Tracking Tools Used By CIA has been Released With 8761 Files & Documents

 

First of all, this is the greatest ever published confidential document of Central Intelligent Agency.

 

First of all, this is the greatest ever published confidential document of Central Intelligent Agency ( CIA). “Year Zero”, contains 8,761 files and docs from an isolated, high-security network situated inside the CIA in Langley, Virgina.

The CIA’s mission is to preempt threats and further US national security objectives by collecting intelligence that matters, producing objective all-source analysis, conducting effective covert action as directed by the President, and safeguarding the secrets that help keep the Nation safe.

Since 2001, the CIA aka Central Intelligence Agency has gained superiority over the U.S. National Security Agency. The CIA built drone fleet, & very different type of not openly acknowledged force — its own essential fleet of hackers. The CIA’s hacking division freed it from having to disclose its often controversial operations to the NSA (bureaucratic rival) in order to draw on the NSA’s hacking capacities.

In the beginning of 2017, the CIA’s Hacking section had about 5000+ users registered and had invented thousands trojans, hackins systems, weaponised malwares and viruses. In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

If a single cyber weapon gets loose, then it’ll spread throughout the world within a second being used by cyber mafia, hackers, rival states.

The Engineering Development Group of CIA & software developers builds the hacking tools and malwares which mainly targets iPhone, Smart TVs, Android devices, Windows OS, OSx, Linux & Routers. The intelligent employees of are able to develop very outstanding malwares and viruses which can evade forensics and anti-virus.

 

 

For more information visit:  wikileaks official