Top 15 Discoveries & Implications of Wikileaks CIA Vault 7 – So Far – March 10, 2017

Makia Freeman, ContributorWaking Times Vault 7 has been the subject of a curious and cryptic set of tweets from Wikileaks over the course of the past month or so. Now we know why. In bombshell news, in the greatest leak in Wikileaks history, in the greatest leak in CIA history, a total of 8,761 documents has been released in…

via Top 15 Discoveries & Implications of Wikileaks CIA Vault 7 – So Far —

Vault 7 bombshell just vindicated every conspiracy theorist: The CIA can spy on anyone through TVs, iPhones, smart phones and Windows PCs[Video] – March 07, 2017

Image: Vault 7 bombshell just vindicated every conspiracy theorist: The CIA can spy on anyone through TVs, iPhones, smart phones and Windows PCs

(Natural News) Another deep state bombshell just hit the ‘net with WikiLeaks’ release of over 8,000 pages of once-secret documents from inside the CIA. The release is dubbed “Vault 7.”

While it’s going to take internet sleuths several days to pour through all the documents and find full details of what they reveal, some of the highlights include these bombshells:

Via the WikiLeaks press release:

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones………..