Lawyer and Ring of Fire Talk Show Host, Mike Papantonio explains why Corporate America needed to take control of the media to gain power over the “marketplace of ideas.” By doing so, he emphatically states, the return on the investment enabled media domination, closing newsrooms across the world and reduced the American news to nothing more than infotainment.
I support digital freedom: free expression, security, privacy, creativity, and access to knowledge https://www.eff.org/EFA
Mar 24, 2017
Mar 23, 2017
MSM War Coverage - Aleppo versus Mosul
Saint Elijah's Monastery, Mosul, Iraq - the oldest Christian monastery in Iraq. (Photo credit: Wikipedia) |
Excellent article by Roger Bridge, originally posted on RTs Op-Edge website.
The world recently got a crude lesson as to how the Western media machine manipulates its news coverage to fit NATO's regime-change agenda.
During two parallel global events - the Russian-backed liberation of Aleppo and the US-backed liberation of Mosul - viewers witnessed the tragic circumstances of two children, with two radically different media spins.
By now, many people are familiar with the story of Omran Daqneesh. He is the Syrian boy from Aleppo who - seated alone in the back of an ambulance, covered in dust, blood and the flood of flashbulbs - became the Western media's stock image whenever it wished to portray the "Russian-backed Syrian regime" and its effort to free the city of Aleppo from the yoke of terrorism.
Omran's "haunting" photograph, splashed across every front page of every Western newspaper on August 18, 2016, accompanied a self-righteous Western jeremiad against "Russia and the Syrian regime," as opposed to the bloodthirsty terrorists who held the residents of this northern Syrian city hostage to their insane ideology for years.
Would the Western media really stoop so low as to use the image of an injured child as a propaganda device to damage Russia’s efforts in defeating such deranged characters?
Unfortunately, that appears to have been the case.
No time or space for 'Mosul girl'
While much of the developed world knows of ‘Aleppo boy’ Omran Daqneesh, how many have heard of an equally tragic story involving a five-year-old girl named Hawraa, the sole survivor of a US-coordinated airstrike on her home in Mosul?
The girl, with burns over much of her body, is now battling for her life in the field hospital of Iraq Special Operations Forces. No place for a five-year-old child, that's for sure. Yet this tragic story has gone conspicuously missing from the West's "heroic" Mosul narrative.
Continue Reading
Related articles
Tillerson plans to skip NATO meeting, visit Russia in April
"Socialists" Supporting NATO and U.S. Empire, Endorse "Moderate" Terrorists in Syria
Russian Official Blames "Western Media" for Turkish Ambassador's Assassination
The Existential Madness of Putin-Bashing
Russia says close to starting joint military action with USA in Aleppo: RIA
Why NATO Has Become One of the Most Destructive Forces on the Planet
On the Trail of Turkey's Terrorist Grey Wolves
Wikileaks: DarkMatter
From Wikileaks:
"Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.
Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.
Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise."
"Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.
Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.
Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise."
Related articles
CIA Planned To Hack Cars And Trucks To Carry Out Undetectable Assassinations Claims WikiLeaks
Apple: Many flaws disclosed by WikiLeaks are already fixed
Wikileaks Claims the CIA Created, Lost Malware for iOS
WikiLeaks Publishes Thousands of Documents on Alleged CIA Hacking Techniques
News: WikiLeaks claims the CIA has dedicated resources aimed at hacking iOS devices
Will WikiLeaks work with tech firms to defeat CIA hacking?
Apple says most vulnerabilities in Wikileaks docs are already patched
Mar 20, 2017
Aleppo, Still in the News Cycle
![]() |
English: Great Mosque of Aleppo (Photo credit: Wikipedia) |
“More than 100 airstrikes conducted by Russian and Syrian warplanes on the town of Deir Hafer and the village of Maskanah and its surrounding area in rural east Aleppo,” Al-‘Amaq claimed on Sunday night.
This claim by Al-‘Amaq confirms earlier reports by Syrian Army activists regarding the large number of airstrikes over east Aleppo on Sunday.
The Syrian Arab Army is currently on the offensive against Islamic State in the Deir Hafer Plain; they are positioned at the outskirts of the town, as they close in on the terrorist stronghold from three different flanks.
Source: AMN - Al-Masdar News | المصدر نيوز
Subscribe to:
Posts (Atom)
Latest Analysis of events in Bakhmut (Artyomovsk) Ukraine by RT
‼️ What is known about the blocking of the Armed Forces of Ukraine in Artyomovsk (Bakhmut): RT analysis By mid-April, the grouping of the Ar...
-
Key Takeaways: Iraqi Officials Meet Foreign Counterparts as Saudi Arabia and Iran Compete for Influence – On April 6, Prime Minister Ad...
-
Key Takeaways: Iraqi Leaders Meet Foreign Counterparts; Further Progress on KRG Formation – On May 3, Iraqi Prime Minister Adel Abdul-M...
-
About anti-Semitism Russian Foreign Ministry May 03, 2022 (via Google Translate) We paid attention to the anti-historical statements of Isra...