VIDEO: iPhones Are iSpies – Wikileaks “Vault 7” Revelations Continue To Terrify

Most of us carry smartphones and watch web-enabled TVs without much thought. But the revelations found in Wikileaks’ “Vault 7” release warn that we should consider the sinister capabilities that such devices could lend to those who might abuse them.
By |
Be Sociable, Share!
    • Google+

    MINNEAPOLIS– Since launching in 2006, Wikileaks has reportedly released over 10 million documents, including controversial disclosures that have helped unravel war crimes, uncover corporate secrets and even brought to light explosive revelations stemming from Hillary Clinton’s most recent presidential run.

    Despite facing widespread international denunciation, Wikileaks has remained faithful in blowing the whistle on information that would have remained hidden from the public. These secrets have helped to expose many layers of the global state security apparatus and aided in shaping the discourse surrounding government and corporate transparency.



    On April 7, Wikileaks released 27 documents from the CIA’s Grasshopper framework, a platform used by the agency to infect electronic devices such as phones, computers, and televisions for surveillance purposes. This information dump was part of a series known as “Vault 7,” which targets the agency’s covert hacking program. “This extraordinary collection,” Wikileaks writes, “which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.”

    According to the documents provided by Wikileaks, knowledge of the CIA’s invasive surveillance tools wasn’t confined to the agency, or even the National Security Agency. In fact, the details of these exploits were bought and shared by Britain’s Government Communications Headquarters, as well as other intelligence agencies.

    So what tools does the CIA have in its surveillance arsenal? Over 8,000 documents found in the “Vault 7” series reveal weaponized malware, trojans and viruses that could be used to spy on both domestic and foreign entities, impacting a variety of seemingly harmless household devices. Apple iPhones, Windows PCs and even Samsung TV sets can be used to conduct surveillance on anyone the CIA chooses to spy on. For example, one program named “Weeping Angel” details methods that can be used to hijack a Samsung F8000 TV in order to make it appear to be off when it is actually powered on.

    The claim that your TV could be used to spy on you is no longer one of conspiracy. It is now our reality. “By hiding these security flaws from manufacturers like Apple and Google, the CIA ensures that it can hack everyone, at the expense of leaving everyone hackable,” WikiLeaks says. And these, by all accounts, are just the tip of the iceberg.

    The “Vault 7” series, which has been described as being the largest leak of its kind targeting the CIA, originated from an “isolated, high-security network” within the CIA’s Center for Cyber Intelligence. The documents it contains were revealed to Wikileaks by way of an undisclosed source, though they’ve noted that their source could be a former U.S. government hacker or CIA contractor.

    After the “Vault 7” series was first published, Trump administration spokesman Sean Spicer revealed the White House was concerned, and that “[a]nybody who leaks classified information will be held to the highest degree of law.” Despite these threats, WikiLeaks continues to release classified documents, showing us at least some of the secrets behind the CIA’s curtain.

    Be Sociable, Share!

     

    Print This Story Print This Story
    You Might Also Like  
    ___________________________________________
    This entry was posted in Front Page: National, Inside Stories, National, Top Stories and tagged , , , , , , , , . Bookmark the permalink.
    • Pingback: Wikileaks Releases #PodestaEmails 1-36 + more – All About Being Human (award-free zone)()

    • Alleged Comment

      How do you thing Bull Gates got rich? Mark *uckerberg, Google, Amazon??

      Win 10 is being FORCED on you by being FREE. Many software programs are by subscription. Meaning you have no control over them anymore. It’s not yours.

      Your life is not yours, your things are not yours. No, it belongs to the almighty government. They are your religion now.

      And you’ll have it no other way. The mark of your beast is coming…..

    • Pingback: Links 211 | Cindy's Zone 2()

    • Keith R. Starkey

      And you know what is going to happen in view of all the Wikileak documents that have been brought forth? Do you know what’s going to be done about it?
      Answer: Nothing.

      Do you know what changes will be made to protect the American people and people of other countries from the spying agenda set forth in the Wikileak documents?
      Answer: None. None whatsoever.

      The problem isn’t in what Wikileaks reveals; the problem is in the apathy and sedation of a people who are too occupied with life to care about how fast it can change, or even end.

    • Pingback: IDEO: iPhones Are iSpies – Wikileaks “Vault 7” Revelations Continue… | Dr. Roy Schestowitz (罗伊)()

    • Pingback: VIDEO: iPhones Are iSpies – Wikileaks “Vault 7” Revelations Continue To Terrify FREE DOWNLOAD | ♥♥69Download♥♥ Android app/apk free download and HD movies()

    • tapatio

      The Fourth Amendment of the Constitution of the United States of America has, since 1981, been rendered completely void by the outlaw fascist regime in Washington.

      The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

      http://constitution.findlaw.com/amendment4.html#sthash.7uYkhpTD.dpuf

      • Carolestollings

        Managing director of Google!, is explaining to users to start off “Work at home” method, that People have been doing for about one year now. These days alone, I generated close to $36,000 until now with no more than my home computer as well as some spare time, despite that i have a fulltime 9 to 5 job. Even everyone not used to this, can make $89/per h easily and the earnings can go even higher over time… This is how i started
        !wr381c:
        ➽➽
        ➽➽➽➽ http://GoogleFinancialCashJobs381BuzzLine/GetPaid$97/Hour ★✫★★✫★✫★★✫★✫★★✫★✫★★✫★✫★★✫★✫★★✫★✫★★✫★✫★★✫★✫★★✫★✫★★✫★✫★★✫:::!wr381u:………