{"id":37457,"date":"2021-08-21T20:57:16","date_gmt":"2021-08-21T20:57:16","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2021\/08\/21\/in-2017-wikileaks-released-a-bunch-of-documents-detailing-cyber-operations-at-the-cia\/"},"modified":"2021-08-21T20:57:16","modified_gmt":"2021-08-21T20:57:16","slug":"in-2017-wikileaks-released-a-bunch-of-documents-detailing-cyber-operations-at-the-cia","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2021\/08\/21\/in-2017-wikileaks-released-a-bunch-of-documents-detailing-cyber-operations-at-the-cia\/","title":{"rendered":"In 2017, Wikileaks released a bunch of documents detailing cyber operations at the CIA."},"content":{"rendered":"<p>In 2017, Wikileaks released a bunch of documents detailing cyber operations at the CIA. Krebs on Security, a popular cyber blogger\/researcher, has decent writeup of the incident. <br \/>https:\/\/krebsonsecurity.com\/2017\/03\/wikileaks-dumps-docs-on-cias-hacking-tools\/ <br \/>What are you thoughts on these cyber operations? Frame your responses based around topics of national security and\u00a0the 4th amendment. Often, defining &#8216;gray hat&#8217; behaviors can be difficult in a legal sense. Is this something we (USA) &#8216;need&#8217; to be doing? What do we do now that these tools, techniques, and procedures are commonly available? What&#8217;s next? <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2017, Wikileaks released a bunch of documents detailing cyber operations at the CIA. Krebs on Security, a popular cyber blogger\/researcher, has decent writeup of the incident. https:\/\/krebsonsecurity.com\/2017\/03\/wikileaks-dumps-docs-on-cias-hacking-tools\/ What are you thoughts on these cyber operations? Frame your responses based around topics of national security and\u00a0the 4th amendment. Often, defining &#8216;gray hat&#8217; behaviors can be [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[28],"class_list":["post-37457","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-computer-science"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/37457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=37457"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/37457\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=37457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=37457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=37457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}