The “full wrath” of the United States Central Intelligence Agency (CIA) will soon descend upon all of America after the deadliest secret lies of this “Deep State” spy agency currently at war with President Donald Trump, have now been exposed for the entire world to see, and whose next “false flag” terror attack to cover up their crimes may come as soon this coming week.
The international whistle blowing organization Wikileaks released the largest ever in history publication of over 8,000 CIA top secret documents (Vault 7: CIA Hacking Tools Revealed) revealing that this “Deep State” spy agency has, in fact, created and cast a vast electronic surveillance net around the entire US unrivaled in modern times and that has turned even the most innocuous devices (televisions, phones, computers, smart devices, automobiles, etc.) into illegal spying tools.
Prior to the release by Wikileaks of these CIA top secret documents, this organizations leader, Julian Assange, on the 3rd of March, emailed to President Trump’s National Security Council (NSC) the encrypted key to unlock Vault 7 where these over 8,000 documents were stored, and that caused Trump to explode in anger less than 24 hours later and accuse former President Barack Obama of illegally having him placed under surveillance. Angering President Trump the most, as well as the FSB, were these top secret CIA documents revealing that this “Deep State” spy agency had created an “exploit” to falsely implicate Russia in hacking crimes it had never committed, and didn’t have to do as these Democrats had already destroyed themselves. The CIA’s creation of this “exploit” designed to blame Russia for hacking crimes, was co-created by Google engineers who had, at least, 427 meetings at the White House over the course of Obama’s presidency, and that in its final development stage was given to a cybersecurity technology company named CrowdStrike that Google Capital had invested $100 million in.
As to what CrowdStrike did with this CIA-Google “exploit”, one must remember that during last years US presidential election, Wikileaks released what are now called “The Podesta Emails” that roiled the Hillary Clinton campaign due to its many shocking revelations of high crimes and corruption within not only Clinton’s campaign, but, also, the entire Democratic Party (DNC).
To how Wikileaks obtained “The Podesta Emails” in the first place, was through a disgruntled DNC officer named Seth Rich who was angry over the election being manipulated against Senator Bernie Sanders, but who shortly after he had turned over these damning email documents to Wikileaks was assassinated, and that Wikileaks offered a $20,000 reward for to capture his killers, who were never found. With Hillary Clinton’s campaign manager John Podesta having previously stated to Seth Richs’ assassination that “I’m definitely for making an example of a suspected leaker whether or not we have any real basis for it.”, and Wikileaks leader Assange himself saying Russia had nothing whatsoever to do with the hacking of “The Podesta Emails”, there was no doubt within the FSB that this DNC leaker had been killed by Clinton and/or Obama forces for his leaking of these damaging documents.
Could you survive after an EMP attack? Would you be able to sustain your loved ones when all hell breaks loose? In this video, I will unearth a long-forgotten secret that helped our ancestors survive famines, wars, economic crises, diseases, droughts, and anything else life threw at them… a secret that will help you do the same for your loved ones when America crumbles into the ground. I’m also going to share with you three old lessons that will ensure your children will be well fed when others are rummaging through garbage bins. Click here to learn all about the 3 skills that will help you thrive in any crises situation.
Shockingly, however, on 22 December 2016, barely a month prior to President Trump taking office, CrowdStrike released a report claiming that a tool (exploit) used in the DNC hack of “The Podesta Emails” had also been used, rewritten for Android phones, in malware that appeared in an application used by Ukrainian artillery units, and that this report purported to show that a hacking tool used in the DNC hack had also been used to kill Ukrainians fighting Russian separatists, that they called “Fancy Bear”, and blamed Russia for creating. In its most simplistic rendering, what CrowdStrike was claiming was that Russian military intelligence (GRU) created the “Fancy Bear” exploit to put on the Android phones of Ukrainian artillery soldiers so that when they used them they could be targeted and killed, and that was also found on the DNC computer hack, with the major problem to this outrageous claim being that it wasn’t true, and that Ukraine’s Ministry of Defense told the world about too.
When American computer experts began investigating this incredible CrowdStrike claim that Russia created the “Fancy Bear” exploit, they noted that this Google funded cybersecurity company “was apparently doing this work for free (!!)”, didn’t bother to talk to the creator of the Android software, and, at its most basic, created a nearly entirely make believe report designed to fit a narrative and timeline wished for by the Obama regime.
Even more critical to note, was that neither CrowdStrike nor the DNC would allow counterintelligence computer experts from the Federal Bureau of Investigation (FBI) to even see the servers to confirm that his “Fancy Bear” exploit even existed. But even as this “fake news” CrowdStrike report blaming Russia for the hacking of the DNC was proved false within hours of its being released, the Obama regime, nevertheless, quickly followed it with and even more fatally flawed “fake news” report that, in essence, was described as: “It merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists.” One would logically think, that with two highly flawed Obama regime Russian hacking reports being completely discredited this witch-hunting expedition would end, but one would be wrong in believing such a thing as, instead, the US propaganda mainstream media have been using these two “fake news” reports to bludgeon the reputation of President Trump, while, and as always, telling the American people what to think. And with Wikileaks now proving that the “Deep State” aligned CIA was, in fact, the creator of this “Fancy Bear” exploit meant to discredit Russia, the Obama-Clinton leftist supporting US mainstream “fake news” propaganda media is, once again, choosing lies over truth, with CNN shockingly not even bothering to inform their viewers of the over 8,000 top secret CIA documents, and whom, also, when “The Podesta Emails” were released, outrageously lied to the American people saying no one but reporters could read them.
In the Alive After The Fall, you will learn:
– How to identify prophesies coded in the visions of four men whom God revealed information about the latter days to.
– How to survive each day with little necessities of life like little food, no technology as there will be no electricity, and sometimes poor housing.
– How to preserve medication and food at home without chemical preservatives or a refrigerator.
– How to identify biological weapons and chemicals thrown your way, understanding how they affect your body and what to do about it and also how to avoid it and stay safe.
– How to make protective clothing to shield you against chemical weaponry using simple household items. This covers you when an attack is imminent and you do not have the necessary gear or did not have time to buy required gear.
– How to craft a plan to survive even when times become challenging. Here, Cain explains simple military science to help you survive at home. You will need to use simple equipment and substances available at home.
– How to distinguish clean water and food from ones that have been contaminated after an attack. This keeps the family safe and free of diseases that may be caused by contaminated food or water.
– Besides teaching people how to survive when the latter days comes, individuals can use the eBook as a handbook for survival during war times.
Each of the strategies provided in the eBook is explained in simple English and well-structured in chapters to make it easy to comprehend. He starts by verifying the imminent end times and how they have been shown in the bible and then introduces the strategies one by one.