Starting with first principles and the scientific method
America First Books
Featuring ebooks that find a truer path in uncertain times

William B. Fox Archive
Mission of Conscience Book I Contents


Chapter 8

9/11 Patterns
As Future False Flag Indicators

First posted Jan 2009
Last revised and updated 30 Nov 2010

Having identified enough anomalies to become convinced that 9/11 was indeed a false flag attack, and furthermore, having identified the macro social, economic, and political factors that motivate the power elite to run these evil events against fellow Americans, our next task is to analyze 9/11 and other historical false flag events to uncover the patterns that enable us to predict future false attempts.
If we can predict, we can also
, especially by making adroit use of the free Internet. 
First, we can distill false flag patterns that tend to occur before, during, and after the event.  Once we get a sense of how they relate to each other,  we can then distill further the leading indicators that can help to make a prediction.
Kent Kentroversy, a late member of Ghost Troop,  put together the following list of false flag characteristics:

All False-Flag Terror Attacks have some of or all of the following characteristics; which I now present to the reader, explaining in brief detail each of the items on the list:

  1. The terror incident or attack can be stated in terms of the Hegelian Dialectic, which is now more commonly known as Problem-Reaction-Solution. The recent experience in the USA has been that these terrorist attacks have been used as an excuse to take away freedoms previously enjoyed by every American citizen, as heinous laws such as the USA PATRIOT ACT are passed for our own good, which has NOTHING to do with patriotism, by the way!
  2. The Globalist Agenda has in some way progressed by the false-flag event.
  3. The event is but the latest in a long, prior history of domestic terror attacks.
  4. Suspects are named almost IMMEDIATELY after event, but NEVER enough in advance, as to actually prevent the attack from happening. If there is foreknowledge, unless it benefits the globalist agenda, the evidence is simply ignored.
  5. News media replays endlessly, video of the precise moment of the disaster. This is shown ad nauseum for the purpose of traumatizing the public. This behavior falls under the category of psychological operation (psy-op).
  6. Shortly after the attack, freedom-destroying laws are rushed through Congress, typically in the middle of the night, or on a weekend, or any other day or time of day they feel will not draw too much attention, until the law is passed, when it is simply too late to do anything to stop it. If any member of Congress does not agree with the passage of the freedom-destroying law(s), they are IMMEDIATELY attacked, and their patriotism is questioned by the establishment regime in power. If the true patriotic Congressperson weathers the storm that was used to attack their credibility, they are then said to be SOFT ON CRIME, or words to that effect.
  7. Aspects of the attack draw upon tried and true methods of past attacks. Whether this is part of the attack itself, the propaganda surrounding it, or the desensitizing and preparation of the audience, the current attack will seem familiar, as it mimics aspects of past attacks. An example of this is the manufactured strife in the Gaza Strip area, between Israel and Palestine . Another example of this are the 1993 and 2001 World Trade Center attacks, which were horrible incidents of mass murder, and the 2001 attack was perhaps the largest-ever case of insurance fraud.
  8. Simultaneous 'terror drills' or 'public safety drills' take place at the precise time of the false-flag event. This is done for two reasons, primarily. The first, is to draw manpower away from readiness to respond to 'real' attack. The second reason, is so there is an ability for the 'drill' to GO LIVE at the last moment. This confuses the readiness and response of systems like the national air traffic controllers on 9/11, who were completely nullified by the mornings' events, and were mostly left staring at dummy blips on their radar screens, as the 9/11 scenario went down right under their noses.
  9. Eye-witness reports vary greatly from the establishment version of events of what really took place during the attack. Witnesses who conflict with or contradict the official-fiction of the attack are badgered into silence by law enforcement and FBI special agents. A threat assessment is done as per manner of course, and if the dissenting voice is found to be damaging to the official-fiction of events, they could find themselves victim of character assassination, have their communications fall under surveillance, or have their home broken into. Those who pose the greatest threat to the equilibrium of the status quo, are simply 'suicided.'

    Typical tactics used against someone who refuses to bend to the government's Official-Fiction of an event are subject to Ad Hominem attacks, Straw Man arguments, and other types of character assassination. The Ad Hominem attack uses emotion to enflame a debate, where the emotional attack replaces the facts being presented by one side. The Straw Man is a type of rhetoric, where an individual creates an easily defeated point of view or a bogus claim designed to detour the debate into areas where credibility can be easily attacked.
  10. Surveillance cameras in the immediate area of the attack are turned off, become mysteriously broken, or are simply turned away from the action. If anyone notices, this will be blamed on pranksters, but nevertheless, it still benefits those carrying out the dirty deed.
  11. This next one is extremely important ...

    The LIVE news broadcasts in the city of the attack, in the first two hours after the attack, form the most important evidence being broadcast without the filter of editors and censors. In the first moments after 9/11 went down, the newspeople were speaking about a "series of bomb explosions," as were those in Oklahoma City six years earlier.
    But, as the minutes become hours, the official story is created right before the nations' eyes and ears. Once the propagandists get their hands on things, the whole story changes, and the OFFICIAL FICTION of the event emerges, quietly replacing damning eyewitness testimony.
  12. As soon as it is possible after the attack, the site is LOCKED-DOWN. No outside investigators are allowed anywhere near the site, and those who try, are almost always arrested. Truthful investigation is NOT allowed, and all physical evidence is DESTROYED ASAP.
  13. Investigation by an empanelled commission of government traitors is grudgingly carried out, with the effect being that of the proverbial fox guarding the henhouse. This is easily proven by the number of days it took to the government to begin its' investigation in the following disasters:

    Sinking of the Titanic = 6 days

    JFK Assassination = 7 days

    Challenger Shuttle Disaster = 7 days

    Pearl Harbor Attack = 9 days

    The Events of 9/11 = 441 days


  1. The sudden appearance of BOGUS EVIDENCE occurs, which is done to prop up the official-fiction of an event, in an attempt to bolster the event's believability. An example of items in this category include alleged hijacker passports that survived the 9/11 tower crash infernos, and the backyard photos of Lee Harvey Oswald, which convicted him of the JFK murder in the eyes of the public, even though the photos were faked composites, with Oswald's head on another person's body. The aspects of this so-called evidence that proves it to be false is ignored, and NEVER mentioned.

