Survivopedia
  • HOME
  • GENERAL PREP
    • All
    • Disaster Scenarios
    • EMP
    • Natural Disasters
    • Survival News
    • Survival Skills
    Food Storage Methods Across Cultures

    Food Storage Methods Across Cultures

    When Hope Feels Distant: Survival Lessons from Faithful Generations

    Packing a Family Vehicle for Long-Term Bug-Out Living

    Packing a Family Vehicle for Long-Term Bug-Out Living

    Raising Strong Kids in a Weak Culture

    Natural Anti-Inflammatories That Store for Years

    What If the Power Grid Goes Down Tomorrow?

    What If the Power Grid Goes Down Tomorrow?

    What the Ukraine War Taught Us About Civilian Survival

    What the Ukraine War Taught Us About Civilian Survival

    Bugging In vs. Bugging Out: What Historic Cultures Would Choose

    Why We Prep

    • SHTF SCENARIOS
      • Survival Skills
      • Disaster Scenarios
      • Natural Disasters
      • WATER
      • FINANCIAL
      • WAR & CONFLICTS
      • emp
    • EQUIPMENT
      • Bug-Out-Vehicle
      • Firearms
      • COMMUNICATION
    • ENERGY
      • ENERGY
      • Energy Sources
      • Electric Equipments
      • Consumption Control
  • WEAPONS
    • All
    • Cold Weapons
    • Firearms
    • Regulations
    Field Reloading

    Field Reloading

    Fully Automatic Firearms? No Thanks!

    Are Alternative Weapons Practical in a Post-Disaster World?

    How To Travel With A Firearm

    The Ultimate Survival Knife: How to Pick the Right One

    A Sharp Edge: Choosing the Best Survival Knife for Prepping and Self-Defense

    Is There a Place for “Fast Draw” in Survival?

    Indispensable Gear for your EDC Core Layer

    Best 17 silent weapons for when SHTF

    Best 17 silent weapons for when SHTF

    • Firearms
    • Cold Weapons
    • Defense
    • Privacy & Data Protection
    • Regulations
  • FOOD
    • All
    • Cooking
    • Farm Animals
    • Food Storage
    • Hunting
    • Plants & Gardening
    Food Storage Methods Across Cultures

    Food Storage Methods Across Cultures

    8 Medicinal Plants the Native Americans Used for Survival

    Catching and Preserving Fish in Survival Situations

    Herbal and Alternative Antibiotics

    Heirloom Vegetables and Seeds

    Heirloom Vegetables and Seeds

    How To Stash Water When You’re Bugging In

    How To Stash Water When You’re Bugging In

    9 Composting Mistakes – All that Stands Between You and Black Gold

    9 Composting Mistakes – All that Stands Between You and Black Gold

    This Is Why The Amish Will Not Go Hungry During A Crisis

    This Is Why The Amish Will Not Go Hungry During A Crisis

    Eating Snake Meat – The Dos and Don’ts

    • Food Storage
    • Cooking
    • Farm Animals
    • Hunting
    • Plants & Gardening
  • Store
  • Newsletter
  • HOME
  • GENERAL PREP
    • All
    • Disaster Scenarios
    • EMP
    • Natural Disasters
    • Survival News
    • Survival Skills
    Food Storage Methods Across Cultures

    Food Storage Methods Across Cultures

    When Hope Feels Distant: Survival Lessons from Faithful Generations

    Packing a Family Vehicle for Long-Term Bug-Out Living

    Packing a Family Vehicle for Long-Term Bug-Out Living

    Raising Strong Kids in a Weak Culture

    Natural Anti-Inflammatories That Store for Years

    What If the Power Grid Goes Down Tomorrow?

    What If the Power Grid Goes Down Tomorrow?

    What the Ukraine War Taught Us About Civilian Survival

    What the Ukraine War Taught Us About Civilian Survival

    Bugging In vs. Bugging Out: What Historic Cultures Would Choose

    Why We Prep

    • SHTF SCENARIOS
      • Survival Skills
      • Disaster Scenarios
      • Natural Disasters
      • WATER
      • FINANCIAL
      • WAR & CONFLICTS
      • emp
    • EQUIPMENT
      • Bug-Out-Vehicle
      • Firearms
      • COMMUNICATION
    • ENERGY
      • ENERGY
      • Energy Sources
      • Electric Equipments
      • Consumption Control
  • WEAPONS
    • All
    • Cold Weapons
    • Firearms
    • Regulations
    Field Reloading

    Field Reloading

    Fully Automatic Firearms? No Thanks!

    Are Alternative Weapons Practical in a Post-Disaster World?

    How To Travel With A Firearm

    The Ultimate Survival Knife: How to Pick the Right One

    A Sharp Edge: Choosing the Best Survival Knife for Prepping and Self-Defense

    Is There a Place for “Fast Draw” in Survival?

    Indispensable Gear for your EDC Core Layer

    Best 17 silent weapons for when SHTF

    Best 17 silent weapons for when SHTF

    • Firearms
    • Cold Weapons
    • Defense
    • Privacy & Data Protection
    • Regulations
  • FOOD
    • All
    • Cooking
    • Farm Animals
    • Food Storage
    • Hunting
    • Plants & Gardening
    Food Storage Methods Across Cultures

    Food Storage Methods Across Cultures

    8 Medicinal Plants the Native Americans Used for Survival

    Catching and Preserving Fish in Survival Situations

    Herbal and Alternative Antibiotics

    Heirloom Vegetables and Seeds

    Heirloom Vegetables and Seeds

    How To Stash Water When You’re Bugging In

    How To Stash Water When You’re Bugging In

    9 Composting Mistakes – All that Stands Between You and Black Gold

    9 Composting Mistakes – All that Stands Between You and Black Gold

    This Is Why The Amish Will Not Go Hungry During A Crisis

    This Is Why The Amish Will Not Go Hungry During A Crisis

    Eating Snake Meat – The Dos and Don’ts

    • Food Storage
    • Cooking
    • Farm Animals
    • Hunting
    • Plants & Gardening
  • Store
  • Newsletter
No Result
View All Result
Survivopedia
No Result
View All Result
Home SECURITY Privacy & Data Protection

Cyber-warfare Has Just Moved Into The Realm Of Reality

Ever since computers became popular, there have been those who wanted to hack their way in and find their secrets. For most of those early hackers, the thrill was in the chase, and the victory was in breaking in.

Most of their work was benign, with hackers being content to have succeeded in doing what they weren’t supposed to be able to do.

As computer use grew, so did hacking. But it changed as well.

With the massive connectivity and easy access that the internet offers, more and more hackers found their niche in life. These newer hackers weren’t content with merely breaching security for the sake of breaching security, they had nefarious intent in their work.

Whether that was the spread of viruses, identity theft or simply data mining for profit, it looked at the millions of computers connected to the internet as targets for attack, not just for play.

Malware has become a major threat on the Internet today, with countless hackers and even companies creating and distributing it across the world. While some is merely created for commercial purposes, placing ads on people’s computers, there is much more that spells real danger to individuals and companies worldwide.

It couldn’t stay that way though. Governments everywhere hold with the idea that only they can pursue illegal activities. While they work to keep their citizens from committing those acts, they are quick to adopt them themselves, and use them covertly to further their country or political party’s agenda.

Such has been the case of hacking and malware in general. The first to see the value of it were the Chinese, who created a cyber-warfare branch in their army. They immediately started working to find ways into other countries computers, especially those of opposing governments and their military branches.

They didn’t limit it to that. They sought out ways to attack critical infrastructure, such as disabling power plants or bypassing the failsafes on nuclear power plants.

While China got a head start on the rest of the world, other countries have been working to catch up, including the United States of America.

Rather than making cyber-warfare a branch of the military, it seems that we’ve left it up to our intelligence organs, most especially the CIA and the NSA.

Once it moved behind the walls of intelligence operations, any efforts towards U.S. development of cyber-warfare became very hush-hush. Few knew about it, and even fewer admitted it was happening.

The vast majority of Congress was left in the dark, as they had no oversight of intelligence operations. And with Congress in the dark, the American people were totally cut out of what was happening.

Vault 7, the US Government and Cyber-warfare

The most recent Wikileaks dump, cryptically called Vault 7, has breached the secrecy of US government involvement in cyber-warfare for the very first time.

Specifically, the first 8,761 documents demonstrate the CIA’s involvement in creating millions of lines of malware code, including viruses, Trojans, weaponized “zero day” exploits, remote control systems and other forms of malware.

In total, there were over 1,000 different hacking systems, Trojans, viruses and other “weaponized” malware. While the actual code does not seem to be part of the data dump (and that’s a good thing), documentation about its existence and descriptions of its capability have been released.

All of this was produced by the Center for Cyber Intelligence (CCI), a sub-agency of the CIA’s Directorate for Digital Innovation (DDI). This directorate, the most recent addition to the CIA’s organization chart, comprises over 5,000 registered users, many of whom are programmers and expert hackers.

The release of this information is a major blow against American cyber-warfare; but apparently it’s one that needed to happen. I say that, even though I’m not entirely comfortable about it, because according to Wikileaks, the CIA has recently lost control of the majority of their digital arsenal.

This extremely dangerous code has been circulated amongst former U.S. government hackers and contactors in an unauthorized manner.

Notice that I said “former,” not current. That’s the information that Wikileaks has, and also the means by which they were given access to this amazing data. Apparently one of those former workers felt the public needed to know what was going on behind closed doors.

The Malware Market

Should this code make it out into the dark Internet, the results could be disastrous. Apparently there is quite a market for all sorts of malware, with customers willing to pay large sums, even into the millions for programs which will permit them access to things they shouldn’t have access too.

But that’s not the biggest problem. The big one is that once out in the open, this malware could spread around the globe in mere minutes, used and targeted by an army of individual hackers.

Unlike other weapons systems, electronic weapons don’t explode and disappear. If anything, their “explosion” causes them to multiply across computers and networks, infecting more and more as they go.

While it may be possible to take them off a particular computer, usually by scrubbing the hard drive and doing a global reinstall, they never really go away. The same electronic weapons can be used over and over again.

This code got out into the open, we can’t count on the good graces of the people who have it. While some of those CIA contractors and employees will act responsibly with what they have, invariably there will be those who will see an opportunity to use it for nefarious ends or perhaps for personal gain.

There’s another aspect of this, which is even scarier than what hackers will do with the CIA’s digital arsenal. That’s what the CIA themselves have done with it.

In 2013, Edward Snowden came forth as a whistleblower, informing the country that the NSA was spying on American citizens, in contrary to the law. This new batch of information tells us that the NSA aren’t the only ones doing that. The CIA is doing so as well.

There have always been rivalries between the various intelligence agencies. FDR created the OSS during World War II to combat this problem. Yet the OSS and later the CIA haven’t managed to eliminate that rivalry. Rather, they’ve become part of it.

One of the results of these rivalries is overlaps in areas of responsibility and multiple departments performing the same task. Such seems to be the case here, with the CIA performing its own version of the NSA’s work. Yet without knowing who ordered the CIA to do this or when it was ordered, there’s no real way of knowing whether this is an authorized operation or not.

Video first seen on Fox News. 

But there’s more than just the CIA spying on our communications, like the NSA does. Apparently they’ve developed malware that targets iPhones, Android phones, smart TVs and even Microsoft Windows. This malware invokes thoughts of Orwell’s 1984, if anything does. With it, the CIA can turn on these devices and use them to spy on their owners.

For some reason, Samsung TVs in particular have been targeted by the CIA. Their malware, called “Weeping Angel,” which was developed in conjunction with the United Kingdom’s MI5, allows the television to operate in a “fake off” mode, where it appears to be off to the owner, but a microphone in the unit is recording everything said in the room and forwarding it to the CIA, via the internet.

This is just one example of the types of “back door” malware programs which the CIA has developed. Similar malware can be used to hack in to smartphones allowing the CIA to determine the owner’s location, read their e-mail, their text messages, search the phone’s memory and activate both the camera and microphone.

Quite literally, they can spy on anyone, anywhere, anytime they choose, and we can’t do a thing about it.

Even encryption won’t help, as the CIA has means of accessing the data, before it is encrypted. So much for the various communications platforms out there, which claim to encrypt your communications. If the CIA can access the information before it is encrypted, the encryption is useless. The government will know what’s in your communications, perhaps even before you do.

Before We Panic

All of this capability was probably developed with the best of intentions. The CIA, like other intelligence agencies, is involved in the war on terror. As terrorists tend to hide in the population and use the same communications that many of us do, it is necessary to develop the means of penetrating those communications to investigate the actions of those terrorists.

But where does it stop? What’s to say that they aren’t amassing files on each one of us? It’s already been reveled that the NSA is doing that, storing all of our communications in their massive data storage facilities. Snowden told us how that information is misused by analysts breaking the rules.

Those analysts aren’t the real issue though; the real issue is the government that is stealing our privacy. Spying on American citizens is a clear betrayal of our Fourth Amendment rights against unlawful search and seizure.

Yet we, the American people, are routinely subjected to a level of surveillance that the Founding Fathers couldn’t have imagined. Even those of us who are not doing anything illegal have things in our lives, which we would rather not have known.

Even if the CIA can demonstrate that they haven’t broken our Fourth Amendment rights, how can we trust them? There is literally nobody who has access to their files. So there is no way to prove that they are telling the truth.

The only information we would have access to, is that which they release, with the intention of demonstrating their innocence. Not exactly something you could take to a court of law.

There is only one solution for those of us who want privacy. That’s to foreswear the use of all modern means of communications. While not exactly practical, there may come a day when we need to; especially if the government starts misusing our information.

