Wikileaks is the gift that keeps on giving. Unless of course you’re Hillary Clinton or any other of the seemingly vast number of liberals who’ve been involved in various levels of corrupt activities and used email as an enabling communication tool.Yesterday we reported on how Julian Assange’s organization had outed the Obama administration for its spying on the U.N. and other foreign heads of state. True to form ‘the gift that keeps on giving’ today has unloaded another batch of bombshells. On its website Wikileaks has posted what its calling the “largest ever publication of confidential documents” on the Central Intelligence Agency.
Referred to as “Vault 7” the information is being released in a series of systemic data dumps, “The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.”
The French spying is just the tip of the iceberg. Data analysts at Zerohedge have unearthed a plethora of information.
You know those annoying viruses and malware attacks your antivirus software occasionally warns you about? There’s a good chance they’re from your government!“The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.
By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”
There’s more. All those Democrat accusations of Russians ‘hacking our election’? Guess what:“Among the key topical revelations is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction,….”In other words they can do it but leave behind footprints that lead to Russia and not to the (Obama) CIA.
Believe it or not that’s still not the worst of it. Anyone ever call you paranoid because you’re afraid all these new ‘smart devices’ may be a bit too smart and can be used as spying instruments? Well your paranoia was justified:
“Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”
As the saying goes – you’re not paranoid if they really are watching you.
[Note: This article was written by Derrick Wilburn]