WikiLeaks Vault 7 Highlights Importance Of Tech Self-Sufficiency

By Ulson Gunnar

Leaked documents clearinghouse WikiLeaks has recently released an immense collection detailing the US Central Intelligence Agency’s (CIA) vast and literally Orwellian surveillance and spying capabilities.

The International Business Times in an article titled, “What’s in Vault 7? WikiLeaks publishes huge trove of CIA secrets,” would explain:

WikiLeaks has revealed the contents of the long-awaited Vault 7 – a huge batch of documents allegedly detailing the hacking tools used by the US Central Intelligence Agency (CIA). The whistle-blowing organisation said it may be the largest intelligence publication in history.

It also stated that these tools were used across hacked platforms. It reported:

This includes Samsung TVs, Microsoft Windows, Apple iPhones and smartphones using Google’s Android operating system. The techniques could be used to give the CIA the ability “bypass the encryption” of WhatsApp, Signal, Telegram, Wiebo and Confide, WikiLeaks said.

In George Orwell’s classic novel 1984, TVs would surveil  the population, serving like a universal closed circuit television (CCTV) network. The incremental emergence of just such a surveillance state since the book’s publication has often been described as “Orwellian.” With devices such as phones, laptops, and smart TVs like those manufactured by Samsung now quite literally surveilling the public, the consequences warned of in Orwell’s works have now become a reality.

While the revelations from Vault 7 suggest the US CIA and its European counterparts exploited commercial platforms to build its invasive spying network, some analysts have pointed out that many of these security exploits, backdoors and surveillance features have most likely been created with the explicit cooperation of large technology corporations.

Australia’s Financial Review revealed in 2013 in an article titled, “Intel chips could let US spies inside: expert,” that:

One of Silicon Valley’s most respected technology experts, Steve Blank, says he would be “surprised” if the US National Security Agency was not embedding “back doors” inside chips produced by Intel and AMD, two of the world’s largest semiconductor firms, giving them the possibility to access and control machines.

Corporations like Google and Facebook, the former of which created and maintains the above-mentioned Android mobile operating system, openly collaborate with the United States government and the corporate and financial interests that dominate its domestic and foreign policy. It is highly likely, that in addition to assisting US special interests in the subversion of foreign nations and the facilitation of global war and instability, both corporations are also deeply involved in assisting in surveillance, spying and manipulating the public.

Decentralizing IT

The alliance between these special interests and technology corporations, particularly in light of this most recent deluge of leaked documents, highlights the fundamental importance of decentralizing the design, development, manufacturing and distribution of information technology.

Nations like Russia and China already find themselves in need of producing their own computer hardware and software. The use of domestically produced processors for government computers in Russia represents one tangible solution that can be used to overcome this obvious and growing problem.
Nations like Russia and China also have developed their own social media networks, search engines and even operating systems to protect their respective information spaces. Nations that rely on “security experts” from abroad often find themselves the victims of elaborate infiltration efforts that end up compromising their information space more than had they taken no measures at all.

RFID Scan Blockers – Available for Free (Ad)

Nations like Russia and China have entire pipelines through which human resources can be created and utilized for the construction of domestic information technology infrastructure and security. Other nations, particularly in the developing world must also create similar pipelines and organizations like Google and Facebook to dilute and displace the unwarranted influence these foreign tech giants have within their borders.

Likening IT security to national security, one would find it equally absurd to entrust the former to a foreign agency or enterprise. No nation would reasonably entrust the defense of their physical borders to an outside military force, so why entrust the security of their information space to similarly foreign organizations? Yet that is precisely what is happening around the world.

The CIA’s overreaching power as described in the Vault 7 leaks is only possible because of the vast reach of each and every platform the US intelligence agency used in constructing its techno-panopticon. Corporations like Samsung, Microsoft, Apple and Google reach into virtually every nation on Earth where information technology is prevalent, creating a virtual sea for the CIA’s sharks to swim through and hunt in. Draining this sea through decentralizing the control these corporations currently enjoy, vastly limits the hunting grounds the CIA has access to.

Despite Vault 7 making this unpleasant reality a matter of public debate and concern, being aware of such vast abuses made possible by equally vast tech monopolies is not enough. Nations and individuals creating alternatives beyond the reach of the CIA and other agencies and entities like it  is essential in rolling back or at least complicating these invasive efforts.

Similar threats to privacy and security exist both across the growing “cloud” online, as well as throughout the growing physical network known as the “Internet of Things.” And while both currently consist of likewise monopolized services and platforms, there is no reason why decentralized services and platforms cannot be used instead. Designers and developers around the world already have created and have made available (many times for free) such alternatives allowing people to create their own cloud servers and services as well as their own private “Internet of Things,” independent of universal networks agencies like the CIA have likely infiltrated and compromised.

As a matter of national policy, governments around the world, outside of and targeted by the US-Euro surveillance network must make IT security as much a priority today, in the modern age of information and computing, as  conventional armies, navies and air forces have been in protecting a nation’s physical territory.

Ulson Gunnar, a New York-based geopolitical analyst and writer especially for the online magazine “New Eastern Outlook”, where this article first appeared.

Image Credit:

Activist Post Daily Newsletter

Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

5 Comments on "WikiLeaks Vault 7 Highlights Importance Of Tech Self-Sufficiency"

  1. Bill Gates and other Silicon Valley heavy hitters, along with D. Rockefeller & Brzezinski’s Trilateral Commission are building Russia’s big techno spy base in Skolkovo, Russia, a UN Smart City. Chinese internet censors are legendary for their cyber walls and spying.

    Gunnar writes for NEO, thus his imperative is to spin Russia and China as bastions of freedom when the sad fact is both of these nations are rocketing into the same International Bankster Orwellian clusterf–k as the US and Europe. We need other ways to move away from the dragnet.

  2. I think that many of these companies are owned and run by the entity known as the CIA. What country or who do they work for. I see them as spy devices and revenue sources derived from stolen technologies aquired by these same spy devices.

    • The technology companies and our fake governments are one and the same and are controlled by GLOBAL powers to be.(No. I can’t name them.)
      They used our tax revenues to funnel money to our national labs and defense labs to develop the technologies that will enslave us and set up phony entrepreneurs for us to worship as some whiz kids. The spats with China and Russia et al are pure theater to keep us distracted. Wikileaks is a “shock-testing” entity to gauge how successful they are with their plans. Any real whistle-blower is immediately discredited or killed.
      Based on the Snowden (another “shock tester”) and Wiki-leaks recent revelations and the public’s reaction (ho-hum), I would they that they are very pleased with themselves.

  3. Louis Charles | March 12, 2017 at 2:21 pm | Reply

    I have to admit: The concept of individual liberty is becoming more difficult to imagine. All this “deep state” activity occurs because we live in a society which is based on “legal” currency counterfeiting…. the existence/proliferation of which, then renders it impossible to eradicate. The classic Catch 22. And frankly, I haven’t heard one libertarian (minarchist or AnarchoVol), suggest a means to defend such a liberated community/nation against such an attack. Preventing the infusion of counterfeit currency (even if done by private manufacturers, distributed via voluntary means) is a foundational issue, yet systematically ignored.

Leave a comment

Your email address will not be published.