On Tuesday, March 7, 2017, WikiLeaks dumped Part 1 — Year Zero — of Vault 7.
Each part of Vault 7 concerns the CIA.
This is going to be fun.
The WikiLeaks Twitter feed is particularly informative and educational on this topic. My favourite is this one:
Of course, very little of Vault 7 has made Big Media and their smaller acolytes:
Senator Rand Paul (R – Kentucky) thinks that the content will alarm the public:
ZeroHedge has the best summary of Vault 7, Part 1. A summary and excerpts follow. Emphases in the original:
A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”
WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.
Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”
Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
From this introduction it is clear that the average consumer can be monitored easily:
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.
Just as important is the story that ‘Russia’ hacked the DNC and the US election. Could it be that ‘Russia’ is actually the CIA? Given Vault 7’s information, who would find that surprising?
Indeed.
In Europe, the CIA operates out of the US consulate in Frankfurt:
a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
The strangest — and most sinister — CIA technology involves motor vehicles:
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
This might explain the mysterious death of investigative journalist Michael Hastings in 2013. In 2015, WhoWhatWhy published an article positing that Hastings’s car turning into a fireball while he was behind the wheel was an assassination. Many thought such an accusation was the stuff of conspiracy theory, even though experts said it was possible. Emphases mine below:
At the time of Hastings’ death, counterterrorism expert Richard Clarke told The Huffington Post that it was possible that Hastings’ car had been hacked; that the known details of the crash were consistent with a car cyber attack.
“There is reason to believe that intelligence agencies for major powers”—including the United States—know how to remotely seize control of a car, Clarke said.
At the time, however, Clarke’s suggestion received little attention from the mainstream media. In the past two years, the issue of automobile cybersecurity has entered the mainstream arena.
Since 2013, scientists have proven the possibility of hacking a car, and lawmakers are revealing the lack of cybersecurity against these types of threats built into today’s digital cars.
“Your car may have as many as 30 separate electronic control units, some of them built for wireless access. Hackers have shown that they can disconnect brakes, kill acceleration and more—although most hacks currently require direct, wired access to the car’s systems. Even so, a lab technician turned off our test car while we were driving it—from a cell phone,” Chris Meyer, Vice President of Consumer Reports, said in an email to WhoWhatWhy.
This is worth noting:
At the time of his death, Hastings had been working on a story about CIA Director John Brennan. The president of Strategic Forecasting Inc. (“Stratfor”), a CIA contract global intelligence firm, has described Brennan in secret emails as someone on a “witch hunt” of investigative journalists. Brennan, of course, has denied these claims: a CIA spokesperson told reporter Kimberly Dvorak in an email that notwithstanding WikiLeaks, “any suggestion that Director Brennan has ever attempted to infringe on constitutionally-protected press freedoms is offensive and baseless.”
Is it possible that Brennan felt threatened by the content of Hastings’ would-be story? If yes, how would the CIA have responded to such an expose?
Hastings was worried that someone had tampered with his Mercedes. He told his friends and colleagues. Then:
at 4:20am on June 18, on Highland Avenue in Los Angeles, Hastings’ silver Mercedes C250 exploded and hit a palm tree. There were no apparent attempts to brake before the collision.
Expert opinion was split in 2013 and in 2015 as to whether this was intentional or an accident.
No doubt Vault 7, Part 1 — Year Zero — will get people talking once more about Hastings’s horrific death.
Meanwhile, please be sure to read the ZeroHedge article in full. It is horrifying that an intelligence agency would commit all these acts against innocent civilians around the world.
6 comments
March 11, 2017 at 2:06 am
OIKOS™-Redaktion
Reblogged this on Die Erste Eslarner Zeitung – Aus und über Eslarn, sowie die bayerisch-tschechische Region!.
LikeLike
March 12, 2017 at 3:33 pm
churchmouse
Thank you very much for the reblog! I’m glad that you and your readers liked the post.
LikeLiked by 1 person
March 13, 2017 at 7:51 am
thelastfurlong
Interesting post. Scary too. Our reality is SO illusory (right word?) and more so every day – fake? not fake? conspiracy? not conspiracy? – that I have decided, for survival from insanity, one has to believe everything!
LikeLiked by 1 person
March 13, 2017 at 12:29 pm
churchmouse
Thank you very much — greatly appreciated!
Yes, this is a scary situation.
I’d suspected this for a few years, around the time Mark Zuckerberg said he always keeps his webcam covered up when not in use. Honestly, if someone like Alex Jones of Infowars had said that, everyone would have jumped on him as if he were a conspiracy-crazed fool. Interestingly, Alex Jones often says certain things are a conspiracy theory until the proverbial They want you to know about it, at which time they becomes reality.
‘… one has to believe everything!’ Ronald Reagan used to say ‘Trust but verify’, an old Russian saying. I prefer to say ‘accept but verify’, because if I trust something, I won’t verify it. Take it in and file it away for a future occasion. You never know.
Going back further to 1963, this is part of what Harry S Truman had to say about the CIA, an agency he set up in 1947 to provide a president with intelligence information. JFK wanted to dismantle it. Over the past year, I have been reading more on the topic. A case could be made that the CIA were working against JFK (e.g. Bay of Pigs).
One month after JFK was assassinated, Truman wrote this, excerpted below:
‘INDEPENDENCE, MO., Dec. 21 — I think it has become necessary to take another look at the purpose and operations of our Central Intelligence Agency—CIA. At least, I would like to submit here the original reason why I thought it necessary to organize this Agency during my Administration, what I expected it to do and how it was to operate as an arm of the President …
‘I wanted and needed the information in its “natural raw” state and in as comprehensive a volume as it was practical for me to make full use of it. But the most important thing about this move was to guard against the chance of intelligence being used to influence or to lead the President into unwise decisions—and I thought it was necessary that the President do his own thinking and evaluating …
‘I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations. Some of the complications and embarrassment I think we have experienced are in part attributable to the fact that this quiet intelligence arm of the President has been so removed from its intended role that it is being interpreted as a symbol of sinister and mysterious foreign intrigue—and a subject for cold war enemy propaganda …
‘… there are now some searching questions that need to be answered. I, therefore, would like to see the CIA be restored to its original assignment as the intelligence arm of the President, and that whatever else it can properly perform in that special field—and that its operational duties be terminated or properly used elsewhere.
‘We have grown up as a nation, respected for our free institutions and for our ability to maintain a free and open society. There is something about the way the CIA has been functioning that is casting a shadow over our historic position and I feel that we need to correct it.’
Truman must be rolling in his grave.
There is so much more that one could say about the CIA since then, especially with regard to the fake War on Drugs. This article (ignore the sensationalist website layout) — among many others online — explains the CIA’s drug running operations in the 1980s and early 1990s. One of these was into Mena, Arkansas, during the time Bill Clinton was governor. Yes, he no doubt knew about it.
The article has a neat little quote from George H W Bush, former CIA director and president:
‘If the people were to ever find out what we have done, we would be chased down the streets and lynched.’
All being well, we should get more Vault 7 dumps. This one was only 1% of what WikiLeaks has on the CIA. I’ll keep my eyes peeled and report back in a new post.
LikeLiked by 1 person
March 13, 2017 at 7:49 pm
thelastfurlong
Interesting info. Waiting for your next post!
LikeLiked by 1 person
March 14, 2017 at 10:01 pm
The dangers of corn syrup | Churchmouse Campanologist
[…] That is every bit as frightening as the Vault 7 Year Zero CIA document dump by WikiLeaks on March 7. […]
LikeLike