CIA Using Drug Money to Overthrow Ecuadorian Govt

The Central Intelligence Agency (CIA) is using drug money to fund Rafael Correa’s opposition in the coming 2013 Ecuadorian elections, intelligence sources have revealed to Chilean independent media. The accusations do not stand alone. In October, former UK diplomat Craig Murray said that the CIA had tripled its budget to destabilize the government of Ecuador.

http://www.infowars.com/cia-allegedly-using-drug-money-to-overthrow-ecuador-president-rafael-correa/

Just another effort to make the world safe for sweat shops that compete for american jobs.

Campaign Against the Torture and Mutilation of Children

The greatest crime against humanity is the torture and mutilation of children. Child abuse and neglect, particularly in its extreme forms, represents a form of torture and mutilation. Not commonly recognized as child abuse and neglect and a form of torture and mutilation is the ritual mutilation of genitals of children (male and female). One reason for the non-recognition of these crimes of genital mutilation and torture is their common occurrence and their support by religious and social traditions of various kinds. Another reason is the denial and/or indifference to the pain that is being inflicted upon these children.
James Prescott, Ph.D.
Developmental Neuropsychologist, Cross-Cultural Psychologist

The Ashley Montagu Resolution to End the Genital Mutilation of Children Worldwide:
A Petition to the World Court, the Hague
(1996)

The Universal Declaration on Circumcision, Excision, and Incision (1989)

Endorse the Declaration and Resolution

… etc …

http://montagunocircpetition.org/

The Necessity of Play for Kids

The State of Play Science
The National Institute for Play
and
Touch the Future
are proud to present a ground breaking survey of the latest neuroscience documenting the fundamental need and benefits of positive affect states, that is, what every child knows as PLAY.

For the first time we have gathered the scientific, brain based evidence that parents, teachers and child care professionals have needed to counter the elimination of play from tens of thousands of schools across the country.

http://ttfuture.org/play/front

http://vimeo.com/21894145

Who is destroying public education and children’s lives across the country and for what purpose?   What do you think?

Ten signs you need a different kind of education for your child

M any parents don’t realize that the education world has changed drastically since they were in school. Schools and class sizes used to be smaller, dropout rates lower, in-school violence almost unheard of, and teachers weren’t terrified of showing affection to their students, or of discussing moral values. Of course, even then, school was far from perfect, but at least the teachers—and usually the principal—knew every student by name, something that is increasingly rare today.

Because our public school system has deteriorated considerably, many parents, teachers, and individuals have taken it upon themselves to create public and private alternatives to that system; and it is important for parents to know that they now have choices.

So how do you know that it’s time to look for another educational approach for your child? Here are some of the signs: …

http://www.educationrevolution.org/blog/ten-signs-you-need-something-new/

Reprise: Mysterious Accomplices at Sikh Temple Massacre

“An eyewitness to the Sikh temple shooting in Wisconsin says that a team of four men dressed in black carried out the massacre, contradicting the official narrative that a lone gunman was the culprit. …

“UPDATE: A separate source has corroborated the other eyewitness claim – a family member whose parents were victims of the shooting said his parents told him there were “multiple shooters” involved in a “coordinated” attack.”

http://www.infowars.com/eyewitness-4-man-team-behind-sikh-temple-shooting/

Reprise: Giffords Shooting a Planned Assassination

“A knowledgeable federal government counter-narcotics source in Arizona has revealed to WMR that the shooting on January 8 this year of U.S. Representative Gabrielle Giffords and U.S. Judge John Roll in Tucson was planned as a twin assassination of two individuals who threatened to expose a weapons-for-drugs smuggling operation carried out by a covert group working under the aegis of the Central Intelligence Agency and Homeland Security Secretary Janet Napolitano. In fact, the covert operation dates back to when Napolitano was governor of Arizona. Roll had been Chief Judge of the District of Arizona since 2006. The assassin, Jared Lee Loughner, killed five others and wounded thirteen, including Giffords, at a Safeway parking lot in north Tucson. Loughner’s first and priority targets were Roll and Giffords.

