9/11 Inside Job: Russia Today Presents Crushing Evidence of False Flag

Chemtrails: The Exotic Weapon

russia-today header

Architects, engineers and scientists with advanced degrees know 9/11 is a government coverup. See why HERE

AE911 truth no longer an option Header

Transcript:

‘Bigger than Watergate’: US ‘regular’ meetings with Al-Qaeda’s leader; documented White House ‘false flag terrorism’ moving people ‘like sheep’; the father of Twin Towers victim tell us why he backs this month’s 9/11 campaign on Times Square and around the world; & the protests calendar for September.

Seek truth from facts with Bob McIlvane, whose son Bobby was killed in the lobby of the North Tower; NATO’s Secret Armies author Dr. Daniele Ganser; Elizabeth Woodworth of Consensus911; Journal of 9/11 Studies co-editor Dr. Graeme MacQueen; Dr. Kevin Barrett author of Questioning the War of Terror, civil engineer Jon Cole of Architects and Engineers for 9/11 Truth; and Rachel Maddow of The Rachel Maddow Show.

RT: My name’s Daniel Bushell. Top officials say the White House is behind the terrorism of their population, and…

View original post 1,827 more words

US Government Hijacked by State Terrorist Insiders on 9/11

Chemtrails: The Exotic Weapon

WARNING: The War on ISIS is a Continuation of the 9/11 False Flag

Israel corporatocracy memePray Israeli Terrorists self-destruct before they cause WWIII

Identity of State Actors Who Staged 9/11 Terrorist Attacks Disclosed, Plot Revealed, with Justice Inevitable

EndTheLie.com

“The synthetic terror fabricated on September 11, 2001 is like a boomerang fashioned as a double-edged samurai sword.  Just as the manufactured War On Terror has since produced ‘death by a thousand cuts’ in those countries targeted by the real Axis of Evil, the karmic boomerang will now return to those state actors who launched the 9/11 false flag operation .”  – State of the Nation

After thirteen long years of one revelation after another, it has now been established that the 9/11 terrorist attacks on New York City and Washington DC were perpetrated by the very same governments that had the most to gain from them. The US Federal Government

View original post 28 more words

Weird Fact Of The Day 09/30/2014

History says that J Edgar Hoover was a huge closeted, cross-dressing flamer.

But that is only half the story.

It is a closely guarded secret that it is manditory for ALL employees of the CIA to wear frilly ladies undergarments while at work, and all social functions are to be attended in drag.

Also the words ‘sexual harassment’ do not appear in any CIA documentation. It is instead referred to as ‘advancement opportunities’.

North Korea Isn’t Scary, Just Pitiful

It seems to me, that the more North Korea trys to seem like an evil, nuclear fueled superpower, the more I personally marginalize and utterly disregard them.

It’s like the hillbilly that buys a big truck, has lots of guns, wears a lot of camoflage clothing and spends the day telling everyone around him how massive his dick is. The overcompensation tells the real story.

North Korea has, in an international relations perspective, an extraordinarily miniscule penis. And they’re trying REALLY hard to make us think otherwise.

And really? Can we really take them seriously when their leader looks like he gets haircuts from a blind child with Tourettes syndrome? That goofy motherfucker looks like his mommy still buys his clothes for him. He’s a pudgy, dumbshit-looking Korean version of Chaz Bono. I’ve taken shits today that looked scarier. And that’s not just because of the peanuts and corn. How exactly does that happen anyway?

Shit. I’m off topic again. See how boring this place is?

These little fuckers would just go away, if the UN had the stones to do one, small, simple thing.

The next time the North Korean representative stands up to bluster on about some stupid assed nonsense. The dude sitting next to him just has to give him an atomic wedgie, steal his lunch money and pimpslap him. The odds are good he, and his insignificant homeland, won’t cause us any more nuisance.

They Are Lying To You Movie Review – They Live

they-live-poster-sunglasses-john-carpenter

I’m actually very pleased to finally get to review a horrible movie that I love more every time I see it. They Live is 1988 at it’s very best.

There is nothing better then a film that combines 80’s corporate paranoia, big 80’s hair, Roddy Piper and the very worst cheesy dialogue you’ve ever heard.

Combined you have two hours of the finest John Carpenter you are ever liable to see.

This film is also notable for the very best hand to hand fight scene you will ever see. The fight between Keith David and Roddy Piper, ironically the two good guys in the film, comes right out of a Saturday morning WWF wrestling match. And as cheesy as it seems 26 years later, it’s still interesting to watch.

If you have never seen this, please do yourself a favor and add it to your collection. Send the kids to the sitter, make some popcorn, and enjoy!

