SIX KEY CIA THINGS TO KNOW INITIALLY ABOUT WIKILEAKS RELEASE MARCH 2017

SIX KEY CIA THINGS TO KNOW INITIALLY ABOUT WIKILEAKS RELEASE MARCH 2017

6 things you need to know about WikiLeaks’ CIA dump” Mar 8, 2017

CIA SPYING ON EVERY DEVICE AND PROBABLY HACKED THE 2016 ELECTION AND PRIMARIES!

Click for Source Article on HindustanTimes

Click for Source Article on WashingtonPost

CIA = PROBABLY HACKED THE 2016 ELECTIONS AND PRIMARIES SINCE THEY CAN HACK VIRTUALLY EVERYTHING INCLUDING TVs = NO IT WAS NOT RUSSIA! WE NEED TO MOSTLY NEUTER THE CIA AND NSA AND THE OTHER 15 SPY AGENCIES WORKING AGAINST AMERICANS!

PROVES CIA = Capable of HACKING VOTING MACHINES AND ANY ELECTRONIC DEVICES!

SIX Things in leak of nearly 9,000 documents from CIA’s Center for Cyber Intelligence:

#1 CIA = PROBABLY HACKED THE 2016 ELECTIONS AND PRIMARIES = NOT RUSSIA!

THIS IS HOW CIA FAKED RUSSIAN TRACKS = IT WAS A CIA LIE = “CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of other Nations or groups that the attack techniques were stolen from.” = Well executed Cyber-intrusions/attacks are nearly impossible to traced back to its culprit and any trails left are likely on purpose and cannot be trusted.

CIA = Long record of attributing cyber-attacks (often false ones as well) to a “HANDY ENEMY” they want to TOPPLE or create a WAR WITH. In this case CIA was told by British Rothschilds ZIO-MAFIA to chose Russia to help complete the Mafia World Dictatorship over humanity. = 911 was an Mossad-CIA operation but Bin Laden was chosen as the ENEMY to help start war in Afghanistan and later Iraq with ridiculous claim that Iraq worked with Bin Laden.

Wikileaks Documents = Prove CIA’s internal hacking organization called UMBRAGE group collects & maintains a substantial library of attack techniques ‘stolen’ from malware produced in other Nations including Russia so they can COVER THE CIA TRACKS WITH WHATEVER NATION THEY CHOOSE!

UMBRAGE = Lets all and increasing number of CIA ATTACKS be COVERED UP or misdirected leaving another Nation’s “fingerprints” or trail to SHIFT BLAME.

UMBRAGE COLLECTS FOR EACH NATION = All the details needed to cover the CIA’s tracks. = Methods + Tools + Code names + Passwords + Locations +….. = CIA have whole databases of ‘stolen’ tools.

MOST LIKELY CIA tools hacked the DNC & CASINOS & SONY = Russia did not hack and leak the DNC emails, Iran did not hack American casinos and North Korea did not hack Sony. = “there is NEVER a clear attribution” of who is to blame so don’t fall for someone selling such a lie.

Click for Source Article

#2 Encrypted chat apps haven’t been compromised but smartphones are vulnerable = Means the CIA can access data, videos, images and even the camera and microphone on the devices.

#3 How vulnerable are your smartphones? CIA’s Mobile Devices Branch has “developed numerous attacks to remotely hack and control popular smartphones” = Instructed them to send the “user’s geo-location, audio and text communications as well as covertly activate the phone’s camera and microphone”. = Google’s Androids + iPhones = CIA has weaponized cyber arms.

#4 What other devices can the CIA access? Can target computers running on Windows, Apple products running iOS, and even smart TVs from manufacturers such as Samsung to listen into homes even with TV off. + “As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks…” = Engage in nearly undetectable assassinations,” by CIA & MI5 or MI6 — WikiLeaks

#5 Who were the targets of the surveillance? = Latin America + Europe + US + Foreign Information Operations + Foreign Intelligence Agencies + Foreign Government Entities = BUT NOT Extremists AND NOT Transnational criminals

#6 Are you at risk? Everyone with a iPhone + Android smartphone + Tablet + Windows computer + Samsung smart TV = All are vulnerable to the CIA.

IT WAS NOT RUSSIA = IT WAS BRITISH ROTHSCHILDS ZIO-MAFIA OWNED CIA & MI6 THAT DID THE ELECTION HACKING INCLUDING DNC CRIMES AGAINST BERNIE!

Mar 8, 2017 WikiLeaks Dump of CIA Documents = Detailing US spy ability that robs Americans of their PRIVACY = Smartphones + Computers + iPads + Wi-Fi Routers + Some TVs = Bigger than Edward Snowden’s leaks = Ex-US GOV Employed Hacker(s)/Contractor(s) using CIA Software Weaknesses = Leaving the software’s author “zero days” to create patches.

—————————-▶

WaPo reporter Greg Miller on WikiLeaks trove of CIA’s hacking secrets = Hacking arsenal exposed which posted thousands of files & secret cyber-tools used by the agency to use cellphones, televisions and other ordinary devices for espionage = Closely guarded cyberweapons showing close COLLUSION of U.S. government’s with Silicon Valley giants including Apple and Google.

WikiLeaks Source = Current or Ex-CIA Contractor release is comparable in scale and significance to the collection by former U.S. intelligence contractor Edward Snowden = “the archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

CIA documents mainly unmask hacking methods many experts told us the CIA could do. CIA malware have names like “Assassin” and “Medusa” to steal data from iPhones and computers and even some TVs.

WikiLeaks = Put online just part of a broader collection of nearly 9,000 files that will be posted over time after being redacted. = LIKE PODESTA EMAILS & CLINTON EMAILS AND DNC CRIMINAL EMAILS RELATED TO ELECTION FRAUD!

AUTHENTIC AS USUSAL WIKILEAKS KEEPS ITS 100% ACCURACY = Experts and former intelligence officials said the latest files appear to be authentic refering to code names and capabilities known to have been developed by the CIA’s cyber-branch.

CIA TOOLS (2013 to 2016) = Malware, viruses, trojans and weaponized “zero day” exploits = Part of a sprawling CORPORATE cyber-directorate within the agency spying on Americans and British and ALL OF EUROPE possibly including Russia. = Enable CIA & MI6 to bypass popular encryption-enabled applications used by millions of people to safeguard their communications. + CIA’s methods exploit vulnerabilities to install software for “hacking”

CIA = Has specific anti-virus products = CIA hackers even “discussed what the NSA’s . . . hackers did wrong and how the CIA’s malware makers could avoid similar exposure.”

CIA = Beyond hacking weapons + Organization of the CIA’s cyber-directorate and indicate that the agency uses the U.S. Consulate in Frankfurt, Germany, as a hacking hub for operations in Europe, the Middle East and Africa. = PROBABLY TO HELP ISIS & AQ LIKE THEY DID FOR 911.

CIA (2015) Directorate of Digital Innovation = Shifted emphasis from conventional spying and analysis that really catches ISIS & AQ TERRORISTS to focus on EVERY HUMAN ON THE PLANET.

CIA = Uses tool called “Weeping Angel” = Put certain TVs into a fake “off” mode while activating a microphone that enables the CIA to capture any conversations in the surrounding space.

One thought on “SIX KEY CIA THINGS TO KNOW INITIALLY ABOUT WIKILEAKS RELEASE MARCH 2017

Please Leave Reply