    Documents released in the late 1990's via the Freedom of Information Act show that Oswald was employed by the CIA, and was acting on their behalf as a PATSY on November 22, 1963. This, of course, was not mentioned, which provided the JFK public execution with the very definition of a coup d'etat against this nation. Also not mentioned was the fact that those whose passports were allegedly found in the street after 9/11, were working at Pensacola Naval Air Station, and under the purview of Naval Intelligence.
  2. A bogus investigation is conducted by a government panel riddled with conflicts of interest, such as happened with BOTH the Warren Commission and the 9/11 Commission. Only evidence that supports the government's own official-fiction of the event is considered, while everything that proves the contrary is IGNORED. William Rodriguez, the last living person out of either tower and the TRUE HERO of 9/11, was completely ignored by the 9/11 Commission, and this was because his testimony included hearing BOMBS going off in the basement BEFORE the plane hit the building he was working in.
  3. The head terrorist is trotted out at opportune moments, such as when Bush Jr's approval ratings fall. Osama Bin Laden, in spite of being dead, has delivered UNDATED video tapes to the U.S. government, where he threatens further terror attacks. Sidemen such as Abu Musab al-Zarqawi are murdered multiple times, to extract the maximum public relations effect out of his death.

    In the case of Timothy McVeigh, who hails from the Buffalo , New York USA area, his execution appears to his family to have been a staged event. After speaking with a member of his family, I was told that he was taken into protective custody, had since been given plastic surgery, and he now lives and works somewhere in South America, where he is known by another name and background. No member of his family had gone to the execution, and this is because they were told by McVeigh NOT TO ATTEND. I believe this family member more than I believe the government of McVeigh's fate. Like Oswald, he too had begun work in the military intelligence community.
  4. Further terrorists are recruited through the intelligence agencies, such as the CIA, MI5, and MI6, which then carry out further attacks. And the cycle endlessly repeats ...

The following are examples of basic 9/11 patterns identified by Capt Eric May that consist of leading indicators.

False flag operations typically reflect major geopolitical interests

The acronym often bandied about at web sites ranging from anarcho-libertarian to white nationalist to explain the justification for 9-11 and the subsequent American invasions of Afghanistan and Iraq is OIL: Oil , Israel , and Logistical Bases.
I have already discussed this issue at the beginning of Chapter 4.  I pointed out that the real ultimate grand strategy behind 9-11 may in fact be different from conventional wisdom about “O.I.L.” In fact, I argue that the war for OIL, reflects merely a resurrection of obsolete 19th century “Great Game” thinking. Among other things, "O.I.L" underplays the greater strategic importance of the mobile robotics and computer revolution, the possibilty of developing alternative energy sources with lower total costs, the need to preferentially invest in maintaining a productive white middle class and strong domestic industrial base, the need to protect sovereignty and other national interests in the face of reckless Zionist warmongoring, and the importance of maintaining a certain degree of good will and respect for American values on the global stage.
To be sure, the "O.I.L." grand strategy does suit the selfish interests of certain large oil companies and Israel to grab major oil-related concessions in the Middle East , ranging from pipeline rights to control of oil fields.  It certainly suits the interests of certain major “military-industrial complex” corporations to feast on a massive diet of government war spending. Lastly, it suits the financial interests who have de-industrialized America to force oil-producing countries to trade in dollars in order to artificially bolster the value of dollar against other currencies.
While all of this is true, I argue that for far-sighted individuals, all these things are not valid ultimate American grand strategic objectives.  In fact, by merely focusing on these “lower” strategic objectives, LtGen William Odom was probably correct that the Bush administration committed ‘the greatest strategic disaster in American history.”
Capt. May and I argue that the ultimate grand strategic objective pursued by the America’s ultra paranoid Zionist elite is to use the war for OIL as a pretext to backdoor the creation of an Orwellian police state in America in order to stay in power, particularly after having made such a mess of America in recent decades by promulgating out of control government spending, the loss of America’s industrial base, and out of control Third World immigration.  If this is true, the incessant martial law training, terror conditioning, and legislative attempts to impose more “hate crime” laws in America coinciding with the pro-OIL campaigns in the Middle East make much more sense.


False flag operations typically utilize major military exercises or other key events

According to Webster Tarpley, author of 9/11 Synthetic Terror: Made in USA, 9-11 coincided with as many as 25 different military exercises. This overlap performed many functions:
1) It creates various forms of exercise "chatter" that can cause real defense systems to drop their guard, mistaking symptoms of a real attack with exercise events.
2)  It provides a perfect alibi for false flag operators to be in control rooms managing everything that is going on.  This includes actively managing the scheduled military exercises, the false flag operations, and the military and national media response to the false flag attack – all at the same time.  The most famous example is the “Cheney in the bunker” episode on 9/11 described in Capt. May’s aforementioned article.  
3) If false flag operators get caught in flagrante delicto (that is, they botch their part of the operation and get arrested by police while carrying out suspicious or destructive behavior), they have an alibi that they were "only participating in an exercise" rather than having to admit that they were really "deliberately trying to murder fellow Americans," which of course is what they are really doing.
One of the biggest nightmares for a false flag operator is the possibility that some military or police unit “outside the loop” will stumble upon the conspiracy and not only thwart it, but will also start a resistance operation that culminates in the arrest of false flaggers for high crimes and treason.  
In contrast, when a false flag operation is run during a group of military exercises, everything can be choreographed in advance to fit together seamlessly.  Even military and police units who are “outside the loop” can be instructed in advance on how to react. If they stumble on the false flag attack in progress, they can be told that it is just part of the military exercise and to back off.   
Despite all this, when a fighter shot down flight 93 outside Shanksville ,  Pennsylvania that probably reflected a unit acting “outside the loop.”  Other Air Force and Air National Guard units were ordered to ignore flying objects vectoring in on 9/11 target buildings.
3) It provides a perfect alibi to actually create vulnerabilities in America ’s defense systems that enable the false flag attacks to succeed. 
During 9/11, significant Air Force fighter interceptor assets were redeployed to Alaska on a training exercise.  Mysterious AWACs-type aircraft were allowed to hover over NYC and Washington D.C. air space.  As previously mentioned, Air Force interceptors were ordered to ignore standard operating procedures and stand down as various commercial airlines made extreme deviations from their flight plans.
4) Money used to fund an exercise can also be used to fund the false flag terror attack.
5) Once the false flag attack is consummated, their originators can compromise military personnel as de facto accomplices.  Capt May has explained how this process might work:
First, after an exercise scenario has gone “live” with an actual false flag attack, a “handler” can step in to tell military personnel, "What a coincidence! We did not know it would happen the way it did, but thank God for the exercise because at least now we were able to respond once the disaster took place better than if there was no exercise.”
99% of military personnel will think “Gee, isn’t it great that our intelligence agencies are just so wonderfully competent that they can smell the Al Qaeda threat and prepare us through these exercises in such a timely manner?”  
To such individuals, it is totally unthinkable that the government could simultaneously run an exercise to prepare for a terror attack, and be the terrorists at the same time.  They buy the establishment alibi hook, line, and sinker.
Secondly, the handlers can offer both a “carrot” and a ‘stick” to keep everyone in line.   The “carrot” comes when the establishment lavishes promotions, commendations, and other benefits (or “bennies”) on personnel who handle the terror attacks in a politically correct, bureaucratically-approved manner. 
The flip side is the “stick,” namely the unspoken threat that anyone who opens his mouth and discusses anomalies will not only lose his “bennies,” but perhaps suffer much worse.  Please recollect how Captain May received a direct death threat when he dared to question the Battle of Baghdad cover-up in the office of the  Ft. Stewart “Chaplain” in Chapter 3.
6)  The use of exercises makes it possible to create a “plot within the plot” that morally compromises people at the lower levels.
In Chapter 17 of this book I provide an excellent example when I extensively quote from Michael Collins Piper’s book The Judas Goats, which in turn draws upon his brilliant analysis in Final Judgment: The Missing Link in the JFK Assassination.
Piper believes that part of the CIA was led to believe that it was conducting a fake assassination attempt against John F. Kennedy that could be plausibly blamed on Fidel Castro. The attempt was meant to fail, but nevertheless provide a pretext to invade Cuba and throw out the Communists.  What the lower level CIA operatives did not realize is that at the highest echelon, America ’s Jewish bosses and the Mossad had every intention of turning the operation live.   Once Kennedy was killed, lower level CIA operatives were so compromised that they felt they had to keep their mouths shut.  Obviously most CIA employees with feelings of loyalty to “the company” would feel terribly inhibited about going public with the story that they were part of a terribly botched operation intended to be a false flag operation to justify an invasion of a foreign country.
Therefore, military exercises are that much more useful for false flag operators when they can embed within them “gray area” operations.  
7) A military exercise or other "key events" (such as a NASA launch or Congressional vote on a major bill) can provide excellent cover for conspirators to covertly communicate with each while appearing to engage in small talk on current issues. One can easily discuss these types of folding events and voice an opinion about some aspect with phrases such as "I think it will be a go" or "I think it will not work out" and evesdroppers will be clueless that one might actually be using codespeak to describe something elese.
False flag operations have lots of players and moving parts. Many things can go wrong at the last moment. Capt. May is a key example of someone who has deliberately tried to make things go wrong –and who has probably succeeded. If the top conspirators decide that they have to abort or make drastic hasty improvisations, they may not have the luxury of using secure communications. Imagine a hypothetical Vice President caught in a command bunker where he is surrounded by military personnel who are totally clueless about the conspiracy. The same could hold true for a hypothetical Department of Homeland Security Director who could find him or herself out in the field surrounded by clueless lower level police officials and FBI agents. Yet the VP, DHS Director, and their Mossad-CIA friends may have to make sudden joint decisions over totally unsecure cell phones or land lines. If the conspirators know in advance that “health care reform” is code speak for “911 to be,” then one can simply get chatty about the health care reform issue and then say very-matter-of-factly that he thinks the bill should be killed. This message is immediately understood on the other end as “abort the next 911.” If the conspirators have been careful to sprinkle prior unsecure communications with frivolous chatter about this same event, it may become impossible for surveillance parties to detect anything particularly unusual.. And even if they are wise to this technique, it may still be very hard to prove in a court of law that “health care reform” was used as code speak if no co-conspirators spill the beans.

False Flag operators typically require local control

The plutocratic handlers of the CIA-Mossad team typically acquire control of most major media within a target area.  In addition, they control key individuals in the local government and police. 
Control exists in many forms, on many different levels.  Let us start with the macro social level. 
Captain May likes to talk about the “5 P’s” of control in a society.  Politics, Police, Press, Preachers, and Professors.  
In his book Viper’s Venom, p. 302, Col Donn de Grand Pre uses a similar acronym of the “7 M’s”:  Money, Media, Markets, Medical, Mind, Morals, and Muscle (military). 
In Chapter 6, I talk about how one can abstract the McKinsey 7-S paradigm (shared values, structure, systems, style, staff, skills, strategy) that describes key elements for small business success to also apply towards understanding the key elements of popular sovereignty and nationalism.
On a broad conceptual level, I think that we are all basically talking about the same thing, just approaching the proverbial elephant (from the blind man and elephant story) from slightly different angles.
From the vantage point of false flag operators, compromised government leaders are necessary to stymie honest investigations during and after a false flag attacks.  Corrupt and local media are necessary to censor honest reporting and analysis. 
As an example of another “P” from Captain May’s “5-P” paradigm, in Chapter 3, we learned about how the Bush administration infiltrated the 3rd Infantry Division’s chaplain’s office.  On top of this, the Jewish lobby has played an enormous role in pushing the theology of American Christians towards Christian Zionism.  
It is not necessary for false flag operators to have complete control in any of these areas.  The main objective is to control mainstream opinion and marginalize dissenters.   So long as dissenters can be kept fragmented and incapable of building momentum, they are usually not a serious threat.
Unlike the old Soviet system, which relied heavily on brute force and detention centers, the power elite in America has typically relied on a much more sophisticated “mobile defense in depth” strategy to contain dissent. 
This terminology comes from basic infantry tactics, where a defender typically chooses either a series of fixed lines to form “perimeter” defensive position, similar to World War I trench lines, or where his defensive units are kept scattered, camouflaged, constantly shifting, and deployed in considerable depth away from the front, known as the “mobile defense.” 
Regarding the perimeter defense approach, usually an attacker gets hit with full defensive firepower the moment he begins to breach static defensive lines.  In regard to the defense in depth, the defender often deliberately delays deploying his defensive firepower as the enemy penetrates deeper and deeper into his territory. The defender might escalate his firepower as the enemy penetrates deeper, or wait for strategic moments to utilize ambushes or launch intense counterattacks.
In America , dissenters are generally free to give talks to small groups and circulate literature among small groups.  However, as their influence grows, the power elite tactics become increasingly more vicious, forceful, and open.  Our hidden rulers usually start with very subtle methods such as quietly working behind the scenes to jeopardize relationships between dissenters and their employers, landlords, and other influential people.  At the next level, they use smear articles in local papers, IRS harassment audits, and denunciations by COINTELPRO infiltrators.  The next level after this might consist of such measures as mysterious airplane crashes and “suiciding”, unexplained crime “hits,” or false flag assassinations.   
These tactics have been effective in America because of the unique nature of American society.  For starters, it is sociologically very fragmented.  Most white groups are confused as a result of political correctness schooling in federally-funded schools, or as a consequence of “melting pot” interethnic marriage.  Most American patriots are simply overwhelmed by the degree of diversity in ethnicities, national origins, religions, innate temperamental traits, and other key drivers of core values.  There is such a thing as too much diversity, and the author of this book has been amazed from his own experiences observing and working with patriotic and other conservative groups how anemic, disorganized, petty, underfunded, and dysfunctional most of them tend to be.  Secondly, America is a very materialistic society, where net worth is usually upheld as a prime yardstick of success.   The threat of getting one’s career derailed is typically enough to cow most Americans into silence, particularly in times when the economy is good.  Third, most Americans have been brainwashed with a false sense of confidence regarding the effectiveness of their two party system in producing real change, which causes many would-be activists to pass the buck to an abstraction called “the system” rather than take personal responsibility for organizing sustain determined action. 
Blackmail and bribery are two important tools for local control.  Zionist groups such as the ADL keep files and dossiers on emerging leaders in communities around America .   In many political districts, it is impossible to get elected unless someone is vulnerable to blackmail.  
The biggest advantage of the power elite is its money. Although they have only somewhere between 3-5% of the total population, Jews make up half the billionaires.  In American society, money goes a long way towards pushing people around.
First, let us examine why high level Jewish influence is also a strong indicator of Mossad-friendly characteristics.  Mossad-CIA is heavily connected to Jewish-controlled national media, Jewish plutocracy, Jewish politicians, and of course is run by the Israeli government. We learn from Victor Ostrovsky’s By Way of Deception: The Making and Unmaking of a Mossad Officer that one reason why the Mossad is considered the most fiercely effective espionage operation in the world with only 2,000 full time employees is because it can rely on the cooperation of most Jews around the world. According to the Sept 26, 2008 Jerusalem Post, this comes to 13.3 million people. 
Therefore, Jewish control of local media and local government in America is an important indicator that a city may be particularly vulnerable to Mossad-CIA infiltration, corruption, and false flag operations.
In his 2008 interviews, former Minnesota governor Jesse Ventura revealed not only the pettiness, vindictiveness, and censorship of mainstream media, but also an over watch role by the CIA in the governor’s office right in the middle of America ’s heartland.  Of course the CIA is heavily infiltrated and compromised by the Mossad and the Jewish Lobby, so it may be more accurate to talk about “Mossad-CIA” than just “CIA.”
In Ventura ’s 2 April 2008 interview with Alex Jones, he stated:

Alex Jones: This book [by former Minnesota Governor Jesse Ventura] is titled Don't Start the Revolution Without Me and it is in stores everywhere. Today he is launching his tour yesterday. We are honored to have him. But you can also call it the "Adventures of Jesse Ventura" because it is quite a page-turner because you have had quite a full life. Why did you decide to write this particular style of book.
Jesse Ventura: Well first of all Alex I want to explain that I had two New York Times best-sellers before this book, and of course they gave me huge front money to write that book, and it was interesting --I will give you a little inside info-- this book we wrote it down in Mexico. We brought the full transcript back, [co-author]  Dick Russell and I, we were turned down by 24 publishers. And I already had two New York Times best sellers. I found that pretty interesting.
Jones: You know, are you breaking that here, because I did quite a bit of research for this interview and I had not seen that. Is this the first time you have told this story?
Ventura : Yes. Absolutely. We got turned down by 24 publishers. Finally Skyhorse, which is a small publishing company in New York picked it up, but the good thing is we are with Norton Distribution, which is the huge distributor, and that is the key. Once you get published, you need to get it to a good distributor and they are one of the biggest, so it will be everywhere. But you know I wrote this book, I did not take any big front money because I truly wanted this book out there. I did not care about the money on this book. I wanted to tell my story. I wanted to tell about the things that happened when I was in office, because Alex I don't know if you read this, but MSNBC in essence censored me. Because when I came out of office, I was the hottest commodity out there. I was the voice of the Independent. The CNN wanted me, MSNBC wanted me, FOX News wanted me. I signed with MSNBC and then essentially they would not even put me on the air. My contract stated that I could not do any news shows or any cable or satellite, so I believe I was silenced on purpose.
Jones: Let us stop right there, Governor Ventura. This is all amazing bombshells you are dropping on us. First, you had two super New York Times best sellers?
Ventura : Right.
Jones: You have been the dark horse candidate of the people in Minnesota . You spurred Schwarzenegger to run and caused that whole phenomenon, and he has basically admitted it seeing your success, he went for it. You have this amazing history. Hollywood star, and you went to twenty plus publishers, and they said no, and you went to a new publisher that just fired up in 2007, I was reading on their site, that is a story of censorship alone and their fear of your message. But now we are learning, and you mention in your book, of course I get into it, but there is so much to the book I had forgotten about that, that MSNBC literally muzzled you, and used that contract to block you from going anywhere else.
Jesse Ventura:  Exactly, they would not put me on the air, and the reason for it was because I was opposed to the Iraq War before it started. If you think back, do you remember when Phil Donahue had that short-lived show on MSNBC?
Alex Jones: And they kicked him off. Yes.
Ventura : Well Phil was the highest-rated show they had. Have you ever Alex heard of a network pulling its highest rated show?
Jones: It is suicide.
Ventura : Well, you don't do that. They pulled Phil, and then they would not allow me on, and it was because Phil and I were both questioning the reasons why are we going into Iraq and believe 9/11, and what they told us, there was not one Iraqi involved in it. Iraq did nothing to us.
Jones: That is right, there are still some neo-con followers of what I call fake conservative news shows that still believe Saddam was behind the attack when Bush and Cheney admit he had nothing to do with it and actually fought against the Wahabbists in Saudi Arabia known as Al Qaeda.
Ventura : Well I don't know if you can ever get Dick Cheney to admit that. They still like to refer back and try to tie the two together all the time somehow.

Ventura made another chilling disclosure in his September 2008 video. Contrary to its mission statement which precludes domestic spying, the CIA has implanted high-ranking agents within state governments across America .  Ventura was interrogated by 23 members of the intelligence agency while he was the Governor of Minnesota.  He was even tailed by CIA agents while in Cuba visiting head of State Fidel Castro.   
Ventura said that the CIA interrogated him because it was concerned about the meaning of his success as an independent candidate for Governor.  The CIA is concerned about predicting internal political trends.
Ventura is actually only scratching the surface by mentioning the CIA.  There are many other shadow controlling entities in America .  For example, at my web site, in the Rev. Ted Pike archive, I have considerable background on the Jewish ADL, which is a de facto secret police organization.  Also, take a look at articles by Michael Collins Piper at www.mikepiperreportcom about how Israeli firms have been awarded contracts to provide security for nuclear plants and manage major telecommunications networks.    Also please consider “How Mossad Controls Our Political Parties” by Chris Bollyn.  Lastly, please consider at the beginning of Chapter 10, Capt. Jeff Cross’ description of the hidden monster that is the Federal Emergency Management Agency (FEMA). 

Former Mossad officer Victor Ostrovsky explains how the Mossad first ingratiates itself, then asserts a controlling influence on reporters


Last, but not least, Mossad-CIA uses hardball methods of control on the individual level.
A good starting point to address individual control is the acronym SMICE used by FBI counterintelligence to describe leverage points used to recruit people for nefarious purposes.  SMICE stands for Sex, Money, Ideology, Compromise, and Ego.  Any of these factors may be manipulated by Mossad-CIA to cause Americans to betray their own country.
Former FBI Los Angeles district director Ted Gunderson at has done a lot of excellent work publicly exposing the ways in which child sex rings are used to compromise public officials.  At his web site he carried the following 16 November 2005 commentary by former Naval Intelligence Officer Wayne Madsen, former intelligence officer:

-- The Bush administration's "Don't Ask, Don't Tell Policy." U.S. intelligence sources who served in Iraq report that after photos from Abu Ghraib prison surfaced of naked male prisoners who were forced by their U.S. guards to form human pyramids and masturbate, the U.S. military went into total denial mode. "It was a 'don't ask, don't tell policy,'" according to one intelligence source who was assigned to both the Abu Ghraib and Camp Bucca prisons. Federal Judge Alvin Hellerstein has ordered the Pentagon to release to the American Civil Liberties Union 74 photos and 3 videotapes taken at Abu Ghraib in 2003. However, the Pentagon is resisting the judge's order.
There is good reason for the embarrassment of the Pentagon in the affair. The orders to take the sexually-oriented photos and videos, some of which involve teenage Iraqi boys and girls and sodomization by their guards, came directly from a pedophile and closeted male homosexual ring operating in the White House, according to the intelligence sources. Copies of the tapes and photos were sent directly to the White House for the entertainment of senior members of the Bush White House, including officials in the Vice President's office and the Executive Office of the President.
When the photos at Abu Ghraib became public, the senior military command structure in Iraq "went nuts," according to an individual who witnessed the cover-up of the affair. "They ordered an immediate policy of denial about details of the prisoner abuse at Abu Ghraib," said the source. The source added that senior officers were disgusted that lower ranking guards were prosecuted and jailed when the order for the mistreatment came directly from the White House.

There is an important side story to the sex perversion promoted at Abu Ghraib.  Israelis routine practice torture and force sexual perversion on captives rounded up during period sweeps of occupied Palestinian areas.  In Arab Muslim culture, for a male to be photographed having oral sex on another male is vastly more dishonorable and shameful than in American society.  The Israelis then use these photographs to blackmail Palestinians into acting as snitches once they get released. 
BGen Janis Karpinski and others who were at Abu Ghraib have testified that American interrogators have been heavily influenced by Israeli advisors.  This is part of a continuing trend of the “Israelization” of America that we will revisit repeatedly in this work.  
Some of the most chilling stories come from Kay Griggs, former wife of a Marine colonel; see for example her YouTube video.
Greg Szymanski wrote in his 25 July 2005 article “The Evil Lurking Within. Kay Griggs, Former Marine Colonel's Wife, Talks Again About Military Assassin Squads, Drug Running, Illegal Weapon Deals And Sexual Perversion Deep Within The Highest Levels Of U.S. Military And Government 

For 11 long years, Kay Griggs heard all the messy details from her military husband, usually while he was drinking before going into one of his drunken stupors. First going public in 1998 in an eight hour video interview with a truth-seeking Michigan pastor and FM radio broadcaster, she now is back after 9/11 to warn Americans to beware of the evil lurking within the highest levels of government, bound and determined to destroy America .
Katharine 'Kay' Griggs knows what it's like to have a gun pointed in her face. She knows what it's like to have her face slapped, her bones broken and her nose bloodied by her former bully of a husband, an active Marine Colonel and a man who she claims is "above the law and literally gets away with murder."
Virginia court documents and photos of her battered arms and legs tell the sad and brutal physical story of her failed marriage, a tumultuous 11 year roller coaster ride ending in 1999.
But the real story for public consumption isn't the private divorce court details. It is the secret military information about drug running, weapon sales, sexual perversion and assassination squads she learned firsthand from her husband, U.S. Marine Corps Col. George Raymond Griggs, now remarried and living in Mirror Lake , NH .
This isn't the first time Griggs is going public with her story about government mob-like hit squads and the sexually perverted secret "cap and gown and skull and bone society" her husband belonged to along with other high-ranking Marine officers and pubic officials.
She first went public in 1996 after receiving death threats, being rescued by Sarah McClendon, former senior member of the White House press corps, who believed her story and took Griggs under her wing, giving her a place to stay and important advice about how to stay alive when dealing with military operatives.

