WikiLeaks Releases Vault 7: US Under Attack From CIA

In the era of the information war, new ground breaking leaks have been made available to the public. Julian Assange, figurehead of Wikileaks has become widely known after the 2016 presidential election. Publisher of John Podesta’s emails, now brings the world “Vault 7,” which exposes CIA projects and goals over the years.

The press release from WikiLeaks states that “the first full part of the series, ‘Year Zero’, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.”

In addition, “recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.” This equates to “several hundred million lines of code” and the owner of this material has immense power.

Some of the findings are horrific to say the least. The following is a list of the top findings from Vault 7…

CIA malware targets Android, iPhone, smart TVs, Windows, OSx, Linux, and routers.

“”Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

CIA developed “Weeping Angel” to turn smart TVs into microphones.

“After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

The CIA can hack car computers and use them for assassinations.

“As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

The CIA can masquerade it’s malware to take the identity of foreign intelligence malware.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.”

CIA hacking software is unclassified and uncopyrighted.

“the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse. The CIA made these systems unclassified.”

Overall, the capabilities and projects of the CIA are alarming to the public. Covert operations to spy, hack, and control the lives of millions of Americans has been exposed to citizens. Throughout the past decades, people questioning the government have been labeled “looney conspiracy theorists.” The thought of a shadow government that spies on its own citizens through new technology was nearly always dismissed as “improbable.”

Today, they were proven right.

One Comment
TDL

Copyright © 2017 The Daily Lion