Category Archives: US Military

Advocacy Group Claims US Citizens Gave Up Their Rights After 9/11 | Your News Wire

September 9, 2016 by Edmondo Burr

U.S. citizens have given up their constitutional rights following the tragic 9/11 attacks in New York under the guise of security needs.

Mike Berger of the advocacy group 911truth.org who questions the official account of the September 11 attacks, says the government used the 2001 terrorist attacks as an excuse to increase surveillance on citizens.

Sputnik reports:

After 9/11 tragic events, the US government significantly increased surveillance on its citizens covering it up by extra security measures, media director of an advocacy group 911truth.org, Mike Berger, told Sputnik.

“In the aftermath of 9/11 attacks, the US government used to scare Americans, so they would give up their privacy,” Berger said before the 15th anniversary of the tragic events. “Today no one in the country questions why do people have to open their laptops in airports and allow federal agents to look into their personal documents.”

Continue reading Advocacy Group Claims US Citizens Gave Up Their Rights After 9/11 | Your News Wire

Julian Assange: Hillary Clinton Is Lying, I Have Proof | Your News Wire

 

September 8, 2016 by Baxter Dmitry

Julian Assange said Tuesday night that Hillary Clinton lied to the FBI when she said she didn’t know what the classified “c” marker means in government email correspondences, and the WikiLeaks founder proved his claims by producing thousands of examples of Clinton using the “c” marker herself in correspondence.

She is lying,” Assange told Fox News. “And it is disturbing that [FBI Director James] Comey goes along with that game.

Details of Clinton’s testimony to the FBI released on late on Friday afternoon show that the former secretary of state repeatedly claimed she could not remember what the “c” symbol meant.

When asked what the parenthetical “c”meant before a paragraph within the captioned email,” read the FBI’s notes, “she [Clinton] stated she did not know and could only speculate it was referencing paragraphs marked in alphabetical order.”

According to Assange, this is “an incredible lie.

Continue reading Julian Assange: Hillary Clinton Is Lying, I Have Proof | Your News Wire

What On Earth Is Going On With People – Cuss & Discuss – Dr William Mount

Friday, September 9, 2016

https://youtu.be/q0ejoDzogdQ

Video: What On Earth Is Going On – Cuss & Discuss – YouTube

What the heck is going on around the world?

Has everyone lost it?

We sit at home and try to have some peace and quiet while this incredible evil is operating all around us.

Just at home we had 4 really strange experiences you might fully understand:

1) We got T-Boned last month by a young gal who T-Bones someone else the week before when she ran a stop sign during rush hour traffic.

2) We finally got the Title for our Truck from Capitol One after 14 years.

3) We joined a Museum and was then told by a young kid we cannot enter until tomorrow? Bizarre…

Continue reading What On Earth Is Going On With People – Cuss & Discuss – Dr William Mount

Thousands Of Russian Troops Rushed To US Northern Border And South America

September 9, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

A startling Ministry of Defense (MoD) report circulating in the Kremlin today says that up to 50,000 Federation military personnel, their equipment, aircraft and armaments were ordered earlier today to begin the nations largest ever  “asymmetric warfare” combat operation bringing these troops within 85 kilometers (52 miles) of the United States northern border and into the heart of South America.  [Note: Obama-Clinton hatred of both Russia and Israel is due to neither of these nations acceptance of what is called open border globalization.] [Note: Some words and/or phrases appearing in quotes in this report are English language approximations of Russian words/phrases having no exact counterpart.]

According to the MoD in their report, this “surprise/rapid” order was issued to the commanders of the over 120,000 Federation troops currently engaged in the Southern Military District operation codenamed Caucasus-2016, and whose actions can only be described as being a preparation for all-out war.

Continue reading Thousands Of Russian Troops Rushed To US Northern Border And South America

DR WILLIAM MOUNT: US (ISIS) Goes On Bombing Spree

Thursday, September 8, 2016

US (ISIS) LED FORCES ON BOMBING SPREE

https://youtu.be/q0ejoDzogdQ

Video:  US Led ISIS On Bombing Spree – YouTube

Jim Willie is right – it really is the King Dollar Reign off Terror

Hitler: A FASCIST Government must have continual war to survive

Over the last 2 weeks US led ISIS forces led out of the US Embassy in Ankara Turkey have killed 53 people and wounded hundreds

The attacks involved 6 different bombings and it pretty much every major target in Syria

This meant targeting area way outside of ISIS control – including some pretty heavily guarded area – for example a Damascus Suburb that houses military officers and their families.

These blasts not only targets Syrian Military sites but also sites belonging to the Kurds

Continue reading DR WILLIAM MOUNT: US (ISIS) Goes On Bombing Spree

Khazarian mafia bosses offer to return Tsarist gold to Russia in exchange for shelter – Weekly geo-political news and analysis Message from Benjamin Fulford

Another big sign of Khazarian mafia defeat has been the degrading treatment given to UNITED STATES OF AMERICA corporate spokesperson Barack Obama in Asia and elsewhere. Obama was literally denied red carpet treatment on his arrival in China for last weekend’s G20 summit. This was in sharp contrast to the super VIP treatment given to Canadian Prime Minister Justin Trudeau who has been recommended to China by the WDS as a better leader for North America than either Hillary Clinton or Donald Trump. Trudeau was treated like a superstar in China during a one week visit that resulted in Canada publicly dumping its support of the US corporate government by announcing its intention to join the China led AIIB.

Continue reading Khazarian mafia bosses offer to return Tsarist gold to Russia in exchange for shelter – Weekly geo-political news and analysis Message from Benjamin Fulford

Draco Moon Base: Discussing Solar Systemic Changes, Military Abduction, and More » The Event Chronicle

Season 22, Episode 17

Summary By Shem El-Jamal

This episode of the Wisdom Teachings series seems to mark a point of special significance for myself and most likely many others. It seems that in recent times, events have been aligning in unexpected ways beyond those of previous instances of synchronicity. Events now seem to synchronize on a multidimensional level—not simply consisting of two points of correlation, but of multiple points which are situationally independent from one another.

icon

Wisdom Teachings with David WilcockDraco Moon Base: Season 22, Episode 17

Additionally, thoughts now seem to be manifesting at an ever-quickening rate. These accelerations may be a result of the collective consciousness of humanity unifying in greater ways than ever before. If this is true, it may mean that our collective ability to change our life course and the course of our world may be increasing as well—opening us up to possibilities never experienced before. This concentration and unification of creative potential may allow us to move forward more efficiently on our journey of evolution.

Continue reading Draco Moon Base: Discussing Solar Systemic Changes, Military Abduction, and More » The Event Chronicle

White House Emails Reveal Largest Plot Ever Discovered To Destroy America

what does it mean

August 28, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

An absolutely chilling Foreign Intelligence Service (SVR) report to the Security Council (SC) circulating in the Kremlin today is using secretly obtained” Obama-Clinton regime White House emails to detail what can only be described as the largest plot ever discovered to destroy democracy in America, and that rivals the 1932-1933 Business Plot where powerful elites in the United States sought to overthrow the newly elected President Franklin Roosevelt and establish a fascist state and align it with Germany’s National Socialist Party. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words/phrases having no exact counterpart.]

With the Business Plot having failed because the elite coup leaders choose America’s most famous military figure, General Smedley Butler, to lead their 500,000 man private army against President Roosevelt, but who remained patriotic to the citizens of his nation and reported them to the US Congress, this report says, today’s Obama-Clinton regime plot against the American people “may very well succeed”.

Continue reading White House Emails Reveal Largest Plot Ever Discovered To Destroy America

Assange Assassination Attempt? Cops Took 2 Hours to Respond

August 24, 2016 by Josie Wales

(ANTIMEDIA) The Wikileaks Twitter account reported early Monday morning that an unidentified man attempted to scale the wall of the Ecuadorian Embassy in the U.K. at 2:47 am. The “cat burglar” escaped security and managed to flee to safety while embassy security waited two hours for U.K. police to take the two minute walk from the police station to the embassy housing internationally-known whistleblower Julian Assange.

