Post has attachment

Post has attachment
In an online market where claims not only develop like PR but entice larger audiences the more extraordinary and unexpected they grow, it was perhaps expected that a claim like “The Storm” would turn out to be an overnight sensation.
http://beforeitsnews.com/alternative/2018/01/q-anon-related-news-jan-1617-2018-video-3588736.html

Post has attachment

Post has attachment
Julian Assange has all over again sent Twitter into a rage of speculation with an additional cryptic tweet – on this occasion publishing a graphic of a popular chess strategy, compelling suggestions the whistleblower is implementing ‘checkmate’.
http://beforeitsnews.com/alternative/2018/01/marshall-attack-assange-sends-twitter-into-frenzy-of-speculation-over-chessboard-3588343.html

Post has attachment

Post has attachment

Post has attachment
The division in America is complex, and this video goes a long way in explaining it, and giving us a way to move forward. https://youtu.be/curMFPbihv4

Post has shared content
Apparently, this is being used domestically, too!
This is about a device that was, and still is, being used abroad in the War on Terror.
STINGRAY SPY DEVICES- A THREAT TO YOUR DIGITAL PRIVACY: I've been on Minds now for about three months and have crossed paths with some users whose channels cover some of the topics that most of society does not want to either talk about or think of, which is refreshing given the fact that so many other platforms have the tendency to censor opinions that of which they do not agree with. With that said however, I have yet to come across a post on the topic of the IMSI (International Mobile Subscriber Identity) catching devices generically called Stingrays, not the least that I'm aware of anyway. This is an important issue everyone (especially my fellow Americans) should be made aware of is occuring on a daily basis, and how digital privacy is slowly being eroded. Not surprisingly, the mainstream media sources and those in authority have remained mostly silent on this. If you own any kind of mobile device (smartphone, laptop etc) and believe in a right to privacy, this should concern you deeply. Police agencies around the US are using a surveillance tool known as Stingrays, which can mimic cell phone signals to get access to mobile devices contents. Originally designed for use on foreign battlefields to combat terrorism, these spying devices have found their way into the hands of US Government agencies and Law Enforcement. Police agencies in particular have gone through great lengths to keep information about how the Stingrays are being used from defense attorneys, judges, and of course the public. Through extensive nondisclosure agreements, the Federal Government has been able to prevent the disclosing of details about how Stingrays are being used, and could/have even order evidence withheld or entire cases dropped during criminal trials to protect the secrecy of the spy devices. Aside from violating Constitutionally protected rights (in particular the Fourth Amendment), this exposes a lack of accountability and transparency among Law Enforcement agencies at both the state and local levels, and raises serious questions about the security of our individual rights as the Government's technological capibilities rapidly advances. On LE's part there has been refusal to honor freedom of information requests, deceit towards courts and judges and the general public, only exacerbating these unconstitutional spying campaigns. The Fourth Amendment requirement for a warrant for probable cause has been sidestepped. Stingray IMSI catchers can either be in the form of a tower that looks similar to a genuine phone tower, or a mobile bundle that vaguely resembles a radio system. IMSI catchers force all nearby cell phones within a given area to connect to them instead of genuine cell towers, and once a device connects a location for the targeted device can be triangulated using its IMSI information. Also once connected, a Stingray could extract just about all forms of data stored on the phone from live monitoring of phone calls text messages and emails, to data from certain apps and stored encryption keys. Details on these spying devices first leaked to the public back in 2013 after a drug deal involving three men raised the suspicions of some advocacy groups. In short, two men made an arrangement with a drug dealer to meet in person, and once they met up the two men robbed the drug dealer at gun point and ran off. The suspects were caught and brought into custody, and sufficient evidence was present to convict them of the crime. The curious part however that caught the attention of some and in this case the defense attorney, was how quick the police were able to identify and locate the suspects in a rather short amount of time. When the two suspects went to court for the first time, the defense attorney starting asking questions that made the prosecution uneasy. There was a minimum three years and a maximum of thirty years in prison for armed robbery that involved drugs in that case, and with all the evidence against the defendants it would have seemed the prosecution had the case lock stock and barrel. In the end, the defendants were offered a plea bargain consisting of just a couple years of probation. A stingray was used illegally to obtain the locations and phone/text conversations of the two defendants, and Law Enforcement knew that if the case went to trial the defense would have pressured the prosecution on details about how the police were able to locate the suspects so quickly, and details on the Stingray would had to have been revealed. The police did not want that to happen, so they pressured the prosecutor to give them a plea bargain that avoided jail time. It is important to note that the Federal Government was involved as well, and groups like the NSA FBI and CIA work closely with LE in most states in making sure the details of such surveillance tools are not made known to the general public. There have been enough documented cases of potentially dangerous criminals that were released back onto the streets or given good plea deals to protect this secret, just to defend a LE tactic that serves as a work around due process and separation of power barriers. IMSI catchers operate in both active and passive modes. Some active mode operations are extracting stored data such as the cell carrier, force an increase in signal transmission power, interception of communication(s) content, tracking and locating devices, execute a denial of service attack, encryption key(s) extraction, and radio jamming. Using over-the-air signals to identify cell sites and map coverage areas is about the only passive mode operation. So summed up, stingray devices can interrupt and ultimately cut-off communications on targeted devices and extract data even when said devices are locked. To date, there is not much one could do to protect mobile devices from these fake cell phone towers, although I heard there are some products on the market that supposedly defend against those types of surveillance tactics. There are a few mobile apps that claim to detect stingrays and warn a user if and when one is attempting to connect your device to it, but most of them contain ads and spamware and can't guarantee proper function. There is one app that I know of for Android only called AIMSICD that was created as an open source project by an independent group that works by community usage of the app and reporting fake towers. I cannot tell for sure if that app is still being maintained or not, but it must still be operational as I had used it not too long ago to detect a fake tower about seven miles from where I live, and it worked perfectly. VPN's or Orbot would be relatively ineffective, as once a stingray connects to your device it could get access to your cell carrier directly. Perhaps the best defense against illegal surveillance tactics would be to spread the word about them to everyone you know and encourage them to take this issue up with their local representatives. Take to different social media platforms and voice your opinion on the matter. Nothing will change as long as everyone remains silent and accepting, and big brother surely isn't going to cease using technology to suit their own agenda. We the people need to stand up for our rights, before they are totally eradicated.
