Group 9 Created with Sketch. Group 13 Created with Sketch. Pause Created with Sketch. Combined Shape Created with Sketch. Group 12 Created with Sketch. Group 12 Created with Sketch. Shape Created with Sketch. Group 10 Created with Sketch. Shape Created with Sketch. Fill 15 Copy Created with Sketch. Shape Created with Sketch. Group 13 Created with Sketch. Group 16 Created with Sketch. Group 3 Created with Sketch. Group 13 Created with Sketch. Group 16 Created with Sketch. Group 18 Created with Sketch. Group 19 Created with Sketch. Group 21 Created with Sketch. Group 22 Created with Sketch.
|

Making sense of the big WikiLeaks CIA cyberhacking dump

WikiLeaks released a trove of secret files over the CIA’s efforts to hack into people’s computers, phones, and popular electronic devices.

Most analysts who have looked at the files believe they are genuine, and that what was released constitutes just the tip of the iceberg of what WikiLeaks holds.

What are the implications of the dump?  

Guests: 

Kim Zetter,  a reporter covering cybercrime, privacy, and security who’s been following the story for the Intercept. She is the author of “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon” (Broadway Book, 2015)

Bob Stasio, a fellow at the Truman National Security Project, a national security think tank. He is also former Chief of Operations of NSA’s Cyber Center

Jordan Robertson, reporter at Bloomberg who’s been following the story