By Lisa Haven   

With the release of “Vault 7,” the largest ever publication of confidential documents on the CIA, by Wikileaks, information is starting to pour in mass droves about the corruption within the CIA. Everything from breaking our Constitutional rights, to having the power to control life have been discovered in the vault.

In the video below I delve through two very disturbing files in Vault 7 that the CIA could use to create a false flag and frame Donald Trump and Patriots as Russian agents…or for that matter… frame them for any crime. All that and more in this breaking report…

According to Wikileaks the CIA has created it’s own global covert hacking system with unchecked powers:

“The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”

Some of the programs within the vault include a program called, “UMBRAGE” that can pin a forensic “fingerprint” on someone’s operating system:

“The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

“This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

“The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects, the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

Even worse! It was also discovered that the CIA looked into capabilities to hijack and take control of your vehicle:

“As of October 2014, the CIA was also looking at infecting the vehicle control systems used in modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Needless to say, the CIA is crossing way too many lines and being given power no one in the government should have. Please spread this far as wide!

For More Information See:


Car Assassinations: