WikiLeaks Release Confirms What “Conspiracy Theorists” Have Known For Years

The recent WikiLeaks release is promising to be a much bigger bombshell than anything Edward Snowden ever released. Unlike Snowden, however, the corporate press in the West is not devoting 24/7 coverage with all the bells and whistles of an intentional push to promote the story. Instead, it is largely the alternative and independent press that is giving attention to the recent WikiLeaks announcement. Interestingly enough, the mainstream press reports are largely focusing on accusations that WikiLeaks has “joined the Trump administration” or that the leaker of the information is a traitor.

As part of a series of leaks regarding the CIA, WikiLeaks has released “Vault 7,” containing over 8,000 documents coming from the CIA’s Center For Cyber Intelligence located in Langley.

So far, the 8,000 documents are only part of the first release, “Year Zero,” which reveals the CIA’s “global covert hacking program” and its “weaponized exploits” as well as the fact that it has used these tools against products produced by “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

But while many may see Apple, Microsoft, Google, and Samsung as hapless conduits for a secret surveillance program, the fact is that these companies, especially Google, have openly cooperatedwith the intelligence community/government in the past for intelligence gathering and even the manipulation of populations and “rebellions.” These companies may have many things on their minds but the privacy and wellbeing of the American people is nowhere on the radar. For that reason, it would be reasonable to believe that these companies were willing participants in a massive surveillance program as opposed to hapless victims.

But, while WikiLeaks deserves much credit for releasing the leaks and the whistleblower deserves even more credit for having the courage to put his career, his freedom, and his life on the line for his country, we have to be honest and remind everyone who is currently in awe by the revelations that the ability for the CIA to do just what it did has been known for some time. The ability to spy using backdoors built in to computers, cell phones, and TVs is nothing new. Neither is the ability of the CIA to remotely use built-in microphones and cameras to turn a device into a high-definition spy tool.

After all, the Telecommunications Act of 1996 required, by law, that cellphones be equipped with tracking capability. With the passage of various other Constitution-shredding laws like the PATRIOT Act in 2001 that eviscerated so many rights, specifically the Fourth Amendment and the right to privacy, Americans have allowed virtually every shred of their Constitutionally-guaranteed rights to be eaten away. It’s also quite clear enough now why the U.S. government mandated that all televisions become digital by law, isn’t it?

These leaks then serve only as a confirmation of what was known to many researchers, including myself, for well over a decade. But, while many of us were being maligned as “conspiracy theorists,” the CIA was indeed hacking into these devices and running its very own Orwellian surveillance state. Of course, it’s better late than never and we eagerly welcome the rest of the country to the reality-based community. …

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.

  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations. …

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.