By Red Pill   |  10-05-2017   News
Photo credit: The Goldwater

We now have reason to believe with unequivocal doubt that General John Kelly, White House Chief of Staff for the Trump Administration; may have had his phone tapped.

White House officials believe that it may have dated back to December of this past year, which suggests that hackers or even foreign governments may have actually accessed John Kelly's device and could have obtained information from his time as Secretary of Homeland Security.

Such a breach is catastrophic, to say the least and further underscores the incompetence of the intelligence communities in monitoring the devices belonging to the highest levels of our government.

The NSA has zero problems wiretapping Americans but they fail to protect the Executive Branch and President Trump's cabinet?

I'm not buying that for a second. Someone within the intelligence community had to be aware that this was occurring.

Pure coincidence? I don't believe in coincidences.

Tech support employees allegedly discovered the break this past summer after Kelly turned in his phone to White House Tech Support when he complained that the device wasn't performing software updates correctly.

Just who could be behind this?

Reports from <a href="http://www.politico.com/story/2017/10/05/john-kelly-cell-phone-compromised-243514">Politico </a>suggest that Kelly had complained about the problems on his device for several months prior to the realization that a breach had occurred.

Is this more evidence that there may be a Deep State manipulation or surveillance effort underway in regards to the Trump Administration; something that the President of the United States of America Donald J. Trump has consistently claimed is occurring.

President Trump is nearly always correct in these circumstances.

It's also reported that dating back to September an internal White House memorandum was circulating detailing the breach and warning other staffers and Cabinet members to have their devices checked out.

There are also reports that General John Kelly had not used the personal device since joining the Administration; something that is a bit of a conflicting problem for the claims, instead of saying that Kelly used his government-issued device for all official business.

The Deep State ploy seems most likely if Kelly's device was compromised within the United States but there also remains increased potential for foreign governments to desire such an inside step up on the Cabinet of the President of the United States of America.

Politico also said that their inside source refused to acknowledge where this compromised device is now, or whom may be handling it.

While Kelly remains retired from the United States Central Command since 2016; his travel plan is now under review to see if there is a potential for the compromise to have occurred outside of the United States of America.

According to the alleged internal memo IT Technicians reviewed the device for several days in an attempt to decipher the compromise but were unable to acquire a potential source and deemed the phone no longer usable by Kelly.

It remains to be seen what operating system was on the device, but we do know that the majority of the United States Armed Forces use customized Samsung Galaxy devices running Android so that's the potential similar device used by Kelly considering this military history and service.

Senior Research Fellow with the Citizen Lab at the University of Toronto’s Munk School of Global Affairs Bill Marczak told Politico that, “The attackers I would be most worried about are nation-states or other actors who may have access to resale of commercial spyware sold to nation-states.”

“The average user won’t notice anything at all. Really the only way to pick up on that is to do forensics on the phone,” he added.

At this point, it should serve as a reminder that even those in the highest levels of the United States Government are potential targets to spies and foreign entities even those who allege to be allies of the United States of America in subversion and manipulation.

Secure your devices frequently and ensure that you're not being monitored by using a variety of software to protect yourself, folks.

America is under a constant cyber attack from those who wish to define our values and freedoms.

—<i>[email protected]</i>

<i>On Twitter:</i>

<a href="https://www.twitter.com/IWillRedPillYou">@IWillRedPillYou</a>

Tips? Info? Send me a message!

Share this article
Thoughts on the above story? Comment below!
0 Comment/s


What do you think about this article?
Name
Comment *
Image
12-08-2017   Science 12 Comment/s

Gene Linked To Homosexuality Found

12-07-2017   News 9 Comment/s

Lord's Prayer to be Changed by Pope