“WMR has also been told that while the U.S.-Mexican border operation oversees the smuggling to Mexican drug cartels of weapons, including fully automatic AK-47s, in return for drugs smuggled across the border, mostly delivered by airplanes that make clandestine drops on pre-approved drop zones or landing strips in Arizona, New Mexico, and west Texas, at night, it is only peripherally connected to the “Fast and Furious” operation. Our source said that there were so many weapons being smuggled across the border that some were dropped, including a new AK-47 that was found in a wash on the Arizona side of the border. When the discoverer of the weapon contacted federal authorities about his find, he was told to keep the weapon since there were so many in the area. The “area” in question is said to be a special zone created by Napolitano when she was governor and that the special operations carried out there involve a number of “former” CIA, Navy SEALS, and other Special Operations personnel.  …”

http://www.waynemadsenreport.com/articles/20111209_3

Is Obama’s Cybersecurity Executive Order Imminent?

Flush with electoral capital, President Barack Obama is spending it like mad in pursuit of his radical power consolidating agenda. Over the past few days we have chronicled the fast-tracking of a UN gun control treaty, the prosecution of another alleged espionage case, another deadly drone attack, approval of a planned UN invasion of Mali, etc.

The latest stop of the Barack Obama Worldwide Tour of Tyranny may be the issuing of a  long-awaited and regularly leaked executive order exerting control over the Internet in the name of cybersecurity.

Of course, there remains the chance that Congress will pass some version of a cybersecurity bill before the president can issue his edict. Congress will be back in town on November 13 and Republican leaders have already telegraphed their intent to “reach across the aisle” and accede to the president’s mandate, including the touting of ObamaCare as “the law of the land.”

Then again, the president famously declared that “we can’t wait” for Congress to act, and given the fact that there are a few other pretty weighty items on the legislative schedule, a cybersecurity executive order isn’t out of the question. The decree would take that topic off Congress’s plate and allow the president greater control over the scope and severity of the regulations governing the “protection” of the nation’s cyberspace infrastructure.

Promises of the White House’s imminent issuing of the edict have been coming for months. The Associated Press (AP) obtained a leaked draft version of the order, but indicated that the source of the document didn’t disclose when the president would sign the order.

Greater evidence of the imminent issuing of the order came on September 19, when Department of Homeland Security Secretary Janet Napolitano said the executive order granting the president sweeping power over the Internet is “close to completion.” …

http://thenewamerican.com/usnews/politics/item/13600-is-obama%E2%80%99s-cybersecurity-executive-order-imminent?

What a joke.  Do you really think the computers that control critical infrastructure like the electrical grid etc are on the internet?  Do you think they play computer games with internet explorer in their control rooms?  The biggest threat to industrial computers in the USA is stuxnet, which came out of the US and Israeli governments and doesn’t rely on an internet connection in any case.

Only liars need such control.  The virus they’re worried about isn’t a computer virus, it’s the virus of a population awakening to imminent danger from its own bankster controlled zombie government.  Thus the push to illegally “repeal” the second amendment.  The wolves need the sheep disarmed to have their way with us.

Camp FEMA: American Lockdown

It’s a story the establishment media is largely ignoring – a tent city set-up by FEMA at Monmouth Park in Oceanport, New Jersey, for Hurricane Sandy victims more closely resembles a military concentration camp than something provided by a loving and humanitarian government.

The Asbury Park Press managed to talk with internees who described huddling in freezing cold tents with Blackhawk helicopters circling above.

“The elections are over and here we are,” a resident told the Asbury Park Press. “There were Blackhawk helicopters flying over all day and night. They have heavy equipment moving past the tents all night.”

He said FEMA stopped them from taking photos of “Camp Freedom” and turned off the WiFi and said they couldn’t charge their smart phones because there wasn’t enough power. “Every time we plugged in an iPhone or something, the cops would come and unplug them,” he said.

