Obama Wants to Defeat America, Not ISIS

Last year at a NATO summit, Obama explicitly disavowed the idea of containing ISIS. “You can’t contain an organization that is running roughshod through that much territory, causing that much havoc, displacing that many people, killing that many innocents, enslaving that many women,” he said.

Instead he argued, “The goal has to be to dismantle them.” Continue reading

Chinese, Others Hack Interior Data 19 Times

Foreign intelligence agents and other hackers attacked Interior Department networks 19 times in recent years, before walking away from keyboards with unknown amounts of stolen data, according to agency inspectors.

The incidents are unrelated to a previously disclosed assault on Interior networks connected to Office of Personnel Management systems, the agency says. That high-profile campaign seized from the U.S. government 21.5 million confidential records on national security personnel and their family members. Continue reading

Matt Drudge: ‘America has been arming ISIS’

If you’ve been following Global Geopolitics for the last two years or so, this would be a no-brainer. The good news is that the mainstream picked up on it.




Rare tweet by media giant alludes to sinister Obama policy

Matt Drudge’s first tweet in months came with a cryptic message: “A shocking truth is unfolding: America has been arming ISIS.”

The Obama administration has been plagued for weeks over news U.S. weapons supplied to Syrian rebels were inadvertently winding up in the hands of terror groups. The media giant’s tweet on Tuesday alludes to something far more sinister.

Continue reading

Pictorial Essay: 15 Proofs It’s a Fake, Fake, Fake America

Real or Fake-1


Remember the hilarious 1960s movie, “It’s a Mad Mad Mad World?” Well, we live in a fake fake fake America. Politicians, economists, all MSM talking heads, Big Business, virtually every commercial that has ever aired, preachers, and on and on and on, all have one thing in common. They’re all liars and fake as a three dollar bill.

“Fake”, a simple definition: something that is not what it purports to be, a worthless imitation passed off as genuine; an impostor or charlatan. Example: “American society is extraordinarily fake; filled with lies, fraud, facades, mirages, deception, disinformation, misinformation, propaganda and brainwashing.” Continue reading

An Electromagnetic Arms Race Has Begun: China Is Making Railguns Too


This BAE graphic illustrates the basic principles behind railgun technology, as well as its advantages (high launch speed and range, affordability, high firing volume). Chinese railguns on the Type 055A destroyer would likely have such similar characteristics.


A Chinese defense contractor may be on its way to key breakthroughs in railgun weaponry.

Railguns are one of the potential game-changing weapons of future war. Instead of using the power of chemical explosives such as gunpowder, a railgun uses electromagnetic force to propel projectiles to hypersonic speeds, potentially up to ranges of several hundred miles. A railgun’s barrel has two parallel conducting rails built into it. When a moving armature (usually the projectile) is inserted into the barrel, it connects the parallel rails to complete the current, thus generating an intense electromagnetic field. The projectile then accelerates out of the barrel at high speeds. Continue reading

Chinese Soldiers Allowed on US Soil by Obama for First Time in American History


“Only by using special means to ‘clean up’ America will we be able to lead the Chinese people there. Only by using non-destructive weapons that can kill many people will we be able to reserve America for ourselves.” – Chinese Defense Minister, December 2005.


“Our military battle preparation appears to aim at Taiwan, but in fact is aimed at the United States, and the preparation is far beyond the scope of attacking aircraft carriers or satellites.”Chinese Defense Minister Chi Haotian, December 2005.

Tacoma, Washington – Chinese military operated on US soil for the first time in American history, marking an unprecedented provocation by the Obama administration and angering national security skeptics. Continue reading

First Iranian fighter jets over Syria alongside Russian bombers



A series of videos apparently leaked by the Russian Defense Ministry reveal the presence of Iranian F-14 and MiG -29 fighters in Syrian skies for the first time. They were shown by “The Aviationist,” Italian magazine, escorting heavy Russian bombers, including the Tupolev TU-160, the heaviest, fastest and most destructive bomber ever built, on missions no more than 150 km from Israel’s northern border. Continue reading

Top Secret Brief: Russian Threat to Undersea Cables Growing

Russian aggression continues to pose a threat to a massive series of undersea cables that carry worldwide Internet communications, according to a leading senator who received a top-secret classified briefing on the matter on Wednesday.

