Jump to content
The Education Forum

Steven Gaal

Members
  • Posts

    4,661
  • Joined

  • Last visited

Posts posted by Steven Gaal

  1. 911research

    NORAD Stand-Down

    The Prevention of Interceptions of the Commandeered Planes

    It is standard operating procedure (SOP) to scramble jet fighters whenever a jetliner goes off course or radio contact with it is lost. Between September 2000 and June 2001, interceptors were scrambled 67 times. 1 In the year 2000 jets were scrambled 129 times. 2

    There are several elements involved in domestic air defense. The air traffic control system continuously monitors air traffic and notifies NORAD of any deviations of any aircraft from their flight-paths or loss of radio contact. NORAD monitors air and space traffic continuously and is prepared to react immediately to threats and emergencies. It has the authority to order units from the Air National Guard, the Air Force, or other armed services to scramble fighters in pursuit of jetliners in trouble.

    Routine interception procedures were not followed on September 11th, 2001.

    Layered Failures

    The air defense network had, on September 11th, predictable and effective procedures for dealing with just such an attack. Yet it failed to respond in a timely manner until after the attack was over, more than an hour and a half after it had started. The official timeline describes a series of events and mode of response in which the delays are spread out into a number of areas. There are failures upon failures, in what might be described as a strategy of layered failures, or failure in depth. The failures can be divided into four types.

    • Failures to report: Based on the official timeline, the FAA response times for reporting the deviating aircraft were many times longer than the prescribed times.
      • Failures to scramble: NORAD, once notified of the off-course aircraft, failed to scramble jets from the nearest bases.
        • Failures to intercept: Once airborne, interceptors failed to reach their targets because they flew at small fractions of their top speeds and/or in the wrong directions.
          • Failures to redeploy: Fighters that were airborne and within interception range of the deviating aircraft were not redeployed to pursue them.

          Had not there been multiple failures of each type, one or more parts of the attack could have been thwarted. NORAD had time to protect the World Trade Center even given the unbelievably late time, 8:40, when it claims to have first been notified. It had time to protect the South Tower and Washington even given its bizarre choice of bases from which to scramble planes. And it still had ample opportunity to protect both New York City and Washington even if it insisted that all interceptors fly subsonic, simply by redeploying airborne fighters.

          Failures to Report

          Comparing NORAD's timeline to reports from air traffic control reveals inexplicable delays in the times the FAA took to report deviating aircraft. The delays include an 18-minute delay in reporting Flight 11 and a 39-minute delay in reporting Flight 77. The delays are made all the more suspicious given that, in each case, the plane failed to respond to communications, was off-course, and had stopped emitting its IFF signal.

          Failures to Scramble

          No plausible explanation has been provided for failing to scramble interceptors in a timely fashion from bases within easy range to protect the September 11th targets. Fighters that were dispatched were scrambled from distant bases. Early in the attack, when Flight 11 had turned directly south toward New York City, it was obvious that New York City and the World Trade Center, and Washington D.C. would be likely targets. Yet fighters were not scrambled from the bases near the targets. They were only scrambled from distant bases. Moreover there were no redundant or backup scrambles.

          New York City

          Flight 11 had been flying south toward New York City from about 8:30 AM. Yet no interceptors were scrambled from nearby Atlantic City, or La Guardia, or from Langley, Virginia. Numerous other bases were not ordered to scramble fighters.

          Washington D.C.

          No interceptors were scrambled from Andrews Air Force Base to protect the capital, at least not before the Pentagon was hit. Andrews Air Force Base had two squadrons of fighters on alert, and is only about 10 miles from the Pentagon.

          Failures to Intercept

          Even though the interceptors were not dispatched from the most logical bases, the ones that were scrambled still had adequate time to reach their assigned planes. Why didn't they? Because they were only flying at a small fraction of their top speed. That is the conclusion implicit in NORAD's timeline. North Tower, and just 9 minutes before Flight 175 hit the South Tower.

          According to NORAD, at the time of the South Tower Impact the two F-15s from Otis were still 71 miles away. Otis is 153 miles east-northeast of the WTC. That means the F-15s were flying at: (153 miles - 71 miles)/(9:03 - 8:52) = 447 mph That is around 23.8% of their top speed of 1875 mph.

          At 9:11 the F-15s finally reached the World Trade Center. Their average speed for the trip was: 153/(9:11 - 8:52) = 483 mph That is around 25.8% of their top speed.

          Langley to the Pentagon

          The F-16s from Langley reached the Pentagon at 9:49. It took them 19 minutes to reach Washington D.C. from Langley AFB, which is about 130 miles to the south. That means the F-16s were flying at: 130 miles/(9:49 - 9:30) = 410.5 mph That is around 27.4% of their top speed of 1500 mph. [/url]

          Failures to Redeploy

          Fighters that were in the air when the attack started were not redeployed to intercept the deviating planes. When fighters scrambled to protect Manhattan arrived there too late, they were not redeployed to protect the capital even though they had plenty of time to reach it before the Pentagon was hit. 3 [/url]<a name="langley" shape="rect">

          WTC to the Pentagon

          By the time the two F-15s from Otis reached Manhattan, the only jetliner still flying with its IFF transponder off had just made a 180-degree turn over southern Ohio and had been headed for Washington D.C. for 12 minutes. It was still 34 minutes before the Pentagon was hit. Had the fighters been sent to protect the capital, they could have traveled the approximately 300 miles in: 300 miles/1875 mph = 9.6 minutes They even could have made it to the capital in time to protect the Pentagon if they had continued to fly at only 500 mph.

          References

          1. [cached]

          2. [/url][cached]

          3. [/url]'I Thought It Was the Start of World War III', Cape Cod Times, 8/21/02[cached]

  2. My patient who was my friend of 4 3/4 years watched South Park before he would go to sleep. I had to be at his side.

    He died Oct 19th a year ago. I preached to him the word. Hope he was saved. Can you open up your secular heart ????

    +++++++++++++++

    Gee even the Bundesbank cant prove the old switcheroo is being done with the Gold.

    Tungsten-Filled 10-Ounce Gold Bars Raise Questions

    http://www.numismaster.com/ta/numis/Article.jsp?ad=article&ArticleId=25789

  3. There had been no hijacking in nearly a decade and no domestic hijacking in the memory of FAA personnel on duty that day. The role had not been exercised, nor was an actionable communication link with DoD established as events of the day revealed. (Colby sources)

    Gee ......lots of activity related to (thats to) a hijacking for such a rare event on a particular day .....what day ??? Golly .......Sept ...wait wait cant remember ...14th ... 18th ??? Sept hummm..????(???).........well maybe one day I will remember....

    All coincidence.....(Gaal)

    NRO: National Reconnaissance Office

    CIA's plane into building exercise during 9/11

    related pages:

    The US National Reconnaissance Office, which operates spy satellites, was conducting a simulation of a plane crash into their headquarters (near Dulles Airport in Virginia) on September 11!

    For more about the NRO, see www.fas.org/irp/nro/index.html

    This war game was not a "terrorism" exercise - but it did simulate a plane going off course (on the approach to nearby Dulles Airport) and crashing into the NRO's headquarters, control center for US spy satellites. This war game was to test the emergency response procedures in the event of this type of accident, and included practice evacuation of the buildings. It is very damning that the war game planners (of all of the war games, not merely this one) ensured that the NRO's headquarters was largely evacuated at precisely the time that 9/11 was taking place, which minimized the number of officials who were able to monitor the events via the Pentagon's satellite intelligence systems.

    On 9/11, CIA Was Running Simulation of a Plane Crashing into a Building

    www.thememoryhole.org/911/cia-simulation.htm

    Agency planned exercise on Sept. 11 built around a plane crashing into a building

    www.sfgate.com/cgi-bin/article.cgi?f=/news/archive/2002/08/21/national1518EDT0686.DTL

    JOHN J. LUMPKIN, Associated Press Writer Wednesday, August 21, 2002

    (08-21) 15:08 PDT WASHINGTON (AP) --

    "Agency planned exercise on Sept. 11 built around a plane crashing into a building"

    By John J. Lumpkin, Associated Press

    WASHINGTON [september 2002]

    "In what the government describes as a bizarre coincidence, one U.S. intelligence agency was planning an exercise last Sept. 11 in which an errant aircraft would crash into one of its buildings. But the cause wasn't terrorism -- it was to be a simulated accident.

    "Officials at the Chantilly, Va.-based National Reconnaissance Office had scheduled an exercise that morning in which a small corporate jet would crash into one of the four towers at the agency's headquarters building after experiencing a mechanical failure.

    The agency is about four miles from the runways of Washington Dulles International Airport. Adding to the coincidence, American Airlines Flight 77 -- the Boeing 767 that was hijacked and crashed into the Pentagon -- took off from Dulles at 8:10 a.m. on Sept. 11, 50 minutes before the exercise was to begin. It struck the Pentagon around 9:40 a.m., killing 64 aboard the plane and 125 on the ground.

