The TeenScript Newsletter

The TeenScript Newsletter

Share this post

The TeenScript Newsletter
The TeenScript Newsletter
CIA EXPOSED: The Embedded Devices Branch (EDB) and the Automated Implanted Branch (AIB)

CIA EXPOSED: The Embedded Devices Branch (EDB) and the Automated Implanted Branch (AIB)

CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

TeenScript's avatar
TeenScript
Jun 07, 2023
∙ Paid
4

Share this post

The TeenScript Newsletter
The TeenScript Newsletter
CIA EXPOSED: The Embedded Devices Branch (EDB) and the Automated Implanted Branch (AIB)
1
Share

SUMMARY:

The CIA develops and utilizes a range of hacking tools and malware through the Engineering Development Group (EDG), a software development unit within the Center for Cyber Intelligence (CCI). The CCI operates under the Directorate for Digital Innovation (DDI), one of the CIA's major divisions.

The EDG is responsible for creating, testing, and supporting covert tools such as backdoors, exploits, trojans, viruses, and other malware employed worldwide by the CIA.

One notable attack involved cooperation between the CIA and the United Kingdom's MI5/BTSS to target Samsung smart TVs. Using a tool called Weeping Angel, the TV is placed in a deceptive 'Fake-Off' mode, secretly recording conversations in the room and transmitting them to a hidden CIA server via the internet.

The CIA's Mobile Devices Branch (MDB) has developed multiple methods to remotely hack and control popular smartphones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications, and even activate the device's camera and microphone covertly.

Despite the iPhone's relatively small market share in 2016, the CIA's Mobile Development Branch focuses on developing malware specifically for iPhones and other Apple products running iOS. The CIA's arsenal includes both locally developed and externally sourced vulnerabilities ("zero days") obtained from organizations like GCHQ, NSA, and FBI, or purchased from cyber arms contractors such as Baitshop. The emphasis on iOS may be attributed to the iPhone's popularity among influential individuals in social, political, diplomatic, and business circles.

It's worth noting that the CIA has the ability to bypass the encryption of popular messaging apps like WhatsApp, Signal, Telegram, Wiebo, Confide, and Cloackman by hacking the underlying smartphones. By accessing the devices before encryption is applied, the CIA can intercept and collect audio and message traffic.

CIA ORGANIZATIONAL CHART:

Keep reading with a 7-day free trial

Subscribe to The TeenScript Newsletter to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 TeenScript
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share