#Vault7… 3-7-17… “A Couple of RT’s about the latest Wikileaks release” (as if we didn’t already know all this!)

I’ve posted a couple of RTs about this #Vault7 business. There’s tonnes of articles out about it, I’m sure. I’ll add a couple of short videos I’ve watched, in the next post. The implications about the infamous “Russia hacked the US election” are quite big. The “Russia fingerprint” could possibly have been left by the CIA. Anyway, one more attempt at getting HRC in, failed. And now even more are awake to this.

#Vault7: How the CIA steals hacking fingerprints to cover its tracks

“The CIA can hide its own fingerprints from its hacking exploits and attribute blame to others, such as Russia and China, according to WikiLeaks’ Year Zero confidential data release. Every hacking technique leaves a “fingerprint” which, when collated, can be used to connect different attacks and tie them to the same culprit.

“The CIA’s Remote Development Branch (RDB)’s Umbrage sub-group collects an archive of hacking exploits created by other actors, like Russia and other hackers, and leaves this false trace for others to detect.

“DNC hack: #Vault7 This is how the CIA uses false ‘fingerprints’ to frame others, such as Russia… Who needs enemies like Russia when you have got friends like the CIA and the Deep State.

“In the case of the Democratic National Committee (DNC) hack, which reports have connected to Russia, the fingerprints used to link blame to Russian hackers may have been manipulated.

“…the data demonstrates how easily fingerprints can be manipulated, and how the CIA’s vast collection of existing malware can be employed to disguise its own actions.”

Apple, Samsung, Microsoft: WikiLeaks blows lid on scale of CIA’s hacking arsenal

” The major takeaway from the latest WikiLeaks dump centers around the terrifying, ‘all-seeing-eye’ surveillance project codenamed ‘Weeping Angel.’ The CIA appears to have taken espionage to a whole new level if WikiLeaks’ initial analysis is accurate. According to the preliminary release, the CIA has the capability to hack, record and even control everyday technology used by billions of people around the world. These include smartphones, tablets, smart TVs and even vehicles with remote control navigation systems.

“For example, WhatsApp’s end-to-end encryption means that only the direct participants in a conversation can read messages; not even WhatsApp is capable of reading them. The CIA, however, was able to hack into individual private WhatsApp messages before encryption could even be applied.

“According to WikiLeaks, the manufacturing division for the Agency’s hacking tools, or ‘zero days’ as they are dubbed in the leaks, is the EDG (Engineering Development Group), which is under the umbrella of the agency’s CCI (Center for Cyber Intelligence).

“[Hacking arenas of the EDG] Smartphone devices… Apple devices… Samsung… Vehicle control… Android devices (Samsung, HTC, Sony)

“These ‘zero days’ include, but are not limited to: air gap jumping viruses such as ‘Hammer Drill’ that are capable of infecting computers or phones that have never been connected to the internet; hacking tools that focus on removable devices such as USB drives; systems for hiding data, be it in covert disk areas or in images; particular ‘zero days’ that are manufactured to self-perpetuate and hide themselves from detection on an ongoing basis.”

This entry was posted in apocalypse, cabal, energies, new energies, prosperity package, spiritual growth and tagged , , , . Bookmark the permalink.

7 Responses to #Vault7… 3-7-17… “A Couple of RT’s about the latest Wikileaks release” (as if we didn’t already know all this!)

  1. Pingback: Alexa Nikolas nazi

  2. Pingback: wikipedia reference

  3. Pingback: เว็บตรง betclic88

  4. Pingback: สลอดออนไลน์

  5. Pingback: best place to buy 1p lsd

  6. Pingback: https://tortealcioccolato.com/?wptouch_switch=desktop&redirect=https://casino-spin.de/

  7. Pingback: basics

Comments are closed.