Google+ Badge

Wednesday, March 08, 2017

WikiLeaks Blows Lid On Scale Of CIA Hacking Arsenal: CNN Attempts Cover-Up

CIA exposed operating in America - CNN parades mass-murdering CIA scum in attempt to cover-up massive illegal operations in United States  

RT
03/07/2017

The major takeaway from the latest WikiLeaks dump centers around the terrifying, ‘all-seeing-eye’ surveillance project codenamed ‘Weeping Angel.’ 


The CIA appears to have taken espionage to a whole new level if WikiLeaks’ initial analysis is accurate.

According to the preliminary release, the CIA has the capability to hack, record and even control everyday technology used by billions of people around the world.

These include smartphones, tablets, smart TVs and even vehicles with remote control navigation systems.



On these devices themselves, the CIA can allegedly hack into some of the world’s most heavily encrypted social media and communications platforms such as WhatsApp, Weibo, Confide, Signal and Telegram before any encryption can even be applied.

For example, WhatsApp’s end-to-end encryption means that only the direct participants in a conversation can read messages; not even WhatsApp is capable of reading them.

The CIA, however, was able to hack into individual private WhatsApp messages before encryption could even be applied.




“Your messages are secured with a lock, and only the recipient and you have the special key needed to unlock and read your message,” the company writes on their website.

To understand the sheer scale of the leak and of the CIA’s high tech surveillance operations.

According to WikiLeaks, the manufacturing division for the Agency’s hacking tools, or ‘zero days’ as they are dubbed in the leaks, is the EDG (Engineering Development Group), which is under the umbrella of the agency’s CCI (Center for Cyber Intelligence).

Smartphone Devices

The CIA's Mobile Devices Branch (MDB) developed a variety of tools and techniques to remotely hack and control the world’s most popular smartphones and tablets.


CNN panics, scrambles to cover for CIA masters

Once hacked, phones can be used to transmit their “geolocation, audio and text communications” directly to the CIA without the user’s knowledge. In addition, the CIA can remotely activate the phone’s microphone and camera.

Apple Devices

Despite Apple holding a minority share in the global smartphone market in 2016, the CIA’s Mobile Development Branch has a specific division dedicated to the hacking of Apple devices which run the iOS operating system from smartphones and tablets.




WikiLeaks also alleges that the CIA not only developed but collaborated on or purchased a variety of hacking tools or ‘zero days’ from intelligence agencies and contractors around the world such as GCHQ, NSA, FBI or Baitshop.

Samsung

The EDG has produced a ‘zero day’ capable of hacking Samsung smart TVs, switching it into a fake ‘off mode’ where the device appears to remain on standby while actually recording audio and transmitting it to nearby secured CIA servers.

For context, Samsung was the top-selling television brand in the world for the last decade with a global market share of 21 percent as of 2015. 


CNN fake news frauds and CIA hacks scramble to cover-up Obama Trump Tower wiretap scandal

WikiLeaks did not specify in the initial release whether video recordings were also a part of this particular ‘zero day.’

Vehicle Control

As far back as 2014, WikiLeaks alleges that the CIA was exploring the possibility of infecting control systems in modern cars and trucks. 


CNN fake news CIA shill, failed attorney Cuomo would benefit from CIA control of his cars - especially while he is driving SHITFACED

While the exact goal of such control has yet to be established, WikiLeaks suggests that such hacks could be used for almost undetectable assassinations.

Android Devices (Samsung, HTC, Sony)

The majority of the world’s smartphones (approximately 85 percent) run on the Android operating system, with roughly 1.15 billion Android devices sold last year, according to the WikiLeaks statement. Naturally, the CIA devoted an entire subdivision to hacking Android devices, with 24 individual weaponized ‘zero days’ targeting Android devices.

Microsoft

The CIA’s cyber division has developed numerous local and remote ‘zero days’ to hack and control Microsoft Windows users. 


CNN' fake news CIA dupe, failed cartoonist Jake "Turd"
Tapper promotes CIA wiretapping of Americans
These ‘zero days’ include, but are not limited to: air gap jumping viruses such as ‘Hammer Drill’ that are capable of infecting computers or phones that have never been connected to the internet; hacking tools that focus on removable devices such as USB drives; systems for hiding data, be it in covert disk areas or in images; particular ‘zero days’ that are manufactured to self-perpetuate and hide themselves from detection on an ongoing basis.




Before any tech experts gloat, WikiLeaks also alleges that the CIA has developed advanced, multi-platform malware attack and control systems that cover Windows and Mac OS X but also mixed source platforms like Solaris and open source platforms like Linux. Wikileaks names these specific ‘zero days’ as the EDB's ‘HIVE,’ ‘Cutthroat’ and ‘Swindle’ tools.

#Vault7: How the CIA Steals Hacking Fingerprints To Cover Its Tracks

The CIA can hide its own fingerprints from its hacking exploits and attribute blame to others, such as Russia and China, according to WikiLeaks’ Year Zero confidential data release.

Every hacking technique leaves a “fingerprint” which, when collated, can be used to connect different attacks and tie them to the same culprit.


CNN fake news frauds parade CIA murderers in endless procession attempting to cover-up for their spying on Americans, while insanely believing they are somehow beyond public retribution for their crimes and treason

The CIA’s Remote Development Branch (RDB)’s Umbrage sub-group collects an archive of hacking exploits created by other actors, like Russia and other hackers, and leaves this false trace for others to detect.

Umbrage captures and collects keyloggers, passwords, webcam captures, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

This allows the CIA to not only steal other’s hack techniques, but falsely apportion blame to those actors.

Hacking Team

An Umbrage document shows how the agency mined information from a breach of Italian “offensive security”vendor Hacking Team, that boasts governmental and law enforcement clients.




Some 400GB of data including “browser credential stealing” and “six different zero-day exploits” was released in the breach, which Umbrage studied and added to its repository.

DNC Hack

In the case of the Democratic National Committee (DNC) hack, which reports have connected to Russia, the fingerprints used to link blame to Russian hackers may have been manipulated.




While the documents released don’t tie Crowdstrike to the CIA’s Umbrage program, the data demonstrates how easily fingerprints can be manipulated, and how the CIA’s vast collection of existing malware can be employed to disguise its own actions.

85% Of World’s Smart Phones "Weaponised" By CIA

The majority of the world’s smartphones have been “weaponized,” according to WikiLeaks, which revealed in its latest leak that the CIA went to extreme measures to utilize the Android OS for spying.

Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals.


CNN fake news frauds and CIA shills will wind up subpoenaed by Congress, indicted, prosecuted and imprisoned for their role in covering up for hacking of Americans

The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.

Both audio and message data were vulnerable to the exploit through the CIA’s exploitation of gaps in the OS.


Desperate, panicing CNN frauds attempt to divert attention from CIA hacking by yet again hyping DPRK "threat"

WikiLeaks claims the source of their latest release acted to create a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”

The leak revealed details of massive surveillance by the CIA, including ‘Weeping Angel’ – a surveillance technique which infiltrates smart TVs, transforming them into microphones.



This news bureau contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

-------------------------------------------------------------------------------------------------------------------

ANDREW KREIG: EXPERTS REJECT FIRE AS CAUSE FOR 9/11 WTC COLLAPSES

The real truth on 9/11 slowly continues to bleed out

photo
Technical experts are mounting major challenges to official U.S. government accounts of how three World Trade Center skyscrapers collapsed in near-free fall after the 9/11 attacks 15 years ago.

Many researchers are focusing especially on the little-known collapse of World Trade Center (WTC) Building 7, portrayed in this 10:08 minute video.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

The Geopolitics Of The United States, Part 1 : The Inevitable Empire

The Empire and the inevitable fall of the Obama criminal regime

STRATFOR Editor’s Note: This installment on the United States, presented in two parts, is the 16th in a series of STRATFOR monographs on the geopolitics of countries influential in world affairs.

Like nearly all of the peoples of North and South America, most Americans are not originally from the territory that became the United States.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

Geopolitics Of The United States Part 2: American Identity And The Threats of Tomorrow

A look back at 2011 predictions for the future in order to put events of today into perspective

 photo capitalism_zpsah78uy5p.jpg
We have already discussed in the first part of this analysis how the American geography dooms whoever controls the territory to being a global power, but there are a number of other outcomes that shape what that power will be like. The first and most critical is the impact of that geography on the American mindset.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


By Robert S. Finnegan

This e-mail outlines and confirms the acts of espionage against Indonesia and Indonesians by Akiko Makino and the others involved both in Kobe University and in AI Lab at University of Airlangga, Surabaya; Bahasa Indonesia original follows English translation...

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

UPDATED 01/07/2015 : New Analysis Challenges Tamiflu Efficacy; Hong Kong Corona Virus Outbreak

UPDATED 01/07/2015 : FOX NEWS CORPORATE PHARMA SHILL MEGAN KELLY AND FOX NEWS QUACK DOCTOR NOW PUSHING TAMIFLU FOR PREGNANT WOMEN AND CHILDREN;

 photo TAMIFLU_small_zpssojx6okt.jpg
THE 5TH ESTATE UNEQUIVOCALLY WARNS THE PUBLIC NOT TO TAKE OR GIVE THIS PROVEN DANGEROUS, INEFFECTIVE DRUG TO ANYONE

Obama criminals now resulting to biowarfare in quest to destroy Chinese and ASEAN economy; "novel virus substrain" points directly to a Kawaoka / Fouchier / Ernala-Ginting Kobe lab virus weaponized and genetically altered to specifically target and infect the Asian population: Ribavirin...

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


 photo WHO02_zpsplmhtlpr.jpg
The 5th Estate has just purchased a library on H5N1 "Novel" virus pandemics, there are dozens of PDF and Exel documents we feel will assist you in saving lives following intentional releases of the H5N1 and now MERS viruses; we will begin by printing those that appear to be extremely relevant here: H5N1 Kobe-Kawaoka-Ernala series continues soon with more "Smoking Gun" e-mails from Teridah Ernala to The 5th Estate . . .

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


By Robert S. Finnegan

On October 12, 2002 the Indonesian island of Bali experienced a terrorist attack that rocked the world. It was unquestionably well-coordinated and executed, the largest in the country's history.

READ MORE >>