    The National Reconnaissance Office operates many of the nation's spy satellites. It draws its personnel from the military and the CIA

    www.questionsquestions.net/topics/question.html

    today's question...

    Brian Salter, qq editor

    5 June 2003: Why were 3000 NRO employees sent home after 9/11?

    There have been a number of disinfo limited hangouts floating around, all of them designed to offer apparently revealing inside details of 9/11 but actually serving the purpose of whitewashing evidence of US govt. complicity. One which has been hanging around for a while centers on the terrorist training exercise that the NRO (National Reconaissance Office) had scheduled the same morning of the attacks. The super-secret NRO happens to be the agency which operates US spy satellites.

    A mainstream article about it is here:

    http://www.boston.co...ne_exercise.htm

    The limited hangout build around this is that the 9/11 "terrorists" somehow learned about the secret exercise in advance, and "piggybacked" their own attack on the same date in order to confuse US defences. This is used as a supposed explanation for lack of action on prior warnings, failure of air defences to operate, etc, on the assumption that military and intel personnel thought that everything going on was part of the the "exercise". I don't know of any serious 9/11 researcher who finds this a credible overall theory, given the fact that there is an abundance of evidence pointing beyond such a scenario, to official complicity and specific prior knowledge. This has been discussed very thoroughly among researchers.

    That aside, there is an interesting detail in the above article:

    "The National Reconnaissance Office operates many of the nation's spy satellites. It draws its personnel from the military and the CIA.

    After the Sept. 11 attacks, most of the 3,000 people who work at agency headquarters were sent home, save for some essential personnel, Haubold said."

    Sent home... why?? Recently, I heard one alternative speculation about this which deserves some inquiry. Namely, that certain high-ranking NRO staff may have needed this time to eliminate or alter satellite surveillance of the Washington, DC area during the attacks. Note that it has been alleged for years that the US has 24 hour high resolution satellite monitoring of the capitol and surrounding regions, where critical government institutions are located. If so, there would then be a record of Flight 77's flight path and imact. Would there be something there to hide?

    With the recent 9/11 Commission hearings on 9/11 air defences having stirred up debate, this is perhaps something to consider.

  4. “All of NEADS, operations personnel are to have their sim switches turned ‘on’ starting at 1400Z 6 Sept. 01 till endex [the end date of the exercise].” Since Vigilant Guardian was originally scheduled to continue until September 13, this would mean NEADS personnel had their sim switches turned on this morning. [US Department of Defense, 1/15/1999; Northeast Air Defense Sector, 8/23/2001]

    ###########################

    While NEADS radar scopes are still displaying simulated material as late as 9:34 a.m., some accounts will claim the Vigilant Guardian exercise was canceled shortly after 9:03 a.m., when the second World Trade Center tower was hit (see (Shortly After 9:03 a.m.) September 11, 2001). [Airman, 3/2002; Filson, 2003, pp. 59] And according to a report in the Toronto Star, “Any simulated information” for the exercise was “purged from the [radar] screens” at NORAD’s operations center in Cheyenne Mountain, Colorado, shortly before the second WTC tower was hit (see (9:00 a.m.) September 11, 2001). [Toronto Star, 12/9/2001] However, NEADS will receive a phone call from the operations center at 10:12 a.m. in which the caller asks it to “terminate all exercise inputs coming into Cheyenne Mountain” (see 10:12 a.m. September 11, 2001). [North American Aerospace Defense Command, 9/11/2001]

    ######################################

    CONFUSION CAUSED BY EXERCISES >>>>>YES <COLBY SAYS NO.

    ?????????????????????????????????????????????????????

  5. Wow, Check Out the Background of the Twin's Ex-Husband

    http://www.economicpolicyjournal.com/2012/11/wow-check-out-background-of-twins-ex.html

    Ok, I really think we now have enough for a full blown spook movie. As a reminder, Jill Kelley is the gal from Tampa who was born a Maronite Christian in Lebanon and who started the entire Petraeus Affair by contacting the shirtless FBI agent about harassing emails that turned out came from Paula Broadwell, who was the lover of General Petraeus.

    Lurking in the background of the story, has been Kelley's twin sister, Natalie Khawam. You will recall that as a result of a bitter child custody dispute, General Petraeus and General Allen wrote glowing character references for Khawam. The ex-husband of Khawan, Grayson Wolfe, has been described in the press as an "investment banker," but he isn't just an ordinary IB. And this is where new developments in the story take us. As one anonymous EPJ commenter put it about Wolfe, "Noticing how the twins seem to orbit around trouble, I'm wondering how long before somebody really starts picking at the scab that's the ex-husband of Natalie Khawam: Grayson Wolfe. I gotta believe there's some pus under that one."

    And thus we have this fascinating profile of Wolfe from his firm's web page:

    Grayson Wolfe is a Partner at Akkadian. He previously served as Director of Broader Middle East Initiatives and Iraqi Reconstruction and Special Assistant to the Chief Operating Officer at the Export-Import Bank of the United States. He was appointed to the bank by President Bush in June 2002. Between January and August 2004, Wolfe served as Manager of the Private Sector Development Office of the Coalition Provisional Authority in Baghdad, Iraq. In this capacity he was directly responsible for implementing a wide range of initiatives to attract foreign direct investment and provide financing to Iraqi companies. During this time, Wolfe worked extensively on the ground with senior Iraqi and Kurdish officials, and with the Ministries of Finance, Trade and Oil.

    From 2001 to 2002 Wolfe worked as an attorney for the law firm of
    Fleischman and Walsh, LLP
    , where he represented clients engaged in Homeland Security, Telecommunications and Intellectual Property matters. He served as a member of a seven-person team that worked with the North American Railroads and Chlorine Chemical Industries to develop a National Homeland Security Risk Analysis and Management Plan. This plan was adopted by the Class I Freight Railroad CEOs on Dec 6, 2001. Wolfe served as Legislative Director and Counsel for members of Congress from 1999-2002. He has also served in numerous positions in presidential, federal and state political campaigns. Before this, he worked for Citicorp in Poland focusing on emerging markets and franchise development opportunities in Central and Eastern European countries.

    Curiouser and curiouser it gets.

  6. Far-right Heritage Foundation // END Colby

    ##################################################

    THANK YOU THANK YOU THANK YOU .....OBAMA CARE IS A RE-HASH

    of a Heritage Foundation Plan of years ago.

    LEFTY OBAMA ? COLBY AGREES , NO !!!!!!!!

    #############

    NIST TO OVERSEE OUR PRIVACY INVASION ...all comes full circle ,NO ??

    Thursday, November 15, 2012

    Obama Secret Directive Gives Cyber-Control to Military For National Security

    obama-libya-1e407753eabc262c1-1024x676-300x198.jpg

    Susanne Posel, Contributor

    Activist Post

    Google is stating in their most recent Transparency Report that the US government has stepped up their surveillance on civilians. According to the Internet giant, more personal data is being profiled on Americans and their habits on the Web.

    Dorothy Chou, senior policy analyst at Google explains: [G]overnment demands for user data have increased steadily since we first launched the Transparency Report.”

    Google says that they have been refusing to comply with governmental requests to take down content on the Internet because of fake court orders that appear to be frivolous or illegitimate.

    Using the claim that content being removed is racist in nature or defaming of public figures, governments around the world are requesting that the Internet be censored. However, this new trend is indicative of the Big brother controls being enacted against the free speech of citizens in sovereign nations. France, Germany, Italy, Spain and the UK have topped the list of countries that seek to control content on the Internet.

    Back in May, it was made public that the <a href="http://ca.news.yahoo.com/us-spy-agency-keep-mum-google-ties-court-195145311.html">relationship between the National Security Agency (NSA) and Google is not going to be disclosed.

    A US Court of Appeals in the District of Columbia, ruled last week that the NSA does not need to confirm nor deny (known as a “Glomar” response) its collaborations with Google; how the two work together to spy on American citizens in the name of protecting the public from “cyber-attacks”.

    The court’s ruling states effectively that regardless of a filing by the Electronic Privacy Information Center (EPIC) with the Freedom of Information Act to obtain documents as to the relationship, the US government does not have to divulge any arrangement between the NSA and the search engine giant.

    It is now being reported that Obama has signed a secret policy directive that gives the military complete control over the Internet should the US come under a cyberattack. Being called Presidential Policy Directive 20, the alleged document (being classified) is a guideline that explains how specific federal agencies will be empowered by the Obama administration to intercept online “breaches of security” – including hacking and other digital attacks.

