Main Menu

Friday, August 4th, 2017

 

Guccifer 2.0 is the DNC

Guccifer 2.0 is the DNC   READ ALSO : NEW RESEARCH SHOWS GUCCIFER 2.0 FILES WERE COPIED LOCALLY SUGGESTING DNC NOT “HACKED BY RUSSIANS . RUSSIAGATE EXPOSED: IT’S A FRAUD. “LEAKS FROM INSIDE THE DNC     . .


Ukraine’s leaders trust in the people down to 9%

9.3% is way down from the 22% the coalition around Poroshenko secured in 2014. In fact Ukrainians are so fed up with their politicians no party is polling higher than 11.2 percent—that is the percentage of votes Yulia Timoshenko’s “Fatherland” party would get. In other words, the one thing the Ukrainian president has going for him is that his competition is as unpopular as he is. The next parliamentary elections in Ukraine areRead More


Century of Enslavement: The History of The Federal Reserve

Century of Enslavement: The History of The Federal Reserve What is the Federal Reserve system? How did it come into existence? Is it part of the federal government? How does it create money? Why is the public kept in the dark about these important matters? In this feature-length documentary film, The Corbett Report explores these important question and pulls back the curtain on America’s central bank   .


CNN Host Has Emotional Breakdown – Because People Don’t Trust CNN Anymore

CNN Host Has Emotional Breakdown – Because People Don’t Trust CNN Anymore CNN’s Kate Bolduan starts yelling and pointing her finger in the face of a panelist who doubts the “anonymous sources” the mainstream media keeps citing about evidence Trump and the Russians working together to steal the 2016 Presidential Election .


How to delete everything Google knows about you

It knows you better than you know yourself. It knows every smartphone you’ve thought about buying, every coworker you’ve tried to find dirt on, every embarrassing ailment you’ve suffered… It’s your Google Activity (formerly known as Google Web & App History), and it knows everything you’ve searched for… dating back to 2005. Yikes! This post will teach you how to permanently delete your Google history to enhance your internet privacy and prevent your search and browsing data fromRead More


Your ‘Anonymous’ Browsing Data Isn’t Actually Anonymous

Researchers said it was “trivial” to identify users and view their browsing habits in purchased ‘anonymous’ browsing data. In August 2016, a data broker received a phone call from a woman named Anna Rosenberg, who worked for a small startup in Tel Aviv. Rosenberg claimed she was training a neural network, a type of computing architecture inspired by the human brain, and needed a large set of browsing data toRead More


The Video Every Parent Must See!

The Video Every Parent Must See! The Global Elite plan for a “New World Order” including Government, Finance, and Religion. They own and have dominion over the, Federal Reserve, all major banks, our food and water supply, Education system, all branches of Government, media, music and entertainment industry and are using them to achieve their goal for world domination. They are extremely evil and are heavily involved in the occult.Read More


$$$ EVERYBODY HAS A PRICE $$$

$$$ EVERYBODY HAS A PRICE $$$ While many people accept the value of the Internet in disseminating important information, Stefan Molyneux looks at the overlooked value of the price system and the negative impact that distorting it has on the world overal     .


Witches Worldwide Target Trump in Mass Occult Ritual

On the evening of February 24th, at the stroke of midnight, witches worldwide will engage in a mass occult ritual to “bind Trump and all those who abet him”.  I am always surprised by the surrealist article titles I sometimes witness myself typing. But this is happening. And it is serious. Occultists that are part of public magical groups and secret societies – as well as wannabe witches worldwide – are doingRead More


WikiLeaks reveals CIA system to take over webcams, microphones

Details of the CIA’s Dumbo project, a system that manipulates devices such as webcams and microphones on Microsoft Windows-operating systems, have been published by WikiLeaks. The program also corrupts video recordings, according to the leaked documents. The whistleblowing organization released the files as part of its Vault 7 series on the CIA’s hacking capabilities. According to Wikileaks, the technology is intended for use where the deployment of a special branch withinRead More