The #1 Paranormal News Site
Wikileaks releases biggest ever batch of CIA documents.
The founder of Wikileaks, Julian Assange, has released an enormous batch of CIA documents in what is believed to be the most extensive leak in the history of the infamous website. Assange is claiming that a number of documents leaked even exceeds those leaked by Edward Snowden in his expose of the National Security Agency and their far-reaching data collection on ordinary citizens. Speaking from his home in the Ecuadorian embassy in London, Assange has said that this is only the first stage of a much larger operation which will reveal the various murky secrets the CIA have been working to keep under wraps.
The first stage of documents, referred to by Assange as Vault 7, refer to the CIA’s ‘Year Zero’ project. The released files indicate the scope of the CIA’s international hacking capabilities and its weaponised exploits against a huge number of American and European products. The documents reveal that the CIA know how to hack iPhones, Android phones and can exploit the Microsoft Windows operating system. The documents also make it clear that the CIA can hack into Samsung televisions and use them as covert microphones. The released files do not explain exactly how the CIA have managed to hack into these products for public safety reasons.
According to Assange, the files were made available to Wikileaks for publication over concerns about whether the CIA had gone too far in its quest to gather information about potential national security threats. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons, ” Assange said in a press statement.
The CIA have declined to comment on the authenticity of the documents released by Wikileaks. Earlier today, a spokesman for the agency, Jonathan Liu told reporters “We do not comment on the authenticity or content of purported intelligence documents.” However, given Wikileaks’ sterling reputation for verifying the authenticity of the documents made available to the organization, it is presumed that the files are indeed genuine.