Receive all Cointelegraph news immediately in Telegram.
The CIA turned consumer electronics worldwide into microphones and spied on Donald Trump 24/7, Kim Dotcom reports on Wikileaks’ Vault 7.
Wikileaks, Kim Dotcom, Vault 7, Trump, CIA, Megupload, Windows
Megaupload and Bitcache Founder Kim Dotcom has highlighted the most striking revelations from WikiLeaks’ latest expose on CIA spying practices.
In a series of tweets on Tuesday and Wednesday, the entrepreneur noted that the agency likely spied on US President Donald trump “24/7” by bugging his electronic devices.
“They used his phone cam & mic. Watching and listening 24/7,” he wrote.
.@realDonaldTrump would go totally ballistic if he knew what the Obama CIA did. They used his phone cam & mic. Watching and listening 24/7.— Kim Dotcom (@KimDotcom) March 7, 2017
.@realDonaldTrump would go totally ballistic if he knew what the Obama CIA did. They used his phone cam & mic. Watching and listening 24/7.
The wider context involves the Microsoft Corporation in particular, with Dotcom highlighting how “CIA coders are working at [Microsoft] and that Windows is effectively CIA spyware.”
Hi @BillGates, you know CIA coders are working at @Microsoft and that Windows is effectively CIA spyware. That's how you thank ur customers?— Kim Dotcom (@KimDotcom) March 8, 2017
Hi @BillGates, you know CIA coders are working at @Microsoft and that Windows is effectively CIA spyware. That's how you thank ur customers?
Highlighting similar implications, former National Security Agency Official Oren Falkowitz told the New York Times on Tuesday:
“We expect governments to be involved in espionage. What we don’t expect is that the people within these organizations would create vulnerabilities by disclosing them.”
The full leak involves 8,761 public documents in a release titled “Vault 7,” of which Tuesday saw only the first volume, “Year Zero,” go public.
Centering on CIA spying practices, it was found that the agency under the Obama administration built tools to spy on consumer electronics worldwide, turning them into microphones and data relay devices. Even Skype calls were logged, scanned and stored, Dotcom notes.
While it is not explicitly stated that Trump and his family were subject to constant surveillance, the summary literature states such events are “implied” by WikiLeaks.
It is not only the CIA’s controlled operations which are now under scrutiny. Vault 7 further details how the agency “lost control of the majority of its hacking arsenal,” something which would give successful hackers “the entire hacking capacity of the CIA.”
Follow us on Facebook
For updates and exclusive offers, enter your e-mail below.
One fine body…
Thank you for contacting us! We will reply to you as soon as possible.
Thank you for your interest in our franchise program.
We are considering your request and will contact you in due course. If you have any further queries, please contact:
Reset letter sent.
Please checkout your mailbox for password reset details