WASHINGTON - The CIA on Wednesday accused WikiLeaks of endangering the United States, helping US rivals and hampering the fight against terror threats by releasing what the anti-secrecy site claimed was a trove of CIA hacking tools.
A CIA spokeswoman would not confirm the authenticity of the materials published by WikiLeaks, which said they were leaked from the spy agency's hacking operations.
Nevertheless, spokeswoman Heather Fritz Horniak said: "The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the intelligence community's ability to protect America against terrorists and other adversaries. "Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm," she said.
Horniak defended the CIA's cyber operations, which the WikiLeaks materials showed focused heavily on breaking into personal electronics using a wide range of malware systems.
"It is CIA's job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad," she said.
Massive leak
On Tuesday, WikiLeaks published nearly 9,000 documents it said were part of a huge trove leaked from the CIA, describing it as the largest publication of secret intelligence materials.
The documents showed that CIA hackers can turn a TV into a listening device, bypass popular encryption apps, and possibly control one's car.
Most experts believe the materials to be genuine, and US media said on Wednesday that the FBI is opening a criminal probe into the leak.
The source of the materials remained unclear.
WikiLeaks itself said the documents, hacking tools and code came from an archive that had circulated among US government hackers and private contractors.
WikiLeaks, which has stunned the US government with a series of publications of top secret political, diplomatic and intelligence materials, said the publication on Tuesday was only the first of a series of releases of CIA hacking materials.
The WikiLeaks documents detailed the CIA's practice of exploiting vulnerabilities in hardware and software, without informing producers of them.
The CIA allegedly found ways to hack into personal electronics from leading companies like Apple and Samsung, Android phones, popular Microsoft software, and crucial routers from major manufacturers.