Conspiracy Theorists Vindicated: CIA Uses “Hacking, Trojans, Viruses, And Weaponized Malware”

by | Mar 8, 2017 | Conspiracy Fact and Theory, Emergency Preparedness, Headline News | 20 comments

Do you LOVE America?

    Share

    watching1

    This article was written by Michael Snyder and originally published at TheMostImportantNews.com.

    Editor’s Comment: Most researchers and “conspiracy theorists” have known for decades; some just know instinctively. This is an information-based society. Like it or not, surveillance is built into that, because the control of information is, well, how control is established. That means recognizance, spying, data collection, infiltration of the local culture, ear to the ground, influence and dirt on useful dupes, lowlifes and mortal adversaries. But that’s all old hat, hard work, hardcore spy teams…

    Today, this is all done digitally, and the dragnet is bigger than ever before. Smart phones, televisions, laptops and other devices are all feeding constant data to eager harvesters, analyzers and trackers. The back doors were built in by design; the tech companies have been working the NSA and CIA since the beginning. This entire new world is based around surveillance, tracking, and anything but the 4th amendment… and this is how they let us know.

    Every ‘Conspiracy Theorist’ In America Has Just Been Vindicated…

    by Michael Snyder

    Yes, the government can use your phone, your computer and even potentially your television to spy on what you are doing inside your own home.  On Tuesday, Wikileaks released thousands of documents that prove what virtually every “conspiracy theorist” in America has been saying for years about government spying.  And I don’t even like to use the term “conspiracy theorist” much, because the truth is that most “conspiracy theorists” are simply citizen journalists that are attempting to expose things that the mainstream media doesn’t want to talk about.  And one of the things that the mainstream media has always been hesitant to address is the unconstitutional surveillance that U.S. intelligence agencies systematically conduct on their own citizens.

    But now the mainstream media is being forced to talk about government surveillance because Wikileaks has just exposed it for all the world to see.  According to Wikileaks, the CIA has been secretly running “its ‘own NSA’ with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified”.  It is known as the Central Intelligence Agency’s Center for Cyber Intelligence, and it has produced “more than a thousand hacking systems, trojans, viruses, and other ‘weaponized’ malware”.  In fact, the computer or phone that you are reading this article on may be infected with one of their programs right now.

    The documents that were released by Wikileaks show that government spooks can remotely take control of Apple iPhones, Google Android phones, Microsoft Windows operating systems and Samsung smart televisions, and once in control of those devices they can use them to spy on their owners.

    The ironic thing is that while Barack Obama and members of Congress have been accusing Russia of conducting cyberattacks, the truth is that U.S. intelligence agencies have been perhaps the biggest offenders of all.

    This is an absolutely massive scandal, and I truly hope that it gets the attention that it deserves in the days ahead.  The following is a portion of the press release that Wikileaks issued on Tuesday

    Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

    “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

    Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

    By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.

    After learning about this, you may never look at your smart TV the same way again.

    In fact, according to the documents that Wikileaks has given us the CIA can even use your smart TV to spy on you when it appears to be turned off

    A program dubbed “Weeping Angel” after an episode of the popular British TV science fiction series “Dr. Who,” can set a Samsung smart TV into a fake “off” mode to fool the consumer into thinking the TV isn’t recording room sounds when it still is. The conversations are then sent out via the user’s server. The program was developed in conjunction with MI5, the British FBI equivalent of a domestic counterintelligence and security agency, according to the WikiLeaks documents.

    And if your phone has been infected by the CIA, they can remotely turn on the camera and microphone whenever they want and use the phone as a GPS locator to track you wherever you go.  The following comes from USA Today

    CIA-created malware can penetrate and then control the operating systems for both Android and iPhone phones, allege the documents. This software would allow the agency to see the user’s location, copy and transmit audio and text from the phone and covertly turn on the phone’s camera and microphone and then send the resulting images or sound files to the agency.

    Just two days ago I wrote a major article warning that the government has the capability to do these sorts of things.

