Who are the White Helmets? This is a question that everyone should be asking themselves.
The White Helmets – here are a few facts that you need to know. Share this with your family and friends who rely on the Western Mainstream Media:
• The White Helmets, also called Syria Civil Defence, are not who they claim to be. The group is not Syrian; it was created with USA/UK funding under the supervision of a British military contractor in 2013 in Turkey.
• The name “Syria Civil Defence” was stolen from the legitimate Syrian organization of the same name. The authentic Syria Civil Defence was founded in 1953 and is a founding member of the International Civil Defense Organization (1958).
• The name “White Helmets” was inappropriately taken from the legitimate Argentinian relief organization Cascos Blancos / White Helmets. In 2014, Cascos Blancos / White Helmets was honored at the United Nations for 20 years of international humanitarian assistance.
• The NATO White Helmets are primarily a media campaign to support the ‘regime change’ goals of the USA and allies. After being founded by security contractor James LeMesurier, the group was “branded” as the White Helmets in 2014 by a marketing company called “The Syria Campaign” managed out of New York by non-Syrians such as Anna Nolan. “The Syria Campaign” was itself “incubated” by another marketing company named “Purpose”.
• The White Helmets claim to be “neutral, impartial and humanitarian” and to “serve all the people of Syria” is untrue. In reality, they only work in areas controlled by the violent opposition, primarily terrorists associated with Nusra/AlQaeda (recently renamed Jabhat Fath al Sham).
• The White Helmets claim to be unarmed is untrue. There are photos which show their members carrying arms and celebrating Nusra/AlQaeda military victories.
• The White Helmets claim to be apolitical and non-aligned is untrue. In reality they actively promote and lobby for US/NATO intervention in violation of the norms of authentic humanitarian work.
• The Right Livelihood description that “Syria Civil Defence” saved over 60,000 people and “support in the provision of medical services to nearly 7 million people” is untrue. In reality the zones controlled by terrorists in Syria have few civilians remaining. That is why we see “cat” video/media stunts featuring the White Helmets.
• The NATO White Helmets actually undermine and detract from the work of authentic organizations such as the REAL Syria Civil Defence and Syrian Arab Red Crescent.
• The recent Netflix movie about the White Helmets is not a documentary; it is a self promotional advertisement. The directors never set foot in Syria. The Syrian video, real or staged, was provided by the White Helmets themselves. From the beginning scenes showing a White Helmet actor telling his little boy not to give mommy a hard time until the end, the video is contrived and manipulative. The video was produced by a commercial marketing company Violet Films/Ultra Violet Consulting which advertises its services as “social media management”, “crowd building” and “campaign implementation”.
RELEASE: CIA malware for Windows “Grasshopper” — which includes its own language
Grasshopper basically allows the Deep State to do anything it wants remotely to a Windows machine. It doesn’t seem to matter if it is Windows XP, Windows 7, Windows 8, or Windows Server versions 2003 or 2008. Almost all the attacks and hijacks bypassed the major intrusion detection systems (MS Security, Symantec, Kapersky, and Rising). No matter how locked down or safe you thought your Windows install was, you were wrong.
Oh even better. It looks like these were designed specifically to avoid the major security programs.
Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.
Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to “perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration”. Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.
Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’ on target machines do not detect Grasshopper elements.
One of the persistence mechanisms used by the CIA here is ‘Stolen Goods’ – whose “components were taken from malware known as Carberp, a suspected Russian organized crime rootkit.” confirming the recycling of malware found on the Internet by the CIA. “The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.”. While the CIA claims that “[most] of Carberp was not used in Stolen Goods” they do acknowledge that “[the] persistence method, and parts of the installer, were taken and modified to fit our needs”, providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company “HackingTeam”.
The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise.
Vault 7 Part 3: WikiLeaks releases the CIA ‘Marble’ dump
WikiLeaks has released the latest batch of documents detailing CIA hacking tactics. The third release, named ‘Marble’, contains 676 source code files for the agency’s secret anti-forensics framework.Marble Framework, which WikiLeaks explains is part of the CIA’s Core Library of malware, is used to hamper forensic investigators from attributing viruses, trojans and hacking attacks to the CIA. WikiLeaks said Marble was in use at the agency as recently as 2016.
WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.
It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.
The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.
“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”
Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.
Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.
Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”
The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.
The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.
The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.
PoliticalComments Off on Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected
WikiLeaks Vault 7 shows that the CIA has developed a huge range of attacks against iPhones since at least 2008.
Yesterday, Wikileaks released another series from their ‘Vault 7’ CIA hacks called ‘Dark Matter’ where they reveal how Apple products are infected.
According to Wikileaks, ‘Dark Matter’ contains documentation for several CIA projects that infect Apple MAC computer firmware developed by the CIA’s Embedded Development Branch (EDB). Interestingly… the infection persists even if the operating system is re-installed.
Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.
Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.
Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
PoliticalComments Off on While The Mainstream Media Focuses On Russia, The Government’s Own Data Shows U.S. Interfered In 81 Elections
While the US spin machine hurls accusations about Russian election meddling, it’s worth nothing the US is a seasoned pro at interfering in elections.
Ask an average American who makes a habit of following government-mouthpiece corporate media about interference in national elections and you’ll likely elicit a nebulous response concerning Russian hackers and a plan to install Donald Trump in the White House — but you probably won’t hear a single syllable pertaining to United States government’s actual attempts to do the same.
On Monday, FBI Director James Comey confirmed for the first time publicly the bureau is officially investigating hotly contentious allegations of Russian meddling in the U.S. election — but, even if proven true, such geopolitical escapades better characterize the routine behavior of accuser than of accused.
“The F.B.I., as part of our counterintelligence effort, is investigating the Russian government’s efforts to interfere in the 2016 president election,” the director announced, adding the bureau would conduct a probe to discern whether Trump’s associates had contact with Russian officials.
Despite that the U.S. has hypocritically exerted influence over foreign elections in all corners of the globe — in fact, it has arrogantly done so a whopping 81 times between 1946 and 2000, alone — with just one-third of those operations undertaken overtly.
US agencies have interfered with 81 elections not including coups. #CIA
For months, mainstream media parroted murky accusations hurled by politicians — keen to point a finger of blame for the apparently stultifying victory of a former reality television host on someone — that The Russians had somehow surreptitiously undermined the election-centric foundation of American Democracy.
While that has yet to prove true, this new Red Scare constitutes a duplicitous attempt by the pot to call the kettle … an election meddler.
Researcher Dov Levin of Carnegie Mellon University’s Institute for Politics and Strategy — an expert on the topic at hand — discussed the lengthy but incomplete list of times the U.S. government has interfered in other nations’ elections with NPR’s Ari Shapiro.
Asked for examples where this tampering tangibly altered results, Levin stated,
“One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn’t want him to stay in power there due to his tendency, you know, to disrupts the Balkans and his human rights violations.
“So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. And according to my estimate, that assistance was crucial in enabling the opposition to win.”
Levin reiterated the more blatant methods with which the U.S. asserts dominance — through the overt coups or all-out regime changes branding the nation a notorious interventionist — are not among the list of the 80-plus attempts to manipulate the electoral outcome.
As for the issue of pot versus kettle, Levin explained that — although Russia and other powerful nations indisputably employ similar tactics — the United States has been quite prodigious in its effort.
“Well, for my dataset, the United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.”
PoliticalComments Off on Five Pakistani Congressional Staffers In Criminal Probe Over Unauthorized Computer Access
Dozens of House Democrats have collectively paid $4 million since 2009 to Pakistani IT professionals now under criminal investigation who had access to House members’ email and computer files.
Five people employed by members of the House of Representatives remain under criminal investigation for unauthorized access to Congressional computers. Former DNC chair Debbie Wasserman Schultz employed at least one of those under investigation.
The criminal investigation into the five, which includes three brothers and a wife of one of the men, started late last year, as reported by Politico in February. The group is being investigated by US Capitol Police over allegations that they removed equipment from over 20 members’ offices, as well as having run a procurement scheme to buy equipment and then overcharge the House.
House Speaker Paul Ryan said last week Capitol Police are receiving additional help for the investigation. “I won’t speak to the nature of their investigation, but they’re getting the kind of technical assistance they need to do that, this is under an active criminal investigation, their capabilities are pretty strong but they’re also able to go and get the kind of help they need from other sources,” Ryan said.
The brothers, Abid, Jamal and Imran Awan, worked as shared employees for various members of the House, covering committees relating to intelligence, terrorism and cybersecurity, which included the House Committee on Foreign Affairs, the Committee on Homeland Security and the Subcommittee on Tactical Air and Land Forces of the Armed Services Committee.
Imran’s wife, Hina Alvi, and Rao Abbas, both of whom worked as House IT employees, are also under investigation.
Debbie Wasserman Schultz
The group were banned from accessing the computers as a result of the investigation but, as of earlier this month, Imran Awan remains as an “technology adviser” to former Democratic National Committee chair, Debbie Wasserman Schultz, who was forced to resign in July following revelations that she worked to further Hillary Clinton’s chances of winning the Democratic primary at the expense of Vermont Senator Bernie Sanders.
News of the brothers’ investigation has sparked speculation that it may be tied to the hack of the DNC servers, the contents of which were first released by Guccifer 2.0 and later published on WikiLeaks.
Russian actors have been accused of being behind the hack, which Democrats claim contributed to Clinton’s loss to Donald Trump. There have also been reports that the DNC hack came from an insider.
@Cernovich Can’t blame the Russians for Awan brothers, why is no one talking about them since were investigating leaks!
An email between DNC staffers in April 2016, which was released by WikiLeaks, references a staff member named Imran and how this person has access to the passwords for Wasserman Schultz’s iPad.
Garret Bonosky, deputy director of office of the DNC chair, tells Amy Kroll: “I have to get [this iPad] thing figured out. Need to make sure I have her username and password before I delete and reload the app.”
“I do not have access to her ipad password, but Imran does,” Kroll replies, later writing: “Just spoke to Imran, call me whenever GB and I’ll update you, don’t delete anything yet.”
Another email from the DNC hack, dated December 2016, references Imran once again. Wasserman Schultz’s assistant Rosalyn Kumar tells scheduler Anna Stolitzka: “[Nancy] Pelosi is doing [a] closed door meeting. No staff or anyone allowed. Kaitlyn come to Rayburn room and get her iPad for Imran.”
The brothers were paid high salaries for their work with various House members, above the median salary for Congressional staffers.
Imran, who started working for Wasserman Schultz in 2005, received $164,600 in 2016, with close to $20,000 of that coming from Wasserman Schultz.
Bush fired several U.S. Attorneys to help cover up a pedophile ring being run out of the D.C. hotels involving Congressmen, Senators and reporters!
This was the Franklin Scandal. The Bush administration fired the agents investigating the crimes to cover it up. U.S. senators and congressmen were covering up the Dusty Foggo government lobbyist and military prostitution and pedophilia ring in Washington involving legislators, news reporters, military officers and high government officials. Alberto Gonzales and President Bush fired San Diego U.S. Attorney Carol Lam because she was probing the Dusty Foggo / Jack Abramoff D.C. sex ring.
According to a long-time senior intelligence agent the Washington, DC Hilton, Ritz Carlton and Sheraton Hotels were used for compromising House and Senate members, National Media hosts who had sex with children in a legislative and media Blackmail ring.
“The whole Republican and Democratic Parties were for sale, the House, Senate and the White House.”
“Poppy Bush and Abramoff were up to their eyeballs in this kid sh*t,” said the Federal Agent.
Supposedly convicted Lobbyist Jack Abramoff provided male and female heterosexual, homosexual, lesbian, bisexual and child prostitutes sexual services to numerous US Congressmen, US senators, national media hosts and other federal officials who were compromised and made susceptible to blackmail at three Washington hotels.
The Washington Hilton was specifically used for sex with children because it has what the agent termed a “super secure section for VIPs that is out of public view and which reportedly employs no camera surveillance, an area able to hold around 6-10 vehicles so that no one could observe abducted, abused or drugged children flown in from other states who were coming to or leaving the hotel.” Hilton employees began to become suspicious of Abramoff’s operation, so children were moved to the Washington Ritz-Carlton according to other intelligence officials.
On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered “global intelligence” company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods.
AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE
Released on 2012-10-15 17:00 GMT
AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE
AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE TomFlocco.com Foggo sex ring probe linked to forged Iraq dossier, Israeli espionage, convicted lobbyist Abramoff
According to U.S. intelligence sources, President Bush obstructed justice
last December when he had senior advisor Karl Rove and White House Counsel
Harriet Miers instruct Attorney General Alberto Gonzalez to fire eight
U.S. attorneys who were among several others conducting ongoing public
corruption and secret national security grand jury investigations
connected to an espionagea**linked prostitution / pedophile sex ring
operating at the Washington Ritz-Carlton and other DC hotels, whose
clients included U.S. senators and congressmen, elite Washington news
reporters and high government officialsa**some of whom were named by an
Central to the scandal is fired U.S. attorney Carole Lam of California who
was reportedly conducting testimony before grand juries linking indicted
former Bush CIA Executive Director Kyle a**Dustya** Foggo and convicted
Republican lobbyist Jack Abramoff to the sex ring, Israeli espionage, GOP
Under Secretary of Defense for policy Douglas J. Feith, a forged British
intelligence dossier used by Mr. Bush to deceive Americans into supporting
war against Iraq and an attempt to plant weapons of mass destruction (WMD)
in Iraq before the war via an intelligence pipeline through Dubai and
Turkey. READ MORE
U.S. intelligence: Sen. Leader William Frist and reporter Robert Novak alleged as regular clients
by Tom Flocco
Washington—May 5, 2006—TomFlocco.com—A long-time top-level government agency official joined a national security expert in confirming grand jury testimony last month, revealing that male and female heterosexual, homosexual, lesbian, bisexual and child prostitutes provided sexual services to numerous congressmen, senators, national media hosts and other federal officials who were compromised and made susceptible to blackmail at three Washington hotels.
“The whole Republican Party was for sale—the House, Senate and the White House,” said a well-respected federal agency official with impeccable credentials who declined to be named but who is familiar with testimony and sources close to the grand jury probing Jack Abramoff.
Special Prosecutor Patrick Fitzgerald’s grand jury heard several agents testify in April that the “Watergate, Ritz-Carlton and Sheraton Hotels in Washington, DC were used to compromise legislators and news-people with prostitution services, the financing of which is directly linked to the American Israeli Public Affairs Committee (AIPAC), former Israeli Prime Minister Benjamin Netanyahu, Marc Rich and Abramoff,” said national security expert Thomas Heneghan.There are no corporate media reports as to which White House officials participated in the hotel sex ring activities with House and Senate members; however, Heneghan said U.S. Senate Leader and 2008 presidential candidate William Frist was alleged to be a frequent visitor to the hotels according to U.S. intelligence agents.
Frist is reportedly a close friend of alleged Bush 43 male consort and former Knoxville, Tennessee mayor Victor Ashe according to federal agents.
Heneghan also alleged additional prostitute customers as British Prime Minister Tony Blair and former CNN host-reporter Robert Novak, both of whom were introduced into the sex-ring by GOP reporter and male prostitute Jeff Gannon, who visited the Bush White House living quarters 200 times without the assignations being recorded in visitor logs.
The genesis of the Valerie Plame CIA leak allegedly took place during one of Novak’s visits with an Abramoff hooker at one of the hotels according to the sources.The corruption and crimes surrounding the indicted Republican lobbyist were widespread and far-reaching enough to cause Fitzgerald to impanel a separate grand jury, often referred to by intelligence officials as the “Franklin grand jury,” which is hearing testimony and examining Abramoff linked evidence tied to the Iraq War, September 11 and related issues.
Pentagon analyst Larry Franklin was arrested for leaking classified U.S. government information to AIPAC officials Steve Rosen and Keith Weissman who reportedly leaked information to Israel concerning a controversial proposal by Department of Defense hardliners to destabilize Iran.
The federal source wishing to remain anonymous said that additional government officials are currently testifying this month before the Franklin grand jury about Abramoff, the GOP-linked prostitution ring and its ties to AIPAC.
“Photographs of politicians in compromising positions have reportedly already been used as blackmail to silence politicians who would speak the truth about the 2000 election fraud in Florida, 9-11, Iraq/yellowcake/WMD and how Jack Abramoff and Netanyahu were the pimps for the operation,” said Heneghan.
President Bush has emphatically denied that he personally knows Abramoff, despite CIA records indicating the indicted lobbyist visited the White House 200 times during the first ten months of the Bush presidency—often enough for a personal visit on every business day of each month, according to wide news reports.
Despite the daily White House visits, Bush said “I’ve never sat down with him and had a discussion with the guy,” adding, “I’m also mindful that we live in a world in which those pictures will be used for pure political purposes,” attempting to justify his unwillingness at first to release photos of him chatting amicably with Abramoff.
Fitzgerald is reportedly convinced that the Bush administration wanted Valerie Plame-Wilson’s identity as a CIA official leaked because her intelligence team had identified Israeli Mossad operatives inside Iran who were to receive weapons of mass destruction (WMD) to be delivered through Turkey and planted in Iraq to further the president’s case for war, said the intelligence expert.
“The financing for these whorehouses is linked directly to AIPAC, Benjamin Netanyahu, Marc Rich and Jack Abramoff; and the money trail ties back to American International Group (AIG), Hank Greenberg and Doug Alexander—former British Minister of E-Commerce,” said Heneghan.
In an ominous prediction, Heneghan said, “It won’t be long before the un-compromised U.S. military may have to declare a State of Emergency and re-implementation of the Constitution under a special provision of the Naval Code, which would lead to the arrest and removal of the criminal government residing at 1600 Pennsylvania Avenue.”(Bush and his thugs)
According to Heneghan, the Abramoff congressional sex ring is tied to the SunCruz Casino scandal, secret accounts at Riggs Bank and Crozier Bank, the 9-11 “hijacker” Venice, Florida flight schools, and former U.S. ambassador to Italy Mel Sembler and Doug Alexander—both of whom have been linked to the reported Florida 2000 election fraud—all of which is tied to a financial trail that connects narcotics trafficking to Al Qaeda and the congressional sex ring.
MSNBC host and former congressman Joe Scarborough, subject of a recent TomFlocco.com story, “is now cooperating with federal investigators in the Abramoff matter which has led the probe to the doorsteps of the AIPAC whorehouses now operating in Washington, DC,” said Heneghan.
The intelligence expert told us “Scarborough told federal investigators that he now believes his female staff member was murdered in his congressional office to silence her regarding knowledge of Alexander, Sembler, Katherine Harris, Jeb Bush and the Florida election 2000 coup d’ etat.”
PoliticalComments Off on FLASHBACK – CIA Director David Petraeus: “We’ll Spy on You Through Your Dishwasher”
In a 2012 Wired article, entitled, “CIA Chief: We’ll Spy on You Through Your Dishwasher,” then CIA Director David Petraeus heralded emerging technologies in relation to spying.
CIA Director David Petraeus unwinds with some Wii Golf, 2008. Photo: Wikimedia
With Wikileaks latest, largest dump of confidential CIA files ever published, the world is beginning to realize just how far gone our privacy rights are. They have become virtually nonexistent thanks to Obama’s two terms in office.
As far back as a five years ago, then CIA Director General David Petraeus was touting how hi-tech advances offered countless ways Americans can be spied on.
With the rise of the “Smart Home,” you are sending tagged, Geo-located data that the CIA can intercept in real-time when you use the lighting app on your phone to adjust your living room’s ambiance.
The CIA had a plan that smart meters, smart phones, smart TVs and other smart household devices installed in every hopelessly “Dumbed Down” American’s home would permit the Deep State complete invasive access to you in the un-private, unsafe sanctuary you call home.
MORE AND MORE personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.
Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”
All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.
“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”
Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.
The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.
That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.
“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.”
It’s hard to argue with that. Online cache is not a spy’s friend. But Petraeus has an inadvertent pal in Facebook.
Why? With the arrival of Timeline, Facebook made it super-easy to backdate your online history. Barack Obama, for instance, hasn’t been on Facebook since his birth in 1961. Creating new identities for CIA non-official cover operatives has arguably never been easier. Thank Zuck, spies. Thank Zuck.
Yesterday, WikiLeaks tweeted the decryption passphrase for the CIA Vault 7 leak. The password is, “I will splinter the CIA into a thousand pieces and scatter it into the wind,” a quote credited to President John F. Kennedy.
RELEASE: CIA Vault 7 Year Zero decryption passphrase:
The quote was given to a Times journalist in the 1960s by a Kennedy administration official and published in the New York Times on April 25, 1966 in an article titled “C.I.A.: Maker of Policy, or Tool?” Read it here.
The video below references the JFK quote at the 2:50-mark.
The 6:15-minute video centers on Samuel Halpern discussing JFK’s relationship with the Central Intelligence Agency. Halpern was involved in the investigation of the assassination of John F. Kennedy.
Halpern says that the CIA is not all bad, but that the organization is highly individualistic.
The video focuses on Kennedy’s relationship with Cuba prior to his assassination by Lee Harvey Oswald and discusses Operation Northwoods, a proposed false flag operation against the Fidel Castro regime, that originated within the U.S. Department of Defense. According to ABC News, “the plans reportedly included the possible assassination of Cuban émigrés, sinking boats of Cuban refugees on the high seas, hijacking planes, blowing up a U.S. ship, and even orchestrating violent terrorism in U.S. cities.”
Kennedy refused the plan, but the CIA still wanted to deal with Cuba.
In the video, Halpern says he could never figure out why the CIA wanted to punish Cuba so badly but that he thought maybe it had to do with hubris. It’s then stated that JFK was finding it increasingly difficult to keep former Director of Central Intelligence Allen Dulles “in line” and that the agency was becoming a “state within the state.”
1963 – 1976
In the three year period following the assassination many witnesses died – mostly of unnatural causes. Many rumors crawling around about the high death rate during these years. They are supported by the mostly suspicious circumstances the victims died under. For a unknown shooter or even shooters, all these deaths have on thing in common: they are very convenient to those assassins since these witnesses took their knowledge with them into the grave. But see yourself and decide whether these deaths are purely coincidently:
Connection with case
Cause of death
Tv host’s daughter who was overheard telling of JFK’s death prior to 11/22/63
Expressed foreknowledge of Ruby shooting Oswald
Lookalike brother to Tippit shooting witness, Domingo Benavides
Gunshot to head
Former Ruby employee who alibied Warren Reynolds shooting suspect.
Suicide by hanging in Dallas Jail
Thought to have information linking Oswald and Ruby
Husband of Ruby employee, knew Oswald acquaintance
Reporter who was in Ruby’s apartment on 11/24/63
Accidental shooting by policeman
CIA agent who claimed Agency was involved
Gunshot in head ruled suicide
Private investigator working with Guy Banister and David Ferrie
Plane crash in Mexico
New Orleans Mayor
Passenger in Ward’s plane
x-FBI agent in New Orleans connected to Ferrie, CIA, Carlos Marcello & Oswald
Reporter who was in Ruby’s apartment on 11/24/63
Blow to neck
“Life” magazine senior Vice-president who bought Zapruder film and locked it away
JFK “special” friend whose diary was taken by CIA chief James Angleton after her death
“Life” writer who told of JFK turning to rear when shot in throat
Ruby’s first lawyer, was in Ruby’s apartment on 11/24/63
Pilot for Guy Banister
Mona B. Saenz*
Texas Employment clerk who interviewed Oswald
Hit by Dallas bus
Dallasite who helped FBI trace Oswald’s pistol
Knew of assassination in advance, told of riding to Dallas with Cubans
Columnist who had private interview with Ruby, pledged to “break” JFK case
Mrs. Earl Smith*
Close friend to Dorothy Kilgallen, died two daysafter columnist, may have kept Kilgallen’s notes
Cab driver who reportedly drove Oswald to Oak Cliff (The only Dallas taxi driver to die on duty)
Judge Joe Brown
Presided over Ruby’s trial
Karen “Little Lynn” Carlin*
Ruby employee who last talked with Ruby before Oswald shooting
Car salesman who said Oswald test drove new car
Capt. Frank Martin
Dallas policeman who witnessed Oswald slaying, told Warren Commission “there’s a lot to be said but probably be better if I don’t say it”
The tool ‘Spottsroide’ uses a development feature of the Broadcom modem- called monitor mode– that is present in (in this document, the Galaxy S2) many smartphones and other mobile devices that can be used to snoop and conduct blanket data collection of all WiFi traffic around the device. This data can be analysed later through a variety of different techniques.
Monitor mode (if supported) is normally disabled in firmware, this document confirms that and states “The source was never released, so this is the “reverse engineered” source”- meaning Broadcom didn’t help directly.
This does highlight the issues with fully closed-source backdoors and vulnerabilities, where they can be reverse engineered and exploited regardless of any perceived security.
The interesting thing is that the “survey app” responsible for data collection is initially launched through another app called Apollo, a “music player app”
It is possible there is nothing odd about the Apollo app- or Joseph Cohen’s version specifically- and there is simply some form of exploit or perhaps the app has plugins, extensions, or something that’s being leveraged here to start the data collection. But there’s no doubt this is all very odd.
This is a very interesting, highly covert way to conduct network analysis after the fact.
May 26, Trump reaches enough delegates to unofficially win Republican Presidential nomination.
June 2016, FISA request rejected against Trump.
July 22, 2016 Wikileaks releases the emails against the DNC.
August 2016, DNC claims the emails are Russian propaganda and some are fake with the goal of harming Hillary Clinton’s Presidency.
The media runs with this story, this creates suspicion against Trump to suggest that Russia is trying to influence the election.
October a month before the election, another FISA request is accepted. This time because of “probable cause” no evidence actually needing to be required.
This allows the current federal government to spy on a Presidential candidate a month before the election, one who is a part of the opposing political party ( while Obama himself is actively campaigning with Hillary and the DOJ is working to help Hillary pass her investigation with no issues ).
The plan the Democrats had for the election was to rig it for Hillary by using dirty tactics by the Mainstream Media to destroy Bernie’s chance and to make Trump look bad, and also to potentially spy on him to find negative stories to run in the month lead up to the election. They were probably hoping to leak audio clips of Trump having private conversations saying politically incorrect things, like how they had the hot mic tape of him saying “grab her by the pussy” and used that to find 15+ random women to claim that he sexually assaulted them a few weeks before the election.
