And there it is….. Ukrainian President Volodymyr Zelenskyy delivered a public broadcast urging the allied western nations to quickly adopt “green energy” policies which he says will undermine the influence of Russia in Europe. If you’ve been following events, this demand is yet another big puzzle piece coming together. {Go Deep 1, Go Deep 2, and Go Deep 3)…
EU Steps Back from Impractical Russia Oil Embargo: Kemp…
EU leaders have stepped back from imposing an immediate embargo on Russian crude and petroleum product imports as the impracticality of the policy has become clear. Imposing an immediate embargo on Russia’s fossil fuels “from one day to the next would mean plunging our country and the whole of Europe into a recession…
It All Comes Together: Hunter, Burisma, Kolomoisky, Zelensky And The “Children Burned Alive In Donetsk”…
s the US being drawn into WW 3 over the corruption of the Biden crime family? Burisma Holdings is owned by oligarch Ihor Kolomoisky, who backed the campaign of President Volodymyr Zelensky and funded the neo-Nazi Azov Battalion, writes blogger Kanekoa the Great. The profound corruption of Hunter Biden and The Big Guy in Ukraine may also explain Hunter’s mysterious reference to “children burned alive in Donetsk.”…
Ukraine SitRep – Part II of Russia’s Military Operation Unfolds
The Russian military operation in Ukraine began with a rather small force of some 150.000+ men against a much larger (including reservist and territorial forces) Ukrainian force of some 400.000. The Russian force used maneuver warfare to fix the larger Ukrainian forces into place. It attacked on a large front and threatened major population concentrations, i.e. cities…
More Details Emerge About Hunter Biden Tax Evasion Probe…
Earlier this month, we reported on comments made by the lawyer representing Hunter Biden’s “baby mama” (a Texas exotic dancer named Lunden Roberts), who claimed that he would be “surprised” if the younger Biden isn’t indicted in an ongoing tax-evasion probe…
Biden’s Reckless Words Underscore the Dangers of the U.S.’s Use of Ukraine As a Proxy War…
As grave of a threat as deliberate war is, unintended escalation from miscommunication and misperception can be as bad. Biden is the perfect vessel for such risks…
Zelenskyy Worried About Western Financial Support After Video Surfaces Showing Ukraine Military Torturing Russian POW’s…
BACKGROUND – The purpose of the shift in Big Tech ‘terms and conditions‘ for the promotion of violence, was seemingly to enhance the western propaganda campaign. Elevating Ukraine’s victim status in the minds of the ordinary citizens, while supporting the negative promotional campaign against Russia and Vladimir Putin was part of the design…
Interesting Map Shows Countries Who Support Western Govt Sanctions Against Russia vs Those Who Do Not…
An enterprising journalist from Bolivia [Twitter Link] mapped the countries that support the sanctions against Russia (yellow) versus the countries that are not participating in the western sanctions against Russia (grey). The image provides a visual reference to consider our previous discussions about the cleaving of the global economy between two overarching ideologies…
White House Walks Back Multiple Biden Remarks During Europe Trip on Putin, Chemical Weapons, Troops…
Biden said that Putin ‘cannot remain in power’ during a speech in Poland Saturday…
Hunter Biden Laptop Contains Multiple Department of Defense ‘Encryption Keys’ with Twenty Plus Year Expiration Dates to Allow Holder Access to DoD Databases…
After receiving further information from sources inside the DoD, we have confirmed the ‘root certificates’ found on the Hunter Biden laptop could be related to his work as a public affairs officer in the US Navy for several months before he was discharged for drug use, possibly for use in email communications. In any event, the certificates should have been wiped from his private device per procedure. If the certificates were downloaded at a later date via other government personal with access, this would a violation of procedure and a possible vulnerability. We do not have a way at this time to verify the timing of the use of these certificates…
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 12
- Next Page »