Vault 7: Reveals What the CIA Can Hack

A publication code named Vault 7 was released by Wikileaks revealing hacking tools capable by the CIA. You will be shocked to find what these documents claim the CIA are capable of hacking.

Vault 7 reveals hacking tools enabling the CIA to access computer information and control equipment. Infect computers with spyware and malware to spy on citizens, infecting us with Malware, Viruses, Trojans, “zero-day” exploits. Cyber “weapons” that can be let loose to be used by rival countries, cyber-mafia, and hackers.

Phones, computers, programs can be hacked. Confirmation they can remotely access mics on cell phones even when phones are off, as well as TVs, cameras, webcams, etc.

Enable them to HACK INTO CARS REMOTELY and control its equipment to disable brakes or accelerate the vehicle. To control “undetectable” assassinations. Michael Hastings is one suspicious death.

 

7 CIAs Robert Davis Steele, ex-CIA reveals

  1. White House CIA — the plumbers, domestic dirty tricks, still today
  2. Wall Street CIA — direct support to major banks & corporations (now based in NYC)
  3. Legal CIA Analytics — children supported by geriatric annuitants – 20% effective
  4. Legal CIA clandestine, communications, science & technology — 10% effective
  5. Legal Special Operations CIA — 100% effective small stuff, 20% effective big stuff
  6. Safari Club — 200 or so people focused on rendition, torture, secret prisons
  7. Drone CIA — 2000 people committing crimes against humanity

Said to have come out of influence of the O.S.S. Office of Strategic Services.

Office of Strategic Services (OSS) in 1942. The OSS – the forerunner to the CIA – had a mandate to collect and analyze strategic information. After World War II, however, the OSS was abolished along with many other war agencies and its functions were transferred to the State and War Departments.

President Truman called for a centralized intelligence organization and signed the National Security Act of 1947 establishing the CIA. The National Security Act charged the CIA with coordinating the nation’s intelligence activities and correlating, evaluating and disseminating intelligence affecting national security. – a front for Intel operations.

An agency that was founded upon Jesuit principles of spying and assassination, as well as mind control experiments.

MK-Ultra
Mind control and psychological experiments LIVE human subjects, an extension of Luciferian Illuminati Trauma-based mind control, fragmenting minds, creating multiples, split alters for carrying out assignment, creating assassins, triggered responses.

Brain-washing, hypnosis, trauma-based mind control, electroshock therapy, sleep deprivation, drugs

Still active today through other names, Monarch, etc for more sophisticated individual targets through psychological means. And on a mass scale through entertainment, education, and social media
Google, Facebook, etc

Manchurian Candidate, victims programmed to carry out missions.

Source: Vault 7: Reveals What the CIA Can Hack | Jim Duke Perspective

Share this article: