Jedi Knight Army

He the spirit of truth has revealed unto me that I belong to and come from the "House of Israel". I was born into the Nation of Israel (ten lost tribes) that “I AM” set up from the beginning. All I am saying is that Abraham’s Father, Lord God (Guardian of Divinity) is the same God that I worship and follow. A Fifeshire Family: The Descendants of JOHN AND THOMAS PHILIP OF Kirkcaldy compiled by Peter Philip 1990. I am of Scottish Origins

Saturday, 25 March 2017

London Attacker ‘Known’ to MI5 – Police Terror Drill Days Before

SHADES OF GLADIO? London Attacker ‘Known’ to MI5 – Police Terror Drill Days Before

Shawn Helton
21st Century Wire
http://21stcenturywire.com/2017/03/24/shades-of-gladio-london-attacker-known-to-mi5-police-terror-drill-days-before/
In the days leading up to the London attacks, Met Police rehearsed a ‘terrifyingly realistic’ drill on the River Thames prior to yet another known wolf act of terror taking place.
London-Terror-Drill-21WIRE-SLIDER-SH-2
‘GLADIO-322?’ – The London attacks occurred exactly a year after the Brussels airport bombings, conjuring the peculiar lore of Yale’s Skull & Bones numerology. Its also worth noting, the London attacks appear to have echoed elements of a 2016 Hollywood film called “London Has Fallen.”(Photo Illustration 21WIRE’s Shawn Helton)
Though many are still reeling in the wake of the tragic events in London – key questions have emerged following this latest terror attack in the UK.
During the course of this article, we’ll examine some of the available evidence of the events in London, as well as discuss the relevance of the ‘known wolf’ aspect of the case. In addition, we’ll consider the political context with which to view the attacks following an uptick of Western allied involvement in Syria.
Let’s review the London attacks below…
London-attack-diagram
‘CHAIN OF EVENTS’ – Was this the work of one attacker? (Image Source: bbc)
The London Attacks
On March 22nd, 4 people were said to have been killed in apparent two-pronged attack that stretched from London’s Westminster Bridge to Parliament Square. All told, the crime scene reportedly left 40-50 people injured.
According to authorities, the London attacker now believed to be Khalid Masood, (aka Adrian Russell Ajao) drove into a crowd of people on Westminster Bridge, then allegedly carried out a knife attack on an officer outside of Parliament Square – but is this the full story?
In less than 24 hours, London authorities revealed that the British-born Masood, was already well-known to MI5 and had worked in Saudi Arabia sometime around 2008. 
CBS news reported the following:
“Masood had an extensive criminal history stretching back 20 years — much of it petty offenses. He has been known by a number of aliases, including Khalid Choudri/Choudari.
His first conviction was in November 1983 for criminal damage, and his last was in December 2003 for possession of an illegal knife.
The London Metropolitan Police have said Masood had previous convictions for assaults, including causing gross bodily harm, possession of offensive weapons and public order offences.”
Even though Masood was on the intelligence/police radar, he was never convicted of any terror related offenses and was not currently the subject of any investigation just prior to the London attacks. However, Masood was previously investigated on suspicion of extremism in the past.

