Saturday, July 8, 2017

Assange Just Exposed CNN Breaking the Law by Threatening Redditor Who Made Fun of Them

ORIGINAL LINK

(TFTP) WikiLeaks founder Julian Assange is now calling out CNN for breaking the law, after the mainstream media network bragged about coercing a Reddit user into silence by threatening to use the public revelation of his identity against him.

It all started on Sunday when Trump Tweeted a short WWE video of him body-slamming a man to the ground. However, in this version, the man’s face was covered by a “CNN” logo, and the Tweet was accompanied by the caption “#FraudNewsCNN.”

#FraudNewsCNN #FNN pic.twitter.com/WYUnHjjUjg

— Donald J. Trump (@realDonaldTrump) July 2, 2017

Instead of focusing on the fact that Trump’s video was arguably posted as a distraction to take attention away from the United States bombing Somalia, or escalating tensions with China, CNN went on a witch hunt to find the source of the WWE video.

In an urgent report titled, “How CNN found the Reddit user behind the Trump wrestling GIF,” the MSM outlet went into detail about how its employees scoured the internet, and then successfully “identified the man behind the account and attempted to make contact with him.”

“Reddit user “HanA**holeSolo” first shared the GIF last Wednesday of Trump pummeling a wrestler with CNN’s logo imposed on his face. CNN could find no earlier instance of the GIF. The GIF was later edited into a video with sound and tweeted by the President on Sunday. On Reddit, “HanA**holeSolo” took credit for inspiring the tweet. Soon after, “HanA**holeSolo’s” other posts on Reddit, some of which included racist and anti-Semitic imagery, quickly circulated on social media.”

CNN then bragged about its ability to find the Reddit user, and to convince him to submit, noting that he expressed remorse, both on Reddit and “in an interview with CNN for other posts he made that were racist and anti-Semitic.”

In order to track down the man referred to as “HanAssholeSolo,” CNN claimed it followed “identifying information” that the user posted on Reddit, in order to “determine key biographical details, to find the man’s name using a Facebook search and ultimately corroborate details he had made available on Reddit.

However, CNN then went too far by claiming that while it does not plan to release the true identity of “HanA**holeSolo” right now, it “reserves the right to publish his identity” if he does not continue to show the level of remorse that the outlet has deemed acceptable, in order to keep his name private.

In the interview, “HanA**holeSolo” sounded nervous about his identity being revealed and asked to not be named out of fear for his personal safety and for the public embarrassment it would bring to him and his family. CNN is not publishing “HanA**holeSolo’s” name because he is a private citizen who has issued an extensive statement of apology, showed his remorse by saying he has taken down all his offending posts, and because he said he is not going to repeat this ugly behavior on social media again. In addition, he said his statement could serve as an example to others not to do the same. CNN reserves the right to publish his identity should any of that change.”

Assange then chimed in on Twitter, and pointed out that CNN’s actions are in direct violation of § 135.60 of the New York criminal code, which dictates the standards for “coercion in the second degree.”

The law states that a person is guilty of coercion in the second degree if he or she threatens to “cause physical injury to a person,” “expose a secret or publicize an asserted fact, whether true or false, tending to subject some person to hatred, contempt or ridicule,” or “perform any other act which would not in itself materially benefit the actor but which is calculated to harm another person materially with respect to his or her health, safety, business, calling, career, financial condition, reputation or personal relationships.”

CNN just committed a crime violating § 135.60 of the New York criminal code "coercion" https://t.co/FwPPlczPRhhttps://t.co/AHQhjDS6ds pic.twitter.com/a7HAdMQQDV

— Julian Assange (@JulianAssange) July 5, 2017

Assange then went on to note that CNN’s actions are bigger than just the jurisdiction in the state of New York, and are also arguably a violation of federal law, which could be considered a felony conspiracy against civil rights under 18 U.S. Code § 241.

The law states that if two or more persons conspire to injure, oppress, threaten, or intimidate any person in any State, Territory, Commonwealth, Possession, or District in the free exercise or enjoyment of any right or privilege secured to him by the Constitution or laws of the United States, or because of his having so exercised the same … they shall be fined under this title or imprisoned.”

CNN also appears to have committed a federal felony violation of 18 U.S. Code § 241 in relation to the 1st Amendmenthttps://t.co/Ij06te1Bcr pic.twitter.com/AFt8RJyHsW

— Julian Assange (@JulianAssange) July 5, 2017

It is no secret that Trump appears to have a direct disdain for CNN, above all other mainstream media outlets—despite the fact that all funding is the same—but the most obvious red flag from the encounter comes from CNN’s response.

If the network truly wanted to expose the Trump Administration, and to “get back” at Trump for all of the times he has referred to CNN as “fake news,” it would do so by giving the public honest coverage of the administration’s unconstitutional acts and inflammatory foreign policy decisions. However, because the network chooses to focus on going after the Reddit user who inspired Trump’s latest scandalous Tweet, it serves as a reminder that in order to expose the Trump administration, CNN would also have to expose the mainstream media’s role in distracting the American public, and enabling the current political climate.




via IFTTT

How Google Rigs Search and Hurts Consumers

ORIGINAL LINK

by Michael Krieger, Liberty Blitzkrieg:

I’m sure all of you heard about the $2.7 billion fine imposed by the EU on Google as a result of its anti-competitive behavior, but not many of you probably know exactly what the search giant did to earn it. To shine some light on the topic, let’s take a look at a few excerpts from a recent article written by Silicon Valley antitrust lawyer Gary Reback.

