Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The most shocking revelation from the CIA spying scandal
Sovereign Man ^ | 08 March 2017 | Simon Black

Posted on 03/10/2017 10:48:26 AM PST by Lorianne

These files reveal that the CIA can and has hacked devices that were supposedly secure– iPhones, iPads, and Android devices.

The documents further reveal that the CIA is deliberately infecting personal computers with spyware, including Windows, Mac OS/X, Solaris, Linux, and other operating systems.

They’re also hacking WiFi routers to deploy software that monitors Internet activity, and have even figured out how to bypass anti-virus software so that their spyware cannot be detected.

They’ve also managed to make the rest of the world believe that Russian hackers, not the CIA, are behind all this malware and spyware.

It’s like a restatement of that old Mission: Impossible line– “Should any of your IM force be caught or killed… we’ll blame Russia.”

The CIA is pretty shameless about its activities, nicknaming its various hacking programs “Assassin”, “Medusa”, and “Brutal Kangaroo”.

(Excerpt) Read more at sovereignman.com ...


TOPICS: Government
KEYWORDS: freedom; privacy; russianstooges; russiasucks; simonblack; sovereignman; vault7
Next up: Does the CIA work for Russia?
1 posted on 03/10/2017 10:48:26 AM PST by Lorianne
[ Post Reply | Private Reply | View Replies]

To: Lorianne

AS much as I detest the CIA’s spying on Americans, this is the kind of sh*t I expect them to do... but not to US!


2 posted on 03/10/2017 10:50:32 AM PST by bar sin·is·ter
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lorianne

If they are this good, why can’t they protect their own information?


3 posted on 03/10/2017 10:55:04 AM PST by Uncle Sam 911
[ Post Reply | Private Reply | To 1 | View Replies]

To: Uncle Sam 911

> If they are this good, why can’t they protect their own information?

There are always some disgruntled employees and other people who just have a need to brag.


4 posted on 03/10/2017 10:58:22 AM PST by BuffaloJack ("If you're going through Hell, keep going." Winston Churchill)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Lorianne

So, that phone-unlock kerfuffle was all smoke and mirrors?


5 posted on 03/10/2017 10:58:42 AM PST by JimRed ( TERM LIMITS, NOW! Building the Wall! TRUTH is the new HATE SPEECH.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lorianne

Truman created the CIA to “centralize” the many streams of intelligence he was getting from 9 different government agencies.

60 years later, Bush had to create “Homeland Security” to do exactly the same thing from dozens of both intelligence, and law-enforcment agencies.

Unchecked growth is the nature of all bureaucracies


6 posted on 03/10/2017 11:01:33 AM PST by PGR88 (The)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Uncle Sam 911

Judge Napolitano made great comments re this issue on Bret Baier show yesterday.


7 posted on 03/10/2017 11:03:20 AM PST by apocalypto
[ Post Reply | Private Reply | To 3 | View Replies]

To: Lorianne

“These files reveal that the CIA can and has hacked devices that were supposedly secure– iPhones, iPads, and Android devices.”

OMGWTFBBQ some people don’t seem to grasp the concept of context & semantics. A casual conversation about iPhone security is, unless we’re talking national secrets et al, about mundane individual citizens preventing idiots, criminals, and police from snooping & abusing contents. OF COURSE all bets are off when you’re talking a superpower’s unlimited-funding agency that literally has the right to sneak into your house at night and replace your iPhone with a compromised clone, or throw endless funds at finding/abusing extremely obscure flaws - if not just plain tie you up and literally beat the information out of you.

Yes, iOS & Android devices have flaws to varying degrees, and Apple in particular is quite good at either building near-flawless security or fixing flaws when found - though of course not everything is perfect. By “security” we’re usually talking about a device bricking itself when stolen, or otherwise being generally impervious to what 99.999% of criminals will have to breach security. When you’re talking CIA, we’re talking agencies that can, and do, throw millions of dollars at a SINGLE infiltration; groups which have technology to wirelessly observe radio-noise transmissions from the device and deduce likely passcodes from obscurities like watching variations in power consumption.

When Swordmaker comes on FR and declares the iPhone X “secure”, he’s NOT talking about “from the CIA if they’re he11-bent on reading the contents”. I don’t understand how people think a casual 2-paragraph comment in an unofficial social forum is supposed to be of peer-reviewed encyclopedic completeness. OF COURSE general commercial computing/telecom tools aren’t perfectly “secure”.