 

Ways You Are Being Watched And May Not Know It

Granted, in today’s society this story probably isn’t considered odd or weird – just everyday life in our super-connected global community. However, if you could go back in time about 50 years or so and tell someone about all the surveillance that’s happening these days they probably would think you are crazy. It’s funny how crazy gradually evolves into normal, isn’t it?

The NSA scandal put a bright spotlight on the kind of activity that’s been going on under our noses for quite a while. Many suspected that these kinds of things were happening and the whole Snowden-NSA scandal just confirmed it for the world to see. A lot of crow has been consumed by former “skeptics” who scoffed at the idea of such far-reaching government surveillance before we all learned just how deep the rabbit hole really goes.

1. Security Cameras

security-camera

Image Credit: MorgueFile

There’s no doubt that security cameras have their place. Many homeowners and businesses have used them to discourage criminals and prevented who-knows-how-many crimes. There are also numerous cases where criminals were captured because of security cameras. Like so many other things in life, they can be used for both good and bad. Just as a kitchen knife can be used to simply cut up some carrots, it can also be used to stab someone to death. Similarly, cameras can be used to deter crime for the greater good or spy on people who don’t even know they are being watched. Even staunch privacy advocates aren’t likely to oppose people using cameras on their own property, but whether or not every street corner and public park needs to be monitored 24/7 is another matter. Is that safety or is that just spying? You decide.

2. Cell Phones

cell-phone

Image Credit: MorgueFile

Your cell phone (or “mobile”) is one of the best spy tools ever conceived of. Although not everyone knows, cell phones are constantly communicating with the sites that make up the network. Even without GPS, the approximate location of a cell phone could be determined by using triangulation – measuring the strength and direction of the phone’s signal from multiple sites. But heck, triangulation is old school! With GPS built into virtually every cell phone on the market, your own phone will happily reveal your location even more accurately. Sure, there are settings on a lot of phones that are supposed to allow you to set it so that it will reveal your location only when you are calling for emergency services, but do you really believe that “they” can’t use the GPS in your phone to track you when they want? The next time you pass one of those towers topped with cellular antennas, think of it is a big creepy spy looking over your shoulder as you pass by, because that’s pretty much what it is.

3. Credit and Debit Cards

credit-card

Image Credit: MorgueFile

How many crime programs have you seen where the authorities have used credit or debit card records to track down a criminal or use it to prove someone’s guilt? Again, there are appropriate uses for these records. Who is going to argue that tracking some murderer who’s using a victim’s credit card is a bad thing? But pointing out the appropriate uses of that technology is not what we’re focusing on today. It’s those “other” uses that have a lot of people very concerned. Each time you use a credit or debit card somewhere it’s like leaving your footprints behind. That record says where you were, when you were there and what you bought at the very least. Oh, by the way, if the digital footprint you left behind is not enough ammunition for someone who may be trying to prove you did something, don’t worry! The security camera probably captured footage of you while you where there.

4. The Internet

internet

Image Credit: MorgueFile

Although this one could have been broken down into separate topics such as search engines, social media, online shopping, ISP snooping, wi-fi hacking and probably a hundred others, we’ll just keep it simple. A few key things to remember about using the internet: You’re being tracked just about everywhere you go. Websites record your visits and activity when you surf around the net. For the most part, that kind of information gathering is legitimate and does not contain information that can be traced back to you. That doesn’t mean it’s impossible to trace it back to you, it just means that the vast majority of website operators cannot trace it back to you. For the authorities it’s another matter, since they can combine data from websites you visit with data that your internet service provider has and track you right to your doorstep. In most cases (depending on where you live), they are supposed to follow strict legal guidelines and obtain approval from the courts, but how can we be certain they are even doing that? A whole book could be written on this topic, and most likely has, but just keep this in mind. Things you put out on the internet (pictures, Facebook posts, comments, etc.) aren’t ever coming back. They’re “out there” and you have no control over how those things will be used. It’s kind of like jumping off a bridge – the moment your feet leave that surface, it’s too late to decide you really didn’t want to die today.

5. Drones

drone

Image Credit: U.S. Air Force

These are more-or-less the new kids on the block. The military has been using them for years to blow up alleged terrorists and other people the government doesn’t like very much. Very few of us have access to the kind of super high-tech drones that the armed forces are using, but you might be surprised to find out that anyone can jump online and order up their very own surveillance drone! These things come equipped with cameras that beam images back to the operator as they fly about here and there. Got a hot neighbor who enjoys a little topless sunbathing from time to time out by the pool? A spy drone is the ultimate must-have for your modern-day peeping tom! Not trying to beat a dead horse here, but again, this is something that can be used for both legitimate and not-so-legitimate purposes. It’s the person at the controls that decides who lives, who dies or whose half-nude body shows up on YouTube. Drones are just machines and are not able to decide on their own who to blow up or who to film by the swimming pool – at least not yet.

