Steve3007 wrote:
As has also already been observed here, it's still difficult to judge the extent to which these regular rants are simply what they appear to be or are part of a deliberate policy. Maybe somewhere in between.
A quick break in to the masturbation circle-jerk conversation here (not expecting any direct reply from the CJ club members), but yeah, it will be a "deliberate" policy (strategy) of counter-punching Trump. It is obviously working as it is causing the releasing of the hounds and will be exposing the hound's handlers.
Consider Jeff Bezos who bought The Washington Post for $250,000,000 and then very soon after was paid $600,000,000 by the CIA, for cloud operations using Bezos's Am@zon company (can't use the letter a because this site blocks it thinking it is an ad). Then recently, lo and behold, the Wash-Post hire pedophile-ring commander, John Podesta (yes, Obama's master), most likely on the orders of the CIA, so that Podesta gains journalist privileges which allows him to get to see into aspects of any official investigations of him, giving him more of a chance to either run or create a defense tactic.
This is one example of how thick the intelligence community, under Obama, has been with certain mainstream media.
Ok. Back to your circle now, boys.
-- Updated March 8th, 2017, 11:06 pm to add the following --
CIA project 'UMBRAGE' (Their, CIA, method of masking CIA hacking by making it look like Russian hacker's methods)
WikiLeaks says it acquired the documents from a source who wished to propel a debate about whether CIA’s hacking capabilities exceed the agency's legal powers. If authentic, the documents appear to show that the CIA's hacking division has developed software that enables the agency to break into smartphones, computers and even turn Internet-connected televisions into microphones.
The documents also suggest that one of the agency’s divisions – the Remote Development Branch’s UMBRAGE Group – may have been cataloging hacking methods from outside hackers, including in Russia, that would have allowed the agency to mask their identity by employing the method during espionage.
“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types, but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from,” Wikileaks said in a statement.