Fluoride and The Pineal Gland: Know the Truth

http://youtu.be/XSZQ3ixu7a4

The single animal study of pineal function indicates that fluoride exposure results in altered melatonin production and altered timing of sexual maturity. Whether fluoride affects pineal function in humans remains to be demonstrated. The two studies of menarcheal age in humans show the possibility of earlier menarche in some individuals exposed to fluoride, but no definitive statement can be made. Recent information on the role of the pineal organ in humans suggests that any agent that affects pineal function could affect human health in a variety of ways, including effects on sexual maturation, calcium metabolism, parathyroid function, postmenopausal osteoporosis, cancer, and psychiatric disease. SOURCE: National Research Council. (2006). Fluoride in Drinking Water: A Scientific Review of EPA’s Standards. National Academies Press, Washington D.C. p221-22. “In conclusion, the human pineal gland contains the highest concentration of fluoride in the body. Fluoride is associated with depressed pineal melatonin synthesis by prepubertal gerbils and an accelerated onset of sexual maturation in the female gerbil. The results strengthen the hypothesis that the pineal has a role in the timing of the onset of puberty. Whether or not fluoride interferes with pineal function in humans requires further investigation.” SOURCE: Luke J. (1997). The Effect of Fluoride on the Physiology of the Pineal Gland. Ph.D. Thesis. University of Surrey, Guildford. p. 177.

WHO ARE THEY REALLY GUARDING? ASSANGE OR DAVISON?

This article by Peter Eyre suggests that it is not only Julian Assange who is being heavily guarded after having sought refuge in the Ecuadorean Embassy but rather, and more importantly, a woman named Andrea Davison.

Eyre writes:

Dr David Kelly and Andrea Davison have several things in common both were experts on Biological Weapons and both were involved in the arms that went to Iraq and WMD’s and both were whistleblowers.

In his article, Eyre makes the case that others are also making that the Assange Wikileaks revealations are less than stellar and in fact, it has been said by several sources that Assange is likely a CIA/Australian secret service/Mossad asset and not the hero and defender of whistleblowers that he has been depicted as.

Apparently, Ms. Davison has evidence of arms sales and weapons of mass destruction that were moved by the Brits from South Africa to Oman and then stolen….  And much more that according to Eyre would implicate Brown, Blair and other British government members in a vast conspiracy.

According to this evidence Ms. Davison:

She knows as much as the late Dr. David Kelly and in actual fact puts herself on par with him…..she also did many runs to Iraq and herself worked for the DTI Select Committee as an “Arms to Iraq” investigator and may have also worked for MI5/6…….and yes she would be considered as a “thorn in the side” to current and past leaders and their respective governments!!

Dr. David Kelly is widely thought to have been suicided to keep hin silent and so if this is true, and Davison has similar evidence, it is vital that she be allowed to testify in open court or at the very least have that evidence reach the major media with whatever further information it can provide on just how far this rabbit hole goes.

Peter Eyre was a recent guest on my radio show… And I will endeavor to have him on once again to discuss this and other background to the axis of power with regard to the City of London who he refers to as the “Crown Templar”.

It is fact that all of the above were all involved in the New World Order financial rape of not only this country but many others compliments of the Crown Templar that is housed in the City of London – the “True axis of evil” with its tentacles radiating out from the Rothschild’s and the Committee of 300 across the waters to Europe and the good old US of A.

Many Camelot readers will be familiar with our whistelblower [see Anglo Saxon Mission article here] who talks in detail about being present during City of London meetings where fates of nations were discussed like dominoes on a board.  This is an area that needs further revealing and Eyre is clearly on that trail as an investigative journalist with inside information in that regard.

Thursday, 23 August 2012 02:04
Written by Kerry Cassidy
Irish Heroine of Batman Shooting Spree Drowns

It is widely known that victims and witnesses were giving conflicting reports when compared to the ‘official’ version of events. Did Jenny hear something she shouldn’t have? Did she know something they didn’t want to get out? This is far too suspicious…

-Max Maverick, DCMX Editor

US president Barack Obama and his wife Michelle paid tribute to Jenny and her colleagues who are credited with saving the lives of some of those injured in the massacre.

PHD student James Holmes has been charged in relation to the shootings which left 12 people dead.

However, her family has now been plunged into a sense of grief of their own. Jenny was out swimming in a lake close to her home when she is believed to have drowned.

Her husband Greg Pinson and five-year-old son Jack are struggling to come to terms with the loss of a “wonderful mother”.

Heartbroken

Her mother Brigid, who was unable to fly to Denver for the funeral, added: “I am heartbroken, it is just terrible, terrible. She was such a wonderful person who was just so full of life and a wonderful mother who loved Jack so much,” she said.

"I will miss her so much. Her brothers and sisters went over for the funeral and we had a little mass for her here. She could light up a room when she walked into it."

Jenny studied to be a nurse in Denver in the nineties and decided to settle there.

She was a GAA fanatic and founded the Denver Gaels ladies football club.

The club posted an emotional tribute on its website, describing Jenny as a “loving and devoted mother” and a “proud Meath woman”.

"Every team has its ups and downs, its wins and losses … the Pinson and Gallagher families, the Gaels and our Irish community suffered a great loss. Jennifer Gallagher passed on, leaving a wake of sorrow, sadness and loving memories.

"When you met Jenny she brightened up your day and wanted to know how you were doing. Others always came first in the most natural and sincere way.

"In her vocation as a nurse, she cared for those with most acute needs in the burn unit, the ER and most recently was recognized for her work with the Aurora shooting victims by President Obama. We were all very proud of her"

A special memorial mass is due to take place in Duleek on August 26.

hnews@herald.ie

Thousands of UK Workers ‘Blacklisted’ Over Political Views

Activists threaten legal action over failure to investigate

Corporations in the UK who used a secret “blacklisting” database to screen out ‘left wing trouble-makers’ and union sympathizers as potential job recruits are facing renewed scrutiny after the UK-activist group Liberty called for a fresh investigation Monday night.

A demonstration outside the Olympic site on March 1, 2011 was called in solidarity with the whistleblower who was fired for standing up for an illegally blacklisted workmate. The blacklist scandal first broke in 2008, when the UK media revealed that more than 40 leading employers had subscribed to the vetting service provided by The Consulting Association, which had surveillance files on more than 3,200 workers, including political activists, shop stewards and health and safety representatives.

Police seized the database three years ago and Ian Kerr, the founder of The Consulting Association, was fined only about $7,500. Invoices were discovered showing that 44 companies had paid to access the names on the list.

But full details of the material it contained only emerged as workers began to pursue legal action over their inclusion.

Liberty is now threatening to go to court to force the UK government to investigate the case, which it has compared in severity to the national press phone hacking scandal.

Corinna Ferguson, legal officer for Liberty, told the Independent: “We can’t believe the inaction of the Information Commissioner on a human-rights violation of such wide public interest.

"Contracting out the blacklisting of innocent workers, politicians and journalists is no better than farming out phone hacking to private detectives and the consequences for our democracy are just as grave. If we cannot persuade the Commissioner to discharge his public duty, we will consider seeking assistance from the courts."

Statements from some of the blacklisted workers from the Blacklist Support Group (BSG):

Mick Abbott, a 74-year-old ex-scaffolder, commented: “This nearly ruined my marriage and it meant that my children were on free meals at school. My file goes back to 1964 and the last entry says that I rekindled the campaign for justice for the Shrewsbury picketers in 2006. They have been watching me all these years and passing this information around, blighting my life over four decades.”

Steve Kelly, an electrician and spokesperson for the Blacklist Support Group said: “I was blacklisted because I was a union member and because I raised issues about safety. In 2007, [Sir Robert] McAlpine sacked me from the Colchester Barracks project after 2 days for refusing to work on a moving platform without proper training (exactly as we had been instructed in the site induction) – the dismissal is recorded on my blacklist file.

“Over the year I suffered severe financial strain, my wages were cut in half which caused immense stress paying bills and putting food on table. I was out of work for a year apart from few weeks here and there in 2001. Being sacked from Colchester Barracks after only two days piled up the stress and caused a nervous breakdown for me eventually.

“The blacklisting firms should be made to pay compensation for years lost and years in future. They should be made to employ blacklisted workers or not be awarded any public government backed contracts. An apology in national press and to individuals whose lives they ruined would be a start.”

SOURCE: CommonDreams.org

PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones

In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved.

The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor and record all communications incoming and outgoing, as well as manipulate the phone itself. Oceans’ Edge says that the tool is particularly useful because it allows law enforcement and corporations to work around mobile phone providers when they want to surveil someone’s phone and data activity. Instead of asking AT&T for a tap, in other words, the tool embeds itself inside your phone, turning your device against you.

A former employee of Oceans’ Edge notes on his LinkedIn page that the company’s clients included the FBI, Drug Enforcement Agency, and other law enforcement.

Oddly enough, Oceans’ Edge, Inc. describes itself as an information security company on its sparsely populated website. The “About Us” page reads:

Oceans Edge Inc. (OE) is an engineering company founded in 2006 by wireless experts to design, build, deploy, and integrate Wireless Cyber Solutions.
Our team is composed of subject matter experts in the following areas:
  • Wireless Cyber Security
  • Mobile Application Development
  • Wireless Communication Protocols
  • Wireless Network Implementation
  • Lawful Intercept Technology
With this expertise, we deliver engineering services and wireless technology solutions in critical mission areas for our government and commercial customers.
But while the company may offer “cyber security” solutions to government and corporations, as the website claims, the firm only has one approved patent on file with the US Patent and Trademark Office.
Remote mobile spying

The patent is for a "Mobile device monitoring and control system." The applicants summarize the technology thusly:

Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described.

In other words, the technology works to snoop on mobile phones by secretly installing itself on phone hardware. The targeted phone is thus compromised in two ways: first, the attacker can spy on all the contents of the phone; and second, the attacker can operate the phone from afar. That’s to say, it doesn’t just let the attacker read your text messages. It also potentially lets him write them.

The summary goes on:

One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device.

The technology therefore also enables automated data storage of all of a phone’s activity in the attacker’s database. So if someone used this technology to spy on your phone, they would be able to use the Oceans’ Edge product to automatically store everything you do on it, to go back to later.

In case you aren’t sure who would want this kind of spook technology or why, Oceans’ Edge explains in the patent application:

A user’s employment of a mobile device, and the data stored within a mobile device, is often of interest to individuals and entities that desire to monitor and/or record the activities of a user or a mobile device. Some examples of such individuals and entities include law enforcement, corporate compliance officers, and security-related organizations. As more and more users use wireless and mobile devices, the need to monitor the usage of these devices grows as well. Monitoring a mobile device includes the collection of performance metrics, recording of keystrokes, data, files, and communications (e.g. voice, SMS (Short Message Service), network), collectively called herein “monitoring results”, in which the mobile device participates.

The application goes on to explain that the tool is beneficial to law enforcement or other customers because it allows them to avoid dealing with pesky mobile phone providers when they want to covertly spy on people’s mobile communications. Instead of the FBI going to AT&T or T-Mobile to get access to your cell data, they can just surreptitiously install this bug on your phone. They’ll get all your data — and your phone company might never know.
Mobile device monitoring can be performed using “over the air” (OTA) at the service provider, either stand-alone or by using a software agent in conjunction with network hardware such a telephone switch. Alternatively, mobile devices can be monitored by using a stand-alone agent on the device that communicates with external servers and applications. In some cases, mobile device monitoring can be performed with the full knowledge and cooperation of one of a plurality of mobile device users, the mobile device owner, and the wireless service provider. In other cases, the mobile device user or service provider may not be aware of the monitoring. In these cases, a monitoring application or software agent that monitors a mobile device can be manually installed on a mobile device to collect information about the operation of the mobile device and make said information available for later use. In some cases, this information is stored on the mobile device until it is manually accessed and retrieved. In other cases, the monitoring application delivers the information to a server or network device. In these cases, the installation, information collection, and retrieval of collected information are not performed covertly (i.e. without the knowledge of the party or parties with respect to whom the monitoring, data collection, or control, or any combination thereof, is desired, such as, but not limited to, the device user, the device owner, or the service provider). The use of “signing certificates” to authenticate software prior to installation can make covert installation of monitoring applications problematic. When software is not signed by a trusted authority, the software may not be installed, or the device user may be prompted for permission to install the software. In either case, the monitoring application is not installed covertly as required. Additionally, inspection of the mobile device can detect such a monitoring application and the monitoring application may be disabled by the device user. Alternatively, OTA message traffic may be captured using network hardware such as the telephone switch provided by a service provider. This requires explicit cooperation by the service provider, and provides covert monitoring that is limited to message information passed over the air. As a result, service provider-based monitoring schemes require expensive monitoring equipment, cooperation from the service provider, and are limited as to the types of information they can monitor.
The applicants describe some of the challenges they had to overcome, which include:
Additional challenges are present when the monitoring results are transmitted from a mobile device. First, many mobile devices are not configured to transmit and receive large amounts of information. In some instances, this is because the mobile device user has not subscribed to an appropriate data service from an information provider. In other instances, the mobile device has limited capabilities.
In other words, make sure you get that unlimited data plan, or else it’ll be really hard for the FBI to spy on your mobile phone! It’ll take up so much of your data usage that you’ll notice and maybe even complain to your mobile provider! That would be awkward.
Second, transmitting information often provides indications of mobile device activity (e.g. in the form of activity lights, battery usage, performance degradation).
Bad battery performance that the geeks at the Apple genius bar can’t explain? Maybe your device has been compromised.
Third, transmitting information wirelessly requires operation in areas of intermittent signal, with automated restart and retransmission of monitoring results if and when a signal becomes available.
The monitoring program has got to be clever enough to stop and restart every time you go out of range of your cell network, or you turn the phone off.
Fourth, many mobile devices are “pay as you go” or have detailed billing enabled at the service provider. The transmission of monitoring results can quickly use all the credit available on a pre-paid wireless plan, or result in detailed service records describing the transmission on a wireless customer’s billing statement.
When the snoops steal your information, you might have to pay for the pleasure of being spied on. That’s because your mobile phone provider might read the spying activity as your activity. After all, it’s coming from your phone.
Lastly, stored monitoring results can take up significant storage on a mobile device and the stored materials and the use of this storage can be observed by the device user.
Is there a large chunk of space on your phone that seems full, but you can’t figure out why? Perhaps a snoop tool like that devised by Oceans’ Edge, Inc. is storing data on your phone that it plans to later capture.
Given all of those potential problems, the technologists had a lot of work cut out for them. Here’s how they addressed those problems:
From the foregoing, it will be appreciated that effective covert monitoring of a mobile device requires the combination of several technologies and techniques that hide, disguise, or otherwise mask at least one aspect of the monitoring processes: the covert identification of the mobile devices to be monitored, the covert installation and control of the monitoring applications, and the covert exfiltration of collected monitoring results. As used herein, “covert exfiltration” refers to a process of moving collected monitoring results from a mobile device while it is under the control of another without their knowledge or awareness. Thus covert exfiltration processes can be those using stealth, surprise, covert, or clandestine means to relay monitoring data. “Collected monitoring results” as used herein includes any or all materials returned from a monitored mobile device to other devices, using either mobile or fixed points-of-presence. Examples of collected monitoring results include one or more of the following: command results, call information and call details, including captured voice, images, message traffic (e.g. text messaging, SMS, email), and related items such as files, documents and materials stored on the monitored mobile device. These materials may include pictures, video clips, PIM information (e.g. calendar, task list, address and telephone book), other application information such as browsing history, and device status information (e.g. device presence, cell towers/wireless transmitters/points-of-presence used, SIM data, device settings, location, profiles, and other device information). Additionally, the capability to covertly utilize a mobile device as a covertly managed camera or microphone provides other unique challenges. 
Thus covert monitoring of a mobile device’s operation poses the significant technical challenges of hiding or masking the installation and operation of the monitoring application, its command and control sessions, hiding the collected monitoring results until they are exfiltrated, surreptitiously transmitting the results, and managing the billing for the related wireless services. The exemplary illustrative technology herein addresses these and other important needs.
In short, Oceans’ Edge Inc., a company founded and operating in the heart of CIA country, says it has a technology that can secretly install itself on mobile phones and push all the contents of the devices to an external database, doing so entirely under the radar of both the target and the target’s mobile provider. It even boasts that the tool allows for covertly managing phone cameras and microphones.
What kind of contracts does this company have, and with which government agencies? A cursory internet search didn’t turn up much, except for a couple of bids to work on a military information operations program and a cyber defense project. Neither one of those programs has an obvious link to the mobile snooping device described in the patent application.

Since we don’t know which agencies are using this technology or how, it’s hard to say to what extent this kind of secret monitoring is taking place in the US. We have some evidence suggesting that the FBI and DEA are using this tool (thanks, Chris Soghoian, for the tip). If those agencies really are using this technology, they should get warrants before they compromise anyone’s phone.

Is the government getting warrants to use this tool? We don’t know.

Oceans’ Edge Inc., like many purveyors of surveillance products, claims that its technology is only deployed for “lawful interception,” but it makes no claims about what that actually means. There’s no mention of judicial oversight, warrants, or any kind of due process. As I’ve written elsewhere on this blog, given the state of the law concerning surveillance in the digital age, we shouldn’t let our guard down simply because a company claims its surveillance tools are used lawfully. That’s because we do not know how these tools are being deployed, and yet we know that the state of surveillance law in the US at present grants the government wide latitude to infringe on our privacy in ways that are often improper or even unconstitutional.

In most cases (with a few notable exceptions), lawmakers haven’t worked to address this issue.

As we can see, surveillance technologies are developing rapidly. It’s past time for our laws to catch up.

Israel Embraces Medical Cannabis

While Americans petition state senators to legalize medical marijuana, and the Dutch simply go to an Amsterdam café to self-medicate, thousands of Israelis are enrolled in a regulated medical marijuana program. As talk-show veteran Montel Williams recently saw for himself, Israel is one of the most progressive countries in the world to “legalize it.”

Israel’s inroads into legalizing cannabis for pain relief and managing terminal illness rest on the seminal research of Prof. Raphael Mechoulam of the Hebrew University in Jerusalem’s Center for Research on Pain.

Back in 1964, working from bags of hashish seized by the local police, Mechoulam isolated the active compound from cannabis, THC. He came to be a trusted consultant on the topic to governments and individuals — even to a US senator who was worried about his child’s use of pot at jazz clubs — and urged that derivative compounds called cannabinoids be legalized for medical purposes in Israel.

Mechoulam’s work has inspired generations of research teams around the world to look to marijuana for alleviating medical conditions from chemo-induced nausea to chronic pain. His work led to the discovery of ananamides, naturally occurring THC-like materials in the brain.Mechoulam was recently awarded the Rothschild Prize in physical and chemical sciences in recognition of his contributions. With the help of his efforts, Israel started to develop policies so that medical marijuana can be accessed by those who need it most.

Reducing the reliance on opiates

Mechoulam’s lab was one of the stops on a recent tour of Israel’s medical marijuana researchers by US celeb Montel Williams, who told reporters that the United States could learn a few things from Israel’s approach.

Diagnosed with multiple sclerosis (MS) in 1999, Williams advocates for research and education on new directions in treatment, including medical marijuana, through his MS Foundation. Williams says that medical marijuana helps ease his neuropathic pain and he’s working to legalize it in the United States.Mechoulam acknowledges that Israel’s approach is probably the most advanced in the world, considering the numbers of patients taking medical marijuana in a supervised way.

“At present, about six or seven thousand people get it for various reasons, for [chronic] pain and for cancer, as it’s helping the symptoms of cancer by lowering the amount of opiates patients have to take,” Mechoulam tells ISRAEL21c. That number is expected to rise to about 40,000 by 2016.

“People who are in great pain who are taking opiates aren’t really functional anymore. Taking THC as a medical marijuana, or in its pure form, means that the opiates can be lowered, and then this person will have a better way of life,” he says.

Rigorous screening

The Health Ministry slowly began the program in 1994, but it really got going in 2002 under the direction of Dr. Yehuda Baruch from Abarbanel Hospital, a psychiatric facility in Bat Yam.

Patients of all ages may apply for approval through their own medical doctor or through the Sheba Medical Center, and must pass a rigorous screening process. Those eligible include cancer patients undergoing chemotherapy; cancer patients with final-stage tumors; patients enrolled in an Israeli HIV center; and people under treatment for chronic pain, Crohn’s or ulcerative colitis, MS and post-traumatic stress disorder.

When properly dispensed under medical supervision, medical cannabis has a very low rate of abuse, says Mechoulam.

Still working as a researcher, Mechoulam is asked periodically to test the levels of THC in pot grown by licensed Israelis. And while he’s happy with the country’s progress, he says more research needs to be done on standardizing the dosages and incorporating missing elements in the medical strain used in Israel.

“Basically Israel is moving in the right direction. [THC] has to be better quantified, and cannabidial, a potent anti-inflammatory agent, needs to be present in the doses used in Israel,” he says. Cannabidial alleviates possible undesirable side-effects of THC.

These room-to-grow tips not withstanding, “Israel is one of the leading cannibinoid centers of research in the world. There are about two dozen groups working on it and people come from all around the world to see what we do,” Mechoulam concludes.

By: Karin Kloosterman, March 29, 2012

SOURCE

Colbert’s The Word - Two Birds With One Drone

Two Birds, With One Drone

The Obama administration reasons that anyone in a strike zone is likely Al Qaeda, so no one has to feel guilty about civilian casualties.

The Colbert Report Mon - Thurs 11:30pm / 10:30c
The Word - Two Birds With One Drone
www.colbertnation.com
Colbert Report Full Episodes Political Humor & Satire Blog Video Archive
10 Foods with More Ammonia than Pink Slime

One of the most nausea-inducing qualities of “pink slime” (a.k.a. disinfected leftover beef trimmings, a.k.a. the contents of your fast food hamburger patty) is the fact that it’s doused with ammonia. But as it turns out, that’s not as uncommon as you might like to think.According to the University of Michigan Risk Science Center, a burger patty made with pink slime contains 0.02 grams of ammonia per 100 grams of meat — but bleu cheese contains almost seven times as much.

Here are 10 foods with more ammonia than your slimy, slimy burger:

  • Cheese. Oh my god, cheese is like an ammonia warehouse. Domestic bleu cheese topped the list with 0.138 grams of ammonia per 100 grams, but cheddar (0.11), beer cheese (0.092), American cheese (0.081), and a couple types I’ve never heard of all ranked.
  • Salami, 0.11 grams of ammonia per 100 grams.
  • Peanut butter, 0.049 grams per 100.
  • Mayonnaise, 0.041 grams per 100.
  • Ketchup, 0.035.
  • Gelatin, 0.034.
  • Onions, 0.027.
  • Potato chips, 0.024, though I imagine the brand and flavor would matter.
  • Brewer’s yeast, 0.022.
  • Margarine, 0.021

Now, to be fair this is based on a 1973 paper, so the ammonia content in some of these foods may have changed. But on the other hand, in 1973 the ammonia content in a burger patty was half what it is today. So those changes might not have been for the better.

It’s not totally clear whether you should be less freaked out by pink slime, or a hell of a lot more freaked out by everything else. But one thing is for certain: You may want to think twice about whether you’re going to eat that burger with mayo, onion, ketchup, and American cheese — or whether you’re just going to use it to clean your windows.

SOURCE:

Conspiracy Theorists Deserve An Apology
The world must apologize to 9/11 truth-tellers.

The reason why there is so much hate and scorn for 9/11 truth activists is because they are right and consistent. The destruction of the 9/11 myth and war on terror ideology is unbearable for the children who are emotionally, spiritually, and psychologically attached to the U.S. government and the Israeli government. They are under the delusion that these evil governments actually care about them, their security, and their future.

The mature men and women of America and the West are waking up and confronting the lies of 9/11 and 7/7. And this political awakening is not unique to America and Western civilization. There is a global political and spiritual awakening happening. All totalitarian regimes in the world will fail in hijacking history and they will fall into ruin. The state terrorists in Washington, London, and Tel Aviv have already lost the battle for history and the souls of mankind.

Alternative accounts of history and reality under totalitarian regimes have always been denounced by regime political mouthpieces as crazy and conspiratorial. And they always failed because truth and history were not on their side. The crazy and the conspiratorial were proven right in the end. This is what history shows, and especially the history of the demonic 20th century. So we should have hope and continue to speak the truth about 9/11 to wake up as many people as possible before the U.S. and Israeli governments blow up the whole world.

II. Unthinking and Regressive: Think Progress Attacks 9/11 Truth, Drudge Report, And Infowars

The political mouthpiece of the Obama administration called ‘Think Progress’ tried to shame and belittle Drudge Report for highlighting Infowars stories. Paul Joseph Watson writes in his article, "Obama Front Group Attacks Drudge For Linking To Infowars":

"Think Progress is a little more than a PR firm for the Obama administration. No wonder they are so terrified that thanks to traffic from Drudge, the likes of Infowars and World Net Daily have grown to become two of the most visible anti-Obama news outlets on the web.

Think Progress claims it is upset that Drudge is promoting what they call “conspiracy theories,” but in reality the root of the anger is that Drudge is providing a platform for some of the Obama administration’s most ardent critics.”

Think Progress is not worth talking about. It is an irrelevant thought-control political operation. Their reporters defend myths and fallacies while putting down truth-tellers as conspiracy theorists. What they are doing is not only unjust but just plain stupid. They are embarrassing themselves. It is actually very sad.

Truth is more powerful than totalitarian propaganda. The mainstreaming of the 9/11 truth movement is unstoppable. 9/11 truth deniers should rejoin reality and admit that it is wrong to defend the official conspiracy theory that was spread by the Bush administration and Israeli government quickly after the traumatic events.

III. The Religious Nature of The 9/11 Deception and Propaganda

Author and Christian theologian David Ray Griffin explained why the belief in the official conspiracy theory of 9/11 is religious in nature in his lecture in October 2007 called, "9-11 and Nationalistic Faith." Griffin was recently interviewed by Jan Frel of AlterNet in an article called, "David Ray Griffin: How a Retired Theologian Became a High-Priest of the 9/11 Truth Movement."Describing Dr. Griffin as a “High-Priest,” suggesting that the 9/11 truth movement is somehow a new age mystery cult, is really aiming low.

9/11 truth has nothing to do with religion or priests. Scientific facts are the basis of the movement. Architects, engineers, chemists, scientists, and university professors are the leading spokespeople. Religious figures like Dr. Griffin have contributed great wisdom and understanding but to imply that the 9/11 truth movement is led by “priests” is a lie.

Priests are nowhere to be found in the 9/11 truth movement and that’s okay because they are not needed. They are too busy defending evil empires on the pulpit and sacrificing moral principles for temporary power. Their days as the rulers of the spiritual life of Western civilization have come and gone.

Dr. Griffin is a noble exception, but, in general, Christianity has proven to be useless, corrupt, stupid, blind, and power-driven. The same is true for every other moronic religion that makes individuals submit their heart and soul to a corrupt clergy. The majority of Christians are too obsessed about the second coming and the holiness of Israel to really understand that 9/11 was an inside job committed by the occult elite in America and Israel. They don’t want to admit that the criminal wars in the Middle East have nothing to do with defending the security of USrael.

What do priests and religious idiots offer humanity and the world? Nothing. They are absent in the battle for souls and the battle for freedom because they are corrupt, blind, and stupid. Expecting Christians to fight the totalitarian state and liberate America is laughable. I’m generalizing here, but Christians, Muslims, and religious Jews are the most tyrannical, greedy, hypocritical, hateful, soulless, and ungrateful people in the world. They want to have a monopoly on the human soul and human mind. What maniacs! And the totalitarian priests who head the CIA and Mossad are just as crazy and demented because they also want to monopolize the thoughts of citizens and control the growth of society.

The role of blind religious faith in preventing people from seeing the truth about 9/11 is big. American Christians, who have bought USrael’s propaganda and blindly accept the official 9/11 story, feel no shame in calling for the destruction of Iran and the Muslim world. They make me sick. They don’t realize that they’re bringing destruction upon themselves by calling for the destruction of other nations and civilizations. As they say, what goes around comes around. If warmongering American Christians want death and destruction so much then they will get it in plenty, except the fires of hell won’t burn in the Middle East alone, but in America as well.

IV. Conspiracy Theorists And 9/11 Truthers Deserve An Apology

Who is trying to stop World War III and wake the West up from its sleep? Progressives? No. Liberals? No. Conservatives? No. Christians? No. Journalists? No. They all believe in the official 9/11 deception, which is the ideological foundation that justifies USrael’s aggressive wars in the Middle East.

9/11 truth-tellers, the “conspiracy theorists,” have tried to wake up humanity in order to stop the USraeli government from starting the catastrophe of world war three. And for their efforts they have been slandered and smeared in the press. But the 9/11 truth movement still continues to grow by the day.

There is a simple reason why the rise of 9/11 truth cannot be contained by the USraeli government, and it is this: the age of slandering and smearing is over. Belittling people by calling them mentally ill conspiracy theorists and truthers is not working anymore. We embrace these terms. We are proud of being called conspiracy theorists because it means we’re thinking.

Slandering and smearing Infowars and other alternative news websites is futile. It is a waste of time. Censorship, disinformation, and propaganda are failing. The global free market and global civil society have spoken. People want the news, not smears; truth, not lies; facts, not totalitarian propaganda; freedom, not tyranny; peace, not war.

The Excavator
Related:
We Are All Conspiracy Theorists Now: The Mainstreaming of 9/11 Truth
The Evaporation of Darkness: Mass Deprogramming And The End of The 9/11 Consensus
A Radical Rethinking of Conspiracy Theories Is Underway Globally

Identify Traits of an Old Soul

Are You an Old Soul?

How can you tell if you are an old soul?  Are there differences in traits or behaviors? What signs can I look for that can help me differentiate the difference?

Generally speaking, we are all old souls, but some of us have been here longer than others.

The word “old” is only relative to time.  Because time is linear and our souls are eternal, 10,000 years would be the blink of an eye.

Dolores Cannon believes that we need to incarnate many, many times as inanimate objects, plants and animals before we can become human.  Then, as humans, we still need to incarnate many, many times to learn all of the lessons we came here for.  For example, according to Cannon, we all had to be an air molecule and a drop of water to learn what it’s like to work together as ONE.

So, how can you tell if you have an old soul?

You understand many of life’s deeper lessons.

For some people, it is hard to fathom that the soul of a child may be much older than the soul of his or her parents. For these particular people, this is a sign that their soul might be younger than yours.  When you begin to understand why you keep incarnating to this 3rd dimensional reality, it becomes similar to the movie, Groundhog Day, where Phil wakes up each day to find out that it’s still February 2nd until he learns how to remove his ego and starts doing kind deeds for others.

Once you realize that time, space, energy and matter are 3rd dimensional products, the theory of time becomes irrelevant, thus the theory of how old your soul is also becomes irrelevant.

But for the sake of understanding how old your soul may be, we’ll continue!

You are in touch with your natural abilities or have an extreme interest in these abilities.

Some people are born with innate gifts, such as special healing abilities or psychic abilities.  The truth is that we all possess these abilities, but an older soul is more in tune with how to access and implement these abilities in the name of humanity. If you don’t have any particular ability, but have a strong interest in them, this is simply your soul trying to recall these abilities that you may have had in a previous lifetime.

You become spiritually aware.

Everyone is pure consciousness, but many people have a difficult time understand what this means.  Your soul is pure consciousness and love.  It has a unique understanding of how the matrix is being played on this planet and understands that everything we do as a collective will help to facilitate the awakening of others.

You understand the importance forgiveness.

Some people are old souls who still have much to learn because they are trapped inside the box with their ideologies, are stubborn or have not learned the importance of forgiveness. By forgiving yourself and others, we can release any karma between these people.

