Profile image
By Christopher Watson
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Startling Vault 7 Facts About Your Gadgets Everybody Needs to Know! Wikileaks Blows This Wide Open!

Thursday, March 9, 2017 12:15
% of readers think this story is Fact. Add your two cents.

Headline: Bitcoin & Blockchain Searches Exceed Trump! Blockchain Stocks Are Next!

You gotta share this video with everyone who owns a smart phone or a TV!!

WikiLeaks released what it claims to be the largest ever release of confidential documents on the CIA. This dump comes on the heels of a preview that the Free Thought Project reported on last month, in which WikiLeaks released documents showing the CIA’s role in interfering with French elections. This dump, however, is the apparent motherlode, which the transparency organization allegedly obtained from the CIA’s Center for Cyber Intelligence in Langley. It involves a massive cache of data ranging from the years 2013-2016.

Inside this data, according to WikiLeaks, are the tools the CIA has been using for years to wreak digital havoc on the world. According to the release:

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

WikiLeaks notes that this is only the first part of a series they are calling “Year Zero,” which is comprised of 8,761 documents and files from an isolation high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina.

“Year Zero,” according to WikiLeaks, introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Thanks for taking your time to check out this information. Love to hear what YOU think in the comments section below! If you find that you liked this story, don’t forget to hit the “RECOMMEND CONTRIBUTOR” and “RECOMMEND STORY” button at the top of the page it means a LOT!

If you enjoyed this, consider sharing it with others.

And before ya go…let’s stay connected:

Subscribe to my YouTube channel: Follow me on FaceBook, Twitter and Instagram

Subscribe to my Website:

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Total 1 comment
  • Spikey Norman

    Who gives a crap ?

    If you are the average person with a spouse and 1.35 kids and you are in the kitchen cooking dinner and listening to Jimi Henrdix on your Hi Fi, and some spook is listening in via your “smart” refrigerator.

    Does it really matter what you say about your ass hole boss down at the bus depot ?
    Or the creep across the road that always complains about the grass on your front lawn ?

    Golly, Langley might even be really interested in what you say to your dog.
    If all this really worries you, you might be even more mentally ill than the spooks listening.

Top Stories
Recent Stories
 

Featured

 

Top Global

 

Top Alternative

 

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.