The Population Scam

The Population Scam

Posted in Uncategorized | Leave a comment

Sandy Hook Links

Nobody Died At Sandy Hook: It was a FEMA Drill to Promote Gun Control. This book provides a great summary of the evidence that the Sandy Hook school shooting was a hoax.

Here you can find and download censored videos about the Sandy Hook school shooting: archive.org/details/@newamerica2012. Videos questioning the official story of any mass shooting are banned from YouTube.

Find videos about false flags, including the Christchurch Mosque Shootings: 153news.net

See also: the LAX/TSA Airport Shooting Hoax-Drill of 2013.
https://archive.org/details/2013AirportShootingHoax

Posted in Uncategorized | Leave a comment

The Baghdad Bombing Hoax

The video above shows actors pretending to be injured by a fake car bomb in Al-Hurriyah, Baghdad. The footage was taken by a private security camera. Before it was publicly released, Islamic State claimed responsibility for the attack and the Iraqi government verified the number of casaulties. This was a false flag blamed on Islamic State, where both parties cooperated to stage the hoax. Their cover story is that the attack was staged by a spy who worked undercover for IS and carried out fake attacks to prevent civilian deaths.

https://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=12114272

Posted in Uncategorized | Leave a comment

False Flags

A false flag is a covert operation that stages an attack and frames another country or group for carrying it out. The attack may be real or a hoax. Here are some recent false flags:

A retired Turkish general named Sabri Yirmibeşoğlu admitted that Turkish forces burned down a mosque on Cyprus in the 1970s and blamed it on their enemy. He explained: “In Special War, certain acts of sabotage are staged and blamed on the enemy to increase public resistance. We did this on Cyprus; we even burnt down a mosque.”

In 1978, the West German secret service detonated a bomb in the outer wall of a prison and planted “escape tools” on a prisoner – a member of the Red Army Faction – which the secret service wished to frame the bombing on.

A former Mossad agent named Victor Ostrovsky, admitted that Mossad planted a radio transmitter in Gaddaffi’s compound in Tripoli, Libya. The radio broadcasted fake trasmissions recorded by Mossad that framed Gaddaffi as a terrorist supporter. Ronald Reagan bombed Libya immediately thereafter.

In the 1990s, the Algerian army frequently massacred Algerian civilians and blamed Islamic militants for the killings.

In 1998, an investigation into violent riots in Indonesia determined that “elements of the military had been involved in the riots, some of which were deliberately provoked”.

Russian spies were caught planting live explosives in the basement of an occupied apartment building in Ryazan, during the 1999 Russian apartment bombings. The bombings raised the approval ratings of Vladimir Putin and justified the second Chechen war.

The Indonesian military killed two American teachers in Papua in 2002 and blamed the murders on a Papuan separatist group.

Former Indonesian president Abdurrahman Wahid says police or the military may have planted one of the bombs in the 2002 Bali nightclub bombing.

In 2002, Macedonian police staged a terrorist attack on themselves. They claimed that Al Qaeda terrorists opened fire on them, and they had the dead bodies of the terrorists to prove it. In fact, the bodies were of seven illegal immigrants that the police had trafficked into the country and then murdered.

In July 2001, at the G8 summit in Genoa, police planted two Molotov cocktails and faked the stabbing of a police officer, in order to justify a violent crackdown against protesters.

Between 2002 and 2010, the Columbian military murdered thousands of Columbian civilians. Bodies were dressed up as rebels to make it appear as if they had been killed in combat. Colonel Luis Fernando Borja was one of those convicted.

The head of Saudi Arabian intelligence, Prince Bandar, blackmailed Russia by threatening Chechen terrorist attacks at the 2014 Winter Olympics.

See here for the historic list of false flags (link is not endorsed).

Posted in Uncategorized | Leave a comment

What is Controlled Opposition?

Vladimir Lenin said that “the best way to control the opposition is to lead it ourselves.” What Lenin meant to say was: the best way to defeat your enemies is to betray them. Keep your friends close and your enemies closer. If Lenin had said this instead, we would be left wondering who he was going to betray next.