    This stuff is really going on, and it needs to stop now.  I warned about some of this advanced “Big Brother technology” in my apocalyptic novel “The Beginning Of The End“, and many of us have been screaming about what U.S. intelligence agencies have been doing for years and years.  Now that President Trump is extremely upset that the government was spying on him, let us hope that he steps up to the plate and puts an end to this unconstitutional surveillance for good.

    In the documents that Wikileaks has just released there is even discussion about the CIA potentially being able to infect a vehicle control system.  Presumably the goal would be to remotely take control of a vehicle and either spy on the occupants or kill them by driving into an obstacle at very high speed.

    And if you can believe it, the CIA has also been developing ways to make it look like a cyberattack that they conducted actually came from the Russians.  The following comes from an article by Jerome Corsi

    The Wikileaks “Vault 7” drop of CIA cyber-warfare documents contains the startling revelation that the CIA, under a project identified as “Umbrage,” maintained a substantial library of Russian cyber-attack techniques “stolen” from malware produced in other states including the Russian Federation.

    Of course when it comes to violations of privacy, the NSA is even worse than the CIA.

    The NSA systematically collects all forms of digital communication and stores them in a giant data center out in Utah.  So nothing that you do on a digital device is ever truly private.  If you don’t believe the article that I posted the other day, perhaps you will believe a 36 year veteran of the NSA named William Binney

    President Donald Trump is “absolutely right” to claim he was wiretapped and monitored, a former NSA official claimed Monday, adding that the administration risks falling victim to further leaks if it continues to run afoul of the intelligence community.

    “I think the president is absolutely right. His phone calls, everything he did electronically, was being monitored,” Bill Binney, a 36-year veteran of the National Security Agency who resigned in protest from the organization in 2001, told Fox Business on Monday. Everyone’s conversations are being monitored and stored, Binney said.

    Did you catch that last sentence?

    Binney knows very well that all of our conversations are systematically being monitored and stored because he helped build the systems that do it.

    Now that all of this is out in the open, America has two choices.

    We can end this unconstitutional surveillance and go back to being a nation that respects privacy, or we can allow it to continue and keep heading down the road toward becoming a “Big Brother” surveillance society far worse than anything that George Orwell ever warned about.

    This article was written by Michael Snyder and originally published at TheMostImportantNews.com.


    GetPreparedNow-MichaelSnyderBarbaraFixMichael T. Snyder is a graduate of the University of Florida law school and he worked as an attorney in the heart of Washington D.C. for a number of years.

    Today, Michael is best known for his work as the publisher of The Economic Collapse Blog and The American Dream

    If you want to know what is coming and what you can do to prepare, read his latest book [amazon text=Get Prepared Now!: Why A Great Crisis Is Coming & How You Can Survive It&asin=150522599X].

    URGENT ON GOLD… as in URGENT

    It Took 22 Years to Get to This Point

    Gold has been the right asset with which to save your funds in this millennium that began 23 years ago.

    Free Exclusive Report
    The inevitable Breakout – The two w’s

      Related Articles

      Comments

      Join the conversation!

      It’s 100% free and your personal information will never be sold or shared online.

      20 Comments

      1. Snyder AGAIN? Oh well…..back to sleep. ZZZZZZZZZZZZZZZZZ!

        • No surprise to me. You neither. I told this community years ago that the CIA had a copy of EVERYTHING on the NET, and everything on our computers if they decided to target a specific computer. I am watching them as they watch me.

          Yes, of course, its in the archives. 🙂

      2. So Snyder has a new site named The Most Important News? LMAO! GMAFB!

        • Ol’ Zeus here has been warning you all for a long time about cell phone hacks, Car Computer hacks that can take over you vehicle using OnStar and the others that track you via your vehicles onboard computer. All of this confirms what I warned you about. Turn off your cell phone WiFi and GPS. And take your battery out of your phone when going into big cities, they Stingray sucks all the data off your phone. So never put anything on your phone you would never want anybody to see. Ditch the i-Phone as it is very hackable, and you cannot remove the battery. By design. Go get a new burner phone pay cash for the $20 android phone and phone cards to renew the monthly service. That will help some. The burner phones however will not allow you to turn off the GPS as they claim for reverse 911 dial for emergencies for location. So there are tradeoffs but they still don’t know who you are if you pay cash.

          All of this is listed on Wikilinks site and via Vault 7.

          • Zeus, I got a good laugh about Snyder’s new site. I think all the spy agencies should be abolished. All surveillance outlawed. If we get EMP’d, THEIR electronics as well as ours will be fried. WTF will they do then?

      3. Tails (live CD), Tor, (set on no-scripts), encrypted hard drive, or no hard drive at all, lap top, wardriving, using free access points. Never use your home router. Better yet don’t waste money on home internet.

        Know yourself, know your surroundings, know and learn how to effectively use what’s just been mentioned. It’s just like driving. Guess who has the better chance of knowing what a brand new Porsche can really do? The inexperienced driver or the experienced driver?

        When you know yourself and your surroundings, you will also be better able to spot the undercovers or hired hands that attempt to hack you. They’re pretty bad actors by the way.

        Did you hear me Comey? You and your hired out hands are really bad, obvious actors.

      4. LMFAO! NBC Nightly News just said “Hunt is on for source for Wikileaks leaks. And fears are growing that Vladimir Putin may be behind the dangerous sabotaging of Americas spy agency”

        Fuck those asswipes

        • CW, I MIGHT let them look in my ass and see if any Russians are in there, LOL!

      5. I am to the point that, I believe there is very little we can do to defend against the spying except to go completely off grid.
        Nobody else to blame but ourselves as we marched knowingly into this massive electronic surveillance for we had to have our pleasures. Which has turned us into unwitting government drones. What is amazing is we still use the things we complain about openly.

        When they decide to use all this info against us, it will be to late.

        • Anon, if we get EMP’d, their electronics get fried along with ours. Let’s see what they do then. If someone comes after me, it will be the last thing they ever attempt.

      6. Remember the good old days when a trojan was a condom and a virus was something
        you got if you forgot to wear one?

        • That’s a ribbed tickler.

      7. how bout patriot act etc….?

      8. steve quayle found the location its linked on his website.

        Looks pretty snazzy! Our tax dollars were well spent.

      9. The question isn’t that they’re using this technology but rather its who they’re using it on and why.

        Former Rep. Dennis Kucinich (D-Ohio) on Gen. Michael Flynn resigning as President Trump’s National Security Advisor and the divide between the intelligence community and Trump.

        h ttps://www.youtube.com/watch?v=7j_ZfKmcnSk&feature=youtu.be

      10. Remember when Jimmy Hoffa disappeared ??

        I would not be surprised if it turns out that he just turned into a woman and lived on that way.

        Now people that are thought to be dead, could also run a spy system even more secret than the alphabet agencies.

        __

      11. what theory, this has been public knowledge for years…idiot.

      12. The CIA LET Julian Assange post these things, given their penchant for killing leakers ahead of time, but then again after assange went dark in december, there should not have been one person who did not know he was co_opted at his return. So the REAL QUESTION IS, WHY HAS THE CIA NOT TAKEN DOWN WIKILEAKS IF THIS INFORMATION IS SO DAMAGING, WHY NO immediate REACTIVE ATTEMPTS TO KILL THE INFO if it is so damaging to national security or was Russia about to lay out the CIA bag of tricks and they preemptively laid the carpet of blame on Russia yet again by saying it was their malware they just stole it and turned it around…What did Michael Hastings know before his assassination and about to reveal?

        Also there is absolutely NO FOCUS ANYMORE ON President Trumps campaign of pedophile arrests that are on going, the guilty are disappearing UNNAMED AND UNSHAMED!!!
        PIZZAGATE IS OOZING OFF INTO THE CRACKS AND ESCAPING!!! The CIA AND NSA know who all of the pedos are but are now running cover for them. ]The CIA AND NSA know who all of the pedos are but are now running cover for them. Don’t be taken in by these fools.

