Weeping Angels , Mi5 & Wikileaks

weeping angels

Weeping Angels , scary ? Not really .

Today Wikileaks released a series of confidential documents related to the C.I.A. The release is the first of a series of similar disclosures intended for release in the near future .

The release relates to the abundance of hacking tools used by the agency & their friends . The documents reveal the maniacal mindset of control amongst the deep state players , a mindset that , apart from a deeply disturbing & perverted form of voyeurism , exposes a deeply rooted fear of the population in general . As usual the keyword is control .

One of the documents describes a hacking tool to control ‘smart TV’s , the tool is known as ‘Weeping Angel‘ , the Weeping Angels are described on the Wikipedia page as ‘a race of predatory creatures from the long-running sci-fi series Doctor Who, resembling stone statues’ . Very appropriate .

The Wikileaks description of the tool is below :

‘The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.’


This in itself is not really breaking news , you can safely assume that any internet connected (and non connected) device can (and will as a matter of course) be compromised by the US $TA$I with poodle like help from the UK $TA$I . Also it seems that Samsung TV’s have been singled out , in this particular instance at least , although it no doubt applies to all similar devices . The document also reveals what every knowledgeable person already knows about mobile phones , i.e. they are seen by the $TA$I as remote cameras and microphones . Also the same can be said for any computer , I am sure quite a few more people will be taping up their webcam after the disclosures regarding laptops & PC’s .

There are far more interesting & not so obvious revelations though


The passage below is taken from the Wikileaks Vault 7: CIA Hacking Tools Revealed page :


‘The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.’

This alludes to the fact that the recent revelations involving the Russian hacking of US elections were probably false , also it is further circumstantial evidence that if there was any ‘hacking’ , then it was probably conducted by the C.I.A., ‘me thinks he doth protest too much’ . The C.I.A has recent form in attempting to influence foreign elections , it would be extremely naive to think that the same agencies would turn against the people & influence domestic elections to suit themselves . This is reality .

An ‘inside job’ , as always , with ‘Putin the Patsy’ as the fall guy , again as always . The UK’s very own $TA$I was involved from the start , at the time it was revealed that GCHQ provided the ‘tip off’ regarding Russian hacking of the Clinton campaign to favour Trump . In the eyes of the UK $TA$I nothing can be allowed that may sour the ‘special relationship’ as ‘most favoured poodle’ status to the US .

I am sure most people sniffed a very large rat as soon as the controlled UK press & sections of the US press were suddenly flooded with even more anti Russian propaganda than normal regarding the ‘Russian hacking’ . In fact the rat must have died & decomposed after crawling out of a s**t filled sewer , the stench was that strong  . You can always tell when they are lying , because they open their mouth(pieces) . This is not to say that competing foreign powers do not try to influence each others ‘democratic elections’ , but who do you think had the most electronic leverage in the US elections ? Was it Russia ? Or the C.I.A & its friends (poodles) ?

There could be another explanation though , maybe rival US ‘intelligence’ factions were backing both the Clinton campaign & the Trump campaign . You could argue this is a win-win situation for the US . You could also argue that it is a win-win-lose situation with the actual voter always losing .


US election ballot paper…it could be worse……

Also revealed was the fact that the C.I.A sees the N.S.A as it’s main rival for both funding & ‘intelligence’ gathering . In fact the C.I.A now seems to have developed decryption & hacking technology which may surpass the abilities of the N.S.A , although it has gone about this in a different manner .


Future UK election ballot paper

So basically in the US you now have two agencies spying on it’s citizens for the price of one . Well not quite , more like two for the price of two , or maybe the price of three , or maybe four…or maybe five……….or maybe…………

Related :

Do you know who’s watching you ?

This entry was posted in State Corruption, State Surveillance & Control, Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s