U.S. Caught Creating Three New Computer Viruses. 

Obama Launches False Flag on Internet to Take it Over.








War Declared on Russia By Soros Controlled U.S.

Published on Oct 16, 2016

The US and Russia have all but declared war. Alex breaks down how this manufactured conflict is being used to take over what remains of the United States by the globalists.

 Links :


 The New World Order

The Criminal Clintons





Hillary's False Flag Uncovered, US Elections in Peril!

Published on Oct 15, 2016

Alex uncovers the possibility of a nefarious plot to vilify the Russians and throw the nation into chaos allowing Hillary to Steal the Election!


The Criminal Clintons






Cyber Attack on US Banks is an Obvious False Flag 

Eric Blair
Sept 30, 2012


Over a month ago we featured an article titled The NWO Agenda Would Move Forward with This One Simple Act, which stated the one event that could accomplish all of the agenda’s goals in one shot would be “a false flag cyber attack on Western banking institutions that they can pin on Iran.”



Please watch this exact scenario unfold in this short ABC news clip from a few days ago:







Who Will be Blamed for Cyber Pearl Harbor?

Published on Jan 10, 2015

As the world is on high alert with the terror attack in France, government officials are hinting at a coming cyber attack. Snowden warns cyber war will be more damaging to the U.S. than any other nation. While a curious website has popped up claiming to be part of the official #OpCharlieHebdo movement. However, Anonymous, who today declared war against all terrorists by shutting down jihadist websites, denies the connection.

...cyber pearl harbor

Snowden: cyber war more damaging to US than any other






Most Extensive Cyber Attack On American Banks Ever! Launched From The Middle East & Happening Now!  

With President Obama ready to sign an  executive order to control the Internet in the name of cyber security, could it be more obvious that this “cyber attack” is a total set up? Especially since all versions of Internet control legislation have failed to pass in normal government channels bothdomestically and internationally.

Are we expected to believe that sophisticated Muslim hacktivists attacked US banks because they were angry about a movie that was produced in America?  That’d be like attacking Afghanistan or Iraq after 15 Saudis supposedly attacked us, ohh wait…that did happen.

Is this really the best story they can come up with?  It was so predictable that it makes it that much more laughable. But the motive being pinned on the pathetic anti-Muslim movie is the real kicker.

It’s sad to see Richard Clark in the video above actually take this seriously.  Talk about an establishment sellout.

I call major bullshit on this story.  It stinks to high heaven.  What do you think?





Go Here To Learn About The Slipper Slope Of Executive Orders: Executive Orders

Executive Orders







America and Israel Created a Monster Computer Virus Which Now Threatens Nuclear Reactors Worldwide

Washington’s Blog
November 12, 2013

In their obsession to stop Iran from developing nuclear weapons, the U.S. and Israel created a computer virus (called “Stuxnet”) to take out Iran’s nuclear reactors.

The virus appears to have spread to other countries.

One of the world’s top computer security experts – Eugene Kaspersky – said this week that the virus has attacked a Russian nuclear reactor. As The Register notes:

The infamous Stuxnet malware thought to have been developed by the US and Israel to disrupt Iran’s nuclear facilities, also managed to cause chaos at a Russian nuclear plant, according to Eugene Kaspersky.

The revelation came during a Q&A session after a speech at Australia’s National Press Club last week, in which he argued that those spooks responsible for “offensive technologies” don’t realise the unintended consequences of releasing malware into the wild.

“Everything you do is a boomerang,” he added. “It will get back to you.”


“Unfortunately, it’s very possible that other nations which are not in a conflict will be victims of cyber attacks on critical infrastructure,” said Kaspersky.

“It’s cyber space. [There are] no borders, [and many facilities share the] same systems.”

Not finished there, Kaspersky also claimed to have heard from “Russian space guys” in the know that even machines on the International Space Station had been infected “from time to time” after scientists arrived aboard with infected USBs.

Watch for yourself:



Other security experts agree.

As British security website V3 – in an article entitled “Stuxnet: UK and US nuclear plants at risk as malware spreads outside Russia” – reports:

Experts from FireEye [background] and F-Secure [background] told V3 the nature of Stuxnet means it is likely many power plants have fallen victim to the malware ….

F-Secure security analyst Sean Sullivan told V3 Stuxnet’s unpredictable nature means it has likely spread to other facilities outside of the plant mentioned by Kaspersky.

“It didn’t spread via the internet. It spread outside of its target due to a bug and so it started traveling via USB. Given the community targeted, I would not be surprised if other countries had nuclear plants with infected PCs,” he said.

Director of security strategy at FireEye, Jason Steer, mirrored Sullivan’s sentiment, adding the insecure nature of most critical infrastructure systems would make them an ideal breeding ground for Stuxnet.


Steer added the atypical way Stuxnet spreads and behaves, means traditional defences are ill equipped to stop, or even accurately track the malware’s movements.

“It’s highly likely that other plants globally are infected and will continue to be infected as it’s in the wild and we will see on a weekly basis businesses trying to figure out how to secure the risk of infected USB flash drives,” he said.


The use of XP in power plants is set to become even more dangerous as Microsoft has confirmed it will officially cut support for the 12-year-old OS in less than a year. The lack of support means XP systems will no longer receive critical security updates from Microsoft.

That’s almost as brilliant is waging a global war on terror in such an idiotic way that it is increasing terrorism …

This article was posted: Tuesday, November 12, 2013 at 5:16 am

Tags: ,







Computer Experts Discover Flame and Stuxnet Related

If research conducted by Kaspersky Labs is correct, the Flame virus is related to a previous malware virus developed by Israel and the United States.

Kurt Nimmo
June 112, 2012


Alexander Gostev, an expert at Kaspersky Labs, said in an email that the Russian cyber security software company discovered a similarity between a subset of the code used in Flame and code used in the Stuxnet virus.

Stuxnet was developed collaboratively between Israel and the United States for the explicit purpose of disabling computer networks in Iran, although Israeli intelligence denies this, according to Mossad agents who say they created the malware and Obama is taking credit for unleashing it against Iran’s fledgling nuclear program as propaganda in his re-election bid.

According to author David E. Sanger, Obama decided to accelerate cyberattacks initiated during the Bush administration. Sanger says the project’s codename was Olympic Games and it began in 2006.

Flame is described as the most sophisticated malware to date. After it infecting a Microsoft Windows computer, it can record audio and keyboard activity, take screenshots and monitor network traffic. Flame can record Skype conversations and grab data via Bluetooth from nearby devices like cellphones.

Like Stuxnet, Flame was specifically deployed on computer systems in the Middle East. Kaspersky’s research reveals that “a huge majority of targets” were within Iran.



New Computer Virus "Flame" Most Sophisticated & Complex Cyber Weapon to Date


The discovery of a malicious computer program that appears to be collecting sensitive information from Iran and others indicates the global cyberwar has moved to a new level, warn security experts.

Kaspersky Labs, the Russian internet security company that discovered the malware, codenamed Flame, said it was more complex and sophisticated than any of the cyberweapons it has seen to date. "The Flame malware looks to be another phase in this war," said Eugene Kaspersky, co-founder of Kaspersky Lab.

At the end of April, computers at Iran's oil ministry were reported to have been attacked by hackers, and experts at Symantec, the US IT security company, said on Monday that parts of the Flame program were identical to the malware used in that attack. The incident was played down by the government at the time and it was unclear if any data was lost.

Earlier this year the head of Iran's Civil Defence Organisation had also said that the country's energy sector had been subject to an increasing number of cyberattacks over the past two years. Flame is thought to have been in operation since 2010.

The Stuxnet virus raised widespread panic when it was discovered in 2010, because it was believed to have caused physical damage at Iran's nuclear facilities, the first known computer worm to target industrial controls. While Flame is not thought to have caused this kind of damage, it appears to be able to spy on organisations in a number of ways, including switching on microphones attached to a computer to record conversations and sounds.

Orla Cox, senior security operations manager at Symantec, said the code was likely to have been written by a nation state. "It is very professionally written and does not even look like a piece of malware. We suspect there is some nation state involvement because of the funding you would need to have behind this."

Apart from anything else, she said, the amount of information being collected by the program was so vast, it would require large resources to sift through it all. "This is a fully-featured spying program that is grabbing anything it can," Ms Cox said.

Only a few hundred individuals appear to have been affected by the malware, Ms Cox said, and security experts were still trying to see whether there was any link or pattern to those affected.

Stuxnet and Duqu, another malware program, are widely believed to have been created by the US and Israeli governments, although neither country has confirmed their involvement.

Iran's armed forces have created a special unit to defend the country against computer attacks, which works closely with the defence, telecommunications and intelligence organisations.


Currently there are three known classes of players who develop malware and spyware: hacktivists, cybercriminals and nation states,” Kaspersky’s chief malware expert Vitaly Kamluk told the BBC in late May.

