Tuesday, March 7, 2017

Things To Come




Vault 7 Leak Confirms: "CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones"




The Vault 7 Wikileak has now become reality and it’s a doozy. In addition to the irony of the Obama administration directly interfering with political elections in other countries via the CIA, the latest release from Julian Assange shows that literally every internet enabled consumer device in Russia was turned into an active microphone.
No, seriously.
It’s an amazing feat and one that shouldn’t go unnoticed, because we suspect that the same surveillance technology has probably been turned on the American people, and even a former Presidential candidate turned President.
Via Zero Hedge:
Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”
Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”



After reading this article you might not ever view your electronic devices the same way again.  Last year, Hollywood released a biographical political thriller based on the life of Edward Snowden that had one particularly creepy scene.  In that scene, a government spook used a program to remotely activate the microphone and camera on a laptop, and by doing so he was able to watch a woman as she got undressed.  Sadly, as you will see below, this kind of thing is happening constantly.  Any digital device can potentially be accessed and used to spy on you even if it appears to be turned off.  And this is why Donald Trump needs to be so careful right now, because the intelligence community wants to take him down and they can literally use any digital device in his possession to try to gather dirt on him.  We have a “deep state” that is absolutely obsessed with watching, tracking and monitoring the American people, and something desperately needs to be done about this unconstitutional surveillance.  Now that Trump has become greatly upset about how the government was tapping into his phone calls, maybe something will finally get accomplished.
In an article that I just published on The Most Important News, I talked about the NSA’s brand new two billion dollar data storage facility in Utah that can store up to five zettabytes of data.  Secret “electronic monitoring rooms” embedded within the facilities of major communications companies across the United States send an endless flow of digital information to this facility, and most Americans have no idea that this is even happening.  The following comes from Wired
Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSA’s new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency.The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits.
Whistleblowers have come forward again and again to warn us about what was happening, but they have largely been ignored.  One of the most prominent whistleblowers was former NSA employee William Binney
Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts. The haul only grew from there.

Can you imagine recording 320 million phone calls a day?
And that was at the beginning of the program – I can’t even imagine what the number must be these days.
But even if you aren’t using your phone government spooks can still potentially be listening to you.  The following comes from a CNN article entitled “How the NSA can ‘turn on’ your phone remotely“…
Government spies can set up their own miniature cell network tower. Your phone automatically connects to it. Now, that tower’s radio waves send a command to your phone’s antennae: the baseband chip. That tells your phone to fake any shutdown and stay on.
A smart hack won’t keep your phone running at 100%, though. Spies could keep your phone on standby and just use the microphone — or send pings announcing your location.
John Pirc, who did cybersecurity research at the CIA, said these methods — and others, like physically bugging devices — let the U.S. hijack and reawaken terrorists’ phones.



Unfortunately, these tactics are not just used against “terrorists”.
The truth is that these tactics are employed against anyone that the NSA is interested in, and in fact they could be listening to you right now.
Thanks to Edward Snowden, we have learned quite a bit about how the NSA takes over digital devices…
The latest story from the Edward Snowden leaks yesterday drives home that the NSA and its spy partners possess specialized tools for doing exactly that. According to The Interceptthe NSA uses a plug-in called GUMFISH to take over cameras on infected machines and snap photos.
Another NSA plug-in called CAPTIVATEDAUDIENCE hijacks the microphone on targeted computers to record conversations.
Intelligence agencies have been turning computers into listening devices for at least a decade, as evidenced by the Flame spy tool uncovered by Kaspersky Lab in 2012, which had the ability to surreptitiously turn on webcams and microphones and perform a host of other espionage operations.

So what can you do to prevent this from happening?
If you have external webcams and microphones, you can unplug them when they are not in use.
If you have a built-in camera, some have suggested covering the camera with a sticker.
And of course pulling out the battery entirely will prevent someone from taking over your phone when you are not using it.
But at the end of the day, it is going to be really hard to keep government spooks out of your electronic devices completely.  They have become extremely sophisticated at using these devices to get what they want, and they will literally go after just about anyone.
For example, just consider what they did to former CBS reporter Sharyl Attkisson.  In her recent book, she details a campaign of digital harassment that sounds like something out of a spy novel.  The following comes from the Washington Post

The breaches on Attkisson’s computer, says this source, are coming from a “sophisticated entity that used commercial, nonattributable spyware that’s proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency, or the National Security Agency (NSA).” Attkisson learns from “Number One” that one intrusion was launched from the WiFi at a Ritz Carlton Hotel and the “intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool.”
To round out the revelations of “Number One,” he informs Attkisson that he’d found three classified documents deep inside her operating system, such that she’d never know they were even there. “Why? To frame me?” Attkisson asks in the book.


If they can do all of that to Sharyl Attkisson, they can do it to Donald Trump too.
Trump needs to understand that the deep state is trying to destroy him, and that everything that he says and does is being monitored.
So until Trump can completely clean house at all of our intelligence agencies, he is going to have to be extremely careful 24 hours a day.
And let us hope that Trump is ultimately victorious in his struggle against the deep state, because the future of this nation is literally hanging in the balance.




Former Secret Service agent and best-selling author Dan Bongino of Life Inside the Bubble and The Fight seems to be promising some new details to emerge from the continuing saga of what has become known as Obamagate.
As part of the Presidential Protection Detail, Bongino is very familiar with how Presidents operate on a daily basis. Having worked for George W. Bush and Barack Obama, he has been in private meetings with these presidents and has heard quite a bit.
On Friday, he tweeted, " is going to blow wide-open this week."

Following Barack Hussein Obama Soetoro Sobarkah's re-election, Bongino came out and warned people about how dangerous the Obama administration was at the time.
"We're in a lot of trouble," he said.  "The President sees government – and I think it's because of his lack of experience and maybe community organizing in the past – as this shiny new toy. For all the disagreements I had with Clinton, Carter and Bush there were always limits… there was that line you just didn't cross… We cross it seemingly every day. We're lost in the scandals…"
"You give the government information and it will be abused," he added.  "It is not a matter of if it'll be abused, it's only a matter of when…When the line between the personal self and the public self… when that line is determined by the government that keeps your information in a trove for release any time they need it, how are you free?" he asked. "The bottom line is, having worked inside the government, it will be abused. It is only a matter of time."




3 comments:

George said...

Wow. We knew this all along. The evil that is being revealed is amazing. I pray daily for President Trump and Pence. Hard times coming for none believers. Personally I look forward to the rapture and time with Christ our Lord. Looking into His eyes hearing Him speak seeing Him on His throne. We have so much to look forward to. Praise God!

George said...

Wow. We knew this all along. The evil that is being revealed is amazing. I pray daily for President Trump and Pence. Hard times coming for none believers. Personally I look forward to the rapture and time with Christ our Lord. Looking into His eyes hearing Him speak seeing Him on His throne. We have so much to look forward to. Praise God!

Scott said...

AMEN brother