Below are some choice excerpts from the piece, You Should Be Outraged at Google’s Anti-Competitive Behavior:

Before 2007, if a user searched for a product on Google, other sites listing prices for that product would appear among the general search results, ranked in the order of their quality to users. These “comparison shopping sites” were designed to identify merchants with the lowest prices. The more accurate and comprehensive their results, the higher they were ranked and the more traffic they generated.

But the more successful that comparison shopping sites became, the more they threatened Google’s business plan. Google makes money by selling ads placed next to its free search results, and merchants could not be expected to bid for ad placement if the listings in comparison shopping sites on the same search undercut their prices.

To address this, Google developed a cunning plan, the first phase of which was documented in a report by the FTC. Portions of the report were published by the Wall Street Journal more than two years ago.

Quoting internal Google documents and emails, the report shows that the company created a list of rival comparison shopping sites that it would artificially lower in the general search results, even though tests showed that Google users “liked the quality of the [rival] sites” and gave negative feedback on the proposed changes.

Google reworked its search algorithm at least four times, the documents show, and altered its established rating criteria before the proposed changes received “slightly positive” user feedback. Internal Google documents predicted that the proposed changes would reduce rivals’ user traffic up to 20 percent and subsequently reported producing the desired results once the changes were implemented.

At the same time, Google started putting the results from its own comparison shopping service at the top of search results. After these changes, the only source of low-price information readily available on Google’s search platform came from Google’s own comparison shopping service, known at the time as Google Product Search, which listed the lowest prices for products in its database at no charge to merchants.

Google’s conduct certainly hurt its rivals, particularly after a second round of search-listing demotions documented by the European Union. Many companies have been forced to lay off all of their employees and even shut down operations.

In 2012, Google took the extraordinary step to kill Google Product Search, replacing it with Google Shopping. This new service did not display the lowest price (or even a low price) in the general search results; rather, it displayed ads at the top of the search results page in response to the user’s search term. The ads were carefully placed by Google’s algorithms to minimize price competition among merchants, by, for example, showing ads next to each other that featured different product models at different price points.

Google Shopping also permitted merchants to purchase ads on a separate shopping page. Merchants — no longer promoted in search results for having lower prices — now must pay for better placement. Not surprisingly, they have raised prices to cover these costs.

Google’s competitors argued in a study, which I submitted to the European Commission a few years ago, that the prices in Google Shopping ads for specified products on search results pages were among the highest in Google’s database. Google’s displayed prices for everyday products, such as watches, anti-wrinkle cream and wireless routers, were roughly 50 percent higher — sometimes more — than those on rival sites. A subsequent study by a consumer protection group found similar results. A study by the Financial Times also documented the higher prices.

The Post’s editorial board claimed that the online availability of large merchant sites might restrain Google’s power over consumers. But those sites haven’t stopped Google from executing its plan so far. There is no denying that Google eliminated services showing the lowest prices, free to merchants, and replaced them with high-priced ads.

Some people like to blame all of the world’s problems on government. Others blame business for everything that ever goes wrong. I don’t fall into either of these categories. I think the greatest threat to humanity, freedom and our overall happiness comes down to concentrations of power. Too much concentration of power within business or government ultimately leads to tyranny and oppression, and the best solution is for all of us to fight against concentrations of power in all its manifestations. Personally, I think Google has far too much power in a service as important to modern life as search, and it seems executives there are doing what always happens with concentrated power — abusing their position.

Read More @ LibertyBlitzkrieg.com



via IFTTT

Friday, July 7, 2017

The real reason the Russian narrative persists

ORIGINAL LINK

How much are tech stocks worth? For a brief time on July 3, they were all worth $123.47. It happened during after-hours trading, and it happened because that’s what the Nasdaq trading platform said they were worth.

Nasdaq’s explanation is that third parties improperly sent test data to their system. That only raises more questions. We’re not going to go there, today. We’re going to go somewhere else, instead.

“Who do you trust?” may be the single most important question any of us will answer within our lifetimes. It’s true personally, politically, educationally, religiously and beyond. Let’s look at trust in a few different areas.

Stock prices fluctuate all the time. Like anything else, the value of any given stock is what a willing buyer and seller agree on at a given moment in time, when they actually make the buy-sell transaction.

Now suppose for a moment that there was no trade, but Nasdaq said that there was, and the transaction had happened for $123.47. What would make you trust – or distrust – their explanation for why that price was accurate, or why there was a mistake?

Now let’s look at the global warming industry. Michael “the hockey stick” Mann just refused to provide his raw global warming data to a Canadian court, one in which he has sued “global warming skeptics.” It’s a lot like the Nasdaq, isn’t it? The temperature data are what he says they are, before, during or after any adjustments he chooses to make, because he’s a closed system. Yet we should all just trust him and hand over our money, which is really our working life.

What about Donald Trump, Hillary Clinton, illegal voting and Russian election hacking? Whether you like it or not, we are all now funding the patrician lawyer’s retirement guild with our tax payments. One candidate could have her ex-president husband meet privately with the sitting attorney general, Loretta Lynch, to discuss a criminal email investigation of his presidential candidate wife, but the current attorney general, Jeff Sessions, recused himself because he once met the Russian ambassador at a cocktail party. Who do you trust?

There are many hidden hands here, but I’m only going to point out a few. One is the intelligence community, which in this case is really the NSA, CIA and FBI for counterintelligence. The NSA has lost unknown oodles of its secret data and computer code to leakers, who have placed it on the Internet, where hackers can repurpose it. Ditto for the CIA, although they’re more biased toward their computer hacking tools, which, they were proud to announce, could make them look like somebody else. Russians, perhaps.

The FBI has been using the NSA (and probably CIA) data in place of conducting actual counterterrorism investigations. Their upper management leaked like a sieve to the media, and when the sieve broke they leaked all over both Hillary and then Donald. The FBI’s No. 2 at the top took $700,000 from a Clinton bundler for his wife’s election campaign, but never bothered to tell anyone about it. What could possibly go wrong?

Big media now live and die by the mouse-click. They could give a rat’s tail about the truth of anything they publish. If nothing exciting happened, they make it up. So what if they take America down with them? “We won the ratings war this month!”

Fake news. Anonymous sources. Fake stock prices. Fake Russians. Who do you trust, and why? And if you don’t trust anybody, then how do you live your life?

Who do you trust? Is there any evidence? Can we see it – or will it all be “classified”? Faked? Anonymous?

Who do you trust? In the current political environment, that determines your vote. We’re now down to instinctual reactions, which are another step below emotional decisions.


Nasdaq was hacked in 2010 and kept it quiet for quite some time. Reuters finally reported it.
Perhaps trust will continue to decay until a critical mass of us understand there is only one person any of us can unconditionally trust.

Media wishing to interview Craige McMillan, please contact media@wnd.com.

Receive Craige McMillan's commentaries in your email

BONUS: By signing up for Craige McMillan's alerts, you will also be signed up for news and special offers from WND via email.
  • Name*
    First Last
  • Email*
    Where we will email your daily updates
  • Postal code*
    A valid zip code or postal code is required

  • Click the button below to sign up for Craige McMillan's commentaries by email, and keep up to date with special offers from WND. You may change your email preferences at any time.



via IFTTT

90,000-Strong Child Porn Ring Busted on ‘Dark Web’

ORIGINAL LINK

from RT:

Police in Frankfurt swooped on suspected pedophiles after busting a massive child pornography website on the ‘dark web’. The site had almost 90,000 users who swapped graphic images of children and arranged meetings to abuse them.
The forum, known as ‘Elysium,’ had existed on the internet’s darkside since the end of 2016.

Frankfurt public prosecutor’s and Germany’s BKA Federal Police said they arrested several people connected to the forum, including the sites suspected operator, a 39-year-old man living in Frankfurt.

The unidentified man was arrested on June 12 when police raided his apartment seizing the server used to host the site.


#FBI ran 23 Dark Web child porn sites to gather visitor info https://t.co/jtUSLe87Sk pic.twitter.com/khSOMrxfia

— RT America (@RT_America) November 11, 2016

Elysium had more than 87,000 users worldwide who utilised the platform to disseminate horrifying pornographic images of children as well as arranging appointments to abuse children.

“Among the child pornographic images and video files exchanged by the members of the platform were recordings of the most serious sexual abuse of children, including toddlers and depictions of sexual violence against children,” prosecutors said in a statement, as cited by Reuters.

Authorities have not divulged how many suspects have been arrested. More details will be made available in a press conference Friday.

This latest bust comes just two months after nearly 900 members of a global ‘dark web’ pedophile ring spanning Europe and the Americas were arrested following a two-year investigation by the FBI and Europol.

The website’s founder was handed a 30-year jail sentence.

900 members of global ‘dark web’ pedophile ring arrested following a two-year investigation https://t.co/DetJpjVyuc pic.twitter.com/FhrJLD38tg

— RT (@RT_com) May 7, 2017

Read More @ RT.com



via IFTTT

Whistleblower: “The NSA Is Still Collecting the Full Content Of U.S. Domestic E-Mail, Without a Warrant … The NSA Cannot Identify Future Terrorism Because 99.9999% of What It Collects and Analyzes Is Foreseeably Irrelevant”

ORIGINAL LINK

The man who designed the NSA’s electronic intelligence gathering system (Bill Binney) sent us an affidavit which he signed on the Fourth of July explaining that the NSA is still spying on normal, every day Americans … and not focused on stopping terror attacks (I’ve added links to provide some background):

The attacks on September 11, 2001 completely changed how the NSA conducted surveillance …. the individual liberties preserved in the U.S. Constitution were no longer a consideration. In October 2001, the NSA began to implement a group of intelligence activities now known as the “President’s Surveillance Program.”

The President’s Surveillance Program involved the collection of the full content of domestic e-mail traffic without any of the privacy protections built into [the program that Binney had designed]. This was done under the authorization of Executive Order 12333. This meant that the nation’s e-mail could be read by NSA staff members without the approval of any court or judge.

***

The NSA is still collecting the full content of U.S. domestic e-mail, without a warrant. We know this because of the highly-detailed information contained in the documents leaked by former NSA-contractor, Edward Snowden. I have personally reviewed many of these documents.

I can authenticate these documents because they relate to programs that I created and supervised during my years at the NSA.

[U.S. government officials] have also admitted the authenticity of these documents.

***

The documents provided by Mr. Snowden are the type of data that experts in the intelligence community would typically and reasonably rely upon to form an opinion as to the conduct of the intelligence community.

[The Snowden documents show prove that the NSA is still spying on most Americans.]

When Mr. Snowden said that he could read the e-mail of a federal judge if he had that judge’s e­mail address, he was not exaggerating.

***

The NSA is creating a program that shows the real-time location of all cell phones, tablets and computers in the world, at any time. To have a state-actor engaging in this sort of behavior, without any court supervision, is troubling.

***

In their public statements, [government officials] claim that collection of information is limited, and is being done pursuant to Section 702 of the Foreign Intelligence Surveillance Act (“FISA”). FBI Director James Comey recently described Section 702 of FISA as the “crown jewel” of the intelligence community.

Defendants, however, are not being candid with the Court. Collection is actually being done pursuant to Executive Order 12333(2)(3)(c), which — to my knowledge — has never been subject to judicial review. This order allows the intelligence community to collect incidentally obtained information that may indicate involvement in activities that may violate  federal, state, local or foreign laws.” Any lawyer can appreciate the scope of this broad language.   [Background.]

***

According to media reports, President Obama’s former National Security Advisor, Susan Rice, requested e­mail and phone records on President Trump and various members of his political campaign during and after the 2016 election.

According to these reports, the National Security Council (“NSC”) has computer logs showing when Rice requested and viewed such records. The requests were made from July 2016 through January 2017, and included President Trump and various members of his campaign staff According to an internal NSC report, the accessed information contained “valuable political information on the Trump transition.” Rice’s requests into Trump-related conversations increased following the presidential election last November. None of the requests were reviewed by any independent court.

***

We also know that certain NSA staffers have used their access to e-mail and phone calls to conduct surveillance on current and former significant others. The NSA has referred to this sort of action as “LOVEINT,” a phrase taken from other internal-NSA terms of art, such as “SIGINT” for signals intelligence.

***

Bulk collection makes it impossible for the NSA to actually do its job.

For example, consider the Pinwale program, discussed above, in which the NSA searches the collected data based on certain pre-defined keywords, known as the “dictionary.” The results from the dictionary search are known as the “daily pull.”

Eighty percent of the NSA’s resources go towards review of the daily pull. The problem is that the daily pull is enormous. It is simply not possible for one analyst to review all questionable communications made by millions of people generating e-mail, text messages, web search queries, and visits to websites. Every person making a joke about a gun, bomb or a terrorist incident theoretically gets reviewed by a live person. This is not possible. When I was at the NSA, each analyst was theoretically required to review 40,000 to 50,000 questionable records each day. The analyst gets overwhelmed, and the actual known targets — from the metadata analysis — get ignored.

This is clear from some of the internal NSA memos released by Edward Snowden and published by the Intercept. In these memos, NSA analysts say:

“NSA is gathering too much data. . . . It’s making it impossible to focus.”

“Analysis Paralysis.”

“Data Is Not Intelligence.”
“Overcome by Overload.”

Bulk collection is making it difficult for the NSA to find the real threats. [Indeed.]  The net effect from the current approach is that people die first. The NSA has missed repeated terrorist incidents over the last few years, despite its mass monitoring efforts. The NSA cannot identify future terrorism because 99.9999% of what it collects and analyzes is foreseeably irrelevant. This is swamping the intelligence community, while creating the moral hazards and risks to the republic ….

After a terrorist incident occurs, only then do analysts and law enforcement go into their vast data, and focus on the perpetrators of the crime. This is exactly the reverse of what they should be doing. If the NSA wants to predict intentions and capabilities prior to the crime, then it must focus on known subversive relationships, giving decision-makers time to react and influence events.

There is a second reason why data mining bulk collected data is a waste of time and resources: the professional terrorists know that we are looking at their e-mail and telephonic communications. As a result, they use code words that are not in the dictionary, and will not come up in the daily pull.

***

Thus, collecting mass amounts of data and searching it to find the proverbial needle in a haystack doesn’t work. It is fishing in the empty ocean, where the fish are scientifically and foreseeably not present.

Binney explains what we should do instead:

The truth is that there has always been a safe, alternate path to take. That’s a focused, professional, disciplined selection of data off the fiber lines.

***

I serve as a consultant to many foreign governments on the issues described in this affidavit. As such, I have testified before the German Parliament, the British House of Lords, and the EU Libe Committee on Civil Liberties on these issues. I also consult regularly with members of the European Union on intelligence issues.

***

it is my understanding that the European Union intends to adopt legislation requiring its intelligence community to get out of the business of bulk collection, and implement smart selection.

***

Smart selection is not enough. Governments, courts and the public need to have an absolute means of verifying what intelligence agencies are doing. This should be done within government by having a cleared technical team responsible to the whole of government and the courts with the authority and clearances to go into any intelligence agency and look directly into databases and tools in use. This would insure that government as a whole could get to the bottom line truth of what the intelligence agencies were really doing

I would also suggest that agencies be required to implement software that audits their analytic processes to insure compliance with law and to automatically detect and report any violations to the courts and others.

Indeed, Binney has patiently explained for many years that we know how to help prevent terrorism … and corruption is what’s preventing us from doing it.

Binney thinks we should get serious about motivating the intelligence agencies to do their job.

Whistleblower: “The NSA Is Still Collecting the Full Content Of U.S. Domestic E-Mail, Without a Warrant … The NSA Cannot Identify Future Terrorism Because 99.9999% of What It Collects and Analyzes Is Foreseeably Irrelevant” was originally published on Washington's Blog



via IFTTT

Thursday, July 6, 2017

An Army of Smear Artists Is Working Overtime to Undermine Sy Hersh's Syria Bombshell

ORIGINAL LINK

There has been much disingenuous criticism of those, like me, who question why the western corporate media have studiously ignored the latest investigation by journalist Seymour Hersh on Syria. Hersh had to publish his piece in a German newspaper, Welt am Sonntag, after the entire US and UK media rejected his article. There has still been no mention of his investigation more than a week later.



via IFTTT

DNC won't release evidence of Seth Rich's WikiLeaks ties

ORIGINAL LINK
Murdered DNC staffer Seth Rich

Murdered DNC staffer Seth Rich

WASHINGTON – A team of private investigators demanded the Democratic National Committee turn over “any and all” information that could help determine whether there is a link between the Democratic National Committee email hacking during the 2016 presidential race and the mysterious murder of DNC employee Seth Rich.

But the DNC wouldn’t provide any information Thursday, claiming it’s “not interested in propagating conspiracy theories about a beloved colleague.”

DNC Chairman Thomas Perez

DNC Chairman Thomas Perez

While the DNC insists that its email was hacked by Russia in a grand conspiracy to assist Donald Trump in “rigging” the election, the Profiling Project pointed out in a letter to DNC Chairman Tom Perez that Guccifer 2.0 categorically denied links between the Russian government and the hacked documents.