‘MI5 LINKED’ – Khalid Masood, the purported London attacker.  (Image Source: rt)
Interestingly, shortly after the attack, eye-witness accounts of multiple assailants was mentioned, something that directly contradicted the official story. In fact, in those reports it was suggested that at least two individuals participated in the attack. This aspect of the case has been mostly buried by major media outlets, something we’ve seen before in other high-profile cases involving ‘known wolf’ terrorists.
On March 22nd, Reuters stated at 17:30 GMT, “…police are currently looking for a second suspect in the Houses of Parliament. A BBC reporter says a witness described two assailants as being a “bald white man” and a “black man with goatee beard.”
When we scratch away the mainstream veneer of any story, what we often discover underneath is a web of clandestine deception and media manipulation.
In recent years, there’s been a pattern of multiple suspects often witnessed or said to be involved in other terror-related events. This proved to be the case in the aftermath of the Nice, France truck attack (a nearly identical attack method to Berlin), as well as the Brussels airport bombing in 2016.
Zero Hedge reported on the confusion over the official identity of the attacker. Early reports had first named a known hate preacher as the person responsible for the London attacks – but it turned out he’s still serving time in prison:
“Press reports are circulating that the terrorist responsible for the attack on Westminster Bridge in London, has been named as Abu Izzadeen, born Trevor Brooks from Clapton in Hackney, an infamous UK-born hate-preacher and Islamic extremist who had been convicted for raising funds for terrorism.”
2nd person-London
QUESTION: Was this really just a case of mistaken identity, like both the New Year’s Eve Turkish nightclub attack and the Brussels bombings of 2016 – or was there something else at play?
Security & Police Terror Drills
On March 6th, Mark Rowley of the Met Police disclosed that 13 Paris-style terror plots have been supposedly foiled over the past 4 years, which have relied largely on public observation and reports of suspicious activity.
QUESTION: Why in the era of mass data collection, GPS tracking and surveillance of personal devices, is British counter-intelligence relying on the public so heavily to help solve terror cases?
Here’s a passage from Evening Standard on the matter:
“Assistant commissioner Mark Rowley, of the Met Police, also revealed that during that period there were more than 500 live counter-terror investigations at any time.
He disclosed the figures as he launched an appeal – Action Counters Terrorism – for the public to report any suspicions and act on their instincts, saying their help is critical to foiling atrocities.
He said that since the murder of Lee Rigby in May 2013, police and intelligence agencies have disrupted 13 terrorist attack plots – one higher than the last update in October.”
On March 19th, the UK’s Telegraph published a report detailing an anti-terror drill conducted by Met Police just days before the London attacks:
Armed police have played out the chaos of a “pleasure boat” terrorist attack on the Thames in a unique marine-based exercise to test the emergency response to gunmen.
A sightseeing vessel became the scene of a fierce mock-gun battle between armed officers and police volunteers posing as terrorists shortly after 11am on Sunday, close to the London Docklands area.
The exercise marks the first time the Metropolitan Police have enacted a live-action, water-borne exercise of its kind, with over 200 officers involved.”
There has been an uncanny number of attacks preceded by anti-terror multi-agency drills that theatrically act out violence, this also happened prior to the Brussels attacks of 2016.
This was also the case with London’s 7/7 bombing – watch this ITV interview with Peter Power revealing the 7/7 rehearsal…
Incredibly, Power predicted the 7/7 attacks a year earlier on BBC Panorama on May 16th 2004…
The Daily Mail reported the Parliament Square crime scene also revealed that the gates were left wide open with no one guarding it:
“A knife-wielding terrorist only managed to get on to the parliamentary estate because the gates were open for ministers to vote – and the Commons authorities knew it was a security weak spot.”
Continuing, the article revealed that the policeman killed during the London attacks was ‘unarmed’ at the time he was stabbed by the alleged perpetrator:
“Concerns have been raised about how the extremist managed to get into the grounds of one of Britain’s most important buildings and why the policeman killed was unarmed.
No armed police are thought to have been on duty at the gates, which open on to Parliament Square.”
The article also stated that the entrance was “…blockaded with metal barriers, [and] is often left open during votes so ministers can drive in and out quickly. Once the division bell goes they only have eight minutes until the vote ends.”
QUESTION: How did the alleged attacker Masood, know exactly when the gates might be open or closed during the voting session and why was it left virtually unattended?

‘PARLIAMENT SQUARE’ – The emergency response teams and police were seen walking all over the crime scene in London’s Parliament Square. (Image Source: 98FM)
Police Commissioner Eyewitness?
Rather incredibly, London’s acting Police Commissioner Craig Mackey, just so happened to be a witness to the Parliament Square attack on PcKeith Palmer. Here’s the stunning admission logged by the Daily Mail:
‘I personally was a witness to part of yesterday’s events, including part of the tragic attack on Pc Palmer,’ Mr Mackey said.
‘As with all police officers, I therefore had a duty to secure my evidence and produce statements yesterday evening, which I did before resuming my role leading our response to this incident.’
The recent London attacks are a familiar theme: Berlin’s Christmas Market Attack perpetrator Anis Amri, was watched by authorities for months in the lead up to staging a truck attack. Additionally, the recent events in London also recalled the Nice, France attack, with Mohamed Lahouij Bouhlel, a 31 year-old French man of Tunisian descent said to have carried out a similar vehicular assault. Both highly dramatized “ISIS-inspired” attacks produced a string of  ‘known wolves that once again revealed evidence inextricably tying terror to security services.
QUESTION: Will this attack and others like it in the future, refuel the US-UK ‘willing coalition’ war rhetoric concerning military and proxy occupation in Syria?
The latest symbolically charged ‘ISIS-approved’ attack this springtime, appears to be an effort to polarize the perception of Western viewers with yet another round of wartime propaganda, while also providing a media smoke screen over recent US military action in Syria. In fact, a Reuters reportpractically confirms this:
“The perpetrator of the attacks yesterday in front of the British parliament in London is an Islamic State soldier and he carried out the operation in response to calls to target citizens of the coalition.” 
RT reports there have been dozens of anti-terror raids over the past 24-48 hours following the London attacks, along with other significant arrests. Here’s a passage from RT:
“A 39-year-old woman was arrested at an address in east London.
Overnight in Birmingham, a total of six people between the ages of 21 and 28 were arrested at two separate locations while a 58-year-old man was also arrested at a separate address in the city this morning.
All suspects were arrested on suspicion of preparation of terrorist acts.  
The Met added that the investigation into the terrorist attack “continues to develop at a fast pace and involves hundreds of detectives.” 
Informants & Patsies
QUESTION: Why was Masood never convicted of violent extremism by authorities?
As 21 WIRE has documented over the years, many so-called shooting/terror/attacks involve individuals being monitored by security services prior to an alleged act taking place. A place where a ‘lone wolf’ graduates into the ranks of a known wolf. In fact, very often those being watched by authorities exhibit all the tell-tale signs of a patsy or an informant, working either for a law enforcement or intelligence agency to potentially avoid jail time for previous criminal activity. Historically, government operators have often made use of low-life criminals, and mentally disturbed individuals to fulfill various role in entrapment stings or sometimes as bonafide actors in an actual attacks.

In any case, alleged attackers and security agencies have a dicey relationship, making any link between them highly suspect in nature.
In January of 2015, a strategic security service think-tank known as The Soufan Group, reported that a larger national security threat resides with radicals who’ve had a lengthy criminal background with known ties to security agencies:
“The Soufan Group, a New York think tank, said a better term for “lone wolves” would be “known wolves“, given how many are already known to Western intelligence agencies before they strike.
“These individuals, acting alone or in small groups … have been on the radar of various agencies and organisations, highlighting the difficulty of effectively monitoring and managing people at the nexus of criminality and terrorism,” it said in a report this week…”
Other terror stooges and suspicious intelligence ‘informant’ cases include the following:
Tamerlan Tsarnaev (see his story here)
Buford Rogers
 (see his story here)
Jerad Miller (see his story here)
Naji Mansour (see his story here)
Quazi Mohammad Nafis (see his story here)
Mohamed Osman Mohamud (see his story here)
Timothy McVeigh (see his story here)
Salim Benghalem (see his story here)
Michael Adebolajo (see his story here)
Daba Deng (see his story here)
Elton Simpson (see his story here)
Man Haron Monis (see his story here)
Abu Hamza (see his story here)
Haroon Rashid Aswat (see his story here)
Glen Rodgers (see his story here)
Omar Mateen (see his story here)
Tashfeen Malik (see her story here)
Djamel Beghal  (see his story here)
Anjem Choudary (see his story here)
Cherif Kouachi (see his story here)
Said Kouachi (see his story here)
Amedy Coulibaly (see his story here)
Hayat Boumeddiene (see her story here)
Salah Abdeslam (see his story here)
Michael Zehaf-Bibeau (see his story here)
Nidal Malik Hassan (see his story here)
Abdelhakim Dekhar  (see his story here)
Abdelhamid Abaaoud (see his story here)
Samy Amimour (see his story here)
Ismaël Omar Mostefaï (see his story here)
Mohamed Lahouij Bouhlel (see his story here)
Anis Amri (see his story here)
As we’ve mentioned at 21WIRE numerous times in recent years, many political leaders and media operatives bang the drums of security over so-called terror ‘sleeper cells’ (see the the London Boys sleeper cell) hiding in a nation near you – none of them acknowledge the historical fact that they themselves have also helped to harbor, grow, foment and radicalize individuals through counter-terrorism operations for decades.
All too often we’ve seen the ‘stage persona’ of any alleged attacker or killer being touted as hard evidence, despite the fact that even strong circumstantial evidence of any apparent crime would likely result in many hours of analysis and debate, potentially without a definitive conclusion, even if the evidence reaches a court room.
For the average person, it’s hard to differentiate from a drill or a real event, causing one to scrutinize the legitimacy of such an operation.

