NOTE:  This information is important for all who use computers and do not want them to become weapons against us. What you read here tells that they have the ability to listen to us through almost everything we have connected to the Internet, which is seen by the Covert Intel groups as “public information” and they feel entitled to use it for any purpose they see fit. 
I suggest disconnecting your Internet when not in use.  Just unplug the feed into the router…

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart above, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the key topical revelations is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

Okay, then! Now we know… almost every connected device can be used to bug you…

Tyler Durden's picture

Your Tax Free Donations Are Appreciated and Help Fund our Volunteer Website

Disclaimer: We at Prepare for Change (PFC) bring you information that is not offered by the mainstream news, and therefore may seem controversial. The opinions, views, statements, and/or information we present are not necessarily promoted, endorsed, espoused, or agreed to by Prepare for Change, its leadership Council, members, those who work with PFC, or those who read its content. However, they are hopefully provocative. Please use discernment! Use logical thinking, your own intuition and your own connection with Source, Spirit and Natural Laws to help you determine what is true and what is not. By sharing information and seeding dialogue, it is our goal to raise consciousness and awareness of higher truths to free us from enslavement of the matrix in this material realm.

2 COMMENTS

  1. We have nothing … for them to ‘spy’ on us .. nothing important except that we are all spiritual beings journeying a 3rd dimensional matrix oppressed system.

    They use AI (artificial intelligence) to gather information, we use the divine cosmic energy to gather information, learn how to be beautiful beings of light and love again .. they cannot ‘gather’ these kind of divine energy through AI.

    They use the system/method of matrix controlled energy of ‘labels’, ‘names’, personal data like birth dates etc. We are here to experience this 3rd matrix but we are not of this world.

    The sooner we realize and understand the simple concept of ‘One’ without the ‘I versus them’ (duality) the easier it will be for us to not ‘fear’ these 3rd matrix energy.

    When we mentally (and also connected within our sacred heart space/our Universe within) focus on this One aspect of our Soul journey, we will naturally vibrate out of the 3rd matrix system/method of ‘harvesting’ and ‘fear’.

    Clear and simple!!

    The only way to protect ourselves is to not use anything that’s too close to our head/brain section. If you’re using a desk computer/laptop – you can place house plants, crystals/semi precious stones and/or chunks of Himalayan rocks around you.

    It will offset the ‘dirty energy’

    Data is just data – it is of the 3rd matrix AI system. That is all .. there’s nothing that anyone can take away from you when you are in the energy of divine love, compassion, forgiveness and balance.

    Namaste

LEAVE A REPLY

Please enter your comment!
Please enter your name here