TFIPOST हिन्दी
TFIPOST Global
Tfipost.com
Tfipost.com
No Result
View All Result
  • Premium
  • Politics
    • All
    • Analysis
    • Opinions
    • Trending
    Rajnath Singh at SCO, reaffirming India’s zero-tolerance stand on terrorism.

    “No More Double Standards”: Rajnath Singh’s SCO Message Rewrites India’s Terror Response Playbook

    Nepal PM Faces Fresh Controversy as Church Demolition Row Triggers Political Storm

    Nepal PM Faces Fresh Controversy as Church Demolition Row Triggers Political Storm

    TCS Jihad Row Sparks National Debate as Nashik Case Raises Serious Questions

    TCS Jihad Row Sparks National Debate as Nashik Case Raises Serious Questions

    A major cross-border crackdown brings one of India’s most wanted narco operators back into custody.

    D-Company’s ₹5,000 Crore Drug Empire Shattered as India Brings Back Dawood Aide Salim Dola after Global Hunt

    • Analysis
    • Opinions
    • Trending
  • Economy
    • All
    • Business
    • Economy1
    • Finance
    India–New Zealand FTA signed in New Delhi, marking a “once in a lifetime” moment in trade ties.

    India, New Zealand Seal Fast-Tracked Trade Pact to Expand Duty-Free Access, Jobs and $5 Billion Trade Target

    Ahmadis in Pakistan: From Faith to Marginalisation Under Law and Society

    Ahmadis in Pakistan: From Faith to Marginalisation Under Law and Society

    Open Demat Account with Zero Annual Maintenance Charges What to Look For

    Open Demat Account with Zero Annual Maintenance Charges What to Look For

    Blood in the Meadows: How the Pahalgam Terror Attack Exposed Calculated Targeting of Civilians in Kashmir

    Blood in the Meadows: How the Pahalgam Terror Attack Exposed Calculated Targeting of Civilians in Kashmir

    • Business
    • Finance
  • Defense
    • All
    • Defence
    • Strategy
    • Weaponry
    Rajnath Singh at SCO, reaffirming India’s zero-tolerance stand on terrorism.

    “No More Double Standards”: Rajnath Singh’s SCO Message Rewrites India’s Terror Response Playbook

    Recovered arms and arrests have intensified scrutiny on a suspected cross-border terror network.

    Pakistan’s Proxy War Faces a Setback as Delhi Terror Plot is Crushed, 18 Weapons Seized

    The scars of Pahalgam endure, even as the nation moves forward

    Pahalgam Anniversary: Modi Signals Firm National Stand as India Reasserts Anti-Terror Resolve

    Precision Strike: Indian Army Approves Procurement of Indigenous MPATGM to Modernise Infantry Wings

    Precision Strike: Indian Army Approves Procurement of Indigenous MPATGM to Modernise Infantry Wings

    • Defence
    • Strategy
    • Weaponry
  • Geopolitics
    • All
    • Africa
    • Americas
    • Asia Pacific
    • Europe
    • South Asia
    • West Asia
    When law becomes an instrument of exclusion, persecution moves far beyond the courtroom.

    Ahmadis in Pakistan: From Faith to Marginalisation Under Law and Society

    When uranium becomes strategy, India moves first.

    India’s $4 Billion Uranium Coup with Kazakhstan Rewrites the Global Nuclear Balance

    “Fixing the World”: What a Century of Big Ideas Reveals About Us

    “Fixing the World”: What a Century of Big Ideas Reveals About Us

    Pakistan Tried to Bury an NYT Report. It Only Exposed Asim Munir’s Panic

    Pakistan Tried to Bury an NYT Report. It Only Exposed Asim Munir’s Panic

    • Africa
    • Americas
    • Asia Pacific
    • Europe
    • South Asia
    • West Asia
  • Knowledge
    • All
    • Culture
    • Education
    • History
    • Indology
    Chants of ‘Jai Badri Vishal’ Echo as Badrinath Portals Open; All Four Dhams Now Accessible to Pilgrims

    Chants of ‘Jai Badri Vishal’ Echo as Badrinath Portals Open; All Four Dhams Now Accessible to Pilgrims

    Kedarnath Dham Portals Open for Devotees After 181 Days Amid Vedic Chants, Traditional Rituals

    Kedarnath Dham Portals Open for Devotees After 181 Days Amid Vedic Chants, Traditional Rituals

    Sardar Patel and Amit Shah

    Sardar Patel’s 1947 Blueprint on Minority Quotas Resurfaces as Reservation Debate Returns to Centre Stage

    The 1973 Constitution and ‘Bhutto’ the Man Who Made It: What Pakistan Owes and What It Destroyed

    The 1973 Constitution and ‘Bhutto’ the Man Who Made It: What Pakistan Owes and What It Destroyed

    • Culture
    • History
    • Indology
  • Law
  • Lounge
    • All
    • Books
    • Cinema
    • Entertainment
    • Food
    • Games
    • Health
    • Lifestyle
    • Satire
    • Sports
    • technology
    • Travel
    When regulation meets the algorithm

    India Tightens Digital Control as Online Blocking Orders Surge to 24,300 Amid AI Deepfake Trend

    Digital Data Collection In India

    India’s Data Reset Begins: Census 2027 to Become First Fully Digital Population Count

    5 Facilities in Bengaluru Specializing in Mental Health Treatment for Those with Cancer

    5 Facilities in Bengaluru Specializing in Mental Health Treatment for Those with Cancer

    UNESCO World Book Day and Copyright Day

    World Book Day 2026: UNESCO’s Multilingual Push Aligns with India’s Deep Literary Continuum

    • Books
    • Cinema
    • Food
    • Health
    • Sports
    • technology
    • Travel
    • Satire
Tfipost.com
  • Premium
  • Politics
    • All
    • Analysis
    • Opinions
    • Trending
    Rajnath Singh at SCO, reaffirming India’s zero-tolerance stand on terrorism.

    “No More Double Standards”: Rajnath Singh’s SCO Message Rewrites India’s Terror Response Playbook

    Nepal PM Faces Fresh Controversy as Church Demolition Row Triggers Political Storm

    Nepal PM Faces Fresh Controversy as Church Demolition Row Triggers Political Storm

    TCS Jihad Row Sparks National Debate as Nashik Case Raises Serious Questions

    TCS Jihad Row Sparks National Debate as Nashik Case Raises Serious Questions

    A major cross-border crackdown brings one of India’s most wanted narco operators back into custody.

    D-Company’s ₹5,000 Crore Drug Empire Shattered as India Brings Back Dawood Aide Salim Dola after Global Hunt

    • Analysis
    • Opinions
    • Trending
  • Economy
    • All
    • Business
    • Economy1
    • Finance
    India–New Zealand FTA signed in New Delhi, marking a “once in a lifetime” moment in trade ties.

    India, New Zealand Seal Fast-Tracked Trade Pact to Expand Duty-Free Access, Jobs and $5 Billion Trade Target

    Ahmadis in Pakistan: From Faith to Marginalisation Under Law and Society

    Ahmadis in Pakistan: From Faith to Marginalisation Under Law and Society

    Open Demat Account with Zero Annual Maintenance Charges What to Look For

    Open Demat Account with Zero Annual Maintenance Charges What to Look For

    Blood in the Meadows: How the Pahalgam Terror Attack Exposed Calculated Targeting of Civilians in Kashmir

    Blood in the Meadows: How the Pahalgam Terror Attack Exposed Calculated Targeting of Civilians in Kashmir

    • Business
    • Finance
  • Defense
    • All
    • Defence
    • Strategy
    • Weaponry
    Rajnath Singh at SCO, reaffirming India’s zero-tolerance stand on terrorism.

    “No More Double Standards”: Rajnath Singh’s SCO Message Rewrites India’s Terror Response Playbook

    Recovered arms and arrests have intensified scrutiny on a suspected cross-border terror network.

    Pakistan’s Proxy War Faces a Setback as Delhi Terror Plot is Crushed, 18 Weapons Seized

    The scars of Pahalgam endure, even as the nation moves forward

    Pahalgam Anniversary: Modi Signals Firm National Stand as India Reasserts Anti-Terror Resolve

    Precision Strike: Indian Army Approves Procurement of Indigenous MPATGM to Modernise Infantry Wings

    Precision Strike: Indian Army Approves Procurement of Indigenous MPATGM to Modernise Infantry Wings

    • Defence
    • Strategy
    • Weaponry
  • Geopolitics
    • All
    • Africa
    • Americas
    • Asia Pacific
    • Europe
    • South Asia
    • West Asia
    When law becomes an instrument of exclusion, persecution moves far beyond the courtroom.

    Ahmadis in Pakistan: From Faith to Marginalisation Under Law and Society

    When uranium becomes strategy, India moves first.

    India’s $4 Billion Uranium Coup with Kazakhstan Rewrites the Global Nuclear Balance

    “Fixing the World”: What a Century of Big Ideas Reveals About Us

    “Fixing the World”: What a Century of Big Ideas Reveals About Us

    Pakistan Tried to Bury an NYT Report. It Only Exposed Asim Munir’s Panic

    Pakistan Tried to Bury an NYT Report. It Only Exposed Asim Munir’s Panic

    • Africa
    • Americas
    • Asia Pacific
    • Europe
    • South Asia
    • West Asia
  • Knowledge
    • All
    • Culture
    • Education
    • History
    • Indology
    Chants of ‘Jai Badri Vishal’ Echo as Badrinath Portals Open; All Four Dhams Now Accessible to Pilgrims

    Chants of ‘Jai Badri Vishal’ Echo as Badrinath Portals Open; All Four Dhams Now Accessible to Pilgrims

    Kedarnath Dham Portals Open for Devotees After 181 Days Amid Vedic Chants, Traditional Rituals

    Kedarnath Dham Portals Open for Devotees After 181 Days Amid Vedic Chants, Traditional Rituals

    Sardar Patel and Amit Shah

    Sardar Patel’s 1947 Blueprint on Minority Quotas Resurfaces as Reservation Debate Returns to Centre Stage

    The 1973 Constitution and ‘Bhutto’ the Man Who Made It: What Pakistan Owes and What It Destroyed

    The 1973 Constitution and ‘Bhutto’ the Man Who Made It: What Pakistan Owes and What It Destroyed

    • Culture
    • History
    • Indology
  • Law
  • Lounge
    • All
    • Books
    • Cinema
    • Entertainment
    • Food
    • Games
    • Health
    • Lifestyle
    • Satire
    • Sports
    • technology
    • Travel
    When regulation meets the algorithm

    India Tightens Digital Control as Online Blocking Orders Surge to 24,300 Amid AI Deepfake Trend

    Digital Data Collection In India

    India’s Data Reset Begins: Census 2027 to Become First Fully Digital Population Count

    5 Facilities in Bengaluru Specializing in Mental Health Treatment for Those with Cancer

    5 Facilities in Bengaluru Specializing in Mental Health Treatment for Those with Cancer

    UNESCO World Book Day and Copyright Day

    World Book Day 2026: UNESCO’s Multilingual Push Aligns with India’s Deep Literary Continuum

    • Books
    • Cinema
    • Food
    • Health
    • Sports
    • technology
    • Travel
    • Satire
No Result
View All Result
Tfipost.com
Tfipost.com
No Result
View All Result
  • Premium
  • Politics
  • Economy
  • Defense
  • Geopolitics
  • Knowledge
  • Law
  • Lounge

CIA was spying on us all this while, and we just got to know about it

Shalabh Tewari by Shalabh Tewari
12 March 2017
in Geopolitics
cia united states wikileaks

