The FBI announced last week a federal criminal investigation is being opened into WikiLeaks 8,000 page dump revealing how extensive and intrusive the CIA hacking program delves into electronic devices, including smartphones, computers and smart televisions. A gigantic operation of spying employing thousands of government paid “hackers.”
And guess who the CIA was “framing” in the worldwide hacks according to the leaked documents? Russia, of course.
Exactly who is the CIA using this massive spy program and high tech hacking technology against? Could it be they are using their hacking program to spy on others inside of the US?
Which raises questions to the validity of CIA “evidence” claim that Russia was responsible for the email hacks of the DNC and Hillary’s campaign manager, John Podesta. Evidence yet to be released to the public, while giving only a few of the political movers and shakers in DC privilege to the alleged “evidence,” including).
“To hide its operations, the CIA routinely adopted techniques that enabled its hackers to appear as if they were Russian, according to the documents on WikiLeaks.”
If the CIA was indeed using techniques that would make it appear as though Russia was responsible for the hackings, then howregarding any investigation into the alleged presidential intrigue that top DNC officials and the Clintons claim was responsible for Hillary’s loss to President Trump?
James Lewis, director of DC based Center for Strategic and International Studies and a former State Department contractor during the Obama administration, said in the CNN report the most likely culprit of the leaked documents to WikiLeaks is a government employee or Russia government; and there it is again placing the blame onto Vladimir Putin.
WikiLeaks founderis responsible for handing over the leaked “Vault 7” documents. Assange states it was a former “hacker” contracted by the government who downloaded the extensive documents to the whistleblowing website.
Could this former government “contractor”at one of the giant tech companies who service the CIA?
The leaked documents mention four companies that may have been hacked into; Google, Apple, Microsoft and Samsung, all ofat top technology levels of research and development in writing computer coding, some being from nations openly hostile to the US like Iran.
However one company that is not mentioned in the leaked CIA documents is Amazon Web Servicescontract with the intelligence agency along with 17 other intelligence departments for its “cloud” services, which stores intelligence documents. AWS also employs H-1B visa workers from foreign countries as well.
AWS is an extension of Amazon whose founder and, the political go-to newspaper, which has been the source of many . Leaked reports regarding Russian intrigue into the presidential election and alleged investigations that led to the resignation of the . The FBI cleared Flynn of any wrongdoing, but the MSM frenzy led by the Washington Post forced Trump to seek a replacement.
Given AWS relationship with the CIA and US intelligence then it stands to reason the investigation would start there given the leaked documents may have been stored on the AWS “cloud.” Yet, nothing thus far in official statements indicates AWS is included in the investigation? Why?
, one designed to disrupt and ultimately take down President Trump and his administration? A cause growing every day with more and more within the government, as well as former appointees like former , jumping onboard the Obama locomotive stream rolling Trump and his administration?
WikiLeaks states the CIA hacking tools have been stolen and are already in the possession of other hackers and foreign spies, which concerns the Trump administration to the gravity of the situation and threat to national security even though the activities did not occur under his watch.
So when did the breaches occur? Were they over a long course of time during Obama’s presidency or did they occur around the time and shortly after the presidential election? Were these leaks intentional in order to expose vulnerabilities that can be exploited once Trump took his oath?
in a press briefing the alleged activities of the CIA and hacking are a grave threat to national security and one of great concern for the administration even though they took place during the Obama administration.
“These alleged leaks should concern every single American in terms it has on the impact of our national security,”.
Also voicing concern about the threat is CIA spokesman, Ryan Tripani, anotheradministration. he has “no comment on the authenticity of purported intelligence documents released by WikiLeaks or on the status of any investigation into the source of the documents,” other officials have indicated the documents are authentic. Tripani spoke more about the dump itself and not to authenticity.
“The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the intelligence community’s ability to protect America against terrorists and other adversaries,”“Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm.”
With his statement it appears the spy “tools” and activities outlined in the documents certainly are authentic and should concern every American, especially since at the same time last week FBI director, James Comey stated, “there is no there is no such thing as privacy in America.”
Exactly what was Comey indicating with his remark, that American citizens are being “watched” as well?
Are these exposed CIA tools being used to spy on average Americans who opposed Obama and Clinton over the past eight years? If it sounds too Orwellian and “big brother” let us not forget a few years ago when the NSA was exposed for secretly capturing all emails, computer activities and phone communications being stored in a large computer database.
If the NSA is guilty of such intrusive, unconstitutional tactics and surveillance, then rest assured the CIA is involved in the same type of deceitful activities against the American people. For what purpose? Is this technology giving access to every smartphone, computer and smart TV in the world being used to spy on potential terrorists and hostile foreign countries? Has it been used to assist one political party over another while blaming Russia for the intrigue?
Or is it also being used for a far darker and more sinister plan against the US government and its citizens as well? Exactly what is stored on the CIA’s AWS “cloud” and how will be it used against President Trump and his “Deplorables” in the future.and and his scheme of an open borders society of one world legal, social and financial governance enslaving the masses.
That is the “$600 million” question all Americans should be demanding an answer before it is too late to stop whatever grand scheme is truly already in motion.
You may share this post on Facebook and Twitter.
Let us know what you think in the comments section below: