NSA whistleblower William Binney told Tucker Carlson on Friday that the NSA is spying on “all the members of the Supreme Court, the Joint Chiefs of Staff, Congress, both House and Senate, as well as the White House.” Binney, who served the NSA for 30 years before blowing the whistle on domestic spying in 2001, Read More…
cyberwarfare
A CIA Cyber False Flag
New revelations from WikiLeaks’ ‘Vault 7’ leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own Read More…
The North Korean Nuclear Cha-cha-cha
There are few events in geopolitics so metronomically dependable you could dance to them, but the North Korean nuclear situation is one of them. It’s a military exercise cha cha cha and a nuclear testing cha cha cha. It’s a tightening sanctions cha cha cha and a “Death To America!” cha cha cha. Still, as Read More…
The Real Point Of Wikileaks Vault 7
WikiLeaks has released the first of its highly anticipated “Vault 7″… and the documents prove that the CIA not only has an enormous arsenal of lovely hacking tools and malware at its disposal, but the agency also has a fat bag of exploits that essentially allow it to take backdoor control of smart phones, televisions, Read More…
Trust CIA Hackers Who Hack France’s Election Campaign?
If a chronic thief and a liar and a con artist told you what other thieves were doing, would believe him? Perhaps if you were crazy. The CIA states that Russia hacked the US election campaign in order to sway the vote to Trump. In my previous article, I mentioned how, according to the latest Read More…
We Are Becoming The Internet, The Internet Is Becoming Us
The Internet is a military creation that has now become an essential part of communication in the modern world. Melissa Dykes explains the impact this is having on our relationships, our minds, and how we receive information. But it’s also a two-way street where we give information that is used for surveillance, targeted advertising, and Read More…






