PREVIOUS FREE PAGES BLOG

PREVIOUS FREE PAGES BLOG
DIPLOMATIC FREE PAGES - click image

Saturday, March 11, 2017

Top 15 Discoveries & Implications of Wikileaks CIA Vault 7 - So Far





Top 15 Discoveries & Implications of Wikileaks CIA Vault 7 - So Far








Makia FreemanContributor


Vault 7 has been the subject of a curious and cryptic set of tweets from Wikileaks over the course of the past month or so. Now we know why. In bombshell news, in the greatest leak in Wikileaks history, in the greatest leak in CIA history, a total of 8,761 documents has been released in a series that has been dubbed Vault 7. Even for seasoned conspiracy researchers, the documents are fascinating and horrible at the same time. It confirms the suspicions and knowledge of many investigators. Now we have the proof to substantiate our hunches and intuition. The CIA has been caught with its pants down: spying on its citizens, bypassing encryption to steal their messages, hacking into their electronic devices to listen on their conversations, using US consulates abroad to conduct spying operations, remotely hacking into vehicles (to perform undetectable assassinations) and much more.
Some will be shocked, but really, let’s remember the true nature and purpose of the CIA: a rogue agency that overthrows foreign leaders, install puppet regimes, imports drugs, runs guns and assassinates anyone who gets in the way of its agenda, including US presidents. Wikileaks has stated that it has only released less than 1% of its Vault 7 series, so this is literally the tip of the iceberg. Imagine what else is to come …
Here are the top 15 discoveries and implications of Vault 7 so far:

Vault 7 Discovery/Implication #1: CIA = Virus & Malware Factory

The CIA is not just a rogue agency that runs illegal drugs and weapons, assassinates people, starts wars and conducts regime change. It has also spent untold millions or even billions of dollars developing what is probably the most sophisticated cyber warfare/hacking/spying department on the planet, equalling or even surpassing that of the NSA. Wikileaks reveals that the CIA has its own “hacking division” that is run by its CCI (Center for Cyber Intelligence) which by the end of 2016:
“… had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”
Snowden’s leaks were already bad enough, showing that the NSA was an agency above the law that monitored, surveilled and spied upon just about anyone it wanted, since most people on the planet are within its reach in one way or another. Now, we have confirmation that the CIA is engaging in exactly the same kind activity, or perhaps even worse. Could there be any possible doubt left by anyone that the MIC (Military Intelligence Complex) runs the US Government and the world?

Vault 7 Discovery/Implication #2: Bypassing Encryption

You know how all these companies promise encryption and some even charge more for the service? Guess what? It doesn’t matter! Vault 7 leaked docs shows that the CIA is getting audio files before they get encrypted. The CIA can hack into your phone, compromise your operating system and suck up your messages before they’re encrypted and sent. It doesn’t matter what precautions you’ve taken. Encrypted messaging apps like WhatsApp, Signal, Telegram and many more are vulnerable.

Vault 7 Discovery/Implication #3: Bypassing Computer Operating System

The CIA can hack your computer. In fact, every part of your computer can be bypassed, including your operation system. Per Wikileaks:
“The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools.”

Vault 7 Discovery/Implication #4: Smart TVs become Spy TVs

It was obvious to anyone with half a functioning brain cell that smart TVs were basically spy TVs (see The SMART Deception), but now we have the proof. In the Vault 7 docs, the CIA has a program called Weeping Angel (read ’em and weep) that it developed with the MI5/BTSS (British Security Service). It details how the CIA can hack Samsung smart TVs and then place them in fake-off mode so that an unsuspecting owner falsely believes their TV is off – when really it is on, recording all sounds in the room and transmitting them via the net to a covert CIA server.

Vault 7 Discovery/Implication #5: MicroSoft MicroSpy Software

Bill Gates is the agenda-man for the New World Order. Clearly he sold out a long, long time ago. Kim Dotcom has been particularly vocal, calling for Gates to come clean (ain’t gonna happen) and admit how much he helped the CIA (and the MIC in general) by helping them build backdoors in the software. The CIA turned Microsoft software into spyware, using exploits that were built into the system:
“The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.
Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.”

Vault 7 Discovery/Implication #6: Skype is Vulnerable

Vault 7 reveals that conversations on Skype are converted to text then uploaded to a CIA cloud for data assortment and analysis.

Vault 7 Discovery/Implication #7: iPhones and Androids are Vulnerable

Both Apple iOS and Android systems are vulnerable. Snowden already told us this, but Vault 7 re-confirms that iPhones and Android are easily hackable. The CIA has been creating all kinds of malware to spy on practically every piece of electronic equipment you own.

Vault 7 Discovery/Implication #8: Breaking “Zero Day” Commitment by Hoarding Vulnerabilities

Wikileaks notes that Obama had promised the technology industry (after much lobbying) that the US Government would disclose any vulnerabilities as soon as it had discovered them (thus the term “zero day”). Yet the CIA stockpiled these vulnerabilities because it wanted to retain the advantage of knowing how to hack into systems and devices, which endangers everyone else who uses them:
“”Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.
As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.”

Vault 7 Discovery/Implication #9: Hijacking All Sorts of Vehicles – for Assassination

Of all the discoveries, this one is explosive – literally. Vault 7 exposes that the CIA has the ability to remotely hijack all kinds of vehicles (including cars and planes), which means it can carry out undetectable assassinations. This casts a new light on the suspicious death of Michael Hastings, whose car burst into flames and ran into a tree at high speed. It also makes one wonder about the deaths of JFK Jr. (son of John F. Kennedy) and former US senator Paul Wellstone, both of whom died in suspicious plane accidents.

Vault 7 Discovery/Implication #10: Using US Consulate in Germany as a Spy and Hacking Base

You can imagine how impressed the Germans are with the US now. Remember when it was revealed that Obama was hacking the cell phone of German Chancellor Angela Merkel? Now we learn that the CIA, in flagrant violation of international law, has been using the US consulate in Frankfurt, Germany, as a base for its spying and hacking activities, many of which in this case required a close physical proximity to the target. From Wikileaks:
“CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
Your Cover Story (for this trip)


Q: Why are you here?

A: Supporting technical consultations at the Consulate.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media.”

Vault 7 Discovery/Implication #11: CIA-Electronics Supplier Collusion

Another aspect to consider with this is CIA collusion with electronics manufacturers and suppliers. We know the CIA owns the MSM, Hollywood, the Communication Industry, etc. Wikileaks reports that the CIA’s Mobile Device Branch created technology to infect and control smartphones. Do they possess a backdoor into the software and hardware of all smartphones?

Vault 7 Discovery/Implication #12: Fiscal Damage

The CIA has caused worldwide damage that can be estimated in millions or maybe even billions of dollars, since they can’t now control the malware they have created. The CIA has lost control of the monster it created. We are all vulnerable. How much data will be hacked, how much privacy stolen and how much money will it cost to prevent and repair this breach?

Vault 7 Discovery/Implication #13: Project Umbrage: The Framing of Foreign Nations like Russia

Well well well. Remember all that brouhaha about Russia hacking the US elections? It was all lies and propaganda, but many people fell for it. Now look at this. The CIA has been using a program called Project Umbrage under which it manipulates code to make it look like it comes from somewhere else like another nation. You could call it false flag cyber terrorism. In other words, the CIA clones the hacking procedures of Russia to create false flag hacking attacks, and then says with a straight face that the attacks “are consistent with what we would expect from Russian hackers”. That may be technically truthful (but what deceit!) – however only because the CIA has first intentionally mimicked those techniques with a motive to frame an innocent party or country. As YouTuber Joe in General writes:
The CIA’s Remote Devices Branch gathers and maintains a large library of attack techniques stolen from malware produced in other countries, including Russia. One particular attack technique is the ability leave behind fake digital “fingerprints” that make it look like a CIA initiated cyber attack was done by someone else. At this early stage, its unclear if this is WikiLeaks’ interpretation of one thing the CIA could do, or if there’s a specific place in the document where the CIA mentions this use of UMBRAGE.)
This is HUGE. The ability to create a digital false flag calls into question anytime in recent history that the CIA has accused another country of hacking. “We have proof that Russia hacked the U.S election.””

Vault 7 Discovery/Implication #14: The CIA-NSA Turf War

For some time, we have known about the rivalry or turf war going on between the CIA and NSA in their struggle to become the preeminent military intelligence agency. Another implication of Vault 7 is that we now know for sure that the CIA has a hacking system that is at least equivalent to, if not better than, that of the NSA. The spying, criminality and illegality of the NSA is already miles past the line of what is acceptable in a free, open and just society. Now the CIA has doubled the criminality? Where’s the line here? What are the other 16-17 agencies doing? What’s the DIA (Defense Intelligence Agency) doing to us? What about the creepy NRO (National Reconnaisance Office), who sports mottos such as “Nothing is Beyond Our Reach” and “We Own the Night” (see above)?
Are all these agencies in some kind of selfish, macho competition to see who can enslave us the fastest?
This chart shows the CIA at the top of the tree, feeding data to the Executive Branch (the President). Black-and-white proof the CIA is above the President?

Vault 7 Discovery/Implication #15: CIA Above the Rank of President

JFK found out the hard way that presidents don’t tell what the CIA to do. The CIA tells the president what to do. The image above is interesting proof showing that the CIA is further up in the hierarchy that the Executive Branch.

Reactions

The timing of this release is interesting, given it occurred right after Trump accused Obama of wiretapping – an accusation in itself which is totally unprecedented. When has a sitting president ever even come to close to accusing a former president of any crime like that? Trump has been vindicated, but only in a certain sense. The CIA has no need to single him out when it can literally spy on anyone who owns a smart phone, smart TV or computer, or who uses Skype or WhatsApp.
Melissa Dykes of Truthstream Media suggests the leak may cause more apathy or learned helplessness, and that may be true, but it really depends on people’s attitudes in response to this information. Sadly and predictably, many US Government officials have reacted by scampering to find who did the leaking, rather than address the magnitude of the content of the leaks themselves.

Live by the Sword, Die by the Sword

The CIA has lived by the sword ever since its inception. It has always played with fire. Now it has lost control of a big chunk of its weapons – its cyber weaponry. The implications of Vault 7 are monumental yet hard to comprehend at this point. What this means is that any nation hostile to the US (and there’s a long list of invaded and subverted nations the CIA has left in its wake since 1953) can now use these weapons against America. It also opens the door to genuine criminal thief-hackers who are just out to steal information and money.
What the CIA has done is not just negligent. It’s not even just reckless – it’s brazenly criminal and utterly unaccountable.

They Want TOTAL INFORMATION CONTROL

The CIA is just another tool for the people who run the world. They want total information control. They want to know what you’re thinking. And they may already have the capacity to do that. This is just the beginning. Wikileaks has only released 1% of Vault 7. Multiply the revelations so far by 100. What do you get?
They want to know what you’re thinking and control your every act. They want you to be a completely controllable slave.
No one could be that evil? Oh yes they could, or rather, the dark force controlling them could.
Have a critical mass of people finally awoken to this horrible fact yet?
Can the Vault 7 leak get us to the point where we can fully face this reality?

About the Author
Makia Freeman is the editor of The Freedom Articles and senior researcher at ToolsForFreedom.com (FaceBook here), writing on many aspects of truth and freedom, from exposing aspects of the worldwide conspiracy to suggesting solutions for how humanity can create a new system of peace and abundance
**Sources embedded throughout article.

 

This article (Top 15 Discoveries & Implications of Wikileaks CIA Vault 7 – So Far) was originally created and published by The Freedom Articles and is re-posted here with permission. 

No comments:

Post a Comment

URGENT IMPORTANT -- FINANCIAL ASSISTANCE NEEDED FOR A YOUNG BOY 14 Y OLD WITH BRAIN CANCER

Dear Friends,

I have never asked any money/donations for myself in my blogs (400) but this is an exceptional emergency. Please help the best you can to assist Isabelle, our French Coordinator, to alleviate as much as possible her step son's health condition.



You can donate through Kees De Graaff

Type your recurring amount here:


PayPal


The email address connected with Kees Paypal account is keesdegraaff@gmail.com

Many thanks from the heart to all of you.



Manlio Dinucci


SUBTITLES -- EN, FR, IT, PT, TR

SI VOUS VOULEZ TRADUIRE LES RAPPORTS DE MANLIO DINUCCI D'ANGLAIS, FRANÇAIS OU ITALIEN DANS VOTRE LANGUE MATERNELLE, SVP VEUILLEZ DEMANDER À

IF YOU WANT TO TRANSLATE MANLIO DINUCCI'S REPORTS FROM ENGLISH, FRENCH OR ITALIAN,INTO YOUR NATIVE LANGUAGE KINDLY CONTACT

luisavasconcellos2012@gmail.com

PUTIN FRENCH



2017 FSB Meeting - RO from Roberto Petitpas on Vimeo.

BOTH VIDEOS AVAILABLE IN ENGLISH,FRENCH, ROMANIAN, PORTUGUESE

PRESIDENT





Labels

21st Century Wire A BRAMERTON A. Orlov Abayomi Azikiwe ABIZAID ABOGADOS ABOGADOS PROGRESISTAS DE ESPAÑA Acción secreta activism Adam GArrie Ajamu Baraka AL-ASSAD AL-HUSAINI Aleksandar PAVIC alex gorka Alex Lantier Alexander Azadgan ALEXANDER DUGIN ALEXANDER KUZNETSOV Alexandra Bruce Alexandre Artamonov Alexandre Cazes ALEXIS Alfred McCoy Ambrose Evans-Pritchard an Greenhalgh Ana de Sousa Dias ANA SOUSA DIAS ANASTASOV Anatol Lieven Andre Vltchek ANDREI AKULOV Andrew Griffin Andrew Korybko Andrew P. Napolitano Andrey Afanasyev animals Ann Diener Ann Wright Anna Hunt ANNA KURBATOVA Anna Von Reitz Anne Speckhard Ph. D. Anne Speckhard PH. D ANONYMOUS PATRIOTS Anti-Media News Desk Antony C. Black ap APEC aRABIC ARAM MIRZAEI Ariel Noyola Rodríguez ARJUN WALIA Asaf Durakovic Asma Assad ASMOLOV ASSANGE AUTOPSY Avelino Rodrigues AVNERY BAKER balfour bankers BAOFU barcelona Barrett Brown Bashar al-Assad Baxter Dmitry BECKER Before it's News BEGLEY BERGER BILL SARDI Binoy Kampmark BOGDANOV Brazilian BRENNAN BRIAN CLOUGHLEY Bruce Cagnon Bruce Gagnon BULGARIAN Bush family BUTLER By Jack Heart & Orage By Prof Michel Chossudovsky CABRAS Captagon Carey Wedler Carla Stea CAROL ADL CARTALUCCI CATALUNHA Catherine Austin Fitts CATHY O'BRIEN cats Chelsea Manning Choice and Truth Chossudovsky Chris Cole CHRIS HEDGES Christopher Black CIA Claire Bernish clinton Collective Evolution Comunidad Saker Latinoamérica COOK Corey Feldman cost of war counterpunch Covert Action Craig McKee CROATIAN CUNNINGHAM CURENT CONCERNS CURRENT CONCERNS Daniel Lazare Daniel McCARTHY Daniele Ganser DANSK Darius Shahtahmasebi DARK JOURNALIST DARK JOURNALISTt DAVE WEBB DAVID HOROVITZ David Lemire David STERN David Swanson DAVIDSWANSON DEAN Dean Henderson Deena Stryker Defense Pact Denali Deutsch DINNUCI DIPLOMACY Dmisa Malaroat DMITRIY SEDOV Dmitry Minin Domenico Losurdo Donald Trump doni DONINEWS Dr. Kevin Barrett DUFF DUGIN e-commerce Ed Dames EDITOR'S CHOICE EDWARD SNOWDEN El Periodico Eliason ELISABETE LUIS FIALHO Eliseo Bertolasi EMMONS endgahl ENGDAHL English Eric S. Margolis Eric Zuesse ESCOBAR EUROPE Eva Bartlett Evan at Fight for the Future Evgeny Baranov F. William Engdahl FANG Farage farewell address FBI FEDERICO PIERACCINI Felicity Arbuthnot FERRIS Field McConnell finance Finian Cunningham Follhas FORBIDDEN KNOWLEDGE TV forbidden nowledge Foster Gamble four horsemen Fr. Andrew Phillips FRANCESCA CHAMBERS Francesco Colafemmina Freeman FRENCH FRISK FULFORD Fuller G20 G20 SUMMIT GALLAGHER Gareth Porter GARY NORTH General Flynn George Gallanis GERMAN GERMANOS Gilad Atzmon Gilbert Doctorow Glen Greenwald Glenn Greenwald GLOBAL RESEARCH global warming GMO GMOS GORDON GORDON DUFF Graham E. Fuller Graham Vanbergen GRAZIA TANTA GREENHALGH GREENWALD Greg Hunter Gregory Copley GRETE MAUTNER GUEST CONTRIBUTORS GUNNAR GUTERRES HAARP HAGOPIAN Hakan Karakurt Herbert McMaster HERMAN HERNÂNI CARVALHO hill HILLARY CLINTON hollywood http://www.independent.co.uk/ http://www.northcrane.com/ http://www.salem-news.com/ http://yournewswire.com/ HUDON HUDSON Ian Greenhalgh Ian Shilling ideeCondividi INAUGURATION INCÊNDIOS INDEPENDÊNCIA Inform Clear House Internet IODINE Isaac Davis Israel ITULAIN Ivan Blot JALIFE-RAHME JAMES James A. Lucas James Comey JAMES CORBETT JAMES GEORGE JATRAS James ONeil JAMES PETRAS Jane Grey Jay Greenberg Jean Perier Jean Périer Jean-Claude Paye JEFF SESSIONS JEFFREY SMITH JEFFREY ST. CLAIR - ALEXANDER COCKBURN JEZEBEL JFK JILL STEIN Jim W. Dean Jimmy Carter Joachim Hagopian john McCain JOHN PILGER John Podesta John W. Whitehead JONAS E. ALEXIS Jonathan Marshall JONES Joseph Thomas JULIAN ASSANGE JULIAN ROSE Justin Raimondo KADI Kadir A. Mohmand Kadyrov kalee brown Karen Kwiatkowski Karine Bechet-Golovko KATEHON KATHEON Katherine Frisk Ken O’Keefe Kenneth P. VOGEL kerry KERRY BOLTON Kerry Cassidy Kerry Picket Kevin Barret. VT Kim Petersen KIMBERLEY KINZER KIRYANOV KOENIG Konstantin Asmolov KORYBKO KORZUN Krum Velkov Larry Chin Laurent Gerra lavr LAVROV Le Monde LE PARISIEN Le Saker Francophone LENDMAN Lionel Shriver LOFGREN LVOV MACMILLAN macron Makia Freeman MANLIO Manlio Dinucci Manlio Dinucci - Manuel Ochsenreiter Marco Cassiano MARCUS WEISGERBER MARGARET KIMBERLEY Margarita Simonyan MARIA ZAKHAROVA Mark Citadel Mark Taliano Markus Frohnmaier Martin Berger Martin Hurkes MARUSEK MARY BETH SULLIVAN Matt Agorist Matt Peppe MATTEO rRENZI MATTHEW COLE MATTHEW JAMISON MCLAUGHLIN MÉLENCHON MELKULANGARA BHADRAKUMAR MERCOURIS MEU COMENTÁRIO MEYSSAN MICHAEL AVERKO Michael Brenner Michael Hudson MICHAEL JABARA CARLEY Michael S. Rozeff Michael T. Klare Michel Raimbaud Middle East MIG video mike harris Mike Whitney militarized budget MINA Mint Press News MintPressNews MIRANDA Misión Verdad MKULTRA Mohamed Mokhtar Qandiel MOHMAND Montenegro MOON OF ALABAMA moonofalabama MOST DAMAGING WIKILEAKS NÃO À GUERRA NÃO À NATO national archives NATO NEO NEWS DESK Nicholas Nicholaides Nick Turse NIKANDROV nikki haley Nile Bowie NISSANI NO WAR NO NATO NORMAN SOLOMON NORTH KOREA NOVOROSSIA novorussia nuclear NYTIMES obama obamas Oliver Stone Olivier Renault ONU ORLOV OSCAR FORTIN PALESTINE Palestinians PARRY Patrick Iber Patrick J. Buchanan Patrick Martin PAUL CRAIG ROBERTS Paul Fitzgerald Paul R. PILLAR Paul Street PAYE PCR Pedro Bustamante pedrógão grande PEPE ESCOBAR Peter Dale Scot Peter Dale Scott Peter Koenig PETER KORZUN PETRAS Ph.D Phil Butler PICCARD Pierre Farge PILGER PISKORSKI PODESTA POLISH Pope Francis PORTUGUESE PRAVDA prc PRESTON JAMES Prof Michel Chossudovsky Prof Rodrigue Tremblay Project Veritas Público PUTIN PUTIN/TRUMP Putin/Trump meeting PYOTR ISKENDEROV Queen Elizabeth Rajan Menon Raphaël Meyssan rebecca gordon Redmayne-Titley RELAX remote viewing Rep. Ron Paul réseau Réseau International Réseau Voltaire Réseau Voltaire: Revue Défense Nationale Ricardo Vaz RICHARD DOLAN Richard Galustian Richard Labévière Richard Spencer Rick Sterling Rob Urie Robert Bridge Robert F. Kennedy Jr Robert J. Burrowes Robert J. O’Dowd Robert Mueller Robert O’Dowd ROBERT PARRY robert steele ROBERTS rof. Mohssen Massarrat ROLAND Roland San Juan blog ROMANIA PROTESTS ROMANIAN Ron Aledo RON PAUL Ron Paul Institute RT Rudolph Giuliani RUDY GIULIANI Russia feed RUSSIA TODAY russiafeed russiagate RUSSIAN Russian Insider Russie politics Russka RUSSOPHILE Ryan Dawson Ryan Gallagher Salman Rafi Sheikh sana sanders SANTOS SILVA Sarah Abed SCAHILL SCOTT Scott Humor Sean Adl-Tabatabai SERGEY LAVROV sessions Seth Ferris SETH RICH SHAKDAM Shawn Hamilton SHEIKH sic sic notícias SIMON PARKES Smith & Wesson SNOWDEN SNYDER Sophie & Co Soros SOUTH FRONT South Korea SOUTHFRONT SPANISH speech GERMAN MP Speer-Williams Sputinik sPUTNICK SPUTNIK STACHNIO Stanislav Petrov State of the Nation STEPHEN KARGANOVIC Stephen Kinzer Stephen Lendman Steve Pieczenik STEVE PIECZENIK: Steve Robertson Steven MacMillan STONE STORM CLOUDS GATHERING StormCloudsGathering.com Strategic Culture STRATTON STRYKER Sunagawa Syria TAKEHON TALIANO TASS TED RALL TEREHOV the The Anti-Media the coming storm The Duran THE INTERCEPT THE SAKER the true activist THERAPEOFJUSTICE Thierry Meyssan Third Presidential Debate Tillerson tom dispatch TOM ELEY Tom Engelhardt Tom Feeley TOM JOAD TomDispatch TOMGRAM Tony Cartalucci trees True Activist TrueActivist.com trump TSUKANOVA TTIP TURKEY TYLER DURDEN Udo Ulfkotte Ukrainian Deserter USA USA ELECTION USA ELECTIONS USA USE OF CHEMICAL WEAPONS VALDAI Valentin Vasilescu Van AUKEN Vanessa Beeley VASILESCU Vault 7 Veteran Intelligence Professionals for Sanity VETERANS TODAY VETERNAS TODAY Victory Day video VIDEO. videos VIETNAM VETERANS Viktor Mikhin VITALY CHURKIN Vladimir Chizhov Vladimir Safronkov Vladimir Terehov VLTCHEK VT Waking Times WANTA war Washingtons blog WAYNE MADSEN WENDY WOLFSON – KEN LEVY WESTBERG Westmoreland WHITEHEAD Whitney Webb WIKILEAKS Wikispooks William Blum WOODS world beyond war world cup 2018 XI JIMPING Xi Jinping Yameen Khan Yanis Varoufakis YEMEN Youssef A. Khaddour ZAKHAROVA ZÉ GERALDO ZEROHEDGE ZUESSE