By Lisa Haven
Earlier this year on March 7th, 2017, Wikileaks downloaded to its website one of their biggest data dumps on the CIA to date; a dump that they have called Vault 7.
For years alternative media has been making the claim that agencies within the government have been publicly spying on the American people and now their theories have been confirmed via, not only Edward Snowden but now via Wikileaks.
According to Julian Assange:
“The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”
From Dark Matter, to Marble Framework, to Grasshopper, to Hive, to Weeping Angle, to today’s latest release project Scribbles…The CIA has their hand in everything and they don’t want you talking about it!! In fact, they want you distracted with the War!
All that and more below…
The system known as “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
Some of the programs within the vault include a program called, “UMBRAGE” that can pin a forensic “fingerprint” on someone’s operating system:
“The CIA’s handcrafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.
“This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
“The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
“With UMBRAGE and related projects, the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”
Even worse! It was also discovered that the CIA looked into capabilities to hijack and take control of your vehicle:
“As of October 2014, the CIA was also looking at infecting the vehicle control systems used in modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”
On March 23, 2017, Wikileaks dropped information on a system called, “Dark Matter,” a program that proves they are implanting technology in iPhones during their creation. Meaning all the CIA has to do is access the “chip” to hear any and everything you are saying. Contained inside was the following corrupt projects of the CIA, Sonic Screwdriver, Dark Sea Skies, Triton, and Night Skies.
A few days later, on March 31, 2017, Wikileaks dropped another log on the CIA’s fire called, “Marble Framework,” a 676 source code file that hampers forensic investigators and anti-virus companies from attributing viruses, trojan and hack attacks to the CIA. In other words, no one can attribute a crime to the CIA because this program allows them to “cover their tracks.”
Then on April 7, 2017, Julian Assange released files on “Grasshopper framework” a platform used to build customized malware payloads for Microsoft Windows operating systems. Grasshopper allows tools to be installed on computers and prevents “Security” loops from detecting them, Security looks like Kaspersky. Wikileaks states that these are insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft windows computers, providing directions for those seeking to defend their systems identify any existing compromise.
On April 14th, 2017 Wikileaks published six documents from the CIA”s “Hive” project. Hive is a back-end infrastructure malware with public facing HTTPS interface which is used by CIA implants to transfer exfiltrated information from targeted machines to the CIA and to receive commands from its operators to execute specific tasks on the targets. In other words, the CIA can “Hack” information they need from your computer to theirs, and send certain “tasks” for your computer to carry out. Additionally, these commands were unable to be traced back to the CIA.
On April 21st, 2017 “Weeping Angel” was published. This is an implant designed for the Samsung F. Series Smart TV’s that records audio from the built-in microphone and egress or store the data. In other words, your TV’s can and will record what you say and share it with the CIA.
The latest release was April 28th, 2017, Wikileaks publishes the documentation and source code for project “Scribbles.” A document watermarking pre-processing system that embeds a tracking bug into documents that are likely to be copied by insiders, whistleblowers, journalists or others.
ALL Documents to the above information are found here: