This is amazing stuff revealing the truth behind every guess I've ever made about the ability of the CIA to use technology and especially "Smart Technology Devices" for spying. What I didn't guess was that their methods, trojans, spyware, and so on they use to hack is loose and has been loose in the wild being used by God only knows who. The CIA lost control of their tools! 


The attached announcement from Wikileaks is somewhat lengthy in scope but deserves to be seen and read by any and all of us concerned with being spied on and how the CIA methods to spy on us are now out and available to not only other Government agencies and operatives but also to other Countries and the random guy in his pajamas living in mom's basement as well. 


Following are a few excerpts as a glimpse of what is available but please take the time to go to and examine this announcement and supporting materials for yourself. Wikileaks has in this case kept back or redacted some of the information they were given in the hopes of creating public dialog, discussion and debate over the topic and whether it serves the public better to keep the information back or further let it loose as it is already in the wild but not known to the masses as to how to retrieve it. 


This is a HUGE release, far surpassing the Snowden information or any previous Wikileaks information dump and the story will be unfolding for weeks to come. If rather than reading the excerpts below you want to jump to their release it is HERE.


EXCERPTS FOLLOW:


Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.


The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virginia. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.


Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.


Analysis


CIA malware targets iPhone, Android, smart TVs


CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).


The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.


The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.


The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.


As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.


The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.


Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includesnumerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.


similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.


These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.


CIA malware targets Windows, OSx, Linux, routers


The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.


Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".


Attacks against Internet infrastructure and web servers are developed by the CIA's Network Devices Branch (NDB).


The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below.



AND THIS WAS THE TIP OF THE ICEBERG - READ MORE AT THE FOLLOWING LINK - FIND EVIDENCE ATTACHED -> 

Attachments
Safari Woman is online.
*NOTE TO APPLE USERS - CIA especially targets Apple Products! 
  • March 7, 2017
  • ·
  • Like
Dale Barnes
You mean to tell me us conspiracy nuts have been right all along?
  • March 7, 2017
  • ·
  • Like
beachbum
Yep! Aren't you surprised?
  • March 7, 2017
  • ·
  • Like
Safari Woman is online.
right as usual..
  • March 8, 2017
  • ·
  • Like
BlueMax372
Yep. Remember that a goodly number of us "nuts" actually have knowledge of what's really happening!!! LMAO!!
  • March 8, 2017
  • ·
  • Like
Robert Kenard
Did you see the memes?
  • March 8, 2017
  • ·
  • Like
Wanda Hope Carter
What memes?
  • March 23, 2017
  • ·
  • Like
Captcha Challenge
Reload Image
Type in the verification code above
Back To Top
TOP