Guest Posting

If you wish to write and/or publish an article on Operation Disclosure all you need to do is send your entry to applying these following rules.

The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

Featured Post

Restored Republic via a GCR as of June 23, 2018

Restored Republic via a GCR: Update as of June 23 2018 Compiled 23 June 12:01 am EST by Judy Byington, MSW, LCSW, ret. CEO, Child Abuse Re...

Friday, March 10, 2017

Wikileaks Reveals that the CIA are Spying on People Through their Smart TV's

Source: Truth Theory | by Jess Murray

Wikileaks just unveiled the largest ever publication of confidential CIA documents, which has been named "Vault 7". The recent publication consists of 8,761 documents which Wikileaks' Founder Julian Assange has claimed embodies, "the entire hacking capacity of the CIA." The anonymous source of Wikileaks has said in a statement that they would like to spur a public debate regarding the "security, creation, use, proliferation and democratic control of cyberweapons."

Wikileaks released part one on Tuesday March 7, 2017, which is part of a series of leaks on the US Central Intelligence Agency (CIA), which is titled "Year Zero". In their initial Vault 7 Press Statement they state exactly how the documents got into their hands: "Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive."

Reports claim that the CIA has been receiving priority from the US government over the NSA since 2001, which has given the CIA the financial freedom to create its own group of hackers. By the end of 2016, the CIA's hacking operations department had more than 5,000 registered users with more than a thousand hacking systems and viruses.

The Year Zero files contain information about the CIA's global covert hacking system, including "weaponized exploits" used against company products including "Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones." The CIA also has the capability to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. Reports state that government hackers can even hack into Android phones and collect "audio and message traffic before encryption is applied."

Vault 7 is also said to expose that the CIA have the ability to engage in false flag cyberattacks that make it look like Russia is the assailant. Wikileaks' source states that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation." Another program that the reports uncover is "Weeping Angel", which is designed by the CIA's Embedded Devices Branch (EDB), and essentially turns smart TVs into their own personal microphones.

The project has the ability to put the TV into a "fake off" mode, so that the TV looks like it's off when it's really on. The purpose of putting a TV in "fake off" mode it so that it can act as a bug, which records conversations and spies on people, before sending that information over the internet to a CIA server.

The release of this information by Wikileaks is just the beginning, as they have confirmed that this is merely "part one". According to Assange, "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade."

IMAGE CREDIT:dolgachov / 123RF Stock Photo


Receive News from Operation Disclosure via Email

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.