Wikileaks Dump Indicates the US Government Is Spying on Everyone, Paying to Keep Our Stuff Unsafe


President George W Bush visits CIA Headquarters, March 20, 2001.

WikiLeaks has published what they say are the contents of the long-awaited Vault 7. The first batch includes over 8,000 2016 documents said to detail the hacking tools used by the US Central Intelligence Agency (CIA).

Edward Snowden [if you trust him] says the big takeaway is the USG is paying to keep US software unsafe [USG is US Government], adding “the CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words.”

He then asks rhetorically “Why is this dangerous?” and explains “Because until closed, any hacker can use the security hole the CIA left open to break into any iPhone in the world.”

The Assange leakers report that it comes from an “isolated, high-security network situated inside the CIA’s Centre for Cyber Intelligence in Langley, Virginia”. The source of the highly sensitive data remains unknown at the time of writing.

Branded “Year Zero”, the documents contain millions of lines of computer code showing the vast cyber-infiltration powers of the US spies. The cyberweapons included “zero-day” exploits, malware control systems and Trojan viruses.

The leak described the scope of the CIA’s “weaponized exploits” the agency could use to target a slew of products made by US and European tech firms and turn them into covert listening devices.

What we know so far is there is fierce rivalry between the NSA and the CIA and they can spy on anyone, anytime through TVs, emails, Samsung TVs, Microsoft Windows, Apple iPhones and smartphones using Google’s Android operating system.

According to the press release, the CIA can also “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman.”

It makes one wonder about FBI Director Comey’s big show of not being able to crack the code to get into Apple phones.

MI-5 helped the CIA build this cyberwarfare system along with the assistance of contractors.

They can digitally infect cars and blow people up.

Julian Assange says it represents the proliferation of cyberarms because the CIA lost control of it.

If Assange wants credibility, he really needs to hack the Russian intelligence agencies.

Assange was going to give a presser Tuesday but said Wikileaks is under massive attack.

U.S. intelligence said Assange got the leaks from Russian hackers but others say it came from U.S. whistleblowers.

This is only the first of the dumps.

Michael Hayden and James Clapper both said in the past few days there was no U.S. government surveillance of Trump Tower. Are they serious?

Bill Binney was on Happening Now and when asked about Hayden’s comments, he said Hayden should know about the Stellar Wind program which has been going on since 2001.

The program, including its offshoots, collects all transmissions domestically. No surveillance can be done on Americans without a warrant, he said, that should be the rule. That’s not what’s happening, however, “they are collecting data on every U.S. citizen without a warrant.”

Referring to Snowden’s documents, we know that Verizon turned over bulk data without a warrant in 2015. It was illegal. Every U.S. citizen is spied on and there is no oversight via executive order 12333.

It’s done in cooperation with the telecommunication companies and it’s why they were given retroactive immunity in 2008.

All data flowing over fiber optic lines is collected in spy storage facilities and they can access it any time, they can find it with a person’s, any person’s phone, IP address or any identifying signature.

The data is being mined by a good 2,000 to 6,000 people in the various intelligence agencies. Obama’s January executive order expanding the powers of the NSA gives access to many, many more and opens up more possibilities for leaks.

The government doesn’t need excuses or warrants to spy on anyone. The victims don’t have to be criminals or terrorists or even suspected of it.

The culprit is one line in EX 12333 – 2.3C and it could be deleted from the executive order to end the expansive spying.

2.3 reads:

Collection of information. Elements of the Intelligence Community are authorized to collect, retain, or disseminate information concerning United States persons only in accordance with procedures established by the head of the Intelligence Community element concerned or by the head of a department containing such element and approved by the Attorney General, consistent with the authorities provided by Part 1 of this Order, after consultation with the Director. Those procedures shall permit collection, retention, and dissemination of the following types of information:

(c) reads:

Information obtained in the course of a lawful foreign intelligence, counterintelligence, international drug or international terrorism investigation;

The Sentinel has been reporting this since 2001. Click here for an article from 2014 and click here for one from 2014.

0 0 votes
Article Rating
Notify of

Oldest Most Voted
Inline Feedbacks
View all comments
6 years ago

Well, well well, This is quite interesting. If you Google “Vault7” there is NO tab for “News” at the top. I’ve never seen this blanked out before, no matter what the search. Interestingly a tab for “News” DOES show up in Bing.

Terry Schuck CPCU
Terry Schuck CPCU
6 years ago
Reply to  Greg

Good find and glad you shared it. Not being an expert about such stuff I don’t see great significance to it as list of articles does appear. I am not discounting your observation and what you say is true.

One step further, googling “vault 7 year 0” gave me a news ‘tab’, but the list increased in the number of articles or at least in appearance of how they appeared. Again, I fail to see the significance, unless you aware of a nefarious reason why a news ‘tab’ goes missing.

6 years ago

We should recall this goal and purpose originally began under Clinton with the advent of the proposed design of a “clipper-chip”. The Intelligence Community wanted a hardware solution that would give them unfettered access to any new computer that would be sold anywhere. In so doing it would give easy access to any computer or network with only a password that would have been kept by the manufacturer.

Since there was such an uprising over the clear violation of any privacy one would hold and subject a person to be probed for any reason a Government would desire. A person simply cannot be trusting that powers would ONLY use it for benign purposes, or To their benefit.

Since the government was Unable to accomplish this hardware method it was decided to use a system just as effective, that is, on the software end. My suspicions arose when Microsoft “decided” to incorporate their Internet software embedded INTO the operation systems. It is embedded to such a degree that a person simply CANNOT remove it in order to use some other internet software. This began with MS version Windows 95. Recall, at the time, there were reports and investigations whether or not MS was doing this in order to corner the market. One should ask themselves WHY would a software company go to such extents, in development and release, in order to release said software with absolutely no return on investment. At the same time they were developing an Office Suite that DID make money.

It was only after a couple of versions that MS took this “Internet Explorer” and fully and completely embedded it into their operating system. At the time there was significant uproar in doing so, for the simple reason of the security issues. One has to wonder why all the concerns within government subsided so quickly, never to be resurrected again. With this, coupled with MS advent of the Registry system, has caused, or should cause, serious concerns for the computer users. The Registry opens the entire computer to security issues. It makes the difficulty of securing the system a magnitude in difficulty.

There are many facets of computer technology and security that makes a person really wonder what they are thinking. One aspect, is in Web technology. Why, after ALL the previous security concerns, would there be the selection of JavaScript, a highly insecure platform, as the default language for Web development. It opens up Both ends of the communications for malfeasance. (It is why MY browser is configured so as to NOT allow ANY scripts to run). I learned this from experience how dangerous all this is.

Recently MS has decided to put ALL their application on the “Cloud”. In essence Everything done is now internet available. THIS is dangerous to the extreme. As one who has worked in computers for over 40 years and in the utility industry I have seen the dangers we are compounding. More and more in management are relying on contractors simply because no one has computer knowledge or awareness and refuse to listen to those who do. It is why I took an early retirement. They are using “open-source” protocols that are “visible” to the internet with little concern of the ramifications. Given the capabilities we are now learning it is clear that danger is compounding exponentially.

Terry Schuck CPCU
Terry Schuck CPCU
6 years ago
Reply to  Greg