Vault 7 — WikiLeaks

14 March 2017

The best place to start with Valut 7 is…

What the hell is Vault 7?


“Code-named ‘Vault 7' by WikiLeaks, is the largest ever publication of confidential documents on the agency.”
“Containing a substantial collection of material about CIA activities”


WikiLeaks is releasing Vault 7 in separate parts.

Part 1 — “Year Zero”

7 March 2017

Part 2 — “Dark Matter”

23 March 2017

Part 3 — “Marble”

31 March 2017


WikiLeaks answers some good questions up front.
Like “Wiki pages: Year Zero contains 7818 web pages with 943 attachments from the internal development groupware.”

To see more:


I’ll be discussing Year Zero…

How it happened:

Which means, whoever possesses the entire collection has the full hacking capabilities of the CIA.

And that’s just what we’re starting out with!

Hacking Arsenal

Now, going back. It says…

“…hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits.”

Now I’m sure you’ve heard of most of these: Malware, Viruses, Trojans.

But it’s these “Zero Day Exploits” that are really interesting!

BUT, before I get into those, here are some other Key Standouts.

Key Standouts:

German Consulate

Allegedly the US Consulate in Frankfurt, Germany is a actually a covert CIA Hacker base.

The reason they use this US Embassy is because:

“Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.”

They also include an entire PDF on how to Evade Border Checks, complete with real-world examples.

Screen shot of airports to avoid. (From PDF)


UMBRAGE is a CIA group that maintains a collection of attack techniques, some of these attacks have been STOLEN from other states, including the Russian Federation.

Within these attacks are way to leave fingerprints to point the finger at some other country or organization.

A lot of people are saying the Russians Hacked the Democratic National Committee, but how do we know? 
With tools like these it begs the question could it have been the CIA, or even some other organization using the same tactics.

What this also means is that the CIA could ‘pretend’ to someone like the NSA.
This is important because the NSA has Full Authority to spy on it’s own citizens. However, the CIA has No Authority to monitor Americans, but using these methods it could and make it look like the NSA was doing it, which no one question.

In fact, this is so probable that the CIA apparently even has an entire collection that it uses on it’s own partners. See “Liaison Asset.”


Then there’s the specific mention of Samsung Smart TV’s.

Weeping Angel

In operation “Weeping Angel”, developed by the dedicated CIA department Embedded Devices Branch.

What does it do?

“infests smart TVs, transforming them into covert microphones…”

The surprising part of this is: