“Torture has ceased to exist,” Victor Hugo claimed, with some justification, in 1874. Yet more than a century later, torture is used routinely in one out of every three countries. This book is about torture in Western society from earliest times to the present.
A landmark study since its original publication a decade ago, Torture is now available in an expanded and updated paperback edition. Included for the first time is a broad and disturbing selection of documents charting the historical practice of torture from the ancient Romans to the Khmer Rouge.
List price: $24.95
Central Banks Intentionally Impoverish Their Host Countries to Effect Structural Reforms … Which Allow Foreign Interests to Loot
In his role as a government advisor, visiting scholar, and head economist for a Japanese investment house, economics professor Richard Werner had unprecedented access to the Bank of Japan. He also spoke with insiders at other Asian central banks.
Werner found that the Bank of Japan – and other central banks – intentionally impoverished their host countries so as to justify major structural reforms which allow looting by the powers-that-be. In essence, these central banks carried out false flag attacks on their own economies in order to justify the implementation of draconian policies.
This article was written by James Wesley Rawles and originally published at his Survival Blog website.
Editor’s Comment: There is little doubt that activists, preppers and freedom loving patriots across the Internet and reading this and other alternative sites have managed to get themselves on one or more government “lists.” Despite official denials, there are many specific reasons to think that the government is compiling numerous watch lists that could be activated as “round up” lists for dissidents in the aftermath of a major emergency. FEMA and Homeland Security keep Continuity of Government (COG) as a top priority and will target anyone who could undermine that objective.
With that said, what is the most effective way to avoid being rounded up in the event of a crisis where martial law could be declared? How can you keep yourself off the radar and out of trouble before that time comes – the biggest tip is regard online comments and posts to social media outlets like Facebook with serious caution. Shadowy intelligence agencies and police departments alike now troll social media build profiles of people they distrust and wish to watch more closely. After that, keep off their radar and off the beaten path before they come for you.
Red List, Blue List, Black List, You List
by James Wesley Rawles
There has been a lot of conjecture in the past 40 years in patriot circles about the existence of government “round up lists”. Large-scale disaster and war planning exercises, like REX-84 (Readiness Exercise-1984) and Jade Helm 2015, have stimulated endless discourse about whether or not the government maintains a so-called “red list” and “blue list” of people that they deem to be dissidents who they might target for harassment, travel restrictions, or even detention without due process of law. Because any such lists would presumably be developed and updated under the wraps of a security classification and the Need To Know rule, this topic is understandably rife with conjecture, speculation, and even downright fabrication. So, in this essay, I will do my best to restrain my inner John Bircher and just stick to the facts. I’ll simply state the facts and add a bit of well-reasoned extrapolation, based on known technological trends.
The Real Face of FEMA
The centerpiece of all the speculation is the Federal Emergency Management Agency (FEMA). In my estimation, most of the chit chat on the Internet about “secret FEMA camps” is highly sensationalized. Civil internment is probably the lowest priority of any of FEMA’s contingency missions, and some would describe it as an almost hypotheticalcontingency.
Most Americans don’t realize it, but FEMA’s key mission is not disaster relief to the general public. Instead, their highest priority mission is assuring Continuity of Government (COG) following an external attack or following a widespread disaster that disrupts command, control, communications, and intelligence (C3I) assets and processes. If FEMA’s budget were ever drastically slashed, then the very last of their missions to be de-funded would be COG. In FEMA-speak, the COG part of their mission is listed under “National Continuity Programs”. They prefer to use the term Continuity of Operations (COOP), and that same term is used by the Department of Homeland Security (DHS). These taskings fall under the purview of FEMA’s National Continuity Programs Directorate and are organized per the National Continuity Policy Implementation Plan (NCPIP).
According to an article written for Salon magazine by Tim Shorrock in 2008, the NSA was the lead agency in developing a comprehensive personalities database called Main Core. This is the code name of a database containing personal and financial data of millions of U.S. citizens who are believed to be “threats to national security”.
If anyone reading this is politically active and is an outspoken champion of personal liberty, then it is probably safe to assume that you are already on some sort of list, at least a “watch list”. You might also be on a cyber black list, targeting you for disinformation/discrediting campaigns or perhaps for DDOS ping attack hacking… The key question is: what is your priority on those lists?
[CONTINUED AT Survival Blog.com]
More than five decades after the assassination of President John F. Kennedy, thousands of government files detailing the activities and testimony of shadowy spies, long-deceased witnesses and others with possible knowledge of the events remain shielded from public view.
The government gave a first-ever peek at what’s still out there Thursday, as the National Archives released a list of the 3,063 documents that have been “fully withheld” since JFK’s murder in Dallas on Nov. 22, 1963.
The documents listed — released in response to a Freedom of Information Act request from POLITICO, other news organizations and researchers — were collected by the Assassination Records Review Board, an independent panel created by the 1992 JFK Records Act.
That same act requires that all the documents on the list be released by October 2017 unless the next president decides to keep them classified.
Based on what has been revealed previously, many of the files are expected to have no direct bearing on Kennedy’s death in Dealey Plaza but could reveal intelligence operations involving Cuba, secret relationships between U.S. spy agencies and unsavory characters during the height of the Cold War, as well as other secrets the U.S. government might have resisted disclosing publicly as part of a full and open investigation at the time.
Cold War scholars have long suspected that many of the still-withheld files will not necessarily shed new light on whether Oswald acted alone. They could, however, help explain why some top officials at the time might have sought to prevent a thorough investigation, out of concern it would require airing the dirty laundry of covert activities.
Hackers, making good on a threat, published contact information for 20,000 FBI employees Monday afternoon, just one day after posting similar data on almost 10,000 Department of Homeland Security employees.
The hackers, tweeting from the account @DotGovs, claim they obtained the details by hacking into a Department of Justice database.
The hackers boasted on Twitter, “FBI and DHS info is dropped and that’s all we came to do, so now its time to go, bye folks! #FreePalestine.”