Archive | C.I.A

Your Daily Reminder: The War of Terror is A CIA-Sponsored PsyOp

NOVANEWS

Image result for SAUDI KING CARTOON

Corbett 

While people on both sides of the phoney left/right divide squabble over terrorist boogeymen and Trump’s CIA chief gives Saudi Arabia an award for “counter”terrorism, everyone has lost sight of the bigger picture:

The blithering morons who are the face of international terror are aided, funded, controlled and handled by the intelligence agencies. It is all part of the con to get you scared of your own shadow so the terror-industrial complex can laugh all the way to the bank. Today James breaks down the latest chapter in this never-ending psy-op saga.

SHOW NOTES
CIA honors Saudi Crown Prince for efforts against terrorism
Episode 279 – Who Is Really Behind the Syrian War?
Debunking the 28 Pages
Executive Order: “Protecting” the Nation From Foreign (CIA-sponsored) Terrorist Entry Into The United States
Trump’s Homeland Security Team Likely to Emphasize Facial Recognition and Biometric Surveillance
Chertoff pimps his company’s body scanners in WaPo
Beware the Terror Industrial Complex
Kennedy Admits the Intel Agencies Allowed the Underwear Bomber on the Plane
Interview 1019 – Michael Springmann on Visas for Terrorists

Posted in USA, C.I.A, Saudi ArabiaComments Off on Your Daily Reminder: The War of Terror is A CIA-Sponsored PsyOp

What Is the CIA Hack All About?

NOVANEWS

The danger lies in what might be coming next

Image result for CIA Hack CARTOON

By Philip Giraldi • Unz Review 

The WikiLeaks exposure of thousands of documents relating to the Central Intelligence Agency’s (CIA) hacking program, which was expanded dramatically under President Barack Obama between 2013 and 2016, has created something of a panic in the users of cell phones, online computers and even for smart television viewers. The documents describe “more than a thousand hacking systems, trojans, viruses and other ‘weaponized’ malware” and one document even identifies attempts to enable CIA controllers to take control of automobiles that have “On Star” or similar satellite interactive features.

According to analysts who have gone through the documents, any electronic device that is connected to the internet is reported to be vulnerable to being taken over and “weaponized,” manipulated through its microphone or camera function even if it appears to be turned off. Apple, Google, Android and Microsoft products were among the technologies that were targeted, with the security systems being constantly probed for vulnerabilities. When a flaw was discovered it was described as “zero day” because the user would have zero time to react to the detection and exploitation of the vulnerability.

And they are indeed everywhere. Ron Paul has described a woman’s test on the Amazon marketed interactive voice controlled device called Alexa, asking it if it were reporting to the CIA. Alexa, which allegedly cannot tell a lie, refused to answer.

According to Wikipedia, “Alexa is an intelligent personal assistant developed by Amazon Lab126, made popular by the Amazon Echo. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, and other real time information.” One reviewer observed “In a good but scary feature, Amazon Echo can learn a person’s habits over time. It will get used to the way a person talks, his/her habits and routines and will save all the data in the cloud.”

Alexa demonstrates that CIA and NSA intrusion into the lives of ordinary people is not unique. In the cyber-sphere there are many predators. Amazon has apparently run special sales to get Alexa devices into as many homes as possible, presumably for commercial reasons, to have a machine in one’s home that will eventually replace the cookies on computers that collect information on what people are interested in buying. The company’s president Jeff Bezos also recently completed a deal worth $600 million for Amazon to provide cloud hosting services for the Agency. And there are, of course, two clear conflicts of interest in that deal as Bezos is selling a device that can be hacked by the government while he also owns The Washington Post newspaper, which, at least in theory, is supposed to be keeping an eye on the CIA.

But spying for profit and spying by the government are two different things and the WikiLeaks revelations suggest that the CIA has had a massive program of cyberespionage running for a number of years, even having created a major new division to support the effort called the Directorate for Digital Innovation, with an operation component called the Center for Cyber Intelligence. Media reports also suggest that a major hub for the operation was the American Consulate General in Frankfurt Germany, where the Agency established a base of operations.

First of all, it is necessary to make an attempt to understand why the CIA believes it needs to have the capability to get inside the operating systems of phones and other devices which rely on the internet. It should be pointed out that the United States government already has highly developed capabilities to get at phones and other electronics. It is indeed the principal raison d’etre of the National Security Agency (NSA) to do so and the FBI also does so when it initiates wiretaps during criminal and national security investigations.

Beyond that, since the NSA basically collects all electronic communications in the United States as well as more of the same fairly aggressively overseas, it would seem to be redundant for the CIA to be doing the same thing. The CIA rationale is that it has a different mission than the NSA. It exists to conduct espionage against foreign intelligence targets, which frequently requires being able to tap into their personal phones or other electronic devices by exploiting vulnerabilities in the operating systems. As the targets would be either sources or even prospective agents, the Agency would have to protect their identity in the highly compartmented world of intelligence, making outsourcing to NSA problematical.

This need to develop an independent capability led to the development of new technologies by the CIA working with its British counterparts. There were apparently successful efforts to target Samsung “smart” televisions, which would use their speakers to record conversations even when the set was turned off. The project was called “Weeping Angel,” and other hacking programs were called “Brutal Kangaroo,” “Assassin,” “Hammer Drill,” “Swindle,” “Fine Dining” and “Cutthroat,” demonstrating that government bureaucrats sometimes possess a dark sense of humor.

Being able to enter one’s home through a television would be considered a major success in the intelligence world. And the ability to access cell phones at source through obtaining full control of the operating system rather than through their transmissions means that any security system will be ineffective because the snoopers will be able to intrude and hear the conversation as it is spoken before any encryption is applied. CIA and its British allies were reportedly able to take control of either Android or i-Phones through vulnerabilities in their security systems by using their attack technologies.

WikiLeaks claims to have 8,761 documents detailing efforts to circumvent the security features on a broad range of electronic devices to enable them to be remotely tapped, the information having apparently been passed to WikiLeaks by a disgruntled government contractor, though the Russians are perhaps inevitably also being blamed. The U.S. government has apparently been aware of the theft of the information for the past year and one presumes it has both done damage control and is searching for the miscreant involved. Also, there have been security fixes on both Apple and Android phones in the past year that might well have rendered the attack technologies no longer effective.

So many will shrug and wonder what the big deal is. So the CIA is tapping into the electronics of suspected bad guys overseas. Isn’t that what it’s supposed to do? That question has to be answered with another question: How do we know if that is all the CIA is doing? Technology that can attack and take control of a telephone or television or computer overseas can also do the same inside the United States. And the Agency can always plausibly claim that a connection with a suspect overseas leads back to the U.S. to enable working on related targets on this side of the Atlantic.

Another issue is the possibility to engage in mischief, with potentially serious consequences. The WikiLeaks documents suggest that the CIA program called UMBRAGE had been able to acquire malware signatures and attack codes from Russia, China, Iran and other places. It does that so it can confuse detection systems and preserve “plausible denial” if its intrusion gets caught, disguising its own efforts as Russian or Chinese to cast the blame on the intelligence services of those countries. It has been alleged that the hack of the Democratic National Committee computers was carried out by Moscow employed surrogates and part of the evidence produced was signature malware that had left “fingerprints” linked to Russian military intelligence in Ukraine. What if that hack was actually done by the CIA for domestic political reasons?

Critics have also pointed out that President Obama in 2014 had come to an agreement with major communications industry executives to share with manufacturers information regarding the vulnerabilities in their systems so they could be addressed and made secure. This would have benefited both the industry and the general public. The agreement was obviously ignored in the CIA case and is just another sign that one cannot trust the government.

However, the real downside regarding the CIA hacking is something that might not even have occurred yet. It is an unfortunate reality that government spying operations largely lack regulation, oversight or any effective supervision by Congress or anyone else outside the agencies themselves. Even if knowledge about communications vulnerabilities has not been employed illegally against American targets or to mislead regarding domestic hacks, the potential to use those capabilities once they are in place will likely prove too hard to resist. As such, no home or work environment will any more be considered a safe place and it is potentially, if not actually, the greatest existing threat to Americans’ few remaining liberties.

Posted in USA, C.I.AComments Off on What Is the CIA Hack All About?

A CIA Cyber False Flag

NOVANEWS

Image result for CIA LOGO

By Federico PIERACCINI | Strategic Culture Foundation 

New revelations from Wikileaks’ ‘Vault 7’ leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.

Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit — most of which are American, British or Israeli — give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon’s Cloud Service), cloud provider for the CIA, whose owner, Jeff Bezos, is also the owner of The Washington Post. It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.

While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia. In terms of news, the Wikileaks revelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.

Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta’s email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton’s presidential campaign. In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media. The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.

Now what is revealed through Wikileaks’ publications in Vault 7 is the ability of a subsection of the CIA, known as Umbrage, to use malware, viruses, trojans and other cyber tools for their own geopolitical purposes. The CIA’s Umbrage collects, analyzes and then employs software created variously from foreign security agencies, cyber mafia, private companies, and hackers in general. These revelations become particularly relevant when we consider the consequences of these actions. The main example can be seen in the hacking of the DNC. For now, what we know is that the hacking – if it ever occurred – is of Russian origin. This does not mean at all that the Kremlin directed it. It could actually be very much the opposite, its responsibility falling into the category of a cyber false-flag. One thing is for sure: all 16 US intelligence agencies are of the view that “the Russians did it”. That said, the methods used to hack vulnerabilities cannot be revealed, so as to limit the spread of easily reusable exploits on systems, such as the one that hosted the DNC server. It is a great excuse for avoiding the revelation of any evidence at all.

So, with little information available, independent citizens are left with very little information on which to reliably form an opinion on what happened. There is no evidence, and no evidence will be provided to the media. For politicians and so-called mainstream journalists, this is an acceptable state of affairs. What we are left with instead is blind faith in the 16 spy agencies. The problem for them is that what WikiLeaks revealed with Vault 7 exposes a scenario that looks more likely than not: a cyber false-flag carried out by the Central Intelligence Agency using engineered malware and viruses made in Russia and hypothetically linking them back to hacking networks in Russia. In all likelihood, it looks like the Democrats’ server was hacked by the CIA with the clear objective of leaving Russian fingerprints and obvious traces to be picked up by other US agencies.

In this way, it becomes easier to explain the unique views of all 16 spy agencies. Thus, it is far more likely that the CIA intentionally left fake Russian fingerprints all over the DNC server, thereby misleading other intelligence agencies in promoting the narrative that Russia hacked the DNC server. Of course the objective was to create a false narrative that could immediately be picked up by the media, creating even more hysteria surrounding any rapprochement with Russia.

Diversification of computer systems.

The revelations contained in the Wikileaks vault 7 (less than 1 % of the total data in Wikileaks’ possession has been released to date) have caused a stir, especially by exposing the astonishing complicity between hardware and software manufacturers, often intentionally creating backdoors in their products to allow access by the CIA and NSA. In today’s digital environment, all essential services rely on computer technology and connectivity. These revelations are yet more reason why countries targeted by Washington, like China, Russia, Iran and North Korea, should get rid of European and American products and invest in reducing technological dependence on American products in particular.

The People’s Republic has already started down this track, with the replacement of many network devices with local vendors like Huawei in order to avoid the type of interference revealed by Snowden. Russia has been doing the same in terms of software, even laying the groundwork to launch of its own operating system, abandoning American and European systems. In North Korea, this idea was already put into practice years ago and is an excellent tool for deterrence for external interference. In more than one computer security conference, US experts have praised the capabilities of the DPRK to isolate its Internet network from the rest of the world, allowing them to have strong safety mechanisms. Often, the only access route to the DPRK systems are through the People’s Republic of China, not the easiest way for the CIA or NSA to infiltrate a protected computer network.

An important aspect of the world in which we live today involves information security, something all nations have to deal with. At the moment, we still live in a world in which the realization of the danger and effect of hacking attacks are not apparent to many. On the other hand, militarily speaking, the diversification and rationalization of critical equipment in terms of networks and operability (smartphones, laptops, etc) has already produced strong growth in non-American and European manufacturers, with the aim of making their systems more secure.

This strengthening of technology also produces deleterious consequences, such as the need for intelligence agencies to be able to prevent the spread of data encryption so as to always enjoy access to any desired information. The birth of the Tor protocol, the deployment of Bitcoin, and apps that are more and more encrypted (although the WikiLeaks documents have shown that the collection of information takes place on the device before the information is encrypted) are all responses to an exponential increase in the invasion of privacy by federal or American government entities.

We live in a world that has an enormous dependence on the Internet and computer technology. The CIA over the years has focused on the ability to make sure vulnerable systems are exploited as well as seeking out major security flaws in consumer products without disclosing this to vendors, thereby taking advantage of these security gaps and leaving all consumers with a potential lack of security. Slowly, thanks to the work and courage of people like Snowden and Assange, the world is beginning to understand how important it is to keep personal data under control and prevent access to it by third parties, especially if they are state actors. In the case of national security, the issue is expanded exponentially by the need to protect key and vital infrastructure, considering how many critical services operate via the Internet and rely on computing devices.

The wars of the future will have a strong technological basis, and it is no coincidence that many armed forces, primarily the Russian and Chinese, have opted in recent years toward training troops, and conducting operations, not completely relying on connectivity. No one can deny that in the event of a large-scale conflict, connectivity is far from guaranteed. One of the major goals of competing nations is to penetrate the military security systems of rival nations and be able to disarm the internal networks that operate major systems of defense and attack.

The Wikileaks revelations are yet another confirmation of how important it is to break the technological unipolar moment, if it may be dubbed this way, especially for nations targeted by the United States. Currently Washington dictates the technological capacities of the private and government sectors of Europe and America, steering their development, timing and methods to suit its own interests. It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure.

Posted in C.I.A, MediaComments Off on A CIA Cyber False Flag

CIA Trying to Hack Cars for ‘Undetectable Assassinations’

NOVANEWS
Image result for CIA Hack Cars CARTOON

In the explosive “Vault 7” CIA secrets published by WikiLeaks on Tuesday, the organization has warned that the CIA, among a myriad of other intrusive exploits, has been investigating ways to hack and manipulate the control systems of cars and trucks for use in covert operations.

According to WikiLeaks, the CIA’s interest in hacking vehicles is not specified, but could be used in sinister ways, including assassinations.

“As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks,” WikiLeaks said in a statement. “The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Many current vehicles are now mainly controlled by computer systems — including brake control, air bags, acceleration, steering, door locks, and other vital systems.

In 2014, hackers Charlie Miller and Chris Valasek using their laptops while in the car, took over a Jeep Grand Cherokee driven by a reporter for Wired, as they were traveling on the highway. The demonstration was shocking, and lead to the recall of 1.4 million vehicles. The previous year, hackers compromised a Ford Escape and a Toyota Prius, while sitting in the backseat.

The vehicle hacking reports were contained in the first batch of CIA leaks, titled “Year Zero.” Wikileaks published 8,761 documents and files which they claim are from the CIA’s Center for Cyber Intelligence in Langley, Virginia.

WikiLeaks has a 100-percent track record for publishing authentic documents.

NSA whistleblower Edward Snowden has also chimed in on the issue, tweeting, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

Posted in USA, C.I.AComments Off on CIA Trying to Hack Cars for ‘Undetectable Assassinations’

Russia to blame for ‘every civilian death’ in Syria, Zionist Fallon says

NOVANEWS
Image result for Michael Fallon CARTOON

British Defense Secretary Michael Fallon has accused Russia of being complicit in the ongoing bloodshed in Syria, saying Moscow is to blame for “every civilian death” in a recent suspected chemical attack in the Arab country.

Moscow is responsible “by proxy” for the deaths of civilians as the “principle backer” of the Syrian government, Fallon told British media.

Fallon further accused Russia of not doing enough to stop the conflict that has been raging on since 2011.

“Someone who uses barrel bombs and chemicals to kill his own people simply cannot be the future leader of Syria,” he said of President Bashar al-Assad.

The defense secretary also voiced his support for the US missile strikes that hit an airbase and surrounding villages in the western province of Homs in the early hours of Friday.

On President Donald Trump’s personal order, the US military launched 59 cruise missiles on al-Shayrat airfield in Homs. Trump said the attack was in response to “the Syrian government’s recent chemical attack in Idlib province.”

“By sending Tomahawk missiles to attack the airfield, aeroplane and equipment believed to be involved, it (the US) has sent a strong signal to the Syrian regime to think twice before using gas in the future,” Fallon said.

The remarks came as British Foreign Secretary Boris Johnson cancelled a trip to Russia citing a fundamental change to the situation in Syria.

The visit, on Moscow’s invitation, would have been the first by a top British diplomat in the last five years.

Reports suggest that Johnson will instead work with his American counterpart, Rex Tillerson, on a joint plan to demand Moscow withdraw military support for Damascus.

According to the Kremlin, Syrian jets had struck a terrorist warehouse in Idlib that contained toxic chemicals, leading to a gas leak in the area. More than 80 people were killed in Tuesday’s incident.

Damascus, which categorically denied responsibility for the suspected chemical attack, slammed the missile attack by the US, calling it a clear sign of Washington’s support for terrorism.

The Syrian government also vowed to intensify operations against foreign-backed militants in the country.

The US attack has sparked angry reactions from Russia and several Middle Eastern countries including Iran.

European Union foreign policy chief, Federica Mogherini, said the missile strike was not within the framework of the United Nations.

Posted in USA, C.I.A, Russia, SyriaComments Off on Russia to blame for ‘every civilian death’ in Syria, Zionist Fallon says

Where Was CIA’s Pompeo on Syria?

NOVANEWS

President Trump meeting with his advisers at his estate in Mar-a-Lago on April 6, 2017
By Robert Parry | Consortium News 

There is a dark mystery behind the White House-released photo showing President Trump and more than a dozen advisers meeting at his estate in Mar-a-Lago after his decision to strike Syria with Tomahawk missiles: Where is CIA Director Mike Pompeo and other top intelligence officials?

Before the photo was released on Friday, a source told me that Pompeo had personally briefed Trump on April 6 about the CIA’s belief that Syrian President Bashar al-Assad was likely not responsible for the lethal poison-gas incident in northern Syria two days earlier — and thus Pompeo was excluded from the larger meeting as Trump reached a contrary decision.

At the time, I found the information dubious since Trump, Secretary of State Rex Tillerson and other senior U.S. officials were declaring quite confidently that Assad was at fault. Given that apparent confidence, I assumed that Pompeo and the CIA must have signed off on the conclusion of Assad’s guilt even though I knew that some U.S. intelligence analysts had contrary opinions, that they viewed the incident as either an accidental release of chemicals or an intentional ploy by Al Qaeda rebels to sucker the U.S. into attacking Syria.

As strange as the Trump administration has been in its early months, it was hard for me to believe that Trump would have listened to the CIA’s views and then shooed the director away from the larger meeting before launching a military strike against a country not threatening America.

After the strike against Syria by 59 Tomahawk missiles, which Syrian officials said killed seven people including four children, Trump gave a speech to the American people declaring flatly:

“On Tuesday, Syrian dictator Bashar al-Assad launched a horrible chemical weapons attack on innocent civilians. Using a deadly nerve agent, Assad choked out the lives of helpless men, women, and children. It was a slow and brutal death for so many. Even beautiful babies were cruelly murdered in this very barbaric attack. No child of God should ever suffer such horror.”

As much as Trump stood to benefit politically by acting aggressively in attacking Syria — and thus winning praise even from his harshest critics — the idea that he would ignore the views of the U.S. intelligence community on an issue of war or peace was something that I found hard to believe.

So, I put aside what I had heard from the source about the discordant Pompeo-Trump meeting as the sort of tidbit that may come from someone who lacks first-hand knowledge and doesn’t get all the details right.

After all, in almost every similar situation that I had covered over decades, the CIA Director or the Director of National Intelligence has played a prominent role in decisions that depend heavily on the intelligence community’s assessments and actions.

For instance, in the famous photo of President Obama and his team waiting out the results of the 2011 raid to kill Al Qaeda leader Osama bin Laden, CIA Director Leon Panetta is the one on the conference screen that everyone is looking at.

Even when the U.S. government is presenting false information, such as Secretary of State Colin Powell’s 2003 speech laying out the bogus evidence of Iraq hiding WMDs, CIA Director George Tenet was seated behind Powell to lend credibility to the falsehoods.

At the Table

But in the photo of Trump and his advisers, no one from the intelligence community is in the frame. You see Trump, Secretary of State Tillerson, National Security Adviser H.R. McMaster, White House chief of staff Reince Priebus, strategic adviser Steve Bannon, son-in-law Jared Kushner and a variety of other officials, including some economic advisers who were at Mar-a-Lago in Florida for the meeting with Chinese President Xi Jinping.

However, you don’t see Pompeo or Director of National Intelligence Dan Coats or any other intelligence official. Even The New York Times noted the oddity in its Saturday editions, writing: “If there were C.I.A. and other intelligence briefers around, … they are not in the picture.”

That made me wonder whether perhaps my original source did know something. The claim was that CIA Director Pompeo had briefed Trump personally on the analysts’ assessment that Assad’s forces were not responsible, but – then with Pompeo sidelined – Trump conveyed his own version of the intelligence to his senior staff.

In other words, the other officials didn’t get the direct word from Pompeo but rather received a second-hand account from the President, the source said. Did Trump choose to rely on the smug certainty from the TV shows and the mainstream news media that Assad was guilty, rather than the contrary view of U.S. intelligence analysts?

After the attack, Secretary of State Tillerson, who is not an institutional intelligence official and has little experience with the subtleties of intelligence, was the one to claim that the U.S. intelligence community assessed with a “high degree of confidence” that the Syrian government had dropped a poison gas bomb on civilians in Idlib province.

While Tillerson’s comment meshed with Official Washington’s hastily formed groupthink of Assad’s guilt, it is hard to believe that CIA analysts would have settled on such a firm conclusion so quickly, especially given the remote location of the incident and the fact that the initial information was coming from pro-rebel (or Al Qaeda) sources.

Thus, a serious question arises whether President Trump did receive that “high degree of confidence” assessment from the intelligence community or whether he shunted Pompeo aside to eliminate an obstacle to his desire to launch the April 6 rocket attack.

If so, such a dangerous deception more than anything else we’ve seen in the first two-plus months of the Trump administration would be grounds for impeachment – ignoring the opinion of the U.S. intelligence community so the President could carry out a politically popular (albeit illegal) missile strike that killed Syrians.

 

Posted in C.I.A, SyriaComments Off on Where Was CIA’s Pompeo on Syria?

How the CIA Plants News Stories in the Media ‘VIDEO’

NOVANEWS

Image result for CIA MEDIA CARTOON

Boiling Frogs Post | September 30, 2011

It is no longer disputed that the CIA has maintained an extensive and ongoing relationship with news organizations and journalists, and multiple, specific acts of media manipulation have now been documented. But as long as the public continues to ignore the influence of intelligence agencies in shaping or even fabricating news stories, the agency will continue to be able to set the policy that drives the American war machine at will.

TRANSCRIPT AND SOURCES: https://www.corbettreport.com/?p=22238

 

Posted in C.I.A, MediaComments Off on How the CIA Plants News Stories in the Media ‘VIDEO’

Idlib chemical attack: A sign no change of policy is on the horizon

NOVANEWS
Image result for SYRIA ISIS  chemical attack CARTOON
By Kit | OffGuardian 

The alleged chemical attack, reported yesterday, is the latest in a series of atrocities notionally carried out by the Syrian government (“The Regime”, in the partisan parlance of the press). There has not been time, as yet, to fully examine and analyse all the evidence – the claims and counter claims, the photographs and videos – but it would be a massive mistake to view it in a vacuum.

First, the situation on the ground needs to be considered. The Syrian government – with assistance from Iran and the Russian Air Force, have been making steady progress for months. Aleppo has fallen. Palmyra was retaken. The rebels are losing. So cui bono? What good does dropping chemical weapons on children do Assad, at this point? It is both strategically pointless, and a crushing blow to his international image. It would serve no purpose, unless he’s a comic-book style villain intent on being cruel for cruelty’s sake – and they don’t exist outside of cinema or the American press. Conversely, it would make all the sense in the world for cornered zealots and mercs to try to disrupt the upcoming talks (from which they are excluded).

Second, the timing. Much like a previous “chemical attack” (and subsequent BBC Panorama documentary) came on the eve of a commons vote on military intervention in Syria, this attack comes at a key moment. In two days there is a meeting in Brussels on the Syria peace process, and the future of the country. This attack will allow Western leaders – especially the European voices, increasingly separate from the US on this issue – to ride an artificial high-horse into those proceedings. Deals can be scuppered and progress refused in the wake of such “atrocities”.

Third, we have seen this all before. There was the chemical attack in Ghouta, initially pinned on the government (and still unquestioningly attributed to them in the MSM), that was revealed to be carried out by rebels. there was also the aforementioned napalm/chemical attack on a school – thoroughly debunked by Robert Stuart. We have seen the same girl rescued three different times by the White Helmets, and seen people in Egypt arrested for faking footage of bombings. The “last hospital in Aleppo” was knocked down everyday for a month, and the last doctors slaughtered bi-weekly. There is no reason, as yet, to think this is not just more of the same.

This is in fine tradition of media manipulation – from filming people on the outside of a fence and pretending they’re inside, to moving bodies for a better photograph, to deliberately removing an image’s context, and lying about it. Events are ignored, twisted, exaggerated and outright fabricated in order to push an agenda. Accordance with reality is immaterial to the process, and coincidental when it occurs.

Real or not, false flag or not – No one can deny convenience of the timing. Given the conflict the UK/EU find themselves in with the new US administration re: Syria. During the campaign Trump, unlike Clinton, totally refused to countenance the idea of no-fly zones or any kind of American/NATO backed military action against Syria and their Russian/Iranian allies. The last few weeks have seen even a softening of America’s “Assad must go” mantra. Rex Tillerson, speaking in Turkey last week, said:

I think the… longer term status of president Assad will be decided by the Syrian people,”

And the American ambassador to the UN added:

You pick and choose your battles and when we’re looking at this, it’s about changing up priorities and our priority is no longer to sit there and focus on getting Assad out.”

Though she did later clarify these remarks, after being named-and-shamed in the media.

John McCain called Tillerson’s words “one of the more unusual statements I have ever heard”, stating it would be ridiculous to let Syrians decide the fate of Syrian government (probably because they would choose wrong).

The press, of course, have not referenced any of this. They continue to cite the partisan White Helmets and completely discredited “Syrian observatory for Human Rights” as if they are reliable sources. They continue to assert gossip and rumor as if it were fact. They continue to lie, but give themselves just enough room to manoeuvre should their lies be exposed.

The Guardian view on…, one of the Guardian’s anonymous editorials (that definitely don’t come straight from GCHQ, you cynics), is a classic example. The headline reads:

The Guardian view on Syria: Assad knows he acts with impunity

A sharp, hard-edged, statement of absolute certitude… and the only sentence of conviction in the whole piece. The rest is littered with uncertain, selective language. Weasel-words and guesses. I have added the emphasis:

Tuesday’s attack in rebel-held Idlib province has forced a reaction: it is one of the worst suspected chemical attacks in the six-year war

the symptoms suggest the use of a nerve agent, probably sarin

ascertaining the agents used, by whom, is always difficult – particularly given the problems experts will face in accessing the site.

The suspicion is that Tuesday’s strike, like another suspected sarin attack which killed 93 people in eastern Hama in December,

Some have already drawn a link between what seems to be the use of a more deadly agent and the US shift on Syria

That’s an awful lot of “seems” and “suspecteds” to cram into 700 words. It’s a suspected attack, that seems like it might be similar to other suspected attacks, which might have happened. As of right now, it appears, we don’t who attacked, how they attacked, what they attacked with or – indeed – if anyone attacked anything at all.

Nevertheless, the nameless and completely non-partisan and objective author reassures us that:

Nonetheless, the evidence so far points in one direction,

… he just neglects to mention exactly what that evidence is, or tell us where we can find it.

Just hours later we are treated to a longer variation on the exact-same theme, this time the author doesn’t feel ashamed to put his name to it… he probably should be. But years of writing about the Guardian teaches you that Jonathan Freedland is never ashamed of putting his name to anything.

Let’s not even condemn these attacks any more – because our condemnations ring so hollow.

… he says, before condemning the attacks – at interminable length and in trite manipulative language. That these condemnations “ring hollow” might be the only honest words in the article. The level of selective blindness, historical dishonesty, and flat-out hypocrisy is astounding. Even for him,

Assad has himself broken international law, indeed broken a set of precious, century-old conventions and agreements that ban chemical weapons.

… he says, as if a) It was a proven fact and b) It was the only example. No mention of American use of depleted Uranium, Agent Orange or napalm is made. No mention of Israeli White Phosphorus or of the cluster bombs we used in Iraq, and sold to Saudi Arabia to be used on Yemeni civilians. The use of any and all of those substances is illegal under International law. America and Israel cannot be charged with a breach of The Geneva Convention, of course, because they have never ratified protocols I and II, outlawing the targeting of civilians and infrastructure and banning certain weapons.

We are all too aware of the costs of action. But the dead of Khan Sheikhoun force us to make another calculation. They force us to see that inaction too can exact a terrible price.

This could be a straight copy-and-paste job from his many articles on Libya. He made the same arguments back then, and must take partial responsibility for post-apocalyptic wasteland that he (and his colleagues in the media) helped to create. Libya is destroyed, he knows this, and if he could excuse or downplay his role in that destruction… he would do so. To ignore it, and employ the same reasoning to encourage the same fate to yet another Middle-Eastern country, displays a callousness and vanity that belies is saccharine concern for “values”.

However, no amount of faux-moral agonising and dishonesty will ever trump this:

For more than a decade, we have rightly weighed the grave consequences of the 2003 invasion of Iraq, counting the toll in human suffering.

The tone mirrors the same tone ever-taken by members of the Western press when it comes to Iraq. “Our consciences are agony”, they scream at us. As if Iraq was all a tragic accident, fuelled by the fervor of our best intentions and naivety of our governments. They will never address the truth of it – that it was a cynical and brutal war of conquest, cheered on a by braying, controlled media, with more regard for their appearance of virtue, and their bank balances, than any idea of objective truth.

Now, the lame self-flagellation is one thing, but that it should appear alongside this:

Assad’s impunity is, at this very moment, being noted and filed away by the world’s most brutal regimes: the precedent is being set. This is what you can get away with.

… is quite another. The world is VERY aware “what you can get away with” in international law…and it’s not 70 dead in what “seems” like a gas attack. What you can “get away with” is walling up millions of people in a giant ghetto, and cutting off their water and power supply. It’s dropping carcinogens on villages, that give babies tumors 50 years later. It’s illegal sanctions that kill 500,000 children but are “worth it”.

“what you can get away with”, as the author so po-facedly admits, is the invasion of Iraq. An illegal war, a million dead, an ancient seat of civilisation reduced to a glass crater. Was anyone fired? Did anyone resign in disgrace? Has anyone faced charges in the Hague. No, the perpetrators walk free. They collect paychecks from the boards of the most powerful companies in the world, and are given column inches in the Guardian when ever they want them.

In terms of making an actual argument, he hits the exact same talking points as The Guardian view, uses the exact same phrases… and produces the exact same amount of evidence:

… we almost certainly know who did it. Every sign points to the regime of Bashar al-Assad.

He doesn’t say what these “signs” are. Or link to where we can see them.

We know that the poison spread after warplanes dropped bombs

We “know” no such thing. That’s just what the White Helmets said. The White Helmets are paid by the governments of several countries… including the US and UK. They are completely discredited as a source. But this article isn’t about making an evidence-based case, it is about harnessing created public outrage in order to further a specific political agenda.

So, what is the agenda? Well, it won’t be full-blown war in Syria. Number 10 was very quick to – shall we say – shoot-down that idea. It won’t be any kind of overt NATO or American backed intervention… if the PTB had wanted that, they would have pushed harder for a Clinton victory. And Freedland’s reference to Anne-Marie Slaughter’s suggestion is laughable:

Anne-Marie Slaughter, formerly of the Obama administration, suggests a single strike that would crater, say, a runway used by Assad’s warplanes – not an invasion, not a full-scale military operation, but some way of punishing Syria for what it has done.

No, the agenda being pushed here is two-fold, firstly an attack on the UN and its apparent impotence, and secondly a pre-emptive defense of the status quo.

To deal with the first point, the article launches a sidelong attack on the UN Security Council, most specifically the veto power:

In February, the UN security council considered imposing sanctions over the use of chemical weapons. Russia vetoed it, of course: it would never want to stay the hand of its murderous chum. But China vetoed it too.

This is not new material for the Guardian, they have been attacking the UN veto for years now – as have other liberal papers and news outlets. You don’t need to be a genius to understand the drive to undermine the only regulatory body that can put a hold on neo-liberal imperialism. But for the UNSC, Iraq would have been so much easier and Syria would have been levelled by now.

The second point is more subtle. For years the CIA et al have been seeking to remove Assad from government, most openly through supplying arms and money to the “moderate opposition” in order to wage a proxy war. Trump’s election, and his public undermining of the intelligence agencies, poses a threat to this on-going plan.

Now that this chemical attack has happened, of course, Trump’s administration can be condemned for being “soft”. Now, we can call on Trump and his cabinet to “act”… and when they refuse to change their policy, rightfully fearful of a conflict with Russia, they will be further derided and undermined in the press as “Russian agents” who are “easy on tyrants”.

All the while, the covert operations carried out by American and European alphabet agencies all over Syria will continue.

When the State Dept., the CIA and all their co-members of America’s (totally imaginary) “deep state” completely disregard the orders of their Commander-in-Chief, and continue to pursue their own agenda – continue to supply arms and funding to their mercenaries and proxies – they will be applauded in the press for their “bravery” and “resolution”.

We will be encouraged to be “thankful” that the mechanics of democracy and freedom cannot be impeded by the election of an autocratic buffoon. We will be told, with a bright smile, that our choice of leadership means literally nothing as it pertains to foreign policy.

It will be thrown in our faces that our elected officials have no real power, and we will be told to applaud the death of democracy… in the name of freedom.

Posted in C.I.A, SyriaComments Off on Idlib chemical attack: A sign no change of policy is on the horizon

North’s Weapons Supplier Tied to Terrorist Abu Nidal

NOVANEWS

Image result for Abu Nidal CARTOON

MICHAEL WINES 
 l atimes

Lt. Col. Oliver L. North’s secret arms network supplied Nicaraguan rebels with $1.5 million in weapons bought in 1985 and 1986 from a Syrian smuggler tied to notorious terrorist Abu Nidal, according to records released by the congressional Iran- contra panels.

The weapons, apparently of Polish origin, were purchased from Manzer Kassar, a Damascus drug smuggler and arms merchant. The 42-year-old Kassar and his three brothers have built a multimillion-dollar empire on military deals in Eastern and Western Europe.

Administration officials, speaking on condition that they not be named, said Kassar has “clearly established” business links to the Abu Nidal terrorist ring, responsible for a November, 1985, Egyptair hijacking in which 57 people died and for December, 1985, massacres in the Rome and Vienna airports.

Image result for Oliver L. North ABU NIDAL CARTOON

Lt. Col. Oliver L. North

The congressional records point up a particular irony for North, who dramatically invoked a death threat by Abu Nidal in testimony last week to explain his acceptance of a $16,000 security system financed with cash from North’s network. Lebanese terrorists claiming to represent Abu Nidal reportedly placed North’s name on an assassination list last year, apparently because of his work on U.S. counter terrorism policies.

Moreover, the records support North’s testimony that retired Air Force Maj. Gen. Richard V. Secord and his associates sought to turn their secret “enterprise” into a major international operation, one congressional source said.

“It just shows you that what happens is these operations tend to degenerate down to the lowest goddamn levels,” the source said. “These guys who are in international (weapons) businesses don’t set moral standards. That’s the first thing you have to learn.”

Congressional sources familiar with the records said it is uncertain whether North knew the contra arms were purchased from an associate of Abu Nidal. North testified last week that operational details of his network were handled by private associates such as Secord.

The dealings with Kassar, a major arms merchant, are among $47 million in transactions that flowed through the web of dummy companies set up to manage North’s Iran-contra activities in the three years before the secret operation was shut down last November.

An accounting ledger of the deals was turned over to the congressional investigative panels last spring by Albert A. Hakim, Secord’s business partner and the fiscal manager of North’s network. It was made public this week.

The records cover the accounts of nine dummy corporations used in the Iran-contra operations from December, 1984, through November, 1987.

$25 Million in Profits

Of the $47.7 million that flowed into the enterprise’s bank accounts, $25 million apparently came from profits from the Iran arms sales. The documents indicate that the rest came from an array of sources, including contra leader Adolfo Calero, who apparently used Saudi Arabian cash donations to buy weapons from the network, ‘Israel’, South Korea and the Central Intelligence Agency.

Where the money went is not as easy to trace. Although Calero placed $11.3 million in the accounts in the first seven months alone, the records show that only $9.8 million was actually spent during the entire three-year period to purchase arms for the contras. An additional $2.1 million was used to buy weapons that were intended for the contras but were later sold to the CIA at a loss in one of the North enterprise’s final deals.

An additional $3.25 million was paid to Southern Air Transport, the Miami-based charter airline used extensively in the Iran arms deals and as a front in North’s contra supply operation. And about $707,000 was spent to purchase and operate a Danish coastal freighter, the Erria, which North has testified was used in a variety of ill-starred covert operations at the direction of himself and former CIA Director William J. Casey.

Much of the cash, however, appears to have been transferred out of the enterprise’s operating accounts and into the private accounts of Hakim, Secord, their partner and ex-CIA official Thomas Clines, and others linked to the scandal.

Gave Selves Commission

On a single day in August, 1986, for example, the three men and a Hakim-Secord company, Stanford Technology Trading Group International, credited themselves with an $861,000 commission for the sale of arms to the CIA. The actual sale would not take place for another month.

On three other occasions, Hakim made special payments totaling $768,000 into a sub-account called Defex, the name of a Portuguese weapons-trading firm. Congressional investigators say, however, that the Defex account was actually a disguised repository for commissions for Secord.

Posted in USA, C.I.AComments Off on North’s Weapons Supplier Tied to Terrorist Abu Nidal

America in Turmoil: From Deep State Insurgency to Deep State Spying – WikiLeaks’ Vault 7

NOVANEWS
wikiLeaks-logo-01

Even those not following the latest evidence of the tyrannical noose tightening around our necks, know something has gone terribly wrong in America.

Through NSA whistleblower Edward Snowden’s revelations four years ago, we learned that US citizens as well as foreign countries are the most spied upon in human history. But this week’s latest massive WikiLeaks’ release, aka Vault 7, amounts to almost 9,000 pages of CIA documents collected from 2013 through 2016 that disclose highly classified hacking secrets.

With this largest dump of confidential CIA files ever published, the world is beginning to realize just how far gone our privacy rights are, becoming virtually nonexistent under traitor Obama’s second term in office.

On the heels of last week’s bombshell revelations that outgoing president Obama illegally wiretapped and surveilled all of President Trump’s communications (both domestic and overseas) including his pre-administration officials, now we’re learning that the Orwellian nightmare of myopic control over us as a national population is far worse than ever imagined.

These back-to-back, very much related unfolding events only demonstrate that not only is the legitimately elected American president apparently in the process of an overthrow attempt by treasonous subversive forces for the first time in US history, but through the ruling elite’s private army – the CIA, it has extended its technologically invasive beta test control over the most spied upon population ever on its way to imprisoning every human on earth with a one world crime cabal government.

Americans are not the only victims of deep state cyber aggression. The CIA data dump also reveals that the NSA and CIA have been conducting a large scale covert operation out of the Frankfurt, Germany American Consulate, largest in the world, busily hacking targeted individuals, groups and national entities throughout Europe, the Middle East and China. Granted immunity and top secret identities, individuals comprising deep state America employed in Frankfurt have developed a massive digital hacking arsenal smack dab in the middle of Europe as Empire’s vassal.

In recent years during the Bush-Obama regime, US citizens have witnessed their civil rights – once guaranteed under their no longer upheld Constitution, eroded away into complete oblivion. Under the nefarious pretense of national security, the powers-that-shouldn’t-be have opportunistically stolen both our legal rights as well as literally our property rights in the form of our homes, our cars, our cash, and bank account assets under the grossly unlawfulcivil forfeiture laws regardless of whether any crimes have been committed. Currently US law enforcement steals more annually from us than the totality of all burglars. Also with bail-in laws now well in place, personal life savings will be devoured by large banks, falling like dominos when the global economy collapses. Theft by a predatory elitenever ends.

Rampant violation of our Fifth Amendment right that protect citizens from unreasonable government seizure of private property has also been additionally abused under eminent domain law, where again increasingly our homes are being illegally confiscated by local, state and federal governments. A dozen years ago the US Supreme Court made the decision granting government the right to steal our property based on land use for “economic development” even by a private developer.

The landmark Kelo vs. New London, Connecticut case enabled the Big Pharma giant Pfizer to land grab without the consent of the private citizen as the legal property owner. At the government and pharmaceutical company’s disgrace after millions of taxpayer dollars unjustly displaced private citizens from what was rightfully theirs, all these years later the 90-acre property remains a desolate, vacant lot.

From our stolen constitutional property rights to our freedom of movement and travel now being usurped, increasingly US citizens flying from one domestic location to another are being asked to show “their papers,” reminding us how the German populace must have felt under Nazi authoritarian control.

Increasing military and law enforcement “random” checkpoints are rapidly popping up all over the United States to monitor and restrict our right to navigable access. Microchipped drivers licenses, passports, credit cards as well as backdoor installed GPS monitoring and spying devices in our cell phones have illicitly, secretly been in place for years now. Biometrics like facial and voice recognition and implanted microchips are all New World Order population control mechanisms.

But the latest CIA crimes constitute an unprecedented assault allowing deep state to infiltrate and attack us through malware embedded in our iPhones, Android computer applications as well as smart TVs in order to listen in and shockingly violate every last vestige of our decimated privacy.

Even while Samsung Smart TVs are turned off, the monitoring device is still secretly turned on and eavesdropping on our conversations. Another insidiously dangerous feature to this CIA malware is that it can extract usernames, passwords, and Wi-Fi keys expanding invasive access to the victim’s shared network and other connected devices.

As far back as a half decade ago, then CIA Director retired General David Petraeus was touting how hi tech advances facilitated a myriad of ways Americans can be spied on in a Wired article entitled “CIA Chief: We’ll Spy on You through Your Dishwasher.”

With the rise of the “smart home,” you’d be sending tagged, geo-located data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

You can easily see where the centralized controllers envision smart meters, smart phones, smart TVs and a plethora of smart household devices installed in every hopelessly dumbed down American’s home to permit voyeuristic deep state criminals complete invasive access to raping you in your un-private, unsafe sanctuary you call home.

With Big Government both watching and listening wherever we are and go nowadays, virtually nothing escapes totalitarian reach and absolute control anymore.

Additionally, the massive proliferation of closed circuit TV cameras shooting us from every angle at virtually every urban street corner traffic light and every business location, along with the global deployment of countless surveillance drones of all shapes and sizes, invasively capable of covertly observing and recording our every move and even armed to kill us from both inside and outside our own no longer private homes, conclusively confirm that we are living within the nightmarish horror of “you can run but cannot hide” from the diabolical authoritarian state. And thanks to Obama, the alarming precedent’s been set for a US president to engage in extrajudicial killing of his own citizens on or off American soil.

On a minor positive note, the Oklahoma state legislature has recently introduced a bill making it legal for homeowners to destroy drones flying less than 400 feet over their private property, as long as it’s not an aircraft regulated by the Federal Aviation Administration (FAA). So in other words, if it’s Big Government invading your privacy by operating a drone (predator or otherwise), violating and endangering your personal space, apparently by law you must simply remain a targeted passive victim. But if it’s your nosy neighbor, then in Oklahoma you’ll be authorized to neutralize it when flying too low over your private property residence. Although 45 states are considering laws that restrict unmanned aerial vehicles (UAV’s), especially when risking safety of first responders or the public, the FAA maintains jurisdiction over all US airspace.

Growing conflict between citizens’ personal and privacy rights, violated at the expense of authoritarian government overreach, will no doubt be played out on a far larger scale as divided America continues to fracture, be it over property rightsgun rights, bodily rights vs. mandatory vaccines, microchips or potentially outlawed abortion, or basic 1st Amendment free speech, free press, protest and religious rights. Right now the United States is a powder keg with anti-Trump opposition forces determined to trigger a violent US insurrection that could easily lead to civil war.

The WikiLeaks Vault 7 dump strengthens the case against John Brennan, the CIA director that Stratfor stated was on a witch hunt against journalists when Rolling Stone reporter Michael Hastings was suspiciously killed after his late model car was almost certainly remote controlled to speed up to near 100 MPH prior to it exploding in June 2013. Hastings had been under surveillance by intelligence agencies while working on his latest project exposing their crimes.

With the simultaneous breaking news story that Obama was on the warpath against truth telling journalists as well, directing the FBI to monitor press phone records and remotely hack Sharyl Attkisson’s computer, the likely Hastings assassination and blatant aggression against the free press were tyrannical shots across the bow, overtly threatening any and all whistleblowers and journalists who dared exposing Obama’s crimes. The just released CIA documents prove beyond all question or doubt that all modern vehicles driven today can easily be electronically hacked and remote controlled for sinister murderous purposes, leaving virtually no evidence of a crime ever committed.

No doubt to head off the usual disinfo shills and left-leaning morons at the pass from issuing yet more groundless, mindless “the Russians did it” accusations, WikiLeaks specified that a whistleblowing insider from within the CIA leaked the latest documents. WikiLeaks also stated that the CIA is no longer in control of its own hacking arsenal, as the huge “archive appears to have been circulating among former US government hackers and contractors in an unauthorized manner,” one of them handing a portion over to WikiLeaks.

But rather than immediately launch an investigation on the crimes committed by the CIA’s illegal spying on every American, the culprits themselves – the CIA and FBI – are reflexively announcing that they will begin a criminal probe into the WikiLeaks dump in order to go after and punish the whistleblowing messenger and not the real criminals, similar to chomping at the bit to fry Snowden for bravely doing America the invaluable service of alerting citizens of deep state’s unconstitutional crimes and gross wrongdoing.

Let’s look at another response from an important government insider. Vice chair of the Senate Select Committee on Intelligence Diane Feinstein whose very job function is to exercise much needed oversight over deep state America, feebly muttered on CNN the obvious “duh” response – “maybe there should be more” congressional oversight limiting the CIA spying on Americans.

Essentially she’s admitting her own incompetence at failing to reel in the CIA’s long known, abusively out of control power. But with the CIA in actuality the ruling elite’s private army and Congress its public servant puppets, the bottom line is Congress only allows, promotes and protects crime cabal tyranny and abuse in this classic “fox guarding the henhouse” case. And so is that CIA/FBI probe.

As an integral part of the treasonous cabal, senators like Feinstein are the last persons to expect to act in the genuine best interests of American citizens. Recall three years ago her going through a similarly disingenuous, feeble motion when reacting to illegal CIA torture propagated by the Cheney-Bush administration and then only seamlessly continued under Obama and her “oversight” watch. Feinstein epitomizes the lackey, impotently dishonest role of Congress never really standing up for human rights of anyone on the planet in this age of over-the-top oppression. Instead, she expressed her hypocritical outrage toward her previously coddled CIA only after learning the CIA was secretly monitoring her private communications as well.

Additionally, this latest batch of documents providing indisputable proof that deep state America’s gone awry, renders the Democrats’ nonstop mantra that “the Russians did it” a complete farce, since the CIA has developed the devious means to pull off false flag cyberattacks that can then be conveniently blamed on designated enemies like Putin. Because the Central Intelligence Agency stole malware from other countries, CIA malware under the codename Weeping Angel absolves the Criminals In Action of all guilt, leaving no fingerprints behind, thus delivering false evidence then used to deceitfully charge foreign nations of cyberwarfare crimes and deceptively justify war against any targeted opponent.

And with virtually every war in American history the result of a false flag, and more false flags being perpetrated by the CIA and FBI now than ever before, at some point in the relative near future, you can bet that the US government will claim a false flag scenario, one probable example being an enemy launching a devastating cyberattack against the US banking industry, posing a serious breach to our national security. Suddenly a banker’s holiday is declared and you cannot withdraw cash from your local ATM or for that matter even pump gas into your car. Deep state headed by Homeland Security has been quietly drumming up and prepping for this type of false flag operation for well over a decade.

And as US deep state’s egregious crimes against humanity have never been more exposed than right now, the increasing likelihood of this kind of manufactured crisis and national emergency to occur sooner than later at the behest of demonic planetary controllers, growing desperate to hang onto their centralized power and control, is more imminent now than ever. But armed with truth, an empowered world citizenry can ultimately hold the evildoers accountable. The global masses must awaken and begin rejecting the lies and start thinking for themselves, and for their own survival, actively opposing the deep state’s matrix.

Constitutional attorney John Whitehead expressed his sobering yet truthful conclusion regarding our stolen liberties:

Not only do we no longer have dominion over our bodies, our families, our property and our lives, but the government continues to chip away at what few rights we still have to speak freely and think for ourselves. If the government can control speech, it can control thought and, in turn, it can control the minds of the citizenry.

It’s time to seek, speak and share the truth. Before all our freedoms are permanently lost, including all access to the truth (i.e., Facebook just began flagging “disputed” fake news), and humanity is victimized by the brutal killing force of globalized genocide, shake off the shackles of enslavement and destructive doom and let your voice and conviction be counted, heard and demonstrated through nonviolent civil disobedient action.

Posted in USA, C.I.AComments Off on America in Turmoil: From Deep State Insurgency to Deep State Spying – WikiLeaks’ Vault 7

Shoah’s pages

www.shoah.org.uk

KEEP SHOAH UP AND RUNNING

May 2017
M T W T F S S
« Apr    
1234567
891011121314
15161718192021
22232425262728
293031