The BBC’s Syrian Chemical Weapons Coverage: An Exercise in Imperial Deception By William Bowles (updated)

WWIII is gearing up, many more false flag incidents and media events to follow.

Dandelion Salad

by William Bowles
Writer, Dandelion Salad
williambowles.info
23 August 2013

Over the past three days, since the story first broke, the BBC’s news Website (I use the word news advisedly) has carried twelve stories on the alleged chemical weapons attack that took place in a suburb of Damascus. Today’s offerings include, Hague believes Assad behind attack (23/8/13), without offering a shred of proof that the Assad government is behind the alleged attack or even that it took place, takes foreign secretary Hague’s ‘belief’ as a given. The lead paragraph tells it all:

View original post 2,470 more words

Advertisements

electricfacetest | The Electric FaceBook Acid Test This is a DisInfobahn operation. We are experimenting with Facebook and their censorship policies. Please take a look and when the time arises we will ask for help continuing the experiment. Thanks, William Pilgrim

http://electricfacetest.wordpress.com/

Obama Supporters Threaten To Kill Romney If He Wins Election

U$A govt kills unwanted winners of foreign and domestic elections all the time. No biggie, people should be able to publicly threaten whomever they want. Isn’t that why people pay taxes? 😉

Nwo Report

Violent remarks continue to permeate Twitter

Source: Paul Joseph Watson

Having already threatened to riot if Obama is unsuccessful in securing a second term, Obama supporters are also flooding Twitter with threats to assassinate Mitt Romney if he wins the presidential election.

As we reported yesterday, innumerable Obama supporters spoke of their plans to provoke violence and mayhem if Obama lost, aggrieved at fears that Mitt Romney would take away government handouts.

However, it seems that threats to assassinate Romney are proving just as popular on the social network as threats to riot.

Twitchy first reported on the death threats on Sunday but a deluge of new ones have flooded in since, including the following;

“I swear if Mitt Romney becomes president, I’m gonna be the one to assassinate his ass!!!” (SOURCE)

“im telling you if romney gets elected somebody gon have to take a L and…

View original post 355 more words

COINTELPRO: The FBI’s Covert Action Programs Against American Citizens, Final Report of the Senate Committee to Study Governmental Operations with respect to Intelligence Activities, Book III

FBI COINTELPRO 'Black Panther Coloring Book'

FBI COINTELPRO ‘Black Panther Coloring Book’

The picture above is from an FBI agent who infiltrated the Black Panthers and presented the Panthers with a coloring book for young black children. Almost all the images are like this one. When the Panthers said ‘No, we are not here to encourage our children to shoot cops’ the FBI printed and distributed it (with even more disturbing images) nationwide, especially concentrating on white suburban addresses.

http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIa.htm
This is why no one should join any movement at all, ever.

COINTELPRO: THE FBI’S COVERT ACTION PROGRAMS AGAINST AMERICAN CITIZENS

I. INTRODUCTION AND SUMMARY

COINTELPRO is the FBI acronym for a series of covert action programs directed against domestic groups. In these programs, the Bureau went beyond the collection of intelligence to secret action defined to “disrupt” and “neutralize” target groups and individuals. The techniques were adopted wholesale from wartime counterintelligence, and ranged from the trivial (mailing reprints of Reader’s Digest articles to college administrators) to the degrading (sending anonymous poison-pen letters intended to break up marriages) and the dangerous (encouraging gang warfare and falsely labeling members of a violent group as police informers).

This report is based on a staff study of more than 20,000 pages of Bureau documents, depositions of many of the Bureau agents involved in the programs, and interviews of several COINTELPRO targets. The examples selected for discussion necessarily represent a small percentage of the more than 2,000 approved COINTELPRO actions. Nevertheless, the cases demonstrate the consequences of a Government agency’s decision to take the law into its own hands for the “greater good” of the country.

COINTELPRO began in 1956, in part because of frustration with Supreme Court rulings limiting the Government’s power to proceed overtly against dissident groups; it ended in 1971 with the threat of public exposure. 1 In the intervening 15 years, the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence. 2

Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that. The unexpressed major premise of the programs was that a law enforcement agency has the duty to do whatever is necessary to combat perceived threats to the existing social and political order.

A. “Counterintelligence Program”: A Misnomer for Domestic Covert Action

COINTELPRO is an acronym for “counterintelligence program.”

Counterintelligence is defined as those actions by an intelligence agency intended to protect its own security and to undermine hostile intelligence operations. Under COINTELPRO certain techniques the Bureau had used against hostile foreign agents were adopted for use against perceived domestic threats to the established political and social order. The formal programs which incorporated these techniques were, therefore, also called “counterintelligence.” 2a

“Covert action” is, however, a more accurate term for the Bureau’s programs directed against American citizens. “Covert action” is the label applied to clandestine activities intended to influence political choices and social values. 3

image

The FBI as the enforcer of the status quo:

3. Maintaining the Existing Social and Political Order

Protecting national security and preventing violence are the purposes advanced by the Bureau for COINTELPRO. There is another purpose for COINTELPRO which is not explicit but which offers the only explanation for those actions which had no conceivable rational relationship to either national security or violent activity. The unexpressed major premise of much of COINTELPRO is that the Bureau has a role in maintaining the existing social order, and that its efforts should be aimed toward combating those who threaten that order. 19

The “New Left” COINTELPRO presents the most striking example of this attitude. As discussed earlier, the Bureau did not define the term “New Left,” and the range of targets went far beyond alleged “subversives” or “extremists.” Thus, for example, two student participants in a “free speech” demonstration were targeted because they defended the use of the classic four-letter-word. Significantly, they were made COINTELPRO subjects even though the demonstration “does not appear to be inspired by the New Left” because it “shows obvious disregard for decency and established morality.” 20 In another case, reprints of a newspaper article entitled “Rabbi in Vietnam Says Withdrawal Not the Answer” were mailed to members of the Vietnam Day Committee “to convince [them] of the correctness of the U.S. foreign policy in Vietnam.” 21 Still another document weighs against the “liberal press and the bleeding hearts and the forces on the left” which were “taking advantage of the situation in Chicago surrounding the Democratic National Convention to attack the police and organized law enforcement agencies.” 22 Upholding decency and established morality, defending the correctness of U.S. foreign policy, and attacking those who thought the Chicago police used undue force have no apparent connection with the expressed goals of protecting national security and preventing violence. These documents, among others examined, compel the conclusion that Federal law enforcement officers looked upon themselves as guardians of the status quo. The attitude should not be a surprise; the difficulty lies in the choice of weapons.

The Bureau approved 2,370 separate counterintelligence actions. 27 Their techniques ranged from anonymously mailing reprints of newspaper and magazine articles (sometimes Bureau-authored or planted) to group members or supporters to convince them of the error of their ways, 28 to mailing anonymous letters to a member’s spouse accusing the target of infidelity ; 29 from using informants to raise controversial issues at meetings in order to cause dissent, 30 to the “snitch jacket” (falsely labeling a group member as an informant) 31 and encouraging street warfare between violent groups ; 32 from contacting members of a “legitimate group to expose the alleged subversive background of a fellow member 33 to contacting an employer to get a target fired; 34 from attempting to arrange for reporters to interview targets with planted questions, 35 to trying to stop targets from speaking at all ; 36 from notifying state and local authorities of a target’s criminal law violations, 37 to using the IRS to audit a professor, not just to collect any taxes owing, but to distract him from his political activities. 38

3. The Future of COINTELPRO

Attitudes within and without the Bureau demonstrate a continued belief by some that covert action against American citizens is permissible if the need for it is strong enough. When the Petersen Committee report on COINTELPRO was released, Director Kelley responded, “For the FBI to have done less under the circumstances would have been an abdication of its responsibilities to the American people.” He also restated his “feeling that the FBI’s counterintelligence programs had an impact on the crises of the time and, therefore, that they helped to bring about a favorable change in this country.” 60 In his testimony before the Select Committee, Director Kelley continued to defend COINTELPRO, albeit with some reservations:

What I said then, in 1974, and what I believe today, is that the FBI employees involved in these programs did what they felt was expected of them by the President, the Attorney General, the Congress, and the people of the United States. . . .

Our concern over whatever abuses occurred in the Counterintelligence Programs, and there were some substantial ones, should not obscure the underlying purpose of those programs.

We must recognize that situations have occurred in the past and will arise in the future where the Government may well be expected to depart from its traditional role, in the FBI’s case, as an investigative and intelligence-gathering agency, and take affirmative steps which are needed to meet an imminent threat to human life or property. 62

Nor is the Director alone in his belief that faced with sufficient threat, covert disruption is justified. The Department of Justice promulgated tentative guidelines for the Bureau which would have permitted the Attorney General to authorize “preventive action” where there is a substantial possibility that violence will occur and “prosecution is impracticable.” Although those guidelines have now been dropped, the principle has not been rejected.

III. THE GOALS OF COINTELPRO: PREVENTING OR DISRUPTING THE EXERCISE OF FIRST AMENDMENT RIGHTS
The origins of COINTELPRO demonstrate that the Bureau adopted extralegal methods to counter perceived threats to national security and public order because the ordinary legal processes were believed to be insufficient to do the job. In essence, the Bureau took the law into its own hands, conducting a sophisticated vigilante operation against domestic enemies.

COINTELPRO Techniques:

The Bureau’s use of the news media took two different forms: placing unfavorable articles and documentaries about targeted groups, and leaking derogatory information intended to discredit individuals. 157

A typical example of media propaganda is the headquarters letter authorizing the Boston Field Office to furnish “derogatory information about the Nation of Islam (NOI) to established source [name excised)”: 158

Your suggestions concerning material to furnish [name] are good. Emphasize to him that the NOI predilection for violence, preaching of race hatred, and hypocrisy, should be exposed. Material furnished [name] should be either public source or known to enough people as to protect your sources. Insure the Bureau’s interest in this matter is completely protected by [name]. 160

5. Fictitious Organizations

There are basically three kinds of “notional” or fictitious organizations. All three were used in COINTELPRO attempts to factionalize.

The first kind of “notional” was the organization whose members were all Bureau informants. Because of the Committee’s agreement with the Bureau not to reveal the identities of informants, the only example which can be discussed publicly is a proposal which, although approved, was never implemented. That proposal involved setting up a chapter of the W.E.B. DuBois Club in a Southern city which would be composed entirely of Bureau informants and fictitious persons. The initial purpose o the chapter was to cause the CPUSA expense by sending organizers into the area, cause the Party to fund Bureau coverage of out-of-town CP meetings by paying the informants’ expenses, and receive literature and instructions. Later, the chapter was to begin to engage in deviation from the Party line so that it would be expelled from the main organization “and then they could claim to be the victim of a Stalinist type purge.” It was anticipated that the entire operation would take no more than 18 months. 185

The second kind of “notional” was the fictitious organization with some unsuspecting (non-informant) members. For example, Bureau informants set up a Klan organization intended to attract membership away from the United Klans of America. The Bureau paid the informant’s personal expenses in setting up the new organization, which had, at its height, 250 members. 186

The third type of “notional” was the wholly fictitious organization, with no actual members, which was used as a pseudonym for mailing letters or pamphlets. For instance, the Bureau sent out newsletters from something called “The Committee for Expansion of Socialist Thought in America,” which attacked the CPUSA from the “Marxist right” for at least two years. 187

6. Labeling Targets As Informants

The “snitch jacket” technique — neutralizing a target by labeling him a “snitch” or informant, so that he would no longer be trusted — was used in all COINTELPROs. The methods utilized ranged from having an authentic informant start a rumor about the target member, 188 to anonymous letters or phone calls, 189 to faked informants’ reports. 190

When the technique was used against a member of a nonviolent group, the result was often alienation from the group. For example, a San Diego man was targeted because he was active in draft counseling at the city’s Message Information Center. He had, coincidentally, been present at the arrest of a Selective Service violator, and had been at a “crash pad” just prior to the arrest of a second violator. The Bureau used a real informant to suggest at a Center meeting that it was “strange” that the two men had been arrested by federal agents shortly after the target became aware of their locations. The field office reported that the target had been “completely ostracized by members of the Message Information Center and all of the other individuals throughout the area . . . associated with this and/or related groups.” 191

In another case, a local police officer was used to “jacket” the head of the Student Mobilization Committee at the University of South Carolina. The police officer picked up two members of the Committee on the pretext of interviewing them concerning narcotics. By prearranged signal, he had his radio operator call him with the message, “[name of target] just called. Wants you to contact her. Said you have her number.” 192 No results were reported.

The “snitch jacket” is a particularly nasty technique even when used in peaceful groups. It gains an added dimension of danger when it is used — as, indeed, it was — in groups known to have murdered informers. 193

3. Candidates and Political Appointees

The Bureau apparently did not trust the American people, to make the proper choices in the voting booth. Candidates who, in the Bureau’s opinion, should not be elected were therefore targeted. The case of the Democratic fundraiser discussed earlier was just one example.

Socialist Workers Party candidates were routinely selected for counterintelligence, although they had never come close to winning an election. In one case, a SWP candidate for state office inadvertently protected herself from action by announcing at a news conference that she had no objections to premarital sex; a field office thereupon withdrew its previously approved proposal to publicize her common law marriage. 241a

Other candidates were also targeted. A Midwest lawyer whose firm represented “subversives” (defendants in the Smith Act trials) ran for City Council. The lawyer had been active in the civil rights movement in the South, and the John Birch Society in his city had recently mailed a book called “It’s Very Simple — The True Story of Civil Rights” to various ministers, priests, and rabbis. The Bureau received a copy of the mailing list from a source in the Birch Society and sent an anonymous follow-up letter to the book’s recipients noting the pages on which the candidate had been mentioned and calling their attention to the “Communist background” of this “charlatan.” 242 The Bureau also sent a fictitious-name letter to a television station on which the candidate was to appear, enclosing a series of informative questions it believed should be asked. 243 The candidate was defeated. He subsequently ran (successfully, as it happened) for a judgeship.

Political appointees were also targeted. One target was a member of the board of the NAACP and the Democratic State Central Committee. His brother, according to the documents, was a communist, and the target had participated in some Party youth group activities fifteen years earlier. The target’s appointment as secretary of a city transportation board elicited an anonymous letter to the Mayor, with carbons to two newspapers, protesting the use of “us taxpayers’ money” in the appointment of a “known Communist” to a highly paid job; more anonymous letters to various politicians, the American Legion, and the county prosecutor in the same vein; and a pseudonymous letter to the members of the transportation board, stating that the Mayor had “saddled them with a Commie secretary because he thinks it will get him a few Negro votes. 244

DHS Uses these Keywords to Spy on You

Source:
http://www.animalnewyork.com/2012/the-department-of-homeland-security-is-searching-your-facebook-and-twitter-for-these-words/

David Corbett of the Corbett Report has begun to tweet everyone of these words in an attempt to exercise his right to free speech and to jam the control system. Feel free to do the same, or post these words on your blog. Whatever you do, don’t censor yourself out of fear. Its 2012. Fuck it.

Here is the article in full, fair use, and thank you ANIMAL.com:

The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI), according to an internal DHS document released by the EPIC. That document happens to include a list of the baseline terms for which the DHS–or more specifically, a DHS subcontractor hired to monitor social networks–use to generate real-time IOI reports. (Although the released PDF is generally all reader-selectable text, the list of names was curiously embedded as an image of text, preventing simple indexing. We’ve fixed that below.)
To be fair, the DHS does have an internal privacy policy that attempts to strip your “PII”–Personally Identifiable Information–from the aggregated tweets and status updates, with some broad exceptions:
1) U.S. and foreign individuals in extremis situations involving potential life or death circumstances; (this is no change)
2) Senior U.S. and foreign government officials who make public statements or provide public updates;
3) U.S. and foreign government spokespersons who make public statements or provide public updates;
4) U.S. and foreign private sector officials and spokespersons who make public statements or provide public updates;
5) Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and/or social media in real time to keep their audience situationally aware and informed;
6) Current and former public officials who are victims of incidents or activities related to Homeland Security; and
7) Terrorists, drug cartel leaders or other persons known to have been involved in major crimes of Homeland Security interest, (e.g., mass shooters such as those at Virginia Tech or Ft. Hood) who are killed or found dead.
In addition, the Media Monitoring Capability team can transmit personal information to the DHS National Operations Center over the phone as deemed necessary.
The MMC watch may provide the name, position, or other information considered to be PII to the NOC over the telephone when approved by the appropriate DHS OPS authority. But that information must not be stored in a database that could be searched by an individual’s PII.
In addition to the following list of terms, the DHS can also add additional search terms circumstantially as deemed necessary.
DHS Media Monitoring Terms

