WikiLeaks drops massive trove of docs on alleged CIA spying, sends Twitter into a tizzy

WikiLeaks published what it claimed were CIA spying secrets in a document release that rocked the internet.

The documents, released in a file named Vault 7, contains 8,761 documents and according to WikiLeaks accounts for “the entire hacking capacity of the CIA.”

Perhaps the most alarming part of the document dump thus far is WikiLeaks’ assertion that the CIA had “lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” it wrote in a press release issued by the group.

Assange explained that the fact that the CIA lost control of the materials is the reason WikiLeaks was able to obtain the information.

“The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive,” it said.

Even more frightening, if accurate, the documents show that the CIA is able to hack into smartphones, smart televisions and other items manufactured by companies like Samsung, Apple, Microsoft Windows and Google.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” WikiLeaks wrote.

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS.,” it said and added that the malware attacks the television and “places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

In what could be even more of a frightening revelation,   is what the CIA reportedly looked into doing with computerized vehicles.

“As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations,” WikiLeaks wrote.

WikiLeaks decided not to publish the weapons themselves “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.”

The group said plenty of stories exist in the archive and encouraged reporters to mine the data and publish findings.

Social media responded in a big way with some likening the information to “Big Brother” in George Orwell’s “1984.”

Others found it interesting that the CIA, according to the documents, can attack a target and leave fingerprints behind that make it appear as though another nation did the hacking.

An example might be, according to more than a few folks on Twitter, hacking into the Democrat National Committee computers and making it appear as though Russia did it. And then suggesting collusion between that nation and a political candidate.

This story is still developing.

Wake up right! Receive our free morning news blast HERE

DONATE TO BIZPAC REVIEW

Please help us! If you are fed up with letting radical big tech execs, phony fact-checkers, tyrannical liberals and a lying mainstream media have unprecedented power over your news please consider making a donation to BPR to help us fight them. Now is the time. Truth has never been more critical!

Success! Thank you for donating. Please share BPR content to help combat the lies.
Carmine Sabia

Comment

We have no tolerance for comments containing violence, racism, profanity, vulgarity, doxing, or discourteous behavior. If a comment is spam, instead of replying to it please click the ∨ icon below and to the right of that comment. Thank you for partnering with us to maintain fruitful conversation.

PLEASE JOIN OUR NEW COMMENT SYSTEM! We love hearing from our readers and invite you to join us for feedback and great conversation. If you've commented with us before, we'll need you to re-input your email address for this. The public will not see it and we do not share it.

Latest Articles