WikiLeaks Reveals New Details About Growing Surveillance State

On Tuesday morning WikiLeaks released brand new documents related to surveillance operations conducted by the U.S. Central Intelligence Agency.

WikiLeaks has further exposed the Central Intelligence Agency’s spying capabilities in an explosive new document dump dubbed “Vault 7.” The vault is a massive collection of data regarding CIA surveillance activities with documents that detail everything from the CIA’s infiltration of smart phones, televisions, and cars, to the creation of a hacking station posing as a U.S. Consulate in Germany.

The release of the documents was not without controversy, as the electronics of WikiLeaks founder Julian Assange were reportedly “under attack.” A tweet from WikiLeaks states, “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans.

WikiLeaks claims that the CIA recently lost control over a “majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation”. The archive was apparently circulated among former U.S. government hackers and contractors before being shared with WikiLeaks.

“The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina,” WikiLeaks wrote in a press release. Year Zero focuses on the CIA’s global hacking program, their full arsenal of malware programs, and so-called “Zero Day” exploits for the U.S. and Europe’s most popular computer products, phones, and televisions.

The documents detail how the CIA’s hacking squad had blossomed to over 5000 registered users by the end of 2016 and produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. The hacking agency is under the command of the CIA’s Center for Cyber Intelligence as seen in the image below. WikiLeaks compares this growth to the CIA creating its own version of the National Security Agency, but with even less management and accountability.

The source of the leaks claims that the goal was to encourage public debate regarding the CIA’s hacking abilities and the larger issue of the security and creation of cyberweapons. “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade,” stated Julian Assange. “But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

The documents reveal that the hacking tools are built by EDG (Engineering Development Group), a software development group within the CCI. The EDG creates, tests, and offers support on all backdoors, exploits, trojans, viruses, and other malware used by the CIA in its surveillance operations. As part of a program code-named “Weeping Angel,” the CIA was able to target Samsung Smart TVs via a ‘Fake-Off’ mode which would deceive the owner into believing the TV is off. In this ‘Fake-Off’ mode the CIA could use the TV as a recording device for conversations in the room.

The CIA was also studying how to infect the vehicle control systems used by increasingly digital cars and trucks. The CIA’s Mobile Devices Branch (MDB) has also given the agency the ability to attack nearly all cell phones, specifically those created by Samsung and Apple. These infected phones can send the CIA the user’s location, audio recordings and text communication, in addition to secretly activating the microphone and camera. The MDB produced malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. Another unit targeted Google’s Android and developed 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

Another interesting piece of information from Vault 7, reveals that the CIA uses the U.S. consulate in Frankfurt as “a covert base for its hackers covering Europe, the Middle East and Africa.” Instructions for CIA hackers detail a lack of concern for security or being exposed. “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport,” one document reads.

RFID Scan Blockers – Available for Free (Ad)

The documents also seem to indicate vulnerabilities in popular encrypted messaging platforms WhatsApp, Signal, Telegram, Wiebo, Confide, and Cloakman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied. However, NSA whistleblower Edward Snowden tweeted, “PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem”. Snowden did seem to confirm that the documents were real. Snowden even offered a bit of advice to journalists digging through the documents.

The release of Vault 7 is yet further proof that the United States of America is now a real world representation of George Orwell’s infamous dystopian novel, 1984. The free hearts and minds of the world must resist this surveillance at every turn and stop participating in their own enslavement.

This article may be freely reposted in part or in full with author attribution and source link.

Advertisements

Posted on March 19, 2017, in ConspiracyOz Posts. Bookmark the permalink. Leave a comment.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: