CIA Revealed to Possess Hacking Software to Control Cars for Assassinations


The Central Intelligence Agency has been involved in some very nefarious activities. That’s not a matter of conjecture, it’s been proven by declassified documents.

For example, it is a proven fact that the CIA instigated the overthrow of Iran’s elected leader in the 1950s in order to install the notorious Shah, who was then overthrown during the Carter administration by the predecessors of the current Iranian regime. And that’s just one example that we happen to know about.

WikiLeaks has just dumped a huge amount of data on the internet and, once again, the CIA looks bad as a result.

WikiLeaks has claimed the CIA planned to hack cars and trucks to carry out assassinations.

The secretive organisation said the U.S. Central Intelligence Agency used the phone’s geolocation software to tap into vehicle control systems in modern cars.

The accusations go deeper.

The hacking organisation made the statement as it announced a huge release of confidential documents from the CIA as part of its mysterious Year Zero series, founder Julian Assange claimed.

It claims the CIA has been carrying out a global covert hacking program that exploits US and European companies.

It claims these include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which it says “are turned into covert microphones.”

The idea that by purchasing an iPhone or Android phone that one is effectively setting himself or herself up to be bugged is more than just disturbing. But even if true, that’s not the worst of it.

The group said that from October 2014 the CIA was “looking at infecting the vehicle control systems used by modern cars and trucks” to possibly enable them to “engage in nearly undetectable assassinations.”

Could it be that this was more than just a “plan” of the CIA’s? Could the car crash that killed controversial journalist Michael Hastings have been accomplished by using such sophisticated software to take over control of his car?

Hold that thought for a moment as we go back to the story relating to cellular phones and televisions.

They [WikiLeaks] claimed: “Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.”

They said the CIA could then “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.”

Not only is your phone allegedly a potential danger, but depending on your television, it might be watching you.

In an online statement on its website, Wikileaks also claims the attack against Samsung smart TVs was developed in cooperation with the UK’s domestic intelligence agency MI5/BTSS.

It claims “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), infests smart TVs, transforming them into covert microphones.

The organisation added: “After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on.

“In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server.”

We’ve often suspected that things are not all that secure when using our computers, and the following story from WikiLeaks will do nothing to assuage your concerns.

They also claimed the CIA also runs “a very substantial effort to infect and control Microsoft Windows users with its malware, infecting CDs, DVDs and USB sticks.

If the following is true, this represents a disaster of immeasurable proportions for the CIA, and an equally incredible opportunity for would-be hackers that should concern us all:

The hacking group [WikiLeaks] said the publication release as part of Year Zero is from 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence.

Wikileaks said: “Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. [Emphasis added.]

“The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

Could it really be that all of the CIA’s covert hacking tools have now be placed in the public domain by WikiLeaks? There have certainly been reports of US intelligence services getting careless with security at times, but this one, if true, would top them all.

And here we were focused on allegations of Obama illegally tapping Donald Trump’s phone. Perhaps we are not only tapped, but depending on the auto we own, subject to some very unpleasant experiences while driving.

It all sounds like the fiction one finds in a James Bond movie. Only this time, it might be real.

Source: The Mirror



Share

22 Comments

Leave a Reply

Pin It on Pinterest