        Their DELIBERATE “leak” is NOT a leak at all…IT IS A CONFESSION THEY ARE TRYING TO TURN AROUND AND USE TO THEIR ADVANTAGE….But to the smart thinking people, it is big government (police state) ADMITTING they are doing illegal stuff and that is just the way it is and will be.It is a tacit admission if they cannot do the bugging and eavesdropping themselves and legally get away with it, and the fact that the ARE DOPING IT ANYWAYS ON ALL AMERICANS ILLEGALLY THROUGH THE NSA AND CIA) that they have willing INTELLIGENCE partners overseas to provide the same information (conveniently extra constitutional at that) to meet their needs.

        Hello, globalism inter-cooperation by US allied Intelligence communities…How do you think the Globalist DEEP STATE is going to continue to function around President Trumps inconvenient meddling and arresting their conveniently blackmailed pedophile friends? INFOWARS deleted me once before….They really really don’t want my posts up for some reason.

      13. THE MOST LETHAL COVERT CYBER HACK IN THE HISTORY OF THE UNITED STATES REVEALED: All US made passenger aircraft (Boeing 757, 767, 777, etc) include an integrated fly-by-wire system called the Flight Termination System (FTS) developed by System Planning Corporation (SPC). (Boeing now calls this the Flight Interruption System) Ostensibly it’s purpose is to allow the FAA to take control of hijacked aircraft and land them safely where Special Ops can take control of the situation. However FTS has never been used for this purpose. Instead it has been used by covert organizations to conduct false flag ops to whack some target on a particular commercial flight, i.e. ​​MH-3​​70, or “disappear” any given flight in any given manner as dictated by the assigned mission. On 9/11 Mossad operatives hacked into FLT’s 11, 93, 77 and 174 and safely landed them at Westover AFB in Massachusetts, where two Mossad handlers from each flight ​with ground support ​were collected and flown back to Israel, after the passengers and flight crews where dispatched on the sealed aircraft using VX gas canisters. As the aircraft were electronically commandeered and flown to Westover, the two exercise handlers explained the nature of the exercise (less classified termination details) to elicit patriotic buy-in from crews and passengers and asked for volunteers to call family, friends and work centers immediately after landing at Westover (cell phones don’t work above 2000 feet) and read scripted scenarios for “exercise purposes”. Crews and passengers were told they would be flown to their final destinations immediately after the conclusion of the short national security exercise scenario on the ground. During preflight sign-in pilots and co-pilots were given a heads-up they may be directed to participate in a national security aviation exercise. After cell calls were completed and all participants dispatched by a special exercise detail, bodies were then transported to another location for processing in accordance with the exercise objectives, as the MSM dutifully reported with regard to the Pentagon, Shanksville and WTC. This particular operation was a highly classified sub-operation integrated into that day’s plethora of National Defense Exercises. If you fly commercially know that you are flying in a covertly configured drone which can be taken over by covert operatives at any time anywhere in the world to execute a mission to kill a target(s) on board along with passengers and crew or direct the flight to any ground target (e.g. WTC) within the range of the aircraft fuel load. To learn the motivation behind this on-going reality we are all still participating in, search YouTube for “Oded Yinon” videos. Note: As of 2006, all USA manufactured passenger aircraft are now fitted with the FTS as standard equipment, which means there are approximately 10,000 “droned” passenger liners scattered around the world with most home-field in the USA. There are terabytes of open source, FOIA and classified information publicly available to support what is described above.

      14. Utter and complete nonsense Jack.

      Commenting Policy:

      Some comments on this web site are automatically moderated through our Spam protection systems. Please be patient if your comment isn’t immediately available. We’re not trying to censor you, the system just wants to make sure you’re not a robot posting random spam.

      This website thrives because of its community. While we support lively debates and understand that people get excited, frustrated or angry at times, we ask that the conversation remain civil. Racism, to include any religious affiliation, will not be tolerated on this site, including the disparagement of people in the comments section.