‘MI5’s INSIDE MAN’ – Anjem Choudary has been linked to many high-profile terror events, as well as the terror mascot/avatar for ISIS, Jihadi John. (Image Source: twitter)
The Terror Factory
In August of 2016, a hyper-propagandized war image of Omar Daqneesh went viral in the West, while the well-known radical preacher Anjem Choudary was ‘protected’ by MI5, despite being linked to major terror plots over the past decade. All in all, they were two narratives that reflected the ‘humanitarian’ and ‘radicalization’ guises of NATO’s international security syndicate that has masked the reality of the War On Terror era.
Here’s a portion of a 21WIRE article I wrote in August of 2016 entitled COINTEL CHAOS: The MI5’s ‘Known Wolf’ Preacher, Aleppo Agitprop & NATO’s Mask.” The dense report further outlined the historical lens with which to view links between terror operators and counter-terror operations and how both have played a dramatic role in many major acts of terror over the past 16 years:
“It’s worth noting that the contemptible cleric Choudary, now facing jail time for supporting ISIS, crossed paths with Abu Hamza, another radical preacher who subsequently ran the Finsbury Park mosque in North London – a known limited hangout for spooks, criminals and other informants.
In 2015, 21WIRE discussed the dubious role of Hamza at Finsbury Park, as well as his long time connection to MI5, while under the gaze of MI6:
“Hamza’s role as a state instigator and secret custodian of the Finsbury Park’s radical ‘honey pot’, now appears obvious. In a typical honey pot operation, security chiefs will place an outrageously radical character into position in order to attract “the worst of the worst” and then inform on them to authorities. For years Hamza openly preached his overtly radical, over-the-top sermons at Finsbury Park, often praising Osama Bin Laden and glorifying the attacks of 9/11, all the while mocking the police.”
Abu HamzaContinuing, the Special Report examined Abu Hamza (photo, left) and his meetings with British security services since the 1990’s:
“…the Daily Telegraph disclosed how Abu Hamza had at least 12 secret meetings with MI5 and police special branch over a six year period, starting in the late 1990’s. Other testimonies also exist that show both Abu Hamza and Abu Qatada – Britain’s two most celebrated radical Islamists, were both informants.”
In May of 2015, the UK’s Independent discussed the almost two dozen terror attacks linked to the group known as “Al-Muhajiroun,” a banned terror-linked organization with ties to British intelligence, specifically MI5. In the passage below, many of the international attacks connected to Al-Muhajiroun had been ‘foiled’ by police prior to happening:
“The 7/7 attacks, the murder of fusilier Lee Rigby, the plot to blow up planes with liquid bombs and the plot to blow up the Ministry of Sound nightclub are among the 23 planned terrorist attacks that have been linked to one single radical group operating in the UK over the past two decades: al Muhajiroun.
According to a new book by terrorism expert Raffaello Pantucci, al Muhajiroun, a banned network in the UK, has been linked to a number of plots and attacks carried out both in Britain and abroad since 2000.
The book, entitled We love death as you love life – which Pantucci said is a “catchphrase” used by many of the attackers in their propaganda – claims that 23 out of 51 of these terror plots either carried out or foiled by police in the UK and abroad have been linked to al-Muhajiroun.”
Shortly before London’s 7/7 bombings in 2005,  Al-Muhajiroun’s Omar Bakri Mohammed (Anjem Choudary’s co-founder) was outed as an informant for MI5 after the Pulitzer Prize winning investigative reporter Ron Suskind spoke to a senior MI5 official. Bakri later ‘conceded’ the connection during an interview in Beirut, which was featured in Suskind’s controversial book, The Way of the World.
In an article written by Nafeez Ahmed entitled,“The circus: How British intelligence primed both sides of the ‘terror war’,” the larger role of Bakri and Choudary is revealed:
“Bakri was regularly in touch with his deputy, Anjem Choudary, over the internet and even delivered online speeches to his followers in Britain instructing them to join IS and murder civilians. He has now been detained and charged by Lebanese authorities for establishing terror cells in the country.
Bakri was also deeply involved “with training the mujahideen [fighters] in camps on the Syrian borders and also on the Palestine side.” The trainees included four British Islamists “with professional backgrounds” who would go on to join the war in Syria. Bakri also claimed to have trained “many fighters,” including people from Germany and France, since arriving in Lebanon. Was Mohammed Emwazi among them? Last year, Bakri disciple Mizanur Rahman confirmedthat at least five European Muslims who had died fighting under IS in Syria had been Bakri acolytes.”
Interestingly, a UK think-tank called the Quilliam Foundation, that focuses on counter-extremism, has functioned alongside the MI5’s counter insurgent programs. Many critics of  Quilliam have suggested the foundation has some controversial bedfellows, in addition to their close affiliation with the Council on Foreign Relations and their connection to the Henry Jackson Society which has been associated with other neoconservative think-tanks.
In the US, many neoconservative republicans have been in favor of escalating the conflict in Syria and Quilliam’s involvement could be seen as another group behind the scenes designing a particular outcome for Western interests.”
QUESTION: Is it possible that Masood was working in a similar manner with MI5?

