False-Antisemitism Unprecedently Exposed | Retired US Judge & former CIA Analyst also Address US Complicity in Israel’s Gaza War-Crimes / Genocide. | The Interview all Americans & Western Citizens Must Watch. (Video)

  • Home
  • Geo Poli Cyper
  • False-Antisemitism Unprecedently Exposed | Retired US Judge & former CIA Analyst also Address US Complicity in Israel’s Gaza War-Crimes / Genocide. | The Interview all Americans & Western Citizens Must Watch. (Video)

Watch below the video of retired US Circuit Judge Andrew Napolitano and & his guest former CIA Analyst Phil Geraldi give you their clear and unambiguous thoughts on: 

Israel, its lobbyists and supporters’ abuse of the antisemitism label to shut down legitimate criticism of Israeli government’s decisions and action,
US complicity in Israel’s Gaza War-Crimes & Genocide. 

For Decades, Israel, its lobbyists and supporters all over et world abused the antisemitism label with tremendous success to decisively shut-down any justified criticism of Israeli governments’ decisions and its policies towards Palestinians.

However, just in the last few weeks and in an unprecedented manner and as a result of Israel’s government Gaza War-Crimes & Genocide, a seismic shift in US public opinion has occurred turning it from a strong and steadfast supporter of Israel into one that is exposing its decades of lies, corruption and misinformation.

Start watching retired US Circuit Judge Andrew Napolitano and & his guest former CIA Analyst Phil Geraldi.

Previous Post
Newer Post

Leave A Comment

2024
What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more

Generated by Feedzy