TFIGlobal
TFIGlobal
TFIPOST English
TFIPOST हिन्दी
No Result
View All Result
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean
TFIGlobal
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean
No Result
View All Result
TFIGlobal
TFIGlobal
No Result
View All Result
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean

CIA was spying on us all this while, and we just got to know about it

Shalabh Tewari by Shalabh Tewari
March 12, 2017
in Geopolitics
cia united states wikileaks

Image Courtesy: The Next Web

Share on FacebookShare on X

George Orwell in his famous work 1984 depicted a dystopian country, Oceania, which is ruled by Big Brother, the leader of the dictatorship that governs it. The oppressive regime of Oceania keeps a watchful eye on its citizens using cameras just like CCTV these days. Telescreens along with microphones are placed in every apartment where Big Brother broadcasts his propaganda to whitewash people from their individuality. Not only criticizing Big Brother is punishable offence but to think this grave act can also send you behind the bars. Thought police is always vigilant and always ready to send a man to his grave whoever it perceives to be engaged in unlawful activities. It is secret agency just like the nefarious KGB (USSR secret service) without which ‘Big Brother’ can’t dream to rule Oceania without any signs of rebellion.

On March 7, 2017, WikiLeaks opened Pandora’s box by starting a new series of leaks on the U.S. Central Intelligence Agency (Code-named ‘Vault 7’) which is the largest ever publication of confidential documents on the agency.

The first full part of the leaks “Year Zero” comprises of 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It contains information of the CIA’s global covert hacking program in which a wide range of products that include Apple’s iPhone, Google’s Android, Microsoft’s Windows and even Samsung TVs are turned into covert microphones.

Also Read

Colombia UFO Discovery: Is the Buga Sphere Evidence of Alien Contact?

Massive Loggerhead Sea Turtle ‘Pennywise’ Rescued After Boat Strike Off Florida Coast

The Firebombing That Almost Happened: What Joseph Neumayer’s Case Says About America?

CIA hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence) which is a department that belongs to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major arms of the CIA .The EDG is responsible for the development, testing and support of all malwares, backdoors, exploits, Trojans, viruses used by the CIA in its covert operations all round the world.

The attack against Samsung smart TVs is developed with the cooperation of the United Kingdom’s secret service MI5. When the malware is injected in TV it goes on a ‘Fake-Off’ mode fooling the owner to believe the TV is off when it is on. It records conversations in the room and sends them to a secret CIA server. The leaks also reveal that CIA was also looking to build malwares for the vehicle control systems used in modern cars and trucks. It is most likely that the agency wants to convert the vehicle control systems to assassination devices.

The CIA’s Mobile Devices Branch (MDB) developed numerous malware to hack and control smart phones developed by global giants. Infected phones can be used to send CIA the geo-location, audio and text communications of the user covertly. It can also activate the phone’s camera and microphone. A specialized unit in the CIA’s Mobile Development Branch develops malware to infest and suck data from iPhones and iPads. The special focus on iOS may be explained by the popularity of the iPhone in social, political, diplomatic and business circles.

Google’s Android run devices are not left untouched by CIA.

As of 2016 the CIA had 24 Android “zero days”(malwares) which it has developed itself and obtained some from NSA. In January 2010 IAEA officials who were responsible for monitoring Iran’s nuclear program noticed that the workers of the Natanz nuclear plant were replacing the centrifuges very frequently. It was very odd as each centrifuge has a life expectancy of about 10 years and yet around 2,000 of them were replaced. It was later revealed that the cause of this was a virus ‘Stuxnet’ that had been smuggled into the plant through a pen drive. The development of Stuxnet was done during Bush era to deter Iran from pursuing nuclear aspirations. It is alleged that the malware was a collaborative byproduct of USA and Israel.

CIA can bypass the encryption of social messaging applications like WhatsApp, Telegram and Weibo. The CIA also targets Microsoft Windows users with its malicious spy software. Apart from “zero days “ there is another virus “Hammer Drill” which infects software distributed on DVDs, removable media device such as USBs. Many of these infection programs are planned by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation of CIA malwares “Assassin” and “Medusa”.

It’s much evident that cyber malwares are not possible to keep under effective control. The nuclear programs in the world can be kept under strict monitoring and restrained because of the enormous costs and visible infrastructure involved in assembling fissile material to produce a critical nuclear mass. This is not the case with cyber weapons. Cyber weapons are in fact more dangerous than nuclear weapons in the sense they can be pirated very easily. In the modern world information is power. Since the cyber weapons are entirely comprised of information they can be copied quickly with no marginal cost involved.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to smuggle them without leaving traces. These weapons are double edged swords that can be used against the organizations that produced them. These malicious programs if put into wrong hands can be sold to any other country or terrorist organization for hundreds of thousands dollars to millions of dollars. Companies who may obtain such cyber malware can sometimes use them for their vested interests to obtain advantage over their competitors.

According to Wikileaks, this leak is just the tip of iceberg much is yet to be revealed.

Orwell wrote “Who controls the past controls the future. Who controls the present controls the past” in 1984. In the quest to control the future CIA should not act as a Big Brother. A totalitarian power exerts influence using fear over its subjects by conveying the message that it is omnipresent and omnipotent, which often leads to disastrous consequences.

United States must be wary of that.

Tags: United States of AmericaVault 7Wikileaks Expose
ShareTweetSend
Shalabh Tewari

Shalabh Tewari

music aficionado, avid quizzer, interested in geopolitics and strategic affairs, bibliophile

Also Read

UK to go on the offensive, will initiate cyberattacks on Russia and China

UK to go on the offensive, will initiate cyberattacks on Russia and China

May 31, 2025
Russia rewards it soldiers for F-16 takedowns as S-400 proves it capabilities against Ukraine and Pakistan

Russia rewards it soldiers for F-16 takedowns as S-400 proves it capabilities against Ukraine and Pakistan

May 31, 2025
Israel Approves 22 New Settlements in West Bank

Israel Approves 22 New Settlements in West Bank Amid International Concerns

May 30, 2025
Vucic betrays Putin? Russian agencies find Serbia firms providing ammunition to Ukraine

Vucic betrays Putin? Russian agencies find Serbia firms providing ammunition to Ukraine

May 30, 2025
How Turkey Undermines the Alliances It Claims to Support

Is Turkey Playing Both Sides—or Playing Everyone?

May 30, 2025
Russian deputy mayor and war hero Zaur Gurtsiev assassinated in blast, Ukraine hand suspected

Russian deputy mayor and war hero Zaur Gurtsiev assassinated in blast, Ukraine hand suspected

May 30, 2025
Youtube Twitter Facebook
TFIGlobalTFIGlobal
Right Arm. Round the World. FAST.
  • About Us
  • Contact Us
  • TFIPOST – English
  • TFIPOST हिन्दी
  • Careers
  • Brand Partnerships
  • Terms of use
  • Privacy Policy

©2025 - TFI MEDIA PRIVATE LIMITED

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean
TFIPOST English
TFIPOST हिन्दी

©2025 - TFI MEDIA PRIVATE LIMITED

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. View our Privacy and Cookie Policy.