6. Your Automobile

car

Image Credit: MorgueFile

Did you know that many modern automobiles are now equipped with “black boxes” just like airplanes? With these devices it’s possible to record your driving habits, such as how often you speed. They can be examined after a traffic accident and reveal how fast someone was going at the time of the crash, when they applied their brakes, whether or not they tried to steer clear of the collision and so on. Combine that ability with built-in GPS and you may as well have an NSA chaperone riding shotgun with you everywhere you go. A recent comment by a Ford Motor Company executive was retracted after he said something to the effect that Ford could tell when drivers where speeding and where they were when they did it. Believe it or not, the statement was made by Ford’s “Global Vice President for Marketing and Sales.” There’s little reason to doubt that what he said is factual. What’s not so clear is whether or not anyone is actually doing it.

7. Photographs

camera

Image Credit: MorgueFile

What shutterbug doesn’t just love their digital camera? Those of us who remember the days of “real” film can hardly believe how great this new innovation is! It seems like you can shoot for days with some of these new cameras and never have to worry about swapping out for a fresh roll of film and then waiting for someone to develop the pictures for us. What many folks may not know is that it’s not just the images of little Sally’s birthday party or those great shots from your vacation to Yellowstone that are stored on those nifty little memory cards. Digital cameras also store a lot of “meta data” along with each snapshot. Interesting things like where exactly the camera was when you took the picture. Not every camera has GPS these days but it is showing up in more and more new models. Since so many phones are also cameras, the same thing holds true for them. Yes, a lot of the meta data stored with digital photos is useful, things like shutter speed and F-stop and all that geeky shutterbug stuff. Still, it’s good to know what exactly it is you are putting out there when you upload photos to Facebook or any other site on the internet. Unless you go through the trouble to “scrub” the meta data from the images before uploading them to the net, you can’t be sure that you’re not uploading that meta data along with it for anyone to see.

8. Facial Recognition

face

Image Credit: MorgueFile

Now we’re starting to get into the real creepy stuff. Image recognition technology has reached the point where it’s possible to identify a person based on their facial features. Images are captured by cameras and then processed by computers which compare the images with a database that contains images of known persons. These systems are capable of constructing mathematical models based on facial features such as the distance between a person’s eyes. There are also technology companies that are actively working on new technology that would allow for searches of images online in a whole new way. For now we may be limited to typing someone’s name into Google image search or Flickr, but in the future you may be able to scan or upload a photo to your PC and then have a search engine locate other photos that match the one you already have. All kinds of ugly things come to mind when one thinks about what a child molester might be able to do with a picture of a child he finds on the internet or one that he secretly snaps at the shopping mall or playground. Remember, when you put anything out on the internet, you lose control of it forever.

9. License Plate Readers

police-car

Image Credit: MorgueFile

Although this might have been classified under “Security Cameras,” we think it deserves its own topic. Some people may have begun to notice odd-looking devices mounted on police vehicles in recent years. They may or may not look like a camera but they are normally pretty conspicuous since they are often mounted on the roof or trunk of the vehicle. The technology behind these devices is pretty impressive, but some people are not so impressed with the amount of random data they are scooping up. As the name suggests, these special cameras are able to read the numbers and letters on vehicle license plates. The numbers can be processed by a computer in the police vehicle and compared to a database of wanted or stolen vehicles. It can make these comparisons at an impressively rapid pace – checking passing cars as the police cruise down the street. The device will alert them if they pass a vehicle that is wanted for one reason or another. The placement of these cameras is not limited to police vehicles. They could also be placed by the freeway or at a busy intersection. Sounds like a great tool for catching bad guys but the questions always looming is: Who’s watching the watchers?

 

10 Unanswered Questions About 9/11

The events of September 11, 2001 will live on in the memories of all those who were alive to witness them. Despite the explanations from government officials and “official” investigations, many people remain skeptical and believe there is much more to the story than the official version purports. We’ll consider 10 unanswered questions that have convinced skeptics that there is more to the story of 9/11 than 19 terrorists hijacking airliners.

#1. Why did WTC Building #7 collapse in a way that looked as if it has been brought down by a controlled demolition?

Building #7 was not even struck by an aircraft on 9/11 yet it somehow caught fire and collapsed. Despite the fact that no skyscraper has ever collapsed due to fire before 9/11, Building #7 collapsed in on itself as if it had been swallowed by the earth some eight hours after the airliners struck WTC Towers #1 and #2. There were reports that fire officials evacuated the area around Building #7 an hour before it collapsed as if they somehow knew it was going to happen. What happened to Building #7 remains a mystery that has not been adequately explained by any official investigation.

#2. Why is there evidence strongly suggesting that Saudi Arabia had some involvement in the attacks of September 11?

