Tuesday, 7 March 2017

WikiLeaks claims CIA targeted iPhones

WikiLeaks has claimed the CIA hacked iPhones and Microsoft Windows and worked with MI5 to turn Samsung TVs into microphones as part of a global hacking programme.

The secretive organisation is about to release a huge trove of confidential documents from the U.S. Central Intelligence Agency as part of its mysterious Year Zero series, founder Julian Assange claimed.

It has issued the release amid claims the CIA has been carrying out a global covert hacking program that exploits US and European companies.

It even claimed the CIA was using hacked mobile phones and vehicle control systems in modern cars to carry out assasinations.

It claims these include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which it says “are turned into covert microphones.”

Mr Assange was set to speak about Year Zero on Facebook today, but a livestream of the event was reportedly hacked. It is not clear when the event has been rescheduled to.

In an online statement on its website, Wikileaks also claims the attack against Samsung smart TVs was developed in cooperation with the UK’s domestic intelligence agency MI5/BTSS.

It claims “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), infests smart TVs, transforming them into covert microphones.

The organisation added: “After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on.

CIA planned to hack cars and trucks to carry out undetectable assassinations claims WikiLeaks

“In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server.”

The group also claims from October 2014 the CIA was “looking at infecting the vehicle control systems used by modern cars and trucks” to enable them to “engage in nearly undetectable assassinations.”

“The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones.”

They claimed these included iPhones, which account for 14% of the market and Google Android, “which is used to run the majority of the world’s smart phones (85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year.”

“Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.”

They claimed the CIA could then “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.”

They also claimed the CIA also runs “a very substantial effort to infect and control Microsoft Windows users with its malware, infecting CDs, DVDs and USB sticks.

The hacking group said the publication release as part of Year Zero is from 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence.

Wikileaks said: “Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.

“The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

Julian Assange’s relationship with Pamela Anderson hots up as he calls her an “attractive figure”

“By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware.

“Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.

“The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”

Mr Assange has been under investigation by the US since 2010 when WikiLeaks published confidential military documents.

In the same year, the Swedish Director of Public Prosecution opened an investigation into sexual offences Assange is alleged to have committed.

In 2012, facing extradition to Sweden, he took refuge at the Embassy of Ecuador in London after being granted political asylum.

In August 2014, he announced he would be leaving the embassy “soon”.

It’s only the government. Besides assassination, false imprisonment & deliberately ruining the lives of those they disagree with politically, what could possibly go wrong?

The fact they are targeting Candidate, then President Trump tells you everything you need to know about who’s side the players are on… They are very afraid of President Trump. I hope he has better security than JFK did.

Didn’t like my true comment DM don’t like the truth about these so called security services. I say let this bloke spill the beans on these so called prats that are suppose to protect us come on lad we need more scandal.

And now you know that the CIA (via Obama’s orders or tacit approval) was the one that created the ruse of Trump emailing a Russian bank as a pretext to persuade FISA judges to sign off on the warrants to keep surveillance on him and his contacts.

If I were Obama I’d be seeking the nearest airport and fly to any country offering asylum… it’s good night, good riddance for him and the rest of the Deep State Globalists.

UK Mirror
Post a Comment


Related Posts Plugin for WordPress, Blogger...