Anonymous ID: d4b42a Jan. 13, 2025, 3:08 p.m. No.22348897   🗄️.is 🔗kun

Genocidal President, Genocidal Politics

 

Acclimatizing the U.S. to the Gaza genocide was most crucially abetted by Biden and his loyalists, who pretended he wasn’t doing what he was really doing, says Norman Solomon.

 

When news broke last week that President Joe Biden just approved another $8 billion for shipping weapons to Israel, a nameless official vowed that “we will continue to provide the capabilities necessary for Israel’s defense.”

 

Following reports last month from Amnesty International and Human Rights Watch concluding that Israeli actions in Gaza are genocide, Biden’s decision was a new low for his presidency.

 

It’s logical to focus on Biden as an individual. His choices to keep sending huge quantities of weaponry to Israel have been pivotal and calamitous. But the presidential genocide and the active acquiescence of the vast majority of Congress are matched by the dominant media and overall politics of the United States.

 

Forty days after the Gaza war began, Anne Boyer announced her resignation as poetry editor of The New York Times Magazine. More than a year later, her statement illuminates why the moral credibility of so many liberal institutions has collapsed in the wake of Gaza’s destruction.

 

While Boyer denounced “the Israeli state’s U.S.-backed war against the people of Gaza,” she emphatically chose to disassociate herself from the nation’s leading liberal news organization:

 

“I can’t write about poetry amidst the ‘reasonable’ tones of those who aim to acclimatize us to this unreasonable suffering. No more ghoulish euphemisms. No more verbally sanitized hellscapes. No more warmongering lies.”

 

The acclimatizing process soon became routine. It was most crucially abetted by President Biden and his loyalists, who were especially motivated to pretend that he wasn’t really doing what he was really doing.

 

For mainline journalists, the process required the willing suspension of belief in a consistent standard of language and humanity. When Boyer acutely grasped the dire significance of its Gaza coverage, she withdrew from “the newspaper of record.”

 

https://consortiumnews.com/2025/01/13/genocidal-president-genocidal-politics/

Anonymous ID: d4b42a Jan. 13, 2025, 3:10 p.m. No.22348911   🗄️.is 🔗kun

“Astonishing Inappropriateness” | Welsh Refugee Council Uses Schoolgirl To 'Attract' Migrants

 

https://youtu.be/BI7V5i9-ces

Anonymous ID: d4b42a Jan. 13, 2025, 3:13 p.m. No.22348926   🗄️.is 🔗kun

Deep state guys in DC didn’t recognize me.

 

They never do.

 

The hunter has become the hunted!

 

https://twitter.com/i/status/1878246763166912650

Anonymous ID: d4b42a Jan. 13, 2025, 3:26 p.m. No.22348968   🗄️.is 🔗kun   >>8974 >>9206 >>9294 >>9312 >>9509 >>9546 >>9646 >>9714 >>9717

Intel CPU processors are 100% compromised and backdoored by design

 

The Intel Management Engine. Or, the Israel Management Engine.

 

This extract is 2.32 minutes long. Perfect for todays busy IT housewife as she breastfeeds, makes dinner and runs her corporate level business in red high heels waiting for hubby to get home from the office.

 

https://www.investmentwatchblog.com/intel-cpu-processors-are-100-compromised-and-backdoored-by-design/

 

A tiny "Arc Processor" sitting within the Intel CPU with it's own custom version of Linux (Minix) operating beyond the software level - completely transparent to the end user. Does not matter if your using Windows, Linux or Apple iOS…you are toast and THIS is how Israel does it.

 

AMD has the exact same system - Platform Security System - and that is now totally owned and run by China. The ENTIRE worlds "Cloud Based" Internet system is backdoored by Israel.

 

https://steemit.com/anonymous/@blondenfun1/operation-talpiot-how-israel-backdoored-everything-here-s-the-hardware

 

https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-790725

 

https://www.wired.com/story/amd-backdoor-cts-labs-backlash/

 

https://www.timesofisrael.com/intel-seeks-israeli-tech-to-foil-hackers-with-deceptive-chips/

 

https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/

Anonymous ID: d4b42a Jan. 13, 2025, 3:38 p.m. No.22349021   🗄️.is 🔗kun   >>9060 >>9137 >>9206

>>22349004

How Did Israeli Jews Develop Backdoor Access to Nearly All Our Computers?

 

Intel, one of the largest semiconductor chip manufacturers in the world, has a disturbing history when you look at the company and exactly what’s going on with the hardware it produces.

 

For starters, Intel is basically an Israeli company, despite its headquarters in California. In 2017, Intel CEO Brian Krzanich admitted the company’s Kosher ties when giving a speech in Israel to commemorate a $15 billion acquisition:

 

Intel’s $15 billion plans to acquire Jerusalem’s Mobileye not only demonstrate the company’s belief in Israeli innovation, but also position the country to become the global leader in autonomous driving, according to the chip giant’s CEO, Brian Krzanich.

 

“We think of ourselves as an Israeli company as much as a US company,” Krzanich said at a Jerusalem press conference on Tuesday evening at the Prime Minister’s Office.

 

Just last month, in January 2019, Intel announced further plans to expand business operations in Israel:

 

Intel Prepares a Mammoth $11 Billion Investment in Israel

 

With a combination of tax-sops and State support, Intel loosened its purse-strings for a massive investment in Israel, where the company already has substantial investments in manufacturing and R&D. The investment consists of a 40 billion Shekel (~USD $11 billion) semiconductor foundry. “Intel’s global management has informed us about its decision to invest another 40 billion shekels in Israel, an unprecedented decision that is expected to bring thousands of jobs to the south (of Israel),” said the country’s Minister of Finance, Moshe Kahlon.

