David Martin lists 17 techniques used by governments and their willing executioners to suppress facts and cover-up official crime. Knowing these techniques helps to resist these psychological attacks and expose the deceivers.Read more . . .
Now comes forward an attorney, Mary Maxwell with a book. It is available online free. I read the first eight chapters, which was sufficient to comfirm me in my independent conclusion that there was no Boston Marathon bombing by terrorists. Irony is the style that she has chosen, and we must respect a person prepared to stand up to the murderous American establishment and to challenge one of the founding myths of the American Police State and Washington’s wars against the world.Read more . . .
In 2015, a number of journalists and journalism associations requested access from the Parliament to documents relating to the subsistence allowances, travel expenses and parliamentary assistance allowances of Members of the European Parliament (‘MEPs’). Those requests were all refused by the Parliament, as were the confirmatory applications which followed them. The General Court confirms the Parliament’s refusal to grant access to documents relating to MEPs’ subsistence allowances, travel expenses and parliamentary assistance allowances.Read more . . .
MI5 has refused to answer the claimants’ questions about the scope of the policy, including whether it could in principle authorise murder, torture, inhuman and degrading treatment, rape, kidnapping or false imprisonment. The security service’s lawyers said to answer such questions of law would reveal the facts of conduct they wish to keep secret.Read more . . .
This article briefly examines the medicines component of the right to health, While the article focuses upon the responsibilities of States, it also provides a brief introduction to the responsibilities of pharmaceutical companies. The article is offered as a preliminary contribution to far-reaching human rights issues of the first importance.Read more . . .
Permanent members of the UN Security Council use their hidden veto to control the Council’s agenda and prevent the Council from taking up certain issues. The Council never discusses crises that a P5 member considers to be within its own exclusive sphere of interest. Chechnya, Tibet, Xinjiang, Northern Ireland, Sudan, Uganda and Colombia figure among the forgotten conflicts that the Council ignores. Even in earlier days, when the formal veto was used much more frequently, hidden vetoes kept key issues such as colonial wars and Cold War conflicts off the agenda. The Security Council never debated the Algerian war or the partitioning of India because of the hidden vetoes of France and the UK. Nor did the Council take up US involvement in Vietnam or the Soviet war in Afghanistan even though hostilities continued for almost a decade after Moscow vetoed a draft resolution in 1980.Read more . . .
Nearly 60 countries signed a treaty that bans governments from holding people in secret detention, but the United States and some of its key European allies were not among them.Read more . . .
So goes a popular theory/rumor that began going around the Arab and Muslim World soon after the attacks. Although many were understandably dubious of this charge, we lacked hard evidence to refute it until recently.Read more . . .
Delta P.D. Media Ltd. and Gal Media Trade Ltd. were two of hundreds of Israeli binary options companies that operated in Israel in recent years, before the entire binary options industry was outlawed by Israel’s Knesset in October 2017. The binary options industry, which was largely fraudulent, is estimated to have stolen billions of dollars a year from victims around the world and to have employed over 10,000 Israelis before it was banned.Read more . . .
The murder of the Jewish extremist Meir Kahane in New York in 1990 may have been a self-contained incident involving an Arab who hated Israel and was unrelated to any larger strategy. This is how it was presented by mainstream media at the time. Numerous facts tend to falsify this common perception. These facts suggest that the murder of Meir Kahane was part of a build-up of a new enemy perception, namely that of a worldwide Islamic terrorist conspiracy that endangers Western nations and world peace. Readers are invited to assess the facts and this tentative conclusion.Read more . . .
Facebook, Google, Twitter and other giant social media companies—working closely with intelligence agencies and governments—are seeking to leverage their role as mechanisms of communication to become instruments of censorship and repression. In the process, they are turning one of the most important and liberating technological advances of the 21st century, the growth and expansion of artificial intelligence, into a mechanism for police control and dictatorship.Read more . . .
A proposal in the Israeli parliament calls for a maximum five-year prison term for anyone photographing, recording or distributing Israel Defense Forces activity on social media with the aim of hurting the “soldiers’ spirit.” The maximum term increases to 10 years imprisonment for those convicted of seeking to harm national securityRead more . . .
As the future of warfare looks to become more monetized, privatized and commodified, ensuring that civilians’ rights are protected risks becoming nearly impossible if there remains a lack of enforceable regulations on private military firms.Read more . . .
As a reader, I am torn between the view that the author suffered from blind spots, nurtured by his relationship with the national security establishment, and between the view that his book is deliberately deceptive by leading readers to believe that current neuroscience research funded by the US military is essentially defensive and benign in character.Read more . . .
Ramadan Shallah : I will never, under any conditions, accept the existence of the state of Israel. I have no problem living with the Jewish people. We have lived together in peace for centuries. And if Netanyahu were to ask if we can live together in one state, I would say to him: “If we have exactly the same rights as Jews to come to all of Palestine. If Khaled Meshaal and Ramadan Shallah can come whenever they want, and visit Haifa, and buy a home in Herzliyah if they want, then we can have a new language, and dialogue is possible.”Read more . . .
The author’s main “evidence” for his assessment of Al Qaeda are alleged pronouncements by so-called Al Qaeda leaders. The author doesn’t bother to examine the authenticity, the credibility and the good faith of these pronouncements. He simply accepts them and US government allegations about Al Qaeda at face value.Read more . . .
SANA, Yemen — I LEARNED that my 16-year-old grandson, Abdulrahman — a United States citizen — had been killed by an American drone strike from news reports the morning after he died.
The missile killed him, his teenage cousin and at least five other civilians on Oct. 14, 2011, while the boys were eating dinner at an open-air restaurant in southern Yemen.Read more . . .
Resolution 2397 will condemn the people of North Korea to excruciating deaths. Ironically, December 22 is the United Nations “Holocaust Remembrance Day.” It is shameful that on December 22 the United Nations Security Council voted to inflict the Twenty –First Century’s Holocaust upon the people of North Korea. With the passage of Resolution 2397, the United Nations Security Council has become an instrument of barbarism and terror.Read more . . .
Information we collect: your name, email address, telephone number or credit card to store with your account, when you watch a video on YouTube, visit a website that uses our advertising services, or view and interact with our ads and content. This information includes your hardware model, operating system version, unique device identifiers, and mobile network information including phone number. We collect your search queries, phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls, Internet protocol address, device event information such as crashes, system activity, hardware settings, browser type, browser language, the date and time of your request and referral URL, cookies that may uniquely identify your browser or your Google Account, your location, including IP address, GPS, and other sensors that may, for example, provide Google with information on nearby devices, Wi-Fi access points and cell towers. We may also store information on your device using mechanisms such as browser web storage (including HTML 5) and application data caches.Read more . . .
The triumph of political untruth has brought into being a vast system of political intimidation. Remember then that the intimidator does not really care what you believe or not, but impresses you with the fact that you have no choice. That is the essence of the exercise of brute power. With false flag events the circumstantial evidence sometimes appears quite transparently false and, indeed could be interpreted as having been purposeful.Read more . . .