▶️Watch on 3Speak - Odysee - BitChute - Rumble - YouTube - PDF notes
In this video I go further into the Vault 7 Year Zero video series, and this time look at the mainstream media coverage of the recent BOMBSHELL WikiLeaks Central Intelligence Agency (CIA) top secret documents. As usual, most of the mainstream media (at least those that are in the top Google Search results) appears to be deliberately trying limit discussion about the implications that the revelations could have, and instead focus on blaming the boogeyman, Russia…. as always.
The WikiLeaks data dump consists of over 8000 CIA documents, just 1% of the total Vault 7 series, and show the CIA’s unprecedented ability to spy on nearly every device, even making them appear “off”, and even have the ability to commit undetectable assassinations. The most alarming aspect of the leaks is that it raises the risks of the very loose and unclassified way that the CIA managed and unleashed their Cyber Weapons across the internet, making them suspect to be obtained by third-parties, including governments and even the smart teenage hacker. This proliferation risk of Cyber weapons is barely touched upon by most mainstream media outlets.
The most politicized revelation is the fact that the CIA can mask their digital “fingerprints” to many different sources such as nation states, including Russia. This has led many people to raise the very plausible theory that the CIA could in-fact have used Russia as a scapegoat by the Obama administration to try to discredit President Trump, in which last year’s Presidential campaign even saw Obama campaigning for Hillary Clinton. The highly political implications of this CIA-leaked revelation appears to have the mainstream media as a whole behave in a sort of damage control for the CIA. They do this by attacking anyone that dare to raise this very real possibility as a “conspiracy theorists”, claiming that it was those pesky Russians that leaked Vault 7 to WikiLeaks, and in what appears to be one of the most ridiculous claims ever made, claiming the many hilarious memes about the CIA that went viral on social media were made by Russian bots……. #UNBELIEAVABLE! A quick Twitter search would show that it was actually people like yours truly tweeting such amazing memes. AM I A RUSSIAN ROBOT?? Find out at on Twitter. Also Twitter almost certainly removed #Vault7 from trending, as is usual with the censorship Orwellian 1984 tech company.
Since WikiLeaks claims to have released less than 1% of the total Vault 7 documents, they will be releasing around 1 MILLION more documents!! So comment below what you think the rest of the Vault 7 leaks will show, and especially what Year One will reveal!
Last but not least, the information war will be fought and won through MEME WARFARE, so equipped yourself accordingly!
Vault 7 Playlist
View Video Notes Below!
Become a MES Super Fan - Donate - Subscribe via email - MES merchandise
Reuse of my videos:
- Feel free to make use of / re-upload / monetize my videos as long as you provide a link to the original video.
Fight back against censorship:
- Bookmark sites/channels/accounts and check periodically.
- Remember to always archive website pages in case they get deleted/changed.
Recommended Books: "Where Did the Towers Go?" by Dr. Judy Wood
Join my forums: Hive community - Reddit - Discord
Follow along my epic video series: MES Science - MES Experiments - Anti-Gravity (MES Duality) - Free Energy - PG
NOTE 1: If you don't have time to watch this whole video:
- Skip to the end for Summary and Conclusions (if available)
- Play this video at a faster speed.
-- TOP SECRET LIFE HACK: Your brain gets used to faster speed!
-- MES tutorial- Download and read video notes.
- Read notes on the Hive blockchain $HIVE
- Watch the video in parts.
-- Timestamps of all parts are in the description.Browser extension recommendations: Increase video speed - Increase video audio - Text to speech (Android app) – Archive webpages
#VAULT7 Year Zero: Mainstream Media 'Coverage'
Topics to cover
- My previous # Vault7 Year Zero Video
- Vault 7 Search Trends
- Mainstream Media Coverage.
Recap on my Vault 7 Year Zero video
- I was the first person to tweet about the hidden image behind WikiLeaks' Vault 7 tweet.
- I reviewed the 1966 New York Times Investigation of the CIA
- I reviewed the WikiLeaks Vault 7 Press Release.
Recap of the 1966 NY Times Investigation of the CIA
The 1966 NY Times investigation, over 50 years ago, mentioned concerns from many politicians, world leaders, and even former presidents that the CIA was acting as an "invisible government".
Former President John F. Kennedy (JFK) was quoted as saying he wanted:
“to splinter the C.I.A. in thousand pieces and scatter it to the winds."
NY Times stated that a survey of many insiders concluded that the CIA was not acting out of line but under strict control but nonetheless the substance of control was concerning.
The CIA, itself, gives the politicians and overseers the information upon which they decide how to regulate the CIA…
The CIA is the freest, most autonomous, and most secret of all intelligence agencies which requires a level of belief for those that oversee it in the information given to them by the CIA.
Recap Vault 7 Year Zero Press Release
WikiLeaks released over 8,000 top secret CIA documents they say was leaked by a CIA agent (or someone with access to one) concerned about the direction the CIA was going.
These documents are part of WikiLeaks Vault 7 series and are the first part of the series, labeled Year Zero.
These documents account for less than 1% of the total Vault 7 series, which means the total amounts to about 1 million documents!
Some revelations about the CIA capabilities and concerns raised include:
- Spying on and controlling phones, computers, TVs, operating systems, cars, planes, etc.
- Manipulating hacking "finger prints" to resemble that of foreign states, governments, or even anyone else to mislead law enforcement.
- Skype video/audio conversations get automatically transcribed to text and stored in secret CIA servers.
- Kept "zero day" or hacking vulnerabilities from major companies including Google, Microsoft, Apple, and others, in order to be able to hack into them.
○ Thus the CIA purposely compromised the security of millions of people in order to be able to hack them better.
○ It is also possible that large companies worked in coordination with the CIA… - TVs, phones can be put into a "fake off" mode which makes the device appear to be turned off but is actually still in the complete control by the CIA.
- CIA made cyber weapons unclassified in order to use over the internet, and can't be claimed ownership by the US government, thus allowing them to be freely pirated by anyone, and used on anyone.
- The cyber weapons are nothing more than just code or information, and thus can be easily copied and distributed.
- Foreign governments, or even the smart teenage hacker, may already have access to these CIA-created cyber weapons, and could also hack anyone while masking their presence as if to be coming from another location or person or agency.
- The CIA greatly increased its capacity and developed essentially its own "NSA" which makes it even more autonomous and more secret!
- Over 22,000 IP addresses were targeted within the United States, but redacted by WikiLeaks until they can sort out the types of targets…
To illustrate an example, the following scenario is plausible:
The CIA could hack into a "smart" car, accelerate into a building, or off a cliff, thus killing the driver and passengers; in other words, commit undetectable assassinations.
Another scenario could be:
The CIA can hack into the President's Twitter account, but make it appear as if the Chinese while masked as the Russians were responsible… # hackception
Search Trends
https://trends.google.ca/trends/explore?date=today%201-m&q=vault%207,towergate,jason%20smith,bruce%20chen,hell%20challenge
Retrieved: 11 March 2017
Vault 7 is relatively highly searched, much higher than some of those terms shown above, which were "trending" on Twitter on the day of the release, but not Vault 7…
Mainstream Media Coverage
NOTE: My review of the mainstream media coverage will consist primarily with the politicized nature of the WikiLeaks, as well as the reactions to the fact that the CIA can make hacks appear to be coming from Russia.
This is because, the media as a whole as reported on the fact that the CIA can hack into nearly every device, as exemplified in the article below:
Twitter almost certainly censored # Vault7 from the trending list.
https://twitter.com/search?q=%23vault7%20trending&src=typd
Archive: http://archive.is/yVzZX
Retrieved: 7 March 2017
Twitter Search: # vault7 trending
https://en.wikipedia.org/wiki/John_F._Kennedy
Retrieved: 11 March 2017John F. Kennedy
No mention of the famous JFK "splinter CIA" quote, which is a shame because Wikipedia is usually the first place people look for general information…
https://en.wikipedia.org/wiki/Central_Intelligence_Agency
Retrieved: 11 March 2017Central Intelligence Agency
The Central Intelligence Agency (CIA) is a civilian foreign intelligence service of the United States federal government, tasked with gathering, processing and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT). As one of the principal members of the U.S. Intelligence Community (IC), the CIA reports to the Director of National Intelligence and is primarily focused on providing intelligence for the President and Cabinet.
Unlike the Federal Bureau of Investigation (FBI), which is a domestic security service, the CIA has no law enforcement function and is mainly focused on overseas intelligence gathering, with only limited domestic intelligence collection. Though it is not the only U.S. government agency specializing in HUMINT, the CIA serves as the national manager for coordination of HUMINT activities across the US intelligence community. Moreover, the CIA is the only agency authorized by law to carry out and oversee covert action at the behest of the President, unless the President determines that another agency is better suited for carrying out such action.[6][7][8][9] It exerts foreign political influence through its tactical divisions, such as the Special Activities Division.[10]
No mention of Vault 7 OR WikiLeaks… # wow
https://en.wikipedia.org/wiki/Vault_7
Retrieved: 11 March 2017Vault 7
Vault 7 is a series of documents that WikiLeaks began to release on 7 March 2017, that detail activities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency's software capabilities, such as the ability to compromise smart TVs,[1] web browsers (including Firefox, Google Chrome, and Microsoft Edge), and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.
…
According to WikiLeaks, the source "wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons" since these tools raise questions that "urgently need to be debated in public, including whether the C.I.A.'s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency."[1]
…
According to WikiLeaks, by recycling the techniques of third-parties though UMBRAGE, the CIA can not only increase its total number of attacks,[14] but can also mislead forensic investigators by disguising these attacks as the work of other groups and nations, including Russia.[1][8]
MES Note: This above paragraph has since been modified on Wikipedia to remove the "including Russia" line because that's what Wikipedia does…
Also, the following paragraph was added on 12 March 2017, which references the Daily Beast article below.
…
Cybersecurity writers such as Ben Buchanan and Kevin Poulsen were skeptical of these theories.[19][20] Poulsen wrote, "The leaked catalog isn't organized by country of origin, and the specific malware used by the Russian DNC hackers is nowhere on the list."[20]
http://www.thedailybeast.com/articles/2017/03/08/who-s-behind-the-massive-cia-leak.html
The leaked catalog isn’t organized by country of origin, and the specific malware used by the Russian DNC hackers is nowhere on the list. Needless to say, the documents say nothing about framing another nation’s intelligence service. But by the end of the day Tuesday, the alt-right news site Breitbart was promoting the false claim.
Other memes claim falsely that the leaks show all Skype conversations are stored in the CIA cloud, that President Obama used CIA hackers to spy on President Trump, and cite the CIA’s 2014 interest in hacking onboard automotive systems as a hint that the agency assassinated Rolling Stone reporter Michael Hastings, who died in a high-speed crash in 2013.
Robert M. Lee, founder of the cybersecurity firm Dragos, finds the rapidity, consistency, and overwhelming volume of the falsehoods suspicious, particularly the meme purporting to vindicate the Kremlin. He suspects that bots have been deployed to push the tall tale on Twitter. “That narrative emerged far too quickly to have been organic,” said Lee. “There is certain narrative terminology and sound-bites that are consistent among multiple accounts. That usually speaks to some sort of automation or coordination.”
This is very misleading, and under-reporting journalism.
First of all, this is the only statement I have seen about the specific DNC malware not being the same, so I would have to double check, which is very annoying because the writer could have simply added references…
Secondly, he makes the claim that it was "Russian DNC Hackers", which is nothing more than a conspiracy theory.
Learn more about the Russian Hack myth by watching my earlier video:
Thirdly, he forgets to mention that WikiLeaks has only released less than 1% of their Vault 7 series, and it is obvious that the CIA has MANY more documents that WikiLeaks does not have access to.
Fourthly, Breitbart's "false claim" is stating the obvious true fact, that the CIA can mask their hacking operations, thus facilitating false flag operations.
Fifthly, claiming that "bots" are posting memes on Twitter about very obvious and credible arguments that Michael Hastings was assassinated, Obama spying on Trump, Skype conversations being stored (ignore the strawman argument "all" Skype conversations") in CIA servers, is absolutely pathetic, in fact I was one that posted a bunch of memes about the CIA / Fake Russian DNC Hacking on my Twitter so check it out -->
Thus the possibility that the CIA could mislead forensic investigators into believing the "hack" came from Russia is very believable, and thus the Daily Beast article is nothing more than (evil) propaganda.
https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html
Another program described in the documents, named Umbrage, is a voluminous library of cyberattack techniques that the C.I.A. has collected from malware produced by other countries, including Russia. According to the WikiLeaks release, the large number of techniques allows the C.I.A. to mask the origin of some of its attacks and confuse forensic investigators.
New York Times actually reported that the CIA could mask its cyber-attacks as coming from a third party, including Russia.
CIA Statement on Claims by Wikileaks
We have no comment on the authenticity of purported intelligence documents released by Wikileaks or on the status of any investigation into the source of the documents. However, there are several critical points we would like to make.
CIA’s mission is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries. It is CIA’s job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad. America deserves nothing less.
It is also important to note that CIA is legally prohibited from conducting electronic surveillance targeting individuals here at home, including our fellow Americans, and CIA does not do so. CIA’s activities are subject to rigorous oversight to ensure that they comply fully with U.S. law and the Constitution.
The American public should be deeply troubled by any Wikileaks disclosure designed to damage the Intelligence Community’s ability to protect America against terrorists and other adversaries. Such disclosures not only jeopardize U.S. personnel and operations, but also equip our adversaries with tools and information to do us harm.
The CIA does not deny the authenticity of the leaks and argues that these kind of leaks jeopardizes the United States' ability to fight against terrorists…
The CIA also states that it is illegal to spy on individuals, so this makes the rest of the Vault 7 series very interesting… # staytuned
https://www.google.ca/webhp?sourceid=chrome-instant&rlz=1C1CHBF_enCA730CA730&ion=1&espv=2&ie=UTF-8#q=vault+7&*
Retrieved: 11 March 2017
Archive: http://archive.is/UNUZ1
https://www.google.ca/webhp?sourceid=chrome-instant&rlz=1C1CHBF_enCA730CA730&ion=1&espv=2&ie=UTF-8#q=vault+7&tbm=nws&*
Retrieved: 11 March 2017
Archive Link: http://archive.is/YYy2N
WASHINGTON—The “Vault 7” trove of documents released Tuesday by WikiLeaks has been cited by commentators to claim that the Central Intelligence Agency may have been masquerading as other foreign states while conducting its cyberhacks. The documents being cited, however, offer no smoking gun.
…
“CIA uses techniques to make cyberattacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE,” internet entrepreneur Kim Dotcom wrote after the release in a tweet picked up by ZeroHedge, a financial blog known for its antiestablishment worldview. Dotcom, who founded the file-sharing website Megaupload, is wanted in the U.S. on charges including criminal copyright infringement, money laundering and conspiracy to commit racketeering.
Conservative commentator Laura Ingraham promoted the same line of reasoning in an exchange with host Sean Hannity on Fox News, claiming the leaks show U.S. intelligence agencies using countries like Russia as a scapegoat for their own attacks.
This report previously appeared at WSJ.com.
…………………… How do these pathetic "journalists" sleep at night??
This is absolutely horrible reporting.
Kim Dotcom, Laura Ingraham, and Sean Hannity, as well as many other top media people, are not claiming that the CIA hacked the DNC and left Russian "fingertips" but only that stating the obvious, that the CIA has the capacity to do just that.
And given that the then President Obama had the power to request the CIA undertake covert tasks, this is not a far-fetched concern either.
There is also no mention about how the CIA can easily mask their hacking operations to make it look the Russians did it (besides references the Kim Dotcom tweet), which removes any remaining far-fetched plausibility that "Russia hacked the election".
If the FBI did in fact find digital traces of "Russian hacking", then they now need to account for the fact that it could have been the CIA, or anyone else that stumbled upon the loose unclassified cyber malware weapons unleashed by the CIA through the internet…
So yes the DNC/Russia hack allegation is more of a joke than previously thought could be possible…
http://www.express.co.uk/news/world/777971/Vault-7-Julian-Assange-Russia-CIA-wikileaks-hacking
“Tuesday’s data release comes as the CIA investigates Donald Trump’s connection to Putin, the Kremlin and Russian hacking during the election campaign. It’s all about Russia showing that the CIA is just as bad,” said Dr Andrew Foxall, director of the Russia Centre at the Henry Jackson Institute think tank.
The classified information contained in “Vault 7” showed that the CIA has produced more than 1,000 malware systems - viruses, trojans, and other software - that can infiltrate and take control of targeted electronics including smart televisions.
It is especially embarrassing because it exposes classified information about the CIA's Center for Cyber Intelligence, the unit assigned by President Obama to respond to fears that Russia's interfered with last year’s presidential elections last year.
Analysts are now convinced that Wikileaks has a pro-Russia agenda, added Dr Foxall.
…
Julian Assange this week denied the criticism, labelling his operation as a “neutral, digital Switzerland”. However critics were sceptical over his claim that he had been given the documents by a former US government hacker to begin public debate into hacking.
“The documents contained 75,000 redactions. These were codes that would also affect Russia’s security,” added Dr Foxall.
“Because some of the data was relatively fresh, it is unlikely it had been in the pipeline for a while. And Assange’s team is small. The logical conclusion is that the data was given already redacted.
“This was the work of a sophisticated team, and it fits entirely into a pattern of behaviour demonstrated by Russia in the past.”
…
HAHAHAHA…
This is one of the most pathetic (and disgusting / evil) articles I have EVER read, albeit extremely comical…
Also, the article has NO mention of the CIA's ability to mask their hacking abilities to appear as if it was Russia doing it…
Now let's look at the comments to get some actual news… (and a glimpse of why the Fakestream media wants to remove / censor comments on their articles..)
As usual, it is mostly the alternative aka true media that provides good coverage:
https://www.google.ca/webhp?sourceid=chrome-instant&rlz=1C1CHBF_enCA730CA730&ion=1&espv=2&ie=UTF-8#q=vault+7+fingerprint&*
Retrieved: 11 March 2017
Archive: http://archive.is/aKdGV
https://www.google.ca/webhp?sourceid=chrome-instant&rlz=1C1CHBF_enCA730CA730&ion=1&espv=2&ie=UTF-8#q=vault+7+fingerprints&*
Retrieved: 11 March 2017
Archive: http://archive.is/VeMj9
https://www.google.ca/webhp?sourceid=chrome-instant&rlz=1C1CHBF_enCA730CA730&ion=1&espv=2&ie=UTF-8#tbm=nws&q=vault+7+%22fingerprints%22&*
Retrieved: 11 March 2017
Archive: http://archive.is/nFBd8
http://www.businessinsider.com/sean-hannity-wikileaks-conspiracy-theory-cia-hacked-2017-3
…
"The CIA, according to these WikiLeaks leaks, uses stolen malware to attribute cyberattacks to nations like Russia," Hannity told radio listeners. "In other words, what they're saying is the CIA can actually blame Russia for an attack on an American, because they'll put their fingerprints all over the attack. Meanwhile it came from within."
…
Former National Security Agency whistleblower William Binney, who quit the NSA over a decade ago amid distaste with the agency's surveillance program, said it was possible for the CIA to carry out the act described by conspiracy theorists, but cited little evidence to support his claim.
Retired Army Lietenant Colonel Anthony Schaffer, a torture advocate who has floated Benghazi and 9-11 conspiracy theories in the past, took it a step further, claiming he had unnamed sources described the conspiracy to him.
…
Right-wing sites weren't the only ones spreading the theory.
It was picked up by Russian state-sponsored English media outlets like Sputnik, which gleefully mocked "evidence-free" accusations that Russia hacked the election, linking to tweets "chock-full of sarcasm and memes" about the CIA's capabilities.
Russian foreign minister Sergey Lavrov again denied Russia's involvement in the 2016 election hacking, pointing to the WikiLeaks documents on Thursday and noting "the CIA could get access to such 'fingerprints' and then use them."
…
Indeed, top US national security figures have noted the argumentative consistency on numerous topics between Russian state-sponsored media outlets and right-leaning US sources like Breitbart, the Drudge Report, and Hannity.
MES Note: "Argumentative consistency" should be replaced with COMMON SENSE ;)
"There are powerful parallels between the Russian narrative and things being said," former CIA Director Michael Hayden told Business Insider in an interview this week.
The spectre of last summer's leaks still hangs over many current and former DNC staffers.
The hack embarrassed many top staffers, exposing some staffers' distaste for Sen. Bernie Sanders' campaign, and forcing resignation of many top staffers.
Many of the remaining staffers felt targeted, saying they experienced death-threats following the incident.
"It was a campaign that I've never experienced before, and I have seven presidential campaigns under my belt. When I assumed the chair role, I assumed, 'Well, this will only take a couple months out of my life, and I'll go back to being Donna.' But it transformed me," former DNC chair Donna Brazile told Business Insider.
"I've never gone up against a foreign military intelligence unit," Brazile said. "I don't think no campaign manager, no one in my position has ever had to fight the weaponization of misinformation, to have your files corrupted and then to be used as a form of weaponization to sew discord."
MES Note: Donna Brazile was caught HANDING DEBATE QUESTIONS TO HILLARY, thus forcing her to be removed/resign from CNN…. Donna deserves little sympathy for her corrupt practices (outside the alleged death threats of course, which no one should endure).
Note: Why does no one ask why Hillary didn't let the public know that she was being handed debate questions?? i.e. She was CHEATING!!
This isn't the first time that WikiLeaks has inspired and stoked a conspiracy theory about the DNC hacks.
Last August, the organization offered a bouty for information about Seth Rich, a DNC staffer shot while walking home last July. While online conspiracy theorists speculated that his death was connected to the DNC hack, Washington's MPD spokesperson told Business Insider at the time that there was no evidence connecting Rich's death to his work at the DNC.
Just like other mainstream news outlets, Business Insider is reporting as if they are in damage control for the CIA, defending known corrupt individuals in Donna Brazile, and ridiculing anyone that provides very reasonable arguments as "conspiracy theorists".
All the while, they push the biggest conspiracy theory of all, that "Russia hacked the election"…
https://www.google.ca/webhp?sourceid=chrome-instant&rlz=1C1CHBF_enCA730CA730&ion=1&espv=2&ie=UTF-8#q=vault+7+proliferation&*
Retrieved: 12 March 2017
Archive: http://archive.is/l42KK
Also, very few mainstream media outlets focused on the extreme proliferation risks of these loose unclassified cyber weapons unleashed onto the internet.
The article by Zero Hedge is very good so make sure to check it out!
Summary and Conclusions
It is clear that the mainstream media at large has completely under-reported the BOMBSHELL Vault 7 leaks, but at no time do they deny it, nor does the CIA itself deny it!
This shows the importance of reading the SOURCE and NOT relying on any news source.
If the news is talking about WikiLeaks, then go to https://wikileaks.org, read for yourself, and then decide which news outlets report truthfully about Vault 7.
Also it is clear that many in the mainstream are quick to attack and label anyone and everything a "conspiracy theorist" for raising the obvious point that the CIA has the capability to hack pretty much anything, while making it appear the hacks were coming from a foreign entity, including Russia.
Also, very few mainstream media outlets focus on the very important proliferation of cyber weapons risks that the loose unclassified nature that the CIA imposed on the weapons in order to place through the internet.
This gives rise to the possibility that someone can gain possession of these loose malware cyber weapons, or may already have done so…
BUT WAIT THERE'S MORE…
https://twitter.com/wikileaks/status/839475557721116672
- wikileaks
Vault 7 Year Zero has 8,761 documents, which means that there are a total of approximately 1 MILLION documents!! # WOW
COMMENT & LET ME WHAT YOU THINK THE REST OF THE VAULT 7 LEAKS WILL REVEAL!
Last but not least, the information war will be fought and won through MEME WARFARE!!