A more comprehensive timeline put together by a user a Reddit:
Obama creates office of Chief Technology Officer – Aneesh Chopra ties to Tim Kaine/Terry McAuliffe (DNC Virginia strategy), Todd Park (Healthcare.gov fiasco), Megan Smith (VP Google X)
10 Oct 2012 – Directive 19 (Protect whistleblowers just before election – failsafe?)
PoliticalComments Off on CIA Paid $600 Million To The Washington Post To Publish Trump Disinformation
Washington Post owner, Jeff Bezos, was awarded a $600 million federal contract by the Obama CIA to publish disinformation about Donald Trump.
Amazon founder Jeff Bezos was tasked with undermining the President Trump via ‘leaked’ CIA documents given to him when he first took over at The Washington Post.
When writing the 1st Amendment to the Constitution, one area of speech the Founders were specifically interested in protecting was that of a free press. They saw the press as a sort of fourth branch of government, one that would keep the “checks and balances” of the other three branches honest.
However, over time the same press that was given protection has eroded into a propaganda machine driven by money and political agendas of those who own the media outlets. They have crawled into bed with the very entities they are to keep in “check” and bust out if corrupted.
The majority of people do not know Amazon founder and CEO Jeff Bezos purchased the Washington Post and is now the sole owner with no editorial board or ethical review committees to oversee the actions of Bezos as a publisher, much less the courage to stand against the new “boss.”
It begs to question: How is Bezos connected to questionable intelligence leaks in recent months?
What does he have to do with the sudden disruption of web services that kept millions from accessing whistle blowing website, WikiLeaks, during its explosive releases of state department cables?
Cables containing inside information revealing corruption within American politics linked to former secretary of state, and presidential candidate, Hillary Clinton.
The majority of Americans do not know ‘leaked” CIA documents to undermine a new president and administration were leaked through the Washington Post first and after Bezos took the helm of “America’s newspaper.”
The “deal” is for a computing cloud developed by Amazon Web Services (AWS). It also just happens AWS services all 17 agencies within the US intelligence community.
An unholy alliance in which Bezos stands to gain many more millions by pacifying and working with the CIA through his publication The Washington Post. “Leaks” and “information” Bezos will publish without question, without proper verification and journalistic sourcing.
The CIA will now have its own propaganda publication to do whatever it likes in misinforming and manipulating the American people and the voters.
Is this lack of reporting of the Bezos/CIA partnership by the MSM the result of massive incompetency? Or a very well-organized cover up within the MSM inner circle of four or five elitists who now own six companies that control over 90 percent of MSM outlets?
The same outlets which through diverse company divisions own every television station and newspaper in this country with the exception of very small, weekly community publications and certain Christian networks. Even many of those community weeklies have been scooped up by larger publication divisions.
Are we connecting the dots at each cross-section of intertwining strings holding together this corrupt spider web? A vast interlocking network designed to lure and trap average American citizens into its carefully woven web of manipulation and deceit.
The Washington Post is the most widely known and respected news outlet in the world, reaching more people than any other publication including the NY Times. It has always been the standard in which journalistic ethics are established and adhered to by other publications. It sets the example to be followed by the everyday journalists out there on the beat trying to do their jobs.
By utilizing the internet and social media, the Post has literally millions of subscribers and followers reading and watching online video on a daily basis. It is the media center of the nation’s capital and the eye of the DC political belt.
Control the Washington Post and you control the message; the MSM and the “agenda.”
“The Post is unquestionably the political paper of record in the United States, and how it covers governance sets the agenda for the balance of the news media,” journalism scholar Robert W. McChesney revealed to Altenet.org /a> in a December investigative article.
“Citizens need to know about this conflict of interest in the columns of the Post itself,” he added.
In the same article, a statement released by the Public Institute of Advocacy quoted McChesney as saying:
“If some official enemy of the United States had a comparable situation — say the owner of the dominant newspaper in Caracas was getting $600 million in secretive contracts from the Maduro government — the Post itself would lead the howling chorus impaling that newspaper and that government for making a mockery of a free press. It is time for the Post to take a dose of its own medicine.”
If this alliance between the CIA and Bezos isn’t illegal, then it is certainly unethical and displays a huge conflict of interest while also exposing the corruption existing within the MSM. The main sources of news and information Americans sought and believed, until the rise of alternative media outlets.
Alternative sources of information the MSM bash and attempt daily to discredit as “fake news,” when “fake,” misleading and sometimes right out lies being spread across social media come out of the MSM and pseudo extremist left-wing sites erected simply to misinform and confuse the American voter.
George Soros “Media Matters” machine
Soros Funds A Lot Of These Media Sources
Many Facebook pages and websites that have “popped” up over the past several years whose resources and money are being funded by George Soros’s well oiled “Media Matters” machine. Just one of many “nonprofit” organizations extending from his Open Society Foundation.
Soros also has imbedded ties to many MSM outlets including The New York Times, the Associated Press, NBC and ABC and here it is again, the Washington Post. Readers are urgently encouraged to research Soros, his history and his worldwide organizations.
Altnet also writes, “Amazon’s offer wasn’t the low bid, but it won the CIA contract anyway by offering advanced high-tech ‘cloud’ infrastructure.”
So how is at a time government should be pinching pennies due to the increasing national debt, the CIA passed over lower bidders for the contracted services?
