VIDEO WikiLeaks releases ‘entire hacking capacity of the CIA’ – CIA Can Covertly Activate Your Mobile Device’s Mic

WIKILEAKS’ VAULT 7 RELEASE CONFIRMS INFOWARS’ DECADES OF RESEARCH

WikiLeaks releases ‘entire hacking capacity of the CIA’

March 7, 2017  By

 

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence tools includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

The agency allegedly maintains a database of malware created in other nations — WikiLeaks specifically cites Russia — in order to disguise its own hacking attempts as the work of another group.

In what is described by WikiLeaks as “one of the most astounding intelligence own goals in living memory,” the CIA is said to have made most of its programs unclassified to avoid legal consequences for transmitting classified information through the Internet — a move that increased the risk of outside groups pirating the cyber spying tools.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

Some of the files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html


Julian Assange on Sean Hannity – Full Interview – 1/3/17


Secret World of US Election: Julian Assange talks to John Pilger (FULL INTERVIEW)



WikiLeaks: The CIA Can Covertly Activate Your Mobile Device’s Microphone, Bypass Encryption Apps

 7 Mar 2017 by Allum Bokhari

WikiLeaks’ “Vault 7” dump of information on the CIA’s hacking unit has revealed that the agency has the ability to hack mobile phones, TVs, and even computers that are not connected to the internet.

According to the files contained in “Year Zero,” WikiLeaks’ codename for the first batch of the CIA leak, the agency has malware that can infect iOS, Windows and Android devices. Crucially, this malware allows it to bypass encrypted communication apps favored by journalists, including  Signal, Telegram, and Confide, as well as the popular messaging app WhatsApp.

Wikileaks later clarified that the CIA does not have the ability to crack the encryption itself, but is able to bypass it by directly hacking operating systems.

The CIA also has the ability to hack Samsung Smart TVs, turning them into covert microphones even when the device appears to be switched off. According to WikiLeaks, the CIA’s Mobile Devices Branch (MDB) can do the same to smartphones, which can also be instructed to transmit a user’s geolocation.

Furthermore, WikiLeaks also shows that the CIA is attempting to hack devices that are not connected to the internet, including those protected by the so-called “air gap” — a computing term used to describe measures that keep devices and networks disconnected from public networks including the internet.

Much of this vast hacking power is now in the hands of third parties as well as the CIA. According to the WikiLeaks, dump, the CIA has lost control of much of its hacking arsenal to unknown parties, after the cyber-weapons were “circulated among former U.S government hackers and contractors in an unauthorized manner.”

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

You can follow Allum Bokhari on Twitter and add him on Facebook. Email tips and suggestions to abokhari@breitbart.com.

http://www.breitbart.com/tech/2017/03/07/cia-can-spy-virtually-device-even-switched-off/


WikiLeaks Claims CIA Lost Control of ‘Hacking Arsenal’

 7 Mar 2017 by Lucas Nolan

In a press release for their most recent data dump, whistleblowing service WikiLeaks claims that the CIA has lost control of their “hacking arsenal.”

The press release states that WikiLeaks’ publication of CIA documents is the “largest ever publication of confidential documents on the agency.” The data dump consists of 8,761 files and documents taken from a high-security isolated network situated inside the CIA headquarters in Langley, Virginia.

Explosively, WikiLeaks also claims that the CIA has lost control of their “hacking arsenal.”

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

WikiLeaks states that their data dump contains information outlining the CIA’s global hacking program, the large collection of malware utilized by the agency, and their “zero day” weaponized exploits which could be used to hack “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

The press release notes the vulnerability of these “cyber weapons” and how easily they can be hijacked by third parties:

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

WikiLeaks founder and editor Julian Assange gave his own comment on the release, stating:

There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.

Read the full press release here.

Lucas Nolan is a reporter for Breitbart News covering issues of free speech and online censorship. Follow him on Twitter @LucasNolan_ or email him at lnolan@breitbart.com

http://www.breitbart.com/tech/2017/03/07/wikileaks-claims-cia-lost-control-hacking-arsenal/


WIKILEAKS’ VAULT 7 RELEASE CONFIRMS INFOWARS’ DECADES OF RESEARCH

TVs, phones and smart devices dangerously vulnerable to government compromise

Mar 7, 2017

The latest WikiLeaks’ release of CIA hacking tools confirms Infowars’ decades of reporting into the government’s ability to hack devices previously assumed to be safe.The “Vault 7” data dump, which begins with the “Year Zero” release of 8,761 documents, concerns highly-sensitive files from within the CIA’s Center for Cyber Intelligence in Langley.

“Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation,” a WikiLeaks’ press release states. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.”

The targets include electronic devices that for years Infowars has warned are vulnerable to compromise.

Alex Jones Warns Everything In Your Home Is Designed To Spy On You

For example, one such attack “infests smart TVs” and transforms them into “covert microphones.”

Americans Embrace Smart Gadgets Used to Spy on Them

“After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on,” WikiLeaks writes. “In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

Alex Jones: Xbox Kinect Is Spying On You

The data dump also highlights how Microsoft Windows has long been vulnerable to government intrusion.

“The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware,” the press release states. “This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.”

Alex Jones Exposes Computer Vulnerabilities With Computer Expert.

The years covered in the document span from 2013 to 2016. WikiLeaks is set to continue dumping new sets of documents in the coming days.

Alex Jones: Smart Light Bulbs Can Spy On You



Related

https://www.infowars.com/cia-turned-samsung-smart-tvs-into-listening-devices-wikileaks-dump-reveals/

https://www.infowars.com/wikileaks-vault-7-release-confirms-infowars-decades-of-research/

https://www.infowars.com/vault-7-cia-can-stage-fake-russian-hacking-to-undermine-trump/

https://www.infowars.com/wikileaks-cia-explored-car-hacking-to-carry-out-undetectable-assassinations/

https://www.infowars.com/judge-investigation-into-obama-spying-on-trump-would-reveal-mass-surveillance-of-all-americans/

https://www.infowars.com/catherine-herridge-top-level-deep-state-operatives-leaked-flynn-phone-call-transcripts/

https://www.infowars.com/buchanan-the-beltway-conspiracy-to-break-trump/

Advertisements

About ror1774

This Blog is for modern day Patriots who want to Reclaim Our Republic and put it on the right path with a foundation of our Constitution and our Creator God.
This entry was posted in Uncategorized and tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , . Bookmark the permalink.

10 Responses to VIDEO WikiLeaks releases ‘entire hacking capacity of the CIA’ – CIA Can Covertly Activate Your Mobile Device’s Mic

  1. Brittius says:

    Reblogged this on Brittius.

    Like

  2. TheTruth says:

    Reblogged this on The Truth.

    Like

  3. Pingback: VIDEO #ObamaGate is Going to Blow Wide-Open this Week” – AG Lynch Signed Off ALL FISA Apps to WireTap Trump | Reclaim Our Republic

  4. Pingback: Remember: MB Obama Scheme to Sabotage Trump Admin With High Profile Moles Exposed? | Reclaim Our Republic

  5. Pingback: VIDEO Spies among us, Congress created a monster coming for us – Trump ‘Extremely Concerned’ WikiLeaks CIA Breach | Reclaim Our Republic

  6. Pingback: VIDEO CIA “Weapons” Let Hackers Use Your Computer, Phone, TV to Spy on You, Crash Your Car, Third Amendment Violation? | Reclaim Our Republic

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s