2.13 Key Words & Search Terms
This is a current list of terms that will be used by the NOC when monitoring social media sites to provide situational awareness and establish a common operating picture. As natural or manmade disasters occur, new search terms may be added.
The new search terms will not use PII in searching for relevant
mission-related information.
DHS & Other Agencies
Department of Homeland Security (DHS)
Federal Emergency Management Agency (FEMA)
Coast Guard (USCG)
Customs and Border Protection (CBP)
Border Patrol
Secret Service (USSS)
National Operations Center (NOC)
Homeland Defense
Immigraption Customs Enforcement (ICE)
Agent
Task Force
Central Intelligence Agency (CIA)
Fusion Center
Drug Enforcement Agency (DEA)
Secure Border Initiative (SBI)
Federal Bureau of Investigation (FBI)
Alcohol Tobacco and Firearms (ATF)
U.S. Citizenship and Immigration Services (CIS)
Federal Air Marshal Service (FAMS)
Transportation Security Administration (TSA)
Air Marshal
Federal Aviation Administration (FAA)
National Guard
Red Cross
United Nations (UN)
Domestic Security
Assassination
Attack
Domestic security
Drill
Exercise
Cops
Law enforcement
Authorities
Disaster assistance
Disaster management
DNDO (Domestic Nuclear Detection Office)
National preparedness
Mitigation
Prevention
Response
Recovery
Dirty Bomb
Domestic nuclear detection
Emergency management
Emergency response
First responder
Homeland security
Maritime domain awareness (MDA)
National preparedness initiative
Militia
Shooting
Shots fired
Evacuation
Deaths
Hostage
Explosion (explosive)
Police
Disaster medical assistance team (DMAT)
Organized crime
Gangs
National security
State of emergency
Security
Breach
Threat
Standoff
SWAT
Screening
Lockdown
Bomb (squad or threat)
Crash
Looting
Riot
Emergency Landing
Pipe bomb
Incident
Facility
HAZMAT & Nuclear
Hazmat
Nuclear
Chemical Spill
Suspicious package/device
Toxic
National laboratory
Nuclear facility
Nuclear threat
Cloud
Plume
Radiation
Radioactive
Leak
Biological infection (or event)
Chemical
Chemical burn
Biological
Epidemic
Hazardous
Hazardous material incident
Industrial spill
Infection
Powder (white)
Gas
Spillover
Anthrax
Blister agent
Exposure
Burn
Nerve agent
Ricin
Sarin
North Korea
Health Concern + H1N1
Outbreak
Contamination
Exposure
Virus
Evacuation
Bacteria
Recall
Ebola
Food Poisoning
Foot and Mouth (FMD)
H5N1
Avian
Flu
Salmonella
Small Pox
Plague
Human to human
Human to ANIMAL
Influenza
Center for Disease Control (CDC)
Drug Administration (FDA)
Public Health
Toxic
Agro Terror
Tuberculosis (TB)
Agriculture
Listeria
Symptoms
Mutation
Resistant
Antiviral
Wave
Pandemic
Infection
Water/air borne
Sick
Swine
Pork
Strain
Quarantine
H1N1
Vaccine
Tamiflu
Norvo Virus
Epidemic
World Health Organization (WHO and components)
Viral Hemorrhagic Fever
E. Coli
Infrastructure Security
Infrastructure security
Airport
CIKR (Critical Infrastructure & Key Resources)
AMTRAK
Collapse
Computer infrastructure
Communications infrastructure
Telecommunications
Critical infrastructure
National infrastructure
Metro
WMATA
Airplane (and derivatives)
Chemical fire
Subway
BART
MARTA
Port Authority
NBIC (National Biosurveillance Integration Center)
Transportation security
Grid
Power
Smart
Body scanner
Electric
Failure or outage
Black out
Brown out
Port
Dock
Bridge
Canceled
Delays
Service disruption
Power lines
Southwest Border Violence
Drug cartel
Violence
Gang
Drug
Narcotics
Cocaine
Marijuana
Heroin
Border
Mexico
Cartel
Southwest
Juarez
Sinaloa
Tijuana
Torreon
Yuma
Tucson
Decapitated
U.S. Consulate
Consular
El Paso
Fort Hancock
San Diego
Ciudad Juarez
Nogales
Sonora
Colombia
Mara salvatrucha
MS13 or MS-13
Drug war
Mexican army
Methamphetamine
Cartel de Golfo
Gulf Cartel
La Familia
Reynose
Nuevo Leon
Narcos
Narco banners (Spanish equivalents)
Los Zetas
Shootout
Execution
Gunfight
Trafficking
Kidnap
Calderon
Reyosa
Bust
Tamaulipas
Meth Lab
Drug trade
Illegal immigrants
Smuggling (smugglers)
Matamoros
Michoacana
Guzman
Arellano-Felix
Beltran-Leyva
Barrio Azteca
Artistics Assassins
Mexicles
New Federation
Terrorism
Terrorism
Al Queda (all spellings)
Terror
Attack
Iraq
Afghanistan
Iran
Pakistan
Agro
Environmental terrorist
Eco terrorism
Conventional weapon
Target
Weapons grade
Dirty bomb
Enriched
Nuclear
Chemical weapon
Biological weapon
Ammonium nitrate
Improvised explosive device
IED (Improvised Explosive Device)
Abu Sayyaf
Hamas
FARC (Armed Revolutionary Forces Colombia)
IRA (Irish Republican Army)
ETA (Euskadi ta Askatasuna)
Basque Separatists
Hezbollah
Tamil Tiger
PLF (Palestine Liberation Front)
PLO (Palestine Libration Organization)
Car bomb
Jihad
Taliban
Weapons cache
Suicide bomber
Suicide attack
Suspicious substance
AQAP (Al Qaeda Arabian Peninsula)
AQIM (Al Qaeda in the Islamic Maghreb)
TTP (Tehrik-i-Taliban Pakistan)
Yemen
Pirates
Extremism
Somalia
Nigeria
Radicals
Al-Shabaab
Home grown
Plot
Nationalist
Recruitment
Fundamentalism
Islamist
Weather/Disaster/Emergency
Emergency
Hurricane
Tornado
Twister
Tsunami
Earthquake
Tremor
Flood
Storm
Crest
Temblor
Extreme weather
Forest fire
Brush fire
Ice
Stranded/Stuck
Help
Hail
Wildfire
Tsunami Warning Center
Magnitude
Avalanche
Typhoon
Shelter-in-place
Disaster
Snow
Blizzard
Sleet
Mud slide or Mudslide
Erosion
Power outage
Brown out
Warning
Watch
Lightening
Aid
Relief
Closure
Interstate
Burst
Emergency Broadcast System
Cyber Security
Cyber security
Botnet
DDOS (dedicated denial of service)
Denial of service
Malware
Virus
Trojan
Keylogger
Cyber Command
2600
Spammer
Phishing
Rootkit
Phreaking
Cain and abel
Brute forcing
Mysql injection
Cyber attack
Cyber terror
Hacker
China
Conficker
Worm
Scammers
Social media
Yes, the Department of Homeland Security is searching social media for…”social media”.

