Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Wikileaks Unveils 'Vault 7': "The Largest Ever Publication Another Snowden Emerges
Zero Hedge ^ | 03/07/17 | Tyler Durden

Posted on 03/07/2017 6:36:56 AM PST by Enlightened1

Key Highlights from the Vault 7 release so far:
 
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
 
Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
 
The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
 
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.
Snowden 2.0?

(Excerpt) Read more at zerohedge.com ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Government; News/Current Events
KEYWORDS: brennancia; cia; ciahacking; ciahackingarsenal; largest; snowden; vault7; wiki; wikileaks
Navigation: use the links below to view more comments.
first 1-2021 next last

1 posted on 03/07/2017 6:36:56 AM PST by Enlightened1
[ Post Reply | Private Reply | View Replies]

To: Enlightened1; All

The link has A LOT of information and the vault has only been open about 40 minutes.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern


2 posted on 03/07/2017 6:37:49 AM PST by Enlightened1
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1

I wonder if there’s any spying-on-Trump in there.


3 posted on 03/07/2017 6:39:10 AM PST by samtheman (ObamaGate = Watergate Squared)
[ Post Reply | Private Reply | To 1 | View Replies]

To: samtheman

I guess we will find out?


4 posted on 03/07/2017 6:40:35 AM PST by Enlightened1
[ Post Reply | Private Reply | To 3 | View Replies]

To: Enlightened1

Its necessary to arrest Brennan, try and convict him in order to identify and remove the Obama commissars and moles that remain in the security agencies and continue to do grave harm to the American people.


5 posted on 03/07/2017 6:40:51 AM PST by allendale
[ Post Reply | Private Reply | To 1 | View Replies]

To: samtheman

https://twitter.com/wikileaks/status/839117384824852480


6 posted on 03/07/2017 6:40:55 AM PST by scooby321 (o even lower)
[ Post Reply | Private Reply | To 3 | View Replies]

To: samtheman

From the Wikileaks article:
“As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (”zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.”


7 posted on 03/07/2017 6:41:09 AM PST by Beach333
[ Post Reply | Private Reply | To 3 | View Replies]

To: samtheman

Jay-sus

No wonder that by 2013 even Maxine Waters knew that obama had compiled a massive data base that knew “everything about everyone”

I just wonder what kind of power use is being racked up by the equipment (former WHY systems now removed) in the basement of that house he rented in Kalorama?


8 posted on 03/07/2017 6:46:00 AM PST by silverleaf (Age takes a toll: Please have exact change)
[ Post Reply | Private Reply | To 3 | View Replies]

To: silverleaf

Jay-sus

No wonder that by 2013 even Maxine Waters knew that obama had compiled a massive data base that knew “everything about everyone”

I just wonder what kind of power use is being racked up by the equipment (former WH systems now removed) in the basement of that house he rented in Kalorama?


9 posted on 03/07/2017 6:46:55 AM PST by silverleaf (Age takes a toll: Please have exact change)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Beach333

Is this part of the uproar over Trump and his phone? Maybe that is the wire tap. A phone hack.


10 posted on 03/07/2017 6:48:25 AM PST by Jimmy The Snake
[ Post Reply | Private Reply | To 7 | View Replies]

To: Jimmy The Snake

Is there a link to this new site?


11 posted on 03/07/2017 6:50:01 AM PST by angcat (THANK YOU LORD FOR PRESIDENT TRUMP!!!!!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Enlightened1

bookmark Vault 7 Wikileaks


12 posted on 03/07/2017 6:51:35 AM PST by ptsal
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1

Sounds like a set up to me.

CIA: Damn shame if someone stole our entire database on Trump.


13 posted on 03/07/2017 6:52:32 AM PST by nhwingut (Trump Pence 16 - Blow Up DC)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jimmy The Snake

The article states that the hacking material has been circulating among the intelligence community in an unauthorized fashion. One of those people gave it to Wikileaks. There may be no telling who actually did the hack. Wikileaks says there were over 5000 users registered to use it.


14 posted on 03/07/2017 7:03:52 AM PST by Beach333
[ Post Reply | Private Reply | To 10 | View Replies]

To: Enlightened1

CIA has hacked into vehicle and medical equipment computer systems, making assasinations easy and untraceable. Michael Hastings for example.


15 posted on 03/07/2017 7:15:51 AM PST by Carthego delenda est
[ Post Reply | Private Reply | To 1 | View Replies]

To: nhwingut
Sounds like a set up to me. CIA: Damn shame if someone stole our entire database on Trump.

First thought that flashed across my mind

16 posted on 03/07/2017 8:12:47 AM PST by maine-iac7 (cHRISTIAN IS AS CHRISTIAN DOES)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Enlightened1

All run from the new NSA facility in Utah.
90% chance Reid and McCain are involved in it.


17 posted on 03/07/2017 8:59:10 AM PST by Zathras
[ Post Reply | Private Reply | To 1 | View Replies]

To: scooby321

thanks for the twitter link


18 posted on 03/07/2017 9:04:32 AM PST by samtheman (ObamaGate = Watergate Squared)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Enlightened1
How nice we finally get to meet ourselves and the monster(s) within!

This will be an interesting reveal (nicely set up by President Trump, btw), with many predictable steps and the same ol' familiar personalities explaining it all away at each and every step.

Otoh, perhaps honesty will be recongnized as the best policy?
Yeah, maybe, but probably not...at least not at first. Lol.
(I probably shouldn't laugh, but it's hard not to.)

Proverbs 6:12

12 A troublemaker and a villain, who goes about with a corrupt mouth,
13 who winks maliciously with his eye, signals with his feet and motions with his fingers,
14 who plots evil with deceit in his heart— he always stirs up conflict.
15 Therefore disaster will overtake him in an instant; he will suddenly be destroyed—without remedy.
Proverbs 6:12-16 New International Version (NIV)

19 posted on 03/07/2017 9:12:40 AM PST by GBA (Here in the marix, merrily, merrily, life is but a dream.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1

I still can’t find one single mention of this on CNN’s site (or on their Twitter). Amazing... especially since this is at least as big as the Snowden breach.


20 posted on 03/07/2017 9:18:25 AM PST by Cementjungle
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson