Vault 7 Leak Confirms: “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones”

| |

Top Tier Gear USA


The Vault 7 Wikileak has now become reality and it’s a doozy. In addition to the irony of the Obama administration directly interfering with political elections in other countries via the CIA, the latest release from Julian Assange shows that literally every internet enabled consumer device in Russia was turned into an active microphone.

No, seriously.

It’s an amazing feat and one that shouldn’t go unnoticed, because we suspect that the same surveillance technology has probably been turned on the American people, and even a former Presidential candidate turned President.

Via Zero Hedge:

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

They’re listening… and they’re watching… everything.

Also see: It’s Really Mass Surveillance: What the NSA Means by “Targeted” Surveillance

Delivered by The Daily Sheeple

We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).

Contributed by The Daily Sheeple of

This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to

Wake The Flock Up! Please Share With Sheeple Far & Wide:
  • Uncle Sham

    Yeah we knew this already. What we didn’t know is that the CIA can hack an entity, but disguise it to make it look like someone else did the hacking (Russia)

    • Depends on who we is. False flag events throughout history were based on pre-computer spoofing. All it really takes to deceive the average bureaucrat is a keyword, and I give many of them as part of every email I send: Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

      • Uncle Sham

        I think you may have missed a few examples…

        • I got the list from Forbes…

          • ReverendDraco✓ᵛᵉʳᶦᶠᶦᵉᵈ ᵃᶜᶜᵒᵘᶰᵗ

            Da, Товарищ

          • I guess it is a good thing I’m not on F*c*book so that nobody will tоварищ, me:-)

          • ReverendDraco✓ᵛᵉʳᶦᶠᶦᵉᵈ ᵃᶜᶜᵒᵘᶰᵗ

            Yeah. . . no Farcebook for me, either.

          • D.Moore

            F’k Them All, I communicate with my family on there and if they listen to everyday folks they are some bored mofo’s.

          • Just remember that they can hack your computer every time that you sign on and steal information thereon that they can use to hack every other part of your life. No only do I not use social media, I don’t do online banking beyond checking balances. Putting your information on any computer is like putting it on a billboard, like the guy who started Lifelock did in the first commercials. He quit doing it when his identity got slammed.

      • Time Will Tell

        So bad idea to use that list as my email signature…

        • Unless you had my motivation in mind. If everyone put that list in their signature, as I have, then every email that the NSA scanned would go to secondary screening and back up the system, just like a denial of service attack that they brought on themselves by being so snoopy.

          • Rey d’Tutto

            Back when email wasn’t a “free” service, there was a list of trigger words my friends and I (and a few thousand other geeks) tagged on to the end of our signature.
            I think it was in relation to “Carnivore”

          • Carnivore is just the most recent program of which we are aware. The NSA has been doing what they do in the same ways since their creation as a part of the military bureaucracy of the Pentagon. They call them keywords because that is their function in the computer searches that they are used in. TANSTAAFL, nothing is free.

          • Sylvia Avila

            Yes! CIA has been playing mind games with the people since 1977, when Admiral Stan Field Turner was CIA Director. They had a program called MKulta a mind control program to control US citizens!

          • The CIA was created in 1947 by the addition of recently immigrated former SS officers to the OSS, which was created in 1941 to fulfill military designs to acquire intelligence during WW2. They have been a covert intelligence organization playing mind games from the beginning.

          • Sylvia Avila

            Yes! you are so right! the hypocrisy and lies! Can’t trust any of those agency’s!

          • Sylvia Avila

            You are so right! But they have gone out on their own! and it seems they do NOT care! They are being controlled by The Brotherhood, NWO for their agenda of World control!!

          • They do care about their own fame and fortunes, but so do those who we call heroes in our military, who are, in fact, traitors, having violated their oaths to protect and defend the Constitution that they aided and abetted the violation of by fighting in undeclared foreign wars in countries that never threatened nor attacked ours.

          • Sylvia Avila

            Right! but remember We the US have started these Wars! Under Bush, Iraq, Syria they do not care about who gets killed! NWO just wants their agenda done!

          • They were never wars because they were never declared by Congress, as required by Article 1, Section 8, Clause 11…

          • Sylvia Avila

            You are right! but that is the beauty of it our Government goes into War (unofficially) and rape the land of it’s minerals and oil and countries treasures. And than US claim they are getting rid of terrorist in that country? when all our Government wants is the countries resources. In the mean time people die in the process. That is what Bush did, he( I believe) create 9 /11 and than that was his reason to go to war in Iraq. There was NO weapons of Mass Destruction! just an excuse to control that countries wealth. that is there NWO agenda control all!!

