I can’t count the amount of emails and questions that I was receiving weeks before WikiLeaks did their data dump on the mysterious Vault 7. Most of the armchair conspiracy theorists who listen to me would send me pictures of the Svalbard Global Seed Vault in Norway saying they are about to reveal what is inside. I would reply that seeds and DNA are being stored in this vault in case of a cataclysm and how is this news? What is the big mystery? It is a seed vault – I was thinking this is disinformation and not worth my time.
Well, now I realize the whole story was not about the seed vault at all but a highly important data dump that WikiLeaks released yesterday.
In the Vault 7 dump, we see that the Octopus has been revealed as fact and that the work that was originally done by reporter Danny Casolaro has been vindicated.
The Octopus can be defined as a vast, interlocking network of criminal conspiracy that reaches into every branch and agency of the U.S. government, many other national governments, and every sector of our society.
The Vault 7 dump shows just how the tentacles of power use backdoor technology to spy on you. Additionally, the Vault 7 documents prove the CIA not only has an enormous arsenal of hacking tools and malware at its disposal, but the agency also has a cache of exploits that essentially allow it to take backdoor control of smart phones, televisions, gaming systems and more and turn them into live microphones.
For conspiracy theorists aware of the clandestine spy apparatus in this country, what is being revealed is really nothing new, but the details are jaw dropping and confirm what every conspiracy theorist warned about and what the Octopus conspiracy tried to illustrate.
Back in 1991, Danny Casolaro told his friends he was meeting an informant to “bring back the head of the Octopus” when his body was found in a hotel in Martinsburg, West Virginia.
Much of the evidence he had gathered was missing. The death was ruled a “suicide”, but the evidence supports murder. He never had the chance to write the book he was working on called “The Octopus.”
Casolaro’s investigation began with his inquiry into the case of Inslaw, from whom the U.S. Justice Department stole a software package called PROMIS and sold it to governments and financial institutions around the world, after modifying it to provide a back door by which they would track the movement of assets and spy on various government operatives.
However, Casolaro realized that the tentacles of the Octopus were reaching into the lives of the average American – the government was planning to devise a huge network to spy on American citizens and Vault 7 now confirms in more detail how this Octopus is now growing and how it has been ever present in our society.
A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”
WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.
Among the more notable disclosures which, if confirmed, “would rock the technology world”, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”
Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, WikiLeaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states, including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover key loggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.
The truth veiled in conspiracy theory has been talked about for a long time and now that the CIA appears to be working for the shadow government – the guns they have turned on the American people are now backfiring in a huge data dump.
Now we see that conspiracy theory is confirmed again as the new Spygate controversy reveals that our CIA has been using third world banana republic tactics to silence opposition, take down regimes not beholden to their world view, using advanced technology to both spy and monitor on American citizens, infringing on our civil rights like nothing we’ve ever seen before.
The Central Intelligence Agency now can mimic foreign intelligence agencies’ hack attacks by leaving electronic “fingerprints” creating the false impression of a foreign intrusion into computer networks.
This is a lot like how the PROMIS software operated back when Danny Casolaro was digging his way through the tentacles of the Octopus black intelligence ops.
The CIA can hack computer networks and leave behind convincing evidence that somebody else did it – does this send a signal that any and all so called Russian infiltration of the elections or anything else is a “False Flag” that is meant to destabilize our government in hopes to replace it with a covert globalist command?
In fact, Vault 7 and the term, Year Zero used by its informant is much like the term, Ground Zero, as it means that the clean slate or the wiping out of all things must be accomplished in order to start over.
The idea behind Year Zero is that all culture and traditions within a society must be completely destroyed or discarded and a new revolutionary culture must replace it, starting from scratch. All history of a nation or people before Year Zero is deemed largely irrelevant, as it will ideally be purged and replaced from the ground up. Year Zero is associated with the Purge of a society in order for a new and greater one to emerge from the ashes of its destruction.
The United Sates is being destroyed through a series of controlled demolitions and espionage. Espionage, after all, is all about deception and covering tracks. Things aren’t what they seem and the motives of those creating an illusion aren’t easily discerned.
It is hard to know what to believe, and it opens the door to head-spinning possibilities and far-out theories.
This is a “looking glass operation” where electronic surveillance creates and promotes an air of Orwellian double-think.
Despite all this intrigue, it needs to be said that the CIA does some valuable work to advance U.S. interests in the world. But at what cost are they supposed to spread the illusion of a utopian empire and is this empire ours? Or, is it a New Year Zero globalist objective where the CIA has caved for the agenda of a state socialist world order?
The globalist government tentacles are in the media, in the schools and in our neighborhoods. We have the government we see, and another government that has been called the Shadow Government led by individuals in the shadows using well-placed programming and covering the tracks of “agents” that act on behalf of the New World Order.
The head of the multi-tentacle octopus of Intelligence and continuity of Government has been in power at crucial moments before this Intelligence was dumped. The wall of secrecy has been in place for decades. The Intelligence Wall was first erected just after World War II with the importing of NAZI intelligence ops that formed THE ORG.
A well-fed octopus cabal called, ODESSA, was a three–tentacled plan which included the safe passage to hardcore Nazis in South and Central America, Mexico and the Middle East, and for transporting Nazi gold, mostly looted treasure from the Reich bank. The third tentacle was a far–reaching one and is responsible for the Cold War and placing Russia and the United States in position of creating Hitler’s vision of a baptism by fire and the rising of the Reich from the ashes of the world.
Otto Skorzeny was captured as a war criminal but was secretly released to American authorities in 1947. Settling in Madrid on the payroll of the US Government he created the International Fascista in 1952. He and several other former Nazis were eventually placed in the Middle East by the CIA to protect Israel from the Communists. They trained Palestinian terrorists groups that to this day are responsible for the constant wars that are happening there.
To this day, false flag attacks are being carried out by unknown stay behind groups of the Fascista. Western intelligence has always used hired terror agents to carry out operations to warrant all-out war.
It was the French government who had advocated and presided over the arming of terrorist groups across the Arab World in the West’s bid to overthrow nation after nation and reorder the entire region according to their own geopolitical and economic interests starting with the “Arab Spring” in 2011.
There are Nazi philosophies that are still held by many groups in Europe as well.
Many apt pupils have been trained to be terrorists that strike when the moment is appropriate. They are not as open and flamboyant as Muslim operations. They are clandestine groups that wait to make their message known and their operations move within governments, law enforcement and military operations throughout Europe.
Likewise, al-Qaeda and its various franchises including its most recent and notorious, ISIS are being used simultaneously as a domestic menace and a foreign expeditionary mercenary force.
Now, this data dump by Year Zero creates a new confounding element to the escalating pretext of cyberwar that may lead to world war. This appears to demonstrate that Russia is just steps away from a full-scale war with NATO.
Arguably, all of the cyber allegations against Russia could be the equivalent of a cyber Reichstag fire, where operatives of the Deep State have manipulated the data in order to implicate Russia for the sake of kindling an all out war.