The true origins of the two World Wars have been deleted from all our history books and replaced with mythology. Neither War was started (or desired) by Germany, but both at the instigation of a group of European Zionist Jews with the stated intent of the total destruction of Germany. The documentation is overwhelming and the evidence undeniable. (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11)
That history is being repeated today in a mass grooming of the Western world’s people (especially Americans) in preparation for World War III – which I believe is now imminent.
Vault 7 has been the subject of a curious and cryptic set of tweets from Wikileaks over the course of the past month or so. Now we know why. In bombshell news, in the greatest leak in Wikileaks history, in the greatest leak in CIA history, a total of 8,761 documents has been released in a series that has been dubbed Vault 7. Even for seasoned conspiracy researchers, the documents are fascinating and horrible at the same time. It confirms the suspicions and knowledge of many investigators. Now we have the proof to substantiate our hunches and intuition. The CIA has been caught with its pants down: spying on its citizens, bypassing encryption to steal their messages, hacking into their electronic devices to listen on their conversations, using US consulates abroad to conduct spying operations, remotely hacking into vehicles (to perform undetectable assassinations) and much more.
Some will be shocked, but really, let’s remember the true nature and purpose of the CIA: a rogue agency that overthrows foreign leaders, install puppet regimes, imports drugs, runs guns and assassinates anyone who gets in the way of its agenda, including US presidents. Wikileaks has stated that it has only released less than 1% of its Vault 7 series, so this is literally the tip of the iceberg. Imagine what else is to come …
Here are the top 15 discoveries and implications of Vault 7 so far:
Vault 7 Discovery/Implication #1: CIA = Virus & Malware Factory
The CIA is not just a rogue agency that runs illegal drugs and weapons, assassinates people, starts wars and conducts regime change. It has also spent untold millions or even billions of dollars developing what is probably the most sophisticated cyber warfare/hacking/spying department on the planet, equalling or even surpassing that of the NSA. Wikileaks reveals that the CIA has its own “hacking division” that is run by its CCI (Center for Cyber Intelligence) which by the end of 2016:
“… had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”
Snowden’s leaks were already bad enough, showing that the NSA was an agency above the law that monitored, surveilled and spied upon just about anyone it wanted, since most people on the planet are within its reach in one way or another. Now, we have confirmation that the CIA is engaging in exactly the same kind activity, or perhaps even worse. Could there be any possible doubt left by anyone that the MIC (Military Intelligence Complex) runs the US Government and the world?
You know how all these companies promise encryption and some even charge more for the service? Guess what? It doesn’t matter! Vault 7 leaked docs shows that the CIA is getting audio files before they get encrypted. The CIA can hack into your phone, compromise your operating system and suck up your messages before they’re encrypted and sent. It doesn’t matter what precautions you’ve taken. Encrypted messaging apps like WhatsApp, Signal, Telegram and many more are vulnerable.
Vault 7 Discovery/Implication #3: Bypassing Computer Operating System
The CIA can hack your computer. In fact, every part of your computer can be bypassed, including your operation system. Per Wikileaks:
“The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools.”
Vault 7 Discovery/Implication #4: Smart TVs become Spy TVs
Two nights ago, Wikileaks started releasing what the whistleblowing platform dubbed as the #Vault7 Series of damaging information into the inner workings of the CIA.
The first iteration “Year 0” describes the specific tools that the Deep State agency has been using against its friends and foes.
Said tools include ways and means to penetrate and control the firmware of your smartphone, smart TV, laptops, desktop computers, and your smart car.
CMOS chip
In fact, any piece of electronic equipment, which has a basic programmable CMOS chip in it, can be manipulated to work according to their whim, for as long as the battery is in place.
Dumb Chips in Smart Appliances
A CMOS chip is composed of several electronic switches which can be used to store instructions and data, when coupled to a power source. Billions of these electronic switches in one chip make a CPU, i.e. the brain inside your laptop.
A firmware is a cross between a software and a hardware. While a software contains instructions for the hardware to comply, a firmware is instruction and hardware in one.
The CMOS is the hardware, and instructions are electrically written, or programmed into it, making the whole assembly as the firmware. It is the first to act when a computer, or any smart devices, is turned on, performing the necessary bootstrap preparations, self-checking routines, and loading the operating system.
Without the instruction starting at the firmware, any hardware or gadget is just a piece of junk.
Laptops, personal computers, and similar devices are all using CMOS firmware that are usually connected to a coin battery, so that even if it looks like the appliance is switched off, it is not.
Coin battery supplying power to the CMOS functioning as the BIOS, or firmware, on a PC motherboard.
CMOS in smart appliances is far more advanced which may also employ supercapacitors, which can store large amounts of energy.
Solid state storage disks used in your laptop, for example, are not only made up of thousands of CMOS chips, but is also utilizing supercapacitors as its own source of power to maintain data. In short, the embedded power source may not, at all times, look like a battery, and the appliance need not be connected to any convenience outlet.
Even our smartphone’s camera sensor is also made up of CMOS chip…
The sensor technology, called CMOS, is increasingly being used in today’s cameras, allowing users to shoot 1080p video and apply complex imaging effects with ease. Traditionally, CCD sensors have been thought to produce better-looking images with less visual noise and distortion, but they draw more power and provide slower data-throughput speed.
URGENT IMPORTANT -- FINANCIAL ASSISTANCE NEEDED FOR A YOUNG BOY 14 Y OLD WITH BRAIN CANCER
Dear Friends,
I have never asked any money/donations for myself in my blogs (400) but this is an exceptional emergency. Please help the best you can to assist Isabelle, our French Coordinator, to alleviate as much as possible her step son's health condition.
You can donate through Kees De Graaff
Type your recurring amount here:
The email address connected with Kees Paypal account is keesdegraaff@gmail.com