Report: Manhunt underway for 'traitor' inside CIA

Authored by aol.com and submitted by redhatGizmo

Before you go, we thought you'd like these...

It was the WikiLeaks data dump that thrusted the public into bouts of paranoia.

Known as Vault 7, thousands of documents from the CIA detailed covert programs in which devices like smart TV's and smartphones could spy on people.

Now CBS News is reporting that a manhunt for the leaker is underway. The CIA and FBI are joining forces to investigate what has become one of the worst security breaches since Edward Snowden.

RELATED: NSA, Edward Snowden and CIA

21 PHOTOS The NSA, Edward Snowden and the CIA See Gallery The NSA, Edward Snowden and the CIA A man is silhouetted near logos of the U.S. National Security Agency (NSA) and Wikipedia in this photo illustration taken in Sarajevo March 11, 2015. REUTERS/Dado Ruvic/File Photo An undated aerial handout photo shows the National Security Agency (NSA) headquarters building in Fort Meade, Maryland. NSA/Handout via REUTERS THIS IMAGE HAS BEEN SUPPLIED BY A THIRD PARTY. IT IS DISTRIBUTED, EXACTLY AS RECEIVED BY REUTERS, AS A SERVICE TO CLIENTS. FOR EDITORIAL USE ONLY. NOT FOR SALE FOR MARKETING OR ADVERTISING CAMPAIGNS U.S. President Barack Obama speaks following a meeting with his National Security Council at CIA Headquarters in Langley, Virginia April 13, 2016. REUTERS/Kevin Lamarque UNITED STATES - FEB. 9 - From left, National Security Agency Director Adm. Michael Rogers, FBI Director James Comey, Director of the National Intelligence James Clapper, CIA Director John Brennan, and Defense Intelligence Agency Director Lt. Gen. Vincent Stewart, testify on Capitol Hill in Washington, on Tuesday, Feb. 9, 2016, before the Senate Select Intelligence Committee hearing on worldwide threats. (Photo By Al Drago/CQ Roll Call) A man crosses the Central Intelligence Agency (CIA) logo in the lobby of CIA Headquarters in Langley, Virginia, on August 14, 2008. AFP PHOTO/SAUL LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images) The Central Intelligence Agency (CIA) logo is displayed in the lobby of CIA Headquarters in Langley, Virginia, on August 14, 2008. AFP PHOTO/SAUL LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images) WASHINGTON, DC - APRIL 02: Detail of the cufflinks of former Deputy CIA Director Michael Morell as he testifies before the House Select Intelligence Committee April 2, 2014 in Washington, DC. The committee heard testimony on the topic of 'The Benghazi Talking Points and Michael J. Morell's Role in Shaping the Administration's Narrative.' (Photo by Win McNamee/Getty Images) WASHINGTON, DC - APRIL 02: Former Deputy CIA Director Michael Morell is sworn in prior to testimony before the House Select Intelligence Committee April 2, 2014 in Washington, DC. The committee heard testimony on the topic of 'The Benghazi Talking Points and Michael J. Morell's Role in Shaping the Administration's Narrative.' (Photo by Win McNamee/Getty Images) A picture taken on February 25, 2015 shows the logo of Gemalto in Paris. European SIM maker Gemalto said it had suffered hacking attacks that may have been conducted by US and British intelligence agencies but denied any 'massive theft' of encryption keys that could be used to spy on conversations. AFP PHOTO KENZO TRIBOUILLARD (Photo credit should read KENZO TRIBOUILLARD/AFP/Getty Images) Visitors gather in the Gemalto NV pavilion at the Mobile World Congress in Barcelona, Spain, on Wednesday, Feb. 27, 2013. The Mobile World Congress, where 1,500 exhibitors converge to discuss the future of wireless communication, is a global showcase for the mobile technology industry and runs from Feb. 25 through Feb. 28. Photographer: Simon Dawson/Bloomberg via Getty Images Gemalto CEO Olivier Piou (C) arrives for a press conference on February 25, 2015 in Paris. European SIM maker Gemalto said it had suffered hacking attacks that may have been conducted by US and British intelligence agencies but denied any 'massive theft' of encryption keys that could be used to spy on conversations. AFP PHOTO KENZO TRIBOUILLARD (Photo credit should read KENZO TRIBOUILLARD/AFP/Getty Images) Gemalto CEO Olivier Piou (C) gives a press