 

This $11 billion investment closely follows news of Intel committing $5 billion last year toward expanding its existing facility in Kiryat Gat. Expansion of this plant in the southern part of the country, is expected to complete by 2020. As part of that agreement, Intel will spend $3 billion on sourcing materials, labor, and services from local Israeli businesses. The new factory is slated to come up in the same city, although it’s not known if the site is contiguous with the existing factory. Intel is one of the largest multinational employers in Israel.

 

Now let’s get to the heart of the matter. Does Intel (and those who control it) have backdoor access to every device with a modern Intel processor? The answer appears to be a definitive yes:

 

Intel Management Engine (ME)

 

Introduced in June 2006 in Intel’s 965 Express Chipset Family of (Graphics and) Memory Controller Hubs, or (G)MCHs, and the ICH8 I/O Controller Family, the Intel Management Engine (ME) is a separate computing environment physically located in the (G)MCH chip. In Q3 2009, the first generation of Intel Core i3/i5/i7 (Nehalem) CPUs and the 5 Series Chipset family of Platform Controller Hubs, or PCHs, brought a more tightly integrated ME (now at version 6.0) inside the PCH chip, which itself replaced the ICH. Thus, the ME is present on all Intel desktop, mobile (laptop), and server systems since mid 2006.

 

The ME consists of an ARC processor core (replaced with other processor cores in later generations of the ME), code and data caches, a timer, and a secure internal bus to which additional devices are connected, including a cryptography engine, internal ROM and RAM, memory controllers, and a direct memory access (DMA) engine to access the host operating system’s memory as well as to reserve a region of protected external memory to supplement the ME’s limited internal RAM. The ME also has network access with its own MAC address through an Intel Gigabit Ethernet Controller. Its boot program, stored on the internal ROM, loads a firmware “manifest” from the PC’s SPI flash chip. This manifest is signed with a strong cryptographic key, which differs between versions of the ME firmware. If the manifest isn’t signed by a specific Intel key, the boot ROM won’t load and execute the firmware and the ME processor core will be halted.

 

…The Intel Management Engine with its proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and mouse movements, and even capture or display images on the screen. And it has a network interface that is demonstrably insecure, which can allow an attacker on the network to inject rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a threat to freedom, security, and privacy that can’t be ignored.

 

https://christiansfortruth.com/do-israeli-jews-have-backdoor-access-to-nearly-all-computers/

Anonymous ID: d4b42a Jan. 13, 2025, 3:56 p.m. No.22349118   🗄️.is 🔗kun   >>9127 >>9206 >>9509 >>9546 >>9646 >>9714 >>9717

Diddy 'raped teenage babysitter with two other men', bombshell new lawsuit claims

 

A woman claims she was drugged and raped by Sean 'Diddy' Combs after being lured into his car when she was a teenage babysitter more than two decades ago.

 

In a lawsuit filed in New York court on Monday, the unnamed woman claimed she was babysitting at a Manhattan residential building where the disgraced Bad Boy mogul lived in August or September 2000.

 

The victim said she ran into Combs and two men who worked for him as she was leaving the building.

 

Combs, who was sitting inside a car, asked the then teenager where she was going so late at night.

 

Despite telling him she lived just around the corner, the alleged victim said she jumped into the rapper's car 'after much cajoling'.

 

Combs' then girlfriend - identified only as 'a well-known woman' in the complaint - also lived in the home, the suit claims.

 

At the time of the alleged incident, Combs was romantically linked with Jennifer Lopez.

 

https://www.dailymail.co.uk/news/article-14280109/diddy-raped-teenage-babysitter-sexual-assault-lawsuit.html

Anonymous ID: d4b42a Jan. 13, 2025, 4:04 p.m. No.22349179   🗄️.is 🔗kun   >>9190 >>9191 >>9206 >>9211 >>9232 >>9240 >>9298 >>9304 >>9509 >>9546 >>9646 >>9714 >>9717

Prince Harry and Meghan Markle issue statement over Meta's 'deeply concerning' fact-checking change amid couple's online safety crusade

 

Prince Harry and Meghan Markle today warned they were 'deeply concerned' by Meta scrapping its third-party fact-checking and loosening content moderation.

 

The parent company of Facebook, Instagram and Threads is switching to an X-style Community Notes system where users flag content as false or misleading.

 

But the move has been seen by some as an attempt by Meta chief executive Mark Zuckerberg to curry favour with the incoming Donald Trump administration in the US.

 

And online safety campaigners are concerned it will allow misinformation to spread more easily and leave children and young people vulnerable to harmful content.

 

Now, the Duke and Duchess of Sussex have waded into the row with a 638-word statement saying the changes to Meta policies 'directly undermines free speech'.

 

However, the statement has put Harry on a collision course with his friend and professional polo player Nacho Figueras, who responded to Meta's announcement last week in an Instagram story saying: 'This is so important. Return of free speech.'

 

But the Sussexes, who are now online safety campaigners, said 'allowing more abuse and normalising hate speech serves to silence speech and expression, not foster it'.

 

In a statement on Sussex.com called 'fact-checking Meta', they added: 'In an already confusing and, in many instances, intentionally disruptive information environment, Meta has shown their words and commitments have very little meaning or integrity.

 

https://www.dailymail.co.uk/news/article-14278075/Prince-Harry-Meghan-Markle-statement-Meta-online-safety.html