Yes, your smart TV really is spying on you: Leaked docs reveal CIA secretly turned Samsung TVs into microphones that spy on your conversations
03/07/2017 // JD Heyes // Views

For years Deep State insiders and others familiar with the federal government’s spy agencies have been sounding the alarm about the development of technology that enables constant, real-time electronic surveillance of anyone, anywhere, anytime (President Donald Trump, something to consider as you delve into who ordered it against you and why.)

Now, thanks to another whistleblower following in the footsteps for former NSA contractor Edward Snowden, WikiLeaks has provided the proof that these insiders weren’t kooks or conspiracy theorists – they were spot-on. (RELATED: Is Your TV Spying On You? For Millions Of Viewers, The Answer Is YES!)

According to a treasure trove of newly released documents known collectively as “Vault 7” in the “Year Zero” series, not only does the CIA conduct improper electronic surveillance, it does through using technology that can tap into smart TVs, iPhones, Android devices, and other wireless handheld technology.

https://twitter.com/wikileaks/status/839118747646427141

“The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but ‘Weeping Angel,’ developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization,” said a press release from WikiLeaks.

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server,” it added.

Brighteon.TV

So in other words, even if you’ve turned your TV and devices “off,” the CIA’s technology, via wireless connections, can still transform them into listening devices, which records conversations and data and sends them to a remote CIA server for later downloading and analysis.

The government’s spy agencies, then, can literally steal any and all data they want, thereby giving them the power to create false narratives, phony email traffic, fake communiques and anything else they want in an effort to blackmail or destroy anyone they choose.

A journalist getting too close to Deep State activities? No problem – the CIA has the ability to bug their homes remotely, through smart devices, or steal their data and other information that may incriminate them, forcing them into silence.

A politician who opposes expansion of the Deep State’s power? No problem – just a few months’ worth of bugging his or her devices, and the nation’s premier spy agency has all it needs to coerce said problematic politician into playing ball.

“The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones,” said the Wikileaks press release. “Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications, as well as covertly activate the phone's camera and microphone.” (RELATED: Amazon Echo devices spy on you in your own home… police are now trying to acquire those recordings.)

And even though iPhone held a minority share (14.5 percent) of the global market, a specialized CIA unit within the agency’s Mobile Development Branch produced malware that infects, controls and then extracts data from iPhones and other Apple products that are running iOS, like iPads and, presumably, iMacs and Macbook Pro laptops.

A similar unit is said to have targeted Google’s Android devices, which runs the vast majority of the world’s smart phones (about 85 percent, roughly).

“’Year Zero’ shows that as of 2016 the CIA had 24 'weaponized' Android 'zero days' which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors,” said the press release.

“These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

Feel violated yet? You should.

J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.

Sources:

WikiLeaks.org

NaturalNews.com

Newstarget.com



Take Action:
Support Natural News by linking to this article from your website.
Permalink to this article:
Copy
Embed article link:
Copy
Reprinting this article:
Non-commercial use is permitted with credit to NaturalNews.com (including a clickable link).
Please contact us for more information.
Free Email Alerts
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
App Store
Android App
eTrust Pro Certified

This site is part of the Natural News Network © 2022 All Rights Reserved. Privacy | Terms All content posted on this site is commentary or opinion and is protected under Free Speech. Truth Publishing International, LTD. is not responsible for content written by contributing authors. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. Truth Publishing assumes no responsibility for the use or misuse of this material. Your use of this website indicates your agreement to these terms and those published here. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.

This site uses cookies
Natural News uses cookies to improve your experience on our site. By using this site, you agree to our privacy policy.
Learn More
Close
Get 100% real, uncensored news delivered straight to your inbox
You can unsubscribe at any time. Your email privacy is completely protected.