COERCED OPERATIVE? – Was Mohammad Emwazi forced to participate, and ‘play a role’ in the fraudulent ISIS terror videos? (Photo link 24matins.fr)
Adding to the information above, the man purported to be the infamous ISIS executioner ‘Jihadi John’ was a former computer programmer, 27-year-old Mohammad Emwazi. According to reports, Emwazi was believed to have left the UK to join ISIS militants in Syria sometime in 2013.
In fact, British security services, along with the FBI, revealed that they had ‘unmasked’ the ISIS terror video persona and had even known his identity for at least 6 months. While this news stunned the international community – it was quickly revealed that the man suspected of being the ISIS front-man was known by MI5 for the past 6 years.

‘LONDON ATTACKER’ – Khalid Masood seen more recently on the left and while attending Tunbridge Wells on the right. (Image Source: bbc)
Profile of a Killer?
In the aftermath of many high-profile terror events we here reports of those who knew the alleged perpetrator and very often these people find it hard to believe that the person they had come to know could carry out such a heinous act, even though he had a lengthy criminal history. The BBCreported the following:
“Stuart Knight, a classmate of Masood’s at Huntleys Secondary School for Boys in Tunbridge Wells, said he was a “nice lad” who was a “fun guy, always laughing, always joking”.
Mr Knight added that Masood “worked reasonably hard, [was] good at sport, played rugby very well. Just an unassuming guy. Nothing extraordinary about him at all”.
He also said he was shocked to learn of his former classmate’s actions. “I wouldn’t have thought it of him. It was so out of character for the guy I knew nearly 40 years ago.”
CBS news added:
“The manager of a hotel where Masood stayed the night before he plowed his 4×4 into pedestrians on Westminster Bridge and then stabbed a police officer at Parliament said Friday that he seemed unusually outgoing and mentioned details about his family, including having a sick father.”
“He was normal, in fact friendly, because we spent possibly five or 10 minutes talking to him about his background and where he came from,” Sabeur Toumi told CBS partner network Sky News on Friday.”
QUESTION: Is it possible that Masood was financially enticed for his role in the London event?
Look for the Met to build up a darker back story to further gain public acceptance of the official narrative of the London attacks as it relates to Masood. As Masood’s violent criminal past will be used as the pretext for his apparent involvement in the London attacks. Already authorities have searched a Carmarthenshire home belonging to his mother, echoing some of the investigative tactics seen after the terror events witnessed in San Bernardino and Orlando over the past two years.
The Met’s Mark Rowley discussed the extent of the search for information about the case thus far. Here’s a quote published by CBS news:
“We’ve seized 2,700 items from these searches, including massive amounts of computer data for us to work through,” Rowley said, adding that contact had been made with 3,500 witnesses.
Below is another look at the type of formulaic scripting often involved in these kinds of events. Scripted elements that are grafted onto each future terror-related incident:
– Suspect or suspects have alleged connections to terror or terror networks and security services.
– Suspect or multiple suspects reportedly have ‘radicalized’ views on religion, feeding a prepackaged media narrative.
– Sensational media projections bring in additional story lines for dramatic effect.
– There is an unknown motive for the crime committed – followed quickly by a ‘presumed’ terror motive with vague or little to no evidence provided.
– Politicians, law enforcement and media call the incident a ‘terror attack’ before all evidence has been properly examined.
– A ‘claim of responsibility’ manifesto, text or social media post is often conjured over a 48-72 hour time period.
Time and time again, we’ve seen this same choreographed narrative pushed by mass media and authorities – only to be exposed at a later date. 
It is also widely known that the FBI created the counter-intelligence program (COINTELPRO) to influence and disrupt political factions from the inside out. Between 1956 and 1971 (including the Socialist Workers party in 1973), the FBI’s controversial program infiltrated and radicalized hundreds of left-wing and right-wing groups to control and neutralize political dissidents across America.
Similarly, on a global scale, NATO’s paramilitary-style stay-behind-armies (under the moniker Operation Gladio) have been implicated in a number of terror attacks across Europe for several decades.
Allied nations regularly bring up the fact that Western intelligence uses double agents and informants under the banner of security to obfuscate the deceitful reality of such programs.
Was the London attacker also involved in a covert scenario like this?
Here’s another look at a compelling documentary discussing the details of NATO’s secret army used to redirect political interests…
READ MORE WAR ON TERROR NEWS AT: 21st Century Wire War On Terror 
READ MORE UK NEWS AT: 21st Century Wire UK News
SUPPORT OUR WORK BY SUBSCRIBING & BECOMING A MEMBER @21WIRE.TV
***
Author Shawn Helton is Associate Editor of 21st Century Wire, as well as an independent media forensic analyst specializing in criminal investigations and media coverage from war theaters. 
Welcome to the
JAH "The Truth about..." Page.
 
In speaking of the Truth, Henry David Thoreau once said: "Any Truth is better than make-believe ... rather than love, than money, than fame, give me Truth."
 Winston Churchill is quoted as having once said: "Most people, sometime in their lives, stumble across truth. Most jump up, brush themselves off, and hurry on about their business as if nothing had happened." Just as a bell that has been rung cannot be "unrung", the annoying problem with the Truth is that, once you learn it, you can not"unlearn" it.
 
 
Please click one of the following titles to find the ultimate Truth of your chosen subject. Or, if you wish, you can view previews of the subjects in this section by "CLICKING HERE" to visit the previews section or clicking on the preview icon -  below each of the following titles. The  Icon will bring you back to this menu.
 
 
The Truth about. . .
http://jahtruth.net/truth.htm

Hugh Jackman Movie

Logan Official Trailer 1 (2017) - Hugh Jackman Movie
(MA) Mature Accompanied
Restrictions apply to persons under the age of 15
This classification is legally restricted. Children under
15 will not be permitted to see (MA) movies unless
in the company of a parent or adult guardian.
Cinema staff may ask for proof of age identification,
and are entitled to refuse service if this is not produced.

Set in the future of 2024, Logan and Professor Charles Xavier must cope with the loss of the X-Men when a corporation lead by Nathaniel Essex is destroying the world leaving it to destruction, with Logan's healing abilities slowly fading away and Xavier's Alzheimer's forcing him to forget. Logan must defeat Nathaniel Essex with the help of a young girl named Laura Kinney, a female clone of Wolverine.

I SAW THIS MOVIE ON FRIDAY NIGHT AND IT IS BY FAR THE WORST X-RATED OF X-MEN EVER MADE.
IT IS A BLOOD THIRSTY, CHILD KILLING!!!!!!!!! MORALLY CORRUPT WAR PROFILE RUBBISH, UTTER CRAP FULL OF KILLING, MURDER AND BRAIN WASHING OF THE NEXT GENERATION TO COME.

THIS MOVIE IS NOT FIT FOR EVEN R18
(R) Restricted
Restricted to adults 18 years and over
Access is legally restricted to persons only aged 18 years
or over. No person under 18 years of age will be allowed
in to the cinema at all. Cinema staffs are entitled to
Refuse service to any person unable to prove that
They are 18 years of age or above.

DO NOT LET YOUR YOUNG ADULTS WATCH THIS.
IT IS A GLORICATION FOR ISIS, WHO KILLS YOU BY CHOPPING OFF HEADS OF HUMANS.
NO REGARDS FOR YOU AS A SPIRITUAL PERSON
IT IS TOTAL SATANTIC AND EVIL PERSONICATION OF THE EVIL DEVIL PLANS FOR ONE WORLD GOVERNMENT
WITHOUT FATHER GOD AND HIS SON, THEE CHRIST
THEY KILL WHOEVER BY CHOPPING OFF ALL THERE HEADS
JUST GETTING YOU READY FOR THE REAPING OF AN EVIL HARVAST

UK Parliament Car Accident Crime Scene Instantaneously Labelled “Terrorist Attack”- No Investigation Needed!