The answer tracks back to the infamous blocking of the WikiLeaks website by Bezos’s company Amazon Web Services (AWS), a service Bezos personally and publicly brags is the most advanced and best high-tech “cloud” infrastructure on the market.
“WikiLeaks was booted from Amazon’s webhosting service AWS. So, at the height of public interest in what WikiLeaks was publishing, readers were unable to access the WikiLeaks website,” reported watchdog group Fair in 2013.
So why did AWS give WikiLeaks the boot? Most likely at the bequest of the CIA, whom Bezos has been doing business with since 2013 when the $600 million contract was awarded to AWS. Bezos also has close ties to the Clintons and backed Hillary in her failed run for the presidency, both in the 2008 primary campaign and in 2016 as the Democrat nominee.
In recent days, it has been revealed the CIA has full intention of attempting a coup to remove Trump from office, even though “The Donald” was democratically elected by American voters in a free election.
And it appears in the CIA is in conspiracy with Bezos’s plan to use the Washington Post to achieve a mutual goal: to disrupt and destroy President Trump and his administration. A goal that has no regard or concern for national security or the safety and well-being of American citizens.
Any impact on the average citizen, including possible loss of life by terrorist attacks is considered “collateral damage.”
In an exchange of tweets on Feb. 15, John Schindler, former NSA analyst and national security columnist for the Observer answered a question asking what he thought was going on at the NSA right now. Schneider responded, citing a friend in the intelligence community reference to Trump:
Now we go nuclear. IC war going to new levels. Just got an EM fm senior IC friend, it began: “He will die in jail.”https://t.co/e6FxCclVqT
Which begs a bigger question than the unethical alliance between the CIA, Bezos and his Washington Post:
Could Trump be impeached? Of is he in danger of befalling the same fate as President Kennedy? Being a previous “anti-establishment” president, Kennedy sought to disengage from the Vietnam conflict and dissolve the Federal Reserve, but was assassinated.
Actions that directly impacted the CIA and wealthy elitists.
PoliticalComments Off on Huma Abedin’s Emails Confirm HlLLARY Was Complicit In The MURDER OF CHRISTOPHER STEVENS
Wikileaks – Clinton Was Complicit in the Murder of Ambassador Christopher Stevens
The email links below confirm Hillary knew!
I want to preface this article by stating that this work has been updated 3 times in 10 hours. Information is coming out Wikileaks and other sources faster than any of us can keep up with.
Wikileaks is about to confirm the story that The Common Sense Show told 4 years ago in that Ambassador Christoper Stevens was set up to die because his stories of gun-running, child trafficking and drug-running on behalf of the CIA in order to promote regime change in Libya using terrorists funded by these illegal activities, were leaking out and it was only a few months until the election. Subsequently, Ambassador Stevens had to be silenced. And Petraeus had to be put in a place where he was not forced to testify before Congress because he could not take the 5th before Congress
At the same time, Clinton was broadcasting Stevens whereabouts and she refused to provide the extra protection Stevens was so desperately requesting. Being that Stevens was working for the CIA, then head of the CIA, David Petraeus, would have known about Chris Stevens activities. To protect Obama’s 2012 election, both Stevens and Petraeus had to be gone.
People are asking me how I knew all of this four years ago and I say, “I had a deep cover source from inside one of the military/intelligence services who wanted the real truth to be told. Somebody who knew this nation could not afford to let Clinton ever become President”. Now, I am getting confirmation from Wikileaks and others who have reached the same conclusion I did four years ago.
Dear Mr. Hodges,
This is to inform you that Wikileaks will soon, or has released Clinton emails which will demonstrate the following:
Please note that I have covered the ISIS/Lafarge/Clinton connections very prominently in the past year. This is just more confirmation of what I have already covered.
The above is already appearing on the Internet in several places. It is clear that Putin would be a fool to allow Clinton and her gang of thugs to continue with their plan. Every time Clinton sags in the polls, she starts talking about 9/11. The evidence is beginning to line up that Clinton interests had motive to commit 9/11. No wonder Clinton tries to blame the Russians for everything, she is the main culprit on the world being brought to the precipice of World War III.
It is a gratifying feeling when the dots start to connect.
The Aaron Klein Revelations
Aaron Klein, the Breitbart Bureau Chief for Jerusalem revealed, in a Breitbart publication dated March 1, 2016, revealed that “the email from April 10th, 2011, the State Department employee, Timmy Davis, forwarded an email to the server by Clinton’s aide, Huma Abedin.” Please note that the time of this revelation, Huma Abedin, was not yet a household name.
The series of emails will eventually have catastrophic consequences for Ambassador Stevens.
“An email containing the whereabouts and plans of murdered U.S. Ambassador Chris Stevens passed through Hillary Clinton’s private server, dispatches released Monday in the final group of messages from Clinton’s emails reveal.”
Below are some examples of the allegations posed by Klein and these are not empty charges as Klein offered as proof, the following emails.
“A March 27, 2011 email released last year was titled, “Chris Stevens mission.” It divulged: “The current game plan is for Mr. Stevens to move no later than Wednesday from Malta to Benghazi. He will stage offshore initially for a one day visit during which he will have meetings with TNC interlocutors and get a sense of the situation on the ground. The goal of this one day trip is for him to lay the groundwork for a stay of up to 30 days.
An April 8, 2011 email was forwarded to Clinton revealing the “security situation in Benghazi remains quiet. Chris Stevens & team are in the hotel, moving only for meetings as required.”