The idea is to make certain servicemen highly blackmailable in order to force them to conduct assassinations and other dirty work.  One technique is to get normally straight males involved in sex parties, and then while they are drunk, videotape them getting oral sex from male prostitutes.  Then Mossad-CIA delivers an ultimatum: “Do what we tell you to do or we will make the videotapes public and destroy you.”
I can testify as a former Marine officer that this activity in no way characterizes the Marine Corps at large, but rather a very small, isolated, shadowy subcomponent unknown to most Marines and controlled by Mossad-CIA.  I must also emphasize that there is strong evidence that similar subcomponents also exist within the U.S. Army Special Forces (Green Berets), U.S. Navy Seals, and U.S Air Force and other services or service subcomponants. So this is not just a Marine problem, but a very real situation that exists across the board within the U.S. Armed Forces.
In fact, Richard H. Curtiss's "A Changing Image: American Perceptions of the Arab-Israeli Dispute." American Educational Trust, 1986, p. 267, quotes former Chairman of the Joint of Staff Admiral Thomas Moorer as follows:  

"I've never seen a President -- I don't care who he is -- stand up to [the Jews] ... They always get what they want. The Israelis know what is going on all the time. I got to the point where I wouldn't write anything down. If the American people understood what a grip these people have got on our government, they would rise up in arms."

Paradoxically, one of the most blackmailable public officials in America today is the Commander-in-Chief.   There are significant questions remaining about whether Barack Hussein Obama II is even a valid U.S. citizen, not to mention a “natural born” citizen qualified to be President under the Constitution. I discuss all this in greater depth in my special "Obama Nation" web page for Obama at
Despite all the intimidation tactics of the Zionist establishment, the author of this book still believes that the biggest social and political problem in America lies in the inability of people at the grass roots to get their act together, as well as power brokers who should be their natural leaders.  The predators at the center have become very aggressive and even dangerous only because counter predators at the local level have become so pathetically weak and disorganized.   

Insiders usually personally profit –in more ways than one

A false flag operation typically involves an “unvirtuous circle” where criminality on a national level reinforces criminality on a personal level, and vice versa.
On a grand political level, within the context of republican government, a false flag operation is extremely criminal because one part of the government is seeking to manipulate the rest of the government without resorting to open debate.
In regard to civil liberties, the false flag operation is extremely criminal because it involves murdering fellow Americans and wantonly destroying property.
Therefore, why should we be surprised that individuals who are criminal enough to attempt the two latter items also seek to line their own pockets at the same time?  In fact, they almost have to seize every opportunity to line their pockets in order to make the big money necessary to payoff or put contracts out on their adversaries to forestall them.
One obviously cannot murder fellow Americans and run roughshod over the basic principles of republican government (“the Constitution”)  and be considered “honorable” at the same time, therefore, money –and not honor--  is the only thing false flaggers have.  They will ruthlessly do anything to get enough of it to help insulate themselves from reprisals.
“Profiteering” typically takes place on several levels, to include adding “green” in personal bank accounts.
The highest level might involve achieving major national geo-political goals. In my online article “
Thomas Jefferson and the "Incredible Truth" about Bush Cabal Wise Guys and False Flag Nukes” I provide numerous examples in American history of false flag operations and other major deceptions to justify war.  They include the “Spot Resolutions” border incident behind the Mexican War, Abraham Lincoln’s baiting of Southerners to fire the first shots at Ft. Sumter, the dubious explosion on the Battleship Maine that started the Spanish American War, the S.S. Sussex hoax that facilitated American intervention in World War I, and the fraudulent Gulf of Tonkin incident behind the Vietnam War escalation. 
President Franklin D. Roosevelt baited the Japanese to attack America in December 1941 as a back door to destroy Nazi Germany on behalf of his Zionist handlers, who had already declared a global boycott and the moral equivalent of war on Germany in 1933.  As documented in John Toland’s Infamy, Roosevelt knew well in advance about Japanese plans to attack Pearl Harbor and “Let It Happen On Purpose” (or “LIHOP “–and acronym also used in the 9/11 Truth movement for those not psychologically ready yet for MIHOP, or “Made It Happen On Purpose”).
In the early 1960’s, the Joint Chiefs of Staff approved the Operations Northwoods false flag plan, but it was vetoed by President John F. Kennedy.  It envisioned using agents provocateurs to create mass casualties in Miami to justify an invasion of communist Cuba . 
Then there was Operation Gladio conducted in Italy .  CIA operatives posing as communists staged terrorist incidents in an effort to discredit the Italian communist party. 
Israeli leaders have also promulgated false flag events involving America .  They include the Lavon Affair in 1954, where Israeli agents attacked U.S. facilities in Cairo masquerading as Egyptians, and the assassination of John F. Kennedy (see Final Judgment by Michael Collins Piper).  They also include the attack on the U.S.S. Liberty in 1967  (see Operation Cyanide), the 1993 World Trade Center bombing (suggested by Village Voice writer Thomas I. Friedman), and the 1995 Oklahoma City bombing (see The Judas Goats by Michael Collins Piper).
In Final Judgment, we learn that both the Mossad and CIA were heavily tied in with Jewish organized crime boss Meyer Lansky in carrying out the assassination of JFK on November 11, 1963.  All three entities had reason to feel threatened.  JFK’s brother Robert Kennedy, as Attorney General, threatened organized crime figures.  JFK threatened Israel ’s atomic bomb development program with Red China, and sent threatening signals to the heavily Jewish owned Federal Reserve Banking system.  JFK threatened to break up the CIA after the Bay of Pigs fiasco, and also created a national security action memorandum to get out of Vietnam by 1965.  This threatened not only the CIA-Mossad Golden Triangle heroin operation, but also the military-industrial complex interests which needed more war to justify big ticket procurement. 
False flag operations perform many useful functions for Israel .  For starters, Israeli leaders believe that the more they can incite Americans to hate Muslims, the more Americans will like Israelis by comparison.  Creating wars gives Israelis an opportunity to siphon off U.S. military aid while tricking Americans to kill and occupy Israel ’s adversaries.  
Last, but not least, the Mossad likes to make lots and lots of money –any way it can.  It operates numerous business fronts, to include the global drug trade along with its CIA partner. 
The global Jewish community also likes to make lots of money, and it is heavily tied in with the Mossad.
The book Disaster Capitalism describes how it is possible to make money on almost any calamity as long one knows in advance that it is coming.  The simplest method involves disasters that affect stock or commodity prices. Wall Street has plenty of financial instruments that enable one to make money no matter which way prices move.
According to former Mossad officer Victor Ostrowsky in his book By Way of Deception: The Making and Unmaking of a Mossad Officer, Israel frequently stirs up trouble between factions around the world and makes money by supplying both sides simultaneously.  The Jewish lobby has enough control over Congress and the State Department to award Israel with lucrative “defense” contracts around the world on a continuing basis.  
Ostrovsky describes a funny incident where Israelis made a scheduling error at a military base in Israel while simultaneously training both government and rebel forces from Sri Lanka . One day while jogging in formation, both groups started heading towards each other in an open field, separated only by a dividing fence.   The Israeli instructors started sweating.  Fortunately for them, the two groups passed each other and remained clueless about the Israeli perfidy.
According to Ostrovsky,  the Mossad not only runs Israel , but also maintains a full time department to devise and concoct cover stories for false flag operations. 
Israeli leaders routinely sign off on assassination target lists.  Their Mossad also manufactures false flag operations.   It is almost done with the regularity of a wine export company, except in Israel ’s case the export is false flag terror.
9/11 was simply a particularly bountiful harvest within a particular vintage year.  No wonder the French ambassador to Britain , Daniel Bernard, jeopardized his career back in December 2001 when he referred to Israel as "That sh*tty little country" which threatens world peace.” 
According to Ostrovsky, the Mossad also operates a sayanim or “helper” program, through which it can rely on the assistance of most Jews around the world.  This is why the Mossad, with only 2,000 full time paid employees, is regarded globally as the world’s most dangerous and effective espionage organization.  The voluntary services of millions of Jews scattered around the world are give it incredible horsepower. 

Former Mossad officer Victor Ostrovsky talks about Mossad agents and Sayanim helpers, Part 1


Ostrovsky talks about cultivation of Sayanim, and the dual loyalty issue, Part 2.


Perhaps this is one reason why American author Michael Hoffman came up with the title “Judaism: The Crime Syndicate That Calls Itself a Religion."
Naval Intelligence officer Wayne Madsen provided a good independent overview in his 6 Sept 2008 Wayne Madsen Report about Israeli perfidy.

September 8, 2008 -- The little known "false flag" attack to make a killing on the speculation market
[Following a discussion of insider use of put options on 9/11, to be discussed later]  There was a previous attempt to use a "false flag" terrorist attack to manipulate international markets to earn a quick profit. According to The Washington Post, Two individuals, Jay Aubrey Elliott and Rolf Dunbier, were once arrested in New York for planning to blow up the Kafue River bridge in Zambia , the only bridge servicing Zambia 's Copperbelt Province . At the same time, Violet Elliott, Elliott's wife; Efraim Ronen, Benjamin Edoui, Yitzhak Markovitch, and Raphael Tseriano were arrested in Tel Aviv by Israeli police after the Shin Bet, Israel 's security service, and the FBI discovered the plan to blow up the Zambian bridge in order to drive up the world's copper prices. Jay Elliott had earlier visited Tel Aviv to sign up explosive experts to blow up the Zambian bridge. Law enforcement authorities in Zambia and the United States were tipped off about the plan.
Jay Elliott and Dunbier were charged with violating the federal Neutrality Act, which forbids American citizens and foreigners in the United States from waging war against nations with which the United States is at peace. The act has been used only rarely by the federal government, having in the past charged U.S. citizens and nationals with conspiring to commit acts of war against Haiti and Laos . No action was taken against right-wing conspirators who used U.S. soil to plan and carry out military action against Cuba and Nicaragua .
Although the conspiracy by Israeli and American nationals against Zambia 's railway bridge appear to have come from recent headlines, the story was published in The Washington Post on November 9, 1966.
The Mossad was never officially implicated in the planned attack on Zambia but the Israeli intelligence agency conducted a number of "false flag" attacks before and after 1966.
In 1954, Israeli Defense Minister Pinhas Lavon secretly organized a terrorist attack on the U.S. Information Service library in Cairo , Egypt that would be conducted so the Americans would blame the Egyptian government of Gamal Abdel Nasser. In November 1968, King Hussein of Jordan discovered that Israel was behind the Kateb al Nasr commando group that attacked the U.S. embassy in Amman with the deaths of 29 civilians and security personnel. Israel was hoping to cause the United States to blame Jordan for the attack.
Ilich Ramirez Sanchez, also known as "Carlos the Jackal," maintained that it was the Mossad that killed two French police agents and a Lebanese informant in 1975. The two policemen, Raymond Dous and Jean Donatini, and the Lebanese informant, Michel Moukharbal, were investigating a terrorist attack on El Al Airlines at Orly Airport . "Carlos" said Mossad was trying to frame him for the murders.
In 1986, Libyan Information Minister Mohamed Sharafeddin said that Mossad agents were conducting terrorist attacks in western Europe against U.S. targets so that Libya would be blamed. He said that Israel was hoping that the U.S. Sixth Fleet would strike Libya in retaliation.
Israeli intelligence agents, some masquerading as "furniture movers," were seen celebrating the 9/11 attacks in New Jersey and New York , some dressed in Arab garb. Pointing to the fact that Shin Bet no longer cooperates with western law enforcement, as it did in the 1966 caper in Zambia , Bell said that Shin Bet agents, using Canadian passports, conducted false flag operations in Gaza in 2002 and Jordan in 1997. The Jordanian operation resulted in Canada withdrawing its ambassador from Tel Aviv. The 1997 affair saw Mossad agents masquerading as Canadians poison Hamas leader Khaled Meshal in Amman . When King Hussein threatened retaliation for the incident, Israel was forced to provide the antidote to save Meshal's life.
In 1991, Mossad covered its tracks in arming and training a group of Libyan guerrillas in Chad who were trying to toppled Muammar Qaddafi, the Mossad arranged for Saudi Arabia to finance the operation. It was not the first nor the last time that Mossad and the Saudis cooperated on a false flag venture as witnessed by the events of 9/11.
In 1997, a senior Mossad agent responsible for monitoring Syria , Yehuda Gil, was found to be sending false reports hyping the Syrian "threat." These were passed by then-Prime Minister Binyamin Netanyahu to Washington and Israel 's Lobby operating in the U.S. capital. It was also discovered that Gil was keeping money allocated by a Syrian agent for Mossad in Damascus long after the Syrian agent had died.
A classified CIA document on the Mossad captured by Iranian militants who took over the U.S. embassy in Tehran in 1979 and later published in full outlined Mossad's activities around the world, including "false flag" tactics and the blackmailing of U.S. officials. Former Mossad chief Isser Harel denounced the CIA's report and said it was similar to the 19th-century anti-Semitic work, "The Protocols of the Elders of Zion."