I have a rule of thumb about planning for home security: If the attackers are several in number, have advanced CQB training, have a near-unlimited arms-and-armor budget, are using night vision, etc - then I concede they’ll win. Likewise, if pretty much everyone I meet is completely unable to access my private data, I’m secure - and if the CIA decides to throw $10M at finding my secrets, they’re welcome to ‘em.


8 posted on 03/10/2017 11:04:13 AM PST by ctdonath2 (Understand the Left: "The issue is never the issue. The issue is always the Revolution.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: JimRed

The FBI can’t use CIA tools or techniques for investigations or they can’t use the evidence at trial. Just because the CIA and NSA have capabilities does not mean the FBI has them as well, or if they did it doesn’t mean they can use them legally.


9 posted on 03/10/2017 11:08:01 AM PST by WarlordBK
[ Post Reply | Private Reply | To 5 | View Replies]

To: JimRed

Oh and I forgot to add, that’s assuming the CIA would tell the FBI their capabilities and let them use them.


10 posted on 03/10/2017 11:09:50 AM PST by WarlordBK
[ Post Reply | Private Reply | To 5 | View Replies]

To: Lorianne

I was a member of an IT support team for a very large High School.. with over 500 computers. We were on a network for a school district which was supported by the State Dept of Education.
I got a call one day from state, telling me that they/we were being infected by a BOT that was migrating across the network very fast.
We shut down our local server/ to await a fix from state.
WE discovered that the BOT was using the combined computing power of the network to do some sort of calculations
I never found out where the BOT came from, I now wonder if it was the CIA


11 posted on 03/10/2017 11:15:17 AM PST by Robe (A nation can survive its fools and even the ambitious. But it cannot survive treason from within.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ctdonath2

I think people are worried aboutv”The Lives of Others” scenario...and frankly I have felt that many in Congress have been scared witless by info on THEM.


12 posted on 03/10/2017 11:15:37 AM PST by goodnesswins (Say hello to President Trump)
[ Post Reply | Private Reply | To 8 | View Replies]

To: bar sin·is·ter

Lets just say when Bush put all the spy agencies under one roof, he let the CIA spy on Americans. I know there are supposed to be rules to stop it. I know its not legal. But the CIA never follows laws. They treat America like any other country they deal with. They are very dangerous to democracy.


13 posted on 03/10/2017 11:22:38 AM PST by poinq
[ Post Reply | Private Reply | To 2 | View Replies]

To: PGR88
Truman created the CIA to “centralize” the many streams of intelligence he was getting from 9 different government agencies.

That and to give out of work Nazi paper clippers a job.

14 posted on 03/10/2017 11:25:15 AM PST by Sirius Lee (In God We Trust, In Trump We Fix America)
[ Post Reply | Private Reply | To 6 | View Replies]

To: JimRed
So, that phone-unlock kerfuffle was all smoke and mirrors?

Yup.

15 posted on 03/10/2017 12:09:25 PM PST by null and void (Drain the swamp! Get rid of the mosque-itoes!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: ctdonath2
I’m secure - and if the CIA decides to throw $10M at finding my secrets, they’re welcome to ‘em.

Not to worry, with $10M they can find anything on your system.

Anything...

16 posted on 03/10/2017 12:13:21 PM PST by null and void (Drain the swamp! Get rid of the mosque-itoes!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Lorianne

FBI Used Best Buy’s Geek Squad To Increase Secret Public Surveillance
http://www.ocweekly.com/news/fbi-used-best-buys-geek-squad-to-increase-secret-public-surveillance-7950030


17 posted on 03/10/2017 2:10:19 PM PST by minnesota_bound
[ Post Reply | Private Reply | To 1 | View Replies]

To: Robe

#11 it was using all the computing power to figure out the pensions for the state workers.... : )


18 posted on 03/10/2017 2:13:43 PM PST by minnesota_bound
[ Post Reply | Private Reply | To 11 | View Replies]

To: WarlordBK

The FBI can’t use CIA tools or techniques for investigations or they can’t use the evidence at trial.
**************
BS They will simply lie and say they got the info from another source or in another way but they will use the illegally obtained intel.


19 posted on 03/10/2017 4:03:50 PM PST by Neidermeyer (Show me a peaceful Muslim and I will show you a heretic to the Koran.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: ctdonath2
and yet the FBI paid how much to break into that calif terrorist phone??? all to keep these programs from being compromised...
20 posted on 03/10/2017 9:55:16 PM PST by Chode (My job is not to represent the world. My job is to represent the United States of America-#45 DJT)
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson