Posted on 03/07/2017 6:12:05 AM PST by Ultra Sonic 007
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's...
(Excerpt) Read more at wikileaks.org ...
Or given away , to cover the tracks of using them illegally...
Think about this:
https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html?_r=1
“The D.N.C. immediately hired CrowdStrike, a cybersecurity firm, to scan its computers, identify the intruders and build a new computer and telephone system from scratch. Within a day, CrowdStrike confirmed that the intrusion had originated in Russia, Mr. Sussmann said.
The work that such companies do is a computer version of old-fashioned crime scene investigation, with fingerprints, bullet casings and DNA swabs replaced by an electronic trail that can be just as incriminating. And just as police detectives learn to identify the telltale methods of a veteran burglar, so CrowdStrike investigators recognized the distinctive handiwork of Cozy Bear and Fancy Bear.
Those are CrowdStrikes nicknames for the two Russian hacking groups that the firm found at work inside the D.N.C. network.”
Now that you know the CIA can use subsets of hacking techniques to effectively frame third parties for attacks; saying that the hacking techniques are like ‘fingerprints’.
http://i.magaimg.net/img/6f7.png
This shows that its very possible that the CIA pretended to be Russia hacking Podesta/DNC/Hillary.
Meant to also add this is why supposedly “17 intelligence agencies” said the DNC hacks were work of the Russians...when it was actually done by the CIA themselves.
Do you want to link that?
Bookmarking
Should have kept my bag phone.
Please let it be true!
I don’t think they would even work with today’s systems.......
The CIA, without a warrant, is bugging your television. When it shows “off” it is listening to your every word. They are in your car control systems. This capability has now been leaked to bad actors and the CIA has totally lost control. This is a national emergency. CIA directors that knew this should be arrested .
It might be his Facebook Account posted on March 5th at 2:09pm. Just scroll down and you will see it.
https://www.facebook.com/Steve-Bannon-364097883961282/?hc_ref=PAGES_TIMELINE&fref=nf
It might be his Facebook Account posted on March 5th at 2:09pm. Just scroll down and you will see it.
https://www.facebook.com/Steve-Bannon-364097883961282/?hc_ref=PAGES_TIMELINE&fref=nf
I know it might be unpopular here, but I wonder how much control Obama or GWB had over these rogues? Are they running these operations independently of the Executive?
Thanks much.
I read over at the Last Refuge that these are not likely Bannon’s tweets. There were a series of 3 and appear to be fake. I can’t find the reference to this at this time....so such much going on and so much to read. I will see if I can find it.
Brennan yes. He is one of the architects of our intended totalitarian enslavement.
Disagree on Snowden and Assange. Without them we would not even know what is happening to us.
The technology envisioned in 1984 was tame compared to what has actually happened. But the warning was dead on.
If the wrong people have their way, the tools we now know exist can and will usher in a dark age of totalitarianism the human race may never escape.
It is hard to see how this can be defeated, but at least we now have a shot. I just hope and pray it is not already too late.
bkmk
Just.... wow.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.