Monday, January 17, 2022

SGT

94558 POSTS 0 COMMENTS

NATO meets in Brussels to discuss the final obstacle to US world domination: Russia and China

0

by Alex Christoforou, The Duran:

NATO Ministerial Meeting: Preparing for War on Russia?

On November 8 and 9, NATO ministers will be meeting in Brussels to discuss the alliance’s command structure, and how to better prepare for a war with Russia and eventually conflict with China.

In a post entitled, “NATO Ministerial Meeting: Preparing for War on Russia?” by Stephen Lendman (stephenlendman.org), “Russia and China represent the final frontier of resistance against US sought global dominance. Eventual conflict against both nations is ominously possible, maybe likely or certain, a grim prospect if happens”…

America controls NATO policymaking. The alliance serves as its global imperial arm – warmaking its mission, not fostering world peace and stability.

Nor does it have anything to do with defense at a time the only threats alliance members face are invented ones. Real ones don’t exist.

 

World peace and stability notions are contrary to US objectives, wanting unchallenged dominance over world nations, their resources and populations.

America’s diabolical agenda involves endless wars of aggression, wanting all sovereign independent nations replaced by US vassal states, creating ruler/serf societies globally, an open-air prison for ordinary people disposed of if resist – a world unsafe and unfit to live in.

On November 8 and 9, NATO ministers are meeting in Brussels. Like his predecessors, Secretary-General Jens Stoltenberg was appointed to serve US interests, taking orders from Washington.

Issues to be discussed Wednesday and Thursday include revising NATO’s command structure, including “a new command to help protect sea lines of communication between North America and Europe, and another command to improve the movement of troops and equipment within Europe,” said Stoltenberg – stressing “our ability to move forces,” he added.

Against what, he didn’t explain – preparing for war on Russia the unstated objective, whether or not waged. It’s more likely than not ahead – a modern-day Operation Barbarossa with nukes if launched.

Russia and China represent the final frontier of resistance against US sought global dominance. Eventual conflict against both nations is ominously possible, maybe likely or certain, a grim prospect if happens.

Read More @ TheDuran.com

MATT DRUDGE: Zucker ‘Out’ at CNN Due to Abysmal Ratings, ‘Personal’ Feud with Trump

0

by Cristina Laila, The Gateway Pundit:

Matt Drudge, founder of the highly influential Drudge Report said on Thursday that Jeff Zucker is out at CNN due to abysmal ratings and personal feud with President Trump.

“Jeff Zucker out either way at CNN, primetime ratings abysmal. Feud with President Trump too personal and ridiculous…” tweeted Matt Drudge on Thursday.

Rumors have been swirling recently about Zucker’s departure from CNN.

Zucker was named president of CNN back in 2012. He came under fire after CNN published a false story about Trump’s camp and their connections to Russia which resulted in a huge retraction and firing three employees.

James O’Keefe also caught CNN producers undercover admitting the Russian collusion story is ‘bullsh*t’ and Zucker only pushes the false narrative for ratings.

Read More @ TheGatewayPundit.com

Russia to UN Security Council: Report on Chemical Attack in Syria Is Full of “Systemic Deficiencies”

0

from Russia Insider:

Which is why Russia shut down the biased attempt to railroad Syria posing as a UN investigation

The OPCW-UN investigation into the chemical attack in Syria’s Idlib province is littered with “systemic deficiencies,” Russia’s deputy UN envoy has told the UN Security Council, reiterating that Moscow maintains the April 4 incident was staged.

On October 26, the OPCW-UN Joint Investigative Mechanism (JIM) issued a report in which it pinned blame for the Khan Shaykhun incident on Damascus. With JIM’s mandate set to expire on November 16, Russia criticized the methodology of the UN fact-finding mission, casting doubt on the mandate’s extension.

“Without a comprehensive change it will become a tool to settle accounts with the Syrian authorities,” 

Russian deputy representative to the United Nations, Vladimir Safronkov, told the Security Council.

America’s UN envoy, Nikki Haley, meanwhile tried to rally other members of the UN Security Council (UNSC) to renew JIM’s mandate. 

“Anyone who prevents us from achieving this goal is aiding and abetting those who have been using chemical weapons,” 

she said.

“They are helping to ensure, not just that more women and children will die, but that those women and children will die in one of the cruelest, most painful ways possible.”

After carefully reviewing the “deeply disappointing” conclusions of the probe, Moscow blasted the report which it believes is full of “systemic deficiencies” and speculation, and drawn from statements by questionable sources. Noting that JIM’s report cannot withstand any “serious criticism,” the Russian diplomat said the UN team did not even consider Moscow’s version of events, according to which the entire incident was “choreographed.”

Moscow questioned the validity of biomedical and other samples that were obtained at the scene of the alleged attack. JIM’s report, which is “full of omissions, inconsistencies and contradictions is very mediocre,” Safronkov said. “They did not comply with the basic principle of the chain of custody of the material evidence.”

Russia also accused JIM of implementing their mandate “very selectively without the use of the whole range of methods,” which requires first and foremost “collecting samples, questioning witnesses and gathering evidence directly at the site of the incident.”

The JIM mission never actually visited the site of the alleged attack, Russia pointed out, saying the experts relied on evidence collected by the militant groups controlling the area. The investigation also failed to properly inspect the Shayrat Airbase, Moscow said, explaining that while the experts visited the Syrian airfield, they did not collect ground samples there.

“OPCW worked under the assumption that sarin gas was delivered by a plane, despite failing to gather samples at the Shayrat Airbase site, after finally consenting to visit the strip,” the Russian diplomat said, emphasizing that gathering samples at the base was “crucial to determine the attribution of responsibility.”

Read More @ Russia-Insider.com

Combat Turtles’: Russia Developing AI-Endowed ‘Noiseless’ Torpedoes

0

from Sputnik News:

The Russian defense industry has embraced a new trend in manufacturing torpedoes – the development of a mini-torpedo with artificial intelligence.

A mini-torpedo is expected to have a weight of up to 40 kilograms and its main combat advantages is that such weapons are silent running and wakeless, Shamil Aliyev, one of Russia’s leading specialist in the field, said in an interview with the RIA Novosti news agency.

“The trend that is now emerging is switching from heavy to light torpedoes. In terms of weight, this means moving from two ton weapons to 35-40 kg ones. That’s fantastic and it is an essentially different conception,” Aliyev pointed out.

Commenting on the core principle of this new approach, the engineer explained: “Size and mass are important. But the most important thing is that such a torpedo is noiseless and wakeless.”

One of the main goals in the development of mini-torpedoes is to equip them with artificial intelligence (AI), so that a torpedo is capable of imitating the behavior of fish and sea animals.

Aliyev said that it is important to develop a torpedo that would be detected and recognized not as a torpedo, “but as a big fish,” Aliyev said.

“When there is only one large enemy target, neutralizing it is difficult but possible. But if there are thousands of ‘combat turtles’ and you don’t know which are real and which are just an imitation, it is a much more difficult task,” he said.

Read More @ SputnikNews.com

Communist Drexel Professor Blames Texas Church Massacre On Whiteness, Had Previously Blamed White People For The Las Vegas Attack

0

by Alex Thomas, SHTFPlan:

A controversial Drexel University professor, who is already suspended from campus over comments he made following the Las Vegas Massacre, is now arguing that the recent Texas church shooting was specifically caused by “whiteness” while also attacking news outlets who reported on his previous disgusting comments about the attack in Vegas.

In an interview with the left-wing show Democracy Now!, professor George Ciccariello-Maher once again shared his disgust for all white people while specifically pinning the blame for the church attack on the existence of whiteness itself.

“Whiteness is never seen as a cause, in and of itself, of these kinds of massacres,” Ciccariello-Maher said before adding, “despite the fact that whiteness is a structure of privilege and it’s a structure of power, and a structure that, when it feels threatened, you know, lashes out.”

The discussion, titled “What Makes White Men So Prone to This Kind of Behavior?”, then goes into a sort of rant about the dangers of white people feeling vilified which apparently causes them to conduct mass shootings.

Ciccariello-Maher was previously suspended from campus for a series of Tweets that blamed white people in general for the horrific Las Vegas attack.

Read More @ SHTFPlan.com

Know Your Enemy: 9 Prepper Truths You Need for Defense Preparations

0

by Jeremiah Johnson, Ready Nutrition:

ReadyNutrition Readers, we just covered a segment on self-assessment and knowing yourself.  I had mentioned a paraphrase from Sun Tzu’s “The Art of War” that covered that segment as well as this current article: “Know yourself and know your enemy.”  We are focusing on the latter part of that one: the enemy.  There are several subtleties attached to that short phrase.

9 Prepper Truths You Need to Prepare a Mental Foundation

1. As men are almost identical in many respects, if you know what you are, then you will know what your enemy is.

We’re going to really get into this one in a second.  Here is another subtlety:

2. By knowing your own weaknesses and shortcomings, you recognize things that can stop you in your tracks…where you become your own worst enemy!

We covered most of the thought of that in the first article.  But wait!  There’s more!

3. By knowing your weaknesses, you also understand weaknesses and shortcomings that other men are subjected to and suffer, just as you.

Oh, that’s a deep one!  The “drives” that you may have are the same weaknesses and drives that hamper other people…the ones you will have to face on the Day of Collapse.  Let’s summarize this and not “blow away” the English-speaking minds:

  1. By knowing your own qualities and capabilities, you can surmise those of others…for we are men (human beings).
  2. Recognizing your own qualities that are negative helps you to prevent them from making you your own worst enemy.
  3. Recognizing that where you are weak and fall short…others suffer from the same shortcomings.

Perhaps this sounds as if it’s a psychological treatise.  Perhaps.  Consider this: there’s a great deal that can be learned and accomplished in the application of this “pseudo-science,” as most people consider it…although many behavioral patterns and actions are spot on.  Know yourself, and know your enemy.  What are you?  What is your enemy?  Well, there was a psychologist by the name of Abraham Maslow.  He came up with a “needs pyramid” with the “hierarchy of needs” as human beings run.  Here it is:

There is a lot of truth to this.  Analyze the pyramid.  Here is the key:  You need all of these things, and so does the enemy.

4. The true challenge is to identify the enemy…when he is not you.  What will we face?  A foreign invasion?  A government that lapses into total tyranny?  A band of marauders?  Or will we simply be faced with neighbors that band together to kill us and take our supplies?

In any of those cases, all of the men and women you face have those needs outlined in that pyramid.  It is not so much an “oversimplification,” as it is examining humans from an anthropological perspective and trying to determine what drives them.

5. If you have anything you can use (foodstuffs, medicine, tools, clothing, or weapons, among other things), then you can bank on the fact that others will want it, as well.

I will give you some of my personal stances.  I don’t believe in a policy of appeasement.  What this means is (if you’ve ever watched the movie “The Postman,” for example) you can’t give an aggressor something to “buy off” his or her aggression and think you’re done there.  If anything, it will just be the beginning.  It didn’t work too well for the allies prior to WWII kicking off.  It never works.  It may buy you a little time, but the raiders will be back, to demand more and more from you, until eventually they’ll just swoop in and take it all away.

6. Appeasement is a weakness that leads to conquest, enslavement, and death.

This is why you must follow Sun Tzu’s “The Art of War!”  It gives the answer (albeit I paraphrase, and from different sections):

Read More @ ReadyNutrition.com

Podesta Email: “And Then The Bundys Showed Up”

0

by Tim Brown, Freedom Outpost:

In the pile of emails released by Wikileaks, there was one from American Progress Action to Hillary Clinton campaign manager John Podesta that contained a brief reference to the Bundys.

The email address progress@americanprogressaction.org sent Podesta an email on January 11, 2016 with the subject line: And then the Bundys showed up.

The text of the email read as follows:After years of conflict, residents of Harney County, Oregon had finally begun to rebuild ties between ranchers and the federal government. Then the Bundys showed up. And, President Obama is leaving a seat open for shooting victims at tomorrow’s State of the Union address. In case you missed it, gun violence survivors speak out in this powerful video (editor’s note: tissues recommended).Additionally, there was a list of articles linked to Think Progress and at the top of the list was one titled How The Bundy Standoff Could Screw Over Ranchers .The article has been removed and has not been archived.

Keep in mind, this email was sent less than 2 weeks before Oregon State Troopers, alongside the FBI shot and killed LaVoy Finicum, also a rancher who stood alongside the Bundys at Bundy Ranch in Bunkersville in 2014 and at the Malheur Wildlife Refuge in Oregon in late 2015 and 2016.

This may also be insightful since we know from texts and emails that the White House, at the time, was in communication with the Oregon governor and helping to orchestrate the takedown of men who were simply exercising their constitutional rights, even to the point of killing one of them.

I reported on those documents in March 2016:

…Northwest Liberty News radio show, a bombshell from documents Jim White and I obtained indicates that the entire operation of January 26, 2016 goes up not only to Oregon Governor Kate Brown’s office, but even to the White House. Because of the language that was used in the documents by the officers, we speculated along with Red Smith of ShastaLantern.com and Paul Preston of Agenda21radio.com that the White House orchestrated the entire thing and that when it comes to calling the shots, we don’t look to Barack Hussein Obama Soetoro Sobarkah, but rather to Obama’s mama, Valerie Jarrett.

First, let me remind you that there are over 600 emails and texts that indicate the Governor Brown was in the loop on everything that was going on in Oregon during the protest at the Malheur Refuge, including some emails and texts that were directly from her. Second, due to newly released documents, we know that at least one Oregon State Trooper specifically acknowledged that the county to which the protesters were traveling on the day of LaVoy Finicum’s murder was a well-known “UN free zone.” The officer made the statement as though it was common knowledge, so does that mean that Harney County is not a “UN free zone”?

However, in those same documents, we have run across even more chilling and telling statements concerning where the command for the roadblock and the ambush came from.

If you pick up the radio show at the 7:00 mark here, then you will hear Red Smith detail what is in the documents.

In the deposition of another officer, he acknowledged that the authorization for the operation that led to the murder of LaVoy Finicum came from the “highest levels of national command authority.”

Now, national command authority in the united States applies to the President and the Secretary of Defense. Smith said he has only heard “national command authority” used in military terms. Keep in the back of your mind that our military has been given propaganda against such Americans as those that gathered at Bundy Ranch in 2014 and those that protested the unconstitutional land grab of the DC government and the Bureau of Land Management.

So, why was there a command coming from the White House regarding a small protest in Oregon? Furthermore, who actually issued that command? It has been said that Iranian-born Valerie Jarrett has been Obama’s closest adviser and the she was the one who talked Obama out of the alleged Osama bin Laden hit and later was the one that gave the stand down order in Benghazi. Could she be the one who issued the order for this particular action?

Jarrett is the one that told America that after the 2012 elections, the gloves would come off, and they have.

If the officer’s deposition was not enough, among the emails that came from Governor Brown’s office, she also made reference her own discussions with “national command authority.” Guess who that turned out to be? None other than Valerie Jarrett.

Read More @ FreedomOutpost.com

Why you should be very worried about the Paradise Papers

0

by Simon Black, Sovereign Man:

In today’s podcast, I discuss the recent Paradise Papers fiasco – the massive leak of sensitive, offshore financial information held by the Bermudan law firm Appleby.

This thing has been a complete witch hunt in the media…

The whiny journalists paint the wealthy and famous who parked money offshore as criminals… Though they begrudgingly admit their actions are completely legal.

Click HERE to listen

Read More @ Sovereignman.com

Global Gold Investment Demand To Overwhelm Supply During Next Market Crash

0

by Steve St. Angelo, SRSrocco:

When the next market crash occurs, global gold investment demand will likely overwhelm supply.  When this occurs, we could finally see the gold price surpass its previous high of $1,900.  Now, this isn’t mere speculation, as we already have seen this taking place in the past.  When the broader markets crashed to the lows in Q1 2009 and the 10{5f621241b214ad2ec6cd4f506191303eb2f57539ef282de243c880c2b328a528} correction in Q1 in 2016, these periods were to two highest quarters of Gold ETF investment demand.

I don’t really care on whether the physical gold is actually in the Gold ETF’s, rather I like to look at it as an important indicator that shows us how much investor fear there is in the market.  Moreover, with the amount of leverage and debt now in the system, when the market crashes this time around, it will push gold investment demand up to a record we have never seen before.

The chart below shows the amount of physical global gold investment demand over the past 14 years.  As the gold price increased, so did amount of gold bar and coin demand:

As we can see, during the U.S. Banking and Housing Market crash in 2008, gold bar and coin demand doubled to 868 metric tons (mt), up from 434 mt in 2007.  That was quite a lot of gold bar and coin demand as it totaled nearly 28 million oz (1 metric ton = 32,150 oz).  Furthermore, as the gold price jumped to $1,571 in 2011, gold bar and coin demand shot up to nearly 1,500 mt (48 million oz).

Now, the reason for the huge spike in physical gold investment in 2013 was due to the huge price smash as the gold price fell from nearly $1,700 in the beginning of the year to a low of $1,380 by the middle of April.  Investors thought this was a huge sale on gold so demand for bars and coins reached a new record of 1,716 mt.

However, net gold investment demand in 2013 was only 804 mt because Gold ETF’s experienced a massive outflow of 912 mt.  Basically, the gutting of the Gold ETF’s by the gold price takedown allowed investors to purchase that record amount of gold bar and coin.  Moreover, Gold ETF flows continue to be negative in 2014 and 2015.  Over the three years, (2013-2015) a total of inventory of the world’s Gold ETF’s declined by 1,221 mt.  Thus, net global gold investment remained below 1,000 mt from 2013 to 2015.

But, this changed in 2016 when the U.S. stock market experienced a 2,000 point drop during the first quarter.  The Dow Jones Index fell from 17,500 in the beginning of January to a low of 15,500 within a month:

During this first quarter of 2016, Gold ETF inflows spiked to 349 mt, up from a net outflow of 66 mt in Q4 2015.  You see, gold continued to flow out of Gold ETF’s right up until the point the market fell 11{5f621241b214ad2ec6cd4f506191303eb2f57539ef282de243c880c2b328a528} in the first quarter of 2016.  As I mentioned before, the only other quarter that experienced a higher amount of Gold ETF inflows was the first quarter of 2009 when the Dow Jones was falling precipitously to a low of 6,600 points.  Gold ETF inflows surged to 465 mt in Q1 2009 versus 95 mt Q4 2008.

Read More @ SRSrocco.com

WikiLeaks Vault 8 Part 1: CIA Wrote Code To Impersonate Russian Anti-Virus Company Kaspersky

0

by Aaron Kesel, Activist Post:

WikiLeaks has released part 1 of its new Vault 8 series following its popular and widely distributed Vault 7 series which exposed CIA spyware and malware capabilities.

The new release “will enable investigative journalists, forensic experts, and the general public to better identify and understand covert CIA infrastructure components,” the international whistleblower coalition wrote.

The CIA’s master virus control system known as “Hive” was exposed previously last April by WikiLeaks.

“Described as a multi-platform malware suite, Hive provides “customisable implants” for Windows, Solaris, MikroTik (software used in Internet routers), Linux OS, and AVTech Network Video Recorders, used for CCTV recording.

A 2015 user guide for the malware suite reveals the initial release of Hive was in 2010. The guide goes on to describes the software as having two primary functions – a beacon and interactive shell. Both are designed to provide a starting point for CIA cyber agents to deploy other tools that have been included in the WikiLeaks Vault 7 series release.

The implants communicate via HTTPS with the web server using a cover domain. Each cover domain is connected to an IP address that is hooked into a Virtual Private Server (VPS) provider. This forwards all incoming traffic to a ‘Blot’ server.

 

The redirected traffic is then examined to see if it contains a valid beacon. If it does, it’s sent to a tool handler, called a “Honeycomb.”

The CIA can then choose to initiate other actions on the targeted computer.

The user guide further details the commands that are available, including uploading and deleting files and executing applications on the computer.

“Source code published in this series contains software designed to run on servers controlled by the CIA. Like WikiLeaks’ earlier Vault7 series,” WikiLeaks wrote in a press release for the new Vault 8 series.

The release of Hive followed with wide-scale blowback against the CIA when security firm Symantec linked the agency and a hacking group Longhorn to 40 targets in 16 countries with many more expected to come. Longhorn has been active since at least 2011, according to Symantec, infiltrating targets in the financial, telecom, aerospace and natural resources industries. It has the markings of an intelligence-backed state attacker.

“The tools used by Longhorn closely follow development timelines and technical specifications laid out in documents disclosed by WikiLeaks,” a Symantec statement said.

The Longhorn group shares some of the same cryptographic protocols specified in the Vault 7 documents, in addition to following leaked guidelines on tacts to avoid detection. Given the close similarities between the tools and techniques, there can be little doubt that Longhorn’s activities and the Vault 7 documents are the work of the same group.

The latest leak is the CIA’s master infrastructure source code + logs for that malware control system created by its Embedded Development Branch (EDB.) and expands on the use of obfuscated spoofed tools to implicate another party in a cyber attack.

In March, WikiLeaks also released 676 files code-named ‘Marble’, which detailed CIA hacking techniques and how they can misdirect forensic investigators from attributing viruses, trojans and worms to their agency by using the source code of other languages as a scapegoat – in other words, false flag cyber attacks.

Read More @ ActivistPost.com