Home > US News, USA > Federal Government Launching Investigation Into WikiLeaks’ Recent Exposure Of CIA

Federal Government Launching Investigation Into WikiLeaks’ Recent Exposure Of CIA

Julian Assange and his whistleblowing website WikiLinks now the target of a US government investigation for leaking CIA spying documents.

The FBI announced last week a federal criminal investigation is being opened into WikiLeaks 8,000 page dump revealing how extensive and intrusive the CIA hacking program delves into electronic devices, including smartphones, computers and smart televisions. A gigantic operation of spying employing thousands of government paid “hackers.”

And guess who the CIA was “framing” in the worldwide hacks according to the leaked documents? Russia, of course.

Exactly who is the CIA using this massive spy program and high tech hacking technology against? Could it be they are using their hacking program to spy on others inside of the US?

Which raises questions to the validity of CIA “evidence” claim that Russia was responsible for the email hacks of the DNC and Hillary’s campaign manager, John Podesta. Evidence yet to be released to the public, while giving only a few of the political movers and shakers in DC privilege to the alleged “evidence,” including RINO Trump antagonists Lindsay Graham (R-SC) and John McCain (R-AZ).

According to a CNN report:

“To hide its operations, the CIA routinely adopted techniques that enabled its hackers to appear as if they were Russian, according to the documents on WikiLeaks.”

If the CIA was indeed using techniques that would make it appear as though Russia was responsible for the hackings, then how can the CIA be trusted to tell the truth regarding any investigation into the alleged presidential intrigue that top DNC officials and the Clintons claim was responsible for Hillary’s loss to President Trump?

James Lewis, director of DC based Center for Strategic and International Studies and a former State Department contractor during the Obama administration, said in the CNN report the most likely culprit of the leaked documents to WikiLeaks is a government employee or Russia government; and there it is again placing the blame onto Vladimir Putin.

WikiLeaks founder Julian Assange denies the report Russia is responsible for handing over the leaked “Vault 7” documents. Assange states it was a former “hacker” contracted by the government who downloaded the extensive documents to the whistleblowing website.

Could this former government “contractor” be a H-1B Visa worker at one of the giant tech companies who service the CIA?

The leaked documents mention four companies that may have been hacked into; Google, Apple, Microsoft and Samsung, all of which use H-1B Visa workers at top technology levels of research and development in writing computer coding, some being from nations openly hostile to the US like Iran.

However one company that is not mentioned in the leaked CIA documents is Amazon Web Services (AWS) who has a $600 million government contract with the intelligence agency along with 17 other intelligence departments for its “cloud” services, which stores intelligence documents. AWS also employs H-1B visa workers from foreign countries as well.

AWS is an extension of Amazon whose founder and CEO, Jeff Bezos, also is the sole owner of the Washington Post, the political go-to newspaper, which has been the source of many leaked CIA reports. Leaked reports regarding Russian intrigue into the presidential election and alleged investigations that led to the resignation of the President Trump’s NSA chief Michael Flynn. The FBI cleared Flynn of any wrongdoing, but the MSM frenzy led by the Washington Post forced Trump to seek a replacement.

Given AWS relationship with the CIA and US intelligence then it stands to reason the investigation would start there given the leaked documents may have been stored on the AWS “cloud.” Yet, nothing thus far in official statements indicates AWS is included in the investigation? Why?

Could it be the Bezos and the CIA have a common cause, one designed to disrupt and ultimately take down President Trump and his administration? A cause growing every day with more and more Obama leftovers within the government, as well as former appointees like former Obama AG and long-time Clinton lawyer, Loretta Lynch, jumping onboard the Obama locomotive stream rolling Trump and his administration?

Former Obama AG Loretta Lynch now is openly calling for blood and the death in the streets against Trump administration.

WikiLeaks states the CIA hacking tools have been stolen and are already in the possession of other hackers and foreign spies, which concerns the Trump administration to the gravity of the situation and threat to national security even though the activities did not occur under his watch.

So when did the breaches occur? Were they over a long course of time during Obama’s presidency or did they occur around the time and shortly after the presidential election? Were these leaks intentional in order to expose vulnerabilities that can be exploited once Trump took his oath?

White House spokesman Sean Spicer said in a press briefing the alleged activities of the CIA and hacking are a grave threat to national security and one of great concern for the administration even though they took place during the Obama administration.

“These alleged leaks should concern every single American in terms it has on the impact of our national security,” Spicer said.

Also voicing concern about the threat is CIA spokesman, Ryan Tripani, another leftover of the Obama administration. Though Tripani said he has “no comment on the authenticity of purported intelligence documents released by WikiLeaks or on the status of any investigation into the source of the documents,” other officials have indicated the documents are authentic. Tripani spoke more about the dump itself and not to authenticity.

“The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the intelligence community’s ability to protect America against terrorists and other adversaries,” Tripani said. “Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm.”

With his statement it appears the spy “tools” and activities outlined in the documents certainly are authentic and should concern every American, especially since at the same time last week FBI director, James Comey stated, “there is no there is no such thing as privacy in America.”

Exactly what was Comey indicating with his remark, that American citizens are being “watched” as well?

What does FBI James Comey know about the inside workings of the Obama CIA spy program?

Are these exposed CIA tools being used to spy on average Americans who opposed Obama and Clinton over the past eight years? If it sounds too Orwellian and “big brother” let us not forget a few years ago when the NSA was exposed for secretly capturing all emails, computer activities and phone communications being stored in a large computer database.

If the NSA is guilty of such intrusive, unconstitutional tactics and surveillance, then rest assured the CIA is involved in the same type of deceitful activities against the American people. For what purpose? Is this technology giving access to every smartphone, computer and smart TV in the world being used to spy on potential terrorists and hostile foreign countries? Has it been used to assist one political party over another while blaming Russia for the intrigue?

Or is it also being used for a far darker and more sinister plan against the US government and its citizens as well? Exactly what is stored on the CIA’s AWS “cloud” and how will be it used against President Trump and his “Deplorables” in the future. A well organized strategy pointing more and more to Obama and loyalists to George Soros and his scheme of an open borders society of one world legal, social and financial governance enslaving the masses.

That is the “$600 million” question all Americans should be demanding an answer before it is too late to stop whatever grand scheme is truly already in motion.

  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: