Living In The CIA Deep State – No Privacy – No Truth – Luciferian Control – Do I Hear Crying? – TOP 15 IMPLICATIONS OF VAULT 7.
by Pamela Williams
I will try to not go too far on this journey into the true implications of WikiLeaks Vault 7. There are 15 especially standout implications thus far. That is not to mention those within my title…very sad here. But I imagine for tech freaks and hackers it is all very exciting, but for me someone, who cherishes respect and freedom, I am really saddened to know things have developed to this point. Under Obama the CIA reaped big money and freedom, because Obama hated us anyway. All I can see in my mind right now is Lucifer sitting on his throne most likely in Frankfort, Germany as that is the location of the biggest CIA office in the world. It is easy not to think of the future when you are having the time of your life in the present. Lucifer is riding high now, along with the CIA, but the day is coming soon when they will be lying flat on their faces. BELOW ARE VERY IMPORTANT IMPLICATIONS FROM VAULT 7:
Wikileaks reveals that the CIA has its own “hacking division” that is run by its CCI (Center for Cyber Intelligence) which by the end of 2016:
“… had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
Vault 7 Discovery/Implication #2: Bypassing Encryption
You know how all these companies promise encryption and some even charge more for the service? Guess what? It doesn’t matter! Vault 7 leaked docs shows that the CIA is getting audio files before they get encrypted. The CIA can hack into your phone, compromise your operating system and suck up your messages before they’re encrypted and sent. It doesn’t matter what precautions you’ve taken. Encrypted messaging apps like WhatsApp, Signal, Telegram and many more are vulnerable.
Vault 7 Discovery/Implication #3: Bypassing Computer Operating System
The CIA can hack your computer. In fact, every part of your computer can be bypassed, including your operation system. Per Wikileaks:
“The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools.”
Vault 7 Discovery/Implication #4: Smart TVs become Spy TVs
It was obvious to anyone with half a functioning brain cell that smart TVs were basically spy TVs (see The SMART Deception), but now we have the proof. In the Vault 7 docs, the CIA has a program called Weeping Angel (read ’em and weep) that it developed with the MI5/BTSS (British Security Service). It details how the CIA can hack Samsung smart TVs and then place them in fake-off mode so that an unsuspecting owner falsely believes their TV is off – when really it is on, recording all sounds in the room and transmitting them via the net to a covert CIA server.
Vault 7 Discovery/Implication #5:
Bill Gates is the agenda-man for the New World Order. Clearly he sold out a long, long time ago. Kim Dotcom has been particularly vocal, calling for Gates to come clean (ain’t gonna happen) and admit how much he helped the CIA (and the MIC in general) by helping them build backdoors in the software. The CIA turned Microsoft software into spyware, using exploits that were built into the system:
“The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.
Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.”
Vault 7 Discovery/Implication #6: Skype is Vulnerable
Vault 7 reveals that conversations on Skype are converted to text then uploaded to a CIA cloud for data assortment and analysis.
Vault 7 Discovery/Implication #7: iPhones and Androids are Vulnerable
Both Apple iOS and Android systems are vulnerable. Snowden already told us this, but Vault 7 re-confirms that iPhones and Android are easily hackable. The CIA has been creating all kinds of malware to spy on practically every piece of electronic equipment you own.
Vault 7 Discovery/Implication #8: Breaking “Zero Day” Commitment by Hoarding Vulnerabilities
Wikileaks notes that Obama had promised the technology industry (after much lobbying) that the US Government would disclose any vulnerabilities as soon as it had discovered them (thus the term “zero day”). Yet the CIA stockpiled these vulnerabilities because it wanted to retain the advantage of knowing how to hack into systems and devices, which endangers everyone else who uses them:
Vault 7 Discovery/Implication #9: Hijacking All Sorts of Vehicles – for Assassination
Of all the discoveries, this one is explosive – literally. Vault 7 exposes that the CIA has the ability to remotely hijack all kinds of vehicles (including cars and planes), which means it can carry out undetectable assassinations. This casts a new light on the suspicious death of Michael Hastings, whose car burst into flames and ran into a tree at high speed. It also makes one wonder about the deaths of JFK Jr. (son of John F. Kennedy) and former US senator Paul Wellstone, both of whom died in suspicious plane accidents.
Vault 7 Discovery/Implication #10: Using US Consulate in Germany as a Spy and Hacking Base
You can imagine how impressed the Germans are with the US now. Remember when it was revealed that Obama was hacking the cell phone of German Chancellor Angela Merkel? Now we learn that the CIA, in flagrant violation of international law, has been using the US consulate in Frankfurt, Germany, as a base for its spying and hacking activities, many of which in this case required a close physical proximity to the target.:
Vault 7 Discovery/Implication #11: CIA-Electronics Supplier Collusion
Another aspect to consider with this is CIA collusion with electronics manufacturers and suppliers. We know the CIA owns the MSM, Hollywood, the Communication Industry, etc. Wikileaks reports that the CIA’s Mobile Device Branch created technology to infect and control smartphones. Do they possess a backdoor into the software and hardware of all smartphones?
Vault 7 Discovery/Implication #12: Fiscal Damage
The CIA has caused worldwide damage that can be estimated in millions or maybe even billions of dollars, since they can’t now control the malware they have created. The CIA has lost control of the monster it created. We are all vulnerable. How much data will be hacked, how much privacy stolen and how much money will it cost to prevent and repair this breach?
Vault 7 Discovery/Implication #13: Project Umbrage: The Framing of Foreign Nations like Russia
Well well well. Remember all that brouhaha about Russia hacking the US elections? It was all lies and propaganda, but many people fell for it. Now look at this. The CIA has been using a program called Project Umbrage under which it manipulates code to make it look like it comes from somewhere else like another nation. You could call it false flag cyber terrorism. In other words, the CIA clones the hacking procedures of Russia to create false flag hacking attacks, and then says with a straight face that the attacks “are consistent with what we would expect from Russian hackers”. That may be technically truthful (but what deceit!) – however only because the CIA has first intentionally mimicked those techniques with a motive to frame an innocent party or country
Vault 7 Discovery/Implication #14: The CIA-NSA Turf War
For some time, we have known about the rivalry or turf war going on between the CIA and NSA in their struggle to become the preeminent military intelligence agency. Another implication of Vault 7 is that we now know for sure that the CIA has a hacking system that is at least equivalent to, if not better than, that of the NSA. The spying, criminality and illegality of the NSA is already miles past the line of what is acceptable in a free, open and just society. Now the CIA has doubled the criminality? Where’s the line here? What are the other 16-17 agencies doing? What’s the DIA (Defense Intelligence Agency) doing to us? What about the creepy NRO (National Reconnaisance Office), who sports mottos such as “Nothing is Beyond Our Reach” and “We Own the Night” (see above)?
Vault 7 Discovery/Implication #15: CIA Above the Rank of President
JFK found out the hard way that presidents don’t tell what the CIA to do. The CIA tells the president what to do. The image above is interesting proof showing that the CIA is further up in the hierarchy that the Executive Branch.
It is a pretty heavy burden to carry the truth at this point. Honestly, I did not know I was so interesting that the CIA wanted to use my TV to look at me. It looks like I will have to do a better job with my makeup and hair before I sit down here to check out my morning websites. I don’t watch TV, but my husband does, so there is my Samsung (no, I am not kidding) looking straight at me.
We can joke about this, as humor helps us get through so much under very tough conditions, but there is nothing funny about it. It won’t end well, and in time the American people will be living in Nazi Germany.
The world of the Internet took a really bad turn when Obama let our ICANN contract expire, but this does not have anything to do with that. However, I am observing some things on the Net that I do think pertain to that. But the morphing of the CIA into a Luciferian entity began within the United States Government.
Under Obama he began every program against the American people that he possibly could, because he resented that we were not his jihadists. He had no affection for Christianity, as he was always Muslim through and through. He and his people actually formed the group ISIS, who has beheaded Christian after Christian in the Middle East.
The CIA worked in the Middle East to train Obama’s rebel Army, and the CIA was working the same night Ambassador Stevens died in Benghazi. Stevens had met with the CIA not long before he dies. He made the comment to one of them he doubted he would live to see morning. What did they do about it? The CIA compound was very close to the consulate.
There are a lot of prices to be paid for Benghazi, and the CIA is in that mix. We know now the CIA has embedded themselves everywhere and in everything. We had discernment to know this was true, but now we have been validated in all our CONSPIRACY THEORIES.
Published on Mar 9, 2017
Christopher Everard joins the show to discuss some of the information contained within the Wikileaks Vault 7 documents including the levels of surveillance, methods used & even the potential for spooks to hack modern cars to cause “accidents”.
We try to show that this is not confined to the CIA & is in fact a global phenomenon, with GCHQ in the UK showing up in the documents released.
We are all being spied on, that much we now know!
Christopher Everards news website…
Christopher Everards news website…
To help support KBS please subscribe to Truth Frequency Radio via my archive page here…. http://truthfrequencyradio.com/kevbaker/
SIGN UP TO THE KEV BAKER SHOW & TRUTH FREQUENCY RADIO’S FULL ARCHIVES FOR OVER 30 LIVE SHOWS!
Remember to join our FREAKY FRIDAY Facebook Page…
Remember to join our TRUTH FREQUENCY RADIO Facebook page…
Join the facebook @ www.facebook.com/
Kev Baker has been on the front lines since 2009. Hailing from Glasgow, Scotland, Kev was recently featured in VICE magazine as a front-line consultant and expert on activist groups in the United Kingdom. You can listen to Kev Baker on AM/FM in Colorado, Oregan, California, Sydney and London or tune into any of the TFR internet streams or listening options.1,808 views