“Flame is not designed to steal money from bank accounts. It is also different from rather simple hack tools and malware used by the hacktivists. So by excluding cybercriminals and hacktivists, we come to conclusion that it most likely belongs to the third group… The geography of the targets and also the complexity of the threat leaves no doubt about it being a nation-state that sponsored the research that went into it.”

Over the last few years, the U.S. government has hyped an emerging cyber threat in near apocalyptic terms and the establishment media has echoed the supposed threat incessantly. The so-called defense industry – the military-industrial complex president Eisenhower warned about as he left office – has exploited the cyber threat and turned it into a multi-billion dollar industry.






Israel and the United States have emerged as the prime suspects behind the Stuxnet worm attack, which has infected the Iranian nuclear plant at Bushehr, following the discovery that a "wealthy group or nation" must have been responsible for the malware assault.

On Sunday, Infowars speculated that Stuxnet was a false flag intended to both target Iran and provide a pretext for the implementation of draconian cybersecurity legislation.

That suspicion has been greatly enhanced by new evidence which proves the virus was "created by experts working for a country or a well-funded private group," according to Liam O Murchu, manager of security response operations at Symantec Corp.

"A number of governments with sophisticated computer skills would have the ability to create such a code. They include China, Russia, Israel, Britain, Germany and the United States," states the Associated Press report, clearly indicating that the US, Israel, Great Britain, or a combination of the three were behind the attack.

The Stuxnet worm is now "rampaging through Iran," causing havoc to the country's industrial infrastructure, having already infected at least 30,000 IP addresses.

There would be no motivation whatsoever for Russia to be behind the attack because they have helped fuel the Bushehr reactor. China has backed US calls for sanctions in response to the nuclear plant, but it can hardly be claimed that the Chinese have aggressively opposed its construction and fueling. Indeed, China has been a regular exporter of nuclear technology and assistance to Iran in recent years.

That leaves three prime suspects, all of whom have followed identical foreign policies in vehemently opposing Iran's self-proclaimed goal of developing peaceful nuclear energy.

Top globalists such as Richard Falkenrath, a principal at Chertoff Group and a Bloomberg Television contributing editor, already blamed Israel for the attack before evidence emerged that the virus was the work of a sophisticated nation state.

If the United States' involvement in the attack was to be confirmed, it would completely discredit the foundation of cybersecurity legislation, which is being promoted as a means of defending against cyber attacks launched by terrorists and other nation states.

However, if any US involvement remains concealed, Stuxnet will be hyped as a primary reason for rushing the passage of the amalgamation of the Lieberman and Rockefeller bills, which as we have documented, have little to do with security and everything to do with shutting down free speech on the Internet, despite the fact that Stuxnet was distributed through a physical USB device and not via the public Internet.

Lieberman's version of the original bill includes language that would hand President Obama the power to shut down parts of the world wide web for at least four months with no congressional oversight. The combined version appears to shift that responsibility to DHS, who under the pretext of a national emergency could block all Internet traffic to the U.S. from certain countries, and close down specific hubs and networks, creating an ominous precedent for government regulation and control over the Internet.

Cybersecurity legislation is being promoted as a vital tool to defend the nation's critical infrastructure against cyber- terrorism. However, as we have highlighted, the threat from cyber-terrorists to the U.S. power grid or water supply is minimal. The perpetrators of an attack on such infrastructure would have to have direct physical access to the systems that operate these plants to cause any damage. Any perceived threat from the public Internet to these systems is therefore completely contrived and strips bare what many fear is the real agenda behind cybersecurity -- to enable the government to regulate free speech on the Internet.

Fears that cybersecurity legislation could be used to stifle free speech were heightened when Senator Lieberman told CNN's Candy Crowley that the real motivation behind the bill was to mimic the Communist Chinese system of Internet policing.

"Right now China, the government, can disconnect parts of its Internet in case of war and we need to have that here too," said Lieberman.


Lockheed Martin, Boeing, Northrop Grumman and related defense and tech companies have vigorously lobbied the federal government about “growing cyberthreats to national security and corporate America, but they also make millions of dollars each year selling a variety of cybersecurity programs, tools and solutions to government and business,” Politico reported on May 30.

Israel and the United States – the CIA and Mossad – represent the vanguard of the emerging cyber security threat. Considering the history of government and its array of clandestine and self-serving false flag attacks, this reality is hardly surprising. It demonstrates that like al-Qaeda, the cyber threat is designed to create a crisis that can only be addressed by government and the military industrial complex.