“There have been all sorts of reporting in the media on the DNC computer hacking on June 14, 2016, one month before Mr. Rich’s murder,” the letter states. “At the time, the DNC blamed the hacking on two groups associated with Russian intelligence. However, a blogger named Guccifer 2.0 subsequently claimed that he hacked your computer system, and passed along thousands of pages of files to WikiLeaks.

“Subsequent unsubstantiated reports have linked Mr. Rich’s murder with either Russia or WikiLeaks or both, suggesting that Mr. Rich was the source of the emails or he was connected in some other way.”

DNC-HQ-TW

Get the hottest, most important news stories on the Internet – delivered FREE to your inbox as soon as they break! Take just 30 seconds and sign up for WND’s Email News Alerts!

Jack Burkman, a lawyer and GOP lobbyist who is funding the Profiling Project, wrote the letter on behalf of the group. He called on the DNC to turn over any evidence that would substantiate Rich’s ties to WikiLeaks.

D.C. lobbyist and attorney Jack Burkman

D.C. lobbyist and attorney Jack Burkman

“By way of this letter, I am formally asking that the DNC release any, and all, information to our independent investigators – including emails, internal memos and other correlating information regarding discussions of this matter – that may help them determine the connection, if any between the DNC hacking and the murder of Seth Rich,” the letter states. “I look forward to your cooperation in our efforts to find those responsible for killing a young man with a bright future and one of your employees.”

In its response to the Profiling Project’s letter, the DNC stated:

“The DNC supports law enforcement in their work to get to the bottom of this terrible tragedy and hold the perpetrators accountable. The DNC is not interested in propagating conspiracy theories about a beloved colleague.

“We ask news organizations to respect Seth’s memory and stop highlighting publicity stunts and spreading false or debunked information.”

As WND has reported, Rich, 27, had accepted a position with Hillary Clinton’s campaign just before his death. He was murdered in Washington, D.C., near his apartment in an affluent neighborhood. Rich was shot twice in the back with a handgun, and his wallet, credit cards, watch and phone were left in his possession. The Metropolitan Police Department has described the murder as a “botched robbery.”

Murdered DNC staffer Seth Rich

Murdered DNC staffer Seth Rich

Private investigators have claimed there is evidence Rich was the source WikiLeaks used to obtain thousands of DNC emails released on the eve of the party’s presidential nominating convention last July. The emails, indicating the party was manipulating the primary race in favor of Hillary Clinton, led to the resignation of former DNC Chairwoman Rep. Debbie Wasserman Schultz. On July 22, just 12 days after Rich’s death and days before the Democratic Party Convention in Philadelphia, WikiLeaks released 20,000 DNC emails.

Also as WND has reported, former detective Rod Wheeler was initially hired by Rich’s parents through a third party to find their son’s killer. Wheeler alleges former interim DNC chairwoman Donna Brazille contacted the Metropolitan Police Department demanding to know why he was “snooping” after Wheeler began investigating Rich’s murder. As a result, he said, law-enforcement authorities are now refusing to provide him with more details about the case.

Wheeler and another source also told WND that the family’s spokesman, Brad Bauman – a Democratic political crisis consultant – was “assigned” to the family by the DNC. Bauman denies the DNC hired him to represent the Rich family, calling the claim “patently 100 percent false.”

WND has launched a GoFundMe campaign to get to the bottom of the Seth Rich murder. Help us find out what really happened to the DNC staffer!

As WND reported, the total reward for solving Rich’s murder currently stands at approximately a half-million dollars. However, the DNC has offered no reward for information leading to the arrest of the murderer of its own young staffer. Instead, the DNC honored its murdered employee by dedicating a bike rack outside its headquarters to Rich’s memory.

The DNC honored its murdered employee, Seth Rich, by dedicating a bike rack with this plaque outside its headquarters to Rich's memory (Photo: screenshot

The DNC honored its murdered employee, Seth Rich, by dedicating a bike rack with this plaque outside its headquarters to Rich’s memory (Photo: screenshot)

Several online accounts belonging to Rich have been deleted in recent weeks, according to the Profiling Project. As WND reported, Burkman filed an emergency motion on June 21 to require police to “preserve, protect and properly organize the all-important online information of Seth Rich.”

“Seth Rich’s Twitter account has recently been deleted … Seth Rich’s Facebook page has recently been deleted … and … Seth Rich’s Reddit account (MeGRIMLOCK) has recently been edited and some of its postings deleted,” the motion states. “Little is more critical to the investigation of this murder than this online information that could lead to the determination of a motive for the murder. Most of the current working theories of the case may be disproven or enhanced by examining Seth Rich’s online information. Regrettably, some of this information is now lost due to the apparent spoliation of MPD. MPD must now be forced by this Court to act swiftly and decisively to preserve evidence.”

Seth Rich

Seth Rich

Also in June, the Profiling Project released a preliminary 80-page report on Rich that details why it’s highly improbable that the DNC staffer was the victim of a random homicide.

The project, an “all-volunteer group of current and former George Washington University forensic psychology graduate students and instructors,” said it came together for the investigation to “aid the Washington, D.C., Metropolitan Police utilizing forensic psychology skills and tools in hopes of providing at least one actionable item.”

The findings included:

  1. Seth’s death does not appear to be a random homicide.
  2. Seth’s death does not appear to be a robbery gone bad.
  3. Seth[‘s] death was more likely committed by a hired killer or serial murderer.
  4. There may be additional video surveillance of the crime and crime scene.
  5. The resolution of prosecuting the individual(s) responsible appears to be hindered both actively and passively.
  6. Seth’s killer(s) most likely remains free with the community.

