Central Banks Intentionally Impoverish Their Host Countries to Effect Structural Reforms … Which Allow Foreign Interests to Loot
In his role as a government advisor, visiting scholar, and head economist for a Japanese investment house, economics professor Richard Werner had unprecedented access to the Bank of Japan. He also spoke with insiders at other Asian central banks.
Werner found that the Bank of Japan – and other central banks – intentionally impoverished their host countries so as to justify major structural reforms which allow looting by the powers-that-be. In essence, these central banks carried out false flag attacks on their own economies in order to justify the implementation of draconian policies.
This article was written by James Wesley Rawles and originally published at his Survival Blog website.
Editor’s Comment: There is little doubt that activists, preppers and freedom loving patriots across the Internet and reading this and other alternative sites have managed to get themselves on one or more government “lists.” Despite official denials, there are many specific reasons to think that the government is compiling numerous watch lists that could be activated as “round up” lists for dissidents in the aftermath of a major emergency. FEMA and Homeland Security keep Continuity of Government (COG) as a top priority and will target anyone who could undermine that objective.
With that said, what is the most effective way to avoid being rounded up in the event of a crisis where martial law could be declared? How can you keep yourself off the radar and out of trouble before that time comes – the biggest tip is regard online comments and posts to social media outlets like Facebook with serious caution. Shadowy intelligence agencies and police departments alike now troll social media build profiles of people they distrust and wish to watch more closely. After that, keep off their radar and off the beaten path before they come for you.
Red List, Blue List, Black List, You List
by James Wesley Rawles
There has been a lot of conjecture in the past 40 years in patriot circles about the existence of government “round up lists”. Large-scale disaster and war planning exercises, like REX-84 (Readiness Exercise-1984) and Jade Helm 2015, have stimulated endless discourse about whether or not the government maintains a so-called “red list” and “blue list” of people that they deem to be dissidents who they might target for harassment, travel restrictions, or even detention without due process of law. Because any such lists would presumably be developed and updated under the wraps of a security classification and the Need To Know rule, this topic is understandably rife with conjecture, speculation, and even downright fabrication. So, in this essay, I will do my best to restrain my inner John Bircher and just stick to the facts. I’ll simply state the facts and add a bit of well-reasoned extrapolation, based on known technological trends.
The Real Face of FEMA
The centerpiece of all the speculation is the Federal Emergency Management Agency (FEMA). In my estimation, most of the chit chat on the Internet about “secret FEMA camps” is highly sensationalized. Civil internment is probably the lowest priority of any of FEMA’s contingency missions, and some would describe it as an almost hypotheticalcontingency.
Most Americans don’t realize it, but FEMA’s key mission is not disaster relief to the general public. Instead, their highest priority mission is assuring Continuity of Government (COG) following an external attack or following a widespread disaster that disrupts command, control, communications, and intelligence (C3I) assets and processes. If FEMA’s budget were ever drastically slashed, then the very last of their missions to be de-funded would be COG. In FEMA-speak, the COG part of their mission is listed under “National Continuity Programs”. They prefer to use the term Continuity of Operations (COOP), and that same term is used by the Department of Homeland Security (DHS). These taskings fall under the purview of FEMA’s National Continuity Programs Directorate and are organized per the National Continuity Policy Implementation Plan (NCPIP).
According to an article written for Salon magazine by Tim Shorrock in 2008, the NSA was the lead agency in developing a comprehensive personalities database called Main Core. This is the code name of a database containing personal and financial data of millions of U.S. citizens who are believed to be “threats to national security”.
If anyone reading this is politically active and is an outspoken champion of personal liberty, then it is probably safe to assume that you are already on some sort of list, at least a “watch list”. You might also be on a cyber black list, targeting you for disinformation/discrediting campaigns or perhaps for DDOS ping attack hacking… The key question is: what is your priority on those lists?
[CONTINUED AT Survival Blog.com]
More than five decades after the assassination of President John F. Kennedy, thousands of government files detailing the activities and testimony of shadowy spies, long-deceased witnesses and others with possible knowledge of the events remain shielded from public view.
The government gave a first-ever peek at what’s still out there Thursday, as the National Archives released a list of the 3,063 documents that have been “fully withheld” since JFK’s murder in Dallas on Nov. 22, 1963.
The documents listed — released in response to a Freedom of Information Act request from POLITICO, other news organizations and researchers — were collected by the Assassination Records Review Board, an independent panel created by the 1992 JFK Records Act.
That same act requires that all the documents on the list be released by October 2017 unless the next president decides to keep them classified.
Based on what has been revealed previously, many of the files are expected to have no direct bearing on Kennedy’s death in Dealey Plaza but could reveal intelligence operations involving Cuba, secret relationships between U.S. spy agencies and unsavory characters during the height of the Cold War, as well as other secrets the U.S. government might have resisted disclosing publicly as part of a full and open investigation at the time.
Cold War scholars have long suspected that many of the still-withheld files will not necessarily shed new light on whether Oswald acted alone. They could, however, help explain why some top officials at the time might have sought to prevent a thorough investigation, out of concern it would require airing the dirty laundry of covert activities.
Hackers, making good on a threat, published contact information for 20,000 FBI employees Monday afternoon, just one day after posting similar data on almost 10,000 Department of Homeland Security employees.
The hackers, tweeting from the account @DotGovs, claim they obtained the details by hacking into a Department of Justice database.
The hackers boasted on Twitter, “FBI and DHS info is dropped and that’s all we came to do, so now its time to go, bye folks! #FreePalestine.”
VOLUME 2 of 2 / 300 PAGES / 700 ILLUSTRATIONS . From the days of the American Revolution, to the Jacobin French Revolution, to the coalition wars against Napoleon, to Andrew Jackson’s war on the Central Bank, to Karl Marx’s war on sanity, to the U.S. Civil War, to the Reds’ shocking wave of 19th century assassinations, to the conspiratorial founding of the Federal Reserve, to the horrific First World War to enslave Germany, to the Rothschild-Communist subversion of Russia’s Czar, to the horrible World War against Hitler and Japan, to the Cold War, to the JFK assassination, to the “women’s movement” to the Global Warming Hoax, to the “fall of communism”, to the 9/11 attacks & the “War On Terror”, and finally, to the looming confrontation with Russia and China – the common thread of the New World Order crime gang links all of these events together. At the heart of this self-perpetuating network sits the legendary House of Rothschild – the true owners of ‘Planet Rothschild’. Though an alliance with other billionaire families, universities, corporations, think tanks and media moguls worldwide; the cabal has, for 250 years, manipulated world events and political players like so many pawns on a global chessboard. Now, you can earn your ‘Phd’ in NWO studies by reading the epic two-volume timeline thriller – PLANET ROTHSCHILD. It is a unique “blurb by blurb” chronological and photographical review that will enrich your depth of historical knowledge like no other work of its kind. **************************** “Absolutely mind bending research… I was hooked immediately! I had studied the NWO for years but had no idea of so many of the critical events revealed in PLANET ROTHSCHILD.” – Carl Norris, Davenport, Iowa
List price: $19.99
Contracts between police and city authorities, leaked after hackers breached the website of the country’s biggest law enforcement union, contain guarantees that disciplinary records and complaints made against officers are kept secret or even destroyed.
A Guardian analysis of dozens of contracts obtained from the servers of the Fraternal Order of Police (FOP) found that more than a third featured clauses allowing – and often mandating – the destruction of records of civilian complaints, departmental investigations, or disciplinary actions after a negotiated period of time.
The review also found that 30% of the 67 leaked police contracts, which were struck between cities and police unions, included provisions barring public access to records of past civilian complaints, departmental investigations, and disciplinary actions.
The leaked contracts became publicly accessible last week, when hackers breached the Fraternal Order of Police’s website and put around 2.5GB worth of its files online. These provide a glimpse into the influence of police unions, which Black Lives Matter activists have accused of impeding misconduct investigations, particularly after the death of 25-year-old Freddie Gray in Baltimore, Maryland in April.
Today the State Department confirmed that the FBI is investigating former Secretary of State Hillary Clinton’s use of a private email server.
The FBI chief Attorney James Baker sent a letter to the State Department on February 2, 2016 correcting the record presented in a 2015 letter. The letter was released today due to a ongoing investigation from conservative watch dog Judicial Watch.
“Since that time, in public statements and testimony, the bureau has acknowledged generally that it is working on matters related to former Secretary Clinton’s use of a private e-mail server,” James A. Baker, the FBI attorney, said in the letter.
James Baker did not elaborate on specifics of the case due to the ongoing investigation.