“The senator from Kentucky,” said John McCain, speaking of his colleague Rand Paul, “is working for Vladimir Putin … and I do not say that lightly.” What did Sen. Paul do to deserve being called a hireling of Vladimir Putin? He declined to support McCain’s call for a unanimous Senate vote to bring Montenegro into […]
Hhhhmmm — Is Mike Pence The Deep State’s Insurance Policy?…
REPORT: More Citizens of Saudi Arabia Have Joined Islamic State Than Any Other Country…
The Sunni Islamic State (ISIS/ISIL) has boasted that key U.S. Middle East ally Saudi Arabia is the top provider of terrorists for the jihadist group in Iraq, reports Fox News, citing Iraqi military sources. Sunni Saudi Arabia shares an estimated 500-mile-long border with war-ravaged Iraq. Nevertheless, Fox News reports that the Saudi jihadists crossed into […]
Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential Documents On The CIA”…
Last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”…
MORE on WikiLeaks: Publishes ‘Entire Hacking Capacity of the CIA’…Mind Blowing!!!…
According to the cache of documents released, the CIA’s Mobile Devices Branch (MDB) has developed multiple tools and systems to hack popular smart phones and remotely order them to send both location data as well as audio and text communications. The phones’ cameras and microphones can also be remotely activated at will…
Could Turn Smart TVs into Listening Devices…
After NSA Hacking Exposé, CIA Staffers Asked Where Equation Group went Wrong…
CIA Docs Reveal U.S. Consulate in Frankfurt as Hacking Base…
Snowden: What The Wikileaks Revelations Show Is “Reckless Beyond Words”…
Wikileaks: CIA ‘Stole’ Russian Malware, Uses It to ‘Misdirect Attribution’ of Cyber Attacks…
- « Previous Page
- 1
- …
- 35
- 36
- 37
- 38
- 39
- …
- 44
- Next Page »