UK police took 2h to respond to Assange Embassy intruder despite 24h covert op & police station 2 mins walk away.

The Wikileaks founder has been confined to the embassy since August 2012, when Ecuador granted Assange political asylum to keep him out of the British government’s jurisdiction. According to British Foreign Secretary William Hague, Assange would under no circumstances be granted safe passage out of the country.

Continue reading Assange Assassination Attempt? Cops Took 2 Hours to Respond

The Bizarre Media Blackout Of Hacked George Soros Documents – Russian Insider

25th August 2016

The neocon-dominated media bias is basically criminal activity, it is treason

Scandal: Leaked documents released a few days ago provide juicy insider details of how a fabulously rich businessman has been using his money to influence elections in Europe, underwrite an extremist group, target U.S. citizens who disagreed with him, dictate foreign policy, and try to sway a Supreme Court ruling, among other things. Pretty compelling stuff, right?

Not if it involves leftist billionaire George Soros. In this case, the mainstream press couldn’t care less.

On Saturday, a group called DC Leaks posted more than 2,500 documents going back to 2008 that it pilfered from Soros’ Open Society Foundations’ servers. Since then, the mainstream media have shown zero interest in this gold mine of information.

We couldn’t find a single story on the New York Times, CNN, Washington Post, CBS News or other major news sites that even noted the existence of these leaked documents, let alone reported on what’s in them.

Continue reading The Bizarre Media Blackout Of Hacked George Soros Documents – Russian Insider

ENDGAME: Syria ‘No Fly Zone’ Is Last-Ditch US Effort To Save Al-Qaeda (Video)

Wed, Aug 24, 2016 By Daniel McAdams  (Ron Paul Institute for Peace and Prosperity)

“… this de facto “no fly zone” … may be a US last-ditch effort to prevent Syrian government forces, aided by Russia, from taking back Aleppo and thus breaking the back of the foreign-backed insurgency.”

“Call it whatever you want to call it”

Reading between the lines in today’s Pentagon press briefing, a bombshell US policy shift is becoming more apparent: Syrian forces and their Russian partners are being told that conducting military operations in some parts of Syrian airspace opens them up to being shot down by the US military.

Pentagon Spokesman Peter Cook was asked numerous times in numerous ways whether this amounts to a US “no fly zone” over parts of Syria. His first response was vague but threatening:
We will use our air power as needed to protect coalition forces and our partnered operations. …We advise the Syrian regime to steer clear of [certain] areas.

Continue reading ENDGAME: Syria ‘No Fly Zone’ Is Last-Ditch US Effort To Save Al-Qaeda (Video)

WikiLeaks’ Assange Warns Clinton Campaign: More Game-Changing Emails Loom | Zero Hedge

Tyler Durden's picture

Last night Fox News aired part 1 of a 2-part interview with Wikileaks founder Julian Assange.  Assange noted that they are currently reviewing “thousands of pages of material” related to the Hillary campaign which he described as “significant.”  When asked whether the new material will be leaked before the November 8th election, Assange responded “yes, absolutely.”

We have a lot of material, thousands of pages of material.  There’s a variety of different types of documents and different types of institutions that are associated with the election campaign, some quite unexpected angles that are, you know, quite interesting, some even entertaining.”

We now know that Assange planned the timing of the previous leaks to correspond with the Democratic National Convention which has since resulted in the dismissal of 5 DNC officials, including Debbie Wasserman Schultz.  We assume this leak will also be timed to maximize it’s effectiveness with speculation swirling that it could be released before one of the scheduled debates in October.

Continue reading WikiLeaks’ Assange Warns Clinton Campaign: More Game-Changing Emails Loom | Zero Hedge

Opening the Black Box of America’s Propaganda Machine – Prepare for Change

National Security Agency whistleblower Edward Snowden and WikiLeaks founder Julian Assange have doubled down recently on the games being played in cyberspace by America‘s cyber-warriors.

Snowden suggests that many of NSA’s most damaging malware programs are now in the hands of America’s opponents, thanks to enterprising foreign counter-intelligence hackers known as the Shadow Brokers. there will be more hacked bombshells to drop on Team Clinton, courtesy of weak security in Democratic National Committee and Clinton campaign computer systems.

We have entered a new phase of cyber-warfare, one in which America’s (and Israel’s) most damaging computer hacking and disruption programs are available to anyone willing to pay in Bitcoins on the cyber-black market. The Democratic Party’s leaked emails, coupled with the leaked State Department cables, has Hillary Clinton in an outrage.

These disclosures, along with the Snowden disclosures that illustrate how America spies on friend and foe, have opened the Black Box of America’s propaganda machine.

Continue reading Opening the Black Box of America’s Propaganda Machine – Prepare for Change

The N.S.A. Leak Is Real, Snowden Documents Confirm

MON, 8/22/2016 BY SAM BIDDLE

 On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.

But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told The Intercept:

The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable. So the risk is twofold: first, that the person or persons who stole this information might have used them against us. If this is indeed Russia, then one assumes that they probably have their own exploits, but there’s no need to give them any more. And now that the exploits have been released, we run the risk that ordinary criminals will use them against corporate targets.

The NSA did not respond to questions concerning ShadowBrokers, the Snowden documents, or its malware.

A MEMORABLE SECONDDATE

The offensive tools released by ShadowBrokers are organized under a litany of code names such as POLARSNEEZE and ELIGIBLE BOMBSHELL, and their exact purpose is still being assessed. But we do know more about one of the weapons: SECONDDATE.

SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware. SECONDDATE’s existence was first reported by The Intercept in 2014, as part of a look at a global computer exploitation effort code-named TURBINE. The malware server, known as FOXACID, has also been described in previously released Snowden documents.

Other documents released by The Intercept today not only tie SECONDDATE to the ShadowBrokers leak but also provide new detail on how it fits into the NSA’s broader surveillance and infection network. They also show how SECONDDATE has been used, including to spy on Pakistan and a computer system in Lebanon.

The top-secret manual that authenticates the SECONDDATE found in the wild as the same one used within the NSA is a 31-page document titled “FOXACID SOP for Operational Management” and marked as a draft. It dates to no earlier than 2010. A section within the manual describes administrative tools for tracking how victims are funneled into FOXACID, including a set of tags used to catalogue servers. When such a tag is created in relation to a SECONDDATE-related infection, the document says, a certain distinctive identifier must be used.

The same SECONDDATE MSGID string appears in 14 different files throughout the ShadowBrokers leak, including in a file titled SecondDate-3021.exe. Viewed through a code-editing program (screenshot below), the NSA’s secret number can be found hiding in plain sight.

All told, throughout many of the folders contained in the ShadowBrokers’ package (screenshot below), there are 47 files with SECONDDATE-related names, including different versions of the raw code required to execute a SECONDDATE attack, instructions for how to use it, and other related files.

After viewing the code, Green told The Intercept the MSGID string’s occurrence in both an NSA training document and this week’s leak is “unlikely to be a coincidence.” Computer security researcher Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, who has been particularly vocal in his analysis of the ShadowBrokers this week, told The Intercept “there is no way” the MSGID string’s appearance in both places is a coincidence.

WHERE SECONDDATE FITS IN

This overview jibes with previously unpublished classified files provided by Snowden that illustrate how SECONDDATE is a component of BADDECISION, a broader NSA infiltration tool. SECONDDATE helps the NSA pull off a “man in the middle” attack against users on a wireless network, tricking them into thinking they’re talking to a safe website when in reality they’ve been sent a malicious payload from an NSA server.

According to one December 2010 PowerPoint presentation titled “Introduction to BADDECISION,” that tool is also designed to send users of a wireless network, sometimes referred to as an 802.11 network, to FOXACID malware servers. Or, as the presentation puts it, BADDECISION is an “802.11 CNE [computer network exploitation] tool that uses a true man-in-the-middle attack and a frame injection technique to redirect a target client to a FOXACID server.” As another top-secret slide puts it, the attack homes in on “the greatest vulnerability to your computer: your web browser.”