          • Anything that violates the Constitution is still officially treason, but since they all commit it daily, none of them will ever vote to impeach another. Illegal wars are not driven by resources when the leaders of those countries would willingly sell them out with a military invasion. Those wars are driven by the profits generated by the sale of military materiel. The top three shareholders in the Carlyle Group are the House of Saud, the Queen of England, and the Bush family, so how anti-war could they be?

          • Sylvia Avila

            You are so right! So we live with treason and deceit every day! What a country!

          • Rey d’Tutto

            Free lunches cost too much. Searchability is inherent in electronic communication, a double edged sword it seems. But ease and convenience has an evolutionary advantage over “unwarranted” vigilance, and the republic dies by inches.

          • TANSTAAFL

      • D.Moore

        We is anyone that can think for themselves

    • none

      Thank god, the Russians now have copies of the software!
      It was reported on Shawn Handy? That the Russians did steal it after we spent about 100 billion to develop it.
      Thank you President Obama.

      • Victoriamvinson

        Google is paying 97$ per hour! Work for few hours & have longer with friends and family! !dl50c:
        On tuesday I got a great new Land Rover Range Rover from having earned $8752 this last four weeks.. Its the most-financialy rewarding I’ve had.. It sounds unbelievable but you wont forgive yourself if you don’t check it
        ➽➽;➽➽ http://GoogleFinancialCashJobs799HomeEducationGetPaid$97/Hour ★★★✫★★★✫★★★✫★★★✫★★★✫★★★✫★★★✫★★★✫★★★✫★★★✫★★★✫★★★✫★★★✫::::::!dl509c:….,…….

  • Sammy

    didn’t Chomsky advocate accusing the right of doing what the lefty does???

  • David E

    Well, then…we should all sue the CIA/DHS/NSA for the electric bill, since they are the ones illegally siphoning our power consumption.

    • The Utah Data Center consumes copious amounts of both electricity and water, and they get both at bargain rates.

      • David E

        I’m not talking about the electric bill in their data center…I’m talking about our personal electric bills, mine and yours, for turning all of our stuff back on when we think it is off, trying to save on the bill.

        They’re the ones using the electricity, they should pay for it.

        • How is electricity that is turned off being used? Nothing that you can turn on with a remote ism ever really completely off, since it is on enough to be turned on. Your cellphone is never completely off, just the screen and buttons are. It is just as much under the control of the cellular network as your television is under the control of the ISP connection. If it equipped with a wireless modem, it can be hacked by anyone who can access that modem, and they all have factory defaults that can be accessed by wireless equipment, from a hacker that might not even be within sight of your house or apartment building.

  • landy fincannon

    I thought governments only spied on their enemies, silly me. We are the enemy !


      Time to invoke the 2A….BIG TIME

      • If you haven’t been doing so all along, perhaps you should do enough autodidactics to know that invocation of self-defense is always the worst-case scenario, and best to be avoided if at all possible.

    • If you had read as much outside of the public fool system curriculum as you apparently did within it, you would know that any group of the governing class eventually comes to see the governed class as an enemy to be watched closely.

      • landy fincannon

        I should’ve ended with sarcasm, I suppose

  • Is anyone here surprised by this revelation? If so I am disappointed.

    • It is far more an indication of the past history of spooks in general than any kind of revelation. I’m waiting to see your reaction to the “revelation” that the FBI broke and re-engineered TOR a long time ago, and has actually been benefiting from the blind faith that those who believe that any kind of encryption is secure hold dear.

      • lol, your assessment of my knowledge is way off if you think I rely on TOR alone.

        • Encryption is encryption and anything that can be encrypted by a geek can be decrypted by a geek.

          • Can you cite a single network user of that technique?

          • I don’t think there’s one-time-pad logs out there, lol

          • So you picked a non-existent example to prove your point?

          • No, I picked an example that proved you wrong and you seem upset about it, get over it, everybody is wrong sometimes. You can use a one-time pad with text messages, email or any other form of electronic data transfer that involves text. You see this: “The whole world is hacked and there’s nothing you can do” crap they’re telling people now? As long as you don’t keep the key on your phone the one-time pad routes their “we’ll infect all the devices in the world so we can spy” scam because they lack the ability to decipher it no matter what quantum bean counters they sic on it. Now I don’t think that many but the most sophisticated out there employ the technique but nevertheless it’s there, it works and it beats their system.

          • Which is the long way to say that it will work anywhere that you are willing to apply it manually.