Image Courtesy: The Next Web

Share on FacebookShare on X

George Orwell in his famous work 1984 depicted a dystopian country, Oceania, which is ruled by Big Brother, the leader of the dictatorship that governs it. The oppressive regime of Oceania keeps a watchful eye on its citizens using cameras just like CCTV these days. Telescreens along with microphones are placed in every apartment where Big Brother broadcasts his propaganda to whitewash people from their individuality. Not only criticizing Big Brother is punishable offence but to think this grave act can also send you behind the bars. Thought police is always vigilant and always ready to send a man to his grave whoever it perceives to be engaged in unlawful activities. It is secret agency just like the nefarious KGB (USSR secret service) without which ‘Big Brother’ can’t dream to rule Oceania without any signs of rebellion.

On March 7, 2017, WikiLeaks opened Pandora’s box by starting a new series of leaks on the U.S. Central Intelligence Agency (Code-named ‘Vault 7’) which is the largest ever publication of confidential documents on the agency.

The first full part of the leaks “Year Zero” comprises of 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It contains information of the CIA’s global covert hacking program in which a wide range of products that include Apple’s iPhone, Google’s Android, Microsoft’s Windows and even Samsung TVs are turned into covert microphones.

RelatedPosts

Voices Rise in United States against Persecution of Minorities in Bangladesh

Trump’s 500 Percent Tariff Threat: A Serious Economic and Strategic Blow to India

Inside the Alleged CIA Plot: How Washington’s Hidden Hand Could Be Reshaping Power Across South Asia

Load More

CIA hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence) which is a department that belongs to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major arms of the CIA .The EDG is responsible for the development, testing and support of all malwares, backdoors, exploits, Trojans, viruses used by the CIA in its covert operations all round the world.

The attack against Samsung smart TVs is developed with the cooperation of the United Kingdom’s secret service MI5. When the malware is injected in TV it goes on a ‘Fake-Off’ mode fooling the owner to believe the TV is off when it is on. It records conversations in the room and sends them to a secret CIA server. The leaks also reveal that CIA was also looking to build malwares for the vehicle control systems used in modern cars and trucks. It is most likely that the agency wants to convert the vehicle control systems to assassination devices.

The CIA’s Mobile Devices Branch (MDB) developed numerous malware to hack and control smart phones developed by global giants. Infected phones can be used to send CIA the geo-location, audio and text communications of the user covertly. It can also activate the phone’s camera and microphone. A specialized unit in the CIA’s Mobile Development Branch develops malware to infest and suck data from iPhones and iPads. The special focus on iOS may be explained by the popularity of the iPhone in social, political, diplomatic and business circles.

Google’s Android run devices are not left untouched by CIA.

As of 2016 the CIA had 24 Android “zero days”(malwares) which it has developed itself and obtained some from NSA. In January 2010 IAEA officials who were responsible for monitoring Iran’s nuclear program noticed that the workers of the Natanz nuclear plant were replacing the centrifuges very frequently. It was very odd as each centrifuge has a life expectancy of about 10 years and yet around 2,000 of them were replaced. It was later revealed that the cause of this was a virus ‘Stuxnet’ that had been smuggled into the plant through a pen drive. The development of Stuxnet was done during Bush era to deter Iran from pursuing nuclear aspirations. It is alleged that the malware was a collaborative byproduct of USA and Israel.

CIA can bypass the encryption of social messaging applications like WhatsApp, Telegram and Weibo. The CIA also targets Microsoft Windows users with its malicious spy software. Apart from “zero days “ there is another virus “Hammer Drill” which infects software distributed on DVDs, removable media device such as USBs. Many of these infection programs are planned by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation of CIA malwares “Assassin” and “Medusa”.

