I remember when Amazon announced their new product called the Echo. It is a cute little device that connects to your home Wi-Fi and provides radically convenient solutions to everyday problems. It can respond to your questions and request, because its microphone is always listening.
Although that seems great, I always knew I’d never buy one. Why would I spend a hundred+ dollars just so Jeff Bezos can spy on me? This is true of other products like Microsoft’s Xbox One, Google’s Home, and many smart TV’s. These companies don’t tell you that they are monitoring your conversations, so they can better control your spending habits and decisions.
What’s worse? Turns out Jeff Bezos has a $600 million contract with the CIA. Wonder what that’s for?
Well, if you’ve been paying attention to this week’s news, you won’t have to guess.
Wikileaks has released a tidal wave of revelations, showing that the CIA has built a 5000-man army of hackers, who have created sophisticated digital weapons used to infiltrate every conceivable device, for the purposes of spying and stealing information.
More and more news is dropping from this massive leak, but a few interesting tidbits have come to light already, much of which has cast recent controversies in a very new light.
From Allen B. West:
You know those annoying viruses and malware attacks your antivirus software occasionally warns you about? There’s a good chance they’re from your government!…
There’s more. All those Democrat accusations of Russians ‘hacking our election’? Guess what:
“Among the key topical revelations is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction,….”
In other words they can do it but leave behind footprints that lead to Russia and not to the (Obama) CIA.
One of the most shocking revelations to come out in the Wikileaks release has been the discovery that the CIA can hack computers and make it look like Russia.
Hmm, has there been recent hacks that have seemed to be perpetrated by Russia? Oh right.
When John Podesta’s emails were released, bringing damaging information to the Clinton campaign, they were quick to blame Russia (citing remarks from intelligence agents in the… CIA). It was clearly a rouse to distract from the content of the emails, but there still seems to be a little bit of evidence making it seem credible.
They claimed President Trump was in on it, despite the lack of evidence. It seems even Obama wiretapped Trump’s phone calls, but even then no evidence came to light.
But now we know the CIA can hack computers while disguising themselves as Russians, by using tactics that mirror Russian intelligence gathering techniques.
So either the CIA was responsible for the hacks on the DNC and Podesta emails, or any number of rogue contractors could have stolen their tools and done it. Or any number of criminals, rival states, or hackers could have done it, since Wikileaks has proven the CIA’s tools were lost to the world.
Be sure that even more shocking revelations will come to light, as tech experts comb through the 8,000+ leaked documents.
Source: Allen B. West