WIKILEAKS Schedules Press Conference For VAULT 7 – HACKED – CONTINGENCY PLAN IS ACTIVATED.

by Pamela Williams
This is a huge story, and it is developing. WIKILEAKS was to hold a live news conference that was to be streamed on Facebook, but the event was hacked! Thus, WIKILEAKS had to use their contingency plan. They released CIA DOCUMENTS through a file. I downloaded the file, but my computer will not let me open it. I am working on that right now. WIKILEAKS will be having the conference at a later date. This is huge new, and I collected comments from around the web. I would like to share some of those here”
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
THE DOWNLOAD FOR THE FILE IS AT THE BOTTOM OF MY REPORT. MY VIRUS SCAN SAYS IT IS SAFE, BUT MY COMPUTER WILL NOT LET ME OPEN IT.
SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
PassPhrase
CIA CHART

 
?Cris@ThePatriot143 · 9 min.
BREAKING : Howard Dean Tweets Shocking Admission Trump Wiretapping Occurred

pbs.twimg.com/media/C6UhJgyUoAAHYHm.jpg:large

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.
This is an interesting PDF.
Inside the EquationDrug Espionage Platform – Securelist.pdf
It talks about a Trojan Platform they used.
Quote: EquationDrug is one of the main espionage platforms used by the Equation Group, a highly sophisticated threat actor that has been engaged in multiple CNE (computer network exploitation) operations dating back to 2001, and perhaps as early as 1996. (See full report here [PDF]).
EquationDrug, which is still in use, dates back to 2003, although the more modern GrayFish platform is being pushed to new victims.
The hackers online are going nuts. This gives them the ability to hack everything. Example:
twitter.com/WDFx2EU89/status/839116067012284417
pbs.twimg.com/media/C6UgRTJXQAQeBup.jpg:large

Displaying C6UgAO9U4AAo8pO.jpg
https://gm1.ggpht.com/ejOYpno_kGmP-RyPKzQPBkFxlQzfs9356PZe6DA7I47OXdJ2HoktinXD3zyKhUdAz1rPXE5znSTm9eAHCJISviqfcFnGslZHhLX341tPvJo7i3MD-M4F-m4H4MhTvWPkWjY9z6HNzEqOfWzg0VYm9RKr4xJqOwZRoAb6J4WyR_cIJZ1Q2Rk_ZkegSj7cd7LV0H3sC-O2ePi1G-YkfKb0_OlA6c9f4oBArM82JfqWBJ--L4YjaCm0rW5XW9lIo4uOZNvbSaMdrwN-IaPOd0eNV7dAFtbXoSa_ygnkJzCZPyTAMvxTYzog1K-MXKxm6GW4XePwzG2Sgwm12gaXSKKxkAGRT_z67HK7pV-lLpcc5VR3YaxJPBIrF89UR4VFH4tMK3QMo-CQ68ezjI10sQ4m3vygtLey8aOSlqIBiFVzTKmcHFFqA4cSPiGzCW08oSIoZFamP3ZBRliASK0HJcuSmyfFihZRC6PQstS_4tNjTwVnPzr3iEXTBCm02JFZT1OHrUq2d6J2cx8YF6PDgEO9XzPEMGU8CnHOioNwlf6NZmq058bBh7YDDzOxTMNVrCLNy5EPLmKJhnU93drK-JXNew7h1yQPzFi4zr12gqJENgToxG83zPzWef91xhtw3-h053Kk_SV1ooYv4vBgoxmtOFysTfzl9_6WbnNjTJYoxSsEeuvuWoGatnuZbY5KqwJfhyB-oaZaSOvPzTEcVCAa5HuszAqEEw=w898-h752-l75-ft
twitter.com/wikileaks/
Recently, the CIA lost control of the majority of its hacking arsenal including m@lw@re, viruses, troj@ns, weaponized “zero day” exploits, malw@re remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions.
RELEASE: CIA Vault 7 Year Zero decryption passphrase:
SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds?
THE FOLLOWING ARE LINKS TO PAGES YOU WILL WANT TO READ:
wikileaks.org/ciav7p1/cms/page_13763491.html
live-video.leadstories.com/3401146-live-video-wikileaks-press-conference-about-vault-7-year-zero-release.html
twitter.com/wikileaks/status/838910359994056704/photo/1?ref_src=twsrc%5Etfw
live-video.leadstories.com/3401146-live-video-wikileaks-press-conference-about-vault-7-year-zero-release.html
THIS IS THE VAULT 7 HOME PAGE:
wikileaks.org/ciav7p1/
archive.is/Kc6H9
 
I hope you gain knowledge and are able to get to all the links and anything I have shared. I hope you can open the below file. I look forward to what yet is to come from WIKILEAKS. But the fact that they were hacked and stopped today is extremely unbelievable. We are in an information war, and the powers that be are trying to shut us down. I will continue to plod along and get all that I can, as long as my computer holds up.
IWB is an amazing website, and they continue to try to inform you guys. We all must pray for President Trump, as now we truly can see what he
is up against. Pray for us all, as we continue to do the best we can in a world gone mad.
 
– CIA had espionage division more powerful than NSA with no checks and balances whatsoever.
– CIA’s secret hacking division produced a huge amount of weaponized malware to infest Iphone, Android phones AND lost control of it.
– CIA negligence sees it losing control of all cyber weapons arsenal sparking serious proliferation concerns.
– Obama CIA built most powerful cyber attack arsenal, costing US taxpayers $100+ billion. Lost it ALL to the enemy as previously stated.
– This whole thing got leaked on the “darkside” to hackers, but was later released to Wikileaks by one of the hackers that possessed it.
– CIA illicitly hoarded ‘zero day’ attacks, putting at risk industry and government.
– Obama admin used their advanced cyber attack arsenal against private citizens. Wikileaks implies Trump was spied on with this.
– CIA hackers celebrated what they saw as the financial largesse of Obama towards them with a “Obama Make it rain” gif.
– Obama gave unlimited power to the CIA to gain favors and not end up like JFK.
– CIA went from searching for zer0-days via code analysis to inserting CIA coders in major US tech companies to implement backdoors directly.
– CIA turns Smart TVs, Iphones, gaming consoles and many other consumer gadgets into open microphones.
– CIA can spy on you through your smart TV.
– Jointly developed CIA+MI5 malware infests Samsung smart TVs to turn them into covert microphones.
– CIA turned all internet enabled consumer electronics in the world into listening devices.
– CIA turned every Microsoft Windows PC in the world into spyware. Can be activated backdoors on demand, including via Windows update.
– ^ESPECIALLY Windows 10.
– Skype voice conversations are converted into text in real-time, scanned for contents of interest and stored in CIA spy cloud.
– CIA = Microsoft, Apple, Cisco, Google.
– CIA has tools to remote control chips in cars, trucks, planes, medical devices and hospital tech with assassination potential.
– CIA hacker malware a threat to journalists: Infests Iphone, Android bypassing signal confide encryption.
– US Consulate in Frankfurt is a covert CIA hacker base
– CIA deliberately mimics the hacking protocols of Russia to obfuscate their own hacks.
 

Related Posts:

We truly are under attack. We need user support now more than ever! For as little as $10, you can support the IWB directly – and it only takes a minute. Thank you. 1,203 views
Related Posts: