Archive for March 15, 2017

Obama The Spy

Posted in uncategorized with tags , , , , , , , , , , on March 15, 2017 by andelino

Thanks to Wikileaks and their bombshell release of “Vault 7,” a report including over 8,000 “leaked” CIA documents, we now know for a “fact” that former President Obama unleashed “cyber warfare” upon the American people via his “corrupt and out of control CIA puppets.”

From turning Samsung TVs into CIA “listening” devices to “accessing” smartphones and “posing” as Russian hackers to “hide their dirty work,” Obama and his CIA “goon squad” turned on the American people in a “stunning abuse of power.”

Below is a “rundown” of Obama and the CIA’s “nefarious” actions as reported by Wikileaks “Vault 7.”

Before you plug in your “Samsung Smart TV” or your “Microwaves,” you may want to mind your “manners” and refrain from saying “anything” the CIA may be interested in.

A Wikileaks “bombshell” report shows the CIA has developed “malware” that allows them to turn your “electronics” into their own “personal listening device.”

Ain’t our government “great?”

“That Samsung smart TV? The CIA can turn the mic on and listen to everything you say #vault7 #1984rebooted “— WikiLeaks (@wikileaks) March 7, 2017

The CIA and MI5 worked together developing “viruses” designed to turn Samsung smart TVs into “household bugs,” recording audio and sending data to “covert” computer servers, according to a new cache of leaked “intelligence” documents published by Wikileaks.

The group “claims” it is the largest ever “release” of CIA files.

Among the 8,761 documents of the “Vault 7” leak are papers describing “weaponized” malware directed at “iPhone and Android” users, designed to bypass “encryption” used by popular apps such as “Confide.

Wikileaks claims a program called “Weeping Angel” was developed to “infect” Samsung TVs. It sent the television into a fake “off’ mode,” recording conversations in the room and “sending” them to a CIA server.

In all, the documents suggest the agency “created” more than 1,000 “viruses, Trojans and other types of malware,” often disguised as the “work” of foreign organizations.

It also “accuses” the US government of failing to “abide” by its commitment to tell technology companies of any “identified” vulnerabilities, instead “hoarding weaknesses for use by spy agencies.”

Wikileaks claimed some of the most “damaging” elements of the program were “unclassified” so that applications could be “legally spread around the Internet.”

Not too surprisingly, the CIA is “declining” to comment on the Wikileaks “bombshell” released. This must be extremely “embarrassing” for them.

Wikileaks has “rocked” the intelligence community and the “Deep State” with the release of “Vault 7.”

We’re now discovering that Obama’s CIA “turned” on the American people, “unleashing” cyber warfare  and posing as Russian “hackers” to create false flags to “cover their dirty work.”

Sounds like something they would do to “try and take” Trump down. They cannot be “trusted.”

“CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE” — Kim Dotcom (@KimDotcom) March 7, 2017

“Obama accused Russia of cyber attacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!” — Kim Dotcom (@KimDotcom) March 7, 2017

Another profound “revelation” is that the CIA can engage in “false flag” cyber attacks which portray “Russia” as the assailant.

Discussing the CIA’s “Remote Devices Branch’s UMBRAGE” group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.”

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE“

As it stands now, we can’t believe a “single” word that comes out of the “corrupt” CIA. They are an enemy of  “We the People.”

Did you say “ObamaGate?” Look like it’s time to “investigate.”

Reforming the NSA
WikiLeaks: CIA Uses ‘Stolen’ Malware to ‘Attribute’ Cyber-attacks to Nations Like Russia
‘Vault 7’: WikiLeaks Dumps on CIA
WikiLeaks Claims CIA Hoarded Exploits, Lost Control of ‘Hacking Arsenal’
WikiLeaks: CIA Hackers Keep Guide on How to Pirate Windows 8
Wikileaks CIA Dump Has Some Peculiar Timing

%d bloggers like this: