Showing posts with label Smart TV. Show all posts
Showing posts with label Smart TV. Show all posts

Saturday, 19 June 2021

Why YouTube is doing my head in!

The Many Problems With YouTube

By Dark Politricks

I have just listened to a podcast about physcopaths and then watched a few episodes of Kyrstal and Saagar's new show Breaking Points on YouTube after they left Rising, on The Hill.. It seems they left as it was just going to become another YouTube "pretend" #altnews entity, that is really a gatekeeper for establishment views.

It seems YouTube's new algorithm is really screwed up and not just in the manner that we all know. It is now another pro-establishment Silicon Valley tech God, that thinks it can control free speech, and does in fact do so in numerous ways. 

It's no wonder people are leaving on their own for other streaming channels that have all sprung up due to YouTube's heavy handed new approach. It seems to be trying to turn itself into more of a Television station, constant adverts for those that don't pay a monthly subscription fee, and why would you, when you could lose your favourite channels due to strikes, or Joe Rogan moving to Spotify, or other "tweaks" to their algorithm that has really done me in. I am not going to pay a monthly fee, but the amount of adverts and survey's that break up videos, when they used to just play one at the beginning of a clip is getting too much.

Not only does the removal of many of my favourite channels piss me off and make me less likely to ever pay for a subscription - not that I would, but here are some other reasons why people are leaving the service for other streaming apps that don't limit free speech.
                                           ,
  • Channels given strikes without a clear reason to why apart from "breaking their terms of service"
  • De-Monetising many of my favourite channels, leaving them to have to earn money from either paid subscriptions, super chats where people pay for comments to be read out, "Freedom" T-Shirt stores and other paywalls.
  • The amount of people they unsubscribe without their knowledge from their favourite channels.
  • Pushing pro-establishment media to the front of your view list such as MSNBC, BBC, CNN, TYT, and seemingly giving them top search results despite low viewing figures or low likes.
  • Channels that have low likes or viewing figures like the White House channel or MSM, yet they are still supported and promoted above real content, due to YouTube's split algorithm that pushes pro-establishment videos and propaganda over home grown entities that it was supposedly to be all to be about.
  • And for me, worst of all seeing that as part of Google it tracks everything I do, it still seems to repeat the same videos after one I had selected rather than moving onto another one related to the video I had just watched. This is the worst for me. I used to go to bed listening to a 3 hour interview with Joseph Farrell and wake up with another one of his videos playing or something related to it. Now all I get is the same speeches from Universities, and interviews with Jordan Peterson that I may have half watched months ago. I've even tried to just let the video play out to see if YouTube will note that I have watched it and not automatically give it to me again. Nope it still does. Meaning I have to have the controller for my SmartTV constantly nearby to change back to my relevant list. It has my history list of all that I have watched so why is it so stupid that it keeps repeating the same video over and over again? I could fix that for them with a few hours coding time spare. I'd do it for free it's so annoying actually.

The thing is as all these channels are being "cancelled" and either removed or had too many strikes so that they cannot be seen by outside viewers. They have now set up accounts on Bitchute.com or DTube or any of the other myriad of YouTube alternatives that have sprung up, in defence of "Free Speech", and offer the content producers payment either in crypto-currency, or other methods if not showing adverts. You can find a list of the best alternatives to YouTube here and for free speech here.

However the problem with these new applications is that my SmartTV doesn't have any options that allow me to watch these channels so I have to stream from my phone or laptop to watch them. When you want to drift off to sleep without having to keep your phone on, knowing your TV will switch off in 2 hours automatically instead of waiting for your phone battery to die then it is more than annoying.

I have a Roku on one TV but that doesn't offer many alternatives apart from Vimeo, which isn't really like YouTube. Plus I want to see my favourite alternative commentators on my TV with an easy way to switch to the channel and press play. In the old days knowing that after the video I had selected finished it would just move on to the next relevant item now it keeps going back to a video I have seen dozens of times  and just makes me have to turn the app off, when I am fed up of exiting a video I have seen a hundred times to search for something new.

I don't know if this is related to YouTube putting their MSM channels at the top of the search algorithms when you want to find something to watch or a consequence of it. However it is bloody annoying.

Google owns YouTube so it does the same cancelling of a channel and blog in sync. I had a whole business model, totally automated as I am a computer coder, that was taken down in one day and destroyed the company in a flash. Not only did my sites and social media outlets related to it get removed in a single day but this was well before Alex Jones and Trump had similar issues. 

