Breaking! WikiLeaks Exposes Massive CIA Hacking Scheme – Leak Worse than Snowden!

On Tuesday morning WikiLeaks released what may be their most explosive secret file, ever.

The information is titled “Vault 7 Part 1 “Year Zero”: Inside the CIA’s global hacking force,” and it contains some very explosive content that paints the United States and the CIA, in particular, in a very bad light. The leaks are said to contain even more damning proof of government malfeasance than the Snowden releases did!

The leak contains more than 8,000 documents, all taken from the CIA, showing that our government has been collecting weapons of cyberwarfare for years. The average American citizen will likely be most interested in the fact that the CIA (and their partners in the UK – MI5) has the ability, if it wanted to use it, to monitor all of us through our home electronic devices (particularly anything running on Windows). Cell phones, computers, TVs, video game consoles, music devices, and even smart cars. Apparently, none are safe from government infestation and takeover. NONE.

From Zerohedge:

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

However, the most troublesome bit of news is that it seems the “CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.” Meaning, much of the worst hacking techniques and tools known to man are now circulating out among the general hacking-savy world population – including people who the United States would consider our “enemies.”

It also means that under the Obama administration, the CIA may have been compromised at the highest levels.

From the NY Post:

A CIA spokesman wouldn’t confirm the authenticity of the documents, but a retired agency operative said their release would be a staggering blow to the spy agency if they are genuine.

“If the documents are apparently CIA, then the CIA’s procedures in conducting cyber espionage and sabotage have been terribly compromised. This essentially gives our enemies a playbook on how we go about our clandestine cyber operations,” the former agent told The Post.

“This will be bad for the agency. They will have to reexamine its procedures for doing this type of work.”

There is another interesting bit of information covered in the exposed data. While the documents do not prove that the CIA has conducted “false flag” attacks using cyberwarfare methods, the agency does have the ability to carry out such attacks while making it look like someone else was the culprit.

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

This is scary stuff, folks. While we want our government to be able to fight off the most serious of attacks, whatever form they take, we must always remain vigilant that the same government we trust with our defense doesn’t turn and use what they’ve learned against us. The Constitution and the Bill of Rights exist for a reason. Our Founders knew that the government was like a raging fire, that if not controlled, would consume everything in its path – even the American people. The government must be held accountable, and we the people must do a better job of demanding transparency and control of what takes place in Washington, D.C.

Tags

Onan Coca

Onan is the Editor-in-Chief at Romulus Marketing. He's also the managing editor at Eaglerising.com, Constitution.com and the managing partner at iPatriot.com. Onan is a graduate of Liberty University (2003) and earned his M.Ed. at Western Governors University in 2012. Onan lives in Atlanta with his wife and their three wonderful children. You can find his writing all over the web.

Please leave your comments below