Jack Shearing (3/10/2017)

The information transparency and government accountability watchdog organization, WikiLeaks, has just released a major bombshell, the “Vault 7” CIA documents. These documents are TOP SECRET and incredibly incriminating. The Wikileaks press release says, “Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.” has delved deep into these TOP SECRET documents and will be releasing over the coming days in depth analysis’ of some of the most intriguing aspects of these documents. Join us for Part 1 of our research analysis into the CIA’s lost treasure trove of secret documents.

Above is a screen capture taken directly from the leaked document archive. Notice the subheadings, “Data Collection”, “Webcam Capture”, “Windows API-Keyloggers” and “Internet Password Collection.” Many of these subheadings have been redacted or deleted before the leak but some aren’t. Take “Windows API-Keyloggers” for example,

Here the file splits into its own subheadings named things like “GetRawInputData API”. These subheadings are names of functions that a computer will run while it operates. To tech geeks and computer scientists, a function is a preprogrammed section of code that can be called upon after its written for future and unlimited use. To initiate a key logger on a citizen’s personal computer an agent would only need to access the function named “GetRawInputData API” and the key logging program would begin receiving “Collected Data” and sending it to the agent. The hard code for the function would likely be stored in a separate document but the name “GetRawInputData API” is the key to accessing that specific and malicious software. In simpler terms: The CIA has written and utilized keylogging programs on citizens without legal authorization. More specifically, this is proof that they have done this more than once or at least built the software to be used against any windows user. Read under the subheading “GetKeyboardState/GetAsyncKeyboardState API” for a true reality check on the depravity of the Deep State.

The CIA is bought and paid for by the tax-payers of the United States of America. Why then is it being used to spy on her citizens, and worse, all done secretly without checks and balances. Thank you, Julian Assange, for getting the message out to the people: The Deep State is not a friend of the people.

Related Articles

Leave a reply

Your email address will not be published. Required fields are marked *