The group found in its investigation “the crime scene was very organized to the point of being sanitized.”

“This would indicate careful planning on the part of the offender, control of the entry to and exit from the crime scene as well as in-depth understanding of law-enforcement investigative processes,” Doherty explained during a press conference. “A proficient killer is what we think – the fact that the killer has gotten away with it for this period of time and it appears it was a very sanitized crime scene, so there is certainly some level of proficiency in the killing.”

The lack of clues from Rich’s murderer scene and the fact that no suspects have surfaced to claim the large reward offering is highly suspect, Doherty said.

“The crime scene was sanitized; there is no direct linking to really anything. The police have no suspects,” he said. “The individuals have gotten away with it at this point in time. There were no behavioral indications at the crime scene. It didn’t look like rage or revenge or hate were the motivation behind it. It’s really a lack of behavioral indicators, motion and evidence that leads us to believe that whoever did this is proficient at killing.”

Intersection where DNC staffer Seth Rich was found 'conscious and breathing with apparent gunshot wound(s) to the back,' according to a July 10, 2016, police report (WND photo: Alicia Powe)

Intersection where DNC staffer Seth Rich was found ‘conscious and breathing with apparent gunshot wound(s) to the back,’ according to a July 10, 2016, police report (WND photo: Alicia Powe)

The Profiling Project revealed in May that weapons were stolen from a nearby FBI vehicle hours before Rich was shot, including a .40 caliber Glock-22 handgun and a Rock River Arms Rifle. The burglary took place just two miles south of Rich’s murder scene.

The group is currently awaiting a court hearing before the Washington, D.C., Superior Court to force the police department and Washington, D.C., Mayor Muriel Bowser to publicly release critical evidence in the Seth Rich investigation, including the medical examiner’s report, autopsy documents and ballistics reports, which would determine they type of gun used to shoot Rich.

WND has launched a GoFundMe campaign to get to the bottom of the Seth Rich murder. You can personally help us get to the truth of what really happened.



via IFTTT

Questioning the Investigation of Syria’s Alleged Sarin-Gas Attack

http://www.truthdig.com/report/item/is_the_investigation_of_syrias_alleged_sarin-gas_attack_believable_20170705

As a former U.N. chief weapons inspector who has led sampling missions involving great political sensitivity, I was aghast at the collection and handling of what the White Helmets purported to be samples from the chemical attack scene. The samples were virtually unusable as collected—the cross-contamination issues alone should preclude their being used. The lack of any discernable documentation, the lack of any tamper-proof seals, and the lack of viable sampling containers, techniques and methodology likewise meant that anything collected by the White Helmets in the manner indicated on film had absolutely zero inspection utility.

These observations are obvious and self-evident to anyone possessing a modicum of professional training and experience, as certainly the members of the OPCW FFM in Turkey could claim—especially the team leader, Leonard Phillips. When the shock of the nonexistent health and safety standards used by the White Helmets wore off, it became clear to me that this wasn’t simply a scene neutrally depicting the actions of innocents trying to do a good deed. Rather, the videotape of the sampling activities was, like the videos and images of the White Helmets rescuing stricken survivors on April 4, which energized the OPCW information cell into recommending the dispatch of the FFM to begin with, a deliberate effort to deceive.

American Aggression Against Syria: A Casual Admission of Guilt

ORIGINAL LINK

Featured image: Al Kindi hospital (Aleppo) as it was being demolished by two truck bombs, December 2013. The operation was carried out by Jabhat al Nusra (see logo top right) and its SA partners. Afterwards the Islamist-linked ‘Physicians for Human



via IFTTT

Wednesday, July 5, 2017

Chemotherapy may actually spread cancer

ORIGINAL LINK

(LONDON TELEGRAPH) — Chemotherapy could allow cancer to spread, and trigger more aggressive tumours, a new study suggests.

Researchers in the US studied the impact of drugs on patients with breast cancer and found medication increases the chance of cancer cells migrating to other parts of the body, where they are almost always lethal.

Around 55,000 women are diagnosed with breast cancer in Britain every year and 11,000 will die from their illness.



via IFTTT

Media Roots retweeted: EXCLUSIVE: Documents expose direct US military intelligence influence on 1,800 movies and TV shows medium.com/insurge-intell…

ORIGINAL LINK
Cn8PVKgk_normal.png INSURGEintelligence
@insurgeintel
Media Roots retweeted:
EXCLUSIVE: Documents expose direct US military intelligence influence on 1,800 movies and TV shows medium.com/insurge-intell…


via IFTTT

Tuesday, July 4, 2017

Wikileaks Release Shows Washington Post 'Working for' DNC, "Re : Wapo party"

ORIGINAL LINK
WikiLeaks Release Shows Washington Post 'Working For' DNC Journalist and filmmaker Mike Cernovich’s article in Medium reported that WikiLeaks has exposed an email exchange between Democratic National Committee (DNC) officials about a secret meeting between DNC officers and Washington Post people. The email exchange dated September, 2015 was between DNC finance director Jordan Kaplan and senior DNC adviser Anu Rangappa and it has the subject line “Re:Wapo party†, and the conversation clearly involved pay-for-play. It was promised that “rich DNC donors would be rewarded access to Washington Post journalists†in the said secret meeting. The clandestine meeting was never supposed to be disclosed to the public as Ranggapa said in the email that “Washington Post does not want their party to be listed in any package we are selling to donors.†The fund-raising joint event that the parties were planning,

via IFTTT

Monday, July 3, 2017

"Colleges Are Preparing Kids For An Economy That No Longer Exists" As They Continue To Scam Parents And Students

ORIGINAL LINK

Authored by Daniel Ameduri via FutureMoneyTrends.com,

As I sat down to enjoy some smoked salmon at a recent BBQ I attended, I ended up at a table with two recent high school graduates.

