John R. Houk, Blog Editor
© January 27, 2025
I own a Smart TV and an Android Smart Phone. My wife and the two teenage grandchildren that live with us own Smart iPhones. So what? Right?
I just read a post from Liberty Reports which has no date but the email alert is dated as 1/25/26 entitled, “CIA’s Shocking Power Over Your Devices”. The CIA is fingered as the villain. BUT it is very likely EVERY SINGLE American Alphabet Intel Agency has the same intrusive unconstitutional capability for unwarranted American snooping.
As a Christian-Conservative-Patriot, this matters to me because the previous installed Biden Administration label my way of thinking as placing me in the realm of Enemy of the State of the Dem-Marxist ruled regime. Tyranny was widely executed against Trump supporters. Ask a J6er.
If you are an un-American Dem-Marxist supporter. IF YOU get the civil war YOUR leadership has been inciting, YOU can count on this Intel Alphabet Soup to Look, Listen and Watch YOU during a Trump Administration.
John Kiriakou – CIA Whstleblower
JRH 1/27/26
ALWAYS FREE TO READ yet READER SUPPORTED!
PLEASE! I need more Patriots to step up. I need Readers to chip in $5 - $10 - $25 - $50 - $100 (PAYPAL or CARD - one-time or recurring). YOUR generosity is APPRECIATED. PLEASE GIVE to Help me be a voice for Liberty:
Big Tech Censorship is pervasive – Share voluminously on all social media platforms!
Our Senior Citizen Family Supplements our income by offering healthy coffee products. BETTER YOUR HEALTH with healthy & good tasting COFFEE and enjoy some weight management supplements. BUY Happy Coffee & Weight Loss Supplements at the Diana Wellness Store:
https://dianawellnessstore.com
***********************************
CIA’s Shocking Power Over Your Devices
Email Alert Date: January 25th, 2026 at 5:03 PM
Electronic Device Spying (Liberty Reports Photo)
Your television can listen to your conversations even when it’s turned off, and that’s the least concerning thing a former CIA officer just confirmed about the devices you own.
Story Snapshot
· Former CIA counterterrorism chief John Kiriakou confirms intelligence agencies can remotely hijack phones, televisions, and vehicles through embedded computers
· The 2017 Vault 7 leak documented CIA tools capable of converting smart TVs into listening devices and exploiting vulnerabilities in every major operating system
· Kiriakou warns that Russian, Chinese, Israeli, Iranian, and allied intelligence services possess identical surveillance capabilities
· The technical barrier no longer exists—the only question is whether you’ve become important enough to target
When a Whistleblower Already Paid the Price
John Kiriakou didn’t arrive at his current warnings through speculation. The 14-year CIA veteran served as Chief of Counterterrorist Operations in Pakistan after September 11th, a position that placed him at the operational heart of America’s intelligence apparatus. In 2007, he became the first U.S. official to publicly confirm the CIA’s use of torture. That disclosure cost him his career, his security clearance, and 30 months in federal prison after a 2012 conviction for passing classified information to journalists. When someone who has already sacrificed everything speaks, the wise listen carefully.
Youtube VIDEO: “Terrifying” CIA Technology Will Blow Your Mind | Former CIA Officer John Kiriakou
[Posted by Dalton Fischer Podcast
Posted on Sep 7, 2025
Full interview with John Kiriakou: Mossad, Terrifying CIA Technology, Blackwater & The Most Secret CIA Unit | John Kiriakou [4:18:19-Hours]
His recent appearances on LADbible’s Honesty Box and Steven Bartlett’s Diary of a CEO podcast weren’t designed to shock for entertainment value. Kiriakou provided specific, documented capabilities grounded in the 2017 WikiLeaks release known as Vault 7—a massive trove of CIA documents spanning 2013 to 2016 that detailed the agency’s cyber operations toolkit. These weren’t theoretical programs. They were operational tools with user manuals, bug reports, and version updates.
