Apr 132017
 

Who are the White Helmets? This is a question that everyone should be asking themselves.

Fact-Sheet On Syria’s White Helmets

The White Helmets – here are a few facts that you need to know. Share this with your family and friends who rely on the Western Mainstream Media:

 
• The White Helmets, also called Syria Civil Defence, are not who they claim to be. The group is not Syrian; it was created with USA/UK funding under the supervision of a British military contractor in 2013 in Turkey.

• The name “Syria Civil Defence” was stolen from the legitimate Syrian organization of the same name. The authentic Syria Civil Defence was founded in 1953 and is a founding member of the International Civil Defense Organization (1958).

• The name “White Helmets” was inappropriately taken from the legitimate Argentinian relief organization Cascos Blancos / White Helmets. In 2014, Cascos Blancos / White Helmets was honored at the United Nations for 20 years of international humanitarian assistance.

• The NATO White Helmets are primarily a media campaign to support the ‘regime change’ goals of the USA and allies. After being founded by security contractor James LeMesurier, the group was “branded” as the White Helmets in 2014 by a marketing company called “The Syria Campaign” managed out of New York by non-Syrians such as Anna Nolan. “The Syria Campaign” was itself “incubated” by another marketing company named “Purpose”.

• The White Helmets claim to be “neutral, impartial and humanitarian” and to “serve all the people of Syria” is untrue. In reality, they only work in areas controlled by the violent opposition, primarily terrorists associated with Nusra/AlQaeda (recently renamed Jabhat Fath al Sham).

• The White Helmets claim to be unarmed is untrue. There are photos which show their members carrying arms and celebrating Nusra/AlQaeda military victories.

• The White Helmets claim to be apolitical and non-aligned is untrue. In reality they actively promote and lobby for US/NATO intervention in violation of the norms of authentic humanitarian work.

• The Right Livelihood description that “Syria Civil Defence” saved over 60,000 people and “support in the provision of medical services to nearly 7 million people” is untrue. In reality the zones controlled by terrorists in Syria have few civilians remaining. That is why we see “cat” video/media stunts featuring the White Helmets.

• The NATO White Helmets actually undermine and detract from the work of authentic organizations such as the REAL Syria Civil Defence and Syrian Arab Red Crescent.

• The recent Netflix movie about the White Helmets is not a documentary; it is a self promotional advertisement. The directors never set foot in Syria. The Syrian video, real or staged, was provided by the White Helmets themselves. From the beginning scenes showing a White Helmet actor telling his little boy not to give mommy a hard time until the end, the video is contrived and manipulative. The video was produced by a commercial marketing company Violet Films/Ultra Violet Consulting which advertises its services as “social media management”, “crowd building” and “campaign implementation”.

The true face of the White Helmets:


 


 

References:

“Seven Steps of Highly Effective Manipulators” Origins of the White Helmets

http://dissidentvoice.org/2015/04/seven-steps-of-highly-effective-manipulators/

The REAL White Helmets awarded for 20 years work

http://cascosblancos.gob.ar/en/white-helmets-20-years-international-humanitarian-assistance-portrayed-un

The REAL Syria Civil Defence

http://www.globalresearch.ca/the-real-syria-civil-defence-exposes-natos-white-helmets-as-terrorist-linked-imposters/5547528

Who are the Syria White Helmets?

http://21stcenturywire.com/2016/06/21/who-are-the-syria-white-helmets/

White Helmets Deceive Right Livelihood and CodePink

http://truepublica.org.uk/global/white-helmets-deceive-right-livelihood-codepink/

White Helmets cat video showing terrorist zone with no civilians.  “The homeowners abandoned this district and its kittens.”  How fake does it get?

https://www.youtube.com/watch?v=UkfcE-Drnas

White Helmets are caught staging rescue only to claim they were making a mannequin challenge video.

http://archive.is/5D2Ew

 


 

 
via

Apr 072017
 

RELEASE: CIA malware for Windows “Grasshopper” — which includes its own language

Wikileaks: CIA Malware For Windows "Grasshopper"

Grasshopper basically allows the Deep State to do anything it wants remotely to a Windows machine. It doesn’t seem to matter if it is Windows XP, Windows 7, Windows 8, or Windows Server versions 2003 or 2008. Almost all the attacks and hijacks bypassed the major intrusion detection systems (MS Security, Symantec, Kapersky, and Rising). No matter how locked down or safe you thought your Windows install was, you were wrong.

Oh even better. It looks like these were designed specifically to avoid the major security programs.

From Wikileaks:

Grasshopper

7 April, 2017

Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to “perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration”. Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.

Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’ on target machines do not detect Grasshopper elements.

One of the persistence mechanisms used by the CIA here is ‘Stolen Goods’ – whose “components were taken from malware known as Carberp, a suspected Russian organized crime rootkit.” confirming the recycling of malware found on the Internet by the CIA. “The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.”. While the CIA claims that “[most] of Carberp was not used in Stolen Goods” they do acknowledge that “[the] persistence method, and parts of the installer, were taken and modified to fit our needs”, providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company “HackingTeam”.

The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise.

Leaked Documents

Grasshopper-v2_0_2-UserGuide
Grasshopper-v1_1-AdminGuide
StolenGoods-2_1-UserGuide
GH-Run-v1_1-UserGuide
GH-ServiceProxy-v1_1-UserGuide

 

“Grasshopper” re-installs itself every 22 hours by corrupting Windows Update… even if is disabled.


 

 

Mar 312017
 

Vault 7 Part 3: WikiLeaks releases the CIA ‘Marble’ dump

CIA Vault 7 Part 3 "Marble" Allows CIA To Cover Their Tracks
WikiLeaks has released the latest batch of documents detailing CIA hacking tactics. The third release, named ‘Marble’, contains 676 source code files for the agency’s secret anti-forensics framework.Marble Framework, which WikiLeaks explains is part of the CIA’s Core Library of malware, is used to hamper forensic investigators from attributing viruses, trojans and hacking attacks to the CIA. WikiLeaks said Marble was in use at the agency as recently as 2016.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

From Wikileaks:

Marble Framework

31 March, 2017

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

 
via

Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected

 Political  Comments Off on Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected
Mar 242017
 
WikiLeaks Vault 7 shows that the CIA has developed a huge range of attacks against iPhones since at least 2008.

Wikileaks: CIA Hacks Dubbed Dark Matter Reveal How Apple Products Are Infected

Yesterday, Wikileaks released another series from their ‘Vault 7’ CIA hacks called ‘Dark Matter’ where they reveal how Apple products are infected.

According to Wikileaks, ‘Dark Matter’ contains documentation for several CIA projects that infect Apple MAC computer firmware developed by the CIA’s Embedded Development Branch (EDB). Interestingly… the infection persists even if the operating system is re-installed.

From Wikileaks:

Dark Matter

23 March, 2017

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Leaked Documents

Sonic Screwdriver
DerStarke v1.4
DerStarke v1.4 RC1 – IVVRR Checklist
Triton v1.3
DarkSeaSkies v1.0 – URD

Dark Matter Dog

 
via

While The Mainstream Media Focuses On Russia, The Government’s Own Data Shows U.S. Interfered In 81 Elections

 Political  Comments Off on While The Mainstream Media Focuses On Russia, The Government’s Own Data Shows U.S. Interfered In 81 Elections
Mar 232017
 
While the US spin machine hurls accusations about Russian election meddling, it’s worth nothing the US is a seasoned pro at interfering in elections.

While The Mainstream Media Focuses On Russia, The Government's Own Data Shows U.S. Interfered In 81 Elections

Ask an average American who makes a habit of following government-mouthpiece corporate media about interference in national elections and you’ll likely elicit a nebulous response concerning Russian hackers and a plan to install Donald Trump in the White House — but you probably won’t hear a single syllable pertaining to United States government’s actual attempts to do the same.

On Monday, FBI Director James Comey confirmed for the first time publicly the bureau is officially investigating hotly contentious allegations of Russian meddling in the U.S. election — but, even if proven true, such geopolitical escapades better characterize the routine behavior of accuser than of accused.

“The F.B.I., as part of our counterintelligence effort, is investigating the Russian government’s efforts to interfere in the 2016 president election,” the director announced, adding the bureau would conduct a probe to discern whether Trump’s associates had contact with Russian officials.

Despite that the U.S. has hypocritically exerted influence over foreign elections in all corners of the globe — in fact, it has arrogantly done so a whopping 81 times between 1946 and 2000, alone — with just one-third of those operations undertaken overtly.


For months, mainstream media parroted murky accusations hurled by politicians — keen to point a finger of blame for the apparently stultifying victory of a former reality television host on someone — that The Russians had somehow surreptitiously undermined the election-centric foundation of American Democracy.

While that has yet to prove true, this new Red Scare constitutes a duplicitous attempt by the pot to call the kettle … an election meddler.

Researcher Dov Levin of Carnegie Mellon University’s Institute for Politics and Strategy — an expert on the topic at hand — discussed the lengthy but incomplete list of times the U.S. government has interfered in other nations’ elections with NPR’s Ari Shapiro.

Asked for examples where this tampering tangibly altered results, Levin stated,

“One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn’t want him to stay in power there due to his tendency, you know, to disrupts the Balkans and his human rights violations.

“So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. And according to my estimate, that assistance was crucial in enabling the opposition to win.”

Levin reiterated the more blatant methods with which the U.S. asserts dominance — through the overt coups or all-out regime changes branding the nation a notorious interventionist — are not among the list of the 80-plus attempts to manipulate the electoral outcome.

As for the issue of pot versus kettle, Levin explained that — although Russia and other powerful nations indisputably employ similar tactics — the United States has been quite prodigious in its effort.

“Well, for my dataset, the United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.”

As sanctimonious U.S. politicians cry foul about The Russians, it would behoove the new McCarthyites to reflect on the nation’s sticky imperialist fingerprints around the globe — like that time in 1996, when the United States undertook an extensive, secret operation to ensure the presidency of Boris Yeltsin.

That is, of course, former President Boris Yeltsin — of the Russian Federation.

 
By Claire Bernish

Five Pakistani Congressional Staffers In Criminal Probe Over Unauthorized Computer Access

 Political  Comments Off on Five Pakistani Congressional Staffers In Criminal Probe Over Unauthorized Computer Access
Mar 222017
 
Dozens of House Democrats have collectively paid $4 million since 2009 to Pakistani IT professionals now under criminal investigation who had access to House members’ email and computer files.

Five Pakistani Congressional Staffers In Criminal Probe

Five people employed by members of the House of Representatives remain under criminal investigation for unauthorized access to Congressional computers. Former DNC chair Debbie Wasserman Schultz employed at least one of those under investigation.

The criminal investigation into the five, which includes three brothers and a wife of one of the men, started late last year, as reported by Politico in February. The group is being investigated by US Capitol Police over allegations that they removed equipment from over 20 members’ offices, as well as having run a procurement scheme to buy equipment and then overcharge the House.

House Speaker Paul Ryan said last week Capitol Police are receiving additional help for the investigation. “I won’t speak to the nature of their investigation, but they’re getting the kind of technical assistance they need to do that, this is under an active criminal investigation, their capabilities are pretty strong but they’re also able to go and get the kind of help they need from other sources,” Ryan said.

The brothers, Abid, Jamal and Imran Awan, worked as shared employees for various members of the House, covering committees relating to intelligence, terrorism and cybersecurity, which included the House Committee on Foreign Affairs, the Committee on Homeland Security and the Subcommittee on Tactical Air and Land Forces of the Armed Services Committee.

Imran’s wife, Hina Alvi, and Rao Abbas, both of whom worked as House IT employees, are also under investigation.

Debbie Wasserman Schultz

The group were banned from accessing the computers as a result of the investigation but, as of earlier this month, Imran Awan remains as an “technology adviser” to former Democratic National Committee chair, Debbie Wasserman Schultz, who was forced to resign in July following revelations that she worked to further Hillary Clinton’s chances of winning the Democratic primary at the expense of Vermont Senator Bernie Sanders.

News of the brothers’ investigation has sparked speculation that it may be tied to the hack of the DNC servers, the contents of which were first released by Guccifer 2.0 and later published on WikiLeaks.

Russian actors have been accused of being behind the hack, which Democrats claim contributed to Clinton’s loss to Donald Trump. There have also been reports that the DNC hack came from an insider.

An email between DNC staffers in April 2016, which was released by WikiLeaks, references a staff member named Imran and how this person has access to the passwords for Wasserman Schultz’s iPad.

Garret Bonosky, deputy director of office of the DNC chair, tells Amy Kroll: “I have to get [this iPad] thing figured out. Need to make sure I have her username and password before I delete and reload the app.”

“I do not have access to her ipad password, but Imran does,” Kroll replies, later writing: “Just spoke to Imran, call me whenever GB and I’ll update you, don’t delete anything yet.”

Another email from the DNC hack, dated December 2016, references Imran once again. Wasserman Schultz’s assistant Rosalyn Kumar tells scheduler Anna Stolitzka: “[Nancy] Pelosi is doing [a] closed door meeting. No staff or anyone allowed. Kaitlyn come to Rayburn room and get her iPad for Imran.”

6-Figure Salaries

The brothers were paid high salaries for their work with various House members, above the median salary for Congressional staffers.

Imran, who started working for Wasserman Schultz in 2005, received $164,600 in 2016, with close to $20,000 of that coming from Wasserman Schultz.

Jamal, who started working as a staffer in 2014, was paid $157,350.12 in 2016.

Abid, who started working in 2005, was paid $160,943 in 2016.

Hina Alvi, who was employed as a staffer from February 2007, was paid 168,300 in 2016.

Rao Abbas was paid $85,049 in 2016.

The Daily Caller reports that Imran received $1.2 million in salary since 2010, while Abid and Alvi received over $1 million each.

House Democrats supporting the employees have suggested that the Pakistani nationality of the suspects may have inspired the investigation.

 
via

Mar 182017
 
Bush fired several U.S. Attorneys to help cover up a pedophile ring being run out of the D.C. hotels involving Congressmen, Senators and reporters!

Bush Fired U.S. Attorneys To Cover Up D.C. Pedophile Ring

This was the Franklin Scandal. The Bush administration fired the agents investigating the crimes to cover it up. U.S. senators and congressmen were covering up the Dusty Foggo government lobbyist and military prostitution and pedophilia ring in Washington involving legislators, news reporters, military officers and high government officials. Alberto Gonzales and President Bush fired San Diego U.S. Attorney Carol Lam because she was probing the Dusty Foggo / Jack Abramoff D.C. sex ring.

According to a long-time senior intelligence agent the Washington, DC Hilton, Ritz Carlton and Sheraton Hotels were used for compromising House and Senate members, National Media hosts who had sex with children in a legislative and media Blackmail ring.

“The whole Republican and Democratic Parties were for sale, the House, Senate and the White House.”

“Poppy Bush and Abramoff were up to their eyeballs in this kid sh*t,” said the Federal Agent.

Supposedly convicted Lobbyist Jack Abramoff provided male and female heterosexual, homosexual, lesbian, bisexual and child prostitutes sexual services to numerous US Congressmen, US senators, national media hosts and other federal officials who were compromised and made susceptible to blackmail at three Washington hotels.

The Washington Hilton was specifically used for sex with children because it has what the agent termed a “super secure section for VIPs that is out of public view and which reportedly employs no camera surveillance, an area able to hold around 6-10 vehicles so that no one could observe abducted, abused or drugged children flown in from other states who were coming to or leaving the hotel.” Hilton employees began to become suspicious of Abramoff’s operation, so children were moved to the Washington Ritz-Carlton according to other intelligence officials.

From Wikileaks:

The Global Intelligence Files

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered “global intelligence” company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods.

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE

Released on 2012-10-15 17:00 GMT

Email-ID 475107
Date 2007-03-27 07:27:50
From TomFlocco@cs.com
To undisclosed-recipients:

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE TomFlocco.com Foggo sex ring probe linked to forged Iraq dossier, Israeli espionage, convicted lobbyist Abramoff

According to U.S. intelligence sources, President Bush obstructed justice
last December when he had senior advisor Karl Rove and White House Counsel
Harriet Miers instruct Attorney General Alberto Gonzalez to fire eight
U.S. attorneys who were among several others conducting ongoing public
corruption and secret national security grand jury investigations
connected to an espionagea**linked prostitution / pedophile sex ring
operating at the Washington Ritz-Carlton and other DC hotels, whose
clients included U.S. senators and congressmen, elite Washington news
reporters and high government officialsa**some of whom were named by an
intelligence insider.

Central to the scandal is fired U.S. attorney Carole Lam of California who
was reportedly conducting testimony before grand juries linking indicted
former Bush CIA Executive Director Kyle a**Dustya** Foggo and convicted
Republican lobbyist Jack Abramoff to the sex ring, Israeli espionage, GOP
Under Secretary of Defense for policy Douglas J. Feith, a forged British
intelligence dossier used by Mr. Bush to deceive Americans into supporting
war against Iraq and an attempt to plant weapons of mass destruction (WMD)
in Iraq before the war via an intelligence pipeline through Dubai and
Turkey. READ MORE

 

Original story:

U.S. intelligence: Sen. Leader William Frist and reporter Robert Novak alleged as regular clients

by Tom Flocco

Washington—May 5, 2006—TomFlocco.com—A long-time top-level government agency official joined a national security expert in confirming grand jury testimony last month, revealing that male and female heterosexual, homosexual, lesbian, bisexual and child prostitutes provided sexual services to numerous congressmen, senators, national media hosts and other federal officials who were compromised and made susceptible to blackmail at three Washington hotels.

“The whole Republican Party was for sale—the House, Senate and the White House,” said a well-respected federal agency official with impeccable credentials who declined to be named but who is familiar with testimony and sources close to the grand jury probing Jack Abramoff.

Patrick Fitzgerald

Patrick Fitzgerald

Special Prosecutor Patrick Fitzgerald’s grand jury heard several agents testify in April that the “Watergate, Ritz-Carlton and Sheraton Hotels in Washington, DC were used to compromise legislators and news-people with prostitution services, the financing of which is directly linked to the American Israeli Public Affairs Committee (AIPAC), former Israeli Prime Minister Benjamin Netanyahu, Marc Rich and Abramoff,” said national security expert Thomas Heneghan.There are no corporate media reports as to which White House officials participated in the hotel sex ring activities with House and Senate members; however, Heneghan said U.S. Senate Leader and 2008 presidential candidate William Frist was alleged to be a frequent visitor to the hotels according to U.S. intelligence agents.

Frist is reportedly a close friend of alleged Bush 43 male consort and former Knoxville, Tennessee mayor Victor Ashe according to federal agents.

Heneghan also alleged additional prostitute customers as British Prime Minister Tony Blair and former CNN host-reporter Robert Novak, both of whom were introduced into the sex-ring by GOP reporter and male prostitute Jeff Gannon, who visited the Bush White House living quarters 200 times without the assignations being recorded in visitor logs.

Jack Abramoff

Jack Abramoff

The genesis of the Valerie Plame CIA leak allegedly took place during one of Novak’s visits with an Abramoff hooker at one of the hotels according to the sources.The corruption and crimes surrounding the indicted Republican lobbyist were widespread and far-reaching enough to cause Fitzgerald to impanel a separate grand jury, often referred to by intelligence officials as the “Franklin grand jury,” which is hearing testimony and examining Abramoff linked evidence tied to the Iraq War, September 11 and related issues.

Pentagon analyst Larry Franklin was arrested for leaking classified U.S. government information to AIPAC officials Steve Rosen and Keith Weissman who reportedly leaked information to Israel concerning a controversial proposal by Department of Defense hardliners to destabilize Iran.

The federal source wishing to remain anonymous said that additional government officials are currently testifying this month before the Franklin grand jury about Abramoff, the GOP-linked prostitution ring and its ties to AIPAC.

“Photographs of politicians in compromising positions have reportedly already been used as blackmail to silence politicians who would speak the truth about the 2000 election fraud in Florida, 9-11, Iraq/yellowcake/WMD and how Jack Abramoff and Netanyahu were the pimps for the operation,” said Heneghan.

President Bush has emphatically denied that he personally knows Abramoff, despite CIA records indicating the indicted lobbyist visited the White House 200 times during the first ten months of the Bush presidency—often enough for a personal visit on every business day of each month, according to wide news reports.

Despite the daily White House visits, Bush said “I’ve never sat down with him and had a discussion with the guy,” adding, “I’m also mindful that we live in a world in which those pictures will be used for pure political purposes,” attempting to justify his unwillingness at first to release photos of him chatting amicably with Abramoff.

Fitzgerald is reportedly convinced that the Bush administration wanted Valerie Plame-Wilson’s identity as a CIA official leaked because her intelligence team had identified Israeli Mossad operatives inside Iran who were to receive weapons of mass destruction (WMD) to be delivered through Turkey and planted in Iraq to further the president’s case for war, said the intelligence expert.

“The financing for these whorehouses is linked directly to AIPAC, Benjamin Netanyahu, Marc Rich and Jack Abramoff; and the money trail ties back to American International Group (AIG), Hank Greenberg and Doug Alexander—former British Minister of E-Commerce,” said Heneghan.
In an ominous prediction, Heneghan said, “It won’t be long before the un-compromised U.S. military may have to declare a State of Emergency and re-implementation of the Constitution under a special provision of the Naval Code, which would lead to the arrest and removal of the criminal government residing at 1600 Pennsylvania Avenue.”(Bush and his thugs)

According to Heneghan, the Abramoff congressional sex ring is tied to the SunCruz Casino scandal, secret accounts at Riggs Bank and Crozier Bank, the 9-11 “hijacker” Venice, Florida flight schools, and former U.S. ambassador to Italy Mel Sembler and Doug Alexander—both of whom have been linked to the reported Florida 2000 election fraud—all of which is tied to a financial trail that connects narcotics trafficking to Al Qaeda and the congressional sex ring.

MSNBC host and former congressman Joe Scarborough, subject of a recent TomFlocco.com story, “is now cooperating with federal investigators in the Abramoff matter which has led the probe to the doorsteps of the AIPAC whorehouses now operating in Washington, DC,” said Heneghan.

The intelligence expert told us “Scarborough told federal investigators that he now believes his female staff member was murdered in his congressional office to silence her regarding knowledge of Alexander, Sembler, Katherine Harris, Jeb Bush and the Florida election 2000 coup d’ etat.”

 
via

FLASHBACK – CIA Director David Petraeus: “We’ll Spy on You Through Your Dishwasher”

 Political  Comments Off on FLASHBACK – CIA Director David Petraeus: “We’ll Spy on You Through Your Dishwasher”
Mar 112017
 
In a 2012 Wired article, entitled, “CIA Chief: We’ll Spy on You Through Your Dishwasher,” then CIA Director David Petraeus heralded emerging technologies in relation to spying.
FLASHBACK - CIA Director David Petraeus: "We’ll Spy on You Through Your Dishwasher"

CIA Director David Petraeus unwinds with some Wii Golf, 2008. Photo: Wikimedia

With Wikileaks latest, largest dump of confidential CIA files ever published, the world is beginning to realize just how far gone our privacy rights are. They have become virtually nonexistent thanks to Obama’s two terms in office.

As far back as a five years ago, then CIA Director General David Petraeus was touting how hi-tech advances offered countless ways Americans can be spied on.

With the rise of the “Smart Home,” you are sending tagged, Geo-located data that the CIA can intercept in real-time when you use the lighting app on your phone to adjust your living room’s ambiance.

The CIA had a plan that smart meters, smart phones, smart TVs and other smart household devices installed in every hopelessly “Dumbed Down” American’s home would permit the Deep State complete invasive access to you in the un-private, unsafe sanctuary you call home.

From Wired March 2012:

MORE AND MORE personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.

Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”

All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”

Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.

The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.

That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.

“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.”

It’s hard to argue with that. Online cache is not a spy’s friend. But Petraeus has an inadvertent pal in Facebook.

Why? With the arrival of Timeline, Facebook made it super-easy to backdate your online history. Barack Obama, for instance, hasn’t been on Facebook since his birth in 1961. Creating new identities for CIA non-official cover operatives has arguably never been easier. Thank Zuck, spies. Thank Zuck.

 

The CIA And The Death Of John F. Kennedy

 Information, Political  Comments Off on The CIA And The Death Of John F. Kennedy
Mar 082017
 

The Death Of John F. Kennedy

Yesterday, WikiLeaks tweeted the decryption passphrase for the CIA Vault 7 leak. The password is, “I will splinter the CIA into a thousand pieces and scatter it into the wind,” a quote credited to President John F. Kennedy.

The quote was given to a Times journalist in the 1960s by a Kennedy administration official and published in the New York Times on April 25, 1966 in an article titled “C.I.A.: Maker of Policy, or Tool?” Read it here.

The video below references the JFK quote at the 2:50-mark.

The 6:15-minute video centers on Samuel Halpern discussing JFK’s relationship with the Central Intelligence Agency. Halpern was involved in the investigation of the assassination of John F. Kennedy.

Halpern says that the CIA is not all bad, but that the organization is highly individualistic.

The video focuses on Kennedy’s relationship with Cuba prior to his assassination by Lee Harvey Oswald and discusses Operation Northwoods, a proposed false flag operation against the Fidel Castro regime, that originated within the U.S. Department of Defense. According to ABC News, “the plans reportedly included the possible assassination of Cuban émigrés, sinking boats of Cuban refugees on the high seas, hijacking planes, blowing up a U.S. ship, and even orchestrating violent terrorism in U.S. cities.”

Kennedy refused the plan, but the CIA still wanted to deal with Cuba.

In the video, Halpern says he could never figure out why the CIA wanted to punish Cuba so badly but that he thought maybe it had to do with hubris. It’s then stated that JFK was finding it increasingly difficult to keep former Director of Central Intelligence Allen Dulles “in line” and that the agency was becoming a “state within the state.”

Convenient Deaths

1963 – 1976

In the three year period following the assassination many witnesses died – mostly of unnatural causes. Many rumors crawling around about the high death rate during these years. They are supported by the mostly suspicious circumstances the victims died under. For a unknown shooter or even shooters, all these deaths have on thing in common: they are very convenient to those assassins since these witnesses took their knowledge with them into the grave. But see yourself and decide whether these deaths are purely coincidently:

Date Name Connection with case Cause of death
11/63 Karyn Kupicinet Tv host’s daughter who was overheard telling of JFK’s death prior to 11/22/63 Murdered
12/63 Jack Zangretti Expressed foreknowledge of Ruby shooting Oswald Gunshot Victim
2/64 Eddy Benavides Lookalike brother to Tippit shooting witness, Domingo Benavides Gunshot to head
2/64 Betty MacDonald* Former Ruby employee who alibied Warren Reynolds shooting suspect. Suicide by hanging in Dallas Jail
3/64 Bill Chesher Thought to have information linking Oswald and Ruby Heart attack
3/64 Hank Killam* Husband of Ruby employee, knew Oswald acquaintance Throat cut
4/64 Bill Hunter* Reporter who was in Ruby’s apartment on 11/24/63 Accidental shooting by policeman
5/64 Gary Underhill* CIA agent who claimed Agency was involved Gunshot in head ruled suicide
5/64 Hugh Ward* Private investigator working with Guy Banister and David Ferrie Plane crash in Mexico
5/64 DeLesseps Morrison* New Orleans Mayor Passenger in Ward’s plane
8/64 Teresa Norton* Ruby employee Fatally shot
6/64 Guy Banister* x-FBI agent in New Orleans connected to Ferrie, CIA, Carlos Marcello & Oswald Heart attack
9/64 Jim Koethe* Reporter who was in Ruby’s apartment on 11/24/63 Blow to neck
9/64 C.D. Jackson “Life” magazine senior Vice-president who bought Zapruder film and locked it away Unknown
10/64 Mary Pinchot JFK “special” friend whose diary was taken by CIA chief James Angleton after her death Murdered
1/65 Paul Mandal “Life” writer who told of JFK turning to rear when shot in throat Cancer
3/65 Tom Howard* Ruby’s first lawyer, was in Ruby’s apartment on 11/24/63 Heart attack
5/65 Maurice Gatlin* Pilot for Guy Banister Fatal fall
8/65 Mona B. Saenz* Texas Employment clerk who interviewed Oswald Hit by Dallas bus
?/65 David Goldstein Dallasite who helped FBI trace Oswald’s pistol Natural causes
9/65 Rose Cheramie* Knew of assassination in advance, told of riding to Dallas with Cubans Hit/run victim
11/65 Dorothy Kilgallen* Columnist who had private interview with Ruby, pledged to “break” JFK case Drug overdose
11/65 Mrs. Earl Smith* Close friend to Dorothy Kilgallen, died two daysafter columnist, may have kept Kilgallen’s notes Cause unknown
12/65 William Whaley* Cab driver who reportedly drove Oswald to Oak Cliff (The only Dallas taxi driver to die on duty) Motor collision
1966 Judge Joe Brown Presided over Ruby’s trial Heart attack
1966 Karen “Little Lynn” Carlin* Ruby employee who last talked with Ruby before Oswald shooting Gunshot victim
1/66 Earlene Roberts Oswald’s landlady Heart attack
2/66 Albert Bogard* Car salesman who said Oswald test drove new car Suicide
6/66 Capt. Frank Martin Dallas policeman who witnessed Oswald slaying, told Warren Commission “there’s a lot to be said but probably be better if I don’t say it” Sudden cancer
8/66 Lee Bowers Jr.* Witnessed men behind picket fence on Grassy Knoll Motor accident
9/66 Marilyn “Delila Walle* Ruby dancer Shot by husband after 1 month of marriage
10/66 Lt. William Pitzer* JFK autopsy photographer who described his duty as “horrifying experience” Gunshot ruled suicide
11/66 Jimmy Levens Fort Worth nightclub owner who hired Ruby employees Natural causes
11/66 James Worrell Jr.* Saw man flee rear of Texas School Book Depository Motor accident
1966 Clarence Oliver Dist. Atty. Investigator who worked Ruby case Unknown
12/66 Hank Suydam Life magazine official in charge of JFK stories Heart attack
1967 Leonard Pullin Civilian Navy employee who helped film “Last Two Days” about assassination One-car crash
1/67 Jack Ruby* Oswald’s slayer Lung cancer (he told family he was injected with cancer cells)
2/67 Harold Russell* Saw escape of Tippit killer killed by cop in bar brawl
2/67 David Ferrie* Acquaintance of Oswald, Garrison suspect and employee of Guy Banister Blow to neck (ruled accidental)
2/67 Eladio Del Valle* Anti-Castro Cuban associate of David Ferrie being sought by Garrison Gunshot wound, ax wound tohead
3/67 Dr. Mary Sherman* Ferrie associate working on cancer research Died in fire (possibly shot)
1/68 A. D. Bowie Asst. Dallas District Attorney prosecuting Ruby Cancer
4/68 Hiram Ingram Dallas Deputy Sheriff, close friend to Roger Craig Sudden cancer
5/68 Dr. Nicholas Chetta New Orleans coroner who on death of Ferrie Heart attack
8/68 Philip Geraci* Friend of Perry Russo, told of Oswald/Shaw conversation Electrocution
1/69 Henry Delaune* Brother-in-law to coroner Chetta Murdered
1/69 E.R. Walthers* Dallas Deputy Sheriff who was involved in Depository search, claimed to have found .45-cal. slug Shot by felon
1969 Charles Mentesana Filmed rifle other than Mannlicher-Carcano being taken from Depository Heart attack
4/69 Mary Bledsoe Neighbor to Oswald, also knew David Ferrie Natural causes
4/69 John Crawford* Close friend to both Ruby and Wesley Frazier, who gave ride to Oswald on 11/22/63 Crash of private plane
7/69 Rev. Clyde Johnson* Scheduled to testify about Clay Shaw/Oswald connection Fatally shot
1970 George McGann* Underworld figure connected to Ruby friends, wife, Beverly, took film in Dealey Plaza Murdered
1/70 Darrell W. Garner Arrested for shooting Warren Reynolds, released after alibi from Betty MacDonald Drug overdose
8/70 Bill Decker Dallas Sheriff who saw bullet hit street in front of JFK Natural causes
8/70 Abraham Zapruder Took famous film of JFK assassination Natural causes
12/70 Salvatore Granello* Mobster linked to both Hoffa,Trafficante, and Castro assassination plots Murdered
1971 James Plumeri* Mobster tied to mob-CIA assassination plots Murdered
3/71 Clayton Fowler Ruby’s chief defense attorney Uknown
4/71 Gen. Charles Cabell* CIA deputy director connected to anti-Castro Cubans Collapsed and died afterphysical at Fort Myers
1972 Hale Boggs* House Majority Leader, member of Warren Commission who began to publicly express doubts about findings Disappeared on Alaskan plane flight
5/72 J. Edgar Hoover* FBI director who pushed “lone assassin” theory in JFK assassination Heart attack (no autopsy)
9/73 Thomas E. Davis* Gunrunner connected to both Ruby and CIA Electrocuted trying to steal wire
2/74 J.A. Milteer* Miami right-winger who predicted JFK’s death and capture of scapegoat Heater explosion
1974 Dave Yaras* Close friend to both Hoffa and Jack Ruby Murdered
7/74 Earl Warren Chief Justice who reluctantly chaired Warren Commission Heart failure
8/74 Clay Shaw* Prime suspect in Garrison case, reportedly a CIA contact with Ferrie and E. Howard Hunt Possible cancer
1974 Earle Cabell Mayor of Dallas on 11/22/63, whose brother, Gen. Charles Cabell was fired from CIA by JFK Natural causes
6/75 Sam Giancana* Chicago Mafia boss slated to tell about CIA-mob death plots to Senate Committee Murdered
7/75 Clyde Tolson J. Edgar Hoover’s assistant and roommate Natural causes
1975 Allen Sweatt Dallas Deputy Sheriff involved in investigation Natural causes
12/75 Gen. Earle Wheeler Contact between JFK and CIA Unknown
1976 Ralph Paul Ruby’s business partner connected with crime figures Heart attack
4/76 James Chaney Dallas motorcycle officer riding to JFK’s right rear who said JFK “struck in the face” with bullet Heart attack
4/76 Dr. Charles Gregory Governor John Connally’s physician Heart attack
6/76 William Harvey* CIA coordinator for CIA-mob assassination plans against Castro Complications from heart surgery
7/76 John Roselli* Mobster who testified to Senate Committee and was to appear again Stabbed and stuffed in metal drum

The HSCA Investigation

Just when the House Select Committee on Assassinations was investigating the JFK assassination, more suspicious deaths were coming up:

Date Name Connection with case Cause of Death
1/77 William Pawley* Former Brazilian Ambassador connected to Anti-Castro Cubans, crime figures Gunshot ruled suicide
3/77 George DeMohrenschildt* Close friend to both Oswald and Bouvier family (Jackie Kennedy’s parents), CIA contract agent Gunshot wound ruled suicide
3/77 Carlos Prio Soccaras* Former Cuban President, money man for anti-Castro Cubans Gunshot wound ruled suicide
3/77 Paul Raigorodsky Business friend of George DeMohrenschildt and wealthy oilmen Natural causes
5/77 Lou Staples* Dallas radio Talk Show host who told friends he would break assassination case Gunshot to head,ruled suicide
6/77 Louis Nichols Former No. 3 man in FBI, worked on JFK investigation Heart attack
8/77 Alan Belmont FBI official who testified to Warren Commission “Long illness”
8/77 James Cadigan FBI document expert who testified to Warren Commission Fall in home
8/77 Joseph C. Ayres* Chief steward on JFK’s Air Force One Shooting accident
8/77 Francis G. Powers* U-2 pilot downed over Russia in 1960 Helicopter crash (He reportedly ran out of fuel)
9/77 Kenneth O’Donnell JFK’s closest aide Natural causes
10/77 Donald Kaylor FBI fingerprint chemist Heart attack
10/77 J.M. English Former head of FBI Forensic Sciences Laboratory Heart attack
11/77 William Sullivan* Former No. 3 man in FBI, headed Division 5, counter- espionage and domestic intelligence Hunting accident
1978 C.L. “Lummie” Lewis Dallas Deputy Sheriff who arrested Mafia man Braden in Dealey Plaza Natural causes
9/78 Garland Slack Man who said Oswald fired at his target at rifle range Unknown
1/79 Billy Lovelady Depository employee said to be the man in the doorway in AP photograph Complications from heart attack
6/80 Jesse Curry Dallas Police Chief at time of assassination Heart attack
6/80 Dr. John Holbrook Psychiatrist who testified Ruby was not insane Heart attack but pills, notes found,
1/81 Marguerite Oswald Mother of accused assassin Cancer
10/81 Frank Watts Chief felony prosecutor for Dallas D.A. Natural causes
1/82 Peter Gregory Original translator for Marina Oswald and Secret Service Natural causes
5/82 Dr. James Weston Pathologist allowed to see JFK autopsy material for HSCA Died while jogging, ruled natural causes
8/82 Will H. Griffin FBI agent who reportedly said Oswald was “definitely” an FBI informant Cancer
10/82 W. Marvin Gheesling FBI official who helped supervise JFK investigation “Long illness”
3/84 Roy Kellerman Secret Service agent in charge of JFK limousine Unknown

 

via

CIA Method Of Snooping WiFi Data Through Mobile App/Exploit

 Political  Comments Off on CIA Method Of Snooping WiFi Data Through Mobile App/Exploit
Mar 072017
 

CIA Method Of Snooping WiFi Data Through Mobile App/Exploit

Vault 7: CIA Hacking Tools Revealed

The tool ‘Spottsroide’ uses a development feature of the Broadcom modem- called monitor mode– that is present in (in this document, the Galaxy S2) many smartphones and other mobile devices that can be used to snoop and conduct blanket data collection of all WiFi traffic around the device. This data can be analysed later through a variety of different techniques.

Monitor mode (if supported) is normally disabled in firmware, this document confirms that and states “The source was never released, so this is the “reverse engineered” source”- meaning Broadcom didn’t help directly.

This does highlight the issues with fully closed-source backdoors and vulnerabilities, where they can be reverse engineered and exploited regardless of any perceived security.

The interesting thing is that the “survey app” responsible for data collection is initially launched through another app called Apollo, a “music player app”
Apollo is a default music app in CyanogenMod and a special version is available through the Google Play store for install on other Android devices, the “Joe” version is developed by a man named Joseph Cohen who has, according to his website, worked for “government research labs” as well as other government-sponsored projects.
Mr. Joseph Cohen has also co-authored papers on cybersecurity and “PASA: Passive broadcast for smartphone ad-hoc networks

It is possible there is nothing odd about the Apollo app- or Joseph Cohen’s version specifically- and there is simply some form of exploit or perhaps the app has plugins, extensions, or something that’s being leveraged here to start the data collection. But there’s no doubt this is all very odd.

This is a very interesting, highly covert way to conduct network analysis after the fact.

 
Source…

Democrats Fabricated “Russia Hacked The DNC” To Justify Spying On Trump

 Political  Comments Off on Democrats Fabricated “Russia Hacked The DNC” To Justify Spying On Trump
Mar 052017
 
They started setting Trump up as soon as the primaries were over.

Democrats Fabricated "Russia Hacked The DNC" To Justify Spying On Trump

The FISA request to spy on Trump was originally filed in June 2016. The Wikileaks of the DNC hacked emails were released July 22, 2016. The entire “Russia hacked the DNC” story was created to justify DNC spying on Trump before the election.

Look at the timeline:

May 26, Trump reaches enough delegates to unofficially win Republican Presidential nomination.

June 2016, FISA request rejected against Trump.

July 22, 2016 Wikileaks releases the emails against the DNC.

August 2016, DNC claims the emails are Russian propaganda and some are fake with the goal of harming Hillary Clinton’s Presidency.

The media runs with this story, this creates suspicion against Trump to suggest that Russia is trying to influence the election.

October a month before the election, another FISA request is accepted. This time because of “probable cause” no evidence actually needing to be required.

This allows the current federal government to spy on a Presidential candidate a month before the election, one who is a part of the opposing political party ( while Obama himself is actively campaigning with Hillary and the DOJ is working to help Hillary pass her investigation with no issues ).

The plan the Democrats had for the election was to rig it for Hillary by using dirty tactics by the Mainstream Media to destroy Bernie’s chance and to make Trump look bad, and also to potentially spy on him to find negative stories to run in the month lead up to the election. They were probably hoping to leak audio clips of Trump having private conversations saying politically incorrect things, like how they had the hot mic tape of him saying “grab her by the pussy” and used that to find 15+ random women to claim that he sexually assaulted them a few weeks before the election.

A more comprehensive timeline put together by a user a Reddit:

Obama creates office of Chief Technology Officer – Aneesh Chopra ties to Tim Kaine/Terry McAuliffe (DNC Virginia strategy), Todd Park (Healthcare.gov fiasco), Megan Smith (VP Google X)

10 Oct 2012 – Directive 19 (Protect whistleblowers just before election – failsafe?)

==2013== New term. Uranium One, wiretapping (journalists/Merkel/France), slush fund projects, BLM, ISIS rebranded / Syria mobilization, Euromaidan (Ukraine)

2014 – Fancy Bear attacks Germany, Ukraine. (coincidence?)

19 Mar 2015 – Obama appoints David Recordon (Facebook) as White House IT director.

8 April 2015 – Fancy Bear (ISIS fakeout) attacks France. (coincidence?)

16 June 2015 – Trump enters presidential race.

?? June 2016 – FISA request – denied.

7 June 2016 – Final GOP primary.

14 June 2016 – Reported that DNC servers hacked (after “one year” – coincides with Trump entering race – setup begins). Research dossier on Trump stolen, Hillary campaign data untouched. Peskov denies Russian interference.

15 June 2016 – CrowdStrike (Russian expat Dmitri Alperovitch ties to Atlantic Council) blames Fancy Bear(coincidence?)

6 Jul 2016 – Senate bill to revoke Hillary security clearance.

11 Jul 2016 – House bill to revoke Hillary security clearance.

22 Jul 2016 – Wikileaks – Hillary.

7 Oct 2016 – Wikileaks – Podesta. Press release.

9 Oct 2016 – Trump campaign alleges Clinton ties to Russia.

12 Oct 2016 – Putin denies hacking.

15 Oct 2016 – FISA warrant issued.

19 Oct 2016 – Hillary calls Trump a puppet at final presidential debate. (Civilian – who is leaking her information?)

20 Oct 2016 – Esquire details hacking operation.

31 Oct 2016 – FBI: No direct link to Trump.

24 Nov 2016 – Scary Russian trolls! (CTR/Shareblue?)

10 Jan 2017 – Trump intelligence allegations dossier “leaked”. (Dates curious – reports follow damaging press – retaliation?)

11 Jan 2017 – Clapper denies dossier came from IC.

12 Jan 2017 – Obama modifies E.O. 12333. (Another fail-safe?)

Isn’t it amazing how quickly the Mainstream Media ran and accepted the Russian narrative? Almost like they were fed orders for it and didn’t care how no connection to Russia existed.

Previously:
Loretta Lynch’s Final Order Allows The NSA To Give Spying Data To Other Federal Agencies
Hillary Set Up The ‘Russian Hack’ Excuse During The Debates
In 2013 Obama Legalized The Use Of Propaganda On The US Public

 

CIA Paid $600 Million To The Washington Post To Publish Trump Disinformation

 Political  Comments Off on CIA Paid $600 Million To The Washington Post To Publish Trump Disinformation
Mar 022017
 
Washington Post owner, Jeff Bezos, was awarded a $600 million federal contract by the Obama CIA to publish disinformation about Donald Trump.

CIA Paid $600 Million To The Washington Post To Publish Trump Disinformation

Amazon founder Jeff Bezos was tasked with undermining the President Trump via ‘leaked’ CIA documents given to him when he first took over at The Washington Post.

When writing the 1st Amendment to the Constitution, one area of speech the Founders were specifically interested in protecting was that of a free press. They saw the press as a sort of fourth branch of government, one that would keep the “checks and balances” of the other three branches honest.

However, over time the same press that was given protection has eroded into a propaganda machine driven by money and political agendas of those who own the media outlets. They have crawled into bed with the very entities they are to keep in “check” and bust out if corrupted.

As such is the Mainstream Media today and one the American people no longer trust, and rightfully so given what is being exposed in recent years.

The majority of people do not know Amazon founder and CEO Jeff Bezos purchased the Washington Post and is now the sole owner with no editorial board or ethical review committees to oversee the actions of Bezos as a publisher, much less the courage to stand against the new “boss.”

It begs to question: How is Bezos connected to questionable intelligence leaks in recent months?

What does he have to do with the sudden disruption of web services that kept millions from accessing whistle blowing website, WikiLeaks, during its explosive releases of state department cables?

Cables containing inside information revealing corruption within American politics linked to former secretary of state, and presidential candidate, Hillary Clinton.

The majority of Americans do not know ‘leaked” CIA documents to undermine a new president and administration were leaked through the Washington Post first and after Bezos took the helm of “America’s newspaper.”

Much worse and even more suspicious is the majority of the people have not been informed that Bezos landed a $600 million federal contract and by who? The CIA.

The “deal” is for a computing cloud developed by Amazon Web Services (AWS). It also just happens AWS services all 17 agencies within the US intelligence community.

An unholy alliance in which Bezos stands to gain many more millions by pacifying and working with the CIA through his publication The Washington Post. “Leaks” and “information” Bezos will publish without question, without proper verification and journalistic sourcing.

The CIA will now have its own propaganda publication to do whatever it likes in misinforming and manipulating the American people and the voters.

Vital information intentionally withheld from the American people, as Bezos uses the Post to forge pocket lining government contracts while promoting his own personal political agenda.

Is this lack of reporting of the Bezos/CIA partnership by the MSM the result of massive incompetency? Or a very well-organized cover up within the MSM inner circle of four or five elitists who now own six companies that control over 90 percent of MSM outlets?

The same outlets which through diverse company divisions own every television station and newspaper in this country with the exception of very small, weekly community publications and certain Christian networks. Even many of those community weeklies have been scooped up by larger publication divisions.

Are we connecting the dots at each cross-section of intertwining strings holding together this corrupt spider web? A vast interlocking network designed to lure and trap average American citizens into its carefully woven web of manipulation and deceit.

The Washington Post is the most widely known and respected news outlet in the world, reaching more people than any other publication including the NY Times. It has always been the standard in which journalistic ethics are established and adhered to by other publications. It sets the example to be followed by the everyday journalists out there on the beat trying to do their jobs.

By utilizing the internet and social media, the Post has literally millions of subscribers and followers reading and watching online video on a daily basis. It is the media center of the nation’s capital and the eye of the DC political belt.

Control the Washington Post and you control the message; the MSM and the “agenda.”

“The Post is unquestionably the political paper of record in the United States, and how it covers governance sets the agenda for the balance of the news media,” journalism scholar Robert W. McChesney revealed to Altenet.org /a> in a December investigative article.

“Citizens need to know about this conflict of interest in the columns of the Post itself,” he added.

In the same article, a statement released by the Public Institute of Advocacy quoted McChesney as saying:

“If some official enemy of the United States had a comparable situation — say the owner of the dominant newspaper in Caracas was getting $600 million in secretive contracts from the Maduro government — the Post itself would lead the howling chorus impaling that newspaper and that government for making a mockery of a free press. It is time for the Post to take a dose of its own medicine.”

If this alliance between the CIA and Bezos isn’t illegal, then it is certainly unethical and displays a huge conflict of interest while also exposing the corruption existing within the MSM. The main sources of news and information Americans sought and believed, until the rise of alternative media outlets.

Alternative sources of information the MSM bash and attempt daily to discredit as “fake news,” when “fake,” misleading and sometimes right out lies being spread across social media come out of the MSM and pseudo extremist left-wing sites erected simply to misinform and confuse the American voter.

George Soros “Media Matters” machine
Soros Media

Soros Funds A Lot Of These Media Sources

Many Facebook pages and websites that have “popped” up over the past several years whose resources and money are being funded by George Soros’s well oiled “Media Matters” machine. Just one of many “nonprofit” organizations extending from his Open Society Foundation.

Soros also has imbedded ties to many MSM outlets including The New York Times, the Associated Press, NBC and ABC and here it is again, the Washington Post. Readers are urgently encouraged to research Soros, his history and his worldwide organizations.

Altnet also writes, “Amazon’s offer wasn’t the low bid, but it won the CIA contract anyway by offering advanced high-tech ‘cloud’ infrastructure.”

So how is at a time government should be pinching pennies due to the increasing national debt, the CIA passed over lower bidders for the contracted services?

The answer tracks back to the infamous blocking of the WikiLeaks website by Bezos’s company Amazon Web Services (AWS), a service Bezos personally and publicly brags is the most advanced and best high-tech “cloud” infrastructure on the market.

“WikiLeaks was booted from Amazon’s webhosting service AWS. So, at the height of public interest in what WikiLeaks was publishing, readers were unable to access the WikiLeaks website,” reported watchdog group Fair in 2013.

So why did AWS give WikiLeaks the boot? Most likely at the bequest of the CIA, whom Bezos has been doing business with since 2013 when the $600 million contract was awarded to AWS. Bezos also has close ties to the Clintons and backed Hillary in her failed run for the presidency, both in the 2008 primary campaign and in 2016 as the Democrat nominee.

Bezos also publicly voices open contempt for President Trump, and his policies. He recently was behind the Washington challenge to Trump’s 90-day immigration ban and threatened suit himself in an email to his employees, as was reported on this site.

Bezos, without any reference to stock holders input or lack of agreement, said he will put the full resources at Amazon to defeat the policy and implied his mission of taking down President Trump.

The Political Assassination Of General Flynn
michael flynn

Bezos led the charge against General Flynn using his solely owned Washington Post.

It was Bezos’s Washington Post that first leaked documents and led the charge to discredit Trump’s national security advisor cabinet pick. General Michael Flynn was forced to resign due to the unverified information touted in the “leaks.” Flynn was cleared by the FBI of any wrongdoing in those leaks. But the damage was already done.

In recent days, it has been revealed the CIA has full intention of attempting a coup to remove Trump from office, even though “The Donald” was democratically elected by American voters in a free election.

And it appears in the CIA is in conspiracy with Bezos’s plan to use the Washington Post to achieve a mutual goal: to disrupt and destroy President Trump and his administration. A goal that has no regard or concern for national security or the safety and well-being of American citizens.

Any impact on the average citizen, including possible loss of life by terrorist attacks is considered “collateral damage.”

In an exchange of tweets on Feb. 15, John Schindler, former NSA analyst and national security columnist for the Observer answered a question asking what he thought was going on at the NSA right now. Schneider responded, citing a friend in the intelligence community reference to Trump:


Which begs a bigger question than the unethical alliance between the CIA, Bezos and his Washington Post:

Could Trump be impeached? Of is he in danger of befalling the same fate as President Kennedy? Being a previous “anti-establishment” president, Kennedy sought to disengage from the Vietnam conflict and dissolve the Federal Reserve, but was assassinated.

Actions that directly impacted the CIA and wealthy elitists.

 
 
By Donna Kay at Conservative Daily Post.

Huma Abedin’s Emails Confirm HlLLARY Was Complicit In The MURDER OF CHRISTOPHER STEVENS

 Political  Comments Off on Huma Abedin’s Emails Confirm HlLLARY Was Complicit In The MURDER OF CHRISTOPHER STEVENS
Feb 242017
 
Wikileaks – Clinton Was Complicit in the Murder of Ambassador Christopher Stevens

Huma Abedin’s Emails Confirm HlLLARY Was Complicit In The MURDER OF CHRISTOPHER STEVENS

The email links below confirm Hillary knew!

I want to preface this article by stating that this work has been updated 3 times in 10 hours. Information is coming out Wikileaks and other sources faster than any of us can keep up with.

Wikileaks is about to confirm the story that The Common Sense Show told 4 years ago in that Ambassador Christoper Stevens was set up to die because his stories of gun-running, child trafficking and drug-running on behalf of the CIA in order to promote regime change in Libya using terrorists funded by these illegal activities, were leaking out and it was only a few months until the election. Subsequently, Ambassador Stevens had to be silenced. And Petraeus had to be put in a place where he was not forced to testify before Congress because he could not take the 5th before Congress

At the same time, Clinton was broadcasting Stevens whereabouts and she refused to provide the extra protection Stevens was so desperately requesting. Being that Stevens was working for the CIA, then head of the CIA, David Petraeus, would have known about Chris Stevens activities. To protect Obama’s 2012 election, both Stevens and Petraeus had to be gone.

People are asking me how I knew all of this four years ago and I say, “I had a deep cover source from inside one of the military/intelligence services who wanted the real truth to be told. Somebody who knew this nation could not afford to let Clinton ever become President”. Now, I am getting confirmation from Wikileaks and others who have reached the same conclusion I did four years ago.


