Wikileaks: If You Have Any Of THESE Electronics, The CIA Is Spying On You RIGHT NOW

After weeks of teasing the internet about #Vault7, WikiLeaks finally unveiled the big secret. It’s more damning than most could imagine.


Revelations include the CIA’s hacking of a vast percentage of the world’s smartphones —iPhones and Google Androids included. The agency reportedly covertly activates the devices’ cameras and microphones then using them to spy on you.

The intelligence agency also targeted the Samsung TV. They reportedly activated its built-in microphone and listened to conversations. This worked even when the TV appeared to be off.

According to WikiLeaks, the CIA’s Embedded Devices Branch (EDB) developed a protocol known as “Weeping Angel” for this purpose.

“After infestation,” said WikiLeaks, “Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on.”

“In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server.”

The CIA’s Mobile’s Devices Branch (MDB) targeted a different consumer technology: smartphones.

iPhones and Google Androids were among the targeted devices. Both combined would account for the majority of all smartphones used by consumers in the world.

“Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone,” claimed WikiLeaks.

The MDB program could then “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide, and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

WikiLeaks also claimed that the CIA was “looking at infecting the vehicle control systems used by modern cars and trucks” in order to carry out “nearly undetectable assassinations.”

WikiLeaks also referenced “a very substantial effort to infect and control Microsoft Windows users with its malware, infecting CDs, DVDs, and USB sticks.”

Julian Assange’s controversial organization says the documents released were part of their Year Zero data dump. This includes 8,761 documents/files retrieved from within the CIA’s Center for Cyber Intelligence.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” said WikiLeaks.

“The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

“By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware.

“Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.

“The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”