What Is the CIA Hack All About?
The danger lies in what might be coming next
By Philip Giraldi • Unz Review • March 14, 2017
The WikiLeaks exposure of thousands of documents relating to the Central Intelligence Agency’s (CIA) hacking program, which was expanded dramatically under President Barack Obama between 2013 and 2016, has created something of a panic in the users of cell phones, online computers and even for smart television viewers. The documents describe “more than a thousand hacking systems, trojans, viruses and other ‘weaponized’ malware” and one document even identifies attempts to enable CIA controllers to take control of automobiles that have “On Star” or similar satellite interactive features.
According to analysts who have gone through the documents, any electronic device that is connected to the internet is reported to be vulnerable to being taken over and “weaponized,” manipulated through its microphone or camera function even if it appears to be turned off. Apple, Google, Android and Microsoft products were among the technologies that were targeted, with the security systems being constantly probed for vulnerabilities. When a flaw was discovered it was described as “zero day” because the user would have zero time to react to the detection and exploitation of the vulnerability.
And they are indeed everywhere. Ron Paul has described a woman’s test on the Amazon marketed interactive voice controlled device called Alexa, asking it if it were reporting to the CIA. Alexa, which allegedly cannot tell a lie, refused to answer.
According to Wikipedia, “Alexa is an intelligent personal assistant developed by Amazon Lab126, made popular by the Amazon Echo. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, and other real time information.” One reviewer observed “In a good but scary feature, Amazon Echo can learn a person’s habits over time. It will get used to the way a person talks, his/her habits and routines and will save all the data in the cloud.”
Alexa demonstrates that CIA and NSA intrusion into the lives of ordinary people is not unique. In the cyber-sphere there are many predators. Amazon has apparently run special sales to get Alexa devices into as many homes as possible, presumably for commercial reasons, to have a machine in one’s home that will eventually replace the cookies on computers that collect information on what people are interested in buying. The company’s president Jeff Bezos also recently completed a deal worth $600 million for Amazon to provide cloud hosting services for the Agency. And there are, of course, two clear conflicts of interest in that deal as Bezos is selling a device that can be hacked by the government while he also owns The Washington Post newspaper, which, at least in theory, is supposed to be keeping an eye on the CIA.
But spying for profit and spying by the government are two different things and the WikiLeaks revelations suggest that the CIA has had a massive program of cyberespionage running for a number of years, even having created a major new division to support the effort called the Directorate for Digital Innovation, with an operation component called the Center for Cyber Intelligence. Media reports also suggest that a major hub for the operation was the American Consulate General in Frankfurt Germany, where the Agency established a base of operations.
First of all, it is necessary to make an attempt to understand why the CIA believes it needs to have the capability to get inside the operating systems of phones and other devices which rely on the internet. It should be pointed out that the United States government already has highly developed capabilities to get at phones and other electronics. It is indeed the principal raison d’etre of the National Security Agency (NSA) to do so and the FBI also does so when it initiates wiretaps during criminal and national security investigations.
Beyond that, since the NSA basically collects all electronic communications in the United States as well as more of the same fairly aggressively overseas, it would seem to be redundant for the CIA to be doing the same thing. The CIA rationale is that it has a different mission than the NSA. It exists to conduct espionage against foreign intelligence targets, which frequently requires being able to tap into their personal phones or other electronic devices by exploiting vulnerabilities in the operating systems. As the targets would be either sources or even prospective agents, the Agency would have to protect their identity in the highly compartmented world of intelligence, making outsourcing to NSA problematical.
This need to develop an independent capability led to the development of new technologies by the CIA working with its British counterparts. There were apparently successful efforts to target Samsung “smart” televisions, which would use their speakers to record conversations even when the set was turned off. The project was called “Weeping Angel,” and other hacking programs were called “Brutal Kangaroo,” “Assassin,” “Hammer Drill,” “Swindle,” “Fine Dining” and “Cutthroat,” demonstrating that government bureaucrats sometimes possess a dark sense of humor.
Being able to enter one’s home through a television would be considered a major success in the intelligence world. And the ability to access cell phones at source through obtaining full control of the operating system rather than through their transmissions means that any security system will be ineffective because the snoopers will be able to intrude and hear the conversation as it is spoken before any encryption is applied. CIA and its British allies were reportedly able to take control of either Android or i-Phones through vulnerabilities in their security systems by using their attack technologies.
WikiLeaks claims to have 8,761 documents detailing efforts to circumvent the security features on a broad range of electronic devices to enable them to be remotely tapped, the information having apparently been passed to WikiLeaks by a disgruntled government contractor, though the Russians are perhaps inevitably also being blamed. The U.S. government has apparently been aware of the theft of the information for the past year and one presumes it has both done damage control and is searching for the miscreant involved. Also, there have been security fixes on both Apple and Android phones in the past year that might well have rendered the attack technologies no longer effective.
So many will shrug and wonder what the big deal is. So the CIA is tapping into the electronics of suspected bad guys overseas. Isn’t that what it’s supposed to do? That question has to be answered with another question: How do we know if that is all the CIA is doing? Technology that can attack and take control of a telephone or television or computer overseas can also do the same inside the United States. And the Agency can always plausibly claim that a connection with a suspect overseas leads back to the U.S. to enable working on related targets on this side of the Atlantic.
Another issue is the possibility to engage in mischief, with potentially serious consequences. The WikiLeaks documents suggest that the CIA program called UMBRAGE had been able to acquire malware signatures and attack codes from Russia, China, Iran and other places. It does that so it can confuse detection systems and preserve “plausible denial” if its intrusion gets caught, disguising its own efforts as Russian or Chinese to cast the blame on the intelligence services of those countries. It has been alleged that the hack of the Democratic National Committee computers was carried out by Moscow employed surrogates and part of the evidence produced was signature malware that had left “fingerprints” linked to Russian military intelligence in Ukraine. What if that hack was actually done by the CIA for domestic political reasons?
Critics have also pointed out that President Obama in 2014 had come to an agreement with major communications industry executives to share with manufacturers information regarding the vulnerabilities in their systems so they could be addressed and made secure. This would have benefited both the industry and the general public. The agreement was obviously ignored in the CIA case and is just another sign that one cannot trust the government.
However, the real downside regarding the CIA hacking is something that might not even have occurred yet. It is an unfortunate reality that government spying operations largely lack regulation, oversight or any effective supervision by Congress or anyone else outside the agencies themselves. Even if knowledge about communications vulnerabilities has not been employed illegally against American targets or to mislead regarding domestic hacks, the potential to use those capabilities once they are in place will likely prove too hard to resist. As such, no home or work environment will any more be considered a safe place and it is potentially, if not actually, the greatest existing threat to Americans’ few remaining liberties.
Share this:
Related
March 14, 2017 - Posted by aletho | Civil Liberties, Corruption, Deception, Timeless or most popular | CIA, Human rights, NSA, Obama, UK, United States
No comments yet.
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Featured Video
NEW FAUCI EMAILS EXPOSE ATTACK ON NATURAL IMMUNITY
or go to
Aletho News Archives – Video-Images
From the Archives
Elite Western universities are a corrupt, parasitic empire
Instead of high-quality education, these institutions are fostering a global neo-feudal system reminiscent of the British Raj
By Dr. Mathew Maavak | RT | May 30, 2025
In a move that has ignited a global uproar, US President Donald Trump banned international students from Harvard University, citing “national security” and ideological infiltration. The decision, which has been widely condemned by academics and foreign governments alike, apparently threatens to undermine America’s “intellectual leadership and soft power.” At stake is not just Harvard’s global appeal, but the very premise of open academic exchange that has long defined elite higher education in the US.
But exactly how ‘open’ is Harvard’s admissions process? Every year, highly qualified students – many with top-tier SAT or GMAT test scores – are rejected, often with little explanation. Critics argue that behind the prestigious Ivy League brand lies an opaque system shaped by legacy preferences, DEI imperatives, geopolitical interests, and outright bribes. George Soros, for instance, once pledged $1 billion to open up elite university admissions to drones who would read from his Open Society script.
China’s swift condemnation of Trump’s policy added a layer of geopolitical irony to the debate. Why would Beijing feign concern for “America’s international standing” amid a bitter trade war? The international standing of US universities has long been tarnished by a woke psychosis which spread like cancer to all branches of the government.
So, what was behind China’s latest gripe? ... continue
Blog Roll
-
Join 2,406 other subscribers
Visits Since December 2009
- 7,293,186 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen ZionismRecent Comments
seversonebcfb985d9 on Villains of Judea: Philip Esfo… loongtip on Report warns that ‘Jewish terr… Craig Nelms on New study shows that toxic gas… loongtip on A Funny Thing Happened on the… loongtip on EU free trade pact on hold as… John Edward Kendrick on Regime Change In Iran Is The F… Bill Francis on Australia Passes New Hate Spee… seversonebcfb985d9 on Australia Passes New Hate Spee… Bill Francis on Britain’s AI Policing Plan Tur… loongtip on Miami Beach Resident Questione… loongtip on Israeli agricultural export co… loongtip on The War On Free Speech In Aust…
Aletho News- NEW FAUCI EMAILS EXPOSE ATTACK ON NATURAL IMMUNITY
- Why is the US using Jordan as the main base in possible Iran attack?
- American Academy of Pediatrics Hit With Federal RICO Lawsuit for Vaccine Safety Fraud
- Mom Tells Trump: Dumping Sewage Sludge on Farmland Won’t Make America Healthy Again
- NIAID Funds Gain-of-Function Study Engineering Novel Influenza Viruses
- Villains of Judea: Philip Esformes and the Largest Healthcare Fraud in American History
- US sanctions Popular Conference for Palestinians Abroad over alleged Hamas links
- You reap what you sow: Ukraine’s blackout is Zelensky’s failure
- Ukraine Blackouts Caused by Zelensky’s Terrorist Attacks on Russia
- Orban Hits Out at EU Green Light for $1.5 Trillion Ukraine Aid
If Americans Knew- Oppose Israel’s Abuses While You Still Can
- UNRWA Heads Tell Ha’aretz: ‘We Don’t Radicalize Palestinians – Their Lived Existence Does’
- Plans Call for “New Rafah” Built in Israel’s Image — Without Palestinians
- Posing as priest, reporter is spat at many times, highlighting anti-Christian sentiment in Israel
- Leaked Documents: “Planned Community” in Rafah Would Force Palestinians Into Israeli Panopticon
- ‘Permits of Humiliation’: How Israel Strangles Christian Education in Jerusalem
- “The world sees death, destruction and injustice – and they see dollar signs” – Not a ceasefire Day 105
- War criminal Netanyahu kills 11 in Gaza, joins Board of Peace – Not a ceasefire Day 104
- Another baby dies of cold in Gaza, as Rafah crossing remains locked down – Not a ceasefire Day 103
- Brutal Beatings, Arson, and Impunity: A Palestinian Plant Nursery Becomes a Target for Settler Pogroms
No Tricks Zone- New Study: Sea Levels Rose 20 Times The Modern Rate During The Roman Warm Period
- As German Gas Storage Dips Dangerously Low…Shortage Hardly Avoidable
- New Study: Brazil’s Relative Sea Level Was 2+ Meters Higher And SSTs 3-4°C Warmer 6000 Years Ago
- Philosopher Schopenhauer: Climate Science Certainty Stems From Stupidity, Ignorance
- New Study: Species Extinction Rates Declining Since 1980 – ‘Climate Change Is Not An Important Threat’
- Denmark Places Climate Protection Above Animal Welfare, Poisoning And Culling Cows
- New Study: Greenland Was 3-7°C Warmer And Far Less Glaciated Than Today 6000-8000 Years Ago
- German Media Report That Current Frigid Weather Can Be Explained By Arctic Warming!
- Berlin Blackout Shows Germany’s $5 Trillion Green Scheme Is “Left-Green Ideological Pipe Dream”
- Modeling Error In Estimating How Clouds Affect Climate Is 8700% Larger Than Alleged CO2 Forcing
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

Leave a comment