By: Voice of Reason
FOR MORE NEWS BY VOICE OF REASON CLICK HERE!
I always laugh when people on Twitter tell me they are not on Facebook because the government is monitoring Facebook. Uh, ok, and they’re not monitoring Twitter right? LOL.
GIVE ME A BREAK!
Not just the NSA, now even the Private Sector can even monitor what is on computers that have never even been plugged into an AC outlet or an Internet outlet. How do you like them apples? First, if you have not read the following, I suggest you read them. You will NEVER see the world the same again.
These are NOT articles written by conspiracy theorists. They are written by A WELL FUNDEDgroup called INSURGENCE INTELLIGENCE did EXTENSIVE research almost down to tracking the time cards used during the CIA SPONSORED DEVELOPMENT OF GOOGLE.
INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’
The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world.
The C.I.A. comes clean and ADMITS that it was instrumental in assisting the founders of Google when it came to issues involving financing as well as giving them the overall direction desired by those in power. Only an idiot would exercise contempt prior to investigation and not even bother to read the articles.
If people choose not to be on Facebook, that’s totally their prerogative. I could care less. I just think all the people on Twitter who refuse to be on Facebook because it’s a front for the government are hysterical. NEWSFLASH: Government sees ANY and ALL information it wants to, no matter where it is, whether you are on Facebook or not, whether you are on the Internet or not, and whether your computer is ON or OFF.
Yes. You read that right. IT’S NOT ENOUGH THAT THE NSA IS LISTENING TO AND RECORDING CONVERSATIONS IN YOUR OWN PRIVATE HOME VIA YOUR CELL PHONE MIC EVEN IF YOU CELL PHONE IS OFF, NOW the NSA is even able to SPY ON YOU AND RECORD YOUR PRIVATE CONVERSATIONS IF YOU HAVE RECENTLY BOUGHT A SMART TV. As if that isn’t horrific enough, we know LAW ENFORCEMENT and GOOGLE HAVE BOTH BEEN CAUGHT ACTIVATING CAMERAS ON LAPTOPS TO SPY ON UNWITTING VICTIMS, and technology has advanced so fast that not only is the NSA able to go snooping through your computer while it’s OFF andUNPLUGGED, but now the PRIVATE SECTOR can too.
THE NSA’S ABILITY:
WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.
While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers EVEN IF THEY ARE NOT CONNECTED TO THE INTERNET, according to N.S.A. documents, computer experts and American officials.
The technology, which the agency has used since at least 2008, relies on a COVERT CHANEL OF RADIO WAVES that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
The N.S.A. calls its efforts more an act of ”ACTIVE DEFENSE” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.
Among the most frequent targets of the N.S.A. and its Pentagon partner,United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”
“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
How the N.S.A. Uses Radio Frequencies to Penetrate Computers
The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
Join my Twitter feed | Like my Facebook page
No Domestic Use Seen
There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s.
“N.S.A.’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”
Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
FOR MORE NEWS BY VOICE OF REASON CLICK HERE!
Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.
Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”
Publishing this information, regardless of what domestic overreach the N.S.A. is guilty of, helps our enemies abroad and will weaken us in the future.
“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”
From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.’s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.
A Focus on Defense
In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States.
“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.
“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”
If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.
The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australia’s help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit.
Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers.
When the Chinese place surveillance software on American computer systems — and they have, on systems like those at the Pentagon and at The Times — the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. Obama laid out America’s complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June.
At that session, Mr. Obama tried to differentiate between conducting surveillance for national security — which the United States argues is legitimate — and conducting it to steal intellectual property.
“The argument is not working,” said Peter W. Singer of the Brookings Institution, a co-author of a new book called “Cybersecurity and Cyberwar.” “To the Chinese, gaining economic advantage is part of national security. And the Snowden revelations have taken a lot of the pressure off” the Chinese. Still, the United States has banned the sale of computer servers from a major Chinese manufacturer, Huawei, for fear that they could contain technology to penetrate American networks.
