,

10 THINGS YOU DIDN’T KNOW ABOUT THE CIA BEFORE YESTERDAY

Source: WeAreChange

WikiLeaks’ Vault 7 release of Central Intelligence Agency (CIA) documents yesterday opened eyes worldwide about an agency President John F. Kennedy once vowed to “splinter…into a thousand pieces and scatter it.”

Here’s a comprehensive list of ten things we didn’t know about the CIA before yesterday’s leak.

1. The CIA has an illegal domestic spying apparatus similar to the NSA

Perhaps one of the most revealing things that we learned yesterday is that the CIA’s domestic surveillance capabilities rival and may well surpass those of the National Security Agency (NSA).

While both agencies are required to report vulnerabilities found in hardware and software to manufacturers, each failed to do so – endangering national security and personal privacy by weakening encryption and installing back doors in consumer electronic devices. The agencies also hoarded zero-day vulnerabilities, exposing systems to other malicious hackers  – whether they are foreign governments or criminals, violating the Consumer Protection Act.

In doing so, both agencies also violated the Fourth Amendment. The NSA admitted in 2014 to the Guardian that it was obliged to follow federal surveillance laws, laws that we now know both the NSA and CIA have broken an unfathomable amount of times.

How can Americans trust the CIA or the NSA, when the two agencies made us less safe by breaking the law and endangering private information such as bank account numbers and credit card numbers, by keeping security holes open in the devices of millions of Americans, just so they could exploit them. As security expert Bruce Schneier said back in 2013, “It’s sheer folly to believe that only the NSA can exploit the vulnerabilities they create.”

2. The CIA has a secret base in Germany

The CIA has a secret U.S. hacking base at the consulate in Frankfurt, Germany that it would disguise as State Department employees. The CIA even instructed its employees at the base how to avoid German security and gave them a cover story. This base is now under investigation by German authorities.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip).
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

3. The CIA has a cyber group dedicated to forging other countries digital fingerprints in false-flag attacks

The CIA has a secret espionage group called UMBRAGE that is dedicated to forging malware signatures of other countries including Russia.

The group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other countries.

With UMBRAGE and related projects, the CIA cannot only increase its total number of attack types, but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from – allowing them to create cyber false-flag attacks in which they can attack targets in the U.S. and blame another country for the resulting damages.

4. The CIA can spy on you through your smart TV and tap into the microphone

What was absent from Edward Snowden’s leaks was evidence of the ability for the NSA to spy on you through your smart TV. The CIA has found a way to do so through a program it called “Weeping Angel.”

[RELATED: Wikileaks Reveals CIA Can Spy On You Through Your TV And Bypass Your Mobile Encryption Apps]

5. The CIA can spy on you through any tablet or phone

While the NSA displayed similar capabilities to breach a phone or tablet’s security and hijack its camera or intercept text messages, the CIA proved it could do more.

Through it’s Mobile Devices Branch (MDB) they can exploit Android and Apple phones and tablets to numerous attacks to remotely hack and control popular smart phones. Infected phones then can be instructed to send the CIA the user’s geo-location, audio and text communications, as well as covertly activate the phone’s camera and microphone.

6. The CIA can transcribe your Skype conversations

Kim Dotcom and 0hour explain how this is done in the following tweets.

View image on Twitter

View image on Twitter7. The CIA has exploits for every major Anti-virus software provider and major personal computer software programs, including Microsoft Word, VLC and all operating systems

Wikileaks notes that a program called Fine Dining provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlying system is automatically infected and ransacked. This would allow CIA agents to pose as testing a company’s security and appear as if they were really an IT tech, when in reality they were pillaging data. Wikileaks also revealed that the CIA has exploits for Windows, Linux and Mac OSX based systems as well as general software exploits for various applications on all three OS versions.

8. The CIA can hack vehicle control modules including cars, trains, and planes

Ex-FBI Head of Los Angelas Ted L. Gunderson said that the way that the elite get rid of people is through trains, cars and plane accidents. While the capabilities of hacking vehicles may not be something new, the evidence that the CIA has this capability warrants looking back at several suspicious incidents in the past few decades which raised flags as being possible assassinations rather than simple misfortunate accidents. Yesterday We Are Change reported on journalist Michael Hastings’ suspicious death, but many others that raise suspicion include John F. Kennedy Jr’s death and Senator Paul Wellstone – both powerful political dissenters that died in strange plane crashes.

9. The CIA has an air gap virus that can infect systems even if not connected to the internet

Air gapping is a technique this reported personally learned about in 2015 when a whistleblower personally came to me with what sounded like insane information.

What is air gapping? Well it’s hacking a computer that isn’t connected to the internet.

Using the GSM network, electromagnetic waves and a basic low-end mobile phone through intercepting RF radio signals, researchers in Israel found they could extract data from computers, and Wired has now reported. Two weeks ago Wired reported that a drone has that type of capability, simply by watching a PC’s blinking led light – an incredible finding. Add that together with the CIA being able to implant malware and you have a dangerous weapon in the CIA’s hacking arsenal.

The CIA’s “Hammer Drill” infects software distributed on CD/DVDs, they have infectors for removable media such as USBs, and systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”).

10. The CIA has a Meme Warfare Center. The meme war – is real.

The CIA actually has a meme warfare center which it uses to spread memes – giving cause for concern to anyone worried about government propaganda. Meme warfare is real, and the CIA has apparently been using it to spread disinformation. This is Operation Mockingbird in the 21st Century.


The CIA is not a friend to the people of the U.S., historically serving only the Wall Street and military-industrial complex elite. The CIA has been caught before spying domestically in the 1960’s – 70’s, including spying on journalists under Operation CELOTEX I-II and others in 702 documents called the “family jewels,” that catalog the agency’s domestic wiretapping operations, failed assassination plots, mind-control experiments and more during the early years of the CIA.

The CIA is the deep state, and it is dangerous.

What do you think of this list did we miss something that we should have covered? Let us know in the comment section below!

What do you think?

0 points
Upvote Downvote

Total votes: 0

Upvotes: 0

Upvotes percentage: 0.000000%

Downvotes: 0

Downvotes percentage: 0.000000%

Leave a Reply

Your email address will not be published. Required fields are marked *