Read the story here. Advertise at Before It's News here.
Profile image
Story Views
Last Hour:
Last 24 Hours:

With All Eyes on the War This Wikileaks Bombshell Is Purposefully Ignored! Major Distraction!!!

% of readers think this story is Fact. Add your two cents.

By Lisa Haven 


Earlier this year on March 7th, 2017, Wikileaks downloaded to its website one of their biggest data dumps on the CIA to date; a dump that they have called Vault 7.

For years alternative media has been making the claim that agencies within the government have been publicly spying on the American people and now their theories have been confirmed, not only by Edward Snowden but also via Wikileaks.

According to Julian Assange: 

“The CIA had created, in effect, its “own NSA”, with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.” 

From Dark Matter, to Marble Framework, to Grasshopper, to Hive, to Weeping Angle, to today’s latest release project Scribbles…The CIA has their hand in everything and they don’t want you talking about it!! In fact, they want you distracted with the War!

All that and more below… 


The system known as “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Some of the programs within the vault include a program called, “UMBRAGE” that can pin a forensic “fingerprint” on someone’s operating system:

“The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

“This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

“The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects, the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

Even worse! It was also discovered that the CIA looked into capabilities to hijack and take control of your vehicle:

“As of October 2014, the CIA was also looking at infecting the vehicle control systems used in modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

On March 23, 2017, Wikileaks dropped information on a system called, “Dark Matter,” a program that proves they are implanting technology in iPhones during their creation. Meaning all the CIA has to do is access the “chip” to hear any and everything you are saying. Contained inside was the following corrupt projects of the CIA, Sonic Screwdriver, Dark Sea Skies, Triton, and Night Skies. 

A few days later, on March 31, 2017, Wikileaks dropped another log on the CIA’s fire called, “Marble Framework,” a 676 source code file that hampers forensic investigators and anti-virus companies from attributing viruses, trojan and hack attacks to the CIA. In other words, no one can attribute a crime to the CIA because this program allows them to “cover their tracks.” 

Then on April 7, 2017, Julian Assange released files on “Grasshopper framework” a platform used to build customized malware payloads for Microsoft Windows operating systems.  Grasshopper allows tools to be installed on computers and prevents “Security” loops from detecting them, Security looks like Kaspersky. Wikileaks states that these are insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft windows computers, providing directions for those seeking to defend their systems identify any existing compromise. 

On April 14th, 2017 Wikileaks published six documents from the CIA”s “Hive” project. Hive is a back-end infrastructure malware with public facing HTTPS interface which is used by CIA implants to transfer exfiltrated information from targeted machines to the CIA and to receive commands from its operators to execute specific tasks on the targets. In other words, the CIA can “Hack” information they need from your computer to theirs, and send certain “tasks” for your computer to carry out.  Additionally, these commands were unable to be traced back to the CIA. 

On April 21st, 2017 “Weeping Angel” was published. This is an implant designed for the Samsung F. Series Smart TV’s that records audio from the built-in microphone and egress or store the data. In other words, your TV’s can and will record what you say and share it with the CIA. 

The latest release was April 28th, 2017, Wikileaks publishes the documentation and source code for project “Scribbles.” A document watermarking pre-processing system that embeds a tracking bug into documents that are likely to be copied by insiders, whistleblowers, journalists or others. 

More Critical Reads You Need to Hear by Lisa Haven! Click Here! 

Subscribe to My Website at www.LisaHaven.News 

Check Me out On Youtube

ALL Documents to the above information are found here:

Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!

Order by Phone at 888-809-8385 or online at

Order by Phone at 888-809-8385 or online at

Get our Free Ebook, "Suppressed Health Secrets"  with  Natural Cures THEY don't want you to know!

Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)
Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen! 
Organic Hemp Extract (CBD) - Full Spectrum high CBD (3300mg) hemp extract eases stiff joints, relieves stress and more!
Nascent Iodine - Promotes detoxification, mental focus and thyroid health.
Smart Meter Cover -  Reduces Smart Meter radiation by 96%!  (See Video)

Immusist Beverage Concentrate - Proprietary blend, formulated to reduce inflammation while hydrating and oxygenating the cells.

Report abuse


    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 6 comments
    • 2QIK4U

      Your over a month late on this one and WIKILEAKS has been controlled by the CIA since they kidnapped Julian Assange last October. That is why trump looks like he’s gone and flip flopped on Assange and saying they want him extradited again. It’s because they’ve had him for over six months now. If you studied the algorithm of Wikileaks you wouldn’t have even bothered writing this. You should be concerned about the infighting still happening within the CIA as they use Wikileaks now for thier agenda. They want you to bite on the tidbits they feed you.

      • 2QIK4U

        Think about it Lisa. There’s nothing in vault 7 that we didn’t already know. The Podesta emails was the death of WIKILEAKS and ASSANGE. That’s also how you see PIZZAGATE IS REAL.

      • VirusGuard

        So who’s the guy seen in the emabassy talking to reporters and why would the CIA use Wilkileaks to shoot themselves in the foot

        ” If you studied the algorithm of Wikileaks”

        What are you takling about, i am good with code so where is this code that i need to know about.

        Alex Jones is CIA, Wikileaks is not so who must you be working for

    • The Ferrett

      Lisa Haven is jewish. Her loyalty is to the Hive . . . always the Hive.

    • rcrcrcrcrcrc

      And just who are you 2QIK4U?
      How do you know these things and why didn’t you reveal them to the public?
      Who is “we” as in “we already knew these things?
      In what detail did we know them?
      Many did not. Could have guessed at something but certainly missed by a mile how detailed, deep and sinister
      it actually goes or went.

      You all fllitter around like bees from a hive, or run around like ants from a hive.
      None of you are hornets or wasps. Just drones, dying drones or about it be.

      All we do know is that we search for the truth because we know we haven’t been told
      the truth and that we have been misled so far from it, that most can no longer discern truth from
      fiction or lies, many no longer want the truth, trust the truth, believe in the truth or live by the truth.

      But if one has a truth they do live by, then all they can do is hold to it no matter what happens to them
      as they go through it.

    • VirusGuard

      “Some of the programs within the vault include a program called, “UMBRAGE” that can pin a forensic “fingerprint” on someone’s operating system:”

      Wndows already does that so the spyware knows who owns what file and each file also has four time stamps

      All the browsers (I SAID ALL) are also working with Google and i just caught Software-Iron bypassing the proxy server to link direct to a web-site and microsoft will oftten bypass DNS servers that can be used to stop the virus calling home by returning a local IP-address.

    Load more ...




    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.