What the Documents Actually Revealed
The Vault 7 disclosures weren’t vague allegations about potential government overreach. They contained technical specifications for compromising iPhones and Android devices, exploiting security vulnerabilities in Windows, macOS, and Linux systems, and converting Samsung smart televisions into covert listening devices. The documents outlined malware designed to evade detection and attribution, programs targeting web browsers and messaging applications, and methods to maintain persistent access to compromised systems. This wasn’t science fiction—it was engineering documentation for surveillance infrastructure already deployed.
Kiriakou’s contribution transforms these technical documents into plain language: “They can intercept anything from anyone.” The “they” he references extends far beyond Langley. The NSA, FBI, British intelligence, French services, German agencies, Canadian operations, and the intelligence arms of Australia, New Zealand, Russia, China, Israel, and Iran all possess comparable technological capabilities. [Blog Editor Bold Text emphasis] The assumption that only American agencies conduct electronic surveillance reflects a dangerous naiveté about how global intelligence operations function in the digital age.
Your Car as a Remote-Controlled Weapon
The vehicle control capabilities Kiriakou describes sound like plot devices from a political thriller, but they exploit genuine vulnerabilities in automotive computer systems. Modern vehicles contain dozens of embedded computers managing everything from braking systems to steering mechanisms. These systems communicate through internal networks, and those networks can be accessed remotely through various entry points—entertainment systems, diagnostic ports, or wireless connectivity features marketed as convenience upgrades. Kiriakou frames the capability bluntly: “They can remotely take control of your car through the car’s embedded computer, to do what? To make you drive off a bridge into a tree, to make you kill yourself and make it look like an accident.”
The technical feasibility isn’t disputed by security researchers who have demonstrated similar exploits in controlled environments. What remains unknown is deployment frequency. Kiriakou emphasizes a crucial distinction—possessing a capability differs fundamentally from systematic deployment. Intelligence agencies operate under resource constraints. The question isn’t whether they can compromise your vehicle; it’s whether you’ve become a high-enough priority target to justify the operational investment. [Blog Editor Bold Text Emphasis] That calculation should provide limited comfort.
The Television That Never Stops Listening
Kiriakou notes that the capability to convert smart TVs into listening devices existed when he was hired in the 1980s, categorizing it as “old technology.” The Vault 7 documents confirmed that Samsung smart televisions could be placed in a “Fake-Off” mode—appearing powered down while microphones remained active, transmitting conversations to remote servers. The speaker component functions as a microphone, capturing audio in the room and transmitting it without any visible indicator that surveillance is occurring. No blinking lights, no status indicators, no user consent notifications.
The television in your living room represents the perfect surveillance device—centrally located in homes, positioned to capture conversations in common areas, equipped with always-on internet connectivity, and trusted by users who assume a powered-down device is actually disabled. The technical term for this is “hardware-level compromise,” meaning security cannot be restored through software updates or settings adjustments. The vulnerability exists in the device architecture itself.
The Oversight Vacuum and Constitutional Questions
The asymmetry between capability and accountability creates a dangerous vacuum. Intelligence agencies develop and deploy surveillance tools that remain largely opaque to both the public and elected representatives charged with oversight. The Vault 7 disclosures revealed not just technical capabilities but the absence of meaningful constraints on their deployment. When Kiriakou states “they’re not secure, at all” regarding personal devices, he’s confirming that the constitutional frameworks designed to protect citizens from warrantless surveillance have failed to keep pace with technological capability. [Blog Editor Bold Text Emphasis]
The Fourth Amendment’s protections against unreasonable searches and seizures were written for a world of physical documents and face-to-face conversations. Digital surveillance bypasses these protections through technical means that occur invisibly and remotely. The legal doctrine of “third-party consent” means that data shared with technology companies may not retain constitutional protections. When intelligence agencies can access data directly from devices without user knowledge, the entire framework of consent-based privacy collapses. American conservatives rightly emphasize limited government power and individual liberty—principles fundamentally undermined by unchecked surveillance infrastructure.
Sources:
o Former CIA spy warns agency’s tools can takeover your phone, TV, and even your car – Times of India
o CIA agent listens phones cameras – LADbible
o Intelligence officer breaks down what phones listen – UNILAD Tech
© 2026 Liberty Reports. All Rights Reserved.
ABOUT Liberty Reports



No comments:
Post a Comment