Iran freed 7 men, portrayed as civilians by Obama. His DOJ said 3 worked in an illegal network supplying Iran with US microelectronics for surface-to-air & cruise missiles. Another was serving 8-years for supplying Iran w/ satellite technology & hardware.
December 23, 2020, Trump tweeted this about missiles that failed to launch from Iran. If they failed to launch, how did they get them? Was this evidence? Note Trump also said we hear chatter about additional attacks.
There was a series of unpublicized court filings, then DOJ dropped charges against 14 other men. One sought to lease Boeing aircraft for an Iranian airline authorities say supported Hezbollah. 4th charged w/ conspiring to buy thousands of US assault rifles & import them into Iran
OMG!
Amin Ravan charged w/ smuggling US military antenna to Hong Kong & Singapore for Iran. Authorities also believe he was part of procurement network providing Iran w/ high-tech components for an especially deadly IED used by Shiite militias to kill 100s of US troops in Iraq.
The biggest fish, though, was Seyed Abolfazl Shahab Jamili, who had been charged with being part of a conspiracy that from 2005 to 2012 procured thousands of parts with nuclear applications for Iran via China including 100s of US-made sensors for uranium enrichment centrifuges.
This information gives new meaning to this tweet from Javad Zarif.
In 2013, Obama administration met with Essam El Haddad, a foreign policy adviser to the now-deposed Egypt’s Muslim Brotherhood president Mohamed Morsi. At the same time, Haddad met with Iran’s spy chief, Qassem Soleimani in Cairo.
Pope Francis has joined the Rothschilds, World Economic Forum, Rockefeller & Ford Foundations, Kering group, & Allianz, in the #GreatReset, some of the same groups who promote abortion, pansexuality, Marxism, BLM, & open borders.
Media users become victims of information warfare by both traditional & social media...Media users are becoming increasingly aware they are the objects of (dis)information activities aimed at affecting their perception of reality.
Resistance to propaganda & disinformation is to escape the “information bubble” (“echo chamber”, a situation of restricted access to info other than provided by algorithms based on user’s previous activity) by diversifying sources & acquiring info not suggested by algorithms.
Things are getting interesting. Bryne has a certificate from Beijing Normal University, a Bachelor of Arts in Chinese studies from Dartmouth, a masters from Cambridge as a Marshall (Plan) Scholar & a Ph.D. in philosophy from Stanford.
Note there is a large gap from 1985-1989
Byrne was at Stanford as a teaching fellow 1989-91, at the same time Condi Rice was an assoc. professor. Byrne didn't get his PhD until 1996. Also at Stanford then was William Perry, Clinton Sec Def, & his consultant John Lewis. I have no idea if Byrne knew Rice, Perry, or Lewis.
In the Carter W. Page FISA warrant of June, 2017, would all of these individuals have had to sign this application before it was turned over to the court?
Carter Page was supposed to testify to House Intelligence Committee June 6, 2017, but THEY cancelled his appearance. Instead, people named on that FISA reinstituted the Witch Hunt. Note, in his letter to Congress, Page calls it the Clinton/Obama regime.
Carter Page correctly called out the March 20, 2017, Opening Statement of Adam Schiff, where he specifically stated the transnational actor, Christopher Steele, worked with the Obama Administration officicials & government agents to interfere in the 2016 election.
Kraken is the Combat Outpost Surveillance & Force Protection System (COSFPS).
Brain is Joint Force Protection Advanced Security System (JFPASS).
Through interface protocol, all systems rapidly integrate into a COMMON SERVER or HARDDRIVE & is shared...
Individual technologies assembled for the Kraken are integrated through a government-owned, scalable & OPEN ARCHITECTURE SOFTWARE called Joint Force Protection Advanced Security System, or JFPASS.
An Open Architecture System allows each layer to provide a set of accessible functionality and ACCESS that can be CONTROLLED and used by the functions in the layer ABOVE or BELOW it.