A selection of software retail package designs made for the CIA’s Center for Cyber Intelligence cyberweapons from the Vault 7 leaks published by WikiLeaks.
Unknown to most of the population, were are in the midst of a rapidly escalating global cyberwar. This war isn’t one with clearly defined borders or groups. Rather, there is a diverse ecology of individuals, criminal groups, private organizations and companies, state sponsored groups, and government intelligence organizations all operating with their own agendas.
Cyberwarfare involves the deployment of cyberweapons, or weaponized software also known as malware, against targets. The motivations are as diverse as those operating on the frontlines. High profile attacks covered by the media have resulted in power outages in Ukraine, Internet Outages in Libya, Destruction of Uranium Enriching Centrifuges in Iran, Ransomware attacks on British National Health Service, Internet Service disruptions due to Distributed Denial of Service Attacks on DYN’s Domain Name System servers to attacks on voter registries in the US as well as phishing attacks on US and French presidential campaigns.
The boxes in this project represent only a handful of actual cyberweapons developed by the CIA. Knowledge of the CIA’s cyber arsenal was first made public by Wikileaks on March 7th, 2017:
“Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.” — wikileaks.org