In 2013, Edward Snowden released classified documents that uncovered the illegal operations of the NSA. We discovered that this government agency was monitoring the conversations of every U.S. citizen, a direct violation of our Fourth Amendment rights.
This act of whistle blowing left a permanent scar on the Obama administration, which claimed to be the most transparent administration in U.S. history. Obama himself should have been impeached for this violation, but the corrupt media and complicit federal government let it slide.
Since then you can believe things have gotten worse. Intelligence agencies are working overtime to secure their control over the information that is transmitted digitally. Their agenda isn’t about protecting American interests, but acquiring details about you, in order for them to control or prosecute you, should the need arise.
It is modern day Orwellianism. It is the deep state acting as Big Brother to control and manipulate the entire globe through information.
How do we know all this? Because just this week, Wikileaks blew the lid off the entire operations.
WikiLeaks has published a huge trove of what appear to be CIA spying secrets.
The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for “the entire hacking capacity of the CIA”, Mr Assange claimed in a release, and the trove is just the first of a series of “Vault 7” leaks.
Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.
In publishing the documents, WikiLeaks had ensured that the CIA had “lost control of its arsenal”, he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.
It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.
Wikileaks has discovered that the CIA created a digital monitoring system to rival the NSA–the agency responsible for such tasks. Their team of over 5,000 operatives have developed sophisticated malware, viruses, and software that can extract information from computer networks, take control of cameras and microphones in everyday devices, even take over smart cars.
Evidence suggests that the CIA is using this across Europe, even to spy on U.S. allies. They are also withholding knowledge of existing gaps in security for such devices as iPhones, Android phones, and Windows PC, so that they can use them to monitor U.S. officials and politicians.
“Zero day” is the code work for massive security flaws in existing devices that they refuse to reveal to Apple, Google, Microsoft, and other companies for them to fix–even though they are required to by law.
What’s worse? These cyber weapons have been compromised, meaning other entities other than the CIA now has control of them. Rival countries, spies, companies, even terrorists can now use these weapons to infiltrate anyone.
The news is still breaking and it remains to be seen just what will come of this revelation. Be sure to keep your eyes on our site for all the latest.
Source: The Independent