Category Archives: NSA

Julian Assange: Hillary Clinton Is Lying, I Have Proof | Your News Wire

 

September 8, 2016 by Baxter Dmitry

Julian Assange said Tuesday night that Hillary Clinton lied to the FBI when she said she didn’t know what the classified “c” marker means in government email correspondences, and the WikiLeaks founder proved his claims by producing thousands of examples of Clinton using the “c” marker herself in correspondence.

She is lying,” Assange told Fox News. “And it is disturbing that [FBI Director James] Comey goes along with that game.

Details of Clinton’s testimony to the FBI released on late on Friday afternoon show that the former secretary of state repeatedly claimed she could not remember what the “c” symbol meant.

When asked what the parenthetical “c”meant before a paragraph within the captioned email,” read the FBI’s notes, “she [Clinton] stated she did not know and could only speculate it was referencing paragraphs marked in alphabetical order.”

According to Assange, this is “an incredible lie.

Continue reading Julian Assange: Hillary Clinton Is Lying, I Have Proof | Your News Wire

What On Earth Is Going On With People – Cuss & Discuss – Dr William Mount

Friday, September 9, 2016

https://youtu.be/q0ejoDzogdQ

Video: What On Earth Is Going On – Cuss & Discuss – YouTube

What the heck is going on around the world?

Has everyone lost it?

We sit at home and try to have some peace and quiet while this incredible evil is operating all around us.

Just at home we had 4 really strange experiences you might fully understand:

1) We got T-Boned last month by a young gal who T-Bones someone else the week before when she ran a stop sign during rush hour traffic.

2) We finally got the Title for our Truck from Capitol One after 14 years.

3) We joined a Museum and was then told by a young kid we cannot enter until tomorrow? Bizarre…

Continue reading What On Earth Is Going On With People – Cuss & Discuss – Dr William Mount

Thousands Of Russian Troops Rushed To US Northern Border And South America

September 9, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

A startling Ministry of Defense (MoD) report circulating in the Kremlin today says that up to 50,000 Federation military personnel, their equipment, aircraft and armaments were ordered earlier today to begin the nations largest ever  “asymmetric warfare” combat operation bringing these troops within 85 kilometers (52 miles) of the United States northern border and into the heart of South America.  [Note: Obama-Clinton hatred of both Russia and Israel is due to neither of these nations acceptance of what is called open border globalization.] [Note: Some words and/or phrases appearing in quotes in this report are English language approximations of Russian words/phrases having no exact counterpart.]

According to the MoD in their report, this “surprise/rapid” order was issued to the commanders of the over 120,000 Federation troops currently engaged in the Southern Military District operation codenamed Caucasus-2016, and whose actions can only be described as being a preparation for all-out war.

Continue reading Thousands Of Russian Troops Rushed To US Northern Border And South America

DR WILLIAM MOUNT: US (ISIS) Goes On Bombing Spree

Thursday, September 8, 2016

US (ISIS) LED FORCES ON BOMBING SPREE

https://youtu.be/q0ejoDzogdQ

Video:  US Led ISIS On Bombing Spree – YouTube

Jim Willie is right – it really is the King Dollar Reign off Terror

Hitler: A FASCIST Government must have continual war to survive

Over the last 2 weeks US led ISIS forces led out of the US Embassy in Ankara Turkey have killed 53 people and wounded hundreds

The attacks involved 6 different bombings and it pretty much every major target in Syria

This meant targeting area way outside of ISIS control – including some pretty heavily guarded area – for example a Damascus Suburb that houses military officers and their families.

These blasts not only targets Syrian Military sites but also sites belonging to the Kurds

Continue reading DR WILLIAM MOUNT: US (ISIS) Goes On Bombing Spree

Draco Moon Base: Discussing Solar Systemic Changes, Military Abduction, and More » The Event Chronicle

Season 22, Episode 17

Summary By Shem El-Jamal

This episode of the Wisdom Teachings series seems to mark a point of special significance for myself and most likely many others. It seems that in recent times, events have been aligning in unexpected ways beyond those of previous instances of synchronicity. Events now seem to synchronize on a multidimensional level—not simply consisting of two points of correlation, but of multiple points which are situationally independent from one another.

icon

Wisdom Teachings with David WilcockDraco Moon Base: Season 22, Episode 17

Additionally, thoughts now seem to be manifesting at an ever-quickening rate. These accelerations may be a result of the collective consciousness of humanity unifying in greater ways than ever before. If this is true, it may mean that our collective ability to change our life course and the course of our world may be increasing as well—opening us up to possibilities never experienced before. This concentration and unification of creative potential may allow us to move forward more efficiently on our journey of evolution.

Continue reading Draco Moon Base: Discussing Solar Systemic Changes, Military Abduction, and More » The Event Chronicle

White House Emails Reveal Largest Plot Ever Discovered To Destroy America

what does it mean

August 28, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

An absolutely chilling Foreign Intelligence Service (SVR) report to the Security Council (SC) circulating in the Kremlin today is using secretly obtained” Obama-Clinton regime White House emails to detail what can only be described as the largest plot ever discovered to destroy democracy in America, and that rivals the 1932-1933 Business Plot where powerful elites in the United States sought to overthrow the newly elected President Franklin Roosevelt and establish a fascist state and align it with Germany’s National Socialist Party. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words/phrases having no exact counterpart.]

With the Business Plot having failed because the elite coup leaders choose America’s most famous military figure, General Smedley Butler, to lead their 500,000 man private army against President Roosevelt, but who remained patriotic to the citizens of his nation and reported them to the US Congress, this report says, today’s Obama-Clinton regime plot against the American people “may very well succeed”.

Continue reading White House Emails Reveal Largest Plot Ever Discovered To Destroy America

Assange Assassination Attempt? Cops Took 2 Hours to Respond

August 24, 2016 by Josie Wales

(ANTIMEDIA) The Wikileaks Twitter account reported early Monday morning that an unidentified man attempted to scale the wall of the Ecuadorian Embassy in the U.K. at 2:47 am. The “cat burglar” escaped security and managed to flee to safety while embassy security waited two hours for U.K. police to take the two minute walk from the police station to the embassy housing internationally-known whistleblower Julian Assange.

UK police took 2h to respond to Assange Embassy intruder despite 24h covert op & police station 2 mins walk away.

The Wikileaks founder has been confined to the embassy since August 2012, when Ecuador granted Assange political asylum to keep him out of the British government’s jurisdiction. According to British Foreign Secretary William Hague, Assange would under no circumstances be granted safe passage out of the country.

Continue reading Assange Assassination Attempt? Cops Took 2 Hours to Respond

The Bizarre Media Blackout Of Hacked George Soros Documents – Russian Insider

25th August 2016

The neocon-dominated media bias is basically criminal activity, it is treason

Scandal: Leaked documents released a few days ago provide juicy insider details of how a fabulously rich businessman has been using his money to influence elections in Europe, underwrite an extremist group, target U.S. citizens who disagreed with him, dictate foreign policy, and try to sway a Supreme Court ruling, among other things. Pretty compelling stuff, right?

Not if it involves leftist billionaire George Soros. In this case, the mainstream press couldn’t care less.

On Saturday, a group called DC Leaks posted more than 2,500 documents going back to 2008 that it pilfered from Soros’ Open Society Foundations’ servers. Since then, the mainstream media have shown zero interest in this gold mine of information.

We couldn’t find a single story on the New York Times, CNN, Washington Post, CBS News or other major news sites that even noted the existence of these leaked documents, let alone reported on what’s in them.

Continue reading The Bizarre Media Blackout Of Hacked George Soros Documents – Russian Insider

WikiLeaks’ Assange Warns Clinton Campaign: More Game-Changing Emails Loom | Zero Hedge

Tyler Durden's picture

Last night Fox News aired part 1 of a 2-part interview with Wikileaks founder Julian Assange.  Assange noted that they are currently reviewing “thousands of pages of material” related to the Hillary campaign which he described as “significant.”  When asked whether the new material will be leaked before the November 8th election, Assange responded “yes, absolutely.”

We have a lot of material, thousands of pages of material.  There’s a variety of different types of documents and different types of institutions that are associated with the election campaign, some quite unexpected angles that are, you know, quite interesting, some even entertaining.”

We now know that Assange planned the timing of the previous leaks to correspond with the Democratic National Convention which has since resulted in the dismissal of 5 DNC officials, including Debbie Wasserman Schultz.  We assume this leak will also be timed to maximize it’s effectiveness with speculation swirling that it could be released before one of the scheduled debates in October.

Continue reading WikiLeaks’ Assange Warns Clinton Campaign: More Game-Changing Emails Loom | Zero Hedge

Opening the Black Box of America’s Propaganda Machine – Prepare for Change

National Security Agency whistleblower Edward Snowden and WikiLeaks founder Julian Assange have doubled down recently on the games being played in cyberspace by America‘s cyber-warriors.

Snowden suggests that many of NSA’s most damaging malware programs are now in the hands of America’s opponents, thanks to enterprising foreign counter-intelligence hackers known as the Shadow Brokers. there will be more hacked bombshells to drop on Team Clinton, courtesy of weak security in Democratic National Committee and Clinton campaign computer systems.

We have entered a new phase of cyber-warfare, one in which America’s (and Israel’s) most damaging computer hacking and disruption programs are available to anyone willing to pay in Bitcoins on the cyber-black market. The Democratic Party’s leaked emails, coupled with the leaked State Department cables, has Hillary Clinton in an outrage.

These disclosures, along with the Snowden disclosures that illustrate how America spies on friend and foe, have opened the Black Box of America’s propaganda machine.

Continue reading Opening the Black Box of America’s Propaganda Machine – Prepare for Change

The N.S.A. Leak Is Real, Snowden Documents Confirm

MON, 8/22/2016 BY SAM BIDDLE

 On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.

But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told The Intercept:

The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable. So the risk is twofold: first, that the person or persons who stole this information might have used them against us. If this is indeed Russia, then one assumes that they probably have their own exploits, but there’s no need to give them any more. And now that the exploits have been released, we run the risk that ordinary criminals will use them against corporate targets.

The NSA did not respond to questions concerning ShadowBrokers, the Snowden documents, or its malware.

A MEMORABLE SECONDDATE

The offensive tools released by ShadowBrokers are organized under a litany of code names such as POLARSNEEZE and ELIGIBLE BOMBSHELL, and their exact purpose is still being assessed. But we do know more about one of the weapons: SECONDDATE.

SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware. SECONDDATE’s existence was first reported by The Intercept in 2014, as part of a look at a global computer exploitation effort code-named TURBINE. The malware server, known as FOXACID, has also been described in previously released Snowden documents.

Other documents released by The Intercept today not only tie SECONDDATE to the ShadowBrokers leak but also provide new detail on how it fits into the NSA’s broader surveillance and infection network. They also show how SECONDDATE has been used, including to spy on Pakistan and a computer system in Lebanon.

The top-secret manual that authenticates the SECONDDATE found in the wild as the same one used within the NSA is a 31-page document titled “FOXACID SOP for Operational Management” and marked as a draft. It dates to no earlier than 2010. A section within the manual describes administrative tools for tracking how victims are funneled into FOXACID, including a set of tags used to catalogue servers. When such a tag is created in relation to a SECONDDATE-related infection, the document says, a certain distinctive identifier must be used.

The same SECONDDATE MSGID string appears in 14 different files throughout the ShadowBrokers leak, including in a file titled SecondDate-3021.exe. Viewed through a code-editing program (screenshot below), the NSA’s secret number can be found hiding in plain sight.

All told, throughout many of the folders contained in the ShadowBrokers’ package (screenshot below), there are 47 files with SECONDDATE-related names, including different versions of the raw code required to execute a SECONDDATE attack, instructions for how to use it, and other related files.

After viewing the code, Green told The Intercept the MSGID string’s occurrence in both an NSA training document and this week’s leak is “unlikely to be a coincidence.” Computer security researcher Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, who has been particularly vocal in his analysis of the ShadowBrokers this week, told The Intercept “there is no way” the MSGID string’s appearance in both places is a coincidence.

WHERE SECONDDATE FITS IN

This overview jibes with previously unpublished classified files provided by Snowden that illustrate how SECONDDATE is a component of BADDECISION, a broader NSA infiltration tool. SECONDDATE helps the NSA pull off a “man in the middle” attack against users on a wireless network, tricking them into thinking they’re talking to a safe website when in reality they’ve been sent a malicious payload from an NSA server.

According to one December 2010 PowerPoint presentation titled “Introduction to BADDECISION,” that tool is also designed to send users of a wireless network, sometimes referred to as an 802.11 network, to FOXACID malware servers. Or, as the presentation puts it, BADDECISION is an “802.11 CNE [computer network exploitation] tool that uses a true man-in-the-middle attack and a frame injection technique to redirect a target client to a FOXACID server.” As another top-secret slide puts it, the attack homes in on “the greatest vulnerability to your computer: your web browser.”

One slide points out that the attack works on users with an encrypted wireless connection to the internet.

That trick, it seems, often involves BADDECISION and SECONDDATE, with the latter described as a “component” for the former. A series of diagrams in the “Introduction to BADDECISION” presentation show how an NSA operator “uses SECONDDATE to inject a redirection payload at [a] Target Client,” invisibly hijacking a user’s web browser as the user attempts to visit a benign website (in the example given, it’s CNN.com). Executed correctly, the file explains, a “Target Client continues normal webpage browsing, completely unaware,” lands on a malware-filled NSA server, and becomes infected with as much of that malware as possible — or as the presentation puts it, the user will be left “WHACKED!” In the other top-secret presentations, it’s put plainly: “How do we redirect the target to the FOXACID server without being noticed”? Simple: “Use NIGHTSTAND or BADDECISION.”

The sheer number of interlocking tools available to crack a computer is dizzying. In the FOXACID manual, government hackers are told an NSA hacker ought to be familiar with using SECONDDATE along with similar man-in-the-middle wi-fi attacks code-named MAGIC SQUIRREL and MAGICBEAN. A top-secret presentation on FOXACID lists further ways to redirect targets to the malware server system.

To position themselves within range of a vulnerable wireless network, NSA operators can use a mobile antenna system running software code-named BLINDDATE, depicted in the field in what appears to be Kabul. The software can even be attached to a drone. BLINDDATE in turn can run BADDECISION, which allows for a SECONDDATE attack.

Elsewhere in these files, there are at least two documented cases of SECONDDATE being used to successfully infect computers overseas: An April 2013 presentation boasts of successful attacks against computer systems in both Pakistan and Lebanon. In the first, NSA hackers used SECONDDATE to breach “targets in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division,” which contained documents pertaining to “the backbone of Pakistan’s Green Line communications network” used by “civilian and military leadership.”

In the latter, the NSA used SECONDDATE to pull off a man-in-the-middle attack in Lebanon “for the first time ever,” infecting a Lebanese ISP to extract “100+ MB of Hizballah Unit 1800 data,” a special subset of the terrorist group dedicated to aiding Palestinian militants.

SECONDDATE is just one method that the NSA uses to get its target’s browser pointed at a FOXACID server. Other methods include sending spam that attempts to exploit bugs in popular web-based email providers or entices targets to click on malicious links that lead to a FOXACID server. One document, a newsletter for the NSA’s Special Source Operations division, describes how NSA software other than SECONDDATE was used to repeatedly direct targets in Pakistan to FOXACID malware web servers, eventually infecting the targets’ computers.

A POTENTIALLY MUNDANE HACK

Snowden, who worked for NSA contractors Dell and Booz Allen Hamilton, has offered some context and a relatively mundane possible explanation for the leak: that the NSA headquarters was not hacked, but rather one of the computers the agency uses to plan and execute attacks was compromised. In a series of tweets, he pointed out that the NSA often lurks on systems that are supposed to be controlled by others, and it’s possible someone at the agency took control of a server and failed to clean up after themselves. A regime, hacker group, or intelligence agency could have seized the files and the opportunity to embarrass the agency.

Source: The N.S.A. Leak Is Real, Snowden Documents Confirm

Kazarian Mafia In Total Panic – DR WILLIAM MOUNT

VIDEO: Kazarian Mafia In Total Panic – YouTube

The Unholy Alliance (NWO, Cabal, Unholy Alliance) is in total panic mode at this moment in time

Last night, while most of us were asleep, the orders were given to initiate Operation Pincer: The invasion of Russia by forces of the German, Polish and French Governments – with the United States to follow and “Save The Day” and “Re-establish Peace” in Russia – 1 Million People Praying

Nobody invaded anybody.

The artillery was silent and the US Air Force stood down.

Of course – they never factored in the response from Belarus either – which has a fierce military. The though of an Invasion there by Germany as ordered by Hitler’s Daughter Angela Merkel brings back memories that should never be remembered – destruction, death camps….

Continue reading Kazarian Mafia In Total Panic – DR WILLIAM MOUNT

HILLARY AND OBAMA CREATED ISIS IN 2012 – NESARANEWS

Saturday, August 20, 2016 by Bethany Blankley

Thanks to Judicial Watch and WikiLeaks, more information continues to come out proving the involvement of Barack Obama and Hillary Clinton in creating and funding the terrorist organization, ISIS.

Several pages of a 2012 report were released, which reveal communication among Barack Obama, Hillary Clinton, the Department of Defense, Homeland Security, and the Department of State’s involvement with over throwing Assad’s Syrian regime, funding al-Qaeda, and the likelihood of ISIS emerging as a prominent force in the Middle East region.

Continue reading HILLARY AND OBAMA CREATED ISIS IN 2012 – NESARANEWS

Former Navy Officer Exposes TOP Secret Government Pact With Aliens – UFOholic.com

Published on October 9, 2015 by

Willingly or not, some people get to know the dark side of the world, mostly involving Governmental agencies or secret agencies. Most of the time they are dragged along, as the idea of power and secret information as well as being part of top organizations full of “influential” people can easily steal someone’s mind and soul.

Fortunately for us, not all individuals are the same. Some seek redemption after a life of sins, others lose their minds or even commit suicide but, there is also the case when an individual is stronger than the rest and he seeks to enlighten the rest of us, divulging secret information he had access to.

In a situation such as this, they are either considered delirious or absurd or they are assassinated (sooner or later).

Continue reading Former Navy Officer Exposes TOP Secret Government Pact With Aliens – UFOholic.com

NSA Hacked by unknown hackers called ‘The Shadow Brokers’ | Stillness in the Storm

August 16th 2016 by Aaron Kesel

The Equation Group, a cyber-attack group allegedly associated with the U.S. National Security Administration (NSA), has been hacked in an unconfirmed data dump of exploits and secret tools according to TheHackerNews.

An unknown hacker or a group of hackers calling themselves The Shadow Brokers, in addition to offering free hacked tools online, also auctioned hacked tools for $568 Million dollars in Bitcoin.

Equation Group was linked to the previous infamous Regin and Stuxnet cyber attacks now known to be state sponsored malware attacks.

Continue reading NSA Hacked by unknown hackers called ‘The Shadow Brokers’ | Stillness in the Storm

DR WILLIAM MOUNT: Hillary’s Phone Calls Hacked

Wednesday, August 17, 2016

HILLARY ONE RINGY DINGY, PHONE CALLS HACKED

https://youtu.be/UHkdfEoxVBQ

Video:…Hillary, One Ringy Dingy, Her Phone Calls Released – YouTube

This is correct. All of Hillary’s phone calls are being released.

What a News Day – so follow along closely and prepare to be wowed:

AA) Emails Released

The Emails of the following were released

1) Hillary
2) Traitor John McCain
3) George Soros
4) NSA
5) Obama’s Emails are about to be released as his Facebook and Twitter Accounts were just hacked.

This means the details of every Hillary weapons sale, from the First Gulf War in Iraq to the last war in Syria – it is all being exposed.

Continue reading DR WILLIAM MOUNT: Hillary’s Phone Calls Hacked

Panic Grips America, Shuts Down NSA, After Russia “Reveals” It Has All Hillary Clinton Phone Calls – WhatDoesItMean

sorka faal

August 17, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

A series of astounding, and often contradictory, reports emanating from the Security Council (SC), and circulating throughout the Kremlin today, show that a chasm has been created among many ministries (especially within the military and intelligence communities) due to President Putin’s “order/decree” to let the Obama regime know that the Federation was not only in control of all of Hillary Clinton’s “missing/disappeared” emails, but also of all her telephonic communications too. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words/phrases having no exact counterpart.]

 

Continue reading Panic Grips America, Shuts Down NSA, After Russia “Reveals” It Has All Hillary Clinton Phone Calls – WhatDoesItMean

Looks Like George Soros Owns Hillary Clinton As Well As Angela Merkel

17/8/2016 by Patrick Cleburne

Of all the items I have written for VDARE.com I believe the most important was last October’s Merkel: Gone Mad—Or Bribed? GOP Example Suggests The Latter. This offered what I sincerely believe is the most plausible explanation of why a veteran political leader should suddenly engineer the destruction of her own nation. (If you think that melodramatic read Germany: Nonwhite in One Generation The New Observer January 4, 2016).

In the essay I offered some reasons to think George Soros was in the lead orchestrating this atrocity.

Some found it difficult to credit that crude financial power could exert such influence on the destiny of nations, although I cited historical examples.

Happily the American Thinker’s industrious Thomas Lifson has now proved this is so: Stunning revelation: Wikileaks hack shows that Soros called the shots on US policy toward Albania August 11, 2016

Continue reading Looks Like George Soros Owns Hillary Clinton As Well As Angela Merkel

‘Pleading The Hillary’: Assange Demands Same Treatment From DOJ | Your News Wire

August 16, 2016 by Baxter Dmitry

Julian Assange says the Department of Justice (DoJ) investigation of Hillary Clinton “set a new standard” and the WikiLeaks founder is now demanding the precedents set by the DoJ should be applied to their never ending case against him.

Assange appeared on CNN’s The Lead on Monday via video link from the Ecuadorian embassy in London where he has been exiled since 2012.

Our D.C. lawyers are delivering a letter tomorrow to Attorney General Loretta Lynch asking her to explain why it is that the now six-year-long national security and criminal investigation being run against WikiLeaks, the reason I have political asylum, has not been closed,” he said.

Continue reading ‘Pleading The Hillary’: Assange Demands Same Treatment From DOJ | Your News Wire

WikiLeaks Reveals Rothschild Billion Dollar Money Laundering Plot | Your News Wire

August 16, 2016 by Baxter Dmitry

A newly discovered Wikileaks cable shows that the Rothschilds were involved in a billion dollar money laundering scheme in Africa.

The classified cable from the Public Library of US Diplomacy published by WikiLeaks exposes Rothschild Bank “advising” a “secret and corrupt” billion dollar transaction in order to create a “massive money laundering scheme” in Senegal and crash the struggling nation’s economy.

The secretive Rothchilds are rarely in the news and never publicly rebuked by governments, however the classified cable discovered by Your News Wire reveals that a US diplomatic official clearly referred to the actions of Rothschild Bank as “corrupt” and the transaction as “indefensible.”

The Rothschild-driven deal involved the Senegalese state selling off Sonatel, the national telecommunications company and most profitable public resource, in return for $1.2 billion.

Continue reading WikiLeaks Reveals Rothschild Billion Dollar Money Laundering Plot | Your News Wire

Soros hacked, thousands of Open Society Foundations files released online — RT America

More than 2,500 files from the raft of organizations run by billionaire George Soros have been leaked by hackers.

Saturday’s leak, published by DC leaks, includes hundreds of internal documents from multiple departments of Soros’ groups, predominantly the Open Society Foundations.

Continue reading Soros hacked, thousands of Open Society Foundations files released online — RT America

Hillary Clinton “Total Terror” Descends Upon Disabled Mother Who Discovered Her Link To ISIS – WhatDoesItMean

what does it mean

August 14, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

A heartbreaking Foreign Intelligence Service (SVR) report circulating in the Kremlin today details the “total terror” Hillary Clinton and her Obama regime allies have unleashed upon a disabled American mother of an autistic son who had “inadvertently/mistakenly” discovered an “electronic document” (email? photocopy?) written by the former US Secretary of State authorizing a massive weapons shipment from Benghazi, Libya, to Islamic State (ISIS/ISIL/Daesh) terrorists in Syria. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words/phrases having no exact counterpart.]

According to this report, earlier this spring the General Directorate of the General Staff (GRU) reported that they obtained a “treasure trove” of secret Islamic State documents from a Syrian village that had been retaking by Kurdish forces.

Continue reading Hillary Clinton “Total Terror” Descends Upon Disabled Mother Who Discovered Her Link To ISIS – WhatDoesItMean

Snowden Sends Distress Signal As His Whereabouts Remain Unknown | Your News Wire

August 13, 2016 by Sean Adl-Tabatabai

Internet programmers have deciphered a mysterious Tweet sent out by Edward Snowden last week, revealing that the NSA whistleblower may be in grave danger

Users on Reddit say that the 64-character Tweet sent out on 5th August, 2016, was a distress signal to those in the know.

Sputniknews.com reports:

Edward Snowden’s unexplained tweet of a 64-character hex code on Friday led many to question whether the message was a “dead man’s switch,” an automatic message set to release if the user is killed or captured, which, in that event, would prompt friends and journalists to release documents.

Continue reading Snowden Sends Distress Signal As His Whereabouts Remain Unknown | Your News Wire

Shadow Government: WikiLeaks Exposes George Soros Controlling Clinton | Your News Wire

August 13, 2016 by Baxter Dmitry

A new discovery from the WikiLeaks DNC email cache exposes George Soros issuing orders to Hillary Clinton while she was Secretary of State, and a follow up investigation reveals that Clinton carried out his instructions to the letter.

During the last 214 years, past Presidents and political leaders have tried to warn the public that the U.S. government is under the control of an “invisible government owing no allegiance and acknowledging no responsibility to the people.”

New evidence, courtesy of the latest WikiLeaks email dump, has allowed us to identify one member of the shadow government.

Continue reading Shadow Government: WikiLeaks Exposes George Soros Controlling Clinton | Your News Wire

George Soros Instructed Hillary Clinton On ‘How To Handle’ Albania | Your News Wire

 

August 12, 2016 by Edmondo Burr

In 2011 during her time as Secretary of State, Hillary Clinton was given step-by-step instructions on how to handle the unrest in Albania by billionaire George Soros, according to leaked emails by Wikileaks.

“A serious situation has arisen in Albania which needs urgent attention at senior levels of the US government,” stresses Hungarian-American businessman George Soros.

RT reports:

Dear Hillary,” begins the email dated January 24, 2011 from the founder of Open Society Foundations, Soros.

A serious situation has arisen in Albania which needs urgent attention at senior levels of the US government. You may know that an opposition demonstration in Tirana on Friday resulted in the deaths of three people and the destruction of property,” Soros says, according to the leaked email.

Continue reading George Soros Instructed Hillary Clinton On ‘How To Handle’ Albania | Your News Wire

a part of the movement to Truth!