From Wikileaks:
Vault 7 is a trove of 8,761 confidential documents, which has been obtained by WikiLeaks. It contains evidence that the CIA has been building its own “fleet of hackers” since 2001, and that these hackers have been developing cyber weapons to spy on people through their own phones, computers and smart TVs.
….produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware.
The CIA has been:
- Targeting certain smart TVs and listening to conversations. In association with the UK’s MI5
- Looking at infecting the vehicle control systems used by modern cars and trucks.
- The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. This allows the CIA to see he user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.
- Attempting to obtain information from Apple devices, like iPads.
- Exploiting Android phones, which make up 80% of the phone marketplace
These technique allow the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking smartphones that they run on and collecting audio and messages before encryption takes place.
Targeting of Windows, OSx, Linux, routers
- The CIA is attempting to infect Windows systems, as new as Windows 10.
- The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more.
U.S. Consulate in Frankfurt is a “covert CIA hacker base.”
Along with it’s HQ in Langley, VA, the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”
Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.
Why Should I care?
In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers. The CIA has been harboring illegal information on exploits affecting consumer devices.
As per usual the US government is not to be trusted, inform yourself with what is happening. The CIA has been collecting information on how to hack your phone, illegally.