
Sign up to save your podcasts
Or
Accountability has suddenly become selective and the blame war is on. The Comey indictment is already revealing a lot. The veteran guardian of a fragile system. Mining data and crunching numbers. This involves controlling elections. This involves Russian intel and the phone locations of artillery crews. Fancy Bear is code written by Ukrainians at Crowd Strike. John Brennan was the burglar. You financed the Russia hoax. Hacking elections to claim certain software was used. The German servers provided coms. Hunter, his dad, and Obama were all involved. This predates Comey. That whole 911 thing had to be covered up. The FBI awarded contracts involving the DNC server hacks. A cyber security company was at the center of it all. Retroactive code and false cyber evidence. Who's the investigator on this F'g case? Network breeches and valuable data. The RNC was a target too. Who approved the bids? It sounds like a techno-thriller. Full control is usually the only answer. What is Pole Vault 7 again? On paper it makes sense, off paper it makes deals. Thousands of purposeful errors to create illusions. Private partners do all the dirty work. We must all be ready for traitors from within. History proves those are the most dangerous kind.
4.8
10111,011 ratings
Accountability has suddenly become selective and the blame war is on. The Comey indictment is already revealing a lot. The veteran guardian of a fragile system. Mining data and crunching numbers. This involves controlling elections. This involves Russian intel and the phone locations of artillery crews. Fancy Bear is code written by Ukrainians at Crowd Strike. John Brennan was the burglar. You financed the Russia hoax. Hacking elections to claim certain software was used. The German servers provided coms. Hunter, his dad, and Obama were all involved. This predates Comey. That whole 911 thing had to be covered up. The FBI awarded contracts involving the DNC server hacks. A cyber security company was at the center of it all. Retroactive code and false cyber evidence. Who's the investigator on this F'g case? Network breeches and valuable data. The RNC was a target too. Who approved the bids? It sounds like a techno-thriller. Full control is usually the only answer. What is Pole Vault 7 again? On paper it makes sense, off paper it makes deals. Thousands of purposeful errors to create illusions. Private partners do all the dirty work. We must all be ready for traitors from within. History proves those are the most dangerous kind.
12,382 Listeners
1,616 Listeners
1,099 Listeners
661 Listeners
17,201 Listeners
1,828 Listeners
1,417 Listeners
1,396 Listeners
236 Listeners
533 Listeners
1,839 Listeners
483 Listeners
380 Listeners
1,949 Listeners
16,808 Listeners