• About Us
  • Careers
  • Brand Partnerships
TFI Official Merchandise
TFI English
TFI हिन्दी
Sunday, February 5, 2023
TFIGlobal
TFIGlobal
Right Arm. Round the World. FAST.
No Result
View All Result
  • Premium
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean
  • Premium
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean
TFIGlobal
TFIGlobal
No Result
View All Result

CIA was spying on us all this while, and we just got to know about it

Shalabh Tewari by Shalabh Tewari
March 12, 2017
in Geopolitics
Reading Time: 4 mins read
0
cia united states wikileaks

Image Courtesy: The Next Web

30
VIEWS
Share on FacebookShare on Twitter

George Orwell in his famous work 1984 depicted a dystopian country, Oceania, which is ruled by Big Brother, the leader of the dictatorship that governs it. The oppressive regime of Oceania keeps a watchful eye on its citizens using cameras just like CCTV these days. Telescreens along with microphones are placed in every apartment where Big Brother broadcasts his propaganda to whitewash people from their individuality. Not only criticizing Big Brother is punishable offence but to think this grave act can also send you behind the bars. Thought police is always vigilant and always ready to send a man to his grave whoever it perceives to be engaged in unlawful activities. It is secret agency just like the nefarious KGB (USSR secret service) without which ‘Big Brother’ can’t dream to rule Oceania without any signs of rebellion.

On March 7, 2017, WikiLeaks opened Pandora’s box by starting a new series of leaks on the U.S. Central Intelligence Agency (Code-named ‘Vault 7’) which is the largest ever publication of confidential documents on the agency.

The first full part of the leaks “Year Zero” comprises of 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It contains information of the CIA’s global covert hacking program in which a wide range of products that include Apple’s iPhone, Google’s Android, Microsoft’s Windows and even Samsung TVs are turned into covert microphones.

Also Read

Biden’s utilises Trinidad and Tobago to fulfil his clandestine intentions

Belize is going to be completely taken over by US in next 10 years

CIA hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence) which is a department that belongs to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major arms of the CIA .The EDG is responsible for the development, testing and support of all malwares, backdoors, exploits, Trojans, viruses used by the CIA in its covert operations all round the world.

The attack against Samsung smart TVs is developed with the cooperation of the United Kingdom’s secret service MI5. When the malware is injected in TV it goes on a ‘Fake-Off’ mode fooling the owner to believe the TV is off when it is on. It records conversations in the room and sends them to a secret CIA server. The leaks also reveal that CIA was also looking to build malwares for the vehicle control systems used in modern cars and trucks. It is most likely that the agency wants to convert the vehicle control systems to assassination devices.

The CIA’s Mobile Devices Branch (MDB) developed numerous malware to hack and control smart phones developed by global giants. Infected phones can be used to send CIA the geo-location, audio and text communications of the user covertly. It can also activate the phone’s camera and microphone. A specialized unit in the CIA’s Mobile Development Branch develops malware to infest and suck data from iPhones and iPads. The special focus on iOS may be explained by the popularity of the iPhone in social, political, diplomatic and business circles.

Google’s Android run devices are not left untouched by CIA.

As of 2016 the CIA had 24 Android “zero days”(malwares) which it has developed itself and obtained some from NSA. In January 2010 IAEA officials who were responsible for monitoring Iran’s nuclear program noticed that the workers of the Natanz nuclear plant were replacing the centrifuges very frequently. It was very odd as each centrifuge has a life expectancy of about 10 years and yet around 2,000 of them were replaced. It was later revealed that the cause of this was a virus ‘Stuxnet’ that had been smuggled into the plant through a pen drive. The development of Stuxnet was done during Bush era to deter Iran from pursuing nuclear aspirations. It is alleged that the malware was a collaborative byproduct of USA and Israel.

CIA can bypass the encryption of social messaging applications like WhatsApp, Telegram and Weibo. The CIA also targets Microsoft Windows users with its malicious spy software. Apart from “zero days “ there is another virus “Hammer Drill” which infects software distributed on DVDs, removable media device such as USBs. Many of these infection programs are planned by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation of CIA malwares “Assassin” and “Medusa”.