Stuxnet: Another “Conspiracy Theory” Turns Out To Be True 

Paul Joseph Watson
January 18, 2011


Despite numerous establishment blogs and websites at the time debunking the claim that Israel and the United States were behind the Stuxnet virus attack, that fact has now been admitted, leaving many with egg on their faces and proving once again that the “conspiracy theorists” were right all along.



Stuxnet False Flag Launched For Web Takeover! - Alex Jones Tv 1/3 


The Alex Jones Show from September 27, 2010, in which Israel and the United States were identified as being behind the Stuxnet attack.

After months of speculation, our original hypothesis that the US and Israel were responsible for the computer worm attack on Iran’s nuclear facilities was confirmed on Sunday.

US and Israeli intelligence services collaborated to develop a destructive computer worm to sabotage Iran’s efforts to make a nuclear bomb, The New York Times reported Sunday.

The newspaper quoted intelligence and military experts as saying Israel has tested the effectiveness of the Stuxnet computer worm, which apparently shut down a fifth of Iran’s nuclear centrifuges in November and helped delay its ability to make its first nuclear weapons.

Back in September,  we wrote several articles in which we identified “Israel and the United States….as the prime suspects behind the Stuxnet worm attack,” following the revelation that the virus was “created by experts working for a country or a well-funded private group.”

While the US government and the compliant, castrated corporate media were dutifully regurgitating the claim that Russia or China were behind the attack, we pointed out that neither country had any motivation to launch an assault that primarily affected an Iranian nuclear campaign that both nations had largely supported.

Following our columns in late September pointing to the US and Israel as the culprits, a number of establishment websites and blogs put out hit pieces that attempted to debunk the notion that Stuxnet was a false flag.

- In an article entitled Debunking the Bunk of Stuxnet, the popular About.com website claimed that “none of the evidence” had “any direct connection” to Israel being behind the attack.

- The Economist reported that there was “no specific evidence” Stuxnet was an Israeli cyber-missile aimed at Iran.

- In an October 5 piece entitled Stuxnet: Fact vs. theory, CNet’s Elinor Mills wrote that there was “no hard evidence” behind the claim that, “The malware was distributed by Israel or the United States in an attempt to interfere with Iran’s nuclear program.”

- A Reddit piece submitted by “conspiracy debunker” entitled,  “I would just to take this opportunity to debunk the conspiracy theory that Stuxnet was made by Israeli hackers,” blamed “low educated Iranians from poor backgrounds” for the theory that Israel was behind the attack.

- The Judeosphere blog labeled the charge “convoluted mental gymnastics”.

- A Jewish Chronicle article written by Miriam Shaviv labeled the claim a “ridiculous” conspiracy theory.

Don’t expect to see retractions or apologies from any of the debunkers who dismissed the obvious evidence that the United States and Israel were behind the cyber-attack, which has now been confirmed.

Exploiting the threat of cyber-attacks launched by their own cybersecurity departments, the US and Israel are not only placing in peril the Internet as a free and open forum, they are also heightening the risk of devastating environmental catastrophes and global instability.

The Stuxnet virus has caused extensive damage to the Bushehr reactor, leading to the risk of a new Chernobyl-style nuclear disaster, according to Russian officials.

“The Russian scientists’ report to the Kremlin, a copy of which has been seen by The Daily Telegraph, concludes that, despite “performing simple, basic tests” on the Bushehr reactor, the Russian team “cannot guarantee safe activation of the reactor,”  writes Con Coughlin.

Such cyber attacks could also spark “a full-scale global shock,”  according to a report by the Organisation for Economic Co-operation and Development (OECD), which could include solar flares crippling communication satellites, a fundamental flaw being exposed which leads to the Internet being shut down, or even a full scale war.

As we wrote back in September, “If the United States’ involvement in the attack was to be confirmed, it would completely discredit the foundation of cybersecurity legislation, which is being promoted as a means of defending against cyber attacks launched by terrorists and other nation states.”

Now that this has been confirmed, the National Cyber Security Division unit of Homeland Security has lost all credibility and should be disbanded immediately. We have the very culprits behind devastating cyber-attacks that could spark nuclear meltdowns or global warfare hyping the threat of cyber-attacks as a justification to give themselves more power and control over the Internet.

This is a clear example of how the US and Israel stage crises that allow them to pose as the saviors while continuing to insist that cybersecurity threats are the work of external hackers and rogue states.

It also underscores how the establishment media is routinely complicit in deriding any wrongdoing involving the United States or Israel as a “conspiracy theory,” and attacking the character of those who make such claims.