One slide points out that the attack works on users with an encrypted wireless connection to the internet.

That trick, it seems, often involves BADDECISION and SECONDDATE, with the latter described as a “component” for the former. A series of diagrams in the “Introduction to BADDECISION” presentation show how an NSA operator “uses SECONDDATE to inject a redirection payload at [a] Target Client,” invisibly hijacking a user’s web browser as the user attempts to visit a benign website (in the example given, it’s CNN.com). Executed correctly, the file explains, a “Target Client continues normal webpage browsing, completely unaware,” lands on a malware-filled NSA server, and becomes infected with as much of that malware as possible — or as the presentation puts it, the user will be left “WHACKED!” In the other top-secret presentations, it’s put plainly: “How do we redirect the target to the FOXACID server without being noticed”? Simple: “Use NIGHTSTAND or BADDECISION.”

The sheer number of interlocking tools available to crack a computer is dizzying. In the FOXACID manual, government hackers are told an NSA hacker ought to be familiar with using SECONDDATE along with similar man-in-the-middle wi-fi attacks code-named MAGIC SQUIRREL and MAGICBEAN. A top-secret presentation on FOXACID lists further ways to redirect targets to the malware server system.

To position themselves within range of a vulnerable wireless network, NSA operators can use a mobile antenna system running software code-named BLINDDATE, depicted in the field in what appears to be Kabul. The software can even be attached to a drone. BLINDDATE in turn can run BADDECISION, which allows for a SECONDDATE attack.

Elsewhere in these files, there are at least two documented cases of SECONDDATE being used to successfully infect computers overseas: An April 2013 presentation boasts of successful attacks against computer systems in both Pakistan and Lebanon. In the first, NSA hackers used SECONDDATE to breach “targets in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division,” which contained documents pertaining to “the backbone of Pakistan’s Green Line communications network” used by “civilian and military leadership.”

In the latter, the NSA used SECONDDATE to pull off a man-in-the-middle attack in Lebanon “for the first time ever,” infecting a Lebanese ISP to extract “100+ MB of Hizballah Unit 1800 data,” a special subset of the terrorist group dedicated to aiding Palestinian militants.

SECONDDATE is just one method that the NSA uses to get its target’s browser pointed at a FOXACID server. Other methods include sending spam that attempts to exploit bugs in popular web-based email providers or entices targets to click on malicious links that lead to a FOXACID server. One document, a newsletter for the NSA’s Special Source Operations division, describes how NSA software other than SECONDDATE was used to repeatedly direct targets in Pakistan to FOXACID malware web servers, eventually infecting the targets’ computers.

A POTENTIALLY MUNDANE HACK

Snowden, who worked for NSA contractors Dell and Booz Allen Hamilton, has offered some context and a relatively mundane possible explanation for the leak: that the NSA headquarters was not hacked, but rather one of the computers the agency uses to plan and execute attacks was compromised. In a series of tweets, he pointed out that the NSA often lurks on systems that are supposed to be controlled by others, and it’s possible someone at the agency took control of a server and failed to clean up after themselves. A regime, hacker group, or intelligence agency could have seized the files and the opportunity to embarrass the agency.

Source: The N.S.A. Leak Is Real, Snowden Documents Confirm

Kazarian Mafia In Total Panic – DR WILLIAM MOUNT

VIDEO: Kazarian Mafia In Total Panic – YouTube

The Unholy Alliance (NWO, Cabal, Unholy Alliance) is in total panic mode at this moment in time

Last night, while most of us were asleep, the orders were given to initiate Operation Pincer: The invasion of Russia by forces of the German, Polish and French Governments – with the United States to follow and “Save The Day” and “Re-establish Peace” in Russia – 1 Million People Praying

Nobody invaded anybody.

The artillery was silent and the US Air Force stood down.

Of course – they never factored in the response from Belarus either – which has a fierce military. The though of an Invasion there by Germany as ordered by Hitler’s Daughter Angela Merkel brings back memories that should never be remembered – destruction, death camps….

Continue reading Kazarian Mafia In Total Panic – DR WILLIAM MOUNT

HILLARY AND OBAMA CREATED ISIS IN 2012 – NESARANEWS

Saturday, August 20, 2016 by Bethany Blankley

Thanks to Judicial Watch and WikiLeaks, more information continues to come out proving the involvement of Barack Obama and Hillary Clinton in creating and funding the terrorist organization, ISIS.

Several pages of a 2012 report were released, which reveal communication among Barack Obama, Hillary Clinton, the Department of Defense, Homeland Security, and the Department of State’s involvement with over throwing Assad’s Syrian regime, funding al-Qaeda, and the likelihood of ISIS emerging as a prominent force in the Middle East region.

Continue reading HILLARY AND OBAMA CREATED ISIS IN 2012 – NESARANEWS

Former Navy Officer Exposes TOP Secret Government Pact With Aliens – UFOholic.com

Published on October 9, 2015 by

Willingly or not, some people get to know the dark side of the world, mostly involving Governmental agencies or secret agencies. Most of the time they are dragged along, as the idea of power and secret information as well as being part of top organizations full of “influential” people can easily steal someone’s mind and soul.

Fortunately for us, not all individuals are the same. Some seek redemption after a life of sins, others lose their minds or even commit suicide but, there is also the case when an individual is stronger than the rest and he seeks to enlighten the rest of us, divulging secret information he had access to.

In a situation such as this, they are either considered delirious or absurd or they are assassinated (sooner or later).

Continue reading Former Navy Officer Exposes TOP Secret Government Pact With Aliens – UFOholic.com

DR WILLIAM MOUNT: US Pulling Out Of Middle East.

https://youtu.be/8BVmGulDI-o

Video: US Pulling Out Of Middle East. – YouTube

International pressures are forcing the US Forces out of the Middle East and leaving a vacuum for power in this region

As the Dollar goes up in value and the Chinese Gold  Backed Yuan begins taking over the SDRs as the instrument for international Debt Settlement many nations are withdrawing their use of the US Dollar

What this means to you and me is that the more the US Forces War the quicker the demise of the KHAZARIAN Empire due to military part shortages.

Continue reading DR WILLIAM MOUNT: US Pulling Out Of Middle East.

NSA Hacked by unknown hackers called ‘The Shadow Brokers’ | Stillness in the Storm

August 16th 2016 by Aaron Kesel

The Equation Group, a cyber-attack group allegedly associated with the U.S. National Security Administration (NSA), has been hacked in an unconfirmed data dump of exploits and secret tools according to TheHackerNews.

An unknown hacker or a group of hackers calling themselves The Shadow Brokers, in addition to offering free hacked tools online, also auctioned hacked tools for $568 Million dollars in Bitcoin.

Equation Group was linked to the previous infamous Regin and Stuxnet cyber attacks now known to be state sponsored malware attacks.

Continue reading NSA Hacked by unknown hackers called ‘The Shadow Brokers’ | Stillness in the Storm

Giant Killed by US Soldiers in Kandahar Afghanistan? Via L.A. Marzulli and Steve Quayle (Video) | Paranormal

Wednesday, August 17, 2016 2:36

During an interview on Coast to Coast some years ago, Steven Quayle talked about a giant that was shot and killed by the US military in Kandahar Afghanistan.

It is said that the soldiers noticed something in a cave and while inspecting the cave they encountered a giant 12-15 feet tall being having red hair, 6 fingers, 6 toes, and a double row of teeth.

What followed was that the soldiers opened gunfire at the moment the giant attacked the team. According to a witness of the horrible event, one soldier was killed by the giant and it took about 30 seconds to kill the being.

After the giant was dead it seems they have loaded it on a transport pallet and flew it to an unknown location in the US for further investigation.

Continue reading Giant Killed by US Soldiers in Kandahar Afghanistan? Via L.A. Marzulli and Steve Quayle (Video) | Paranormal

DR WILLIAM MOUNT: Hillary’s Phone Calls Hacked

Wednesday, August 17, 2016

HILLARY ONE RINGY DINGY, PHONE CALLS HACKED

https://youtu.be/UHkdfEoxVBQ

Video:…Hillary, One Ringy Dingy, Her Phone Calls Released – YouTube

This is correct. All of Hillary’s phone calls are being released.

What a News Day – so follow along closely and prepare to be wowed:

AA) Emails Released

The Emails of the following were released

1) Hillary
2) Traitor John McCain
3) George Soros
4) NSA
5) Obama’s Emails are about to be released as his Facebook and Twitter Accounts were just hacked.

This means the details of every Hillary weapons sale, from the First Gulf War in Iraq to the last war in Syria – it is all being exposed.

Continue reading DR WILLIAM MOUNT: Hillary’s Phone Calls Hacked

Panic Grips America, Shuts Down NSA, After Russia “Reveals” It Has All Hillary Clinton Phone Calls – WhatDoesItMean

sorka faal

August 17, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

A series of astounding, and often contradictory, reports emanating from the Security Council (SC), and circulating throughout the Kremlin today, show that a chasm has been created among many ministries (especially within the military and intelligence communities) due to President Putin’s “order/decree” to let the Obama regime know that the Federation was not only in control of all of Hillary Clinton’s “missing/disappeared” emails, but also of all her telephonic communications too. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words/phrases having no exact counterpart.]

 

Continue reading Panic Grips America, Shuts Down NSA, After Russia “Reveals” It Has All Hillary Clinton Phone Calls – WhatDoesItMean

Looks Like George Soros Owns Hillary Clinton As Well As Angela Merkel

17/8/2016 by Patrick Cleburne

Of all the items I have written for VDARE.com I believe the most important was last October’s Merkel: Gone Mad—Or Bribed? GOP Example Suggests The Latter. This offered what I sincerely believe is the most plausible explanation of why a veteran political leader should suddenly engineer the destruction of her own nation. (If you think that melodramatic read Germany: Nonwhite in One Generation The New Observer January 4, 2016).

In the essay I offered some reasons to think George Soros was in the lead orchestrating this atrocity.

Some found it difficult to credit that crude financial power could exert such influence on the destiny of nations, although I cited historical examples.

Happily the American Thinker’s industrious Thomas Lifson has now proved this is so: Stunning revelation: Wikileaks hack shows that Soros called the shots on US policy toward Albania August 11, 2016

Continue reading Looks Like George Soros Owns Hillary Clinton As Well As Angela Merkel

‘Pleading The Hillary’: Assange Demands Same Treatment From DOJ | Your News Wire

August 16, 2016 by Baxter Dmitry

Julian Assange says the Department of Justice (DoJ) investigation of Hillary Clinton “set a new standard” and the WikiLeaks founder is now demanding the precedents set by the DoJ should be applied to their never ending case against him.

Assange appeared on CNN’s The Lead on Monday via video link from the Ecuadorian embassy in London where he has been exiled since 2012.

Our D.C. lawyers are delivering a letter tomorrow to Attorney General Loretta Lynch asking her to explain why it is that the now six-year-long national security and criminal investigation being run against WikiLeaks, the reason I have political asylum, has not been closed,” he said.

Continue reading ‘Pleading The Hillary’: Assange Demands Same Treatment From DOJ | Your News Wire

Corey Goode Intel Update Part 1 – Sphere-Being Alliance

16 Aug 2016 : 16:00

corey_goode_update_part_1

Our planet and solar system is going through a change far more profound than most people could ever imagine. Not only are extraterrestrials very real, both the positive and negative groups are far more involved in our own lives than most of us could ever realize. Although many people now discount the classic spiritual teachings that we have received over the millennia, it turns out that nothing could be of greater significance for us to study and practice.

I performed 20 years of service in the “secret space program,” which is still unknown to most people. And yet, more and more insiders are now emerging, such as aerospace engineer William Tompkins, who can independently validate many aspects of my testimony. Tompkins can be seen on Cosmic Disclosure, a weekly show on Gaia that has helped me share this message with a large audience now exceeding the TV viewership numbers of CNN.

Continue reading Corey Goode Intel Update Part 1 – Sphere-Being Alliance

a part of the movement to Truth!