Even though they are regarded as one the United States’ most devoted allies in the Middle East, evidence has come to light that the Saudi government played a role in the attacks by providing support to the purported hijackers. In response to calls from two congressmen for the Obama administration to declassify the full congressional report on the 9/11 attacks, the current administration has taken no action. The declassified version of the report that was released was heavily redacted by the Bush administration and included a total of 28 pages that were completely blank.

#3. Why were F-16 fighter jets scrambled from Langley Air Force Base directed to fly out over the ocean towards a military training area instead of being directed to fly towards Washington, D.C. to protect important assets?

In an unusual move by military commanders, three fighter jets were scrambled from Langley AFB in Virginia, about 130 miles south of Washington. What’s unusual was that the military unit’s SOF, or “Supervisor of Flight” was also ordered into the air with the two aircraft that would normally be launched under those circumstances. The SOF plays a critical role in any intercept mission by staying on the ground and coordinating the response to a perceived threat by communicating with the fighter aircraft and civilian air traffic controllers. The order for the SOF to fly the third aircraft was shocking to the pilots involved and was regarded as highly unusual. As a result of the confusion that followed, the three aircraft were directed to travel out over the ocean in an easterly direction taking them further away from the Washington, D.C. area when the Pentagon was attacked than they had been when they were first launched from Langley.

#4. Did privileged insiders profit from stock trades they made due to knowledge that the 9/11 attacks were imminent?

Financial records reveal that an extraordinarily large number of “put options” were placed against American Airlines and United Airlines stock just before the attacks of September 11. Put options are speculative instruments that reward investors when a particular investment – such as stocks – loses value. Traders who accumulated put options in unusually large numbers for the two airlines that were involved in the 9/11 attacks before the attacks took place were clearly expecting the value of those two stocks to drop, making their investment very profitable as well as very suspicious.

#5. Does the evidence suggest that an airliner actually struck the Pentagon?

Many experts agree that the damage inflicted on the Pentagon from an airliner slamming into the structure does not match the damage that was actually evident after the attack. Many also question why only a single video of the impact was ever released when many other cameras should have also captured the impact. As a highly-secure and vital government location, the entire area is covered by a large number of video surveillance cameras.

#6. How did passports and other identification documents belonging to the alleged hijackers survive intact after the airliners struck the twin towers and crashed in Pennsylvania?

It is well-known that the fire and subsequent collapse of both World Trade Center towers completely destroyed virtually everything that had been inside the structures at the time. An exhaustive search for human remains following the attacks turned up less than 300 intact bodies and thousands of pieces of bodies and bone fragments left behind after nearly 3,000 people perished inside the towers. Does it make sense that a passport belonging to one of the alleged hijackers was recovered from the ruins intact? In Shanksville, PA where United Airlines Flight 93 reportedly crashed, two of the hijacker’s passports were said to have been found in the wreckage despite the fact that only a large hole in the ground was visible after the crash and virtually the entire aircraft and its contents were obliterated by the impact.

#7. Why did Larry Silverstein purchase a lease on buildings that were considered a bad investment?

It was well-known that the World Trade Center buildings were not near the top of New York City’s list of most desirable real estate investments. The buildings were in need of expensive upgrades including asbestos remediation and other renovations. The estimated total cost to perform the upgrades was $200 million. When the buildings were destroyed on 9/11, Silverstein became eligible to collect some $7 billion dollars on the insurance policy he purchased on the property just six months before the attacks.

#8. Was it a coincidence that an extensive military exercise was being conducted on the morning of September 11, 2001?

Early confusion after the attacks on the morning of 9/11 was compounded by a large-scale military exercise that was taking place at the time. During the exercise, military controllers had simulation data routed to their radar scopes and other monitoring equipment to make the simulation more realistic. Audio recordings released reveal that the exercise contributed to the confusion in the immediate aftermath of the attacks and made military personal question whether the reports of the attacks were real or were simply part of the simulation.

#9. Why did Attorney General John Ashcroft abruptly decide to stop flying on commercial airlines?

As reported by the mainstream news during July of 2001, then-Attorney General John Ashcroft was advised by the FBI to stop flying on commercial airlines. The FBI would not elaborate on the reason for the warning except to say that it was the result of a “threat assessment.”

#10. Were bombs planted inside the World Trade Center buildings to bring them down in a controlled demolition?

Many people present at “Ground Zero” on the morning of the attacks report hearing a series of explosions coming from the buildings as they were collapsing. Reports of “bombs going off” even came from firefighters who should be familiar with the various sounds of explosions that might occur during a fire. Then there’s the remarkably “controlled” way that both of the towers collapsed almost perfectly, as if they were brought down by a well-executed demolition operation.

Much like the the JFK assassination, speculation and rumors are likely to persist well into the future regarding the events that took place on September 11, 2001. Whether the world will ever hear the complete and unadulterated truth remains to be seen.