Join my Twitter feed | Like my Facebook page
An Old Technology
The N.S.A.’s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.
In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.
The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.
Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
The N.S.A. refused to talk about the documents that contained these descriptions, even after they were published in Europe.
“Continuous and selective publication of specific techniques and tools used by N.S.A. to pursue legitimate foreign intelligence targets is detrimental to the security of the United States and our allies,” Ms. Vines, the N.S.A. spokeswoman, said.
But the Iranians and others discovered some of those techniques years ago. The hardware in the N.S.A.’s catalog was crucial in the cyberattacks on Iran’s nuclear facilities, code-named Olympic Games, that began around 2008 and proceeded through the summer of 2010, when a technical error revealed the attack software, later called Stuxnet. That was the first major test of the technology.
One feature of the Stuxnet attack was that the technology the United States slipped into Iran’s nuclear enrichment plant at Natanz was able to map how it operated, then “phone home” the details. Later, that equipment was used to insert malware that blew up nearly 1,000 centrifuges, and temporarily set back Iran’s program.
But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
On Sunday, according to the semiofficial Fars news agency, Iran’s Oil Ministry issued another warning about possible cyberattacks, describing a series of defenses it was erecting — and making no mention of what are suspected of being its own attacks on Saudi Arabia’s largest oil producer.
Join my Twitter feed | Like my Facebook page
In Recent NSA News:
- NSA: It’s Not Just Your Phone Calls – It’s YOU They Are Listening To!
- Top NSA Official: We DO Spy On The SUPREME COURT & CONGRESS!
- CISPA: The Most Unconstitutional Law in American History
- Leaks Reveal NSA’s Top Secret Hacking Unit
- NSA: “NOTHING IS BEYOND OUR REACH!”
- N.S.A. Report Outlined Goals for More Power
- Obama’s NSA Review Board Member Says “We Need More NSA Spying”
- Video: NSA Can Hack Your Home Wi-Fi Network From 8 Miles Away
- NSA Looking To Crack WORLDWIDE Encryption With Quantum Computer
- NSA Reportedly Intercepting Laptops To Install Spy Malware
Here are some of the “Greatest Hits” of the NSA posts:
- Your TV is SPYING on You and Expect 30,000 Drones to ADD to IT!
- 1984 is Here and So is Orwellian Department of the Extreme
- Apple iPhone is Best Spy Tool Being Used By Uncle Sam
- 64% of Reporters Believe Big Brother is Spying on Them
- Fearing NSA, Writers in USA and Worldwide Avoiding Controversy
- Congress Bill Gives Police Unlimited Access to Private Communications
- Congress Expands NSA Data Collection
- NSA Docs Say An Email Address Is A ‘Facility,’ Skirting Probable Cause
- Police Using Social Media Posts to Determine “Threat Score” of Suspects
- The NSA That Will Conduct a “False Flag” Attack Upon the Power Grid
- ‘Fake’ Cell Phone Towers Found Across America
- Mystery of Fake Cell Phone Towers Revealed
- Feds Creating Database to Track “Hate Speech” on Twitter
- Is Big Brother Spying on Your Computer – With Your Own Cell Phone?
- Snowden Reveals NSA Program Described as ‘Last Straw’ Before Leak
- NSA’s Contractors Will Now Be Recording Your License Plate Numbers
- NSA Spied On Five Political Active American Citizens
- If You’re Reading Reason.com, NSA is Probably Already Following You
- NSA TARGETS THOSE WHO SIMPLY WISH TO PROTECT THEMSELVES
- ALL BUT FOUR Nations Under NSA’s Thumb!
- NSA Says It’s Too Big And Cannot Be Stopped!
- NSA Can Snoop On Computers While UNPLUGGED & OFFLINE NOW!
- How Did the NSA & FACEBOOK Make the Perfect Mass Spy Tool
- NSA Reports the Need For MORE Power (And They Aren’t ASKING)
- NSA Reportedly Recording All Phone Calls in a Foreign Country
- NSA Top Lawyer Says Tech Giants KNEW About Data Collection
- NSA Paid Tech Companies Like Facebook and Google Millions
- NSA COLLECTS 200 MILLION TEXT MESSAGES DAILY
- NSA USING FACEBOOK TO HACK YOUR COMPUTER
- Navy’s 757-Sized Drone Will Provide Big-Time Surveillance
- CISPA: The Most Unconstitutional Law in American History
- Leaks Reveal NSA’s Top Secret Hacking Unit
- NSA: “NOTHING IS BEYOND OUR REACH!”
- Document Reveals NSA Monitored 125 Billion Phone Calls in One Month
- N.S.A. Report Outlined Goals for More Power
- NSA SPYING ON CONGRESS AND SUPREME COURT
- Obama’s NSA Review Board MemberSays “We Need More NSA Spying”
- Video: NSA Can Hack Your Home WiFi Network From 8 Miles Away
- NSA Looking To Crack WORLDWIDE Encryption With Quantum Computer
- NSA Reportedly Intercepting Laptops To Install Spy Malware
- NSA Bugged UN Headquarters
- Apple iPhone 5s: BIG BROTHER’S DREAM!
- Big Brother Alert: Cameras In the Cable Box to Monitor TV Viewers
- Court Rules Cops Don’t Need Warrant to Track Cell Phones
- MIT: Future Smartphones Will ‘Listen to Everything All the Time’
- NSA Surveillance Said To Be Broader Than Initially Believed
- NSA Circumvents Encryption In Websites & Internet Messaging
- NSA Project XKeyscore Collects Nearly Everything You Do On The Internet
- NSA Spokesman Admits that the Government Is Spying On All Americans
- NSA Analysts ‘Willfully’ Skirted Policy to Spy on Americans, Agency Admits
THE PRIVATE SECTOR’S ABILITY:
Join my Twitter feed | Like my Facebook page
For years the most basic method of super security for a computer was to UNPLUG it from the network or internet.
However a team of security experts from Ben-Gurion University of the Negev (BGU) have discovered a new method to breach air-gapped computer systems.
Dubbed “BitWhisper” the hack enables two-way communications between adjacent,UNCONNECTED PC computers using heat.
According to a paper penned by Mordechai Guri, computers and networks are air-gapped when they need to be kept highly secure and isolated from unsecured networks, such as the public Internet or an unsecured local area network. Typically, air-gapped computers are used in financial transactions, mission critical tasks or military applications.
READ THE REST AT THE LAST GREAT STAND AT RIGHT.IS HERE:
By: Voice of Reason
FOR MORE NEWS BY VOICE OF REASON CLICK HERE!
THE VOICE OF REASON
- WEBSITE: http://thelastgreatstand.com/
- FACEBOOK: https://www.facebook.com/LastGreatStand
- GOOGLE PLUS: https://plus.google.com/u/0/+LastGreatStand
- TWITTER: https://twitter.com/#!/LastGreatStand
- TEA PARTY COMMUNITY: https://www.teapartycommunity.com/profile-151600/
- PATRIOT ACTION: http://patriotaction.net/members/TheVoiceofReason
- YOUTUBE CHANNEL: https://www.youtube.com/user/LastGreatStand/
- SEEN.IS: https://www.seen.is/members/home
- RIGHT.IS: http://right.is/contributor/pages/351/169/bio.html
UNCONSTITUTIONAL ACTS PERFORMED BY THE NSA:
- Your TV is SPYING on You and Expect 30,000 Drones to ADD to IT!
- 1984 is Here and So is Orwellian Department of the Extreme
- Apple iPhone is Best Spy Tool Being Used By Uncle Sam
- 64% of Reporters Believe Big Brother is Spying on Them
- Fearing NSA, Writers in USA and Worldwide Avoiding Controversy
- Congress Bill Gives Police Unlimited Access to Private Communications
- Congress Expands NSA Data Collection
- NSA Docs Say An Email Address Is A ‘Facility,’ Skirting Probable Cause
- Police Using Social Media Posts to Determine “Threat Score” of Suspects
- The NSA That Will Conduct a “False Flag” Attack Upon the Power Grid
- ‘Fake’ Cell Phone Towers Found Across America
- Mystery of Fake Cell Phone Towers Revealed
- Feds Creating Database to Track “Hate Speech” on Twitter
- Is Big Brother Spying on Your Computer – With Your Own Cell Phone?
- Snowden Reveals NSA Program Described as ‘Last Straw’ Before Leak
- NSA’s Contractors Will Now Be Recording Your License Plate Numbers
- NSA Spied On Five Political Active American Citizens
- If You’re Reading Reason.com, NSA is Probably Already Following You
- NSA TARGETS THOSE WHO SIMPLY WISH TO PROTECT THEMSELVES
- ALL BUT FOUR Nations Under NSA’s Thumb!
- NSA Says It’s Too Big And Cannot Be Stopped!
- NSA Can Snoop On Computers While UNPLUGGED & OFFLINE NOW!
- How Did the NSA & FACEBOOK Make the Perfect Mass Spy Tool
- NSA Reports the Need For MORE Power (And They Aren’t ASKING)
- NSA Reportedly Recording All Phone Calls in a Foreign Country
- NSA Top Lawyer Says Tech Giants KNEW About Data Collection
- NSA Paid Tech Companies Like Facebook and Google Millions
- NSA COLLECTS 200 MILLION TEXT MESSAGES DAILY
- NSA USING FACEBOOK TO HACK YOUR COMPUTER
- Navy’s 757-Sized Drone Will Provide Big-Time Surveillance
- CISPA: The Most Unconstitutional Law in American History
- Leaks Reveal NSA’s Top Secret Hacking Unit
- NSA: “NOTHING IS BEYOND OUR REACH!”
- Document Reveals NSA Monitored 125 Billion Phone Calls in One Month
- N.S.A. Report Outlined Goals for More Power
- NSA SPYING ON CONGRESS AND SUPREME COURT
- Obama’s NSA Review Board MemberSays “We Need More NSA Spying”
- Video: NSA Can Hack Your Home WiFi Network From 8 Miles Away
- NSA Looking To Crack WORLDWID Encryption With Quantum Computer
- NSA Reportedly Intercepting Laptops To Install Spy Malware
- NSA Bugged UN Headquarters
- Apple iPhone 5s: BIG BROTHER’S DREAM!
- Big Brother Alert: Cameras In the Cable Box to Monitor TV Viewers
- Court Rules Cops Don’t Need Warrant to Track Cell Phones
- MIT: Future Smartphones Will ‘Listen to Everything All the Time’
- NSA Surveillance Said To Be Broader Than Initially Believed
- NSA Circumvents Encryption In Websites & Internet Messaging
- NSA Project XKeyscore Collects Nearly Everything You Do On The Internet
- NSA Spokesman Admits that the Government Is Spying On All Americans
- NSA Analysts ‘Willfully’ Skirted Policy to Spy on Americans, Agency Admit
FOR MORE LINKS ON MARTIAL LAW:
- Military is Transitioning From Drills (Jade Helm) to MARTIAL LAW…
- DO NOT MISS: MARTIAL LAW – ELEMENTS TO WATCH FOR!
- How to Survive Martial Law! – DETAILED GUIDE!
- Obama Already Has d Over 500,000 Troops Stationed Here For Martial Law
- The “New Army Manual” – Does It Destroy the 1st Amendment?
- NEW ARMY MANUAL: LETHAL FORCE ON U.S. CITIZENS
- Ten Chilling Minutes of Video Exposing Martial Law Preparations
- ALERT: Bill Congress Just Passed May Be Backdoor Attempt to Disarm Vets
- What Will Happen First, Impeachment Or A Military Coup?
- The Government is AFRAID of VETERANS & They Should Be!
- ALERT: Pentagon Prepping For ‘Large Scale Economic Breakdown’…
- Expect “DEATH SQUADS” as Civil War Breaks Out In the U.S.
- The Growing Police State Is Tightening Its Noose Around Our Necks
- Deputy on Tape Saying MRAP Vehicles To Fight Legal Gun Owners
- UPDATE: DHS Insider Says Obama Green Lights a Race War
- GET READY! America’s Death Zones: Where NOT To Be When It Hits The Fan
- Top Cyclical Forecaster: “Yes, A Mad Max Event Is Possible”
- PATH TO MARTIAL LAW???? – Ebola Outbreak ‘Spiraling Out of Control’…
- Martial Law Preparations Being Made – Something Big on the Way
- How to Survive Martial Law! – DETAILED GUIDE!
- These Men Are Training To Put You and Your Family In a FEMA Camp
- MUST READ!!! – If You Won’t Fight, You’d Better Start Running!
- Leaked Docs Reveal ‘Urban Training Center’ Based on U.S. Town
- DHS and US Military Make Final Preparations Before Announcing Martial Law
- THOUSANDS OF “MARTIAL LAW NOW IN EFFECT” SIGNS SEEN IN IL.
- ALL ROADS LEAD TO MARIAL LAW!
- FEMA Concentration Camps: Locations and Corresponding Executive Orders!
LINKS SHOWING OBAMA’S MOTIVES ARE NOT A MYSTERY:
- BREAKING NEWS: The Shot Heard Round the World HAS Been Fired!
- Bill Congress Just Passed May Be Backdoor Attempt to Disarm Our Vets
- State Deputy on Tape Saying MRAP Vehicles To Fight Legal Gun Owners
- Is Obama Trying to Cause Civil Unrest in America?
- Judicial Watch Exposes Obama’s Ebola Plans
- MUST GO VIRAL! – PLEASE SHARE WITH EVERY PERSON YOU KNOW!!!!!
- SUPREME COURT GREEN LIGHTS DETENTION OF AMERICANS
- The Government is AFRAID of VETERANS & They Should Be!
- SEAL Veteran: Military Leaders Being Asked if They Will Disarm Americans
- What Would a Second American Revolution Look Like?
- Martial Law Preparations Being Made – Something Big on the Way
- MUST READ!!! – If You Won’t Fight, You’d Better Start Running!
- Marine Corps ‘Urban Training Center’ Based on U.S. Town
- DHS and US Military Make Final Preparations Before Announcing Martial Law
- ALL ROADS LEAD TO MARTIAL LAW!
- Do Liberals Really Want a Second Civil War?
- ALERT: Pentagon Prepping For ‘Large Scale Economic Breakdown’…
- ARMY TOLD TO USE LETHAL FORCE AGAINST “UNARMED U.S. CIVILIANS”
- The “New Army Manual” – Does It Destroy the 1st Amendment?
- ARMY MANUAL: Use Lethal Force on Peaceful Protesters
- Why Obama Will NEVER Get Our Guns: The Day Government Backed Down!
- U.S. Military Told to Prepare to Fight Fellow Americans
- OBAMA ACTIVATING SECRET “DEATH SQUADS” TO TARGET GUN OWNERS!
- Obama’s Gun Confiscation Plans Are a Prelude to Genocide
- Homeland Security Drones Looking For Civilians Carrying Guns
- Obama Admin Prepares To Disarm America
- 4 Star General Warns Marines About New Battleground – The Homeland
- Bone Chilling Interview With DHS Security Official – Obama Will NOT Rest
- We are Preparing for Massive Civil War, Says DHS Informant
- What are FEMA Camps and Why Should I Be Worried?
- Leaked DOJ Memo: Government Plans To Outlaw and Confiscate All Guns…
- Leaked Video: FEMA Preparing Military Police For Gun Confiscation
- Door to Door Gun Inspections Up For Vote In Massachusetts
- Revealed: Obama’s Immense Shadow Army & Its Shocking Takeover Plan
- Obama’s Plan For Permanent Power Grab While We’re Fixated On Distractions