By Bernie Suarez

Yes, here we go again. An accident scene with elements suggesting a knife wielding lunatic is said to have attacked several police officers is NOT being labeled a crime. Before any reasonable analysis or investigation of the crime scene/accident scene it is being immediately seized upon by the politicians and the new world order thirsty mainstream media and within minutes the scene has been “declared” a “terrorist attack”.

Without entertaining the possibility that people still do commit crimes in 2017 and people still do act crazy, get angry, get even, get drunk and not to mention hatred for police, drugs or even mind control. These are just some of the many many possibilities every good detective must consider when analyzing a crime scene, right? Unfortunately for all the crime scene detectives out there, sorry your job is apparently no longer needed. You see, because the politicians and mainstream media already seem to know everything going on within minutes. It has been quickly determined that the car accident and knife event was “terrorism”, according to Britain’s “most senior” counter-terrorism officer. Given the synthetic nature of most “terrorism” everyone should be thinking, oh no, not again.

“We’ve declared this as a terrorist incident and the counter-terrorism command are carrying out a full-scale investigation into the events today,” Mark Rowley, Britain’s most senior counter-terrorism officer, told reporters.

“The attack started when a car was driven over Westminster Bridge, hitting and injuring a number of members of the public, also including three police officers.

“A car then crashed near to parliament and at least one man, armed with a knife continued the attack and tried to enter parliament.”

Reuters reporters inside parliament at the time heard loud bangs and shortly afterwards saw the knifeman and the stabbed policeman lying on the ground in a courtyard within the gates of parliament.

A Reuters photographer saw at least a dozen people injured on the bridge. His photographs showed people lying on the ground, some of them bleeding heavily and one under a bus.

We are in the year 2017 and by now if anyone can’t smell a dead rat here then you need an awakening to reality in the worst way. The bottom line is that the politicians, the Intelligence community and their mainstream media NEED terrorism like a vampire needs blood. They are salivating like hungry animals drooling at the need for “terrorism” because “terrorism” satisfies their need to move their new world order plans forward. No “terrorism” and no new world order. That simple! I’ve been saying this for years.
Also “terrorism” perfectly allows them to distract the general public from whatever else is happening. Perhaps Israel attacking locations in Syria? Perhaps there is another massive WikiLeaks database about to be released to the public? Is this the deep state testing Trump out? Maybe it’s something much worse. Who knows, but the world and humanity is sick of the “terrorism” card.

Like the usual Hollywood movie-style desired and orchestrated drama in an attempt to engage the masses and get them to care and be afraid, notice how the mainstream media pulls the accessory card. That is, adding bits and pieces to the story to bring it to life like letting you know that Trump “made a phone call” to UK Prime Minister Theresa May. Also notice all the add-on unnecessary comments, declarations and statements we’ve heard too much of since 9/11, all intended to engage the reader, rev up the viewer and make the story more purposeful. The purpose? To make you afraid, angry and more willing to accept whatever military “solutions” they will suggest later.

The House of Commons, which was in session at the time, was suspended and lawmakers were asked to stay inside.

Interior minister Amber Rudd said the government’s top priority was people’s security.

“The British people will be united in working together to defeat those who would harm our shared values: values of democracy, tolerance and the rule of law,” she said.

May spoke to U.S. President Donald Trump about the attack, the White House said.

U.S. Secretary of State Rex Tillerson condemned what he described as “horrific acts of violence.”

This little device delivers turnkey Internet privacy and security (Ad)

Ooh, scary! More descriptions of the scene with the date and location of the attack appearing to be the only evidence posed so far as proof that this was a “terror” attack and not just a crime.

The attack took place on the first anniversary of attacks by Islamist militants that killed 32 people in Brussels…

Britain is on its second-highest alert level of “severe” meaning an attack by militants is considered highly likely.

In May 2013, two British Islamists stabbed to death soldier Lee Rigby on a street in southeast London.

In July 2005, four British Islamists killed 52 commuters and themselves in suicide bombings on the British capital’s transport system in what was London’s worst peacetime attack.

Wednesday’s attack was near the location where, in 1979, Airey Neave, a Member of Parliament who was a close aide to Margaret Thatcher, was killed by a car-bomb claimed by the Irish National Liberation Army.

For anyone new to the truth-seeking world or independent media and for anyone wondering how to analyze these kinds of scenes labeled “terrorism” in lightning speed, here’s what you need to know.

