.

Vault 7 Bombshell: The CIA Can Spy Through TVs, iPhones, Smart Phones and Windows PCs

Another deep state bombshell just hit the ‘net with WikiLeaks’ release of over 8,000 pages of once-secret documents from inside the CIA. Th...

Another deep state bombshell just hit the ‘net with WikiLeaks’ release of over 8,000 pages of once-secret documents from inside the CIA. The release is dubbed “Vault 7.”

While it’s going to take internet sleuths several days to pour through all the documents and find full details of what they reveal, some of the highlights include these bombshells:

Via the WikiLeaks press release:

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.


This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.

The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Samsung Warns Customers Not to Discuss Personal Information In Front of Smart TVs

Smart phones, smart TVs and iPhones can all be turned into surveillance microphones

In essence, the CIA developed malware exploits that could defeat almost any mobile devices (iPhones, Android, Blackberry, etc.) or personal computer (Apple, Windows and Google devices).

Mobile devices can be turned into remote surveillance microphones that listen to everything you say and upload the audio to the CIA.
“The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone,” explains WikiLeaks.
Samsung smart TVs can also be transformed into spy microphones, even when they appear to be turned off. This is accomplished by a CIA exploit known as “Weeping Angel.”

As WikiLeaks explains:

Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

In essence, the Vault 7 document dump just proved every “conspiracy theorist” to be correct about government spying through TVs and other devices.

Seizing control over vehicles to carry out “undetectable assassinations” of vehicle occupants

In addition to hacking computers and mobile devices, the CIA was also working on ways to remotely control targeted vehicles, turning them into “assassination machines” which could be directed to kill the occupants by driving into obstacles at high speed, for example.

As WikiLeaks explains:

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

Encryption apps rendered obsolete by CIA “zero day” exploits

In what will surely be a shock to nearly everyone, the CIA also developed 24 “weaponized” exploits for Android devices that allow it to completely bypass the encryption of popular apps:

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

In addition, the Vault 7 documents contained over 22,000 routable IP addresses in the United States that were redacted before final release.

These IP addresses are believed to correspond to CIA targets, CIA listening post servers and test systems. This means there’s no question whatsoever that the CIA was deploying this technology inside the United States to spy on Americans.

Listen to my overview analysis of what all this means in my Health Ranger Report podcast or listen below:

By Mike Adams, Natural News

Dear Friends,
HumansAreFree is and will always be free to access and use. If you appreciate my work, please help me continue.

Stay updated via Email Newsletter:

Related

Recent Articles 1560552079821639256

recommended

Sponsors

Donate PayPal

Sponsors

Translate

Sponsor

Recommended

Tag cloud

About me (3) Agenda 2030 (14) Alzheimer's (8) Art. in German (33) Ayahuasca (9) Big Brother (71) Big Pharma (5) Bilderberg (22) Black Knight (2) Brexit (1) Brzezinski (1) Caeli Francisco (24) Cancer (273) Censorship (4) Chemtrails (55) Clinton (36) Cold War 2 (56) Consciousness (13) Conspiracy (1022) Control (787) Cosmos (200) Crisis Actors (7) Crop Circles (9) Crystal Skulls (1) Dejan Davchevski (29) Depopulation (117) Diabetes (5) Documentaries (112) DuPont (2) Ebola (5) Education (70) Empaths (28) ETs UFOs (529) False Flags (99) Fasting (9) FEMA (4) Finance (155) Fluoride (18) Forbidden History (539) Free Energy (52) Free Spirit (8) Freemasonry (8) Fukushima (52) Geoengineering (49) George Soros (18) Global Warming Hoax (34) GMO (53) Guest Writers (5) HAARP (15) Healthcare (1315) Hemp (110) Henry Kissinger (3) Hollow Earth (13) Illuminati (49) Inspiration (683) Inspirational Public Figures (23) JFK (9) Julian Websdale (16) Julie Alexander (12) Khali Carol (7) Lisa Morris (1) Makia Freeman (4) Mandela Effect (3) Mari A. Raphael (2) Mark Nestmann (11) Meditation (20) Michael Martin (6) Microchip Implant (14) Mind Control (109) Monsanto (31) MSM (77) Mysteries (451) News (1106) Nikola Tesla (15) Nuclear Hazard (45) NWO (271) OOPArt (15) Orlando Shooting (6) PhD Anonymous (20) Pienaar Arno (16) Pineal Gland (11) PizzaGate (18) Planet X (4) Pole Shift (8) Police State (53) Preppers (25) Project MKUltra (25) Propaganda (19) Pyramids (73) Q and A (6) Quotes (12) Recent Articles (5500) Reincarnation (49) Religion (2) Rene’ Descartes (10) Rockefeller (20) Rothschild (63) Sacred Geometry (1) Sacred Water (7) Sandy Hook (5) Satanism (52) Satanist Pedophiles (146) Science (186) Secret Societies (27) Spirituality (834) Sponsor Books (3) Strange Murders (3) Sun-gazing (1) Sustainable Housing (6) Symbolism (1) Synchronicity (3) The Anunnaki (103) The Bush Family (2) The Matrix (91) The Vatican (35) Time Travel (10) TROLLS (7) Vaccines (124) Videos (270) Voting is Rigged (23) War (83) War on Cash (6) War on Drugs (13) Wheatgrass (1) Wi-Fi Dangers (9) Wisdom (51) WTC (9/11) (54) Zephyr Prayers (3) Zika Virus (16) Zionism (8) Zodiac (10)

Like & Follow

Sponsors

Pageviews

item