YouTube keeps censoring this film. That tells you everything you need to know about the anti-Christian moral rot in America. We originally published this article in December of 2016. YouTube
Category Archives: CIA-intelligence
This free ebook says it well in the introduction and I cannot echo the introductory statement below strongly enough. Required reading for all those who think that things are just what the government and courts say they are…. Awaken sleepers! Cudos to Jian…
“This book is a fictional representation of true events in which names, initials, and situations have been changed to secure safety for my loved ones, professionals who have helped me at great risk, and myself.This is the story of American corporate and governmental life today, thanks to the Cold War that spawned the CIA Operation Paperclip and MK-Ultra mind control programs. Even the secret space program now in operation began with Nazi physics and mind control. Because all of this has been cloaked for over a half century in “national security,” the American public is oblivious to the existence of the evils now embedded in the very structure of its institutions and government agencies, like the post-9/11 Department of Homeland Security.It is long past time to awaken the public to what victims like myself are undergoing every day and night of the week at work and at home.Jian LiangLos Angeles, California October 2018″
U.S. government are drug dealing criminals and fascists
There is much to read about how the U.S. government, Cliton’s, Bush’s and CIA’s criminal drug dealing. The U.S. government is a cocaine mafia. They invade poor countries, fund local militia and use military conflicts to hide the drug trade.
When Bill Clinton was governor in Arkansas he helped the CIA to establish themselves there with criminal activities. The Mena airport has been used by the CIA for secret drug operations for a long time.
Bron: George Bush, Clinton, C.I.A, Cocaine, pedophilia, human trafficking
Vault7, digital fingerprints, cybersecurity, hacking, hackers, WikiLeaks, Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), Google Inc, Microsoft, Silicon Valley, Apple, Edward Snowden, Yemen, Iran, United States, Russia, Saudi Arabia
The notorious cocaine kingpin Pablo Escobar worked closely with the CIA, according to his son. In this episode of The Geopolitical Report, we look at the long history of CIA involvement in the international narcotics trade, beginning with its collaboration with the French Mafia to using drug money to illegally fund the Contras and overthrow the Sandinista government in Nicaragua. We also look at how drug profits are used to float Wall Street and the role big banks play in laundering huge amounts of illicit drug profits.
WikiLeaks: CIA hackers can pose as Russians—ring a bell? by Jon Rappoport March 7, 2017 (Part-2, here) Let’s see. The CIA claims that Russian government hackers interfered in the US election,…
Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents” – Prepare for Change
NOTE: This information is important for all who use computers and do not want them to become weapons against us. What you read here tells that they have the ability to listen to us through almost everything we have connected to the Internet, which is seen by the Covert Intel groups as “public information” and they feel entitled to use it for any purpose they see fit. I suggest disconnecting your Internet when not in use. Just unplug the feed into the router…
This morning, WikiLeaks released “the largest ever publication of confidential documents on the agency”. Since it can be quite difficult to search through the data yourself, we are assembling a list of the most notable information. The CIA can masquerade its malware as belonging to a foreign intelligence agency. The CIA stole hacking malware from the Russian Federation for their own use. The CIA is hacking everyone, including US citizens. Every microphone and webcam is remote controllable. The CIA’s exploits have been leaked internally and can be used by unauthorized people to gain access to virtually anything. CIA malware can