Russian subs and spyships have been caught “aggressively operating” near these cables in the last month, prompting concern among lawmakers and others who have warned that Moscow could easily sever these cables and toss large portions of America and other nations off the web. Continue reading

Cyber Attacks on U.S. Companies Since November 2014

Researchers are concerned over the strength and comprehensiveness of cybersecurity in the U.S., as companies across the country are being targeted in cyber attacks at an increasing rate of both occurrence and cost. Concerns continue to grow as both the number of attacks on companies’ networks and the cost to companies are increasing. The quantity and quality of information being hacked, stolen, destroyed, or leaked is becoming more of a problem for consumers and businesses alike. Continue reading

U.S. counterintelligence chief skeptical China has curbed spying on U.S.

U.S. counterintelligence chief Bill Evanina said on Wednesday he was skeptical China had followed through on recent promises to curb spying on the United States.

Evanina told a briefing that he had seen “no indication” from the U.S. private sector “that anything has changed” in the extent of Chinese espionage on the United States. Continue reading

China nearly triples number of supercomputers, report says

Again, don’t forget who you need to thank for China’s technological leaps and bounds that will surpass the United States much sooner than you think.


China has almost tripled its number of supercomputers, according to a reputable list of the world’s most powerful machines.

The country has 109 high-performance computing systems on the biannual Top500 list of supercomputers, up 196% from 37 just six months ago. Continue reading

Permanent Civil War

BERLIN (Own report) – Techniques of anti-Soviet propaganda that had been developed by Nazi officers, could serve today as a model for western anti-Russia psychological warfare operations, according to a semi-official publication from the entourage of the Bundeswehr. The current conflict between Russia and NATO has a “highly pronounced ideological dimension,” analogue to the Cold War, explains the author Uwe Hartmann, a colonel in the German armed forces. According to Hartmann, the Russian side is using the “freedoms of Western open societies” to “influence” public opinion with the aim of “relativizing the value of rights and freedoms,” “sowing discord” and “insecurity within the population.” To counter this strategy, attributed to Russia, Hartmann recommends reversion to the methods of the so-called ‘internal leadership’ concept elaborated by Wolf Graf von Baudissin, who had been on Hitler’s General Staff. This concept calls for preparing the armed forces as well as the society at large for a “permanent civil war” and for the leadership elite to convince Germans of the “worthiness of defending their country,” while immunizing them against all “ideological temptations” and “propaganda attacks.”

Continue reading

It’s Way Too Easy to Hack the Hospital

If you recall this post from 2011, you knew this day was coming.

The culture of “Patch & Pray” will be the downfall so long as America chooses to be reactive over proactive.


Firewalls and medical devices are extremely vulnerable, and everyone’s pointing fingers

In the fall of 2013, Billy Rios flew from his home in California to Rochester, Minn., for an assignment at the Mayo Clinic, the largest integrated nonprofit medical group practice in the world. Rios is a “white hat” hacker, which means customers hire him to break into their own computers. His roster of clients has included the Pentagon, major defense contractors, Microsoft, Google, and some others he can’t talk about.

But when he showed up, he was surprised to find himself in a conference room full of familiar faces. The Mayo Clinic had assembled an all-star team of about a dozen computer jocks, investigators from some of the biggest cybersecurity firms in the country, as well as the kind of hackers who draw crowds at conferences such as Black Hat and Def Con. The researchers split into teams, and hospital officials presented them with about 40 different medical devices. Do your worst, the researchers were instructed. Hack whatever you can. Continue reading

Report: German Intelligence Agency Spied on FBI, US Arms Companies

Germany’s BND foreign intelligence service spied on the FBI and U.S. arms companies, a public radio station in the country disclosed Wednesday. Continue reading

US defense contractors allegedly hired Russian computer programmers

Two American firms contracted by the Department of Defense have settled a lawsuit accusing them of having hired Russian programmers based in Moscow to write computer code for classified systems. The hires allegedly occurred as part of a $613 million contract, which was awarded by the US Pentagon to Massachusetts-based Netcracker Technology Corporation and Virginia-based Computer Systems Corporation (CSC). The two companies were hired to write software for the US Defense Information Systems Agency (DISA), a Pentagon outfit that provides the US armed forces with secure real-time combat communications. But in 2011, contractor John C. Kingsley, who had a supervisory role in the project, notified the US government that the two companies had farmed out part of the contract’s coding duties to programmers in Moscow and other Russian cities. Continue reading