They say that the establishment uses Hollywood and other media platforms to drop hints on programs they are involved in, or things they want to slowly desensitize the public on to prepare them for the day when paradigm shifting events will be revealed. And whether this is in regards to a dystopian future where there world is run by corporations rather than by sovereign governments (Tekken, Highlander 2), or where technology replaces human labor in many if not all facets of society (I, Robot), the fact is that much of what the future reveals for society has already been imagined or purposely pushed into the mainstream through the use of books, movies, and other media.
So when on March 7 Wikileaks unveiled its newest and perhaps most earth shattering data dump on the activities of the CIA, one could not be far off in believing they were watching a Jason Bourne movie coming to life through the information held in Vault 7.
Operation Treadstone through Operation Iron Hand
One of the revelations made in yesterday's Wikileaks data dumps was the fact that the CIA used their consulate in Frankfurt Germany as an operations center for cyber-hacking programs that quite possible even included renditions .
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover.
The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport" - Zerohedge
A day after Hastings’ death, Robin Abcarian of the Los Angeles Times reported Hastings had been investigating CIA Director John Brennan at the time of his demise. Within hours, her colleague Brian Bennett contradicted her story claiming Hastings had been researching Florida socialite Jill Kelley instead.
A few days later, LA Times reporter Andrew Blankstein debunked Bennett’s article and confirmed Hastings had been investigating CIA Director John Brennan at the time of his death. Although Bennett’s article is full of false information, the editorial staff has refused to make any corrections.
Less than a year before Hastings’ death, Wikileaks posted a series of hacked emails taken from the private intelligence firm Strategic Forecasting (Stratfor), including an email stating, “Brennan is behind the witch hunts of investigative journalists.” - Free Thought Project
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
In nearly every Bourne movie the CIA at certain points was conducting operations not only on U.S. soil in violation of their charter, but also against U.S. citizens whom they determined to be a threat either to the United States itself, or to the secrecy of their illegal programs. And in the third Bourne movie we find several U.S. citizens who had been summarily killed without due process.
In 2013 the liberal Washington Post expressed outrage after the revelation that the Justice Department had investigated the news gathering activities of a Fox News reporter as a potential crime in a probe of classified leaks. The reporter, Fox News’ James Rosen and his family, were part of an investigation into government officials anonymously leaking information to journalists. Rosen was not charged. However, his movements and actions were tracked.
* Also in 2013, members of the Associated Press were also a target of the surveillance. The ultra liberal New Yorker even noted that “In moderate and liberal circles, at least, the phone-records scandal, partly because it involves the dear old A.P. and partly because it raises anew the specter of Big Brother, may well present the most serious threat to Obama’s reputation.”
* Sharyl Attkisson reported her personal computer and CBS laptop were hacked in 2014. This occured after she began filing stories about Benghazi that were unflattering to the Obama administration. A source who checked her laptop said the hacker used spyware “proprietary to a government agency,” according to an article in the New York Post. - The Black Sphere
They say truth is stranger than fiction, but many times the idea of what eventually becomes fact was dreamed up somewhere in a plot line of a movie, or the storyline of a book. And it is amazing how often bombshell revelations like this new one from Wikileaks can mirror something dreamed up in Hollywood or at Barnes and Noble, unless those books and films themselves were produced by the very individuals and agencies who would eventually be discovered to have done exactly what those movies implied.