Home   Bookmark and Share

 Print Friendly and PDF

8,000 Documents Detail CIA Crimes — But US Media Won’t Touch Them

Hats off to our so-called free press

By Paul Kaiser

Even with our pragmatic worldview, the western media consistently performs well below our already extremely low expectations.

It's now been roughly 24 hours since Wikileaks released more than 8,000 documents detailing the CIA's "global covert hacking program".

And the leaks (known as "Vault 7") haven't even finished yet. As the Independent notes, "when taken together, Vault 7 will make up the biggest intelligence publication in history."

Considering how much the U.S. media loves to gossip about spies and hacking, you would expect around-the-clock coverage and analysis of these leaks.

After all, they detail how:

 

  • CIA has espionage division more powerful than NSA with no checks and balances.
  • CIA’s secret hacking division produced a huge about of weaponized malware to infest iPhone, Android phones — and lost control of it.
  • CIA loses control of entire cyber weapons arsenal due to negligence.
  • Obama’s CIA built most powerful cyber attack arsenal, costing U.S. taxpayers $100+ billion. Lost it due to negligence.
  • CIA illicitly hoarded “zero day” attacks, putting business and government at risk.
  • Obama admin used their advanced cyber attack arsenal against private citizens.
  • CIA inserted CIA coders in major U.S. tech companies to implement backdoors directly.
  • CIA can turn smart TVs, iPhones, gaming consoles and many other electronicc devices into open mics.
  • CIA can spy on you through your smart TV.
  • CIA can turn all internet-enabled consumer electronic devices into listening devices.
  •  CIA has backdoors to every PC running Microsoft.
  • Skype voice conversations are converted into text and stored in CIA spy cloud.
  • CIA has backdoor access to basically anything produced by Microsoft, Apple, Cisco and Google.
  • CIA can remotely control cars, planes, and hospital devices — a useful technique for assassinations.
  • CIA malware is used to spy on journalists, discover sources of leaks.
  • U.S. Consulate in Frankfurt is a covert CIA hacking center.
  • CIA uses Russian malware, leaves fake “fingerprints” to “misdirect attribution” of cyber attacks.

The documented criminality is quite extensive.

 
 

And yet, here are some screengrabs we took early this morning (Moscow Time) — around 18 hours after the leaks were released.

Unless you look hard, you would never know that we are witnessing a historic public disclosure about an intelligence agency's vast criminality:

 

 
Well done, Fox. The only mention of the leaks is in the form of "how do we punish leaks?" That's reassuring.

 

MSNBC took a similar route. A former CIA director says that CIA leaks showing CIA crimes are dangerous!

NPR was too busy reporting on Hitler's cocaine use. (They have an article about the leaks, if you scroll down past their latest scoop on the Dakota Access Pipeline.)

CNN WINS! CNN actually alluded to possible wrongdoing by the CIA!

Nothing surprising here. Why would the CIA want to report about its own crimes?

The views expressed in this article are solely those of the author and do not necessarily reflect the opinions of Information Clearing House.

 Break Free From The Matrix

Get Our Free Daily Newsletter
 Get access to exclusive news not available in the main stream Media

This article was first published at RI

Click for Spanish, German, Dutch, Danish, French, translation- Note- Translation may take a moment to load.

What's your response? -  Scroll down to add / read comments 

 Please read our  Comment Policy before posting -
It is unacceptable to slander, smear or engage in personal attacks on authors of articles posted on ICH.
Those engaging in that behavior will be banned from the comment section.
 
 

 

  

In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Information Clearing House has no affiliation whatsoever with the originator of this article nor is Information ClearingHouse endorsed or sponsored by the originator.)

Privacy Statement