To my disappointment, when I asked them what their plans were for the summer and beyond, both said they were heading to college.

With student loans and a wasteful four years in front of them, I couldn’t help but ask why.

Is there really anything that takes 4 to 8 years to learn or become an expert in?

Seriously, what a waste of time. Even Ham, the first ape that went into space, only trained for 2 years.

Colleges have convinced nearly everyone that you need a degree to be an effective employee or higher-income adult, but this is just not true.

I can tell you as an employer that I’ve never asked a single person what their grades were and I’ve never asked to see a degree.

The ugly truth is the ones with college degrees usually end up writing SEO articles for $15 an hour and the skilled workers who’ve been writing code as a hobby or editing videos for years on a MAC end up as managers making $75+ per hour.

Young people today who sign up for college are committing to 3 things.

1. Debt: It’s pure insanity that you’re required to pay for information that is freely available to all.

Think about it: a Google search, a 6-week or 6-month course, on the job training… All of these beat the price of college tuition.

Why anyone would borrow money for a college degree makes no sense. Unless the government has screwed your industry with a mandatory college degree in order to get some sort of license, like to practice medicine or law, what exactly is it that you need to pay the college for?

2. Four unproductive years: Ouch! One of the biggest negative effects is that you’re detouring a life for 4 full years or more.

It’s totally unnecessary at this point. When I was 18 years old, I made $55,000 while my peers sat in a classroom learning things that were forgotten before they even left the campus that day.

By the time I was 22 years old, instead of having a degree, I had made $260,000 working at a job for the past four years, I owned two businesses that cash-flowed, and I had over 10 rental properties, not including about $400,000 I had made from flipping homes as a side gig.

3. A workforce that isn’t there: Let’s be honest, colleges are preparing our young people for an economy that no longer exists!

We live in a global freelance economy. Employers want results for the lowest possible price, and they have the entire world to hire from.

The entitlement mindset and enormous false expectations a college puts in a person’s mind are only setting them up for failure.

Summary: The disservice in teaching people that education comes only from school has put millions of families in debt.

The college bubble — both the 1.2 trillion worth of student loans and the lie that you need a degree — is literally coming apart at the seams.

If you know a young person, help them get ahead by not going to college.



via IFTTT

In 1883, former New York Times chief editorial writer John Swinton admitted there was no such thing as a free or independent press, that a journalists job was to hide the truth and lie to the reader for the benefit of rich men.

ORIGINAL LINK


via IFTTT

The Media Blackout Of Seymour Hersh’s Exposé On US Missile Strike Against Syria

ORIGINAL LINK

A full week has passed since the publication by a major German newspaper of Pulitzer Prize-winning journalist Seymour Hersh’s thoroughgoing debunking of the false claim of a Syrian government chemical weapons attack on April 4. The supposed atrocity by the regime of Bashar al-Assad was used to justify the April 6 US cruise missile strike on the al-Shayat air base. At least nine civilians, including four children, died when 59 Tomahawk missiles rained down on the base in western Syria.



via IFTTT

The Crash Of 1929: "Somewhere, Deep Down, They Knew The Party Was Over"

ORIGINAL LINK

Via Jesse's Cafe Americain blog,

History may not repeat... but it sure ryhmes...

"...people believed that everything was going to be great always, always. There was a feeling of optimism in the air that you cannot even describe today."

"There was great hope. America came out of World War I with the economy intact. We were the only strong country in the world. The dollar was king. We had a very popular president in the middle of the decade, Calvin Coolidge, and an even more popular one elected in 1928, Herbert Hoover. So things looked pretty good."

"The economy was changing in this new America. It was the dawn of the consumer revolution. New inventions, mass marketing, factories turning out amazing products like radios, rayon, air conditioners, underarm deodorant...One of the most wondrous inventions of the age was consumer credit. Before 1920, the average worker couldn't borrow money. By 1929, "buy now, pay later" had become a way of life."

"Wall Street got the credit for this prosperity and Wall Street was dominated by just a small group of wealthy men. Rarely in the history of this nation had so much raw power been concentrated in the hands of a few businessmen..."

"One of the most common tactics was to manipulate the price of a particular stock, a stock like Radio Corporation of America...Wealthy investors would pool their money in a secret agreement to buy a stock, inflate its price and then sell it to an unsuspecting public. Most stocks in the 1920s were regularly manipulated by insiders "

"I would say that practically all the financial journals were on the take. This includes reporters for The Wall Street Journal, The New York Times, The Herald-Tribune, you name it. So if you were a pool operator, you'd call your friend at The Times and say, "Look, Charlie, there's an envelope waiting for you here and we think that perhaps you should write something nice about RCA." And Charlie would write something nice about RCA. A publicity man called A. Newton Plummer had canceled checks from practically every major journalist in New York City... Then, they would begin to -- what was called "painting the tape" and they would make the stock look exciting. They would trade among themselves and you'd see these big prints on RCA and people will say, "Oh, it looks as though that stock is being accumulated. Now, if they are behind it, you want to join them, so you go out and you buy stock also. Now, what's happening is the stock goes from 10 to 15 to 20 and now, it's at 20 and you start buying, other people start buying at 30, 40. The original group, the pool, they've stopped buying. They're selling you the stock. It's now 50 and they're out of it. And what happens, of course, is the stock collapses."

"The pools were a little like musical chairs. When the music stopped, somebody owned the stocks and those were the sufferers. If small investors suffered, they would soon be back for more. They knew the game was rigged, but maybe next time, they could beat the system. Wall Street had its critics, among them economist Roger Babson. He questioned the boom and was accused of lack of patriotism, of selling America short."

"Roger Babson warned of the speculation and said, "There's going to be a crash and the aftermath is going to be quite terrible." And people jumped on Babson from all around for saying such a thing, so that people who were cautious about their personal reputation, who did not want to call down on themselves a lot of calumny, kept quiet."

"Politicians came and went, but in the 20s, the businessman was king."

"With everyone trying to borrow money to cover the falling value of their stocks, there was a credit crunch. Interest rates soared. At 20 percent, few people could afford to borrow more money. The boom was about to collapse like a house of cards."

"...the National City Bank would provide $25 million of credit...immediately, the credit crisis was alleviated. In fact, within the next 24 hours, call money went from 20 percent to eight percent and that stopped the panic, then, in March [1929]"

"Everything was not fine that spring with the American economy. It was showing ominous signs of trouble. Steel production was declining. The construction industry was sluggish. Car sales dropped. Customers were getting harder to find. And because of easy credit, many people were deeply in debt. Large sections of the population were poor and getting poorer."

"Just as Wall Street had reflected a steady growth in the economy throughout most of the 20s, it would seem that now the market should reflect the economic slowdown. Instead, it soared to record heights. Stock prices no longer had anything to do with company profits, the economy or anything else. The speculative boom had acquired a momentum of its own."

"It was this nature of mass illusion. Prices were going up, people bought. That forced prices up further, that brought in more people. And eventually, the process becomes self-perpetuating. Every increase brings in more people convinced of their God-given right to get rich."

"The 20s was a decade of all sorts of fast money schemes. Three years earlier, everyone was buying Florida real estate. As prices of land skyrocketed, more people jumped in, hoping to make a killing. Then, overnight, the boom turned to bust and investors lost everything."

"On September 5th, economist Roger Babson gave a speech to a group of businessmen. 'Sooner or later, a crash is coming and it may be terrific.' He'd been saying the same thing for two years, but now, for some reason, investors were listening. The market took a severe dip. They called it the "Babson Break." The next day, prices stabilized, but several days later, they began to drift lower. Though investors had no way of knowing it, the collapse had already begun."

"...the market fluctuated wildly up and down. On September 12th, prices dropped ten percent. They dipped sharply again on the 20th. Stock markets around the world were falling, too. Then, on September 25th, the market suddenly rallied."

"Reuben L. Cain, Stock Salesman, 1929: I remember well that I thought, "Why is this doing this?" And then I thought, "Well, I'm new here and these people" -- like every day in the paper, Charlie Mitchell would have something to say, the J.P. Morgan people would have something to say about how good things were -- and I thought, "Well, they know a lot more about this market than I do. I'm fairly new here and I really can't see why it's going up." But then, when they say it can't go down or if it does go down today, it'll go back tomorrow, you think, "Well, they really are like God. They know it all and it must be the way it's going because they say so."

"As the market floundered, financial leaders were as optimistic as ever, more so. Just five days before the crash, Thomas Lamont, acting head of the highly conservative Morgan Bank, wrote a letter to President Hoover. "The future appears brilliant. Our securities are the most desirable in the world."

"Practically every business leader in American and banker, right around the time of 1929, was saying how wonderful things were and the economy had only one way to go and that was up."

"There came a Wednesday, October 23rd, when the market was a little shaky, weak. And whether this caused some spread of pessimism, one doesn't know. It certainly led a lot of people to think they should get out. And so, Thursday, October the 24th -- the first Black Thursday -- the market, beginning in the morning, took a terrific tumble. The market opened in an absolutely free fall and some people couldn't even get any bids for their shares and it was wild panic. And an ugly crowd gathered outside the stock exchange and it was described as making weird and threatening noises. It was, indeed, one of the worst days that had ever been seen down there."

"There was a glimmer of hope on Black Thursday...About 12:30, there was an announcement that this group of bankers would make available a very substantial sum to ease the credit stringency and support the market. And right after that, Dick Whitney made his famous walk across the floor of the New York Stock Exchange.... At 1:30 in the afternoon, at the height of the panic, he strolled across the floor and in a loud, clear voice, ordered 10,000 shares of U.S. Steel at a price considerably higher than the last bid. He then went from post to post, shouting buy orders for key stocks."

"And sure enough, this seemed to be evidence that the bankers had moved in to end the panic. And they did end it for that day. The market then stabilized and even went up."

"But Monday was not good. Apparently, people had thought about things over the weekend, over Sunday, and decided maybe they might be safer to get out. And then came the real crash, which was on Tuesday, when the market went down and down and down, without seeming limit...Morgan's bankers could no longer stem the tide. It was like trying to stop Niagara Falls. Everyone wanted to sell."

"In brokers' offices across the country, the small investors -- the tailors, the grocers, the secretaries -- stared at the moving ticker in numb silence. Hope of an easy retirement, the new home, their children's education, everything was gone."

"At the end of 1929, as they celebrated New Year's Eve, all that lay in the future. Nobody knew that the Great Depression was coming -- unemployment, bread lines, bank failures -- this was unimaginable. But the bubble had burst. Gone was that innocent optimism, the confidence, the illusion of wealth without work. One era had ended. They toasted the coming of the 30s, but somewhere, deep down, they knew the party was over."



via IFTTT

Sunday, July 2, 2017

Critical Vaccine Studies: 400 Important Scientific Papers Parents and Pediatricians Need To Be Aware Of

Comparing vaccination rates in 34 developed nations revealed a significant correlation between infant mortality rates and the number of vaccine doses infants receive. The U.S. requires the most vaccines and has the highest infant mortality

http://articles.mercola.com/sites/articles/archive/2017/07/02/critical-vaccine-studies.aspx