STINGRAY SPY DEVICES- A THREAT TO YOUR DIGITAL PRIVACY: I've been on Minds now for about three months and have crossed paths with some users whose channels cover some of the topics that most of society does not want to either talk about or think of, which is refreshing given the fact that so many other platforms have the tendency to censor opinions that of which they do not agree with. With that said however, I have yet to come across a post on the topic of the IMSI (International Mobile Subscriber Identity) catching devices generically called Stingrays, not the least that I'm aware of anyway. This is an important issue everyone (especially my fellow Americans) should be made aware of is occuring on a daily basis, and how digital privacy is slowly being eroded. Not surprisingly, the mainstream media sources and those in authority have remained mostly silent on this. If you own any kind of mobile device (smartphone, laptop etc) and believe in a right to privacy, this should concern you deeply. Police agencies around the US are using a surveillance tool known as Stingrays, which can mimic cell phone signals to get access to mobile devices contents. Originally designed for use on foreign battlefields to combat terrorism, these spying devices have found their way into the hands of US Government agencies and Law Enforcement. Police agencies in particular have gone through great lengths to keep information about how the Stingrays are being used from defense attorneys, judges, and of course the public. Through extensive nondisclosure agreements, the Federal Government has been able to prevent the disclosing of details about how Stingrays are being used, and could/have even order evidence withheld or entire cases dropped during criminal trials to protect the secrecy of the spy devices. Aside from violating Constitutionally protected rights (in particular the Fourth Amendment), this exposes a lack of accountability and transparency among Law Enforcement agencies at both the state and local levels, and raises serious questions about the security of our individual rights as the Government's technological capibilities rapidly advances. On LE's part there has been refusal to honor freedom of information requests, deceit towards courts and judges and the general public, only exacerbating these unconstitutional spying campaigns. The Fourth Amendment requirement for a warrant for probable cause has been sidestepped. Stingray IMSI catchers can either be in the form of a tower that looks similar to a genuine phone tower, or a mobile bundle that vaguely resembles a radio system. IMSI catchers force all nearby cell phones within a given area to connect to them instead of genuine cell towers, and once a device connects a location for the targeted device can be triangulated using its IMSI information. Also once connected, a Stingray could extract just about all forms of data stored on the phone from live monitoring of phone calls text messages and emails, to data from certain apps and stored encryption keys. Details on these spying devices first leaked to the public back in 2013 after a drug deal involving three men raised the suspicions of some advocacy groups. In short, two men made an arrangement with a drug dealer to meet in person, and once they met up the two men robbed the drug dealer at gun point and ran off. The suspects were caught and brought into custody, and sufficient evidence was present to convict them of the crime. The curious part however that caught the attention of some and in this case the defense attorney, was how quick the police were able to identify and locate the suspects in a rather short amount of time. When the two suspects went to court for the first time, the defense attorney starting asking questions that made the prosecution uneasy. There was a minimum three years and a maximum of thirty years in prison for armed robbery that involved drugs in that case, and with all the evidence against the defendants it would have seemed the prosecution had the case lock stock and barrel. In the end, the defendants were offered a plea bargain consisting of just a couple years of probation. A stingray was used illegally to obtain the locations and phone/text conversations of the two defendants, and Law Enforcement knew that if the case went to trial the defense would have pressured the prosecution on details about how the police were able to locate the suspects so quickly, and details on the Stingray would had to have been revealed. The police did not want that to happen, so they pressured the prosecutor to give them a plea bargain that avoided jail time. It is important to note that the Federal Government was involved as well, and groups like the NSA FBI and CIA work closely with LE in most states in making sure the details of such surveillance tools are not made known to the general public. There have been enough documented cases of potentially dangerous criminals that were released back onto the streets or given good plea deals to protect this secret, just to defend a LE tactic that serves as a work around due process and separation of power barriers. IMSI catchers operate in both active and passive modes. Some active mode operations are extracting stored data such as the cell carrier, force an increase in signal transmission power, interception of communication(s) content, tracking and locating devices, execute a denial of service attack, encryption key(s) extraction, and radio jamming. Using over-the-air signals to identify cell sites and map coverage areas is about the only passive mode operation. So summed up, stingray devices can interrupt and ultimately cut-off communications on targeted devices and extract data even when said devices are locked. To date, there is not much one could do to protect mobile devices from these fake cell phone towers, although I heard there are some products on the market that supposedly defend against those types of surveillance tactics. There are a few mobile apps that claim to detect stingrays and warn a user if and when one is attempting to connect your device to it, but most of them contain ads and spamware and can't guarantee proper function. There is one app that I know of for Android only called AIMSICD that was created as an open source project by an independent group that works by community usage of the app and reporting fake towers. I cannot tell for sure if that app is still being maintained or not, but it must still be operational as I had used it not too long ago to detect a fake tower about seven miles from where I live, and it worked perfectly. VPN's or Orbot would be relatively ineffective, as once a stingray connects to your device it could get access to your cell carrier directly. Perhaps the best defense against illegal surveillance tactics would be to spread the word about them to everyone you know and encourage them to take this issue up with their local representatives. Take to different social media platforms and voice your opinion on the matter. Nothing will change as long as everyone remains silent and accepting, and big brother surely isn't going to cease using technology to suit their own agenda. We the people need to stand up for our rights, before they are totally eradicated.
minds.com

Post has shared content
On January 8, 2018, the trial against Cliven Bundy, Ammon Bundy, Ryan Bundy, and Ryan Payne was dismissed with prejudice never to be brought up again. Why? Because the federal governmet willfully kept exculpatory evidence from the defense violating due process. This evidence was so damming it would have not only proven the innocence of everyone whom was involved with the 2014 standoff, but would also show the government using military force against the American people.

NOTE: THIS HAPPENED AND WAS FULLY STAGED BEFORE PROTESTERS SHOWED UP AT THE BUNDY RANCH. It is also another confirmation that ALL people who showed up to the ranch to ensure there would not be another WACO were 100% correct in their assessment of the treasonous actions and intent of the BLM, FBI, and other agencies involved. Because of their heroic actions coming to the aid of their neighbor no lives were lost on either side.

The government wanted the public to see these agents as "victims" that were "in fear for their lives". Take a look at newly released evidence previously withheld from the public, the defense, and the jury. You then make your decision. Who was the victim?

Post has attachment
1. The author of "Fire and Fury" has admitted the points in his book are laid out "as he sees it". In other words, it's fictional.
2. Prior to this fictional book, this author has been known as a sensational or gossip journalist.
3. The New York Times has already debunked many details and items in the book.
4. Steve Bannon has made a public statement regretting his portrayal in the book and states that he is 100% behind the President.
5. The book claims President Trump did not know who John Boehner was before election but Fox news recovered footage of the two meeting in 2013.
6. The book claimed the President did not want to win the Presidency but still colluded with Russians to win the Presidency.
7. Many lawsuits are being filed over the contents of this book.

I could go on but you get my point. It's a fictional tale once again coming from the left. President Trump is not the first Republican President to come under fire by the left and the media. They claimed Reagan was incompetent and made fun of Bush for his Texan accent and called him unintelligent. A majority of the voters didn't listen to them then and they are not listening now. We're too focused on the benefits of tax reform, a booming economy, a very low unemployment rate, DOW hitting record high nos., and a surge in manufacturing jobs.

https://www.youtube.com/watch?v=g049lRLtu_g&t=23s
Wait while more posts are being loaded