    This document assures that the US government is taking the offensive and proactive approach to digital security where network defense is recognized as operations designed to ensure defense of national security. Whether it means shutting down main servers or local computers that have been identified as targets, a complete shutdown of Internet access (although it requires cybersecurity legislation) would not be out of the realm of possibility.

    The military’s role in cybersecurity with regard to digital attacks will be to ensure that US digital information, data, and privacy be protected. This new responsibility will work in conjunction with law enforcement network defenses that are being used to para-militarize the Web using cyber units.

    In New York, Mayor Michael Bloomberg and Microsoft have collaborated to create pre-crime and counterterrorism technology to aid federal intelligence and local law enforcement agencies domestic and international.

    The Domain Awareness System (DAS) will be a very sophisticated software technology that aggregates and analyzes public information in real time that will produce comprehensive reports to be used by NYPD to ascertain potential threats and pre-crime activity.

    Last month the leaked version of Obama’s cybersecurity executive order is a compromise by the administration offered to those concerned about Big Brother controls invading US citizen’s privacy on the Web. One concession outlined is the sharing of Internet traffic information by the US government and private sector corporations involving critical infrastructure and electrical grid. Social media companies would not be held under the same mandate.

    The DHS, specifically Secretary Janet Napolitano, will be given the sole power of oversight, rather than Keith Alexander, director of the National Security Agency (NSA). Napolitano will be empowered to reference top-secret intelligence reports only known to her to base identification of cyberthreats and individual targets.

    In a proactive move, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).

    NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

    DHS has begun an initiative to purvey propaganda onto American citizens called Stop.Think.Connect. (STC). The STC have teamed with Microsoft to create public service announcements (PSAs) that convince average Americans how to perceive the inflated threat hackers have on the US government’s cybersecurity.

    Some of the founders of the STC initiative are AT&T, Costco, Experian, Facebook, Google, Intel, McAfee, Mircosoft, Paypal, Symantec, Verisign, Visa, Walmart, and Yahoo!.

    Susanne Posel is the Chief Editor of Occupy Corporatism.

  7. Quote

    =========================================================================

    Gee Flight data on one plane not in 911 report at all.

    COLBY UNaddressed

    +++++++++++++++++++++++++++++++++++++++++++++++++

    No idea what you’re babbling about.// END Colby (honored with GG ALLIN brown)

    Quote

    Gee twice (with authors corrected timeline) at same time when planes hit targets planes turn. At the same time.....golly coincidence or conspiracy ??????????? COLBY UNaddressed

    ===========================================================================

    No idea what you’re babbling about.// END Colby

    SO Colby didnt look at all the videos ......Colby undressed (help Im going blind)

  8. In a bid to calm the debate, the Bundesbank has pledged to bring back and inspect 150 tons of gold from abroad over the next three years. Furthermore, there are plans to count and weigh the gold bars stored in one of the nine chambers at the Fed in New York -- although no date has been set for this.

    Poof its gone .......

    Bible thumper ???? Gee your soooooooooooooooooooo nice a guy.

    Is It Right:

    To Judge, To Expose Error, & To Name Names?

    By Pastor E.L. Bynum

    pastor_el_bynum.jpg

    Many today believe that it is wrong to expose error and to name names. Liberals have always seemed to believe this, but in recent times it has been widely espoused by evangelicals and Charismatics. Now we are seeing the same fatal error being declared by those who profess to be Bible believing fundamentalists. Those who are faithful in exposing error according to the Bible are now being widely denounced, and are accused of being unloving and unkind. In this tract we intend to present the teaching of the Bible on this vital subject.

    I. It Is Right To Practice Biblical Judgment

    One of the most misused verses in the Bible is, "
    Judge not, that ye be not judged.
    " (Matthew 7:1). Every Scripture verse should be read in its context, if we are to properly understand the true meaning. In vs.2-5 of this same chapter it is evident that v.1 is referring to hypocritical judgment. A brother who has a beam in his own eye should not be judging the brother who may have a mote in his eye. The lesson is plain, you cannot judge another for his sin if you are guilty of the same sin.

    Those who cling to "
    Judge not, that ye be not judged,
    " to condemn those who expose error should read the entire chapter. Jesus said, "
    Beware of false prophets, which come to you in sheep's clothing...
    " (v.15). How can we know false prophets unless we judge them by the Word of God? If we know the false prophets, how can we fail to warn the sheep of these "
    ravening wolves
    ?" All through the Bible we find proof that they should be identified and exposed.

    "
    Ye shall know them by their fruits. Do men gather grapes of thorns, or figs of thistles? Even so every good tree bringeth forth good fruit; but a corrupt tree bringeth forth evil fruit
    " (vs.16,17). Did the Lord mean that we could not judge the tree (person), by the fruit of their life and doctrine? Certainly not, for you cannot know without judging. All judgment should be on the basis of Bible teaching, not according to whims or prejudices.

    "
    Judge not according to the appearance, but judge righteous judgment.
    " (John 7:24). Here our Lord commands that we are to "
    judge righteous judgment
    ," which is judgment based upon the Word of God. If judgment is made upon any other basis, other than the Word of God, it is a violation of Matt. 7:1. Webster's Dictionary says that a judge is "one who declares the law." The faithful Christian must discern of judge on the basis of God's inspired law, the Bible.

    A fornicator is described in 1st Corinthians 5:1-13. Paul "
    judged
    " (v.3) the man even though he was absent, and he told the Church at Corinth that they were to "
    judge
    " (v.12) those that were within. The Greek word for "
    judge
    " is the same here as in Matthew 7:1. Paul did not violate "
    judge not, that ye be not judged
    ," in judging the man, nor in instructing the Church to judge also. All of this judgment was according to the Word of God.

    A person who is able to discern between good and evil, has at least one of the major marks of spiritual maturity. "
    But strong meat belongeth to them that are of full age, even those who by reason of use have their senses exercised to discern both good and evil.
    " (Hebrews 5:14). W.E. vine says of the meaning of discern, "a distinguishing, a clear discrimination, discerning, judging; is translated 'discerning' in 1st Corinthians 12:10 of discerning spirits, judging by evidence whether they are evil or of God." Strong also agrees that it means to judge.

    Those who are unwilling or incapable of discerning or judging between good and evil are in this manner revealing either their disobedience or their immaturity.

    II. It Is Right To Expose False Teachers

    False teachers are free to spread their poisonous doctrines today because there is a conspiracy of silence among many Bible believers. Wolves in sheep's clothing are thus enabled to ravage the flock, thereby destroying many.

    John the Baptist called the Pharisees and Sadducees (the religious leaders of his day) "
    a generation of vipers
    " (snakes) (Matthew 3:7). Today, he would be accused of being unloving, unkind, and unchristian.

    Jesus said to the religious Pharisees, "
    O generation of vipers, how can ye, being evil, speak good things? for out of the abundance of the heart the mouth speaketh
    " (Matthew 12:34). To many evangelicals and some fundamentalists, this would be unacceptable language today, but it is biblical language and it came from the mouth of the Son of God.

    Standing face to face with these false teachers, Jesus Christ the son of God, called them "
    hypocrites
    ," "
    blind guides
    ," "
    blind
    ," "
    whited sepulchres
    ," "
    serpents
    ," and "
    ye generation of vipers
    " (Matthew 23:23-34). Yet, we are told today that we are to fellowship with men whose doctrines are just as unscriptural as those of the Pharisees. Some who say they are Bible believing Christians insist on working with Roman Catholics and other assorted heretics. Yet, according to many, we are not supposed to rebuke them for their compromise.

    Near the beginning of His ministry, "
    Jesus went up to Jerusalem, and found in the temple those that sold oxen and sheep and doves, and the changers of money sitting: And when he had made a scourge of small cords, he drove them all out of the temple, and the sheep, and the oxen; and poured out the changers' money, and overthrew the tables; And said unto them that sold doves, Take these things hence; make not my Father's house an house of merchandise
    " (John 2:13-16). Our Saviour is presented today as one who was meek, lowly, kind, and loving, even to false teachers, but this is entirely false. When dealing with false teachers and prophets, His words were sharp and His actions plain.

    Near the end of His public ministry, Christ found it necessary to cleanse the temple once again. The exposure of false doctrines and practices is a never ending job. At that time He said, "
    Is it not written, My house shall be called of all nations the house of prayer? but ye have made it a den of thieves
    " (Mark 11:17). Is it any different today? The thieves come into the house of God, and rob God's people of the Bible and peddle their perverted Bibles instead. At the same time this den of thieves rob the people off the doctrine of separation and the doctrine of sanctification. Then you can hardly tell God's people from the people of the world. In all honesty, should not these thieves (false teachers) be exposed?

    In our day these false teachers have come into the churches with their books, literature, movies, psychology, and seminars, and have turned the Father's house into a den of thieves. It is time that men of God stand up and expose their errors for all to see.

    The Bible Admonishes Us To Expose Error

    We are to TRY them.
    "
    Beloved, believe not every spirit, but try the spirits, whether they be of God; because many false prophets are gone out into the world
    " (1st John 4:1). All doctrine and teachers are to be tried according to the Word of God. "
    To the law and to the testimony: if they speak not according to this word, it is because there is no light in them"
    (Isaiah 8:20). Every message, messenger, and method is to be judged according to the Word of God. The church at Ephesus was commended because they had "
    tried
    them which say they are apostles, and are not, and hast fund them liars
    " (Rev. 2:2). The church at Pergamos was rebuked because they tolerated those that held "
    the doctrine of Balaam
    ," and "
    the doctrine of the Nicolaitanes, which thing I hate
    " (Revelation 2:14,15). It is never right to tolerate false teachers, but they are to be tried by the Word of God, and exposed. Of course those who want to disobey the Word of God will seek by every means to avoid this teaching.

    We are to MARK them and AVOID them.
    "
    Now I beseech you, brethren, mark them which cause divisions and offences contrary to the doctrine which ye have learned; and avoid them
    " (Romans 16:17). Those whose conduct and teaching contradicts the Word of God are to be marked and to be avoided. This requires discernment and judgment in the light of the Bible. The ecumenicalists, new evangelicals, and compromising fundamentalists will resist any effort to obey this Scripture. They cannot be marked and avoided, unless they are judged according to the Word of God.

    We are to REBUKE them.
    "
    Wherefore rebuke them sharply, that they may be sound in the faith
    " (Titus 1:13). This was written to Titus, because there were those going from house to house and subverting whole houses with false doctrine (v.10-16). Oral Roberts, Robert Schuller, Jimmy Swaggart, Pat Robertson, and others are subverting whole houses with their false doctrine today. Are we to sit silently by, while they do this, without rebuking and admonishing people to avoid their teaching? No, the faithful servant of the Lord is to be "
    Holding fast the faithful word as he hath been taught, that he may be able by sound doctrine both to exhort and to convince the gainsayers
    " (Titus 1:9).

    We are to have NO FELLOWSHIP with them.
    "
    And have no fellowship with the unfruitful works of darkness, but rather reprove them
    " (Ephesians 5:11). Reprove means to censure, condemn, find fault, rebuke, and to refute. How can we obey this Scripture unless we try them by the Word of God?

    We are to WITHDRAW from them.
    "
    Now we command you, brethren, in the name of the Lord Jesus Christ, that ye withdraw yourselves from every brother that walketh disorderly, and not after the tradition which ye received of us
    " (2nd Thessalonians 3:6). We are to withdraw from those whose doctrine and conduct does not conform to the Word of God. The context clearly shows that obedience to sound doctrine is what Paul has in mind, for he says, "
    if any man obey not our word by this epistle, note that man and
    have no company with him
    , that he may be ashamed. Yet, count him not as an enemy, but admonish him as a brother
    " (2nd Thessalonians 3:14-15). Paul admonished Timothy to "
    withdraw thyself
    " from those who "
    consent not to wholesome words...and to the doctrine which is according to godliness
    " (1st Timothy 6:3-5).

    We are to TURN AWAY from them.
    Concerning the last days, he says that some will have "
    a form of godliness, but denying the power thereof: from such turn away
    " for such people are "
    never able to come to the knowledge of the truth
    " (2nd Timothy 3:5,7). How can we turn away from them if we do not identify them, and this requires that their message be compared to the Word of God. It is the business of the true preacher to: "
    Preach the word; be instant in season, out of season; reprove, rebuke, exhort with all longsuffering and doctrine
    " (2nd Timothy 4:2). This is usually an unpopular and thankless task but it is the duty of the God-called man.

    We are NOT to RECEIVE them into our house.
    "
    If there come any unto you, and bring not this doctrine, receive him not into your house, neither bid him God speed: For he that biddeth him God speed is partaker of his evil deeds
    " (2nd John 10,11). There is no doubt about who John is speaking about, it is "
    Whosoever transgresseth, and abideth not in the doctrine of Christ...
    " (v.9). By radio, TV, and literature, false prophets are brought into the homes of many Christians today. Brethren, this ought not to be!

    We are to REJECT HERETICS.
    "
    A man that is an heretick after the first and second admonition reject
    " (Titus 3:10). We should reject those who deny redemption by the blood of Christ. There are many who deny this or some other doctrine of the Word of God. If they will not respond to being admonished, then they are to be rejected.

    We are to look out for those who preach another gospel.
    Paul warned about those who preached "
    another Jesus...another spirit...or another gospel
    " (2nd Corinthians 11:4). How can we know them unless we judge their Jesus, their spirit, and their gospel by the Word of God? Paul called such preachers "
    false apostles, deceitful workers, transforming themselves into the apostles of Christ
    " (2nd Corinthians 11:13). He explains in v.14-15 that these preachers are the ministers of Satan. The God-called man must be just as faithful today in exposing the ministers of Satan.

    Paul warned the Galatians about those who "
    pervert the gospel of Christ.
    " He also said, "
    if any man preach any other gospel unto you than that ye have received, let him be accursed.
    " (See Galatians 1:6-9). Multitudes today are preaching a perverted gospel. Those who teach salvation by baptism, or by works, are teaching a perverted gospel. Those who preach a salvation that you can lose, are preaching a perverted gospel. The Charismatics, Catholics, many evangelicals, and many fundamentalists (?) are preaching a perverted gospel. Yet, we are supposed to cooperate with them in evangelism and Christian work, according to many today. If we fail to expose these false prophets, then we have betrayed Christ and His gospel.

    We are to SEPARATE
    from them. "
    Wherefore come out from among them, and be ye separate, saith the Lord, and touch not the unclean thing; and I will receive you
    " (2nd Corinthians 6:17). This makes it plain. God's people are to come out of apostasy and religious error. How can any Bible believer remain in the National Council or World Council of Churches? How can they remain in the Southern Baptist Convention, or any of the other apostate organizations? How can they remain among compromising evangelicals and wishy-washy fundamentalists?

    III. It is Right To Name Names

    Many mistakenly believe that it is wrong to expose error and to name the guilty teachers; but they are wrong according to the Bible.

    Paul named Peter publicly.
    Peter was guilty of unscriptural practice. "
    But when Peter was come to Antioch, I withstood him to the face, because he was to be blamed...But when I saw that they walked not uprightly according to the truth of the gospel, I said unto Peter before them all, If thou, being a Jew, livest after the manner of Gentiles, and not as do the Jews, why compellest thou the Gentiles to live as do the Jews?
    "(Galatians 2:11-14). The whole issue revolved around salvation by the law or by grace. When the integrity and purity of the gospel is at stake, then we have no choice when it comes to the matter of exposing error and naming names.

    Paul named Demas for loving the world.
    "
    For Demas hath forsaken me, having loved this present world
    " (2nd Timothy 4:10). Those who forsake the cause of Christ for worldly living and pleasures should be name and exposed.

    Paul named Hymenaeus and Alexander.
    Paul told Timothy to "
    war a good warfare; Holding faith, and a good conscience; which some having put away concerning faith have made shipwreck: Of whom is Hymenaesus and Alexander; whom I have delivered unto Satan, that they may learn not to blaspheme
    " (1st Timothy 1:18-20). God's true servants should war a good warfare, and name those who have departed from the faith that was once delivered to the saints. Paul is not here discussing the faith of salvation but the faith as a system of doctrine. These men had made shipwreck of it and Paul exposed them and called their names.

    Paul named Hymenaeus and Philetus.
    He told Timothy to "
    study
    " that he might be able to "
    rightly
    " divide "
    the word of truth. But shun profane and vain babblings: for they will increase unto more ungodliness. And their word will eat as doth a canker: of whom is Hymenaeus and Philetus; Who concerning the truth have erred, saying that the resurrection is past already; and overthrow the faith of some"
    (2nd Timothy 2:15-18). False doctrine overthrows the faith of some, so those who are proclaiming it must be exposed.

    Paul named Alexander the coppersmith.
    "
    Alexander the coppersmith did me much evil: the Lord reward him according to his works: Of whom be thou ware also; for he hath greatly withstood our words"
    (2nd Timothy 4:14-15). It is clear that this is not a personality problem, but a doctrinal problem. Alexander had withstood the words and doctrine of Paul. He was an enemy to the truth. Godly pastors face the same problem every day. They stand and proclaim the truth, then their members go home and hear this truth disputed by radio and TV preachers. Often times these false prophets are sending their publications into the homes of members of true churches. Then the man of God is suppose to keep his mouth shut, according to many. Only a coward will be silent when the truth of the Bible is under attack.

    John name Diotrephes.
    "
    I wrote unto the church; but Diotrephes, who loveth to have the preeminence among them, recieveth us not
    " (III John 9). He related how this man had prated against him "
    with malicious words
    " (v.10). He further said, "
    Beloved, follow not that which is evil but that which is good. He that doeth good is of God, but he that doeth evil hath not seen God
    " (v.11). It is not wrong to name those whose doctrine and practice is contrary to the Word of God.

    In fact, the whole Bible abounds in examples of false prophets being named and exposed. All this modern day talk about love, used as an excuse for not exposing error, is not really biblical love but is really sloppy agape.

    Moses called the name of Balaam.
    (See Numbers 22-25). Peter exposed "
    the way of Balaam
    ... who loved the wages of unrighteousness
    " (2nd Peter 2:15). Balaam was a prophet that was in the work for money, just like some of the TV false prophets today. They beg for money and live like kings, while multitudes of innocent people send them their hard earned money. They are always building colleges, hospitals, TV networks satellites, and amusement parks that have a water slide for Jesus. And then we are suppose to keep our mouth shut about these religious charlatans. How can we be silent and be true to God?

    Jude exposed "
    the error of Balaam
    " (Jude 11). John exposed "
    the doctrine of Balaam
    , who taught Balac to cast a stumblingblock before the children of Israel, to eat things sacrificed unto idols, and to commit fornication
    " (Revelations 2:14). This gets right to the heart of the matter, concerning the doctrine of separation. Balaam never did curse Israel even though he wanted the wages that he was offered to do so. The men of Israel committed "
    whoredom with the daughters of Moab...and bowed down to their gods
    " (Numbers 25:1,2). Why did they do this? Because Balaam taught Balac how to break down the barrier of separation between the Moabites and the Israelites. We know this to be so because it is plainly stated in Revelation 2:14 and Numbers 31:16. This sin resulted in 24,000 men of Israel dying under the judgment of God.

    False teachers are breaking down the barrier of separation between God's people and false religion. There is too little preaching and teaching on the doctrine of separation. Balaam breached the doctrine of personal separation by causing the men of Israel to commit fornication with the Moabite women. He breached the doctrine of ecclesiastical separation by causing the men of Israel to bow down to Baal. This brought a curse upon Israel. Until we get back to teaching the truth about personal and ecclesiastical separation, we can expect the continued widespread havoc that we have today.

    It seems to be believed by many that some people are too high and mighty to be named or exposed. Men in high places, pastors of large churches, and those with great radio of TV audiences, are supposedly above criticism. Whatever they may do or say, no matter how contrary to the Bible it may be, is supposedly all right. Nothing could be further from the truth.

    Nathan identified the man.
    There was a man in a very high place who was a secret adulterer. Surely this man who held the highest office in the land could not be rebuked by a lowly unpopular prophet. Nathan went right into the presence of David, revealed the sin in a parable form, and then told the enraged David, "
    Thou art the man
    " (2nd Samuel 12:7).

    Hanani name king Jehoshaphat.
    In many ways Jehoshaphat was a good king, but he mistakenly forgot to practice religious separation. He caused his son to marry wicked king Ahab's daughter. (See 2nd Chronicles 18:1; 21:1-6). He made an alliance with Ahab and went to the battle of Ramoth-gilead with him (2nd Chronicles 18). Hanani "
    said to King Jehoshaphat, Shouldest thou help the ungodly, and love them that hate the Lord?
    " (2nd Chronicles 19:2). We have a question for those who insist on working with Charismatics, Catholics, and members of the National Council of Churches, "
    Shouldest thou help the ungodly, and love them that hate the Lord?
    "

    Yes, it is right to expose error and to name those who are in error. It is right to "
    earnestly contend for the faith which was once delivered unto the saints
    " (Jude 3). It was once delivered and it has never been recalled for revision. We had better beware of "
    false teacher...who privily shall bring in damnable heresies
    " (2nd Peter 2:1). Faithful messengers will warn the sheep of these heretics, and identify them by name. It is not enough to broadly hint of their identity, for the young lambs will not understand and will be destroyed by the wolves.

  9. Why Americans Must End America’s Self-Generating Wars

    by Peter Dale Scott

    Drawing on historical precedents, Peter Dale Scott exposes the contradictions and perverse effects of the "war on terror", which adds insecurity to instability and increases the number of terrorists it pretends to be fighting.

    The most urgent political challenge to the world today is how to prevent the so-called “pax Americana” from progressively degenerating, like the 19th-century so-called “pax Britannica” before it, into major global warfare. I say “so-called,” because each “pax,” in its final stages, became less and less peaceful, less and less orderly, more and more a naked imposition of belligerent competitive power based on inequality.

    To define this prevention of war as an achievable goal may sound pretentious. But the necessary steps to be taken are above all achievable here at home in America. And what is needed is not some radical and untested new policy, but a much-needed realistic reassessment and progressive scaling back of two discredited policies that are themselves new, and demonstrably counterproductive.

    I am referring above all to America’s so-called War on Terror. American politics, both foreign and domestic, are being increasingly deformed by a war on terrorism that is counter-productive, actually increasing the number of perpetrators and victims of terrorist attacks. It is also profoundly dishonest, in that Washington’s policies actually contribute to the funding and arming of the jihadists that it nominally opposes.

    Above all the War on Terror is a self-generating war, because, as many experts have warned, it produces more terrorists than it eliminates. And it has become inextricably combined with America’s earlier self-generating and hopelessly unwinnable war, the so-called War on Drugs.

    The two self-generating wars have in effect become one. By launching a War on Drugs in Colombia and Mexico, America has contributed to a parastate of organized terror in Colombia (the so-called AUC, United Self-Defense Forces of Colombia) and an even bloodier reign of terror in Mexico (with 50,000 killed in the last six years). [1] By launching a War on Terror in Afghanistan in 2001, America has contributed to a doubling of opium production there, making Afghanistan now the source of 90 percent of the world’s heroin and most of the world’s hashish. [2]

    Americans should be aware of the overall pattern that drug production repeatedly rises where America intervenes militarily – Southeast Asia in the 1950s and 60s, Colombia and Afghanistan since then. (Opium cultivation also increased in Iraq after the 2003 US invasion.) [3] And the opposite is also true: where America ceases to intervene militarily, notably in Southeast Asia since the 1970s, drug production declines. [4]

    Both of America’s self-generating wars are lucrative to the private interests that lobby for their continuance. [5] At the same time, both of these self-generating wars contribute to increasing insecurity and destabilization in America and in the world.

    Thus, by a paradoxical dialectic, America’s New World Order degenerates progressively into a New World Disorder. And at home the seemingly indomitable national security state, beset by the problems of poverty, income disparity, and drugs, becomes, progressively, a national insecurity state and one gripped by political gridlock.

    The purpose of this paper is to argue, using the analogy of British errors in the late 19th century, for a progressive return to a more stable and just international order, by a series of concrete steps, some of them incremental. Using the decline of Britain as an example, I hope to demonstrate that the solution cannot be expected from the current party political system, but must come from people outside that system.

    MORE SEE LINK http://www.voltairen...icle176501.html

  10. Lefty Obama ?

    Police State North America: The U.S.-Canada Integrated Cybersecurity Agenda

    By Dana Gabriel

    Global Research, November 13, 2012

    Be Your Own Leader

    ------------------------------------------------------------------------

    As part of the Beyond the Border initiative, the U.S. and Canada are strengthening cybersecurity cooperation. In a move that received little attention, both countries recently announced a joint cybersecurity action plan. Cyber threats know no national borders which has made the issue an important security concern. A fully integrated North American security perimeter would be entrusted with preventing and responding to any such attacks.

    One of the key priorities identified in the November 2011 Beyond the Border Action Plan is cybersecurity. The agreement lays the framework for enhancing U.S.-Canada, “bilateral cyber-security cooperation to better protect vital government and critical digital infrastructure and increase both countries’ ability to respond jointly and effectively to cyber incidents. This will be achieved through joint projects and operational efforts, including joint briefings with the private sector and other stakeholders, and the enhancement of real-time information sharing between operation centres.” The deal will also works towards strengthening, “cooperation on international cyber-security and Internet governance issues to promote prosperity, enhance security and preserve openness in our networked world.” Merging cyber threat strategies would force Canada to further bring its security practices in line with American ones and under the reach of the Department of Homeland Security (DHS).

    On October 26, Public Safety Canada and the DHS released a Cybersecurity Action Plan which represents a key commitment under the Beyond the Border agreement. A press release explained that the specific goals include, “enhancing collaboration on cyber incident management between each country’s cyber security operations centres, improving information sharing and engagement with the private sector, and continuing the ongoing collaboration between Canada and the U.S. on the promotion of cyber security awareness to the public.” The new joint action plan promotes a shared approach to cybersecurity and digital critical infrastructure protection. Building on these initiatives, both countries also seek to further integrate cyber capabilities into military command structures.

    Earlier this year, Defense Secretary Leon Panetta authorized the creation of the Joint Cyber Center (JCC) run by the North American Aerospace Defense Command (NORAD) and U.S. Northern Command. The JCC will bring together personnel from the intelligence, operations and command control systems divisions. The aim is, “To better integrate cyber into the headquarters missions by improving situational awareness in the cyber domain, improving the defense of the commands’ networks and providing cyber consequence response and recovery support to civil authorities.” In June, DefenseNews reported that Secretary Panetta, “approved a new organizational framework, a plan designed as a ‘first step’ towards standardized cyber operations.” This includes having a JCC at each geographic combatant command which is part of ongoing efforts to not only boost U.S., but continental cyber defense capabilities. In the near future, the U.S. and Canada could create a binational “cyber-NORAD” to protect North America from shared threats.

    The North Atlantic Treaty Organization (NATO) released an updated Policy on Cyber Defence in June 2011. According to NATO’s website, “This revised policy offers a coordinated approach to cyber defence across the Alliance with a focus on preventing cyber attacks and building resilience.” It will act as the framework, “for how NATO will assist Allies, upon request, in their own cyber defence efforts, with the aim to optimise information sharing and situational awareness, collaboration and secure interoperability.” The new policy also, “sets the principles on NATO’s cyber defence cooperation with partner countries, international organisations, the private sector and academia.” In May of this year, the Chicago Summit Declaration, “committed to provide the resources and complete the necessary reforms to bring all NATO bodies under centralised cyber protection.” It also pledged to, “further integrate cyber defence measures into Alliance structures and procedures.” U.S.-Canadian military cooperation also extends through NATO and this includes in the realm of cybersecurity.

    There are reports that President Barack Obama may be close to issuing a cybersecurity executive order as a means of bypassing Congress. Under the guise of cybersecurity, the U.S. and Canada have been individually pushing draconian legislation domestically which would grant government agencies sweeping new powers. The implications would be far reaching and pose a risk to privacy and civil liberties. Through the Beyond the Border initiative both countries are pursuing an integrated cybersecurity agenda. As they move forward and address common threats to North America, cyber and perimeter security will be further defined and dominated by U.S. interests.

    ---------------------------------------------------------------------------------------------------

    Dana Gabriel is an activist and independent researcher. He writes about trade, globalization, sovereignty, security, as well as other issues. Contact: beyourownleader@hotmail.com. Visit his blog at Be Your Own Leader

  11. Gee all these exercises on 911 ,but two in chain of command for intercept "off Duty" with newbie in charge

    COLBY UNaddressed

    ===================================================================================

    Gee inflight data on intercept planes MIA like the two people in the chain of command.

    COLBY UNaddressed

    =========================================================================

    Gee Flight data on one plane not in 911 report at all.

    COLBY UNaddressed

    +++++++++++++++++++++++++++++++++++++++++++++++++

    Gee twice (with authors corrected timeline) at same time when planes hit targets planes turn. At the same time.....golly coincidence or conspiracy ??????????? COLBY UNaddressed

    ===========================================================================

    My deep background thread of 911 simulations RED section not address by Colby. Colby has contended over 3 times that intercepts were not affected by training exercises. BUT IF YOU READ MY THREAD "RED" PART how could you contend that ?? GOLLY maybe thats why its COLBY UNaddressed. (Colby loves the 'addressed' phrase).

    #######################################

    9:34 a.m. September 11, 2001: NEADS Surveillance Technicians Instructed to Remove Simulated Information from Radar Screens

    FYQ-93_2050081722-34170.jpgNORAD’s air defence computer system, the AN/FYQ-93. [source: Federation of American Scientists]A technician at NORAD’s Northeast Air Defense Sector (NEADS) instructs personnel on the NEADS operations floor to turn off their “sim switches,” apparently so as to remove from their radar screens simulated information for a training exercise that was being conducted this morning. [Northeast Air Defense Sector, 8/23/2001; 9/11 Commission, 2004]

    Staffer Complained, 'Let's Get Rid of This Goddamn Sim' - A few minutes earlier, at 9:30 a.m., a member of staff on the operations floor complained about simulated information—presumably false tracks—appearing on NEADS radar screens. He said: “You know what, let’s get rid of this godd_mn sim. Turn your sim switches off. Let’s get rid of that crap.” [North American Aerospace Defense Command, 9/11/2001; North American Aerospace Defense Command, 9/11/2001] (A “sim switch” presumably allows simulated material on radar scopes to be turned on or off.)

    Technician Instructs, 'Turn Off Your Sim Switches' - Now a member of NEADS staff, who according to a 9/11 Commission document is Technical Sergeant Jeffrey Richmond, gives an instruction to the NEADS surveillance technicians, “All surveillance, turn off your sim switches.” Seconds later, apparently in response to this instruction, someone on the operations floor tells a colleague, “You got your sim switches down.” [9/11 Commission, 2004]

    Sim Switches Turned On for Day's Exercise - Simulated material (“sim”) is apparently appearing on NEADS radar screens because of the NORAD training exercise, Vigilant Guardian, that was being conducted this morning (see (6:30 a.m.) September 11, 2001). Former Deputy Secretary of Defense John Hamre has revealed that NORAD has the capacity to inject simulated material into the system, “as though it was being sensed for the first time by a radar site.” In a training exercise in December 1998, for example, NORAD ran “30 different simulations, some of them being mass attacks, some of them being single missiles.” An information page on the current exercise stated, “All of NEADS, operations personnel are to have their sim switches turned ‘on’ starting at 1400Z 6 Sept. 01 till endex [the end date of the exercise].” Since Vigilant Guardian was originally scheduled to continue until September 13, this would mean NEADS personnel had their sim switches turned on this morning. [US Department of Defense, 1/15/1999; Northeast Air Defense Sector, 8/23/2001]

    Radar Equipment Set to Display 'Sim Tracks' - A memo outlining special instructions for Vigilant Guardian participants further detailed how NORAD equipment needed to be set to display simulated material during the exercise. It stated: “The exercise will be conducted sim over live on the air sovereignty string. The Q-93 must be placed in the mixed mode to allow the telling [i.e. the communicating of information between facilities] of sim tracks.” [Northeast Air Defense Sector, 8/23/2001] The Q-93 is a piece of equipment used by NORAD, which is described as “a suite of computers and peripheral equipment configured to receive plot data from ground radar systems,” and which “performs track processing.” [General Accounting Office, 12/24/1992 pdfbw.png; Federation of American Scientists, 4/23/2000] The Q-93 also “receives flight plans from the FAA, and has bi-directional communications with NORAD headquarters and a real-time link to AWACS [Airborne Warning and Control System planes].” [Satterthwaite, Corman, and Herm, 6/2002]

    Exercise Supposedly Canceled Earlier On - While NEADS radar scopes are still displaying simulated material as late as 9:34 a.m., some accounts will claim the Vigilant Guardian exercise was canceled shortly after 9:03 a.m., when the second World Trade Center tower was hit (see (Shortly After 9:03 a.m.) September 11, 2001). [Airman, 3/2002; Filson, 2003, pp. 59] And according to a report in the Toronto Star, “Any simulated information” for the exercise was “purged from the [radar] screens” at NORAD’s operations center in Cheyenne Mountain, Colorado, shortly before the second WTC tower was hit (see (9:00 a.m.) September 11, 2001). [Toronto Star, 12/9/2001] However, NEADS will receive a phone call from the operations center at 10:12 a.m. in which the caller asks it to “terminate all exercise inputs coming into Cheyenne Mountain” (see 10:12 a.m. September 11, 2001). [North American Aerospace Defense Command, 9/11/2001]

  12. When Former CIA Chief David Petraeus Enraged the Israel Lobby

    By Ali Abunimah

    Global Research, November 12, 2012

    Electronic Intifada

    petreus1.jpeg

    There has been fulsome praise for General David Petraeus since he resigned yesterday as head of the CIA after the FBI discovered he was having an extramarital affair.

    President Barack Obama lauded Petraeus’s decades of “extraordinary service,” which includes his time as general in charge of US wars in Iraq and Afghanistan, and as head of the CIA, where Petraeus would have been in charge of Obama’s “secret” drone program which kills children and other civilians in several countries with no oversight or control from anyone.

    Some have lamented, via social media, that wars, occupations, assassinations are not reasons to lose one’s job in the United States government. Indeed, such service gets you praised and promoted, while an extramarital affair will kill your career.

    But what also struck me was the total absence in the extensive media coverage of another way Petraeus made a little history: by publicly criticizing Israel and enraging the Israel lobby.

    Israel, a liability to the US?

