Tag: Propaganda

  • Reuters’ South Africa Lies: Predictable Deceit from an Outlet Accused of Embedding with October 7th

    Reuters’ South Africa Lies: Predictable Deceit from an Outlet Accused of Embedding with October 7th

    Those who unquestioningly accept Reuters’ take on critical global situations, like today’s alert on South Africa as an “Editor’s Picks”, should be aware of the outlet’s problematic history. Reuters has faced serious credibility issues, including publishing manipulated images during wartime and maintaining controversial policies on defining terrorism, which distort public understanding.

    1. Photographer’s Images from 2006 Lebanon War: In August 2006, Reuters had to remove all photographs by a freelance photographer, Adnan Hajj, from its database. This occurred after it was discovered that at least two of his photos from the 2006 Israel-Lebanon conflict had been digitally manipulated. One image showed smoke billowing over Beirut, which had been altered to appear darker and more dramatic. Another showed an Israeli F-16 firing missiles, with the photographer adding an extra flare to make it appear more threatening. Reuters severed ties with Hajj following these revelations.
    2. Embedded with Assailants? Serious Allegations of Reuters’ Foreknowledge in October 7th Attack Coverage: Following the October 7th attacks by Hamas on Israel, Reuters, along with other news organizations, faced scrutiny about how some freelance photojournalists, whose images were used by Reuters and others, were able to be at the scene of the attacks so early. These journalists may have had advance knowledge of the attacks. Reuters denied having any prior relationship with the freelance photographers in question and stated the published photos were taken hours after the initial attacks began and well after Israel had confirmed gunmen crossed the border. Bipartisan U.S. lawmakers sent a letter to Reuters requesting an explanation.
    3. Policy on Not Using the Word “Terrorist”: Reuters has a long-standing policy which includes generally not using the word “terrorist” or “terrorism” to describe specific events or individuals, instead opting terms like “bombers,” “gunmen,” or “militants.” This obscures the nature of such acts and the motivations behind them. Reuters’ editorial policy states they “may refer without attribution to terrorism and counterterrorism in general, but do not refer to specific events as terrorism.”
    Sent by the Reuters app at approximately 6pm on May 21, 2025.

  • SPECIAL REPORT, PART II: The TikTok Betrayal: Beyond the Trojan Horse, The Rot Within

    SPECIAL REPORT, PART II: The TikTok Betrayal: Beyond the Trojan Horse, The Rot Within

    While the first report detailed the overt threat of TikTok as a weapon of the Chinese Communist Party (CCP), this second analysis drills deeper into a more insidious danger: the rot within our own institutions that has allowed this threat to fester. The story of TikTok is not just one of foreign aggression, but of domestic failure, political cowardice, and a legal system that has been twisted to protect the adversary. This is a chronicle of the swamp’s self-preservation at the expense of American security.

    The Political Uni-Party and the Propaganda Machine

    The most glaring hypocrisy in the fight against TikTok comes from the very politicians who should be our first line of defense. The Republican and Democratic parties, in their lust for votes, have proven themselves to be two wings of the same Uni-Party, willing to engage with the enemy for political gain.

