As getting the reports, the CIA got compromised by their data that was at least 180 gigabytes to as much as 34 terabytes of information that may be equivalent to 11.6 million to 2.2 million pages of the Microsoft word that was just analysis.
The whole story
The theft of the top-secret computer hacking tools from the CIA in 2016 was the result of the work culture in which the agency’s computer hackers “ which is used for the prioritized building cyber weapons at the expense of securing their own systems” as the internal report mentioned by Mike Pompeo.
The breach was committed by a CIA employee which was discovered a year after that happened and the information leaked by the Wikileaks in March 2017. The US officials said that the biggest unauthorized disclosure of classified information in the CIA’s History. The agency shut down some of the intelligence operations and alerting foreign adversaries that spy the agency’s techniques.
In October 2017 report the CIA’s Wikileaks task force that several pages of the missing of which are missing or redacted, portrays an agency that is concerned with the bulking up with the cyber arsenal which keeps those tools secure. The security procedures were “ Woefully lax” and the special unit which was designed and built the tools.
The task force has noted that they could not determine the size of the breach because the CIA hacking team disroot required the monitoring of who used its network, but it was concluded that the employee has stolen as much as 34 terabytes of information; it’s around 2.2 billion pages.
The CIA press secretary that denied the comment and said “CIA works for the incorporate best-in-class technologies which keep ahead of and defend against ever-evolving threats”
The hacking tool was developed by the CIA’s center for the Cyber intelligence that the agency’s most-sophisticated hacker which gain the access to the hard penetrate networks for the instance that was secretly activate the camera and the microphone on the foreign target’s tablet that steals the design plans of the foreign adversary’s advanced weapons systems.
Those employees who work under pressure to find the constant pressure for the vulnerabilities in commercial software and the other technologies as the former senior intelligence said.
The CIA hacker pursued that the ability to “audit” the network is to know the logging user and watching what they are doing, the better more detailed than it was actual.
The entire computer network was maintained by the contractors according to the report and the misunderstanding between the people who ran the unit and people who ran and maintained the network.
For suggestions please comment in the comment section.