It’s much evident that cyber malwares are not possible to keep under effective control. The nuclear programs in the world can be kept under strict monitoring and restrained because of the enormous costs and visible infrastructure involved in assembling fissile material to produce a critical nuclear mass. This is not the case with cyber weapons. Cyber weapons are in fact more dangerous than nuclear weapons in the sense they can be pirated very easily. In the modern world information is power. Since the cyber weapons are entirely comprised of information they can be copied quickly with no marginal cost involved.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to smuggle them without leaving traces. These weapons are double edged swords that can be used against the organizations that produced them. These malicious programs if put into wrong hands can be sold to any other country or terrorist organization for hundreds of thousands dollars to millions of dollars. Companies who may obtain such cyber malware can sometimes use them for their vested interests to obtain advantage over their competitors.

According to Wikileaks, this leak is just the tip of iceberg much is yet to be revealed.

Orwell wrote “Who controls the past controls the future. Who controls the present controls the past” in 1984. In the quest to control the future CIA should not act as a Big Brother. A totalitarian power exerts influence using fear over its subjects by conveying the message that it is omnipresent and omnipotent, which often leads to disastrous consequences.

United States must be wary of that.

Tags: Central Intelligence AgencyCIAUnited States of AmericaVault 7Wikileaks Expose
ShareTweetSend
Previous Post

The numbers on your TV sets hide a key finding of the election results

Next Post

ET Journalists were firmly in the pockets of SP-Congress alliance, We’ll tell you why!

Related Posts

When law becomes an instrument of exclusion, persecution moves far beyond the courtroom.
Geopolitics

Ahmadis in Pakistan: From Faith to Marginalisation Under Law and Society

28 April 2026

The troubles of Ahmadis in Pakistan are not merely those of a religious minority. Their story is about how...

When uranium becomes strategy, India moves first.
Geopolitics

India’s $4 Billion Uranium Coup with Kazakhstan Rewrites the Global Nuclear Balance

28 April 2026

India has secured a landmark uranium supply agreement worth more than US$4 billion with Kazakhstan’s state-run mining giant Kazatomprom....

“Fixing the World”: What a Century of Big Ideas Reveals About Us
Geopolitics

“Fixing the World”: What a Century of Big Ideas Reveals About Us

27 April 2026

In 1945, as the world emerged from the devastation of global war, representatives of 50 nations gathered in San...

Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms of use and Privacy Policy.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Currently Playing

From Runways to Warships: India’s Firefighting Warrior Built for Bases & Battles| IAF | VayuShakti

From Runways to Warships: India’s Firefighting Warrior Built for Bases & Battles| IAF | VayuShakti

00:05:40

Ethanol, EVs and Solar- How India’s Energy Game Is Changing | Modi on LPG & Crude Oil | war| Hormuz

00:05:21

Truth of IRIS Dena: 8 Days That Changed Narrative | War zone Reality, Not an Indian Navy Exercise

00:08:02

300 Million Euros for SCALP: Strategic Necessity or Costly Dependency on France300

00:04:06

Tejas Mk1A: 19th aircraft coupled but Not Delivered: What Is Holding Back the IAF Induction?

00:07:21
Facebook Twitter Instagram Youtube
tfipostTfipost.com
Right Wing | News Analysis | Indian Opinion
  • About us
  • Contact Us
  • Careers
  • Brand Partnerships
  • Terms of use
  • Privacy Policy
  • Sitemap

©2026 TFI Media Private Limited

No Result
View All Result
  • Premium
  • Politics
    • Analysis
    • Opinions
    • Trending
  • Economy
    • Business
    • Finance
  • Defense
    • Defence
    • Strategy
    • Weaponry
  • Geopolitics
    • Africa
    • Americas
    • Asia Pacific
    • Europe
    • South Asia
    • West Asia
  • Knowledge
    • Culture
    • History
    • Indology
  • Law
  • Lounge
    • Books
    • Cinema
    • Food
    • Health
    • Sports
    • technology
    • Travel
    • Satire
TFIPOST हिन्दी
TFIPOST Global

©2026 TFI Media Private Limited