Thursday, April 20, 2017

Exposed: Gov't-CIA spying on US (video)

WikiLeaks.org; BBC; Pat Macpherson, Pfc. Sandoval, Seth Auberon (eds.), Wisdom Quarterly


Trump's CIA director called WikiLeaks a "hostile intelligence service"

Exclusive: Julian Assange Strikes Back at CIA Director and Talks Trump, Russia, and Hillary Clinton
Jeremy Scahill (TheIntercept.com, April 19)
Questioned about WikiLeaks's aggressive targeting of Hillary Clinton, Assange rejected the notion that he went after her for personal reasons. More

Intercepted Podcast: Julian Assange Speaks Out as Trump’s CIA Director Threatens to “End” WikiLeaks
(Intercepted (TheIntercept.com, April 19)
WikiLeaks founder Julian Assange hits back at Trump’s CIA Director Mike Pompeo after Pompeo accused WikiLeaks of being a “hostile nonstate intelligence agency.” More
  • CORRUPT MAINSTREAM MEDIA SLANT:
Criminal CIA exposed by WikiLeaks: CIA hacking into our files
Associated Press
Michael Pompeo, Susan Pompeo
Maybe we can kill whistleblowers leakers.
WikiLeaks just published thousands of secret documents Tuesday [March 7, 2017] about CIA hacking tools the US government illegally developed and deployed.

[The CIA and US government did so] to weaken the security of our data and break into [US citizen] users' computers, cell phones, and even smart TVs to wiretap anyone at will and without FISA court approval because nearly everyone is carrying a spying device built by companies like Apple, Google, Microsoft, and Samsung.
 
The CIA/US government seeks to silence me.
New CIA Director Michael Pompeo testifies on Capitol Hill. WikiLeaks says the CIA's Center for Cyber Intelligence was conducting an eye-opening look at the intimate details of the agency's cyberespionage effort. 

The revealed documents describe clandestine methods for bypassing or defeating antivirus tools, encryption, and other protective security features intended to keep the private information of US citizens and corporations safe from government eyes. U.S. government employees, including Trump, use many of the same products and internet services purportedly compromised by the tools. More

No comments:

Post a Comment