H/t C Liberty C.
Grumpy Opinions by Little Tboca
Years ago, a news organization would be devastated if their anchors and journalists devoted 24/7 to creating lies, fake news and propaganda; but times have changed and along with the change, the quality and credibility of journalism has disintegrated.
CNN pays a premium for lies and propaganda and their anchors and journalists make the big bucks by deceiving the American populace. The troubling part of this scenario is this; the bigger the lies and more vicious the attacks on our President, the higher their ratings.
Seems that dirt, corruption laced with lies and propaganda rate at the top of their viewers’ agenda. This is not a compliment to CNN’s viewers; this merely shows that hard facts and truth are not priorities to many Americans. For viewers politics as spun through the deep-state approved Communist media complex is like going to an R-rated movie.
Here is a brief run – down of CNN’S biggest lies or fake news reports for 2017:
CNN made a huge error on their false reporting of Donald Trump Jr., and Wikileaks; they had to correct their lies and propaganda. Such screw ups like this by CNN and its peers in the Communist media complex only bolster President Donald J. Trump’s claims about “Fake News” and “Media Bias…”
After viewing the following video, you may find yourself wondering just who are the most dangerous men in the world?
Undeniably George Soros is number one and Amazon CEO with now owner of the Washington Post, Jeff Bezos, number two.
Jason Bermas discusses Amazon’s Jeff Bezos, his relationship to the CIA, his ownership of the Washington Post, his technology investments, and much more.
Cross-posted on Wow! Magazine.
Progressives and their media counterparts will swear that President Donald Trump and Trump Tower was not surveilled but there are those of us who would say otherwise. Everyone in the USA is under NSA surveillance. Enter Jerome Corsi, Infowars.
Infowars by Jerome Corsi
Infowars.com have obtained credible information from law enforcement sources regarding individual records of U.S. citizens under National Security Agency (NSA) electronic surveillance in the years 2004 through 2010 – a database that suggests both Donald J. Trump and Alex Jones were under illegal, unauthorized government monitoring during those years.
Michael Zullo, formerly the commander and chief investigator of the Cold Case Posse (CCP), a special investigative group created in 2006 in the office of Joseph M. Arpaio, formerly the sheriff in Maricopa County, an Arizona State Certified Law Enforcement Agency, headquartered in Phoenix, Arizona, provided sections of the database to Infowars.com….
Sheriff Arpaio and Chief Investigator Zullo have identified dozens of entries at various addresses, including both Trump Tower in New York City and Mar-a-Lago in Palm Beach, Florida, under which Donald Trump was apparently under NSA electronic surveillance from 2004, during President George W. Bush’s term of office, through 2009, the first year of President Obama’s presidency[…]
The CIA, Barack Obama and administration have displayed TOTAL INCOMPETENCE. They have spent so much time going after Americans opposed to Marxist ideology and of late, President Donald Trump, before and after the election that they dropped the ball. The business of spying on Americans must FINALLY be dealt with.
Julian Assange holds press conference in London on 3/9/17. The WikiLeaks founder addresses a range of issues including the CIA hacking and President Trump’s wiretapping claims.
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.
By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike[…]