Just so you know how the business worked it was totally automated on my own server that hosted the WordPress site I had installed - not because it was a good piece of software, it isn't, but because it was free and allowed me to hack about in the PHP code. 

Plus with the help of these two plugins that automated SEO, tagging, and Tweeting it got the site to the top of Google for a number of terms and also helped people find related content. The plugins I used were Strictly AutoTags that found the most relative words, names, corporations (Department of Defence, Axis of Evil etc), and Acronyms (NATO, AIPAC, MI6 etc), and changed them to increase SEO or linked them to other related pages about that subject.

The other one was Strictlty TweetBOT that allowed you to wait x seconds after the post before sending out any Tweets, and then even gaps between Tweets if sending to multiple Twitter accounts using different formats and hash tags. These were usually made up from the post-tags Strictly AutoTags had found. Only if a relevant article related to a subject was found would it Tweet them out in a format you set.

You can get a free or premium version of the plugin here > https://www.strictly-software.com/plugins/strictly-auto-tags and it works perfectly with another plugin from the same site > https://www.strictly-software.com/plugins/strictly-tweetbot these two along with a BOT I had written were the most important ingredients of making an automated information clearing house. This is just so you know how it worked if you are thinking of writing your own site.

So along with my information clearing site which you are viewing the 6th version of except now all articles are written by me, I had a business that I automated with the same tools, so I had to do as little work as possible with it and using the aforementioned plugins I managed to get it to the top of some Google searches for some hot long keyword terms. 

However one day after a dispute with YouTube where I had 100+ videos up which I had edited to add in little boxes and messages at certain points, in fact most were just a subscription list from other channels where I wanted to show certain clips. In no way did I ever claim they were mine but of course at Google and YouTube trying to find a human to talk to is almost impossible. When I started to get strike and take down orders from YouTube I tried to find someone to talk to - no go. So I went to the actual site that was claiming copyright infringement and even they agreed I had done nothing wrong. Despite this they did nothing to help me by contacting YouTube or removing their take down requests. So as they did nothing to help me retain my channel, suddenly on one day, everything was removed. It was all synchronised which just shows how Silicon Valley are all inter-related and I lost:

-My YouTube channel and all subscribers and videos.
-My Google+ community with 1000's of members - when Google+ was still a thing.
-My multiple Twitter accounts.
-My Facebook page with thousands of REAL followers and LIKES - not bought like many new companies now do for Black Hat SEO.

So that basically ruined my business by taking out all my social media hubs and routes in for people to join the site. I tried many a time to email FB, Google, YouTube, Twitter but all I got were useless knowledgebase articles.

Anyway that was 10yrs ago now. However I still have this site which is now on it's 6th hosting platform due to being on the naughty list > http://www.darkpolitricks.com/2020/02/am-i-going-down-google-plug-of.html for many articles that have somehow got me labelled either a Soros Paid Dis-Info Agent, a Russian Election Hacker, A Pro/Anti Israeli blog and many many more, all because I don't follow the establishment lies and their pretend history of the world they like to believe in. 

I guess in this day and age if you are not being labelled a Syrian Assad paid dis-info agent by The Young Turks, like Aaron Mate is currently being slandered, or being called a sexual abuser, like Jimmy Dore, after 5 years by a woman who is Armenian and works for a show called the The Young Turks then you are doing something wrong.

Here is a recent Tweet from Aaron about the slander being thrown at him by The Young Turks about his award winning reporting on the fake Syrian chemical attacks that the US used as a pretext for their bombing and invasion by CIA paid jihadists. . 


I find it very odd, that an Armenian, has joined a group called The Young Turks, as that's the name of the people who committed the massacres against her ancestors. Also at the time Anna Kasparian was Jimmy's superior so if he had really sexually abused her she could have easily sacked him at any point, not waited 5 years before sending him a DM blackmailing him, which he got out in front of her with a video explaining what happened but it is only causing a rift between supposed liberals and real journalist who don't take corporate money. This is only coming out now to smear Jimmy Dore, due to his show debunking the Syrian Gas Attacks, Russiagate, and being anti-war, as well as calling out shit-libs who were attacking Trump for doing exactly the same things Biden is now continuing to do. The timing tell's everything you need to know about this attack on Jimmy.

The Young Turks took millions from the same donors as the Clintons, and stopped showing pieces on their show called "Guess the Camel Toe", and "Whose Cooch Is This", and have become a promoted YouTube version of MSNBC.

If you want to know more about the online war between TYT and Jimmy Dore which started after Jimmy's campaign for the Justice Democrats, who were sent to Washington to disrupt the Democratic party and bring it to the left yet did nothing when they could have used their numbers to force a floor vote for #Medicare4All, then you should watch this video with Jimmy Dore here or on YouTube.




Also if you look though this site you will probably notice a number of blank videos, or unplayable ones, I do try from time to time to see if there is a backup version on Bitchute.com etc but there isn't always. Sometimes when people are "Cancelled" by the establishment and the all too powerful Silicon Valley nexus they are literally cancelled....as Alex Jones and Donald Trump know far too well.

So before this version of Dark Politricks, it was an information clearing site which you can still see old articles from on the wayback machine e.g the latest I can find which should have the most content is > https://web.archive.org/web/20191114104402/http://www.darkpolitricks.com/, the site being https://web.archive.org/ in which you just enter the URL of the site you want to see and a calendar will appear. Pick a date and then you will be taken to the snapshot of the site. 

I use this site a lot when I realise I wrote a good article some time back and want to get a copy of it however you will notice that none of the YouTube videos play. If the channel still exists that is. Then this is how you can watch them.

So, to watch the broken videos on any Wayback Machine linked website.
  • Go to the video.
  • Right Click on Share in the top right corner.
  • Copy the video URL (top option).
  • Open it up in a new tab. 
Just go to the link I just posted, and the first article will be about Tulsi Gabbard and how she calls Hillary Clinton a Chicken Hawk and am Insane Schizoid. An interesting article to re-read from The Duran, all about all the illogical reasons why Hillary thinks she lost the 2016 election apart from her being the most hated war monger in the country, so much that Donald Trump was a more appealing choice than she was.

She blamed everyone for being a Russian dis-info agent, stealing votes away from her. When in fact most voters who would have voted 3rd party such as the Green Party, also labelled a Russian outfit, would have either not voted at all or voted for Trump. 2016 really was a choice between 2 despicable human beings that people didn't want to vote either way for and when you get to 2020, Biden has not been the "change" that America needed. He even admitted to his rich Wall St donors that "nothing would fundamentally change". 

How about making them paying back some of that Trillion dollar upward wealth transfer that didn't "Trickle down" into new jobs and wage hikes for the staff, but was used for buying back stock, bonuses, and anything apart from helping the economy recover.

He has carried on building Trump's wall, broken most of his liberal campaign promises such as
  • A $15 min wage.
  • A public health option, or reducing the age that Medicare can be taken up.
  • A rebate on University fees.
  • Is still keeping kids in cages at the border something the shit-libs were crying out at Trump for doing, despite it being an Obama/Biden creation, and now Biden is in power what do we hear from those people? Nothing. 
That is what you call hypocrisy, when your side is in power you can do no wrong, when the other side does exactly the same thing they are evil and must be stopped at all costs.

If the channel and video still exists you can watch it there. I just watched it and reminded myself of the delusional #Russiagate narrative that was pushed by Clinton, the MSM and anyone unhappy Trump got elected rather than looking at themselves and seeing that:

a) Bernie Sanders at that time was more popular than both Hillary and Trump and would have got elected - not that the DNC and Democratic party wanted a real liberal left winger in control of their corporate, wall St backed, MSM gatekeeping, right wing party and they did everything to stop him getting those delegates.
b) All the MSM news stations gave billions of dollars worth of free air time to Trump, rather than cover any Democratic rally. Even showing empty stadiums for hours waiting for him to come on. There coverage of Trump gave everyone a chance to hear what he had to say, rather than let Bernie Sanders or Hillary talk to her donors.
c) The Democrats had nothing to offer their voters apart from a chance not to have Donald Trump in office and the Biden election has just reconfirmed that they cannot be trusted during elections, and will most likely let voters down. They use the public when they need them for votes, but once in power they keep their corporate donors happy, not the people of the country,.
d) That Tulsi Gabbard was and is still is a serving US Military member. She served in Iraq from 2004 to 2005 as part of the Hawaii Army National Guard and was stationed in Kuwait from 2008 to 2009 as an Army Military Police platoon leader.
e) Tulsi Has been to real war zones that have been created and stoked by "Chicken Hawk Hillary", and what a disgrace it was for someone like Hillary as a psychopath (see next article), to call her that. 

