— TrumpTracker (@DaveNYviii) March 7, 2017
WikiLeaks has published what they say are the contents of the long-awaited Vault 7. The first batch includes over 8,000 2016 documents said to detail the hacking tools used by the US Central Intelligence Agency (CIA).
Edward Snowden [if you trust him] says the big takeaway is the USG is paying to keep US software unsafe [USG is US Government], adding “the CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words.”
He then asks rhetorically “Why is this dangerous?” and explains “Because until closed, any hacker can use the security hole the CIA left open to break into any iPhone in the world.”
— Edward Snowden (@Snowden) March 7, 2017
The Assange leakers report that it comes from an “isolated, high-security network situated inside the CIA’s Centre for Cyber Intelligence in Langley, Virginia”. The source of the highly sensitive data remains unknown at the time of writing.
Branded “Year Zero”, the documents contain millions of lines of computer code showing the vast cyber-infiltration powers of the US spies. The cyberweapons included “zero-day” exploits, malware control systems and Trojan viruses.
The leak described the scope of the CIA’s “weaponized exploits” the agency could use to target a slew of products made by US and European tech firms and turn them into covert listening devices.
What we know so far is there is fierce rivalry between the NSA and the CIA and they can spy on anyone, anytime through TVs, emails, Samsung TVs, Microsoft Windows, Apple iPhones and smartphones using Google’s Android operating system.
According to the press release, the CIA can also “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman.”
It makes one wonder about FBI Director Comey’s big show of not being able to crack the code to get into Apple phones.
MI-5 helped the CIA build this cyberwarfare system along with the assistance of contractors.
They can digitally infect cars and blow people up.
Julian Assange says it represents the proliferation of cyberarms because the CIA lost control of it.
If Assange wants credibility, he really needs to hack the Russian intelligence agencies.
Assange was going to give a presser Tuesday but said Wikileaks is under massive attack.
U.S. intelligence said Assange got the leaks from Russian hackers but others say it came from U.S. whistleblowers.
This is only the first of the dumps.
Michael Hayden and James Clapper both said in the past few days there was no U.S. government surveillance of Trump Tower. Are they serious?
Bill Binney was on Happening Now and when asked about Hayden’s comments, he said Hayden should know about the Stellar Wind program which has been going on since 2001.
The program, including its offshoots, collects all transmissions domestically. No surveillance can be done on Americans without a warrant, he said, that should be the rule. That’s not what’s happening, however, “they are collecting data on every U.S. citizen without a warrant.”
Referring to Snowden’s documents, we know that Verizon turned over bulk data without a warrant in 2015. It was illegal. Every U.S. citizen is spied on and there is no oversight via executive order 12333.
It’s done in cooperation with the telecommunication companies and it’s why they were given retroactive immunity in 2008.
All data flowing over fiber optic lines is collected in spy storage facilities and they can access it any time, they can find it with a person’s, any person’s phone, IP address or any identifying signature.
The data is being mined by a good 2,000 to 6,000 people in the various intelligence agencies. Obama’s January executive order expanding the powers of the NSA gives access to many, many more and opens up more possibilities for leaks.
The government doesn’t need excuses or warrants to spy on anyone. The victims don’t have to be criminals or terrorists or even suspected of it.
The culprit is one line in EX 12333 – 2.3C and it could be deleted from the executive order to end the expansive spying.
Collection of information. Elements of the Intelligence Community are authorized to collect, retain, or disseminate information concerning United States persons only in accordance with procedures established by the head of the Intelligence Community element concerned or by the head of a department containing such element and approved by the Attorney General, consistent with the authorities provided by Part 1 of this Order, after consultation with the Director. Those procedures shall permit collection, retention, and dissemination of the following types of information:
Information obtained in the course of a lawful foreign intelligence, counterintelligence, international drug or international terrorism investigation;
— WikiLeaks (@wikileaks) March 7, 2017