I have reported on Wikileaks from many years now. From when the left was celebrating Wikileaks for revealing the hidden details and indiscretions about the Iraq/Afghanistan war to recently years when Hillary Clinton, the Democratic National Committee, and now the CIA has been the target of the data releases.
There have been a lot of questions recently as to if Julian Assange the founder of Wikileaks is still even alive, as a result of Julian Assange being scarce from the public eye.
However on March 9th 2017 Julian Assange makes a live appearance to document some of the details of this data dump. The results of this latest appearance have been mixed, some saying that this is not Julian Assange but a computer generated likeness of Julian, and some are celebrating that he has come in person on a live broadcast to detail his latest data release.
Whatever the case, I always advise people to do their own research. It may or may not be authentic, however Wikileaks has a 100% record for accuracy by not once releasing fake facts or having to retract anything. Wikileaks is the platinum standard for journalism so far.
Now on to the release. There is a lot here, and in fact is the biggest publication on unpublished CIA information to date. In the past year or more, I have made several blogs on the topic of the CIA and the FBI counter intelligence programs “Co-intel-pro”. First let me say, I would not try to claim that I am an expert on this, nor have I went through the more than 8,000 documents contained in the leak. So again, do your own research.
Some of the documents reveal that the CIA have a massive arsenal of cyber weapons that can be used to hack into almost every functional piece of our lives, from our cell phones, our vehicles, and even our televisions. Julian asserts that the CIA has “lost control over this arsenal of cyber weapons”, and that Wikileaks has this arsenal of weapons available to them, but that they have not released them to anyone.
A lot of this information is already well known hacks.
For example, hackers can remotely hack into your vehicle, and control it from over a mile away without any evidence of what is happening or what has happened afterwards.
Another example is fake cellphone towers, that are often controlled by law enforcement. Police departments have publicly admitted to using these.
Stingray Cell Phone Tracker Concealed by Police
The Wikileaks publication also reveals that the CIA can hack your Samsung Television to listen to remotely;
Here is Julian Assange’s statements about “Vault 7” Wikileaks CIA
- More information on the FBI Counterintelligence Program
- Recent article that I wrote about Fake News, and how the CIA invested $600 MILLION dollars into Amazon (aka, the same people who now own the Washington Post) We Hear So Much About #FakeNews Well The #MSM Is The BIGGEST Source Of Fake News. Here Is The Proof.
- The recent revelation that the Pentagon paid a UK public relations firm $540 million to spread fake news (propaganda) about the Iraq war