<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[CO-OP NEWS]]></provider_name><provider_url><![CDATA[https://cooptv.wordpress.com]]></provider_url><author_name><![CDATA[Coop Anti-War Cafe Berlin]]></author_name><author_url><![CDATA[https://cooptv.wordpress.com/author/zeitgeistmusic/]]></author_url><title><![CDATA[8,000 Documents Detail CIA&nbsp;Crimes]]></title><type><![CDATA[link]]></type><html><![CDATA[<p>The leaked documents detail how:</p>
<ul>
<li>CIA has espionage division more powerful than NSA with no checks and balances.</li>
<li>CIA’s secret hacking division produced a huge about of weaponized malware to infest iPhone, Android phones — and lost control of it.</li>
<li>CIA loses control of entire cyber weapons arsenal due to negligence.</li>
<li>Obama’s CIA built most powerful cyber attack arsenal, costing U.S. taxpayers $100+ billion. Lost it due to negligence.</li>
<li>CIA illicitly hoarded “zero day” attacks, putting business and government at risk.</li>
<li>Obama admin used their advanced cyber attack arsenal against private citizens.</li>
<li>CIA inserted CIA coders in major U.S. tech companies to implement backdoors directly.</li>
<li>CIA can turn smart TVs, iPhones, gaming consoles and many other electronicc devices into open mics.</li>
<li>CIA can spy on you through your smart TV.</li>
<li>CIA can turn all internet-enabled consumer electronic devices into listening devices.</li>
<li> CIA has backdoors to every PC running Microsoft.</li>
<li>Skype voice conversations are converted into text and stored in CIA spy cloud.</li>
<li>CIA has backdoor access to basically anything produced by Microsoft, Apple, Cisco and Google.</li>
<li>CIA can remotely control cars, planes, and hospital devices — a useful technique for assassinations.</li>
<li>CIA malware is used to spy on journalists, discover sources of leaks.</li>
<li>U.S. Consulate in Frankfurt is a covert CIA hacking center.</li>
<li>CIA uses Russian malware, leaves fake “fingerprints” to “misdirect attribution” of cyber attacks.</li>
</ul>
<p>&nbsp;</p>
]]></html></oembed>