    In March 2010, when Petraeus was still head of the US Central Command, he gave testimony to the Senate Armed Services Committee which included this observation about one of the “challenges to security and stability” faced by the United States:

    The enduring hostilities between Israel and some of its neighbors present distinct challenges to our ability to advance our interests in the AOR [Area of Operations]. Israeli-Palestinian tensions often flare into violence and large-scale armed confrontations. The conflict foments anti-American sentiment, due to a perception of U.S. favoritism for Israel. Arab anger over the Palestinian question limits the strength and depth of U.S. partnerships with governments and peoples in the AOR and weakens the legitimacy of moderate regimes in the Arab world. Meanwhile, al-Qaeda and other militant groups exploit that anger to mobilize support. The conflict also gives Iran influence in the Arab world through its clients, Lebanese Hizballah and Hamas.

    Abe Foxman, National Director of the Anti-Defamation League, one of the leading American Zionist lobby groups, was so alarmed he issued a statement condemning Petraeus’ testimony, asserting in part of it:

    Gen. Petraeus has simply erred in linking the challenges faced by the U.S. and coalition forces in the region to a solution of the Israeli-Arab conflict, and blaming extremist activities on the absence of peace and the perceived U.S. favoritism for Israel. This linkage is dangerous and counterproductive.

    What Foxman and other Israel lobbyists understood correctly was that Petraeus was articulating a view that is increasingly common within the US establishment, but is an absolute taboo when it comes to stating it publicly: that US “interests” and Israeli “interests” are not identical, and that Israel might be a strategic burden, rather than an asset to the United States.

    But while Foxman fulminated, Petraeus’ view struck a chord with at least some in Israel. A few months after Petraeus spoke to the Senate, Israel’s Mossad chief Meir Dagan, told a Knesset committee that, “Israel is gradually turning from an asset to the United States to a burden.”

    Of course Obama appointed Petraeus as CIA director after he made his Senate statement about Israel. And that too might have been a count against Obama in the false Republican and ultra-Zionist narrative that Obama threw Israel under the bus.

    Petraeus was not speaking from any love of the Palestinians, nor any position of principle or concern for justice – no one should make that mistake. He was speaking from the same cold calculation of how to maintain and advance US imperial domination that allowed him to oversee – on behalf of the president – wars, occupations and murders of children and teenagers and other civilians all over the world using drones. That is precisely what scared the Israel lobby.

    Ali Abunimah, Co-founder of The Electronic Intifada, and author of One Country: A Bold-Proposal to End the Israeli-Palestinian Impasse.

    ###########################

    see http://www.veteransnewsnow.com/2012/11/13/jane-harman-being-considered-to-head-cia-despite-connection-to-israel-aipac-spy-scandal/

  13. And?

    ++++++++++++++++++++++++++++++++ Is Colby making a USA TV ad joke ??

    Britain could intervene militarily in Syria in months, UK's top general suggests

    Britain could intervene militarily in Syria in the next few months, the country’s most senior general has said.

    http://www.telegraph.co.uk/news/worldnews/middleeast/syria/9670289/Britain-could-intervene-militarily-in-Syria-in-months-UKs-top-general-suggests.html

  14. November 12, 2012

    source ALA

    British SAS Training Rebels For Assassination of Assad

    As British Prime Minister David Cameron prepares to use the Royal Air Force (RAF) in Syria to put an end to the massacres the Syrian regime is committing throughout the country, British Special Forces are training rebels to assassinate the Syrian president and his commanders, the London Daily Star reported.

    UK government sources told the newspaper that British assassination squads are in Syria to train rebels on how to target President Bashar al-Assad and his warlords. Some troops hailing from Britain Special Air Service (SAS), Special Boat Section (SBS) and the Airborne Infantry of the British Army (Paras) are also in the country to teach Anti-Assad fighters techniques on the accurate use of weapons and explosives against Assad regime forces, the sources said.

    Unlike the previous position of the United States and Western countries not to arm the Syrian rebels, U.S. president Barack Obama and Cameron are considering to intervene in Syria and to enforce a no-fly zone, the sources added.

    Earlier this week, Syrian President Bashar al-Assad showed defiance when he appeared on Russian television warning against any intervention. Assad promised to take the fight till the end. “I’m Syrian, I was made in Syrian and I have to live in Syria and die in Syria,” he said.

    During his visit to Syrian refugee camps in Jordan, Cameron urged the United States to pressure the international community to offer more help to Syrians who were forced to leave their country due to ongoing violence.

    “Right here in Jordan I am hearing appalling stories of what has happened inside Syria and one of the first things I want to talk to Obama about is how we must do more to try and solve this crisis,” Cameron said.

    Since March 2011, an overall death toll of more than 37,000 was recorded by the monitoring group, the Observatory of Human Rights. The New York Times said more than 20,000 members of the Syrian army have defected and joined the Free Syrian Army across the country.

  15. September 1997: 1st Air Force Operation Centers to Be Modernized; Computer Software Allows Simulations for Training

    A modernization program of the 1st Air Force’s air operation centers, which include NORAD’s Northeast Air Defense Sector (NEADS), is started. Over the next several years, Litton Data Systems is tasked with computerizing the way the Air National Guard accomplishes its air sovereignty mission, which is the surveillance of US skies in coordination with the FAA. Until now, flight plans from the FAA have been “compiled in logs and have to be searched by hand to identify aircraft,” according to National Guard magazine. “The new system will mean fewer manual inquiries and phone contact with FAA officials about commercial aircraft. The FAA flight plan is now hooked up via computer with the new R/SAOCs [Regional/Sector Air Operation Centers] so operators can easily track friendly aircraft through our air space without having to get someone on the phone or thumb through written log books of flight plans. Composite air pictures are now shown in real time on the screen with no delay in transmission. Plans on the screen are shown as they are happening.” The software also allows computer simulations to be used for training purposes, so operators can “go through a situation at their terminals as if it were happening.” Col. Dan Navin, the special assistant to the commander of 1st Air Force, says, “It will enhance our ability to do what many say is the most important job of the Air Force, and that is air sovereignty.” The new systems should be fully operational in all seven 1st Air Force air operation centers by 2003. [National Guard, 9/1997] It is possible that this software is being used on the morning of 9/11, when a NORAD training exercise will include simulated information, known as “inject,” being shown on its radar screens (see (9:00 a.m.) September 11, 2001). [Toronto Star, 12/9/2001]

    ################################################

    1998-2001: Secret Service Simulates Planes Crashing into the White House

    The US Secret Service runs training exercises that involve computer simulations of plane

    crashing into the White House, in order to test security there. [Nenninger, 2005, pp. 175]

    Plane Crash Scenarios Test White House Security - Secret Service agent Paul Nenninger has, since 1997, been assigned to the Secret Service’s James J. Rowley Training Center in Beltsville, Maryland, where he serves as program manager in charge of the Security and Incident Modeling Lab (SIMLAB). [Nenninger, 2005, pp. 299] In a 2005 book, he will write that from 1998 up until the time of the 9/11 attacks, the Rowley Training Center is “crashing planes into the White House… on a simulation program provided by the military.” This is done “to test the security responses of the various agencies that interact to provide security and support to the White House.” [Nenninger, 2005, pp. 175] The plane crash scenarios are perhaps inspired by an incident in 1994, when a suicidal pilot crashed a Cessna into the White House grounds (see September 11, 1994). Time magazine reported at the time that “security officials have long feared in private [that] the White House is vulnerable to sneak attack from the air.” [Time, 9/26/1994; New York Times, 10/3/2001]

    Exercises Held Based on 'Terrorist Attacks on the White House' - Nenninger will not state whether the simulated plane crashes are imagined to be part of a terrorist attack. However, he will comment that simulations “allow you to practice scenarios that can be attempted by a terrorist or other deranged individual.” [Nenninger, 2005, pp. 177-178] And in May 2001, Secretary of the Treasury Paul O’Neill testifies that the Secret Service “holds interagency tabletop exercises in preparation for terrorist attacks on the White House.” However, it is unclear if he is referring to the same exercises as those described by Nenninger. [US Department of the Treasury, 5/8/2001]

    Secret Service Uses Advanced Analytical Software - For the simulations, the Secret Service has what Nenninger will describe as “a very good piece of analytical software” called the Joint Conflict and Tactical Simulation (JCATS). This program was developed by the Lawrence Livermore National Laboratory (LLNL) in California. It was released by LLNL in 1998 and distributed to the Secret Service by the Joint Warfighting Center at Fort Monroe, Virginia. [Science and Technology Review, 9/2000; Nenninger, 2005, pp. 176] JCATS can handle things like “alarms” and “FAA radar” in the simulations, according to Nenninger. The computer simulations are particularly popular with the Secret Service’s special operations units, which request “more and more time in SIMLAB.” [Nenninger, 2005, pp. 184-185]