Stock up with Fresh Food that lasts with eFoodsDirect (Ad)

So next time the corporate press calls something a baseless “conspiracy theory,” remember that Stuxnet was yet another example of the “conspiracy theorists” getting it right, by merely having a basic grasp of geopolitical maneuverings and understanding how the US and Israel stage false flag events to advance their own political agendas.

Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a fill-in host for The Alex Jones Show. Watson has been interviewed by many publications and radio shows, including Vanity Fair and Coast to Coast AM, America’s most listened to late night talk show.






U.S. Caught Creating Three New Computer Viruses  

Obama administration touts cybersecurity while conducting cyber warfare


Paul Joseph Watson
Tuesday, September 18, 2012 


While routinely touting the necessity for tighter controls over the Internet in the name of cybersecurity, the U.S. government has again been caught creating computer viruses to wage cyber warfare in the Middle East.

INTERNET FALSE FLAGSResearchers working for both Kaspersky and Symantec have separately discovered that the United States is almost certainly responsible for three new viruses that are being used in Lebanon and Iran to conduct espionage, having already been identified as the culprits behind the 2010 Stuxnet virus and this year’s closely related Flame virus.

Kaspersky and Symantec experts are still unsure as to what the newly discovered viruses are designed to do, but have confirmed that they are operating in the Middle East, including Iran and Lebanon, and that the, “approach to uploading packages and downloading data fits the profile of military and/or intelligence operations.”

The new viruses, programs code-named SP, SPE and IP, use malware packages that try to “communicate with command and control servers.” The new viruses could be offshoots of the Flame virus or completely different pieces of software.

“The findings are likely to bolster a growing view that the U.S. government is using cyber technology more widely than previously believed to further its interests in the Middle East,”  reports Haaretz.

“The United States has already been linked to the Stuxnet Trojan that attacked Iran’s nuclear program in 2010 and the sophisticated Flame cyber surveillance tool that was uncovered in May.”

As the  Washington Post reported earlier this year, the United States and Israel were also responsible for jointly developing the Flame virus, a huge malware assault that monitored Iran’s computer networks.

Despite months of inaccurate speculation blaming Russia or China for the outbreak of the 2010 Stuxnet virus, it was eventually admitted by the New York Times that, “US and Israeli intelligence services collaborated to develop a destructive computer worm to sabotage Iran’s efforts to make a nuclear bomb.”

The U.S. government’s continual efforts to develop computer viruses as a tool of cyber warfare might be more palatable were it not for the constant push by the executive and legislative branches to censor and regulate the Internet domestically in the name of cybersecurity.

Urging President Obama last month to pass an executive order that critics have denounced as another federal power grab over the Internet,  Senator Jay Rockefeller justified the EO by claiming it was needed “to protect this country from the cyber threat,” even as the U.S. simultaneously launches aggressive cyber warfare campaigns against other countries.

Indeed, viruses created by the United States and Israel have even been cited as proof that restrictive cyber security legislation needs to be rubber stamped – by the very same government allied with the intelligence networks creating the viruses.

As we reported back in 2011, despite initial evidence clearly indicating the U.S. and Israel were behind the Stuxnet attack, a fact that was subsequently confirmed, major news websites still parroted the official narrative that Russia or China were to blame, even going to the lengths of ridiculing anyone who suggested otherwise as paranoid conspiracy theorists.

While claiming that it needs more power over the world wide web to prevent the spread of hostile computer viruses that could cripple U.S. infrastructure and sensitive networks, the U.S. government itself is creating those very same computer viruses to spy on and attack infrastructure and sensitive networks in other countries.


Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a regular fill-in host for The Alex Jones Show and Infowars Nightly News.





Obama Launches False Flag on Internet to Take it Over

Inventor and scientist Danny Hillis warns that the Internet has "expanded it way beyond its limits," and is set for a "disaster," calling for an 'Internet Plan B' that would operate in times of emergency.

Hillis is the founder of Thinking Machines Corporation, which developed the Connection Machine, a series of supercomputers designed by Hillis while he was working at MIT.





Former NSA Head Promotes Chinese Style Internet Takeover


During a speech at St. John's Episcopal Church yesterday, former NSA and CIA director Michael Hayden advocated a move towards a Chinese-style world wide web where users are forced to identify themselves before posting online content. http://www.infowars.com/former-nsa-di...
Stay in the know - Follow Alex on Twitter: https://twitter.com/RealAlexJones
'Like' Alex on FACEBOOK - https://www.facebook.com/AlexanderEme...