I just know one thing. I’m going to be careful about what I put out over the Internet, over my phone and through any other electronic means of communications I find myself using. There’s no reason to give anyone ammunition, which might find its way back, being used against me on some future date.

This article has been written by Bill White For Survivopedia. 

References:

http://www.foxnews.com/tech/2017/03/08/cia-cyber-spying-toolkit-now-in-hands-hackers-worldwide-wikileaks.html

https://wikileaks.org/ciav7p1/

http://www.wired.co.uk/article/cia-files-wikileaks-vault-7

Tags: civil rightssocietal breakdown
ShareTweet
Previous Post

How To Build A Privacy Fence

Next Post

Reinventing The Wheel: How To Get Perfectly Round Shapes

Bill White

Bill White

Bill White is the author of Conquering the Coming Collapse, and a former Army officer, manufacturing engineer and business manager. More recently, he left the business world to work as a cross-cultural missionary on the Mexico border. Bill has been a survivalist since the 1970s, when the nation was in the latter days of the Cold War. He had determined to head into the Colorado Rockies, should Washington ever decide to push the button. While those days have passed, the knowledge Bill gained during that time hasn’t. He now works to educate others on the risks that exist in our society and how to prepare to meet them. You can send Bill a message at editor [at] survivopedia.com.

Related Posts

Food Storage Methods Across Cultures
Food Security

Food Storage Methods Across Cultures

September 23, 2025
7 Uses for Tarps You Probably Never Considered
Equipment

7 Uses for Tarps You Probably Never Considered

September 3, 2025
What the Ukraine War Taught Us About Civilian Survival
GENERAL PREP

What the Ukraine War Taught Us About Civilian Survival

September 3, 2025
Defense

What a Native Tribe Would Do in the First 72 Hours of Collapse

August 18, 2025
The Impulses That Can Kill You During a Confrontation and How to Overcome Them
Defense

The Impulses That Can Kill You During a Confrontation and How to Overcome Them

August 14, 2025
Food Security

Catching and Preserving Fish in Survival Situations

August 12, 2025
Next Post
Reinventing The Wheel: How To Get Perfectly Round Shapes

Reinventing The Wheel: How To Get Perfectly Round Shapes

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Food Storage Methods Across Cultures

Food Storage Methods Across Cultures

September 23, 2025

Bugging In vs. Bugging Out: What Historic Cultures Would Choose

September 12, 2025
What the Ukraine War Taught Us About Civilian Survival

What the Ukraine War Taught Us About Civilian Survival

September 3, 2025

When Hope Feels Distant: Survival Lessons from Faithful Generations

September 5, 2025
Top 6 Survival Rifles And Why You Need One

Top 6 Survival Rifles And Why You Need One

428
Top 5 Bug Out Locations In The US

Top 5 Bug Out Locations In The US

257
Top 10 Vehicles For Your EMP Survival

Top 10 Vehicles For Your EMP Survival

162
10 Items You Need To Hoard

10 Items You Need To Hoard

148
Food Storage Methods Across Cultures

Food Storage Methods Across Cultures

September 23, 2025

When Hope Feels Distant: Survival Lessons from Faithful Generations

September 5, 2025
Packing a Family Vehicle for Long-Term Bug-Out Living

Packing a Family Vehicle for Long-Term Bug-Out Living

September 5, 2025

Raising Strong Kids in a Weak Culture

September 3, 2025











Recent Articles

Food Storage Methods Across Cultures

Food Storage Methods Across Cultures

September 23, 2025

When Hope Feels Distant: Survival Lessons from Faithful Generations

September 5, 2025
  • Privacy Policy
  • Terms&Conditions
  • Blogroll
  • Contact
  • Newsletter

© SURVIVOPEDIA.COM

No Result
View All Result
  • HOME
  • GENERAL PREP
    • SHTF SCENARIOS
      • Survival Skills
      • Disaster Scenarios
      • Natural Disasters
      • WATER
      • FINANCIAL
      • WAR & CONFLICTS
      • emp
    • EQUIPMENT
      • Bug-Out-Vehicle
      • Firearms
      • COMMUNICATION
    • ENERGY
      • ENERGY
      • Energy Sources
      • Electric Equipments
      • Consumption Control
  • WEAPONS
    • Firearms
    • Cold Weapons
    • Defense
    • Privacy & Data Protection
    • Regulations
  • FOOD
    • Food Storage
    • Cooking
    • Farm Animals
    • Hunting
    • Plants & Gardening
  • Store
  • Newsletter

© SURVIVOPEDIA.COM