Please disable your Ad Blocker to better interact with this website.

As they say in the movies “You couldn’t make this stuff up.”

Wikileaks has just released the first batch of “Vault 7” documents, designated “year zero.”  Cool names.

The series is the largest intelligence publication in history: 8,761 files documenting “the entire hacking capacity of the CIA” according to Wikileak’s founder Julian Assange.  The period covered is 2013 – 2016.  (Let’s see now, who was president at that time?)

take our poll - story continues below

How have you been greeting people this holiday season?

  • How have you been greeting people this holiday season?  

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to iPatriot updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

Trending: Al Gore wants More Money

As I go through the Wikileak’s press release I find myself having what is termed in psychology an “inappropriate emotional response.”  I keep laughing.  Some of this stuff is so creative and clever that I cannot help but admire the genius of its creators.

The documents reveal that Apple’s iPhone, Google’s Android and Microsoft’s Windows and Samsung TVs, can be turned into covert microphones.

Smart phones can be instructed to send the CIA the user’s location and audio and text communications.  Phone cameras and microphones can also be remotely activated.

Encryption programs can be circumvented by hacking the phones they run on and collecting audio and message data before encryption is applied.  Dang!  (I’m sorry, but this is great stuff)

Umbrage: n, shadow.  The CIA’s UMBRAGE program allows the agency to hack systems and leave behind false “fingerprints” of who the hacker was.  For example, the agency could hack an American site and leave behind a Russian Federation fingerprint.

As of October 2014 the CIA was working on ways to infect the control systems of cars and trucks. This would potentially give the agency the ability to conduct virtually undetectable assassinations. (e.g. Michael Hastings?)

The CIA can penetrate, infest and control both the Android phone and iPhone software that runs presidential Twitter accounts.  Ditto for U.S. Cabinet members, Congress  and top CEOs.

Who’s in charge here?  How long are we going to put up with this crap?

And much more.  This is only a sampling of the press release.  I have omitted references to the CIA’s EDG, DDI, EDB, MDB, GCHQ, AIB, NDB, CCIE, OSB AND NOC on the grounds that this was TMI.  (I have also skipped Brutal Kangaroo)

It is going to take days and weeks and months for citizen investigators to go through all this material.  Evaluation of the material will undoubtedly be a free-for-all, and hopefully an eye-opener for those who are still asleep.

In the meantime, claims that Donald Trump or the Russians did this or that have zero credibility.  Likewise for the claim that Trump was not bugged.

And happily, the “deep state” is in deep trouble.

I know, you’re thinking that George Orwell did make this stuff up.  Well, it was a good opening line anyway.

Here is the link to the Wikileaks press release:

https://wikileaks.org/ciav7p1/#PRESS

Tags:

The opinions expressed in this commentary are solely those of the author and are not not necessarily either shared or endorsed by iPatriot.com.

Brother Bob

Retired economics professor. Born again Christian. Now an OK country boy.

 

Join the conversation!

We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.

CONTACT US

Need help, have a question, or a comment? Send us an email and we'll get back to you as soon as possible.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account

Send this to a friend