As reported here on The Daily Conspiracy in this author’s article “Con Fusion Center,” the CIA and NSA have been collecting all digital communications – including cell phone conversations, emails, social media site posts – for more than a decade.
Both agencies patently denied accusations that they were engaging in these illegal, mass surveillance activities until Edward Snowden – American hero termed “traitor” by then-President Barrack Obama (D-IL) – felt obliged by his inner moral compass to turn whistle-blower on the NSA, his employer. Snowden’s information confirmed what many analysts suspected all along: the CIA and NSA have targeted each and every one of Us the People as “potential threats to national security.”
But now, thanks to Julian Assange (AY-sanj) and WikiLeaks, We the People know, without a shadow of a doubt, that the CIA is spying on every U.S. citizen possible, through phones, computers, and even home appliances.
The CIA’s Vault 7, as it is being called, contains over 8,000 pages of formerly secret documents from deep within that organization. Certainly, this is information the Company (CIA) would never reveal voluntarily. And since THE CIA IS NOT ACCOUNTABLE TO ANY ORDINARY, TAX-PAYING CITIZEN, they would never have to disclose the Truth.
According to the WikiLeaks press release:
“Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.”
If you are not the geeky sort, some further explanation can be helpful right about now.
What is a “zero day” software exploit, and how serious is it?
First, you need to understand a little bit about zero-day vulnerability in software. A pctools article titled “What is a Zero-Day Vulnerability?” tells us:
“A zero day vulnerability refers to a hole in software that is unknown to the vendor [who wrote the software]. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack…The term ‘zero day’ refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users.”
Put more simply, a zero-day exploit is an advanced form of cyber attack: a person (the hacker) attempts to access someone else’s computer system (the target) without their prior knowledge or consent. Normally, the unauthorized access leads to mischief – or more serious crime, like theft…or spying.
Quoting again from the WikiLeaks press release:
“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”
As many “conspiracy theorists” suspected, CIA software hackers gained control of just about any type of computer or mobile device (e.g., smart phones, Blackberry, and tablets) and turned these into remote surveillance microphones that listen to everything you say before uploading the audio to the CIA.
Infected devices can report the user’s GPS coordinates (location) and much more.
Once again citing WikiLeaks:
“The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.”
Perhaps even more disturbing is a CIA hack called “Weeping Angel.” This clever little piece of software weaponry can put a target TV in a “Fake Off” mode. Although the TV appears to be off, it is actually turned on and operating the TV as an eavesdropper, recording anything said within range, before – you guessed it -uploading the audio to a secret CIA spy server.
But wait, there’s more: it turns out that CIA software developers created 24 weaponized exploits for Android devices. These computer programs hack into the host smart device and steal both text and voice communications before the device’s software has applied encryption to that data. Device applications with encryption bypassed include WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman.
Just when you thought the situation couldn’t get any worse, Vault 7 also tells us that, since 2014, CIA hackers have been busy working on a software exploit that would hack into and take over your car or truck. This would allow them to murder or kidnap people without incrimination.
If you aren’t quite upset by this point, what’s wrong with you?
Have We the People turned into a nation of mindless, unconcerned wimps who don’t value personal privacy or any other rights and freedoms granted by the U.S. Constitution and Bill of Rights?
The CIA is out of control. Fortunately, we outnumber them. Fortunately, there are Edward Snowdens and Julian Assanages in the world who care more about our collective well-being than a federal salary or life free from federal persecution.
For the love of pete, stop buying Smart appliances. Vote with your wallet, and tell the vendors you choose not to support the CIA’s illegal surveillance state!
Contact your elected representatives and let them know:
The CIA is NOT OK!