    Colleague Says 'You Know All about That' in Response to Attack on WTC - On the morning of September 11, 2001, Nenninger is at the Secret Service headquarters in Washington, DC, for a board meeting. When he and the others there for the meeting learn that a plane has crashed into the World Trade Center, another Secret Service agent in the room points at Nenninger and, referring to the computer simulations he has been involved with, comments, “You know all about that.” [Nenninger, 2005, pp. 175]

    ###############################################

    (8:38 a.m.) September 11, 2001: ’Hubbub’ at NEADS Thought to Be Result of Exercise Scenario

    270_neads_troops2050081722-9148.jpgNational Guard troops stationed at NORAD’s Northeast Air Defense Sector (NEADS) in Rome, New York. [source: Rome Sentinel]At NORAD’s Northeast Air Defense Sector (NEADS), a huddle of people is gathered around one of the radar scopes. NEADS Commander Robert Marr initially thinks this hubbub is due to the NORAD training exercise (presumably Vigilant Guardian) that is taking place on this day (see (6:30 a.m.) September 11, 2001). He will later recall: “I’ve seen many exercises… and as I saw that huddle I said, ‘There’s got to be something wrong, something is happening here.’ You usually see that whenever they find a track on the scope that looks unusual; it’s usually an indicator that something is getting ready to kick off.” [Filson, 2003, pp. 55] According to author Lynn Spencer, Marr thinks the day’s exercise “is kicking off with a lively, unexpected twist.… His bet is that his simulations team has started off the exercise by throwing out a ‘heart attack card’ to see how the troops respond to a first-aid call from a fellow soldier, testing their first responder training.” [Spencer, 2008, pp. 26] He sends Lieutenant Colonel Dawne Deskins, the regional mission crew commander for the exercise, to check out what is going on. [Filson, 2003, pp. 55] Deskins speaks briefly over the phone with the FAA’s Boston Center about the Flight 11 hijacking (see (8:37 a.m.) September 11, 2001). [Spencer, 2008, pp. 26] She then runs back to the “battle cab”—the glass-walled room that overlooks the NEADS operations floor—and speaks to Marr with urgency in her voice. [Filson, 2003, pp. 55] She tells him: “It’s a hijacking, and this is real life, not part of the exercise. And it appears that the plane is heading toward New York City.” Although Deskins has specifically stated, “not part of the exercise,” Marr reportedly thinks, “This is an interesting start to the exercise.” According to Spencer, he thinks “This ‘real-world’ mixed in with today’s simex [simulated exercise] will keep [his staff members] on their toes.” Regardless of whether the crisis is real or not, Marr decides to instruct that the two alert F-15s at Otis Air National Guard Base be ordered to battle stations (see (8:40 a.m.) September 11, 2001). [Spencer, 2008, pp. 26-27]

    ##########################################

    9:34 a.m. September 11, 2001: NEADS Surveillance Technicians Instructed to Remove Simulated Information from Radar Screens

    FYQ-93_2050081722-34170.jpgNORAD’s air defence computer system, the AN/FYQ-93. [source: Federation of American Scientists]A technician at NORAD’s Northeast Air Defense Sector (NEADS) instructs personnel on the NEADS operations floor to turn off their “sim switches,” apparently so as to remove from their radar screens simulated information for a training exercise that was being conducted this morning. [Northeast Air Defense Sector, 8/23/2001; 9/11 Commission, 2004]

    Staffer Complained, 'Let's Get Rid of This Goddamn Sim' - A few minutes earlier, at 9:30 a.m., a member of staff on the operations floor complained about simulated information—presumably false tracks—appearing on NEADS radar screens. He said: “You know what, let’s get rid of this godd_mn sim. Turn your sim switches off. Let’s get rid of that crap.” [North American Aerospace Defense Command, 9/11/2001; North American Aerospace Defense Command, 9/11/2001] (A “sim switch” presumably allows simulated material on radar scopes to be turned on or off.)

    Technician Instructs, 'Turn Off Your Sim Switches' - Now a member of NEADS staff, who according to a 9/11 Commission document is Technical Sergeant Jeffrey Richmond, gives an instruction to the NEADS surveillance technicians, “All surveillance, turn off your sim switches.” Seconds later, apparently in response to this instruction, someone on the operations floor tells a colleague, “You got your sim switches down.” [9/11 Commission, 2004]

    Sim Switches Turned On for Day's Exercise - Simulated material (“sim”) is apparently appearing on NEADS radar screens because of the NORAD training exercise, Vigilant Guardian, that was being conducted this morning (see (6:30 a.m.) September 11, 2001). Former Deputy Secretary of Defense John Hamre has revealed that NORAD has the capacity to inject simulated material into the system, “as though it was being sensed for the first time by a radar site.” In a training exercise in December 1998, for example, NORAD ran “30 different simulations, some of them being mass attacks, some of them being single missiles.” An information page on the current exercise stated, “All of NEADS, operations personnel are to have their sim switches turned ‘on’ starting at 1400Z 6 Sept. 01 till endex [the end date of the exercise].” Since Vigilant Guardian was originally scheduled to continue until September 13, this would mean NEADS personnel had their sim switches turned on this morning. [US Department of Defense, 1/15/1999; Northeast Air Defense Sector, 8/23/2001]

    Radar Equipment Set to Display 'Sim Tracks' - A memo outlining special instructions for Vigilant Guardian participants further detailed how NORAD equipment needed to be set to display simulated material during the exercise. It stated: “The exercise will be conducted sim over live on the air sovereignty string. The Q-93 must be placed in the mixed mode to allow the telling [i.e. the communicating of information between facilities] of sim tracks.” [Northeast Air Defense Sector, 8/23/2001] The Q-93 is a piece of equipment used by NORAD, which is described as “a suite of computers and peripheral equipment configured to receive plot data from ground radar systems,” and which “performs track processing.” [General Accounting Office, 12/24/1992 pdfbw.png; Federation of American Scientists, 4/23/2000] The Q-93 also “receives flight plans from the FAA, and has bi-directional communications with NORAD headquarters and a real-time link to AWACS [Airborne Warning and Control System planes].” [Satterthwaite, Corman, and Herm, 6/2002]

    Exercise Supposedly Canceled Earlier On - While NEADS radar scopes are still displaying simulated material as late as 9:34 a.m., some accounts will claim the Vigilant Guardian exercise was canceled shortly after 9:03 a.m., when the second World Trade Center tower was hit (see (Shortly After 9:03 a.m.) September 11, 2001). [Airman, 3/2002; Filson, 2003, pp. 59] And according to a report in the Toronto Star, “Any simulated information” for the exercise was “purged from the [radar] screens” at NORAD’s operations center in Cheyenne Mountain, Colorado, shortly before the second WTC tower was hit (see (9:00 a.m.) September 11, 2001). [Toronto Star, 12/9/2001] However, NEADS will receive a phone call from the operations center at 10:12 a.m. in which the caller asks it to “terminate all exercise inputs coming into Cheyenne Mountain” (see 10:12 a.m. September 11, 2001). [North American Aerospace Defense Command, 9/11/2001]

  16. New Video: Inside 9/11 - Who diverted the fighter jets?

    Though all this is history now, with more than 10 years having passed by, some crucial questions remain unresolved. In the recent study "Anomalies of the air defense on 9/11", published in October 2012 in the "Journal of 9/11 Studies", some of these questions are covered in great detail. You can read it here:

    http://www.journalof...-33-Oct2012.pdf

    Now a video has been released, explaining these findings:

    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

    The Air Defense on 9/11: Anomalies and Questions Published on Nov 7, 2012 by GlobalResearchTV

    The Air Defense on 9/11: Anomalies and Questions

  17. Ecuador's President Says CIA is Using Drug Profits to Destabilize His Country. Get back to us when you have more status than obscure blogger yourself . Correa himself says so.

    _The subversive activity targeting president Correa is coordinated by Heather Hodges who was appointed as the US ambassador to Ecuador in August, 2008.She did a job in Guatemala during the reign of its bloody dictator Rios Montt and served as deputy director of the US State Department’s Cuban division which is known to be tightly interwoven with the CIA. Mrs. Hodges also worked with USAID in several countries and served as the US ambassador to Moldova where her mission was to alienate the country’s leadership from Russia and to organize a color revolution with the help of pro-western NGOs and the energetic youths from the US Peace Corps. At the moment her trainees are employed by the CIA stations in Venezuela, Bolivia, and Ecuador.

    related link

    http://www.bbc.co.uk...merica-12979967

    ALSO SEE http://wlcentral.org/book/export/html/2693 (very good)

    +++++++++++++++++++++++++++++++++++++++++++++++

    HOW CIA OPERATES THROUGH NON GOVERNMENTAL AGENCIES

    http://educationforu...showtopic=19489

×
×
  • Create New...