Guess Who Just Got BUSTED As Russian Agents? …


lisa-haven-6

A Lisa Haven video believes it has the documentation that shows the Dems as the Russian agents interfering in America and NOT President Donald Trump. AND check this out! Senator John McCain solicited donations from Russians – more proof of McCain the RINO.

 

THE suggestion (and a pretty good one) is the Dems and Establishment RINOs are the true subversives of America.

 

JRH 2/25/17

Please Support NCCR

******************

VIDEO: Guess Who Just Got BUSTED As Russian Agents? Wikileaks Drops Solid PROOF That’ll Land People In Jail

 

Posted by Lisa Haven

Published on Feb 22, 2017

 

Here’s the link that goes with the video: http://bit.ly/2lw2Kp3
Get The Tea: https://getthetea.com/
Need Food Storage: http://foodforliberty.com/haven/?affiliates=43

Prodovite: http://havenshealth.com

Get Tickets For Hear The Watchmen Conference: https://www.eventbrite.com/e/hear-the-watchmen-dallas-2017-tickets-28431318840?aff=LisaHaven&afu=194243865270

(CODE- HAVEN for $20 Off)
For More Information on READ THE REST

EXPOSED – New documentary reveals top Democrats collaboration with Muslim Brotherhood


bho-serves-mb-terrorists-socialism-etc

WND sent a promotional email focusing on the documentary “The Enemies Within”. The promotional bundles the documentary and two books: See Something, Say Nothing (Hardcover), and Stealth Invasion (Hardcover) by Philip Haney.

 

I am not a WND salesman however every so a WND promotion arrives in which the description in itself is informative. This one of those cases. The bundle relates to the government conspiracy under Obama’s Manchurian Candidate Administration how Marxism and Jihadi Muslims team up to take down the American nation and culture down from within.

 

JRH 2/24/17

Please Support NCCR

****************

EXPOSED – New documentary reveals top Democrats collaboration with Muslim Brotherhood

Founding member of Department Homeland Security warns ties ‘deeper, broader, wider’ than Huma Abedin’s

 

Sent by WND

Sent February 23, 2017 at 9:00 AM

 

A blockbuster new documentary asserts there is a master plan to create a permanent liberal majority in American by flooding it with millions of voters hostile to conservatism.

But “The Enemies Within” also claims forces dedicated to the destruction of this country have even penetrated the national security bureaucracy, endangering Americans and the entire system of constitutional government.

Key to this case is the testimony of Philip Haney, a founding member of the Department of Homeland Security and a counter-terrorism analyst who was widely praised and commended by his superiors throughout his distinguished career.

By accumulating vast amounts of data and examining the relationships between various extremist groups and their sources of funding, Haney had identified dozens of terrorists throughout the years, arguably preventing numerous attacks.

However, in 2009, it was Haney himself who was targeted by his own government. He tells his story in the book “See Something, Say Nothing,” but his story is also the most powerful part of “The Enemies Within.”

He recounts in “The Enemies Within:” “I finished a case up, I put it in the system. There were 67 records related to the case, individuals and organizations. But then about two weeks after I put the case into the system, I went on vacation and received a call from my colleague. He said they had removed the records from the system. They didn’t just modify them, they completely obliterated them, took all of them out.”

Haney argues this dramatic action had devastating consequences for the American people. The specific records the government deleted turned out to be directly relevant to terrorist attacks that took place later.

“Those are the records related to the network of mosques and organizations operating in the United States that is linked to the San Bernardino shooting and to the Orlando shooting,” he recalled.

Indeed, Haney states in the video the federal government not only removed the records but actually investigated him for simply doing his job. “They said essentially that I did not have the authority to put those records into the system, even though I had been commended by the National Targeting Center for finding 300 terrorists,” Haney says in the film. “So, essentially, the last three years of my career, I was under investigation by three different government agencies, all at the same time. They essentially determined that I was more of a threat than these terrorist groups.”

Shockingly, the distinguished counter-terrorism expert says no one in the federal government ever claimed his records were inaccurate or untrue. The facts, he claims, were beyond dispute. Instead, for no good reason he can identify, his work was eliminated and he was disgraced.

In one of the most dramatic moments of the film, Haney describes his reaction as feeling “infuriated and stripped naked.” He describes the painful experience as a “public humiliation.”

“To sequester me in a small room for the last 11 months of my career with no assigned duties and then have the audacity to say those were not adverse actions because ‘we’re just conducting an investigation,” Haney remembers. “It’s cruel to do that to a person. It wasn’t a moral infraction, it wasn’t refusal to obey orders, it wasn’t some crime that I committed. It was simply doing the job that I took a vow to do and had been recognized and awarded for.”

For that reason, Haney emphatically states in the documentary the United States has enemies within its own government.

Distinguished author and researcher Trevor Loudon describes the terrifying full extent of this hostile network operating within America’s own borders in “The Enemies Within,” detailing an alliance between radical Marxists and Islamic extremists that has penetrated the very highest levels of the federal government. As Haney explains in the film, the problem has gotten so bad, many of America’s politicians and policy makers would not be able to pass the kind of basic security checks required of even entry level employees.

 

enemies-within-wnd-bundle

WND Enemies Within Bundle Pack

 

“If you have overt ties to associations with known associations with terrorism, you cannot pass a background check,” Haney says in the film.

He describes Hillary Clinton as a “domestic threat” and details the deep connections between the former Democratic presidential nominee and secretary of state with some of the most dangerous Islamic movements in the world. They even go beyond her close relationship with longtime aide and confidante Huma Abedin.

The most dangerous enemy is the one who operates from within your own gates. Discover the traitors within our own country and help spread the word about how America is already under attack. Don’t miss “The Enemies Within” available now in the WND Superstore. “Hillary Clinton’s ties are a lot deeper, broader and wider than Huma Abedin,” Haney says. “The best example of her ties is her affiliation with the Istanbul Process and, in particular, with U.N. Resolution 1618. That resolution, it essentially criminalizes defamation of Islam, has been backed for 10 years by the Organization of the Islamic Conference, a 57-nation organization. It is essentially run in its leadership positions by members of the Muslim Brotherhood. By endorsing U.N. Resolution 16/18, by default Hillary Clinton is aiding and abetting the Muslim Brotherhood on a macro, global level.” And the Muslim Brotherhood, in Haney’s opinion as a national security professional, is directly responsible for sponsoring terrorism. He argues in “The Enemies Within” the organization should be labeled a terrorist group and shut down.

“Since we already know that Muslim Brotherhood is the parent of Hamas and that these organizations are overtly supporting Hamas and other like-minded organizations around the world then we should shut those organizations,” he declares in the film. “And that would send a shockwave throughout the pro-Shariah, pro-jihadist Islamic world without firing a single shot or dropping a bomb anywhere in the world.”

Until that happens, Haney argues, national security professionals have been “completely blindfolded and handcuffed.” “We can’t use the most basic fundamental language that they themselves use to help us understand what Islam believes and what its intentions are,” he explains in the movie.

“The Enemies Within” doesn’t just analyze radical Islam. Instead, it details the terrifying extent to which far left radicals who have overtly declared their anti-American intentions are taking control of the very institutions meant to protect Americans.

At a time when the mainstream media is suddenly concerned about supposed Russian interference, “The Enemies Within” shows the rot set in much sooner than the last election cycle and involves hostile foreign actors more malevolent than Vladimir Putin.

“Those of us who took our oath [seriously] are being betrayed,” Haney says of his fellow national security professionals in the film. “Things like that which happened to me will happen more and more often because people will be forced to stand up for the law at the risk of their career and maybe even their life.”
At a time of crisis, remaining uninformed isn’t just dangerous, it’s deadly. “The Enemies Within” is the first step to recognizing where the threat is coming from.
The most dangerous enemy is the one who operates from within your own gates. Discover the traitors within our own country and help spread the word about how America is already under attack. Don’t miss The Enemies Within available now in the WND Superstore.

++++

Blog Editor: I found a Youtube video that bills itself as the documentary “The Enemies Within”. The video is narrated by Trevor Loudon as the first WND link in the promotion. However, the length  of the video is 5:41:39. That seems a bit lengthy to me thus I am unsure if it is the same documentary promoted by the WND Superstore.

***

VIDEO: The Enemies Within

 

Posted by 2414985

Published on Dec 23, 2016

 

No Description

____________________

Call Toll-Free to Order:


If you prefer to order by phone, you can call our friendly, Midwestern customer service reps toll-free at 1-800-4WND-COM 
(1-800-496-3266),
Monday-Friday, 9am-5pm Central.

 

WND | 2020 Pennsylvania Ave NW, #351 | Washington, DC 20006

Copyright 1997-2017 WND.com Inc. All Rights Reserved.

Obama’s Shadow Government Is Organizing To Undermine Trump


shadow-govt

Here are some more thoughts on Barack Obama exercising a Leftist Shadow Government to bring down President Donald Trump. Previous post: “Obama Post-President Treason”.