If you want to know the people who really hate going to war, ask someone who has served in a war zone and seen the bodies close up, not a chicken hawk who laughs at the cruel execution of Col Gadfdafi, after he gave up his nuclear weapons, and then faced a rebel insurrection funded by the west and helped by our Air campaign of destroying. Libya who once had the highest birth survival rate in Africa, free health care, free houses for people getting married and more. 

It is now a country split into at least 3 where the "official" government has to meet on a boat out at sea to prevent it from being attacked by al-Qaeda / ISIS jihadists who have brought back open air slave markets.. Now Biden is back in power to continue the Obama / Clinton policy of world domination you may want to read about Biden's war crimes in Syria that is if you want to read a narrative that is not pro war, and comes straight from the Pentagon.

You can watch the video with Tulsi and Clinton labelling her a Russian asset right here, or go to the censoring, cancelling, anti-free speech YouTube site if you want:



Obviously Google owns YouTube and doesn't want competition but if they are going to try and turn themselves into a TV station, only show pro-establishment media videos, and de-rank those #altnews videos that come from real journalists then they will soon find out how few visitors they get despite them fiddling with the numbers already to promote MSM videos, and those from the White House despite all the Thumbs Downs, and miniscule views they get.

All whilst videos that were getting millions of views per month such as Jimmy Dore, are being de-ranked in their new algorithm, to make it look like they are getting less viewers.  They are even talking about getting rid of the "Thumbs Down" button, probably due to all the down votes on content their new algorithm is promoting instead of videos people want to watch.

So this site is now purely filled by articles written by myself, apart from some old articles I had to save before they were wiped off the web such as bin-Laden's interview in Sep 2001 with reporters who could find him, whist the CIA apparently couldn't where he admitted he had nothing to do with the 9.11 attacks, or the 4 piece FOX NEWS report on Israeli spying

Yes Israel is the no 1 hacker the US has to deal with interfering with their infrastructure and main servers and telecommunications,  not Russia or China. So AIPAC got FOX to remove Carl Cameron's 4 part series in-case it stirred anti-Semitic responses and therefore not so commonly updated apart from the Twitter newspaper at the top (turn Brave Guards off, and ensure JavaScript is enabled if you cannot see it)

I also have a real #altnews search engine using Googles own tools where I have put the major sites from the 550+ to be banned into it so that if you want to get news that is not from a state paper or the MSM just use the bar at the top or go to > https://cse.google.com/cse?cx=005138288515408039386:xatdxpwn9on#gsc.tab=0

So here are some more reasons not to use YouTube, apart from the fact many SmartTV's don't have apps for many of the new alternatives:

1. You’re giving Google even more data, which adds to an even more accurate ‘user profile’. The alternatives  might serve you ads but they won’t have much more than what you’ll provide them with your profile.
2. You’re getting stuck in the ‘filter bubble’. Google thinks that it knows what you want and serves you the search results that match your profile and your interests. Leaving any other information outside your ‘filter bubble’.
3. Broaden your horizons. Not all the high quality videos that are available on the internet are on YouTube. If you are looking for fresh ideas for a scientific project – why not check TED? Or maybe you like old movies that can’t be found anywhere else – then check out the Internet Archive.

So if you’ve had enough of YouTube’s crackdowns on free speech, constant demonetization, and excessive promotion of mainstream media outlets, take a look at these alternatives which each give power back to users in different ways.

If you have any other recommendations for other "free speech" sites that reward content makers as YouTube used to do before "Cancel Culure" kicked in, or good quality sites that could replace YouTube, with easy ways to watch these sites on SmartTV's and Roku / Apple sticks etc, then please add them in the comment section.

All I want is to watch uncensored content from my favourite REAL journalists without being forced to watch MSM videos, or the same video over and over again when they know I have seen it or been offered the option to see it a million times already then please let us have the details!

It is time to leave these big Silicon Valley - Democratic - Pro War - Establishment sites that think that they can limit our free speech to history. We just need our TV apps to catch up or maybe it's the other way round and these sites need to make apps that can be used on TV's,

Anyway, whatever the solution is, we won't find it on YouTube.com.


By Dark Politricks

© 2021 Dark Politricks

Wednesday, 12 April 2017

CIA's Vault 7 Hacking Squad

CIA's Vault 7 Hacking Squad


By Dark Politricks

Vault 7: WikiLeaks reveals CIA's own internal hacking squad

I cannot remember when it was I wrote the article but you can check out some of the ways the authorities are listening to you on this older article I wrote some time ago.

I even warned about WebCams on TVs and phones listening and filming you.

In fact I have warned about that for a long time now. When TRAPWIRE is recording you from every CCTV, NSA is listening in on every phone call and text you send, the CIA is now watching you jerk off to Judge Judy through your TV.

It may sound ridiculous but can you imagine a room full of men, yes even very professional men, who when they get a nice shot of hot babe doing something in front of her TV, do you honestly believe they are not going to get their colleagues to come and have a gander and all have a good laugh?

It is just office mentality full of fools with dangerous tools.

I have a list of things you can try to do to mitigate the issue of living in a global Police State where once again it seems England and GCHQ, got on their knees in front of the CIA, and gobbled up all the work not covered by laws that protect UK citizens - are there even any left?

The article comes from WikiLeaks site if you want to read it there.

 WikiLeaks.org

A few days ago WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation.

This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.

By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponised" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."

Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs.

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".

Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below.

CIA 'hoarded' vulnerabilities ("zero days")

In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

'Cyberwar' programs are a serious proliferation risk

Cyber 'weapons' are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.

Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same 'weapons' against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'.

Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"

Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use.

To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

"Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target's machines over time. CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM".

CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.

Examples

The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero".

UMBRAGE

The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionnaires.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software.

The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now? WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.

Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.

Archive attachments (zip, tar.gz, ...) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.

Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

"Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions. The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?#

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is "Vault 7"

"Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of "Vault 7" obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of "Vault 7" from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of "Vault 7"?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of "Vault 7"?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn't WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already 'mined' all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won't other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

Read the full article and support WikiLeaks here WikiLeaks.org.

How to Protect Yourself

The ways to protect yourself from unwanted spying and trojans in your phone and PC are getting smaller and smaller. Even phone apps for virus checkers are actually spyware pretending to be virus checkers.

I have a list of many of the ways you can be spied upon by hackers or the CIA on this page but you can be in no doubt their technological skills are far greater than ours.

I think the only way is to go backwards to use tools that cannot be hacked.


  • Buy a TV without a webcam or even not a smart TV then buy a Roku to make it smart with catch up channels and Netflix.
  • Train pigeons like Pablo Escobar did in his prison to send messages to other people or actually talk face to face on a bench in a park with no phones on you.
  • You could put masking tape over your web cam when you are not using it and reattach when you want to Skype someone.
  • You could get an old Nokia and take the whole battery and even SIM out so that no GPS tracking can be done and with the battery removed they cannot even triangulate your whereabouts.
  • If you are going somewhere where you don't want anyone to know can you take your battery and SIM card out, if you can, and most smart phones make it very hard to, then do so.
  • Buy a 2nd "dumb phone" meant for OAP's, the battery is easily removable and they don't come with all the Logging Apps, Fake Games and GPS tracking jazz of smart phone. I would guess at least 20% of the games on Facebook that people constantly annoy you with are actually viruses or secret open door apps that send traffic using your own credit to wherever it needed to go.
  • Leave your phone at home if you don't need it.
  • Your TV is turned off and you are about to make love to your girl on the sofa. What you don't know is the TV is in "Fake Off" mode, where the geeks at GCHQ who have trouble meeting women as they were hired for their autistic skills, re-attach the tape and detach any external speakers. Try and stop a crowd getting a PornoTube video at work.
  • Don't use Wickr, WhatsApp or Telegram, who tell you they are encrypted end to end to talk important info. The CIA will have an unencrypted version of the message before you sent it.

Learn to live without technology. Get into the mindset of someone in the 90's where we all knew everyone's phone number in our heads and it was only 10p to use a phone box - not that I see many boxes anymore. No-one carried phones and spend all day and night on them. The worse you could expect was some crackling and beeps on a hacked into house phone.

People we are entering a global world where rich banksters and corrupt politicians bend over to the international corporations and allow them to do what they want. Be careful.

Read the original article at darkpolitricks.com and please help us out by visiting our advertisers.

