04.12.19 Northeast Texas. Who are the Spygate 8? There is a long list of people who could be criminally referred; the challenge is to limit it to 8 and from the the perspective of Devin Nunes (R-CA). The first round of criminal referrals given to Attorney General Bill Barr include 8 people in ... Read more...
The are more agendas in Syria then quills on a porcupine. False flag operations galore since President Trump announced his gradual withdrawal of troops from Syria and Afghanistan. The deep state is furious at President Trump for his audacity to end the perpetual war machine that greatly profits... Read more...
Dennis Montgomery, a former US Intelligence contractor is suing James Comey and other government figures for covering-up evidence he provided them proving widespread surveillance and unmasking on more than 20 Million American citizens. Circa is reporting that Montgomery says the evidence he gave ... Read more...
Do we need to boycott all advertisers supporting the Google platforms to get Google's attention? We’ll be doing shame on you articles on Facebook, YouTube, Twitter and others but they’ll just have to wait their turn. Here’s why we're starting with Google. Google is defrauding their advertis... Read more...
Spies, Lies & Intrigue The lamestream media has been obsessing on the Trump Tweet while ignoring the felonious criminal evidence that the Obama regime was spying on Donald Trump and many other private American citizens. Their hatred of Donald Trump is blinding them to the glaring facts right be... Read more...
The more we investigate into the spying on President Trump the worse it gets. It seems there were multiple agencies spying on then candidate Donald Trump ... foreign and domestic! The evil of the Obama regime keeps increasing exponentially. There were two FISA requests, one denied and the second ... Read more...
For those of you so inclined to visit the WikiLeaks Vault 7 website to examine documents so you can patch vulnerabilities the CIA exploits without cause or warrant, this FAQ written by WikiLeaks will help. Why Now? WikiLeaks published as soon as its verification and analysis were ready. In ... Read more...
CIA Malware Targets iPhone, Android, Smart TVs CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI: Center for Cyber Intelligence, a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the ... Read more...
On Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and f... Read more...
What’s legal is not always right. President Obama had the authority to order a wiretap or any other deep surveillance to spy on then candidate Donald Trump according to Judge Andrew Napolitano. The FISA law is written to grant all sitting Presidents broad powers to order deep surveillance on anyon... Read more...