If you watched television in the 1990s, I’ll bet you reminisced, however briefly, over the series Married With Children as the corporate media oozed their praise over the number of women and emasculated men who turned out on Saturday to ostensibly march for a host of “social justice” causes.
Imagine, for example, that you are walking past the house owned by an individual suspected of committing some of the most heinous crimes in your community, from child kidnapping to murder. Despite his reputation as a suspect, this person has never been arrested or convicted of any crime. You glance through the unlocked window and see a table, and upon this table rests a thick journal with handwritten words “Maps to the Victims’ Bodies” or something equally alarming. You stop dead in your tracks, look around and see that no one is home, and no one is watching you.
It is one of the most, if not the most underreported, misreported and mischaracterized story in recent history.
An official investigation conducted by law enforcement officials have concluded that the document known as the Certificate of Live Birth of U.S. President Barack Hussein Obama II, uploaded to and published on the White House website on April 27, 2011 is a fraudulently created document. It is a digitally manufactured forgery.
The following is a cursory investigative summary that explains the significance of the email “scandal” that erupted right before the 2016 election and how the Obama Department of Justice under Loretta Lynch worked in conjunction with the Hillary Clinton campaign to obstruct justice.
Everyone will recall the collective gasp of the Hillary Clinton supporters and the ensuing media outrage when Donald Trump refused to say whether he would accept the results of the Presidential election. His statement was made against the backdrop of a rigged election, fraudulent votes and voting machines that curiously overruled voters’ selections. Nonetheless, Hillary Clinton, along with her backup vocals like Chris Mathews, Rachael Maddow and other media sycophants continuously expressed outrage that Donald Trump would even think about jeopardizing our “democratic voting process.”
One of the many things that struck me about election night was what was not said or seen. It was the conspicuous absence of Hillary Rodham Clinton addressing her supporters after the race was called in favor of Donald Trump.
For all of the talk about Donald Trump not conceding in the wake of a Clinton win, I believe that she showed her true colors to the American people not by what she did, but what she did not do. I believe her conspicuous absence last night (or early this morning) reflects the character of Hillary Clinton and speaks volumes about her lack of concern for not just her supporters, but for the condition of America – and the many wounds that she herself created or exacerbated.
The law: Every government employee who is granted a security clearance to handle classified documents and information is required to sign form SF-312, which is a straight-forward and strictly enforced non-disclosure agreement. As clearly stated on this form, “classified information is marked or unmarked classified information, including oral communications, that is classified under the standards of Executive Order 13526.”
Hillary Clinton’s defense: Clinton stated that she never knowingly sent or received any documents with classified markings or designations. Her defense is irrelevant as the document she signed clearly states that the signatory clearly understands that documents could be classified without bearing such markings.
While speaking at a campaign event in Reno, Nevada at approximately 6:30 PM PT, Republican Presidential nominee Donald Trump was rushed offstage by members of the United States Secret Service due to a perceived threat near the front of the stage. However, a more extensive review of other footage available shows a bit more than is being reported.
While all eyes were on the front of the stage, trouble appeared to begin about 30 seconds earlier by at least one person at the rear of the crowd, not readily visible to those tuned in to the live streaming. Almost immediately, police and security from the rear of the room began making their way to the disturbance several rows in from the rear of the crowd.
It simply does not get more sadly ironic than this. Take a look at this 90-second raw video from 2010 of then-Secretary of State Hillary Clinton lecturing State Department employees on matters of cyber security. That’s right, she is actually warning State Department Employees that they have a special duty, a special responsibility to guard sensitive information.
Clinton notes that the State Department Cyber Security team works around the clock to guard the DoS systems against intrusion and exploitation. Why, then, did she knowingly use her own private, unsecured, and readily exploitable system and multiple devices to circumvent such capable security?
I submit that her use of private servers and multiple devices was no accident, no mistake, no error in judgment. It was a deliberate “end-around” of a “dot-gov” system that provides safeguards to sensitive, classified and top secret information.
To the astute investigator, this footage could well serve as a legitimate piece of evidence to further impeach the credibility of Hillary Clinton.
Julian Assange, the man behind Wikileaks and a threat to the criminal cabal of globalists working inside of the U.S. government, is the subject of multiple investigations, including two most recent, extremely serious and very curiously timed charges. In fact, it is suggested that these charges served, at least in part, as the basis for Assange recently losing his internet access.
A press release dated 18 October 2016 from Wikileaks details the charges, summarized as follows: “An unknown entity posing as an internet dating agency prepared an elaborate plot to falsely claim that Julian Assange received US$1 million from the Russian government and a second plot to frame him sexually molesting an eight year old girl.” Both are heavy duty accusations, to be sure.
“To the ordinary guy, all this is a bunch of gobbledygook. But out of the gobbledygook comes a very clear thing…. You can’t trust the government; you can’t believe what they say; and you can’t rely on their judgment…” H.R. Haldeman to Nixon, Monday, 14 June 1971, 3:09 p.m.
A brief review of history effectively exposes both the rampant hypocrisy of the Clinton cabal and their supporters, and reveals the complicity of the corporate media in a web of lies, cover-ups, and obfuscation to support the political left at all costs. At the epicenter is the Clinton power machine, the Clinton Foundation, the Obama-Clinton foreign policy of destruction and global power restructuring, the largest transfer of wealth and largesse, and the death grip by the Clinton machine to hold power through the upcoming election. One of the biggest threats, of course, is WikiLeaks.
The WikiLeaks disclosures present an increasingly uncomfortable situation for the political left, especially for the Clintons and their supporters. They also serve as a reminder why the corporate media is irrelevant, and illustrate just how journalists of today have been castrated and coopted by the criminal cabal of globalists. The media now serve as their primary propaganda arm to cover the criminality of those in power instead of uncovering it.
A recently published email by Wikileaks identifies 28 members of the media who were invited to an “off-the-record” dinner party at the home of Clinton campaign manager John Podesta three days before Hillary Rodham Clinton announced her 2016 campaign run.
Clinton announced her candidacy on April 12, 2015. On Thursday, April 9, 2015, a 7:00 PM dinner party was held at 3743 Brandywine St NW in Washington, DC, the home of Clinton campaign manager John Podesta.
Members of the “media bus,” or the journalists who would be tapped to cover the campaign were invited for dinner and ostensibly, a strategy session that would assist the Clinton candidacy. According to the email dated April 7, 2015, they included:
Every politician or government leader who has compromised our border security or advocated for the same has blood on their hands. Every Oval Office occupant, past or present, regardless of political party, who has been soft on our border has blood on their hands. Every member of congress who refused to enhance or even enforce border security has blood on their hands, as does every mayor or council member advocating their so-called “sanctuary cities,” the utopian destination of career criminal aliens.
Meet Silvestre Franco-Luviano, 40, a Mexican national who is in the United States illegally. He first entered the United States illegally in 1996, and was deported after a criminal conviction. He then re-entered the United States in 2009, but was caught and deported… again. In 2011, he was arrested in Austin, Texas and sentenced to eight months in jail. He was ultimately deported a third time in 2014.
“No one cares about the birther issue.” That’s what I am being told by nearly everyone I know, regardless of their political preference. What I hear, however, is no one cares about the U.S. Constitution, or about the rule of law. Seemingly, even fewer understand it. Fewer still are those who truly understand what’s at stake.
Eligibility requirements to hold the office of President of the United States are defined by the Constitution. The “natural born citizen” requirement was written in to the U.S. Constitution to protect our nation from foreign influence. It was written to protect our nation from being hijacked from within.
That seems like a pretty important legal requirement to me, considering that today, we’ve found ourselves in an epic battle between national and global (or arguably foreign) interests.
According to a federal law enforcement source close to the investigation of the bombing in Manhattan, it was disclosed that the “signatures” of the bombs, both detonated and undetonated, possess enough similarities to suspect they were constructed by the same maker. In addition to “having the ability to be remotely detonated,” the same components were used.
Specific information about the bombs was not being disclosed to avoid compromising the integrity of the investigation, although this source stated that the investigating agencies have a “suspect pool” based on the construction of the explosive devices. That does not mean that the bomber might be easily solved, or the bomber readily identified, cautioned this source.
Pursuant to Title 17 U.S.C. 107, other copyrighted work is provided for educational purposes, research, critical comment, or debate without profit or payment. If you wish to use copyrighted material from this site for your own purposes beyond the 'fair use' exception, you must obtain permission from the copyright owner. Views are those of authors and not necessarily those of Canada Free Press. Content is Copyright 1997-2017 the individual authors. Site Copyright 1997-2017 Canada Free Press.Com Privacy Statement