By Dark Politricks 


© 2017 Dark Politricks

Friday, 18 December 2015

Why Their Is No Difference Between Democrats and Republicans

Why Their Is No Difference Between Democrats and Republicans

By Dark Politricks

No Difference between the GOP and Democrat
There is no difference between the Republicans and Democrats

I know that Conservatives in the US call Obama a Marxist and the Democrats attack the GOP as money grabbers for the rich, but in reality there is very little difference between the GOP and the Democrats.

From my perspective across the pond I haven't seen the US change for the better since all my years of being interested in US politics. This includes both Republican and Democratic Presidencies as well as times where the President was of the same party that controlled both houses of Congress yet still didn't push through policies you would expect them to.

Both the GOP and Democratic parties are:
  • Pro war, even if it means possible world war with Russia/China.
  • Pro Israel and pro AIPAC / JDL plus anti Palestinian rights.
  • Pro regime change (Iraq, Libya, Ukraine & Syria to name a few).
  • Pro drone strikes even on US citizens without judicial review.
  • Pro Bankster & Wall St and anti Working Class & main street.
  • Pro Police arbitrary killings. It feels as if the streets of some US cities are full of uninformed paramilitary death squads at the moment.
  • Pro NSA/FBI/CIA/Homeland security spying on you through your cars GPS, phones microphone/cameras, websites visited from your ISPs and server log files and even now through your TV!
If you have a new "Smart TV", have you actually read the privacy statement they make you sign in detail?

If not do so!

I read my new 4k TVs statement the other night and it mentioned built-in microphones and cameras installed into the TV to take photos of you for facial recognition and even to record your height, weight and vocal patterns.

Of course they claim that this is just to help deliver you tailored adverts and help with certain smart apps such as those that use voice commands or hand gestures but all this data goes off to a 3rd party company first to be analysed.

The legalese didn't mention who got access to this data or how long it was stored just that it could be used by the appropriate authorities and that non compliance was covered by New York Law.

Therefore if you break your new Smart TV's terms and conditions in any way you can have US policemen coming to arrest you wherever you are in the world. I have to wonder which 3 letter agencies get access to all this data, it really has become that Telescreen from George Orwell's 1984, if not I don't know how much closer they can become.

Just like phones which when switched off still have enough power to ping the phone masts and therefore record your whereabouts, I'd have a good bet that there is just enough power when your TV is in standby mode to record you through the microphone and camera.

Therefore don't rely on turning off your camera/microphone in the settings, if you are that paranoid go back to basics and cover them with masking tape. The simplest methods are best. However when even your TV is a sophisticated computer that can spy on you and record your actions and speech then we really have entered George Orwell's dystopian world.

Also people forget that our phones are those microchips everybody worried about having implanted in them to keep track of them by the Government in the 90s. It was the big thing, being chipped, a conspiracy theory that was just in the mind of tin foil hat wearing loons. However we happily take our phones with us everywhere we go. We constantly "Sign In", and "log where we are", "tag who we are with", and write down everything we are doing. Leaving a nice long trail of our life on the Internet to be remembered for decades to come.

To the youngsters of today there is no concept of privacy and they seem happy to give that away for the ability to communicate and therefore be logged and recorded.

With our mobile and household tracking devices we can now be located and spied on 24/7 and if you are a terrorist, domestic extremist, protester or even a citizen journalist (under new US combatant rules), you could find yourself being the target of something nasty flying through the air.

Microsoft, Facebook and Google constantly hand over all your private chat data, search requests, emails, and history of websites that we've visited to the authorities. Both if asked and sometimes just as standard due to their close relationships with the alphabet agencies of the US surveillance state. Google took seed money from the CIA and helped them design some of the NSA's searching algorithms for programs similar to those Snowden leaked such as PRISM and XKeyScore. Plus Microsoft was adding chips into their PC's from the 90's to help the NSA override any secure cryptography so that they could access your PC at will. Even the BBC reported on it in this 1999 article.

There is no difference between Democrats and Republicans on the issue of national security which means knowing as much as possible about as many people as possible.

ISIS which is a creation of US/UK Middle Eastern foreign policy, just as al-Qaeda was a database of CIA cut out agents/Jihadists, used to destabilise countries as ex UK Foreign Minister, Robin Cook wrote about, are used to scare us into just handing over all our civil liberties that the terrorists supposedly hate us for having. The US were bombing ISIS for a year as their Caliphate grew in size. Therefore they were either very bad at their bombing campaign compared to the Russians or they were allowing them to survive. Using the existence of these terrorists as an excuse to cut our civil liberties is basically doing their job for them.

If they truly "hate us for our freedoms", as George W Bush famously said, we shouldn't hand all our freedoms away never for them to return with laws like the Patriot ACT and the NDAA and in the UK the multitude of anti-terrorism bills that have been passed.

So it's the same with all 3 states in the Axis of War, the UK, France and the USA who have all suspended certain rights and freedoms due to the "threat" of terrorism.

I'd really like to see both Bernie Sanders and Jeremy Corbyn be leaders of both the USA and UK at the same time JUST TO SEE if REAL CHANGE is even possible from the top down.

When Obama came into office on a wave of support due to his meaningless chant of "We Can Change", it seemed to me that the slogan was purely about the colour of the White House occupants. Therefore I don't even believe real change from the top is actually possible, never been tried, or just stopped by the main string pullers from behind the curtains.

Having two characters like Bernie and Corbyn in power would at least show us if it was still possible to change the world for the better whether you like their policies or not.
If both these men did have full control and held true to the principles they currently state then in power we should see:
  • Less prison for drugs and minor offences.
  • Less Banksters running a mock with our tax payers money and no "too big to fail or jail" companies allowed to bank roll terrorists and drug cartels (e.g HSBC).
  • Less spending on the department of war and more on education, job creation, house building and investment in the people and country instead of wasting it on £800,000 missiles that are fired into rubble in pointless overseas wars.
  • Less stupid overtures that suggest our leaders want to start a new cold (or even hot) war with Russia. They seem to forget Russia helped solve the Iran nuclear deal, remove chemical weapons from Syria and are basically crushing DAESH in Syria despite Turkey and Saudi Arabian support for the Jihadists.
  • Less power to corporations who are NOT real people with feelings and emotions yet in the USA under law they are treated as such and so during elections pump millions into campaigns of people who will benefit them if they get into power.
  • Better and cheaper health care free at the point of use in the US, and less middle management and PPI hospitals in the UK that are bankrupting us into the future.
  • Free adult education and the ability to retrain and gain new skills throughout your life to keep you in a job. Having taxpaying workers is much better than people relying on state handouts.
  • Oh and all the stolen civil liberties we have had removed from us due to the "War on Terror" returned in the hundreds.

The Two Faced Janus Coin of American Politics


The two faced Janus coin of US politics
Both Main Parties in the USA Serve The Same Interests

These are all good reasons why we need strong 3rd parties in the USA and UK.

Many Europeans don't even realise that 3rd parties exist in the USA. Parties such as the Greens, Libertarians, Justice Party and even (shock horror) socialists!

Major political reform is needed so that these parties get a fair shake of the whip during elections, can debate the other parties on the major networks, and get the air time they require to make a dent into the two-faced Janus coin called American Democratic elections.

Of course the reason they don't is that the debates are all staged collusion with the networks who are all filled with COINTELPRO government mouthpieces. They have no urge to see REAL change come to the USA and actually do something to shake up the status quo.

How many Americans know they are still living under "Emergency Laws" enacted after 9 11 giving the President ultimate power. When will this end?

How good would an alliance be between the UK and the USA that would get on with other nations better and stop real evil e.g Israeli illegal occupation of Palestinian lands and Chinese/Saudi treatment of their people instead of selling weapons and outsourcing all our jobs to them.

Money should not matter more than morals but to George Osborne, Obama and the US/UK arms companies who must carry on their trade it seemingly does.

Our allies are not dissimilar to our enemies e.g ISIS and Saudi Arabia, yet we allow the 7th century hypocritical scum that the Saudi's are to continue with own Janus act of both funding and fighting terrorism.

However will this ever happen or will the establishment prevent the elections of such men as Bernie Sanders and Jeremy Corbyn  due to the threat of real change?

The realistic outcome is that some idiot like Donald Trump or a warmonger like Hillary Clinton will get into power in the USA to reign alongside an equally right-wing Tory party in the UK and the Axis of War will roll on.....

One can only wish.....

Remember, as George Orwell famously said:
War is Peace
Freedom is Slavery
Ignorance is Strength
Oh, and you do have a real choice in your elections.

 
View the original article at the main site www.darkpolitricks.com.

By Dark Politricks
 
© 2015 Dark Politricks