It’s much evident that cyber malwares are not possible to keep under effective control. The nuclear programs in the world can be kept under strict monitoring and restrained because of the enormous costs and visible infrastructure involved in assembling fissile material to produce a critical nuclear mass. This is not the case with cyber weapons. Cyber weapons are in fact more dangerous than nuclear weapons in the sense they can be pirated very easily. In the modern world information is power. Since the cyber weapons are entirely comprised of information they can be copied quickly with no marginal cost involved.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to smuggle them without leaving traces. These weapons are double edged swords that can be used against the organizations that produced them. These malicious programs if put into wrong hands can be sold to any other country or terrorist organization for hundreds of thousands dollars to millions of dollars. Companies who may obtain such cyber malware can sometimes use them for their vested interests to obtain advantage over their competitors.

According to Wikileaks, this leak is just the tip of iceberg much is yet to be revealed.

Orwell wrote “Who controls the past controls the future. Who controls the present controls the past” in 1984. In the quest to control the future CIA should not act as a Big Brother. A totalitarian power exerts influence using fear over its subjects by conveying the message that it is omnipresent and omnipotent, which often leads to disastrous consequences.

United States must be wary of that.

Tags: United States of AmericaVault 7Wikileaks Expose
ShareTweetSend
Previous Post

In this country one can technically marry an infant girl

Next Post

Kosovo was once the heart of Serbia, it is now a den of Islamism

Also Read

India-Africa team up to drive out EU

India-Africa team up to drive out EU

February 5, 2023
US’ fear of Wagner is driving it crazy

US’ fear of Wagner is driving it crazy

February 5, 2023
EU Xinjiang

EU’s malicious encashment of forced labour is a revelation of its true evil face

February 4, 2023
Nord Stream US

An energy-secured Germany blames US for Nord Stream sabotage for the first time

February 4, 2023
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms of use and Privacy Policy.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

  • Trending
  • Comments
  • Latest
US Ukraine

Russia unearths USA’s empire of terror in Ukraine

February 4, 2023
World Economic Forum

“Sex, sleaze, and drugs” is what WEF is all about

January 18, 2023
Did Ukraine use innocent civilians as human shield against Russia in the name of evacuation?

Did Ukraine use innocent civilians as human shield against Russia in the name of evacuation?

May 9, 2022
Ukraine weapons

3 nations spoil Biden’s plan to fuel Ukraine war with South American ammunition

January 31, 2023
Orwellian “Ministry of Truth” becomes a reality in Biden’s America

Orwellian “Ministry of Truth” becomes a reality in Biden’s America

April 28, 2022
The Caribbean NATO could be a reality now!

The Caribbean NATO could be a reality now!

February 5, 2023
Proving Their Mettle: St.Kitts and Nevis Takes on Money-Laundering

Proving Their Mettle: St.Kitts and Nevis Takes on Money-Laundering

February 5, 2023
Seeds of hatred have germinated between Trinidad and Tobago and Venezuela

Seeds of hatred have germinated between Trinidad and Tobago and Venezuela

February 5, 2023
Peeling the layers of Iran’s interests in Mauritania

Peeling the layers of Iran’s interests in Mauritania

February 5, 2023
Given Trudeau’s history with Canada’s data, Saskatchewan lashes back

Given Trudeau’s history with Canada’s data, Saskatchewan lashes back

February 5, 2023
Youtube Twitter Facebook
TFIGlobal
  • About us
  • Contact Us
  • Terms of use
  • Privacy Policy

©2023 - TFI MEDIA PRIVATE LIMITED

No Result
View All Result
  • Premium
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean

©2023 - TFI MEDIA PRIVATE LIMITED

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Follow us on Twitter

and never miss an insightful take by the TFIGlobal team

Follow @tfiglobal
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. View our Privacy and Cookie Policy.