This is a story every single politician and Intelligence agent pushing for the new world order wants. Today is a great day for them. Is this scene entirely staged? I have no idea but it would not surprise me if independent investigators piece it all together and discover that it is.

Everyone, regardless of who you are, should first shut off the mainstream media and tackle this scene for yourself. The most important thing to look for is not what some politician or official TELLS you happened, and certainly not what a politician or the mainstream media themselves thinks about this. This is a great opportunity to practice your critical thinking skills and the first thing you want to do is to look for the three-dimensional reality of the incident. Look for it until you find it. Learn how to differentiate between two-dimensional reality and three (or full) dimensional reality with organic, real evidence that fits. Know the difference between verbal claims that could be coming from a crisis actor, politician claims and comments, staged photos and even staged cell phone or funny (or should I say fuzzy) looking CCTV footage versus a massive body of fully organic and very real reproducible, interconnecting and interdependent factors that will all verify the reality of this event.

I assume blindly that this event was real. The only thing so far that I’m questioning is the speed and certainty in labeling this event “terrorism” on the part of all the politicians, officials and the Intelligence community’s mainstream media. That alone should be enough to get you thinking questioning and wondering. If you understand this then you understand how modern-day fakery and false flag events work. And, yes, some people in the alternative media make a big deal about people who confuse “false flags” with “fake events”. My friends, who cares! It’s a staged event in one way or another and the only thing that matters is that you know it’s not organic and thus you will not be fooled. This is the nature of our pursuit of truth in a world of lies and deceit. Yes, perhaps for some it’s time to swallow the red pill.

Bernie is a revolutionary writer with a background in medicine, psychology, and information technology. He is the author of The Art of Overcoming the New World Order and has written numerous articles over the years about freedom, government corruption and conspiracies, and solutions. Bernie is also the creator of the Truth and Art TV project where he shares articles and videos about issues that raise our consciousness and offer solutions to our current problems. As a musician and artist his efforts are designed to appeal to intellectuals, working class and artists alike and to encourage others to fearlessly and joyfully stand for truth. His goal is to expose government tactics of propaganda fear and deception and to address the psychology of dealing with the rising new world order. He is also a former U.S. Marine who believes it is our duty to stand for and defend the U.S. Constitution against all enemies foreign and domestic. He believes information and awareness is the first step toward being free from the control system which now threatens humanity. He believes love conquers all fear and it is up to each and every one of us to manifest the solutions and the change that you want to see in this world because doing this is what will ensure victory and restoration of the human race and offer hope to future generations.

Logan Official Trailer 1 (2017) - Hugh Jackman Movie IS perfect to bring in one world government too power with all the brain washing that is in the movie too all the zombies, vampires and blood sucking parasites wake up.!!!!!!!!!!@@@##$$%$%%%%^BEFORE IT IS TOO LATE

http://jahtruth.net/defin.htm

http://jahtruth.net/truth.htm

Welcome to the
JAH "The Truth about..." Page.
 
In speaking of the Truth, Henry David Thoreau once said: "Any Truth is better than make-believe ... rather than love, than money, than fame, give me Truth."
 Winston Churchill is quoted as having once said: "Most people, sometime in their lives, stumble across truth. Most jump up, brush themselves off, and hurry on about their business as if nothing had happened." Just as a bell that has been rung cannot be "unrung", the annoying problem with the Truth is that, once you learn it, you can not"unlearn" it.
 
 
Please click one of the following titles to find the ultimate Truth of your chosen subject. Or, if you wish, you can view previews of the subjects in this section by "CLICKING HERE" to visit the previews section or clicking on the preview icon -  below each of the following titles. The  Icon will bring you back to this menu.
 
 
The Truth about. . .




Thursday, 9 March 2017

"The Largest Ever Publication Of Confidential CIA Documents"; Another Snowden Emerges

Wikileaks Unveils 'Vault 7': "The Largest Ever Publication Of Confidential CIA Documents"; Another Snowden Emerges


Picture
By Tyler Durden

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA's Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:
Picture

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, "would rock the technology world", the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”
Another profound revelation is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
"With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."
As Kim Dotcom summarizes this finding, "CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE"

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, "CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones" and added " CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update"


But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.
The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.
Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As Kim Dotcom chimed in on Twitter, "CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones" and added " CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update"