RE: VAULT SEVEN on the CIA’s projects and goals
“In early Feb. of 2017, Wikileaks issued a series of cryptic messages regarding Vault 7. On March 6th, Wikileaks tweeted that the deadline had passed and the FBI had not released Vault Seven, so they would. A roughly 500 mb file was put to the public with a key promised to be released the following morning.”
The key was released on March 7th, 2017 and was taken from John F. Kennedy’s famous speech: “I wish I could splinter the CIA into one-thousand pieces …and scatter it to the winds.” VAULT SEVEN IS THE MOST IMPORTANT DATA LEAK IN HISTORY. IT REVEALS THE CIA ….
• The CIA can hijack virtually ALL smartphones, televisions, and computers.
• The CIA can hijack smartphones to intercept nearby wifi traffic.
• The CIA can remotely control automobiles, airplanes and other assassination tools.
• The CIA can leave the “fingerprints” of foreign nations on hack attempts.
• The CIA has a department dedicated to psychological warfare against US citizens.
• The CIA uses the US embassy in Frankfurt as the spying/hijacking headquarters of Europe.
• The CIA has failed to report and has paid companies to keep vulnerabilities open.
• The CIA has lost the control of its malware arsenal to hostile actors and regimes.
WE LIVE IN A 1984 STYLE SURVEILLANCE STATE. This should be getting media attention 24/7 — HOWEVER OUR MEDIA IS CONTROLLED BY THE CIA. Wikileaks has stated that this is only the first of the WIkileaks release from the contents of VAULT SEVEN.
Submitted by JY
Vault 7: CIA Hacking Tools Revealed
Press Release
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.
By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.
Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”
Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.
Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.
Analysis
CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.
Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.
A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.
These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.
What is the total size of “Vault 7”?
The series is the largest intelligence publication in history.
HERE is the documents page.
READ MORE:WikiLeaks Press Release
RELATED:WikiLeaks Vault 7: 5 Fast Facts You Need to Know
___
https://aarclibrary.org/vault-7-cia-hacking-tools-revealed/
The Making of a Mind Controlled Assassin (By CIA’s Herbert the Pervert Bush, CIA’s Bill Day, Hollywood Photojournalist/Pedophile Running Pedophile Ring in Hollywood) and Jimmy Carter, President and Known Pedophile who used Children for Sex
BY ADMIN · PUBLISHED JANUARY 30, 2020 · UPDATED JANUARY 30, 2020
MKUltra Programming Via Extreme Torture & Sexual Stimulation Done By Bush, Sr., Carter and Bill Day@12 or 13
BY ADMIN · JANUARY 14, 2020
MKUltra programming Via Extreme Torture and Sexual Stimulation: This is part of the actual Programming done to Randy Turner as a teenager.
This occurred in the late 70s Jimmy Carter was president at the time.
George Bush Sr. was CIA director or running for office at the time. They came into the bedroom of the house I was staying in with Marcheline Bertrand. I had went on a white house tour about a week prior and had to defend myself from Bush Jr. for telling him to get away from some kids in our tour group that he was perving out on.
Jr had grabbed two of them and rubbed their heads against his crotch.
I told him to get away from the kids and he said Randy I like you boy as he walked walking over and placed his arm around my shoulder then he sucker punched me in the gut.
I bent down from the punch to my gut then stood up hitting him with an upper cut to the chin knocking him down.
A kid named Paul Bonacci was with Jr.
Our tour was passing through the kitchen at the time where George Jr. and Paul were getting something to eat.
Bush Jr. stood up after I punched him and said oh! Randy’s a fighter! Then he came at me and I rabbit punched him about 5
times in the face before he could throw a punch and he went down.