The man described the “micro-city” (as FEMA calls it) as a prison. The Red Cross promised facilities with washing machines and hot showers, but sent victims to live in unheated tents.

FEMA’s response is predictable. After all, it was designed for martial law and rounding up and interning people in concentration camps. FEMA’s disaster response role in basically a sham and a public relations front.

http://www.infowars.com/femas-camp-freedom-concentration-camp-with-blackhawk-helicopters-flying-above/

 

Countering the Corporate-Insurgency

A guide to how the war for control is waged upon us, and 4 ways to fight back.

October 26, 2012 – The terms insurgency and counterinsurgency can quickly become confusing in a politically motivated context. However, generally speaking, an insurgency seeks to overthrow an established institution or political order, while a counterinsurgency seeks to maintain that order.

In the United States, and around much of the world where the nation-state still prevails, the established order is one of national sovereignty based on constitutions and charters produced by each respective nation, with an infrastructure built and improved upon over generations by each nation’s respective cultures, economic activites, and innovations. There is an insurgency to subvert all of this. A global corporate-financier insurgency, or simply a “corporate-insurgency.”

The corporate-insurgency seeks to subvert our institutions, starting with the family, extending to our schools, universities, churches, temples and mosques, our local sheriff, and even reaching into our national governments, rewriting or eradicating altogether our national constitutions and charters. It has, to a great extent, already subverted our independent local infrastructure, while implementing laws and regulations to prevent us from restoring it. We have the very tactics described in a vast library of government and military counterinsurgency documents being employed against us, where ever we are and to a profound effect. 

“Insurgency is the organized use of subversion and violence to seize, nullify or challenge political control of a region. As such, it is primarily a political struggle, in which both sides use armed force to create space for their political, economic and influence activities to be effective. Insurgency is not always conducted by a single group with a centralized, military-style command structure, but may involve a complex matrix of different actors with various aims, loosely connected in dynamic and non-hierarchical networks. To be successful, insurgencies require charismatic leadership, supporters, recruits, supplies, safe havens and funding (often from illicit activities). They only need the active support of a few enabling individuals, but the passive acquiescence of a large proportion of the contested population will give a higher probability of success. This is best achieved when the political cause of the insurgency has strong appeal, manipulating religious, tribal or local identity to exploit common societal grievances or needs. Insurgents seek to gain control of populations through a combination of persuasion, subversion and coercion while using guerrilla tactics to offset the strengths of government security forces. Their intent is usually to protract the struggle, exhaust the government and win sufficient popular support to force capitulation or political accommodation. Consequently, insurgencies evolve through a series of stages, though the progression and outcome will be different in almost every case.” – page 7 U.S. Government Counterinsurgency Guide, 2009

While this above quote is a most accurate description of an insurgency, as one reads the US Government Counterinsurgency Guide (2009), they will realize that the opposing methods of counterinsurgency itself involve all of these same factors, simply mirrored and reflecting the interests of the US versus the interests of targeted “insurgencies.”

As a matter of fact, what is described by the 2009 counterinsurgency (COIN) guide, is an accurate description of how political control has been achieved and maintained by all governments throughout the entirety of human history – it also forms the foundation of modern empire. Understanding this is key to finding solutions when one finds themselves under the subjugation of an unfavorable political ideology or system. The tactics the guide describes can, and often are, used by either side in any political struggle, not necessarily only in an armed “insurgency.”

COIN is a socioeconomic-tactical synthesis, an interdisciplinary strategy based on an understanding of how a society functions, how to organize human resources to multiple force, and what needs and desires motivate individuals, as well as how these can be manipulated  and controlled to collectively motivate a society. These more technical concepts are generally absent from everyday political discourse, and equally absent or incomplete in regards to finding solutions for a failing or unfavorable system. …

http://landdestroyer.blogspot.com/2012/10/countering-corporate-insurgency_25.html

Transparency in all things