An April 22, 2011emailrevealed Stevens was on the road: “I want to let you know about a temporary rotation in Benghazi. TNC Envoy Chris Stevens has been on the road since March 13, when he began his outreach mission, and has been in Benghazi since April 5.”
An April 24, 2011 email has the exact time of a Stevens meeting: “”Stevens will be meeting with MFA in one hour and will make a written request for better security at the hotel and for better security-related coordination. He still feels comfortable in the hotel. They are looking into the idea of moving into a villa, but that is some way off.”
If later emails are released, I have no doubt, that we will see that Clinton was transmitting Stevens location up until the time of the attack upon the Benghazi compound and this explains why some of these emails are not being released. However, at some point, they will see the light of day.
The release of travel information, in any form, is a felony! Remember, the Stevens travel plans are classified and they came from Clinton’s private server. A casual Law and Order fan could make the causal connections between the release of these emails and Stevens death. This is absolute evidence that Clinton is not only guilty of multiple felonies, she is an accomplice to murder!
John McCain solicited now dead Russian Ambassador for donation to his presidential campaign in 2008
John McCain, who once called Russia a bigger threat than terrorism, asked Vitaly Churkin for campaign money during the 2008 election. He was turned down. Maybe THIS is why McCain hates Russia so much?
Isn’t it illegal to solicit campaign donations from foreign governments?
Found this while searching Wikileaks for Russian hacks (spoiler: there aren’t many).
Russian mission On Fundraising Letter from John McCain Election Campaign, 20 Oct 2008
October 20, 2008
20 Oct 2008 statement from the Russian Federation to the United states in relation to an alleged letter from the McCain campaign requesting a financial contribution from Russia:
“We have received a letter from Senator John McCain requesting financial contribution to his Presidential campaign.
In this connection we would like to reiterate that Russian officials, the Permanent Mission of the Russian Federation to the United Nations or the Russian Government do not finance political activity in foreign countries.”
Wikileaks staff have verified the authenticity of the document. Obviously the statement is designed to undermine the McCain campaign and is an extremely interesting Russian intervention into US domestic politics. It remains to be seen whether the play, which lacks subtlety, will backfire and generate support for McCain.
According to the document metadata (which can be manipulated, though rarely is), the document was created by “INT10”, underwent two revisions and was saved by “INT9” with a version of word is registered to organization “MID”. Although Wikileaks normally removes metadata, we have not done so in this instance since the document is intended to be public and may be a significant political play by Russian intelligence.
The United Nations recently declared that by the year 2030, Sweden would become a Third World country. This is absolutely appalling and this should NEVER be allowed to happen. Not in Sweden, the UK, France, Canada or any other Western nation. Just what will it take for the so-called ‘Leaders’ in the West to come to the obvious realization that if you import Third World refugees in great-enough numbers into your country, then eventually, the Third World is what will become of your own country?
Blinds journalists information and news for not favoring SD? The statement dismissed as tin foil hat theory. But journalists who I am in contact with testifies problems.
Jesper Strömbäck, Professor of Media and Communications, said the other day: “The media would cover up any berries in my judgment, strong features of the conspiracy theory.” (Summary, 12/1). Sometimes opt out of information about news values, he points out.
And it is true generally. Meanwhile, for example Skånska Dagbladets then editor Jan A Johansson, the journalist Björn Hagers book “Party Problem”, if SD acknowledges that data has been omitted to avoid a “hell damage to society”.
The other day I asked the question of social media: “You who worked as / journalists. Have you been part of the editorial board wanted to downplay or avoid substances because ‘can benefit sd’? “Journalists in different ages, men and women, with different backgrounds and from different media, approached him. Those who responded publicly on Twitter gave mostly no answers, they had not encountered it. Those who approached him privately gave a more troubling picture.
A journalist who has conveyed the news on integration and immigration for many years expressed that “this topic is super sensitive.” There is a younger generation who think black and white, according to the person: “If anything the interviewee says complicates the thesis and one’s own worldview you cut it out of the story.” When the journalist himself has let different voices to be heard, it has led to attacks from other journalists. Nowadays, I am very cautious stories, tell the person. “Can not be bothered to have enemies,” is the explanation.
Another journalist that contact has been working on a few different media newsrooms. “Before the last election in 2010, when I remember especially a completely bizarre discussion, the reporters at the coffee machine stood talking about ‘how should we respond to the Sweden Democrats, we can not take them as an ordinary party'” he says. And testify directives from the new boss to “take it easy” when he examines the integration-related topics.
The call to be cautious return. One person has been worshiped be there when asked about problems at an accommodation for unaccompanied youths arrived at the numbers. Another person reported that a senior colleague with strong political views have stopped the story about mess at an asylum accommodation. Others describe a caution with the choice of words, of news or identifying data in order not to promote xenophobia.
A journalist who has worked on several major editorial says that in all workplaces has been a pronounced or unspoken policy not to promote SD and xenophobia. And especially remember the honor murder of Pela Atroshi: “We did not write a line about it.”
These journalists are no foil hats. On the contrary, highlights several that most journalists and news executives are honest people. Yet the problem is there.
The country’s media newsrooms need to consider a lap: we shall be pronounced against SD? If not; How do we ensure that journalism was shot? It is easy to shout “conspiracy theory” to any criticism. The harder it is to see their own role in that confidence in the media falls, while the SD sites celebrating victory after victory.