Betrayal is the essence of a conspiracy. The conspirators pose as leaders and friends, but they are working for the enemy. The conspirators earn your trust and then exploit it. People are wary of criminal conspiracies, except when they involve the authorities and institutions of their country.

Lenin’s maxim is relied upon by the authorities. Betraying the enemy is the function of every spy agency. A spy works for the enemy to betray their secrets. Corrupt governments view citizens as the enemy and use spies to betray dissidents and persecuted people. Groups that oppose the establishment are infiltrated by spies from top to bottom. The establishment establishes new opposition groups at the first hint of dissent. This avoids the difficulty of infiltration. Thus, the opposition becomes a controlled part of the establishment.

The purposes of controlled opposition include:

Co-opting or preempting a resistance movement to neutralize the threat that a grassroots movement would pose to an established power structure.
• Preempt or neutralize true but negative information by having it be championed in a skewed or stigmatized fashion by a person or group. The truth can be peppered with misinformation or the truth of the message can be neutralized by association due to the extreme, radical, or unpalatable positions held by the controlled entity (person or group) who is disclosing the information or “championing” a position. The stigmatize truth or adulterated truth in turn steers people away from truthful information which would normally cause criticism or a serious backlash against the controlling party.
• Hijack the goals and actions of an organization or movement for purposes other than those that were the original intentions of the grassroots movement.
• Give the public the false illusion of choice by presenting a political party or organization that superficially speaks to the desires or frustrations of the people but whose actions do not further the stated goals of the organization.
• Disinformation or deception of the masses. Steering the masses in the wrong direction or misdirect their energies, beliefs and actions.
• Unmask and monitor the true opposition.
• Create a chaotic and divisive environment in which the opposition cannot band together and there is general mistrust thereby ensuring that an organized opposition with clear goals and priorities never manifests.
• Act in such a way that superficially appears to benefit the opposition, but in truth furthers the ends of the controlling party.

When spies control the opposition, all political solutions are set up to fail. The only way forward is to expose the conspirators and their plot against the public.

Posted in Uncategorized | Leave a comment

Cointelpro

A 2006 American military study states that:

Hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering.
Hacking the site and subtly changing the messages and data—merely a few words or phrases—may be sufficient to begin destroying the blogger’s credibility with the audience. 

50,000 computer networks were infected with NSA malware
How covert agents infiltrate the Internet to manipulate and deceive

Posted in Uncategorized | Leave a comment

Facial Recognition Test – Donald Trump Compared with Elvis Presley



Photos of Elvis Presley are compared against 75 celebrities using facial recognition. Donald Trump is the most likely match. Comparisons using facial recognition show that Donald Trump is likely to be Elvis Presley.



Posted in Uncategorized | Leave a comment

Facial Recognition Test – Hillary Clinton Compared with Eva Braun

Posted in Uncategorized | Leave a comment

Weather Modification

Cloud seeding is a form of weather modification that uses aircraft to inject clouds with silver iodide or dry ice. These chemicals induce the cloud’s water vapour to condense into droplets, causing precipitation. Cloud seeding by aircraft is used in more than 50 countries to cause rainfall. However, cloud seeding can also be used to prevent rainfall over a region and ultimately cause a drought. Airports use cloud seeding to disperse clouds and fog.

Seeding and bursting clouds reduces the moisture level (humidity) of the atmosphere. This increases the temperature and the ratio of hot to cold air. In this way, cloud seeding affects wind currents. A complex application of this simple technology on a large scale could offer vast potential for manipulating the weather. Cloud seeding was suspected of causing storms and floods in Lynmouth, England in 1952 and recently in Derwent Valley, Tasmania.

Weather modification has become a lot more advanced since the 1950s. In 1997, the US Secretary of Defence William Cohen stated that “others [terrorists] are engaging even in an eco-type of terrorism whereby they can alter the climate, set off earthquakes, volcanoes remotely through the use of electromagnetic waves”. The High Frequency Active Auroral Research Program (HAARP) in Alaska may be designed for this purpose. HAARP is an array of microwave antennas that shoots electromagnetic waves at the ionosphere. The wave beams are highly-focused and are produced at such a high intensity that HAARP needs its own power plant. HAARP can use skywave propagation to target any region of the world with these electromagnetic waves.

Declassified documents reveal the UK and US military conducted germ warfare tests on their populations via spraying operations from the 1950s to the 1970s. In recent times, governments have issued patents and drawn up plans for geoengineering (climate engineering and weather modification). These proposals to change the climate are offered as a way to stop climate change. But is geoengineering the cause of climate change?

In the summer of 2019, there was an intense heat wave in New Zealand and a large bush fire in Nelson. At the same time, chemtrails (chemical trails left by jets) were witnessed all over the country. The chemtrails persisted for hours and spread out to form clouds that blanketed the sky.

Chemtrails are said to be condensation trails (contrails). However, the engines of most aircraft today are very fuel-efficient and emit a tiny amount of water vapour per distance travelled. Commercial aircraft fly at a speed of 206-258 metres per second, and a Boeing 747 burns 4 litres of kerosene per second. Every metre, the Boeing plane burns 16 grams of kerosene, producing less than 20 grams of water vapour (ratio is 4:5). The width of the contrail should be about 4 ice cubes per metre, but the width of a chemtrail is always larger than the plane that leaves it. A commercial airliner leaving persistent trails is probably spraying chemicals.

Military aircraft that create contrails are undesirable for tactical reasons. Contrails guide the enemy in shooting down a plane. Fighter jets produce fake contrails for air shows by injecting chemicals into the exhaust stream.

Planes have been filmed showing their trails being turned off in mid-flight and then turned back on again. This is impossible if it is a condensation trail produced by engine exhaust. The planes leaving chemtrails fly back and forth in patterns, maximising the surface area being sprayed.

Droughts and bush fires are burning people off the land. But there are solutions. Successful rainmaking experiments were conducted by New Zealander Trevor Constable. He used cloud busters based on Wilhelm Reich’s original design that were attached to a helicopter or plane. Aquifers lie under a quarter of New Zealand’s land surface and they are self-replenishing. Access to the aquifers is controlled by foreign companies who send most of the water offshore. Despite the water restrictions, there is no shortage of water, only a shortage of access to it.

Posted in Uncategorized | Leave a comment

Directed-Energy Weapons (DEWs)

A directed-energy weapon (DEW) is a ranged weapon that damages its target with highly focused energy, including laser, microwaves and particle beams. The Active Denial System (ADS) is a vehicle-mounted DEW that fires high-intensity microwaves at a target. It is a microwave gun that produces microwaves just like a microwave oven. If microwaves can cook food, they can also cook a person’s flesh. The ADS is designed as a non-lethal weapon, so it uses a frequency with a short wavelength that doesn’t penetrate deeper than the skin. However, longer wavelengths can penetrate walls and are used by cell phone towers and Wi-Fi routers at a low intensity. Wi-Fi routers produce the same frequency of radio waves as microwave ovens (2.4 GHz).



Some people have turned their microwave ovens into microwave guns. This is done by taking out the magnetron and attaching it to a cantenna.



A microwave gun looks just like an antenna, and it is easy to disguise as regular radio equipment. The military could covertly set up microwave guns in civilian areas as part of a defence strategy.

A microwave gun looks just like an antenna, and it is easy to disguise as regular radio equipment. The military could covertly set up microwave guns in civilian areas as part of a defence strategy.

How can you protect yourself from terrorists with microwave guns? Body fat is non-polar and blocks radio waves. Fat people are microwave-resistant. Eating saturated fat from animals is safe, but drink filtered water that has the chlorine removed. Chlorine (bleach) is linked to atherosclerosis. Avoid trans fat (hydrogenated vegetable oil) from processed and fast food.

There are patents for using radio waves to create audible sound by stimulating the cochlea of the inner ear. There are theories about certain technologies that can be used for mind control and methods of preventing it.

Posted in Uncategorized | Leave a comment