conference on February 25, 2015 in Paris. European SIM maker Gemalto said it had suffered hacking attacks that may have been conducted by US and British intelligence agencies but denied any 'massive theft' of encryption keys that could be used to spy on conversations. AFP PHOTO KENZO TRIBOUILLARD (Photo credit should read KENZO TRIBOUILLARD/AFP/Getty Images) Gemalto CEO Olivier Piou shows a cell phone sim card before a press conference on February 25, 2015 in Paris. European SIM maker Gemalto said it had suffered hacking attacks that may have been conducted by US and British intelligence agencies but denied any 'massive theft' of encryption keys that could be used to spy on conversations. AFP PHOTO KENZO TRIBOUILLARD (Photo credit should read KENZO TRIBOUILLARD/AFP/Getty Images) BERLIN, GERMANY - JANUARY 29: Symbolic photo for data protection, reflection of the seal of the National Security Agency in a computer hard drive on January 29, 2015 in Berlin, Germany. (Photo by Thomas Trutschel/Photothek via Getty Images) Michael Rogers, director of the U.S. National Security Agency (NSA), speaks during an interview in New York, U.S., on Thursday, Jan. 8, 2015. The hacking attack on Sony Pictures Entertainment is prompting U.S. officials to rethink when the government should help private companies defend against and deter digital assaults, Rogers said. Photographer: Victor J. Blue/Bloomberg via Getty Images Visitors chat near a reception desk at the Gemalto NV promotional stand on the opening day of the Mobile World Congress in Barcelona, Spain, on Monday, Feb. 27, 2012. The Mobile World Congress, operated by the GSMA, expects 60,000 visitors and 1400 companies to attend the four-day technology industry event which runs Feb. 27 through March 1. Photographer: Chris Ratcliffe/Bloomberg via Getty Images An employee displays a Gemalto NV M2M quad sim card at the Mobile World Congress in Barcelona, Spain, on Wednesday, Feb. 27, 2013. The Mobile World Congress, where 1,500 exhibitors converge to discuss the future of wireless communication, is a global showcase for the mobile technology industry and runs from Feb. 25 through Feb. 28. Photographer: Simon Dawson/Bloomberg via Getty Images GERMANY, BONN - DECEMBER 12:Â Symbol photo of a computer hard drive with the logo of the National Security Agency (NSA), on December 12, 2014 in Bonn, Germany. (Photo by Ulrich Baumgarten via Getty Images) WASHINGTON, DC - NOVEMBER 20: Adm. Michael Rogers, commander of the U.S. Cyber Command and director of the National Security Agency, testifies during a hearing before the House (Select) Intelligence Committee November 20, 2014 on Capitol Hill in Washington, DC. The committee held a hearing on 'Cybersecurity Threats: The Way Forward.' (Photo by Alex Wong/Getty Images) The Central Intelligence Agency (CIA) logo is displayed in the lobby of CIA Headquarters in Langley, Virginia, on August 14, 2008. AFP PHOTO/SAUL LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images) Up Next See Gallery Discover More Like This HIDE CAPTION SHOW CAPTION of SEE ALL BACK TO SLIDE

Sources tell the network it looks like either a CIA employee or contractor is to blame.

The documents stolen are in such a secure section that only a few hundred people have access to them.

President Trump, who once praised Julian Assange for leaking embarrassing documents of his rivals, is now reportedly "extremely concerned."

CIA director Mike Pompeo said, "It is time to call out WikiLeaks for what it really is, a non-state hostile intelligence service often abetted by state actors like Russia."

At the time of its initial publishing, WikiLeaks says the CIA documents it released are just the tip of the iceberg, claiming they've only released 1 percent of their trove on the organization.

UptownDonkey on April 23rd, 2017 at 06:10 UTC »

According to my Samsung TV the traitor's codename is HDMI 1

readmorebetter on April 23rd, 2017 at 05:14 UTC »

Hmm, dubious use of the word "manhunt."

FineFlowingTableSalt on April 23rd, 2017 at 03:51 UTC »

Uneducated as I am to this sort of thing, I sort of expected that most government agencies (not just the US) have espionage agents working in them in some respect.