I grabbed the kids and told Jr to stay down or he would end up in the hospital. He stayed down till I left with the kids and we caught up to the others in our tour group. Jon Voight was part of the group ahead of me and found out what happened. He was afraid Bush Sr. who was CIA at the time would be mad at him. He invited me to the billiards room and as I opened the door I was hit in the face with a beer mug cracking one of my teeth. I got up and started going towards Jr but Voight stopped me and said it was over you got Jr. and now Jr. got you back so it ends here! Voight set the whole thing up so the little punk could get a cheap revenge shot in. which ended up cracking my front tooth at the root leaving me with a dead tooth.
Randy Turner explaining the torture and how they create one or more of his mind control alternates.
Not to be confused with Multiple personality or Dissociative Identity Disorder. Though they use techniques that have been found to be the cause of DID it is not the same.
A MKUltra must be activated via drugs and Alternates called out by a handler whereas a DID or MPD will have a multiple come out due to something traumatic occurring:
(Randy is talking about being held down and tortured by Bill Day, Photojournalist, ex-President Herbert Walker Bush and ex-President Jimmy Carter) Randy replied that all these people were a bunch of sadistic psychopathic perverts.
Randy Turner’s Account of Sexual Abuse by Bill Day, Jimmy Carter and Herbert the Pervert Walker Bush when he was around the age of 13-14.
Maybe a week After I had beat Bush Jr. up during our white house tour I am laying in bed and wake up to Bill Day walking into the room.
He sat on the bed to my left and grabbed my left arm then G.H.W Bush walks in and then {Jimmy} Carter walks in and I was thinking wtf is the president doing in my bedroom?
Carter gets on the bed and grabs my right arm and I believe they shoved these long cardboard tubes on my arms which were to make sure I wasn’t able to fight back.
Bush says I heard what u did to my boy you son of a bitch! Bush reaches down and grabs my testicles and starts crushing them.
I was begging them to kill me the pain was so bad and I must have passed out from the pain.
Bill Day was saying things into my left ear as Bush was torturing me, something about not trusting cops or authority and at some point I passed out.
I recall coming to looking down and seeing poppy sucking on my penis.
Carter was saying something into my right ear as Bush was trying to stimulate me sexually; he was saying something about sex with boys, girls, young or old is all good like he was trying to convince me nothing was wrong with sex with young kids with older women and men. I don’t recall what all they programmed just the beginning of it and the rest is a blur.
This continued for what seemed like an hour or more but during one of my court trials Bush claimed I popped within 15 minutes.
When being tortured to this extreme 15 minutes can feel like and hour.
The (popping) is what happens when the brain is unable to deal with the pain it makes a physical change and when this occurs you feel and hear a popping sound in your head.
I am no expert on how it works but I do recall some medical professional explaining it during my court trial saying the brain can physically alter itself to stop pain receptors in some people.
This popping noise is that the victims hear and feel in their head.
It is at this point the Alternates are created.
These Alternates are given names and have completely different personalities from the person being programmed.
The drug they use (Adrenochrome) allows the programmer to feed information into the subconscious and when the drug wares off the victim will have no memory of what took place or a very vague memory of something but usually will relate it to a dream or nightmare they had and not reality.
Comment: Mind Control is essentially a Rockefeller/Rothschild Zionist project and done on military bases in conjunction with the CIA primarily. The Rockefeller’s/Rothschild’s consider themselves ‘Jews’ but are the Synagogue of Satan and mind control is a Satanic project.
Fritz Springmeier has heavily researched Mind Control and his pdf books are readily available for free on the internet.
Insider Comments on Nelson Rockefeller Assassination by 13 Year Old MKUltra Programmed by H.W. Bush & Others
BY ADMIN · PUBLISHED JANUARY 13, 2020 · UPDATED JANUARY 31, 2020
Randy Turner
19 hrs ·
David Rockefeller had his brother Nelson assassinated via poisoning by a 13 year old MKUltra which G.H.W Bush programmed to poison him. Nelson was going to run for president and David didn’t want Nelson in because he couldn’t control him. After Bush had Nelson assassinated David went back on his promise to make George president and instead chose Reagan as President and George VP. This led to George using the 13 year old MKUltra to frame David as taking part in drugging and t…See More