    • Biden’s Betrayal: Why in the Hell would a sitting U.S. President use a CCP-controlled application? The “Biden-Harris HQ” TikTok account is a slap in the face to the entire U.S. intelligence community. We are told it is run by campaign aides, not the President himself, which is an irrelevant distinction. The account, with its hundreds of thousands of followers, legitimizes the platform and signals to our enemies that our leaders are not serious about the national security threat. We must ask: was the campaign paid? What data is being collected on the American citizens who follow and interact with this account? It is a staggering display of political malpractice.
    • Government-Sponsored Propaganda: The “No TikTok on Government Devices Act,” buried in a massive appropriations bill, was a weak and performative gesture. Why did it require the Office of Management and Budget to “establish deadlines” for removal? The ban should have been instantaneous. The real question is why these apps were on government devices in the first place. A search reveals a shocking list of U.S. agencies that maintained large TikTok accounts, effectively using a CCP platform to conduct government outreach. The TSA, the National Parks Service, and numerous state-level agencies built substantial followings, normalizing the app and handing the CCP a direct pipeline to American citizens under a veneer of officialdom.
    • The Apology of Jeff Jackson: Look no further than Rep. Jeff Jackson of North Carolina for a profile in political cowardice. After voting for the ban, he posted a now-infamous “apology video” to his massive TikTok following, explaining why he voted the way he did. This act of appeasing a digital mob, potentially inflated by foreign bots, over his duty to national security is contemptible. How does a representative from North Carolina, not a media hub like LA or NYC, amass such a following? How is follower authenticity or monetization even verified by TikTok? This entire ecosystem stinks of fraud, a problem Apple and Google refuse to address, even as new legislation against fake app store activity is debated.
    • The Chinese Embassy in the Halls of Congress: It is a fact that representatives from the Chinese embassy met directly with U.S. congressional staffers to lobby against this bill. This is not normal diplomacy; it is an act of hostile influence. For a foreign adversary to walk the halls of our government and directly pressure our lawmakers is an outrage reminiscent of a spy thriller. This practice, while technically legal, is part of a pattern of corruption that has been allowed to fester in the post-9/11 era, where foreign money and influence have become commonplace in Washington D.C.
    (more…)
  • SPECIAL REPORT: The Case for a Complete and Total Ban of TikTok in the USA

    SPECIAL REPORT: The Case for a Complete and Total Ban of TikTok in the USA

    Introduction: A Clear and Present Danger

    The ongoing debate surrounding TikTok is not merely about a social media application; it is about national sovereignty, the security of our citizens’ data, and the integrity of our democratic discourse. For too long, the conversation has been muddled by half-measures, corporate-speak, and a fundamental misunderstanding of the adversary we face. The passage of the Protecting Americans from Foreign Adversary Controlled Applications Act (PAFACA) was a necessary first step, but it is not the final solution. Current and past efforts to mitigate the threat posed by TikTok are, and have always been, ineffective at addressing the underlying security concerns. The time for divestment negotiations and technical firewalls has passed. TikTok, a tool of the Chinese Communist Party (CCP), must be banned entirely from the United States.

    The Corporate Shell Game: A Deliberate Deception

    To understand the TikTok threat, one must first dismantle the complex and deliberately opaque corporate structure of its parent company, ByteDance.

    • Cayman Islands and Delaware: Havens of Obscurity: ByteDance is not a simple tech company; it is incorporated in the Cayman Islands, a jurisdiction notorious for financial secrecy. This is not an accident. It is a calculated move to obscure ownership and evade American oversight, a direct contradiction to the “America First” principles our nation must embody. Furthermore, its U.S. entity, TikTok Inc., is registered in Delaware, a state with notoriously lax corporate transparency laws, and the home state of President Biden, a fact that should raise serious questions. This is the opposite of the patriotic move made by Truth Social, which reincorporated from Delaware to Florida, demonstrating a commitment to transparency and American values.
    • The “Global Investor” Myth: We are told that 60% of ByteDance is owned by “global institutional investors.” This is a classic globalist talking point designed to lull us into a false sense of security. It is a distraction. The critical issue is not the 60%, but the controlling interest and influence wielded by the CCP. This “globalist” structure ensures that American interests will always be subjugated.
    • The “Golden Share”: A Dagger at the Heart: The most damning evidence of CCP control lies in the 1% “golden share” held by WangTouZhongWen Technology, an entity backed by the China Internet Investment Fund, in a key ByteDance subsidiary. This is not a trivial stake; it grants the CCP a board seat and direct influence over the company’s operations. This structure is a blatant power grab. No American company would tolerate a foreign adversary holding such a position. It is an insult to our national intelligence to suggest this is anything but direct state control.
    (more…)