CIA, FBI launch manhunt for insider who handed top-secret documents to WikiLeaks

President Trumps, CIA Director, Mike Pompeo’s comments are patently absurd.

 

What evidence does he have for his assertions about Julian Assange its founder, in the video below?

Exposing the government’s illegal activities at any level is the true mark of a patriot.

I monument must be erected to laud the exposures of Edward Snowden, Julian Assange,and all whistleblowers.

After all, the government watches us, someone must watch them.

WikiLeaks called the series of leaks the ‘largest ever publication of confidential documents’ on the CIA.

Assange fired back at Pompeo’s comments saying the CIA is “trying to get ahead of the publicity curve and create a preemptive defense”.

 “For the head of the CIA to pronounce what the boundaries are, of reporting or not reporting — is a very disturbing precedent,” Assange said during an Intercepted podcast, speaking from the Ecuadorian embassy in London where he has resided since 2012.
 
“The head of the CIA determining who is a publisher, who’s not a publisher, who’s a journalist, who’s not a journalist, is totally out of line.
 

“So how does he propose to conduct this ending?

He didn’t say.

But the CIA is only in the business of collecting information, kidnapping people, and assassinating people.

 

So, it’s quite a menacing statement that he does need to clarify.”

 

The next world war will not be invisible

After the success of STUXNET, a virus written by the United States to destroy Iranian uranium enrichment facilities, the U.S. government could no longer deny it was developing cyber weapons meant to do physical damage.

With US companies and agencies under constant attack from state-sponsored Chinese hackers, it is only a matter of time before tensions boil over and more sensitive infrastructure is targeted.

As more of our devices (cars, homes, etc) become connected, we will become more and more vulnerable to the physical threat of cyber warfare.

 

Threat Assessment:

The Business Insider

David Choi

April 20, 2017

 

The CIA and FBI have reportedly launched a manhunt for the person responsible for leaking thousands of top-secret documents describing the CIA’s cyber-spying capabilities and tools.

In March, WikiLeaks published a trove of damaging files in an ongoing series of “Vault 7” leaks exposing the CIA’s wide-ranging tools and hacking capabilities used to snoop on various smartphones, smart televisions, computer systems, software and other devices.

Citing sources familiar with the investigation, CBS reports the CIA and FBI are looking for an insider believed to be a CIA employee or contractor who had physical access to the material.

However, they did not publicly specify when or how the material was stolen from the agency.

Describing the series of leaks as the “largest ever publication of confidential documents on the agency, “WikiLeaks previously said the documents and files came from “an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virginia”.The notorious whistle-blowing site previously said the CIA recently “lost control of the majority of its hacking arsenal” ranging from malware and trojans to zero-day exploits and malware remote control systems.

The massive archive was apparently circulated among former US government hackers and contractors “in an unauthorized manner,” WikiLeaks said.

WikiLeaks said it obtained the material from former contractors who worked for US intelligence.

Hundreds of employees and contractors are said to have access to the documents held in a highly secure part of the CIA, the sources said. Investigators are beginning to work through those names.
While the CIA has yet to comment on the authenticity of WikiLeaks’ disclosures, multiple high-profile tech companies scrambled to detect and fix security flaws to protect their products following the leaks.

Last week, CIA director Mike Pompeo slammed WikiLeaks in his first public comments as spy agency chief calling the group a “hostile intelligence service.”.

He also accused founder Julian Assange and Edward Snowden, a former contractor who leaked NSA documents to journalists in 2013, of seeking to use sensitive information to “make a name for themselves”.

 “As long as they make a splash, they care nothing about the lives they put at risk or the damage they cause to national security,” Pompeo said. “It is time to call out WikiLeaks for what it really is — a non-state hostile intelligence service often abetted by state actors like Russia.
THE END

 

Advertisements

About JCscuba

I am firmly devoted to bringing you the truth and the stories that the mainstream media ignores. Together we can restore our constitutional republic to what the founding fathers envisioned and fight back against the progressive movement. Obama nearly destroyed our country economically, militarily coupled with his racism he set us further on the march to becoming a Socialist State. Now it's up to President Trump to restore America to prominence. Republicans who refuse to go along with most of his agenda RINOs must be forced to walk the plank, they are RINOs and little else.
This entry was posted in FBI launch manhunt for insider who handed top-secret documents to WikiLeaks and tagged , , , , , , , , , , . Bookmark the permalink.

2 Responses to CIA, FBI launch manhunt for insider who handed top-secret documents to WikiLeaks

  1. drartaud says:

    Hear hear Sir:

    Snowden and Assange, interesting people. Whistle-blowing is an unfortunate necessity for companies or agencies that refuse to proactively address issues. In terms of safety, notifying OSHA constitutes whistle-blowing, and protections are in place; usually; for the whistle-blower.

    Inspector Generals for govt depts serve similar purposes. They audit depts and report back to Congress. Most I’ve seen are incredibly devoid of apparent political affiliation, as the things they reveal are often devastating for the depts involved. And this is how it should be.

    Snowden says in the music video below (relevant to this topic) that when people say they are unconcerned about govt intrusion into their personal lives via their electronic devices because they have nothing to hide is like saying they are unconcerned about Freedom of Speech because they have nothing to say. Spot on Snowden. The govt and other entities, such as everyday hackers, can extract information from your devices, write information to your device, delete information from your device, send text messages and emails from your device, log your passwords, via the microphone listen to you, via the cameras they can look at you, and more.

    On Android, before downloading an App, look at the permissions. One app terribly abused is a Flashlight App that turns on the Cameras flash and keeps it on. Here is a report on their potentially ominous nature.

    PDF File Link: SnoopWall Flashlight Apps Threat Assessment Report

    I’ve refused to download many apps due to excessive or bizarre permissions. Be careful, be selective, be educated on the issues. Of course, many of these precautions are insufficient to stop govt spying, but the fewer places your data goes, the more secure you’ll be.

    The 4th Amendment says:

    “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things…

    Of course the Founders never envisioned electronic devices; no more than they envisioned airplanes, cars, semiautomatic firearms, etc.; but the principle of being secured in papers and effects covers that, it’s electronic paper. Though most of us support intelligence gathering on suspected terrorists, the govt has shown, with Trump, a propensity of spying on political candidates, and have violated and destroyed our trust. I no longer have confidence in our intelligence gathering, the arrogance of trying to put Trump “in his place” is more than I can conscience. That is the hallmark of an out-of-control govt agency that is direly lacking in competent oversight.

    More salient to the following, I think, is the activist liberal courts making judgements that are patently absurd, for instance Hawaii and Washington challenging Trump’s second executive order on immigration from select Middle Eastern countries. They are seeing rights where they don’t exist and ignoring them where they do.

    There is no doubt that terrorists and American enemies, such as China and Russia, can and have used our U.S. Constitution, the freedoms it guarantees and the protection against government intrusion on our privacy and liberties against us…

    Anyway, a few music videos, of sorts, on the issue of data security.

    Music Video: Jean-Michel Jarre, Edward Snowden – Exit

    Music Video: Zero-Day

    The next world war will not be invisible.

    After the success of STUXNET, a virus written by the United States to destroy Iranian uranium enrichment facilities, the U.S. government could no longer deny it was developing cyber weapons meant to do physical damage. With US companies and agencies under constant attack from state-sponsored Chinese hackers, it is only a matter of time before tensions boil over and more sensitive infrastructure is targeted. As more of our devices (cars, homes, etc) become connected, we will become more and more vulnerable to the physical threat of cyber warfare.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: