CIA’s Vault 7 Confirms Surveillance State!


Author Bio.

As reported here on The Daily Conspiracy in this author’s article “Con Fusion Center,” the CIA and NSA have been collecting all digital communications – including cell phone conversations, emails, social media site posts – for more than a decade.

Edward Snowden, NSA Whistleblower

Both agencies patently denied accusations that they were engaging in these illegal, mass surveillance activities until Edward Snowden – American hero termed “traitor” by then-President Barrack Obama (D-IL) – felt obliged by his inner moral compass to turn whistle-blower on the NSA, his employer. Snowden’s information confirmed what many analysts suspected all along: the CIA and NSA have targeted each and every one of Us the People as “potential threats to national security.”

You Might Like
Learn more about RevenueStripe...

Julian Assange, WikiLeaks Founder

But now, thanks to Julian Assange (AY-sanj) and WikiLeaks, We the People know, without a shadow of a doubt, that the CIA is spying on every U.S. citizen possible, through phones, computers, and even home appliances.

The CIA’s Vault 7, as it is being called, contains over 8,000 pages of formerly secret documents from deep within that organization. Certainly, this is information the Company (CIA) would never reveal voluntarily. And since THE CIA IS NOT ACCOUNTABLE TO ANY ORDINARY, TAX-PAYING CITIZEN, they would never have to disclose the Truth.

According to the WikiLeaks press release:

“Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.”

If you are not the geeky sort, some further explanation can be helpful right about now.

What is a “zero day” software exploit, and how serious is it?

First, you need to understand a little bit about zero-day vulnerability in software.  A pctools article titled “What is a Zero-Day Vulnerability?” tells us:

“A zero day vulnerability refers to a hole in software that is unknown to the vendor [who wrote the software]. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack…The term ‘zero day’ refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users.”

Put more simply, a zero-day exploit is an advanced form of cyber attack: a person (the hacker) attempts to access someone else’s computer system (the target) without their prior knowledge or consent. Normally, the unauthorized access leads to mischief – or more serious crime, like theft…or spying.

Quoting again from the WikiLeaks press release:

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

As many “conspiracy theorists” suspected, CIA software hackers gained control of just about any type of computer or mobile device (e.g., smart phones, Blackberry, and tablets) and turned these into remote surveillance microphones that listen to everything you say before uploading the audio to the CIA.

Infected devices can report the user’s GPS coordinates (location) and much more.

Once again citing WikiLeaks:

“The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.”

Perhaps even more disturbing is a CIA hack called “Weeping Angel.” This clever little piece of software weaponry can put a target TV in a “Fake Off” mode. Although the TV appears to be off, it is actually turned on and operating the TV as an eavesdropper, recording anything said within range, before – you guessed it -uploading the audio to a secret CIA spy server.

But wait, there’s more: it turns out that CIA software developers created 24 weaponized exploits for Android devices. These computer programs hack into the host smart device and steal both text and voice communications before the device’s software has applied encryption to that data. Device applications with encryption bypassed include WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman.

Just when you thought the situation couldn’t get any worse, Vault 7 also tells us that, since 2014, CIA hackers have been busy working on a software exploit that would hack into and take over your car or truck. This would allow them to murder or kidnap people without incrimination.

If you aren’t quite upset by this point, what’s wrong with you?

Have We the People turned into a nation of mindless, unconcerned wimps who don’t value personal privacy or any other rights and freedoms granted by the U.S. Constitution and Bill of Rights?

The CIA is out of control. Fortunately, we outnumber them. Fortunately, there are Edward Snowdens and Julian Assanages in the world who care more about our collective well-being than a federal salary or life free from federal persecution.

For the love of pete, stop buying Smart appliances. Vote with your wallet, and tell the vendors you choose not to support the CIA’s illegal surveillance state!

Contact your elected representatives and let them know:

The CIA is NOT OK!

  1. Post Author

    The picture is not of Edward Snowden, but I’m sure you’ll tell me why you posted a picture of an actor.

  2. Post Author

    I agree that the CIA’s actions in eavesdropping on US citizens are a huge abuse of power and should be stopped. Snowden may be a hero for disclosing those activities. However, Snowden is not a here for disclosing the CIA code and methods. Now criminals can use these tools to threaten us. He should have disclosed that such methods were available, but not release the code. He will be responsible if any of these tools are used by criminals against US citizens.

  3. Post Author

    If you have done nothing wrong you have nothing to fear. I applaud the CIA and their efforts to keep this country safe.

    • Post Author

      Tony, Tony, Tony. Would you oppose our First Amendment Right to Free Speech because you have nothing to say? NEVER surrender your rights, especially not in the nefarious name of “national security.”

  4. Post Author

    Every day gives us just one more reason not to trust the government. Adding their ability to surveil to the fact that they lie about sums it up. Meanwhile, instead of infrastructure and jobs, more billions get spent on weapons and war….and generally speaking where an entity spends most of its money shows what it values. Obviously, in this case, it’s not the people or peace.

  5. Post Author

    What has this nation of supposedly free people come to. What a disgrace! If this is true, none of us are safe. Where can we possibly go from here? Will we all live in fear for the rest of our lives? Heartbreaking that it has come to this. Shame on the CIA and our government

    • Post Author

      Fear not, Libby. In knowledge there is strength. Do you know who your government representatives are? Might want to have a wee chat with them. Just a suggestion.

  6. Post Author

    You are trying to get people who would probably care about this, but they choose to remain in their mediocre, mundane life than to even think of trying to do something about it!!!!
    Dancing with the Poontangs, and American Idiot, are their passion in life!!!!

  7. Post Author

    Have they hacked my smart washer yet? I bet they want to know if my shorts have skid marks or not. It might correlate to some observation about terrorist hygiene or lack thereof.

Leave a Reply