From remote vehicle control, to the crazy ways the CIA can listen to you; These are Unbelievable Recent Wikileaks Revelations !
10. Vault 7
9. Smart TV’s
8. iPhones and Androids
7. Covert Hacker Bases
6. Vehicle Control Hacking
5. Operation Hammer Drill
The
CIA had quite a few different programs in order install the malware
they created on other people’s computers. The had a few cyber weapons up
their sleeves and one of those was a cross-platform malware that would
target microsoft, linux, solaris by infecting computers with CD’s, DVD’s
USB’s and other sophisticated malware. It’s believed that this would
work with the most secure computers on the planet. It also seemed to
have the ability to infect computers that weren’t even connected to the
internet or never have been connected to the internet before. So, be
careful next time you put a CD or USB into your computer, just know what
you might be getting yourself into. It’s also believed that the US took
some of this technology from Russia and if some of the devices were to
be detected, it would essentially point the finger at them.
4. Codename Ricky Bobby
The
codename for one of the malwares developed is known as “Ricky Bobby”.
This is a lightweight implant for specially targeted computers running
on newer versions of Microsoft Windows and server. This easy to install
malware allows hackers to easily upload and download files and execute
demands without being detected. This is remotely installed with physical
access to target computers most likely by people who pose as IT
support. Once the malware is on the computer, it’s on there for good and
there’s apparently no way to get it off. It’s clear that the time and
research that’s been done to develop these cyber weapons was rather
extensive.
3. Fine Dining
The codenames used in these
wikileaks attack can get pretty wild. This one is called “fine dining”
and it allows for a CIA operate to plant a hacking device program under
the cover of playing an innocent online game! So the entire time they’re
implanting malware onto a computer no one will suspect them doing any
harm. The system uses the cover of online games like “2048” which is a
game with numbers and the other cover is the media player VLC. they’re
also able to use existing tools on the computer such as things like
“notepad” for their hacking operation. For example, they’ll use the
notepad to communicate with other CIA agents who can view what they’re
doing on that computer.
2. Operation Shoulder Surfer
Ever see
someone kind of lingering over your shoulder, trying to see what you’re
doing on the computer? You might especially be cautious of shoulder
surfers while you’re at the ATM machine or typing in an important
password to your Ashley Madison account. Yeah that’s basically what the
CIA spooks are doing, they know this and that’s why they called this
operation Shoulder Surfer. It’s a little bit hard to decipher all of the
government lingo but we could clearly tell that this was for hacking
into people's private email inbox. This allows for them to hack into
Microsoft exchange servers and dig up things like your emails and maybe
even worse, your browser history! For love of god, so one do something!
This will also allow them to obtain information stored in your computer
such as passwords, and files stored on the computer. The CIA really
knows how to beat a dead horse and they seem to have several different
ways to gain as much personal info about someone as possible.
Overview
You
might be asking yourself, hey, if the CIA is so good at hacking things,
how does wikileaks even exists and how have they not been able to hack
them? The wikileaks server in Sweden is extremely secure and located in
Sweden, in an undisclosed location. Julian Assange has assured us the
server is safe and the technology the CIA would have to possess to hack
it, would be above their capabilities, for the moment at least. The
sheer massive amount of hacking notes and documents found from Vaut 7 is
just simply overload. As you’re reading through the files. You notice
the time and effort put into these projects. Edward Snowden claims these
documents appear to be real due to the fact that insider terminology is
used, that only CIA agents would know. Julien Assange asked the
question,” Should the Geneva Convention be modernized in order make this
kind of hacking an international crime?”
The Financial Armageddon Economic Collapse Blog tracks trends and forecasts , futurists , visionaries , free investigative journalists , researchers , Whistelblowers , truthers and many more
No comments:
Post a Comment