You’re able to transcend ego.

It’s nearly impossible for anyone to completely transcend ego 100% of the time but simply being aware of our ego and how it plays against unity consciousness is a definite sign on an old soul. On the other side, there is no ego.  During your life review, you will re-live your ego and will see how it affected others, as well as yourself.  At this point in “time”, you will probably make a soul contract with the hopes of overcoming ego and atoning for whatever ego issues you had in your previous incarnation.

You’re able to transcend materialism.

Money and materialism are products of this 3rd dimensional reality and it’s easy to succumb to materialism, especially when it’s in your face through advertising, programming and peer pressure. An older soul realizes that money is non-existent on the other side and it generally takes away from who we truly are as spiritual beings. Those who are older souls will generally use money as a tool to either help facilitate their spiritual progression through spiritual retreats or by possibly creating a lavish feng shui home decorated with spiritual meaning versus the most luxurious furnishings. They may also use their money to help others who are less fortunate.

You are able to understand the concept that your body is a shell for your soul.

Before you were born, you not only chose your parents, you also chose your life situations and challenges that would help to facilitate your spiritual growth while atoning for any previous karma. The body that you are currently in is simply a vessel for your soul.  Your name is what your soul currently refers itself as, but in previous lifetimes, you had many different names and you have lived many previous lives as either a male or a female.  Your name and title are both associated with ego because ultimately, you are infinite consciousness and we are all on the same team.

You seem to have a special connection to eras long before you were born.

Did you ever watch an old movie or see some artwork from a specific era in time and have a connection to that era?  Chances are, you lived a previous life during that time period and this is your cellular memory letting you know!

You have an understanding of what you need to do to complete your spiritual progression.

Just by making it this far, you are more awakened than most people on this planet.  You have an understanding of Universal laws and what is left to do on your soul contract.  Even if you are not specifically sure of either, your higher self and spirit guides will continue lead you in the right direction.

You have a strong feeling that home isn’t Earth.

Did you ever look at a random area of the sky and star at an unknown star for no particular reason?  Do you have a special connection with specific star systems such as the Pleiades or Orion’s Belt?   Do wars and corruption make you feel uneasy, as if they didn’t exist where you originally came from?  Are you one of the souls who volunteered to come here at this specific point in time to help with the Earth’s ascension?  If you answered yes to any of these questions, then chances are, Earth is not your home planet.

You tend to be a loner.

The stigma on the word loner is often condescending, but those who are old souls are merely looking for other fragments of themselves and will often distance themselves from younger souls who need more incarnations into a 3rd dimensional planet. Older souls will seek out other like-mided people because there’s a comfort and familiarity with these types of people who will help to facilitate each others spiritual progression.

You have a rebellious nature.

Whether you rebel from religion, laws or anything else, this is a sign that your soul knows the only true laws… the Laws of the Universe.  While you respect the reasoning and intention behind laws and religion, you might not be compelled to use these as absolute laws when you know there are a set of higher laws that are intended to facilitate our spiritual progressions.

You have a burning desire to attain truth and inner wisdom.

Many older souls can easily see through the lies we’ve been taught through religion, politics and through our educational facilities.  While they realize they are all one with the universe, they also want the truth exposed to help other people’s awakening process. They also continue to seek knowledge in the spiritual, metaphysical and esoteric fields and will absorb this information much easier than anything they were taught in school.

You are not controlling of others.

Older souls are more accepting, not just of other people, but of circumstances as well.  For example, while you don’t approve of the corruption within politics, you understand how the corruption will help to awaken other people to the truth. You respect the free will of others and are more likely to use tact than verbal demands of others. You tend to be more of a team player than anything else.

You sense a separation between yourself and the “real world”.

As you transcend ego and materialism, you find yourself living a different lifestyle. While this lifestyle is unique to your current incarnation, there also seems to be a familiarity of the direction you’re heading.

You are curious whether you’re an old soul or not.

Many young souls wouldn’t ask this question or much less be concerned about it.  While many older souls aren’t concerned either, for different reasons, they simply “know” they’re old souls, but it’s nice to have affirmations that coincide with your spiritual progression.

There are many lessons we have learned throughout our lifetimes, all of which has culminated into this particular incarnation.  All of your previous life incarnations are embedded into your cellular memory and can be recalled through past life regressions.  Most of the people on this planet are old souls, yet many remain unawakened and still have a lot more to learn and will need several more incarnations to a 3rd dimensional planet.

Many of those who are awakened will probably move on to their next level of spiritual progression.  It’s important to remember that this is not a race because in the end, we all win.  Enjoy every millisecond in this incarnation because this may be the last time you’ll ever experience a 3rd dimensional reality!

By Gregg Prescott - in5d.com