FBI: Cyber Attacks Justify Internet Kill Switch






 Paul Joseph Watson explains why the real agenda behind cybersecurity is political oppression and the death of free speech on the Internet, and how the entire globe is now implementing Chinese style censorship policies to change the nature of the world wide web as we know it forever.

The model Senator Joe Lieberman has identified as the goal of cybersecurity for America is centered around keeping people oppressed by eliminating any means of widespread dissent and preventing people from organizing politically. It has nothing to do with providing security against foreign hackers and terrorists and everything to do with strangling free speech critical of the state.





How to Defeat CISPA Once And For All!

From SOPA and PIPA to ACTA to CISPA to the TPP and now back to CISPA, internet activists have been caught up in a deliberately bewildering game of whack-a-mole with freedom-crushing legislation. Now, ISPs are doing an end run around the whole legislative process altogether and voluntarily collaborating with the entertainment industry to spy on their own customers. All of this is enough to leave concerned netizens demoralized, and in the war of attrition that is exactly the goal. Join us today on The Corbett Report as we explore a real, grassroots, alternative solution to the problem of internet censorhip that can help to end this government/corporate control over our communication once and for all.





Time Reference: 01:12

Understanding SOPA/PIPA & Why You Should Be Concerned
Time Reference: 02:13

SOPA/PIPA Strike First of its Kind
Time Reference: 02:39

Aaron Swartz: How We Stopped SOPA
Time Reference: 03:03

SOPA and PIPA Shelved, For Now
Time Reference: 03:43

Say No To ACTA
Time Reference: 04:42

ACTA anger: Protesters hopeful as official resigns
Time Reference: 05:27

European Parliament rejects ACTA
Time Reference: 06:13

CISPA: What You Need to Know
Time Reference: 07:23

Everything You Need to Know About CISPA
Time Reference: 07:53

Cybersecurity Act fails in the Senate: Will Obama move it forward?
Time Reference: 08:28

The 2013 State of the Union Address (Enhanced Version)
Time Reference: 09:15

34 Civil Liberties Groups Speak Out Against CISPA in Lead Up to Hearings
Time Reference: 11:06

Corporate Lobbying Offers Best ROI
Time Reference: 13:24

Six Strikes (New World Next Week)
Time Reference: 14:13

Cyberattack Identified as Top U.S. Threat
Time Reference: 18:49

Banks Cyber-attacked – by Iran?
Time Reference: 19:08

At Cyber War: How Chinese Hackers Spy on You
Time Reference: 19:23

The government has an “iPatriot Act” ready for Internet control
Time Reference: 21:03

Jack Blood on Pirate Internet
Time Reference: 22:51

Reporters’ Roundtable Ep. 126: Mesh Networks
Time Reference: 30:40

Time Reference: 40:02

Decentralizing Telecom
Time Reference: 40:43

Project Byzantium
Time Reference: 43:45

Lil Sokz – Anti-SOPA Rap Song (CISPA)
Time Reference: 48:46










The Next Terrorist Attack - What The Mainstream Media Isn't Telling You

 You've probably heard the media talking about the impending terrorist attack, but here's what they aren't telling you.
Follow us on Facebook: http://facebook.com/StormCloudsGathering
Follow us on Twitter: http://twitter.com/collapseupdates
Donate: http://StormCloudsGathering.com/donate
Visit our website: http://StormCloudsGathering.com
Get weekly email updates: http://tinyurl.com/naturalrightsnewsl...
U.S. Naval history website where they admit that the attack that was used to justify the Vietnam war never happened: http://www.history.navy.mil/photos/sh...

The other information mentioned is extremely easy to find with a simple google [startpage] search. Don't be lazy.





Subverting The Public







[Help Educate Family And Friends With This Page And The Links Below]




False Flag



False Flag Event

Free Speech

FCC Plan to Censor Internet

How the FCC plans to seize authority over the internet



Subverting The Public

Twenty-Five Rules of Disinformation

Big Brother/Sis & Surveillance Systems

The Balkanization of America

Slave Mentality

Propaganda History

Media Controllers

Media Controllers2

Media Controllers3

Learned Helplessness

Bread and Circus

War On Terror

Educational System Dismantlement








look into it videos 



invisible empire



hollerith dvd


obama deception


fall of the republic


Aaron Russo 


Terror Storm final cut 



police state 2000 


police state 2 the takeover


police state 3 total enslavement


police state 4


911 the road to tyranny


masters of terror


martial law 911 rise of the police state


blueprint of madmen