЭШЛИЙН ТӨВ”-ИЙГ МУИС-Д НЭЭЛЭЭ WWW.MONTSAME.MN НИЙТЭЛСЭН:2025/06/13     Г.ЗАНДАНШАТАР БАЯЛГИЙН САНГИЙН БОДЛОГЫГ ҮРГЭЛЖЛҮҮЛНЭ ГЭЖ АМЛАЛАА WWW.EGUUR.MN НИЙТЭЛСЭН:2025/06/12    

WikiLeaks says it releases files on CIA cyber spying tools www.reuters.com

Anti-secrecy group WikiLeaks on Tuesday published what it said were thousands of pages of internal CIA discussions about hacking techniques used over several years, renewing concerns about the security of consumer electronics and embarrassing yet another U.S. intelligence agency.

The discussion transcripts showed that CIA hackers could get into Apple Inc iPhones, Google Inc Android devices and other gadgets in order to capture text and voice messages before they were encrypted with sophisticated software.

Cyber security experts disagreed about the extent of the fallout from the data dump, but said a lot would depend on whether WikiLeaks followed through on a threat to publish the actual hacking tools that could do damage.

Reuters could not immediately verify the contents of the published documents, but several contractors and private cyber security experts said the materials, dated between 2013 and 2016, appeared to be legitimate.

A longtime intelligence contractor with expertise in U.S. hacking tools told Reuters the documents included correct "cover" terms describing active cyber programs.

Among the most noteworthy WikiLeaks claims is that the Central Intelligence Agency, in partnership with other U.S. and foreign agencies, has been able to bypass the encryption on popular messaging apps such as WhatsApp, Telegram and Signal.

The files did not indicate the actual encryption of Signal or other secure messaging apps had been compromised.

The information in what WikiLeaks said were 7,818 web pages with 943 attachments appears to represent the latest breach in recent years of classified material from U.S. intelligence agencies.

Security experts differed over how much the disclosures could damage U.S. cyber espionage. Many said that, while harmful, they do not compare to former National Security Agency contractor Edward Snowden's revelations in 2013 of mass NSA data collection.

"This is a big dump about extremely sophisticated tools that can be used to target individual user devices ... I haven’t yet come across the mass exploiting of mobile devices," said Tarah Wheeler, senior director of engineering and principal security advocate for Symantec.

Stuart McClure, CEO of Cylance, an Irvine, California, cyber security firm, said that one of the most significant disclosures shows how CIA hackers cover their tracks by leaving electronic trails suggesting they are from Russia, China and Iran rather than the United States.

Other revelations show how the CIA took advantage of vulnerabilities that are known, if not widely publicized.

In one case, the documents say, U.S. and British personnel, under a program known as Weeping Angel, developed ways to take over a Samsung smart television, making it appear it was off when in fact it was recording conversations in the room.

The CIA and White House declined comment. "We do not comment on the authenticity or content of purported intelligence documents," CIA spokesman Jonathan Liu said in a statement.

Google declined to comment on the purported hacking of its Android platform, but said it was investigating the matter.

Snowden on Twitter said the files amount to the first public evidence that the U.S. government secretly buys software to exploit technology, referring to a table published by WikiLeaks that appeared to list various Apple iOS flaws purchased by the CIA and other intelligence agencies.

Apple Inc did not respond to a request for comment.

The documents refer to means for accessing phones directly in order to catch messages before they are protected by end-to-end encryption tools like Signal.

Signal inventor Moxie Marlinspike said he took that as "confirmation that what we’re doing is working." Signal and the like are "pushing intelligence agencies from a world of undetectable mass surveillance to a world where they have to use expensive, high-risk, extremely targeted attacks."



Published Date:2017-03-08