The Strecker Memorandum

This is the tape that never got played. No one would sell them time on TV or radio. Imagine, refusing MONEY to keep this info from disseminating. AIDS was predicted, cultivated, and a cure exists for the elite. They’ve been killing us.

Gnostic Media: (Video) Ron Paul and the Fed

Man, I’ve been saying this for a year: Ron Paul is nothing but a ‘People’s Champion” COINTELPRO program. The Powers That Be (which I call the ‘fuckers’ ) see a trend of anti-government dissent in the population and say, “Hey, let’s throw these chumps a bone. We’ll use the opportunity to misinform them  and root out the most radical republicans as a bonus.” The fuckers think (not out loud): “We’ll turn that list over to the Fed for audit, DHS, BATF…make their lives difficult and maybe get them into the prison/slavery system.” The fuckers made sure that the 13th amendment made exceptions for punitive slavery, of course.

Remember that the careers of politicians, like the careers of professional wrestlers, depend on the illusion of conflict. But when the cameras are off, the participants of the drama have drinks together and write the script for the next day. Obama is George W Bush’s (9th) cousin, fer-cryin-out-loud.

Thanks Clint Richardson and Gnostic Media.

Occupy Movement News Events are Staged Using Same Actors as Ft. Hood & Virginia Tech Shootings

(Good Eye Lncfr)

The good stuff, folks. Second Matrix Exposed.  Trey Parker was a fake interviewee for local news once. Even ‘alternative’ news is fake these days (well, it always was). Part one lays down the groundwork and the juicy stuff comes in the second one.

From http://wellaware1.com

War on Drugs is a Hoax: US Admits To Guarding, Assisting Lucrative Afghan Opium Trade!

Socio-Economics History Blog

  • Afghanistan produces 90+% of the opium in the world. The Taliban practically eradicated the opium crop by 2001. What they didn’t understand was that the drug trade is controlled by western Illuminist intelligence agencies on behalf of the 13 Satanic bloodlines. Since the western invasion of Afghanistan, opium production has skyrocketed !

    War on drugs is a hoax: US admits to guarding, assisting lucrative Afghan opium trade 
    by Ethan Huff,  www.Infowars.com 
    Afghanistan is, by far, the largest grower and exporter of opium in the world today, cultivating a 92 percent market share of the global opium trade. But what may shock many is the fact that the US military has been specifically tasked with guarding Afghan poppy fields, from which opium is derived, in order to protect this multibillion dollar industry that enriches Wall Street, the CIA, MI6, and various other groups that profit big time…

View original post 478 more words