What is Vault 7 – Inside CIA’s Hacking Tools

0
226
What is Vault 7 - Inside CIA's Hacking Tools

On February 4th the “Vault 7” mystery began on the Twitter account of WikiLeaks with a series of hints, What’s Vault 7. Each day a new tweet with questions such as “Where, When, Who and Why”.

In the next few minutes, you will be explained what Vault 7 exactly is, what has been leaked and what it is about. After watching this video you are enlightened and understand exactly the double the message behind the mysterious tweets of WikiLeaks from 4 February to 9 February.

Let me immediately answer the question, “What is Vault 7”, Vault 7 is a name given by Wikileaks. This is about the most scandalous largest collection leak on the CIA, I quote: “it is the largest ever publication of confidential documents on the agency,” says WikiLeaks.

Year Zero

Wikileaks has in the first part of the series, called “Year Zero”, made 8,761 documents and files public originating from an isolated high-security network somewhere in the Center for Cyber Intelligence in Langley, Virginia, this states Wikileaks on the website.

Thanks to the CIA whistleblower Edward Snowden the world knows that the CIA is spying the world. But this goes a step further. The leaked documents and files explain that the CIA deliberately infected the Internet with an arsenal of malware, viruses, trojans, weaponized “zero-day” exploits to spy who they want to spy on all the equipment that makes use of external connections such as the Internet.

“Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones”

The CIA has under the radar a complete hacker army of 5,000 registered members and coded thousands of hacking systems, trojans, viruses, and other “weaponized” malware. The code is much larger and far more complex than the script the social giant Facebook is using. The hacked data has to be sent back, this can not be received on the regular servers of the CIA. The agency uses underground Servers. The reason that the CIA is doing this all under the radar “is to avoid” lawsuits and prison time.

Malware

The CIA developed Assassin and Medusa, both are malware. A malware is a software that infects your computer, this happens while surfing the Internet and you will NOT notice a thing about it. A malware penetrates into your computer and can sabotage your computer to spy, to make online transactions, collect passwords, conversations, and your Internet behavior. For years it is claimed, if you are using Linux you’ll be safe, this is not true. Based on to the leaked documents, the CIA focuses on Linux, Windows, OSX and routers.

Androids and iPhones are also clearly targeted. The CIA has for instance been able to spy on the Obama administration to penetrate into the social networks of the former president, such as his Twitter account, through the phones. It is very likely that Donald Trump is currently watched by the CIA.

The documents also highlight how they can bypass fingerprints. A fingerprint, says like it is, you always leave information behind when you hack. As an example, a thief who breaks into a home leaves fingerprints, footprints or DNA behind. The CIA even manages to change the fingerprint, allowing them to digitally create a scapegoat. America can create tension between the two countries and place a false misleading fingerprint suggesting Russian hackers were responsible. To give you an example.

Windows, Apple, Linux, Androids, antivirus software developers, Social network icons, and even the new Samsung flat screens are tools the CIA can use to invade your life without you noticing. Even modern cars with vehicle control systems are not safe for the CIA. The last one is unknown what the CIA want to achieve with that, but anything is possible.

Germany

In a publication of 2015, Lions Ground wrote a story about the German politician Angela Merkel, that she did not appreciate that the CIA was spying on her. She said: “Friends do not spy on each other”. That moment we got the suspicion that the CIA and Germany cooperates. The Wikileaks Vault 7 confirmed our intuition. The US Consulate in Frankfurt is a secret CIA base for hackers as showed in the leaked Wikileaks documents. Once the CIA hackers are in Germany, they use black diplomatic passports to travel around Europe without being stopped for passport check. The CIA spies on European political leaders.

MUST READ
Head Bin Laden team at CIA: "Al Qaeda never existed"

The dangers of the activities the CIA currently carrying out today is endless. What can be donewith information? EVERYTHING! Knowledge is power, the saying goes. Besides spying, they can exert political pressure while America acts hypocritical, with a thick neck, innocent and can create hugely dangerous situations out of nothing.

The CIA is an illegal intangible living system in favor of the elite. The CIA is Big Brother, and it’s watching the entire world. The CIA certainly will not instruct its staff to stop this.

The CIA has under the radar a complete hacker army of 5,000 registered members and coded thousands of hacking systems, trojans, viruses, and other “weaponized” malware. The code is much larger and far more complex than the script the social giant Facebook is using. The hacked data has to be sent back, this can not be received on the regular servers of the CIA. The agency uses underground Servers. The reason that the CIA is doing this all under the radar “is to avoid” lawsuits and prison time.

Malware

The CIA developed Assassin and Medusa, both are malware. A malware is a software that infects your computer, this happens while surfing the Internet and you will NOT notice a thing about it. A malware penetrates into your computer and can sabotage your computer to spy, to make online transactions, collect passwords, conversations, and your Internet behavior. For years it is claimed, if you are using Linux you’ll be safe, this is not true. Based on to the leaked documents, the CIA focuses on Linux, Windows, OSX and routers.

Androids and iPhones are also clearly targeted. The CIA has for instance been able to spy on the Obama administration to penetrate into the social networks of the former president, such as his Twitter account, through the phones. It is very likely that Donald Trump is currently watched by the CIA.

The documents also highlight how they can bypass fingerprints. A fingerprint, says like it is, you always leave information behind when you hack. As an example, a thief who breaks into a home leaves fingerprints, footprints or DNA behind. The CIA even manages to change the fingerprint, allowing them to digitally create a scapegoat. America can create tension between the two countries and place a false misleading fingerprint suggesting Russian hackers were responsible. To give you an example.

Windows, Apple, Linux, Androids, antivirus software developers, Social network icons, and even the new Samsung flat screens are tools the CIA can use to invade your life without you noticing. Even modern cars with vehicle control systems are not safe for the CIA. The last one is unknown what the CIA want to achieve with that, but anything is possible.

Germany

In a publication of 2015, Lions Ground wrote a story about the German politician Angela Merkel, that she did not appreciate that the CIA was spying on her. She said: “Friends do not spy on each other”. That moment we got the suspicion that the CIA and Germany cooperates. The Wikileaks Vault 7 confirmed our intuition. The US Consulate in Frankfurt is a secret CIA base for hackers as showed in the leaked Wikileaks documents. Once the CIA hackers are in Germany, they use black diplomatic passports to travel around Europe without being stopped for passport check. The CIA spies on European political leaders.

The dangers of the activities the CIA currently carrying out today is endless. What can be donewith information? EVERYTHING! Knowledge is power, the saying goes. Besides spying, they can exert political pressure while America acts hypocritical, with a thick neck, innocent and can create hugely dangerous situations out of nothing.

The CIA is an illegal intangible living system in favor of the elite. The CIA is Big Brother, and it’s watching the entire world. The CIA certainly will not instruct its staff to stop this.

“No. That would be certainly counter-productive”

We can expect thousands of documents in the future, it has yet to be reviewed by Wikileaks before it is going to be brought out.

Liked it? Take a second to support Lions Ground on Patreon!
SOURCEWikiLeaks
SHARE