 

JRH 2/16/17

Please Support NCCR

****************

Obama’s Shadow Government Is Organizing To Undermine Trump

 

By John Daniel Davidson

FEBRUARY 16, 2017

The Federalist

 

The leaks that led to Michael Flynn’s resignation are just the beginning. Obama and his loyalists in and outside government are working to undermine Trump.

 

Once out of office, ex-presidents usually fade into private life and stay out of politics. They write memoirs, serve on corporate boards, and start charitable foundations. George W. Bush retired to his ranch in Texas and, most recently, painted portraits of veterans wounded in Iraq and Afghanistan. Bill Clinton was briefly thrust back into politics during Hillary’s two failed presidential campaigns, but most of his post-White House career consisted of flying around the world raising boatloads of money for his family’s now-defunct charity.

 

There are exceptions, of course. Jimmy Carter threw himself into international diplomacy, mediating an agreement in 1994 to return exiled President Jean-Bertrand Aristide to power in Haiti, and generally agitating for a Palestinian state.

 

Then there is Obama. Less than a month out of office, the broad contours of Obama’s post-presidency career are already taking shape. Obama and his loyalists, it seems, will remain in the center of the political fray, officially and unofficially, in an organized effort to undermine the Trump administration.

 

The bizarre scandal now unfolding over the resignation of national security advisor Michael Flynn is a case in point. Flynn’s resignation was prompted by a series of coordinated and anonymous leaks from current and former Obama administration officials in our domestic intelligence agencies.

 

Regardless of any valid criticism of Flynn, the leaks are part of a larger, loosely organized effort now underway to preserve Obama’s legacy. This effort involves Obama-era officials still inside the federal government, former Obama staffers working in the private sector, and Obama himself.

 

This isn’t some conspiracy theory. After the election, Obama indicated he intends to stay involved in the political fray. In an email to his supporters on his last day in office, Obama encouraged them to stay engaged, promising “I’ll be right there with you every step of the way.” Less than two weeks later, he issued a statement saying he was “heartened” by anti-Trump protests over the executive order on immigration.

 

Obama Is Jumping Back Into The Political Fray

 

But there’s more to all this than Obama issuing solidarity statements to Trump protestors. For one thing, the former president isn’t moving back to Chicago. The Obama family will remain in Washington DC, within a couple miles of the White House, for the next two years as Obama’s youngest daughter finishes high school.

 

From there, Obama will help direct his new foundation, which he has said will be a “startup for citizenship.” That could mean a lot things, but in light of his other plans it suggests the Obama Foundation will be a political grassroots organization designed to mobilize progressive activists.

 

Obama has also announced he’ll be working with former Attorney General Eric Holder on a political action group called the National Democratic Redistricting Committee. Its goal is to get Democrats elected at the state and local level ahead of the next redrawing of congressional districts. Last month, Obama reportedly met with Senate Minority Leader Chuck Schumer, House Minority Leader Nancy Pelosi, and Virginia Gov. Terry McAuliffe to strategize about redistricting.

 

In addition to these pursuits, the former president will likely play a prominent role in a network of progressive nonprofits, most notably Organizing for Action, the political group that grew out of Obama’s first campaign. OFA has kept a low profile in recent years, and if Clinton had won it likely would have shut down.

 

But last week, OFA officials told NBC News the organization was ramping up operations nationwide in an effort to preserve Obama’s signature achievements like the Affordable Care Act. As part of that effort, the group recently hired 14 field organizers in key states, adding to a growing infrastructure that boasts more than 250 offices nationwide and more than 32,000 volunteers.

 

Former Obama Staffers Are Speaking Out

 

Obama of course isn’t alone in all this. Trump’s victory has mobilized his top aides and staffers to take action, too. Former Obama staffer Tommy Vietor told the Daily Beast that, had Clinton won, “I would have been inclined to feel comfortable that Obama’s legacy and the things we worked on were safe.”

 

Instead, Vietor, along with former Obama administration staffers Jon Favreau and Jon Lovett, are launching a new podcast, Pod Save America, under their new joint media venture, Crooked Media.

 

The purpose of the company should be fairly obvious. “In the battle between Donald Trump and the media, we are firmly on the side of the media,” Favreau told the Daily Beast, adding that he’s not interested in “the veneer of objectivity.” “We’re always going to be Obama guys, we’re very open and honest about that.”

 

Favreau has also been helping create Obama’s new foundation, whose mission, he says, “is to get people involved in civic life and get people engaged in politics.” Of Crooked Media, Favreau says, “I think we would very much like to be the media company version of that. So it’s certainly inspired by a lot of what Obama has talked about in terms of the media over the last several months.”

 

A host of other former Obama staffers have simply taken to social media to voice their opposition to Trump. One former senior administration official told Yahoo News, “There are more than a few of us who believe deeply in holding this administration’s feet to the fire—especially when they offer falsehoods to the American people and distort our record. We have an email chain going where we share impressions, etc.”

 

As the leaks keep flowing from our intelligence agencies and the tweets keep flying from former Obama officials, keep in mind that although we haven’t heard much from Obama himself yet, the Trump administration is going to keep feeling the disruptions of what amounts to a shadow government.

 

Obama had eight years in the White House to secure his legacy. Any efforts on his part to undermine his successor aren’t just an affront to the principles of our democracy, they’re an admission that he and his acolytes never put much stock in democracy to begin with.

________________

John is a senior correspondent for The Federalist. Follow him on Twitter.

 

Copyright © 2017 The Federalist, a wholly independent division of FDRLST Media, All Rights Reserved.

 

Crooked Hillary, Trump, Obama & U.S. Intelligence


hacking-report-political-hoax

John R. Houk

© January 11, 2017

 

Crooked Hillary lost and Donald Trump won to become the President Elect until January 20 when the Donald gets to say, “You’re Fired!” And yet Crooked Hillary acolytes and Obama including his acolytes have spent the lame duck period trying to undermine the Trump Electoral College victory. (Heads up to popular vote counter-constitutionalists: The Founding Fathers set up the Electoral College because of a mistrust of direct democracy AND to level the playing field between the most populated States and the lesser populated States. HELLO! Take away New York and California then ask, “Who wins the popular vote then? And that is two out of fifty States.)

 

The Dems have – in an absolute sense – pointed their fingers at Russia for directly manipulating the election process in the USA. The problem with the Dem finger pointing there is proof the Russians or private hackers never accessed the voting process.

 

So, what are the Dems saying when pointing their fingers at Russia with an election manipulation accusation? The Dems at the very least influenced the election to Trump’s favor by exposing the Dem Party and the Crooked Hillary emails to the voting public.

 

Hmm … So, Russia has become evil for revealing Hillary Clinton and the Dem Party are crooked and corrupt in its practices.

 

Now we can seriously point to Russian actions that are evil in the sense of undermining the freest republic in world history. Here is a far incomplete list of Russian provocations during President Barack Hussein Obama’s Administration:

 

  • Russia invaded the nation of Georgia to bring Abkhazia and South Ossetia under the Russian orbit by making them independent nations.

 

  • Annexing Crimea and usurping land from Ukraine at the behest of Russian speaking Ukrainians planted there during the Soviet era.

 

  • Russia often has military exercises directly near NATO protected nations as well as sending war planes into NATO nations’ airspace.

 

  • Russia has intervened in the Syrian civil war on the side of Abbas despotic regime which allies with the Iran military and the Hezbollah terrorists. (I have indecisive feelings here since the parties engaged in aiding Abbas are also attacking the Islamic terrorists of ISIS. Are there still moderate Sunni-Syrians trying to overthrow Assad? Frankly I don’t know about that due to all the Islamic terrorist organization involved in the civil war which stretches beyond just ISIS.)

 

  • Russia has sent aid to Iran in regard to the Shia Muslim’s nation’s nuclear aspirations. The kind of aid that Iran could easily escalate to military uses.

 

Of Possible Interest:

 

 

 

 

 

You are darn toot’in the Russians are up to no good vis-a-vie America. Are the Russians willing to interfere in America’s internal affairs? I have no doubt. I have a lot of doubts the Russians would favor Donald Trump to Crooked Hillary. After all, it was under the direction of Crooked Hillary and Obama that a huge chunk of Uranium fell under Russian control.

 

Trump’s campaign moniker of making America great again including a rebuilt stronger military is definitely NOT in the national interests of Russia.

 

Also, there is the appearance that America’s Intelligence Communities have absorbed the Obama global agenda and are willing to toss President Elect Trump under the bus with Buzzfeed publishing good old fashioned fake news (as opposed to the actual content of the DNC email servers). On television (Fox News) I heard this so-called Trump Dossier might be a part of a feud between the incoming President and the American Intelligence Community with the inference the CIA in particular.

 

If I was Trump, on January 20 I’d initiate investigations not only toward Crooked Hillary but also the Obama Administration that should include Barack Hussein Obama.

 

At any rate below are two reports. The first is the Angry Patriot talking about yet another Wikileaks expose showing Crooked Hillary had close financial ties with George Soros. The second report is a video entitled “Report on Russian Hacking is a Political Hoax” in which Cliff Kincaid and Jerry Kenney deconstructing the Intelligence Community’s belief that Russia was behind a hack of the DNC.

 

JRH 1/11/16

Please Support NCCR

*****************

BREAKING – We Now Know WHO Was Behind Hillary Clinton All Along. Surprised?

 

By Sgt. Freefall

Angry Patriot

 

Leaked documents have now revealed who is pulling Hillary Clinton’s dusty puppet strings.

 

BREAKING – We Now Know WHO Was Behind Hillary Clinton All Along. Surprised?

 

Leaked documents have now revealed who is pulling Hillary Clinton’s dusty puppet strings.

 

In an email released by WikiLeaks, George Soros gave Hillary Clinton step-by-step instructions. This included a list of people Soros thought should be official mediators sent to Albania in 2011. Days after the email was sent, someone on the list was sent as the mediator by the EU, as per Investor’s Business Daily.

 

This past weekend, an organization called DC Leaks put up 2,500 documents from Soros’s Open Society Foundation’s servers, revealing more corruption and connections to Clinton and others. The emails are from as far back as 2008.

 

However, the mainstream media are refusing to say anything about this leak, no doubt because Soros funds them or they fear retaliation. Soros is quick to use his money to get what he wants even if that is to influence an election.

 

No mainstream media platform, such as CNNCBS, or the New York Times, has said a single thing about these emails. Only conservative media have touched the story.

 

They’re not airing this information because of lack of interest or out of fear it wouldn’t get viewers’ attention—it’s because the details are truly disturbing and deeply important.

 

These documents show how Soros’s organizations manipulated European elections in 2014, including a “List of European Elections 2014 Projects” that details over 90 projects in total in that year alone. He also gave $4 million away to anti-Israeli groups to “challenge Israel’s racist and anti-democratic policies.”

 

In the states, Soros wanted to give $200,000 to the Center for American Politics to create a smear campaign to hit conservative activists with. And in 2015, his Open Society gave $650,000 to “invest in technical assistance and support for the groups at the core of the burgeoning #BlackLivesMatter movement.” It was then that the BLM movement seemed to start to advocate for violence.

 

Soros doesn’t care if American police officers die because he has emboldened and financed a hateful group. He doesn’t care that actual black community issues will be neglected as the movement pushes for all the wrong solutions!

 

Previously, Soros had known close ties to the failed presidential nominee, Hillary Clinton, but there was no evidence Clinton was literally taking Soros’s orders. This past year, he gave around $7 million to Clinton’s PACs alone. Altogether, he gave over $25 million to Democrat politicians and causes.

 

If Soros was a conservative, the media would be all over him—they may have even been harder on him than they are on Donald Trump. They would tear into his schemes and works and try to expose him for what he is, but because he’s a liberal, the media are looking the other way.

 

Soros, like Hillary Clinton, gets a pass for his corrupt schemes. Looks like his organizations are another swamp to drain!

 

+++

The CIA’s Dump Trump Campaign

 

Sent by Cliff Kincaid

Sent January 10, 2017 9:24 PM

Sent from (ASI) USA Survival News

 

Cliff Kincaid President America’s Survival, Inc.:
www.usasurvival.org

www.noglobaltaxes.org

www.religiousleftexposed.com

www.sorosfiles.com

www.leninandsharia.com 

 

Dear Friend of America’s Survival:

 

It’s getting serious.

 

Mr. and Mrs. America, the CIA is again trying to overthrow Trump.

 

CNN has unleashed another round of vague, unsubstantiated and unsourced allegations against Trump:

cnn-intel-chiefs-russia-compromised-trump

 

CNN claims the allegations are “that Russian operatives claimed to have compromising personal and financial information about Mr. Trump.” Claimed?

 

This is another effort by the CIA to undermine Trump even before he takes office. We recorded a show on this effort. Watch our show here.

 

The allegations were apparently referenced by Democrat Sen. Harry Reid in a letter to FBI Director Comey. Reid claimed: “In my communications with you and other top officials in the national security community, it has become clear that you possess explosive information about close ties and coordination between Donald Trump, his top advisors, and the Russian government – a foreign interest openly hostile to the United States, which Trump praises at every opportunity. The public has a right to know this information.”

 

Notice Reid’s reference to sources in “the national security community.” This is code for the CIA.

 

Send me your thoughts at Kincaid@comcast.net

 

+++

VIDEO: Report on Russian Hacking is a Political Hoax

 

Posted by USA Survival

Published on Jan 8, 2017

 

The CIA says that Russian hackers released true information about Hillary Clinton. Horrors! Cliff Kincaid and Jerry Kenney analyze the “Declassified Intelligence Community Assessment of Russian Activities and Intentions in Recent U.S. Elections,” in order to show how the CIA and other intelligence agencies are trying to subvert the Trump presidency with bogus claims. The CIA report proves the validity of what Democratic Senator Chuck Schumer meant when he said, “Let me tell you, you take on the intelligence community, they have six ways from Sunday at getting back at you.”

_______________

Crooked Hillary, Trump, Obama & U.S. Intelligence

John R. Houk

© January 11, 2017

______________

BREAKING – We Now Know WHO Was Behind Hillary Clinton All Along. Surprised?

 

Please share this story on Facebook and tell us what you think because we want to hear YOUR voice! You can also reach out to me on Twitter at @AP_SgtFreefall to discuss this story.

________________

The CIA’s Dump Trump Campaign

 

Cliff Kincaid Biography 

President, America’s Survival, Inc.


A veteran journalist and media critic, Cliff concentrated in journalism and communications at the University of Toledo, where he graduated with a Bachelor of Arts degree, and came to Washington through a national journalism program headed by conservative author and journalist M. Stanton Evans. At his college newspaper, Cliff won an award for editorial writing from the Society of Professional Journalists. He also serves as director of the Accuracy in Media (AIM) Center for Investigative Reporting.

 

Cliff Kincaid’s books include:

 

  • The Playboy Foundation: A Mirror of the Culture? (Capital Research Center) 1982.

 

  • Profiles of Deception (with Reed Irvine) 1990.

 

  • The News Manipulators (with Reed Irvine and Joseph C. Goulden) 1993.

 

  • Global Bondage: The U.N. Plan to Rule the World (1995).

 

  • Global Taxes for World Government (1997).

 

  • Michael New: Mercenary or American Soldier (with Daniel New) 1998.

 

  • The New United Nations’ Welfare Giveaway (2000).

 

  • The Hijacking of American Foreign Policy (2003).

 

  • Why You Can’t Trust the News (with Reed Irvine and Notra Trulock) 2003.

 

ASI was the first national organization to warn of global taxes and the proposed International Criminal Court, holding news conferences on these matters at READ THE REST

 

About America’s Survival

 

Is Braverman a Victim or Hidden?


eric-braverman

John R. Houk

© January 2, 2017

 

Ever heard of Eric Braverman? I have not myself noticed the name. Evidently, he WAS the CEO for the Clinton Foundation.

 

Braverman Yale Profile:

 

Eric Braverman was chief executive officer of the Clinton Foundation from 2013 to 2015.  At the Foundation, Braverman led an effort to help ensure long-term sustainability—securing an endowment, transforming the organization’s use of data, establishing governance practices to reflect changing laws and public expectations, consolidating entities, and creating professional development for staff. 

 

Previously, Braverman served as a partner at McKinsey & Company, where he advised leaders in the public, private, and non-profit sectors on strategy, organization, and operations. Named by Fortune magazine in 2010 as one of the “40 Most Influential Leaders in Business” worldwide under 40 years old, Braverman co-founded McKinsey’s public sector practice and directed its work on government innovation globally. He also served as an advisor on performance management and technology for President Obama’s transition team in 2008.

 

Braverman is a frequent speaker on government at events, conferences, and seminars around the world—both in academic and practitioner-oriented settings—focusing particularly on innovation in government and the importance of partnership between the public, private, and nonprofit sectors to improve lives.

 

The Angry Patriot has noticed that Braverman not only resigned from the Clinton Foundation but has seemingly disappeared from public view. Angry Patriot then goes into educated speculation mode.

 

As we know the Democratic National Committee (DNC) either had their email server hacked or someone leaked server info to Wikileaks. The Dems say the Russians hacked their servers and released the data to Wikileaks. Julian Assange of Wikileaks says the Russians didn’t do the whistleblowing but a disgruntled Clinton insider gave the data to Wikileaks. (See Also 12/14/16 Washington Times report)

 

Angry Patriot wonders if Eric Braverman was the disgruntled insider because of the timing of Braverman going off the public grid.

 

With Clintons’ history of potential finger-pointers disappearing by prison or death, I wonder if Braverman was disposed by the Clintons or if Wikileaks helped him disappear to protect him from nefarious designs by the Clintons or Dem Party Cleaners.