Dear Mr. Hodges,

This is to inform you that Wikileaks will soon, or has released Clinton emails which will demonstrate the following:

Please note that I have covered the ISIS/Lafarge/Clinton connections very prominently in the past year. This is just more confirmation of what I have already covered.

The above is already appearing on the Internet in several places. It is clear that Putin would be a fool to allow Clinton and her gang of thugs to continue with their plan. Every time Clinton sags in the polls, she starts talking about 9/11. The evidence is beginning to line up that Clinton interests had motive to commit 9/11.  No wonder Clinton tries to blame the Russians for everything, she is the main culprit on the world being brought to the precipice of World War III.


It is a gratifying feeling when the dots start to connect.
The Aaron Klein Revelations

Aaron Klein, the Breitbart Bureau Chief for Jerusalem revealed, in a Breitbart publication dated March 1, 2016, revealed that “the email from April 10th, 2011, the State Department employee, Timmy Davis, forwarded an email to the server by Clinton’s aide, Huma Abedin.” Please note that the time of this revelation, Huma Abedin, was not yet a household name.

The series of emails will eventually have catastrophic consequences for Ambassador Stevens.

“An email containing the whereabouts and plans of murdered U.S. Ambassador Chris Stevens passed through Hillary Clinton’s private server, dispatches released Monday in the final group of messages from Clinton’s emails reveal.”

Below are some examples of the allegations posed by Klein and these are not empty charges as Klein offered as proof, the following emails.

“A March 27, 2011 email released last year was titled, “Chris Stevens mission.” It divulged: “The current game plan is for Mr. Stevens to move no later than Wednesday from Malta to Benghazi. He will stage offshore initially for a one day visit during which he will have meetings with TNC interlocutors and get a sense of the situation on the ground. The goal of this one day trip is for him to lay the groundwork for a stay of up to 30 days.

An April 8, 2011 email was forwarded to Clinton revealing the “security situation in Benghazi remains quiet. Chris Stevens & team are in the hotel, moving only for meetings as required.”

An April 22, 2011 email revealed Stevens was on the road: “I want to let you know about a temporary rotation in Benghazi. TNC Envoy Chris Stevens has been on the road since March 13, when he began his outreach mission, and has been in Benghazi since April 5.”

An April 24, 2011 email has the exact time of a Stevens meeting: “”Stevens will be meeting with MFA in one hour and will make a written request for better security at the hotel and for better security-related coordination. He still feels comfortable in the hotel. They are looking into the idea of moving into a villa, but that is some way off.”

If  later emails are released, I have no doubt, that we will see that Clinton was transmitting Stevens location up until the time of the attack upon the Benghazi compound and this explains why some of these emails are not being released. However, at some point, they will see the light of day.

The release of travel information, in any form, is a felony! Remember, the Stevens travel plans are classified and they came from Clinton’s private server. A casual Law and Order fan could make the causal connections between the release of these emails and Stevens death. This is absolute evidence that Clinton is not only guilty of multiple felonies, she is an accomplice to murder!
 
Source…

Feb 222017
 
John McCain solicited now dead Russian Ambassador for donation to his presidential campaign in 2008

John McCain Asked Russia For Campaign Money During The 2008 Election
John McCain, who once called Russia a bigger threat than terrorism, asked Vitaly Churkin for campaign money during the 2008 election. He was turned down. Maybe THIS is why McCain hates Russia so much?

Isn’t it illegal to solicit campaign donations from foreign governments?

Found this while searching Wikileaks for Russian hacks (spoiler: there aren’t many).

Russian mission On Fundraising Letter from John McCain Election Campaign, 20 Oct 2008

Release date
October 20, 2008

Summary

20 Oct 2008 statement from the Russian Federation to the United states in relation to an alleged letter from the McCain campaign requesting a financial contribution from Russia:

“We have received a letter from Senator John McCain requesting financial contribution to his Presidential campaign.
In this connection we would like to reiterate that Russian officials, the Permanent Mission of the Russian Federation to the United Nations or the Russian Government do not finance political activity in foreign countries.”

Wikileaks staff have verified the authenticity of the document. Obviously the statement is designed to undermine the McCain campaign and is an extremely interesting Russian intervention into US domestic politics. It remains to be seen whether the play, which lacks subtlety, will backfire and generate support for McCain.

According to the document metadata (which can be manipulated, though rarely is), the document was created by “INT10”, underwent two revisions and was saved by “INT9” with a version of word is registered to organization “MID”. Although Wikileaks normally removes metadata, we have not done so in this instance since the document is intended to be public and may be a significant political play by Russian intelligence.

See John McCain fundraising appeal letter to Russian Ambassador Vitaly Churkin, Sep 29 2008‎ for the McCain letter.

Download

File | Torrent | Magnet

John McCain Asked Russia For Campaign Money During The 2008 Election

 
 
H/T Reddit

Feb 202017
 

Swedish Media Admits To Censoring Stories For The Last Five Years On Migrant Crime

The United Nations recently declared that by the year 2030, Sweden would become a Third World country. This is absolutely appalling and this should NEVER be allowed to happen. Not in Sweden, the UK, France, Canada or any other Western nation. Just what will it take for the so-called ‘Leaders’ in the West to come to the obvious realization that if you import Third World refugees in great-enough numbers into your country, then eventually, the Third World is what will become of your own country?

Blinds journalists information and news for not favoring SD? The statement dismissed as tin foil hat theory. But journalists who I am in contact with testifies problems.

Jesper Strömbäck, Professor of Media and Communications, said the other day: “The media would cover up any berries in my judgment, strong features of the conspiracy theory.” (Summary, 12/1). Sometimes opt out of information about news values, he points out.

And it is true generally. Meanwhile, for example Skånska Dagbladets then editor Jan A Johansson, the journalist Björn Hagers book “Party Problem”, if SD acknowledges that data has been omitted to avoid a “hell damage to society”.

The other day I asked the question of social media: “You who worked as / journalists. Have you been part of the editorial board wanted to downplay or avoid substances because ‘can benefit sd’? “Journalists in different ages, men and women, with different backgrounds and from different media, approached him. Those who responded publicly on Twitter gave mostly no answers, they had not encountered it. Those who approached him privately gave a more troubling picture.

A journalist who has conveyed the news on integration and immigration for many years expressed that “this topic is super sensitive.” There is a younger generation who think black and white, according to the person: “If anything the interviewee says complicates the thesis and one’s own worldview you cut it out of the story.” When the journalist himself has let different voices to be heard, it has led to attacks from other journalists. Nowadays, I am very cautious stories, tell the person. “Can not be bothered to have enemies,” is the explanation.

Another journalist that contact has been working on a few different media newsrooms. “Before the last election in 2010, when I remember especially a completely bizarre discussion, the reporters at the coffee machine stood talking about ‘how should we respond to the Sweden Democrats, we can not take them as an ordinary party'” he says. And testify directives from the new boss to “take it easy” when he examines the integration-related topics.

The call to be cautious return. One person has been worshiped be there when asked about problems at an accommodation for unaccompanied youths arrived at the numbers. Another person reported that a senior colleague with strong political views have stopped the story about mess at an asylum accommodation. Others describe a caution with the choice of words, of news or identifying data in order not to promote xenophobia.

A journalist who has worked on several major editorial says that in all workplaces has been a pronounced or unspoken policy not to promote SD and xenophobia. And especially remember the honor murder of Pela Atroshi: “We did not write a line about it.”
These journalists are no foil hats. On the contrary, highlights several that most journalists and news executives are honest people. Yet the problem is there.

The country’s media newsrooms need to consider a lap: we shall be pronounced against SD? If not; How do we ensure that journalism was shot? It is easy to shout “conspiracy theory” to any criticism. The harder it is to see their own role in that confidence in the media falls, while the SD sites celebrating victory after victory.

Source…