 

On December 29, 2016 a Joint Analysis Report (JAR) was released as the combine work of the FBI and Department of Homeland Security (DHS) entitled, “GRIZZLY STEPPE – Russian Malicious Cyber Activity”. The report definitely fingers Russian hacking. Here is the PDF first paragraph:

 

This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.

 

“RIS” is the acronym for Russian Intelligence Services. Meaning more than one specific Russian intelligence agency was involved in hacking the DNC.

 

Here are some articles that does a decent job in translating the technical language of the report into normal English:

 

The Guardian:

 

 

The government report follows several from the private sector, notably a lengthy section in a Microsoft report from 2015 on a hacking team referred to as “advanced persistent threat 28” (APT 28), which the company’s internal nomenclature calls Strontium and others have called Fancy Bear. Also mentioned in the government document is another group called APT 29 or Cozy Bear.

 

 

The Microsoft report contains a history of the groups’ operation; a report by security analysts ThreatConnect describes the team’s modus operandi; and competing firm CrowdStrike detailed the attack on the Democratic National Committee shortly before subsequent breaches of the Democratic Congressional Campaign Committee and the Hillary Clinton campaign were discovered.

 

Security experts on Twitter criticized the government report as too basic. Jonathan Zdziarski, a highly regarded security researcher, compared the joint action report to a child’s activity center.

 

Tom Killalea, former vice-president of security at Amazon and a Capital One board member, wrote: “Russian attack on DNC similar to so many other attacks in past 15yrs. Big question: Why such poor incident response?”

 

READ ENTIRETY (FBI and Homeland Security detail Russian hacking campaign in new report; By Sam Thielman; The Guardian; 12/29/16 17.19 EST)

 

Robert M. Lee:

 

 

If anyone is like me, when I read the above I became very excited. This was a clear statement from the White House that they were going to help network defenders, give out a combination of previously classified data as well as validate private sector data, release information about Russian malware that was previously classified, and detail new tactics and techniques used by Russia. Unfortunately, while the intent was laid out clearly by the White House that intent was not captured in the DHS/FBI report.

 

 

 The report is intended to help network defenders; it is not the technical evidence of attribution

 

There is no mention of the focus of attribution in any of the White House’s statements. Across multiple statements from government officials and agencies it is clear that the technical data and attribution will be a report prepared for Congress and later declassified (likely prepared by the NSA). Yet, the GRIZZLY STEPPE report reads like a poorly done vendor intelligence report stringing together various aspects of attribution without evidence. The beginning of the report (Figure 2) specifically notes that the DHS/FBI has avoided attribution before in their JARs but that based off of their technical indicators they can confirm the private sector attribution to RIS.

 

 

But why is this so bad? Because it does not follow the intent laid out by the White House and confuses readers to think that this report is about attribution and not the intended purpose of helping network defenders. The public is looking for evidence of the attribution, the White House and the DHS/FBI clearly laid out that this report is meant for network defense, and then the entire discussion in the document is on how the DHS/FBI confirms that APT28 and APT29 are RIS groups that compromised a political party. The technical indicators they released later in the report (which we will discuss more below) are in no way related to that attribution though.

 

Or said more simply: the written portion of the report has little to nothing to do with the intended purpose or the technical data released.

 

Even worse, page 4 of the document notes other groups identified as RIS (Figure 4). This would be exciting normally. Government validation of private sector intelligence helps raise the confidence level of the public information. Unfortunately, the list in the report detracts from the confidence because of the interweaving of unrelated data.

 

As an example, the list contains campaign/group names such as APT28, APT29, COZYBEAR, Sandworm, Sofacy, and others. This is exactly what you’d want to see although the government’s justification for this assessment is completely lacking (for a better exploration on the topic of naming see Sergio Caltagirone’s blog post here). But as the list progresses it becomes worrisome as the list also contains malware names (HAVEX and BlackEnergy v3 as examples) which are different than campaign names. Campaign names describe a collection of intrusions into one or more victims by the same adversary. Those campaigns can utilize various pieces of malware and sometimes malware is consistent across unrelated campaigns and unrelated actors. It gets worse though when the list includes things such as “Powershell Backdoor”. This is not even a malware family at this point but instead a classification of a capability that can be found in various malware families.

 

Or said more simply: the list of reported RIS names includes relevant and specific names such as campaign names, more general and often unrelated malware family names, and extremely broad and non-descriptive classification of capabilities. It was a mixing of data types that didn’t meet any objective in the report and only added confusion as to whether the DHS/FBI knows what they are doing or if they are instead just telling teams in the government “contribute anything you have that has been affiliated with Russian activity.”

 

 

In some locations in the CSV the indicators are IP addresses with a request to network administrators to look for it and in other locations there are IP addresses with just what country it was located in. This information is nearly useless for a few reasons. First, we do not know what data set these indicators belong to (see my previous point, are these IPs for “Sandworm”, “APT28” “Powershell” or what?). Second, many (30%+) of these IP addresses are mostly useless as they are VPS, TOR exit nodes, proxies, and other non-descriptive internet traffic sites (you can use this type of information but not in the way being positioned in the report and not well without additional information such as timestamps). Third, IP addresses as indicators especially when associated with malware or adversary campaigns must contain information around timing. I.e. when were these IP addresses associated with the malware or campaign and when were they in active usage? IP addresses and domains are constantly getting shuffled around the Internet and are mostly useful when seen in a snapshot of time.

 

 

So what’s the problem? All but the two hashes released that state they belong to the OnionDuke family do not contain the appropriate context for defenders to leverage them. Without knowing what campaign they were associated with and when there’s not appropriate information for defenders to investigate these discoveries on their network. They can block the activity (play the equivalent of whack-a-mole) but not leverage it for real defense without considerable effort. Additionally, the report specifically said this was newly declassified information. However, looking the samples in VirusTotal Intelligence (Figure 7) reveals that many of them were already known dating back to April 2016.

 

 

The only thing that would thus be classified about this data (note they said newly declassified and not private sector information) would be the association of this malware to a specific family or campaign instead of leaving it as “generic.” But as noted that information was left out. It’s also not fair to say it’s all “RIS” given the DHS/FBI’s inappropriate aggregation of campaign, malware, and capability names in their “Reported RIS” list. As an example, they used one name from their “Reported RIS” list (OnionDuke) and thus some of the other samples might be from there as well such as “Powershell Backdoor” which is wholly not descriptive. Either way we don’t know because they left that information out. Also as a general pet peeve, the hashes are sometimes given as MD5, sometimes as SHA1, and sometimes as SHA256. It’s ok to choose whatever standard you want if you’re giving out information but be consistent in the data format.

 

 

The report goes beyond indicators to include new tradecraft and techniques used by the Russian intelligence services

 

The report was to detail new tradecraft and techniques used by the RIS and specifically noted that defenders could leverage this to find new tactics and techniques. Except – it doesn’t. The report instead gives a high-level overview of how APT28 and APT29 have been reported to operate which is very generic and similar to many adversary campaigns (Figure 8). The tradecraft and techniques presented specific to the RIS include things such as “using shortened URLs”, “spear phishing”, “lateral movement”, and “escalating privileges” once in the network. This is basically the same set of tactics used across unrelated campaigns for the last decade or more.

 

 

This ultimately seems like a very rushed report put together by multiple teams working different data sets and motivations. It is my opinion and speculation that there were some really good government analysts and operators contributing to this data and then report reviews, leadership approval processes, and sanitation processes stripped out most of the value and left behind a very confusing report trying to cover too much while saying too little.

 

We must do better as a community. This report is a good example of how a really strong strategic message (POTUS statement) and really good data (government and private sector combination) can be opened to critique due to poor report writing. READ ENTIRETY (Critiques of the DHS/FBI’s GRIZZLY STEPPE Report; By Robert M. Lee; 12/30/16)

 

So, I’m not an expert, but the JAR data suggests a combination of RIS and private hackers. Because of the lackluster of specific finger pointing in the JAR data made public how the DNC had their server data dispersed is still up in the air.

 

A whistleblower could have sent data to a private Russian hacker in which the RIS picked up and then either the RIS or private Russian hacker dispersed the data to Wikileaks.

 

Of course, either way, there is something rotten going on in Russia in connection American private and public organizations. As such, some kind of American response should proceed. HOWEVER, the deed was done and the DNC and Crooked Hillary have been exposed as just as corrupt and manipulative as anything of Russian origin. ERGO, the DNC and the Crooked Hillary campaign must be investigated as well. EVEN IF THE SOURCE IS AN OUTSIDE HACKER!

 

JRH 1/2/17

Please Support NCCR

****************

REPORT – Clinton Foundation CEO Disappears, Media HIDING What REALLY Happened

 

Email alert sent December 31, 2016

Angry Patriot

 

Someone has to step up and ask questions about the disappearance of Eric Braverman, the Clinton Foundation CEO from 2013 to 2015, or no one will!

 

Eric Braverman disappeared in October, just a few weeks before Hillary Clinton’s defeat sent shock waves through Washington, D.C. and liberal cities across the country. So far, few outside the political blogosphere even knew the man existed, let alone disappeared without a trace.

 

Why are the mainstream media ignoring the disappearance of a top-level Clinton Foundation official? Perhaps because many have speculated Braverman went into hiding after an email mentioning his name surfaced on WikiLeaks just days before he went missing.

 

In a leaked email from March 2015, Center for American Progress President Neera Tanden told Hillary Clinton’s campaign manager and longtime pal, John Podesta, that they had a mole within the Clinton Foundation. In his responding email, Podesta told Tanden the mole was none other than Eric Braverman, the Stream reports.

 

Shortly before the emails between John Podesta and Neera Tanden had taken place, Braverman abruptly resigned as the CEO of the Clinton Foundation. Almost immediately after WikiLeaks made the emails public, the former executive completely vanished.

 

This not only sounds like a story in dire need of good old fashioned investigative reporting—it sounds like the makings of a television movie special. Once upon a time, a real free press would be all over the sudden disappearance of a top official who worked for a former president and a former Oval Office contender.

 

The last evidence of Eric Braverman being active on a public level was on October 12. He made a post to Twitter, which he reportedly did about once a month.

 

Braverman’s partner, Neil Brown, has reportedly not tweeted since August. The former Clinton Foundation CEO is still listed as a lecturer at Yale where he has given speeches for the past several years.

 

Craig Murray, a former British ambassador to Uzbekistan and close friend of WikiLeaks founder Julian Assange, claims the leaked emails from the Democrat Party were not taken by the Russians but by a disgruntled insider. Could this have been Eric Braverman, who sadly got caught up in his own behind-the-scenes whistleblowing on the Clintons?

 

Braverman was allegedly hired as the Clinton Foundation CEO by Chelsea Clinton, who wanted to find and clean up any corruption within the family charity. Braverman was allegedly forced out of the job by John Podesta.

 

Chelsea was allegedly very upset by examples of misspent funds. One example of such corruption was the more than $1 billion Bill Clinton raised to rebuild 100 villages in India. Reportedly, only $53 million was ever actually spent on the project.

 

Click here to get my DAILY Trump email newsletter free!!

 

Please share this story on Facebook and tell us what you think because we want to hear YOUR voice! You can also reach out to me on Twitter at @AP_SgtFreefall to discuss this story.

 

_________________

Is Braverman a Victim or Hidden?

John R. Houk

© January 2, 2017

_______________

REPORT – Clinton Foundation CEO Disappears, Media HIDING What REALLY Happened

 

The Angry Patriot Copyright © 2017.

 

About Sgt. Freefall – Angry Patriot

 

The Making of Sergeant Freefall

 

Some people are born angry, some are made angry through tragic life events. The latter is true for Marine Gunnery Sergeant Freefall.

 

While we sat in front of our TVs in horror on 9/11, a family of American Eagles was tragically destroyed. Sgt. Freefall’s parents created a nest at the top of the World Trade Center in early August. They thought they had found the perfect home to raise a family. Soon thereafter, Sgt. Freefall’s mother laid her first egg.

 

Unfortunately, just as the egg was ready to hatch, the terrorist attack took place in New York City. While Sgt. Freefall’s mother and father were killed in the bombing, the egg fell from the sky and miraculously landed in the hands of a fireman. Inspired by these events, that fireman would join the Marines to fight for his country.

 

Once again,  READ THE REST

 

 

Newbill: Disinformation, Intel-Manipulation, Human Trafficking, Russians, Syria et al


By Tony Newbill

Edited by John R. Houk

Posted December 21, 2016

 

Tony Newbill focuses on the conspiratorial corruption the Obama Administration did nothing to curb and perhaps might be in collusion in abetting.

 

JRH 12/21/16

Please Support NCCR

*************

The Disinformation effort

12/14/2016 2:12 PM

 

The Disinformation effort …. to discredit an election that was won because the people are tired of the LIES and Deception!

 

By what these 4 links show that it’s pretty hard to say there is not a concerted effort to see what society is up too and then try and direct a narrative, by the Government and Media, and I would say that Trump new this and talked Truth about it and is why he won, not some Russian Hacking effort to steal the election.

 

http://www.outsiderclub.com/facebook-cia-jim-breyer-gilman-louie-anita-jones/902  

 

Is Facebook really a CIA-funded data collection program?

 

Why wouldn’t it be?

 

We already know that the NSA snoops through our email, as well as our phone records and calls. And it was recently revealed that the CIA created a “Cuban Twitter” to encourage insurrection.

 

It was called ZunZuneo, and it was offered to Cubans via the country’s mobile-phone network as a free text service. The program attracted 40,000 subscribers before mysteriously ending operations in 2012.

 

 

The (Social) Network

 

The Facebook-CIA connection revolves around James Breyer, a partner at the investment firm ACCEL.

 

Accel was one of Facebook’s early investors, plunking down $12.7 million in 2005. That dwarfed the initial venture capital investment of $500,000 from Peter Thiel. In fact, Accel was Facebook’s biggest shareholder after Mark Zuckerberg at the time of the company’s IPO, with an 11% stake.

 

And as it happens, Breyer, the guy who made it happen, has some very close ties with the U.S. government.

 

You see, in addition to his role at Accel, Breyer sat on the board of directors at BBN – a defense contractor that helped create the internet. And in 2004, he was joined there by Gilman Louie, the CEO of In-Q-Tel – an technology investment firm that was founded by the CIA.

 

Indeed, the CIA launched In-Q-Tel in 1999, with a focus on data mining, and Louie was put in charge.

 

And that’s not all.

 

Also on BBN’s board was Dr. Anita Jones.

 

Jones, also a member of the In-Q-Tel board, was formerly the director of Defence Research and Engineering for the U.S. Department of Defence. At the DoD, Jones reported directly to the Secretary of Defence and oversaw the Defense Advanced Research Projects Agency (DARPA).

 

DARPA, of course, is responsible for the development of new technologies the military. It also houses one of the most insidious branches of government bureaucracy, the Information Awareness Office.

 

The IAO was established in 2002 to bring together several DARPA projects that use surveillance and information technology to track and monitor “terrorists.” The goal of these endeavors is “Total Information Awareness (TIA).”

 

TIA means creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal emails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.

 

Once this information was made public there a firestorm of criticism. It was READ ENTIRETY (The CIA Has Sent You a Friend Request: Is Facebook Really a CIA Front? By Jason Simpkins; Outsider Club; 4/7/14 5:18 PM)

 

http://www.investigatemagazine.co.nz/Investigate/1601/is-facebook-the-new-big-brother/

 

FACEBOOK 4EVA


IS SOCIAL NETWORKING THE ULTIMATE BIG BROTHER TOOL?

 

When Desperate Housewife Eva Longoria used Facebook to spring her cheating husband of three years, Tony Parker, just before Christmas, she was using social networking to gather intelligence. But she’s not the only one, and some agencies are salivating at the information they’re gathering on citizens across the world
WORDS BY IAN WISHART

 

 

Sociologists have discovered the same thing in public life – that virtually all of us can be linked through our acquaintances and friendships, within six degrees of separation, to anyone else on the planet – even to Kalahari bushmen.

 

This “interconnectedness” is one of the driving principles that Facebook is designed to exploit, but in doing so has it created a monster? …

 

 

But just as it has made infidelity easier, Facebook has also made it easier to track, and that’s where the Big Brother twist comes in. …

 

 

Former Israeli intelligence agent Ari ben-Menashe published a book called ‘Profits of War’ in 1992 that caused a worldwide sensation, because it described for the first time a plan by Israeli spy agency Mossad to create a computer programme capable of monitoring individuals and working out who their circle of friends were. That programme was called PROMIS, and it was picked up not just by Mossad but also the CIA and the NSA in the US.

 

 

Information, said ben-Menashe, might include phone records that showed who the target associated with, or locations that he regularly visited. “The programme…would have the ability to track the movements of vast numbers of people around the world. Dissidents or citizens who needed to be kept under watch would be hard put to move freely again without Big Brother keeping an eye on their activities.”

 

That was 1992. When the whistle was blown the intelligence agencies ran for cover, and organisations in New Zealand and elsewhere who had purchased PROMIS ditched it. But the dream of tracking social networks via computer did not go away. Imagine the fun to be had if people voluntarily waived their rights to privacy and uploaded their personal information and friendships online for everyone to see.

 

In 1998, the CIA ostensibly gave up the fight to lead the world in IT intelligence software.

 

 

Instead of developing software, the CIA set up a company called In-Q-Tel in 1999 to go into venture partnerships with private capital firms to develop and fund promising new technologies that could help the CIA “data mine” for useful intelligence.

 

 

The CIA’s website makes In-Q-Tel’s mission clear:

 

“In-Q-Tel’s mission is to foster the development of new and emerging information technologies and pursue research and development (R&D) that produce solutions to some of the most difficult IT problems facing the CIA. To accomplish this, the Corporation will network extensively with those in industry, the venture capital community, academia, and any others who are at the forefront of IT innovation.”

 

The first CEO of In-Q-Tel was Gilman Louie, and he and his CIA subsidiary were appointed with seven others to the Board of Directors of the National Venture Capital Association of America in 2004. The chairman of the NVCA was James Breyer of Accel Partners, and one of his first tasks that year was to give a young student named Mark Zuckerberg US$13 million in venture capital. What for? Well, in February 2004, Harvard student Mark Zuckerberg launched Facebook, a new social networking service designed to help fellow students stay in touch with each other.

 

James Breyer was also chairman of BBN, a Silicon Valley company whose Arpanet technology had helped kick off the internet with the assistance of the US Defence agencies. Joining Breyer at BBN in 2004 were both In-Q-Tel’s Gilman Louie and Dr. Anita Jones, a colleague of Gilman Louie’s at In-Q-Tel, and a former advisor to DARPA, or the Defence Advanced Research Projects Agency.

 

In Facebook terms, these CIA and US Defence Department types were just one degree of separation from Facebook itself, and their chairman James Breyer was one of the initial bankrollers of Facebook.

 

One of DARPA’s projects was “scalable social network analysis”, or SSNA, which researcher Sean McGahan described this way: “The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people … In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as READ ENTIRETY (Is Facebook the new ‘Big Brother’? Posted by iwishart; Investigate Daily; 9/30/11)

 

https://www.thenation.com/article/amazon-washington-post-and-600-million-cia-contract/

 

It’s been a rough couple days for The Washington Post. Word emerged that hackers invaded its internal system—for a few days, no less—all of its staffers had to change their passwords as the company tried to figure out how much data had been compromised.

 

Meanwhile, a petition campaign was launched related to news that Amazon, under the Post’s new owner, Jeff Bezos, recently secured a $600 million contract from the CIA. That’s at least twice what Bezos paid for the Post this year. Bezos recently disclosed that the company’s Web-services business is building a “private cloud” for the CIA to use for its data needs.

 

Critics charge that, at a minimum, the Post needs to disclose its CIA link whenever it reports on the agency. Over 15,000 have signed the petition this week hosted by RootsAction.

 

In a statement released by the Institute for Public Accuracy, media writer/author Robert McChesney observes:

 

When the main shareholder in one of the very largest corporations in the world benefits from a massive contract with the CIA on the one hand, and that same billionaire owns the Washington Post on the other hand, there are serious problems. The Post is unquestionably the political paper of record in the United States, and how it covers governance sets the agenda for the balance of the news media. Citizens need to know about this conflict of interest in the columns of the Post itself.

 

If some official enemy of the United States had a comparable situation—say the owner of the dominant newspaper in Caracas was getting $600 million in secretive contracts from the Maduro government—the Post itself would lead the howling chorus impaling that newspaper and that government for making a mockery of a free press. It is time for the Post to take a dose of its own medicine.” (Amazon, ‘The Washington Post’ and That $600 MIllion CIA Contract; By Greg Mitchell; The Nation; 12/19/13)

 

Who really could have hacked the DNC?

 

https://www.zerofox.com/blog/often-social-media-accounts-hacked/

 

How often are social media accounts hacked? Although it’s a tricky question, the short answer is clear: way too often.

 

Social media account takeovers are an increasingly common occurrence, affecting the likes of politicians, celebrities, brands, other high-profile accounts and even Mark Zuckerberg, the father of the social media revolution. But they also trickle down to individuals and small business accounts in striking numbers.

 

A social media profile is a valuable tool for corporations and celebrities to spread awareness, but it’s also a broad, easily exploited, and often unregulated attack surface. If the page itself is compromised, the brand can become tarnished and trusting users can be enticed to click malicious links, directing to phishing pages, scams, or exploits.

 

 

Measuring the cost of high-profile breaches is more difficult; most instances of account takeovers do not reveal the full impact of the breach. We can, however, point to specific instances where the cost of the breach has been quantified. … Clearly, these account takeovers have potentially huge financial impacts to the victims.

 

READ ENTIRETY (HOW OFTEN ARE SOCIAL MEDIA ACCOUNTS HACKED? By John Seymour; ZeroFox.com; 10/21/16)

 

+++

PAY ATTENTION TO THIS California Legislation!!!!!!!!!!!!!!

12/15/2016 9:57 AM

 

This shows the Institutions that are used to facilitate the Dark State manipulation of the Mind and the spying by the PLUTOCRACY/Technocracy THAT GETS BAILED OUT AND SUBSIDIZED WITH THE blood, sweat and tears of the society!!!!!

 

http://geke.us/VennDiagrams.html

 

Click on any graphic to enlarge: [Blog Editor: There are 19 graphics to click and enlarge.]

 

College is a Perfect venue for Mind Manipulation to make Slaves out of Free Thinkers:

 

https://jonrappoport.wordpress.com/2016/12/15/send-your-kid-to-college-support-the-surveillance-state/

 

What are college students focusing on these days—apart from sex, booze, and drugs? Well, moral values, if you can call a deep desire for “free everything” a value. And maybe “feeling triggered” and “needing a safe space” is also, somehow, a value. As is demanding that many words be excised from the English language, because they might offend someone who is a member of a designated victim-class. College is quite a scene these days.

 

 

Therefore, a different kind of propaganda had to be sprayed on students; the most shallow kind of “social justice” possible—in order to divert these boys and girls from revealing the underlying corruption of their adult minders. Hence, China-style political correctness.

 

These days, students are, for the most part, oblivious to how their colleges and universities are funded.

 

I’m not talking about donations from graduates and boosters, or revenue generated from televised football games. I’m talking, for example, about secretive government agencies.

 

CIA, NSA, DIA (Defense Intelligence Agency).

 

At WikiLeaks, Julian Assange posted an overview (10/7/2007), “On the take and loving it—academic recipients of the US intelligence budget.”

 

Consider Assange’s stunning conclusion: “Over the last decade, U.S intelligence funding of academic research has taken on cavalier, even brazen qualities. This article reveals over 3,000 National Security Agency and over 100 Defense Intelligence Agency funded papers [written by professors] and draws attention to recent unreported revelations of CIA funding for torture research.”

 

Torture research. If people need evidence that the CIA’s MKULTRA is still alive, there it is.

 

Assange: “The NSA has pushed tens or hundreds of millions into the academy [colleges] through research grants using one particular grant code. NSA funding sources are often nakedly, even proudly, declared in research papers (‘I may be nothing, but look, a big gang threw me a sovereign’). Some researchers try to conceal or otherwise downplay the source using accepted covers, weasel words and READ ENTIRETY (Send your kid to college: support the Surveillance State: The NSA is alive and well on campuses; By Jon Rappoport; Jon Rappoport’s Blog; 12/15/16)

 

PAY ATTENTION TO THIS California Legislation!!!!!!!!!!!!!!!

 

https://jonrappoport.wordpress.com/2016/12/15/bombshell-sacrificing-children-to-the-state-of-california-sb18/

 

This article is dedicated to Patrick Wood, author of Technocracy Rising, a book everyone should read. Yesterday.

 

A bill introduced by the notorious Richard Pan, the mover and shaker behind the mandatory vaccination law in CA—this new one, SB18, is a grab-bag of generalities basically giving over care of children to the State.

 

Catch the flavor of the wording. It emerges like swamp gas:

 

“The Legislature finds and declares that all children and youth, regardless of gender, class, race, ethnicity, national origin, culture, religion, immigration status, sexual orientation, or ability, have inherent rights that entitle them to protection, special care, and assistance, including, but not limited to, the following: The right to parents, guardians, or caregivers who act in their best interest. The right to form healthy attachments with adults responsible for their care and well-being. The right to live in a safe and healthy environment. The right to social and emotional well-being. The right to opportunities to attain optimal cognitive, physical, and social development. The right to appropriate, quality education and life skills leading to self-sufficiency in adulthood. The right to appropriate, quality health care.”

 

 

This bill is basically setting up the population of California for state regulatory agencies to fill in the blanks later, to make specific controls out of the vague generalities in the bill. Get it?

 

“Medical care and nutrition and parenting and education are what we say they are. We define and enforce, you obey.”

 

SB18 is also an invitation to immigrants anywhere in the world who can get to California with their children, or will give birth to children after arriving: “Just be here and we’ll take care of you.”

 

But let’s go to the money. In SB18, a group is referred to: the Peninsula Partnership Leadership Council (when you go to “Assembly Concurrent Resolution No. 80” referenced in SB18):

 

 

This Council has already written a children’s bill of rights, and SB18 is saying this is the model. This is the framework. This the pattern they’re following.

 

 

The Peninsula Partnership Leadership Council (PPLC) is composed of the San Mateo County Superintendent of Schools, the County Board of Supervisors and the Silicon Valley Community Foundation.

 

And now we hit pay dirt: THE SILICON VALLEY COMMUNITY FOUNDATION.

 

Bam.

 

It’s a non-profit that has assets of $7.3 BILLION. It runs 1800 philanthropic funds. Here are some of its corporate partners:

 

Alexza Pharmaceuticals. Microsoft. Pepsico Foundation. Cisco. Hewlett Packard. Dell. Symantec. Unilever. Plus something called the SV2 Silicon Valley Social Venture Fund, “building and scaling social inventions.”

 

For some reason, this huge Foundation is pushing a children’s bill of rights that is reflected in a new CA bill, SB18, that will eventually make the State the top-dog controlling force over all children in California.

 

You can bet these corporate partners will reap profits. Beyond that, this is their version of a MASSIVE social engineering program. And that program is part of a technocratic movement to plan, format, and run the lives of the population from cradle to grave, because…

 

 

They should rule the future because they can plot and chart it out, based on their version (you weren’t consulted) of “greatest good for the greatest number.”

 

The best place to start? THE CHILDREN.

 

This is READ ENTIRETY (Bombshell: Sacrificing children to the state of California: SB18: Watch out for the big money behind this operation: it’s the secret: Watch out for the big money behind this operation: it’s the secret; By Jon Rappoport; Jon Rappoport’s Blog; 12/15/16)

 

+++

US Government Workers using Child Porn

12/16/2016 12:19 PM

 

*****ATTENTION***** “Impunity for US government workers using child porn” — THINK ABOUT THIS …. WHERE IS THE MAIN STREAM MEDIA ON THIS???????????? THIS #PIZZAGATE is way to big a Deal to not be Government Connected because this would not be going on as is described in this Video:

 

https://www.youtube.com/watch?v=TPCsm-MgpTg

 

VIDEO: Impunity for US government workers using child porn

 

Posted by Lori Handrahan

Published on Sep 23, 2012

 

Prof Lori Handrahan of American University outlines cases where employees in e.g. judiciary, police, foreign service are being protected by the Department of Justice when they are caught using child porn. Specific cases from Vermont and Maine are described.

 

Child Porn Nation: America’s Hidden Security Threat. This is a Big Deal!!!!!!

 

https://responsiblebusiness.co/daniel-rosen-s-arrest-1f7befb1762c#.2891m3vea

 

fairfax-county-pd-search-warrant-for-daniel-rosen-redacted

Fairfax County PD Search Warrant for Daniel Rosen (Redacted)

Fairfax County PD Search Warrant for Daniel Rosen as reported by @NBC’s @JulieCareyNBC

 

When Senator Lamar Alexander’s (R TN) Chief of Staff, Ryan Loskarn, was arrested, last year, for trading in the rape and torture of children, aka child pornography, not one journalist provided context to the story. The media reported Loskarn’s arrest, and subsequent suicide pending trial, as if it were a one-off event. As if, no other high-level government employees were being arrested on child porn charges.

 

So, I suppose I should be thrilled to see that both Paul Farrell, the Breaking News Editor for Heavy, and Shane Harris, Sr. Intelligence and National Security Correspondent for The Daily Beast and New America Foundation Fellow, tried to provide context to the State Department’s Director of Counterterrorism, Daniel Rosen’s arrest, 26 February 2015, on charges of computer solicit of a child under 15 years old for sex/sodomy.

 

fairfax-county-pd-search-warrant-for-daniel-rosen-redacted-expanded

Fairfax County PD Search Warrant for Daniel Rosen (Redacted & Expanded)

 

Farrell reported Rosen’s arrest was “the Second Child Sex Scandal to Hit D.C. in 12 Months.” Harris said Rosen’s arrest marks the “3rd U.S. Official Hit With Child Sex and Porn Charges.”
… A simple Google or Twitter search reveals far more than two or three government officials arrested on similar charges.

 

Research 101

 

As I have been documenting, for years now, by all accounts there is both a national child porn crisis and, within that, a crisis of American federal and state employees engaged in child porn. In what appears to be epidemic numbers men are down-loading child porn often on their work computers at The PentagonThe Department of Homeland Security (DHS), The Department of Justice (DOJ), Immigration and Customs Enforcement (ICE), The Department of Transportation (DOT), The Transportation Security Agency (TSA), The Federal Bureau of Investigations (FBI), The Central Intelligence Agency (CIA) not to mention state-level police departments from Maine to California.

 

Maine’s Governor, Paul LePage, has recognized this crisis by issuing the first, to my knowledge, of its kind Executive Order, on 20 February 2015, prohibiting READ ENTIRETY (State Dept. Dan Rosen’s Arrest: Cheat Sheet for Journos; By Lori Handrahan; Responsible Business; 2/27/16)

 

Would they PUSH the Russian Hacking/Aleppo-Syria Narrative to get Obama to Start a WAR in SYRIA over this and dump it on TRUMP to take the light off the 150-Billion-dollar Child Sex Trafficking/Porn Industry?

 

http://www.hadassah.org/advocate/human-trafficking.html

Every day, men, women and children are forced, defrauded, or coerced into labor or sexual exploitation, with 20.9 million victims of human trafficking globally. Trafficking and its related crimes not only harms the victims involved; they also undermine the social, political and economic fabric of the nations where they occur by devaluing individuals, demeaning women, and increasing violence and crime.

 

Join Hadassah in raising awareness and urge policy makers at the local, state, and federals levels to take action.

 

Links to various articles on Human Trafficking (Human Trafficking; Hadassah.org)

 

And NOW with the Hillary Clinton Donors wanting to know why they Lost 1.2 Billion in donations and want Answers because these People are part of this 150-Billion-dollar Child Sex Trafficking Industry. They are going to FORCE Obama to create WAR before he leaves office in Syria using the Russian/Hacking/Aleppo Syria narrative and dump it on TRUMP and this will distract the light on this!!!!!
WHAT’S THE TRUTH????? You know what’s amazing is the propaganda being put out by MS Media that the USA needs to go to War with Russia in Syria to stop Assad while we have this Canadian News Journalist saying it’s not Assad doing the Bombing and War Crimes against his People, ITS THE Obama Backed Rebels!!!!!

 

https://www.youtube.com/watch?v=_pGkFMho6Co

VIDEO: General Wesley Clark Asked About 7 Country War Plan

 

Posted by WeAreChange 

Published on Sep 25, 2013

 

In this video Luke Rudkowski asks General Wesley Clark about a speech he made where he revealed pentagon plans for War with seven countries in five years. Clark’s reaction speaks volumes as he does not say much and walks off when asked about Obama’s handling of Syria, one of the countries mentioned in the pentagon plan.

Watch Clark’s speech READ THE REST

General Clark in 2007:

 

https://www.youtube.com/watch?v=SXS3vW47mOE

VIDEO: The Plan — according to U.S. General Wesley Clark (Ret.)

 

Posted by RBoon

Uploaded on Mar 17, 2007

 

In an interview with Amy Goodman on March 2, 2007, U.S. General Wesley Clark (Ret.), explains that the Bush Administration planned to take out 7 countries in 5 years: Iraq, Syria, Lebanon, Lybia [sic], Somalia, Sudan, Iran

https://www.youtube.com/watch?v=ojcoKnTGf4s&t=306s

VIDEO: General Wesley Clark explains ISIS was created by U.S. Allies [Blog Editor: Warning—a bit of profanity to expression his passion]

 

Posted by AMTV

Published on Feb 22, 2015

 

In today’s video, Christopher Greene of AMTV reports on a Wesley Clark interview on ISIS.
AMTV Website: http://www.amtvmedia.com
Donate $5 / month to AMTV: http://www.amtvmedia.com/donate/
Get our weekly Newsletter: http://www.amtvmedia.com/newsletter/

 

READ THE REST

 

https://www.youtube.com/watch?v=hTyZf99-uZk

VIDEO: The Truth About Aleppo Syria [Blog Editor: Warning—a bit of profanity to expression his passion]

 

 

Posted by AMTV

Published on Dec 14, 2016

 

In today’s video, Christopher Greene of AMTV reports on The Truth About Aleppo Syria.
Click Here to Support!👊🏻
https://www.gofundme.com/alternative-media-television

READ THE REST

 

Pentagon paid 500 million to produce Fake Video Propaganda in Iraq, how do we know if they are not Creating this Russian Propaganda???

 

https://www.youtube.com/watch?v=yKbmQebajeQ

VIDEO: Reality Check: Pentagon Paid $500 Million to PR Firm To Create Iraq Propaganda Videos

 

Posted by Ben Swann

Published on Oct 11, 2016

 

The USA needs to find a New Foreign Policy Strategy to avert WW3.

 

+++

Russian Hacking/Aleppo Syria Narrative

12/16/2016 3:10 PM

 

I am telling you this Russian Hacking/Aleppo Syria Narrative the Liberal Media and Obama Hillary players are singing is to INSTIGATE WAR in Syria and then Dump it on TRUMP. I would not let them do it just Like not letting them say Benghazi was because of a Video!!!!!

 

http://www.bizpacreview.com/2016/12/16/month-left-office-mr-red-line-obama-vows-action-russia-424413

 

With about a month left to go in his administration President Obama has finally decided to go after Russia.

 

“I think there is no doubt that when any foreign government tries to impact the integrity of our elections, that we need to take action and we will — at a time and place of our own choosing,” he told NPR in an interview set to air on Friday.

 

 

“When I receive a final report, you know, we’ll be able to, I think, give a comprehensive and best guess as to those motivations,” he said.

 

 

Yes, even as the FBI says it does not know the motivation for the hack President Obama has decided what the motivation was.

 

Even as Julian Assange insisted Russia was not responsible for the leaked DNC emails, Obama knows better.

 

And even as his own Attorney General Loretta Lynch said the administration found no evidence of “technical interference” by the Russians, the president wants to start a conflict.

 

Many of social media had doubts that President Obama would deliver any type of significant READ ENTIRETY (With a month left in office ‘Mr. Red Line’ Obama vows action against Russia; By Carmine Sabia; BizPacReview; 12/16/16)

 

+++

How Russia Hacked into the DNC and NOT the RNC

12/17/2016 10:51 PM

 

Bloomberg quotes a cybersecurity expert saying the Missile Defense Agency’s use of porn is concerning because “many pornographic websites are infected and criminals and foreign intelligence services such as Russia’s use them to gain access and harvest data.” [Blog Editor: The above quote is what Newbill highlights from the Washington Times article below.]

 

http://www.washingtontimes.com/news/2012/aug/10/executive-branch-porn-problem/

 

Allen W. Dulles, former director of the Central Intelligence Agency (CIA) wrote in “The Craft of Intelligence,” “sex and hard-headed intelligence operations rarely mix well.” Perhaps the boys at the Pentagon need a refresher course.

 

This past week, the Pentagon’s Missile Defense Agency warned its staff not to view porn on U.S. government computers. The Pentagon also released a report on April’s Secret Service Colombian scandal. The two are connected.

 

In April, I said the Colombian scandal exposed a national security problem, the epidemic of U.S. government employees viewing porn — child porn — on government networks. I suggested readers type “Transportation Security Administration,” “U.S. State Department,” “Pentagon,” “Immigration and Customs Enforcement” and “child porn” into Google’s search field to understand the scope. I neglected to include “Missile Defense Agency.”

 

Bloomberg quotes a cybersecurity expert saying the Missile Defense Agency’s use of porn is concerning because “many pornographic websites are infected and criminals and foreign intelligence services such as Russia’s use them to gain access and harvest data.”

 

 

Thomas Jefferson once said he feared for his country when he reflected that God was just. I, too, fear for my country. No one is home in the Obama White House, and the Russians know this. Allen Dulles must be rolling in his grave. Americans should be extremely concerned. READ ENTIRETY (HANDRAHAN: Executive branch porn problem; By Lori Handrahan; Washington Times; 8/10/12)

 

+++

Is this Bill Clinton’s tactic?

12/20/2016 8:54 AM

 

Bill Clinton said Angry white men voted Trump in … so is Bill Clinton using Racism to divide the Arabs from the Middle East and any other class of people from around the world with Money that will listen to he and the Democrats and “DONATE” to the Clintons so they can continue with their Division Politics??????????????

 

[Blog Editor: Unfortunately, Newbill didn’t leave link associated with this thought. I stumbled upon the subject in another person’s email. Which I provide below.]

 

Trump Fires Back at Bill Clinton’s Insulting Remarks

http://www.themadpatriots.com/freedom-news/trump-fires-back-at-bill-clintons-insulting-remarks/

 

 

While Hillary has remained relatively quiet about her general election opponent since the upset heard ’round the world, her husband couldn’t resist getting his digs in. According to an editorial in the Bedford-Pound Ridge Record Review, Bill Clinton indulged shoppers at a New York bookstore with some thoughts about the election and the next president.

 

“He doesn’t know much,” Clinton said of Trump. “One thing he does know is how to get angry, white men to vote for him.”

 

Clinton went on to express astonishment that Trump would call him the day after the election with a conciliatory tone. “Like it happened 15 years ago,” he scoffed.

 

On Twitter, the president-elect responded to Clinton’s remarks by “correcting the record.”

 

“Bill Clinton stated that I called him after the election,” Trump wrote Tuesday. “Wrong, he called me (with a very nice congratulations). He ‘doesn’t know much,’ especially how to get people, even with an unlimited budget, out to vote in the vital swing states (and more). They focused on wrong states.”

 

 

… why is it okay for Bill Clinton to talk about “angry white men” in this way? Can you imagine if Trump lost and blamed “angry black men” for his defeat? When did it become acceptable to talk about white voters like they’re a cancer on the United States? Maybe if the Democrats didn’t treat whites as the root of all Western evil, they would have won.

 

Frankly, Trump’s response to Clinton was much friendlier than it could have been, and READ ENTIRETY (Trump Fires Back at Bill Clinton’s Insulting Remarks; By admin; The Mad Patriots; 12/20/16)

 

____________________

Edited by John R. Houk

Text and links embraced by brackets are by the Editor.

 

© Tony Newbill

 

2 Huma Abedin Exposé Videos


Edited by John R. Houk

Posted November 2, 2016

huma-history-running-a-hillary-white-house

Here are couple of video related to Crooked Hillary’s closest Aide Huma Abedin. It is to be noted this Radical Muslim mole has had access to U.S. government classified data both personally and via Crooked Hillary as evidenced by Wikileaks, Crooked Hillary’s illegal private server and the Weiner-Abedin personal laptop.

 

JRH 11/2/16

Please Support NCCR

*****************

VIDEO: Hillary’s #1 aide Huma Abedin: Undeniable ties to terrorists & 9/11 funders (Watch before voting!)

 

 

Posted by Anonymous

Published on Oct 24, 2016

 

LIKE | COMMENT | SHARE | SUBSCRIBE
Hillary’s #1 aide Huma Abedin: Undeniable ties to terrorists & 9/11 funders (Watch before voting!)
Credit: Video, script, animation & voice created by Leaked Uploads.
Feedback/Contact: leakeduploads@gmail.com
https://www.youtube.com/c/leakeduploads

 

We Are Anonymous.
We Are Legion.
We Do Not Forgive.
We Do Not Forget.
United As One.
Divided By Zero.
Expect Us.

READ THE REST

+++

VIDEO: Huma Abedin in 2mins: The spy for Saudi Arabia- FBI is closing in. Watch before voting!

 

 

Posted by Leaked Uploads

Published on Nov 1, 2016

 

WATCH THE FULL 8MIN IN-DEPTH VIDEO
This is just a taste: bit.ly/2dbzVsC

Video, script, animation & voice created by Leaked Uploads.
Feedback/Contact: leakeduploads@gmail.com

Update: Huma Abedin may become Secretary of State next year.

Sources:
1) Institute of Muslim Minority Affairs, Huma’s family business her mother and brother still work at. http://www.imma.org.uk/

2) Muslim World League (Saudi terrorists) http://www.mwllo.org.uk/
Please share this important information with friends and family.

Saudi Arabia and 9/11:
https://28pages.org/the-declassified-28-pages/

Muslim Brotherhood Explanatory Memorandum:
http://www.clarionproject.org/Muslim_Brotherhood_Explanatory_Memorandum
FBI Holy Land Foundation Trial:
https://archives.fbi.gov/archives/news/stories/2008/november/hlf112508  

History of Muslim Brotherhood penetration:
https://counterjihadreport.com/history-of-muslim-brotherhood-penetration-of-the-u-s-government/
Huma security concern FBI
https://counterjihadreport.com/2016/10/27/breaking-fbi-notes-reveal-security-concerns-over-huma-abedin/

Stephen Coughlin’s “Red Pill” Brief
https://counterjihadreport.com/catastrophic-failure-blindfolding-america-in-the-face-of-jihad/
Huma:
http://www.centerforsecuritypolicy.org/2016/09/08/huma-abedins-influence-in-the-sate-department/

Muslim Minority Affairs info:
https://counterjihadreport.com/tag/journal-of-muslim-minority-affairs/

Document by Huma’s family business with Omar Naseef listed:
http://www.tandfonline.com/doi/abs/10.1080/13602009808716388

Saudi funding 20% of Clinton campaign: http://www.zerohedge.com/news/2016-06-13/saudi-arabia-has-funded-20-hillarys-presidential-campaign-saudi-crown-prince-claims

If any information in this video is incorrect please comment below with your specific objection and supply your source.
———
Feel free to mirror this video but please link to this video for people to see source links. https://www.youtube.com/c/LeakedUploads

Media companies who want a hi-res download of the vid for their own reporting please email request to leakeduploads@gmail.com.

Special thanks to Lee Stranahan for bringing this to my attention via one of his periscope’s. See Lee’s work here: http://www.breitbart.com/author/lee-stranahan/  
https://twitter.com/stranahan

+++

imagine-mb-white-house-spy-huma-abedin