Madsen also explains how the 2000 attack on the U.S.S. Cole was an Israeli false flag hit:

July 14, 2008 -- FBI dive team ordered away from USS Cole attack site A CIA source who worked with O'Neill in the New York Joint Terrorism Task Force previously told WMR that the Cole was attacked in a "false flag" operation by a Popeye cruise missile fired from an far over-the-horizon Israeli submarine. O'Neill wanted to obtain evidence from the harbor floor in Aden as well as DNA evidence from the clothing and remains of two Yemenis in a small boat who were reported to have bombed the Cole in a suicide attack a few weeks before the US presidential election that saw George W. Bush and Dick Cheney win the White House under dubious circumstances.
The alleged ringleader of the Cole attack, Jamal al-Badawi, was secretly released from a Yemeni prison in late 2007 after having previously escaped from jail twice. On February 3, 2006, the Cole defendants being held in a Yemeni jail escaped, including Badawi, escaped from a tunnel they had reportedly dug to a nearby mosque. In early 2007, another alleged Cole attack planner, Fajd al-Quso, was secretly freed by Yemeni authorities.

Even less well known is the Israeli attack that wiped out the U.S.S. Poet:

July 2-3, 2008 -- UPDATE 1X. U.S. intelligence source reveals perpetrator behind attack on SS Poet
On January 5, 2007, WMR reported on the last voyage of the US-flagged merchant vessel, the SS Poet, in October 1980, along with the secret "arms-for-no-hostages" mission that saw the defeat of President Jimmy Carter and the election of Ronald Reagan as the 40th President of the United States….: 
….WMR has learned from a former CIA clandestine services officer that the SS Poet, after delivering its arms to Iran, was dispatched by the military forces of a "third party." Apparently, the idea that there were 34 Americans who were witnesses to an act of treason against the United States and the illegal influencing of an American presidential election, was too risky for the conspirators. When asked the identity of the "third party," the CIA source responded simply: "the Israelis."

Once you know where to look, one can find almost endless examples of Jewish and Israeli treachery.
However, despite all of this, I must admit that we can’t blame everything on Jews and Israel .   There are plenty of corrupt gentiles around as well, although as a group they tend to be much more individualistic and far less capable of forming highly coordinated criminal tribes.  Nevertheless, they are still able to form de facto criminal tribes within organizations like the CIA, military industrial complex, FBI, Congress, and La Cosa Nostra.  It also helps if corrupt gentiles come from sociological structures that resemble the Jews, such as Latin street gangs, Italian crime families, or Irish Catholic ward handlers who still envy or hate WASPs.
It pays to watch organized crime activities.  For example, later we will discuss petrochemical explosions in Texas that take place much too frequently and too predictably to simply be accidents.  Under ordinary circumstances, they probably reflect attempts by organized crime elements to make futures contracts profits off oil and gas price spikes.  However, with this kind of criminal enterprise up and running, and often in bed with state-sponsored intelligence operations like the Mossad, it takes very little additional effort to swap conventional explosives with a mini-nuke and turn a commodities futures manipulation exercise into an agents provocateurs pretext for World War III.    
It is naïve to assume that organized crime operators are disconnected from intelligence agencies because of some kind of patriotic or idealistic “Fire wall.”  Since both groups have such similar modus operandi, it is often advantageous for one group to use the other group as a farm team.  Criminals are often blackmailable, expendable, and adept at operating in secrecy.  This makes them perfect for certain types of covert operations.  Since false flag operations are inherently treasonous and criminal, why not use talented criminals to carry them out?  
Furthermore, we saw in Chapter 5 how the Bush cabal is itself is a master criminal operation.  It also likes to make money from its intrigues.  In other words, lunatics are running the asylum and criminals are running criminals.   
If you agree with libertarians that once government grows beyond a certain point (for example 5-10% of GDP) it tends to become more of a parasite than a producer, then total federal and state government in America (at about 50% of GDP) might qualify as the biggest organized crime racket of them all.  As mentioned in Chapter 6, Dr. Kevin R. C. Gutzman, author of The Politically Incorrect Guide to the Constitution, was not joking when he said that the federal government ignores the Constitution about 90% of the time.  This is criminal.
Regarding 9/11, we see strong evidence of high level profiteering. Former Naval  Intelligence officer Wayne Madsen described insider trading in his 6 Sept 2008 report.: 

September 8, 2008 -- The little known "false flag" attack to make a killing on the speculation market
Prior to the 9/11 attacks, insider trading "put options" were placed on United and American Airlines stocks. The speculative options on United were placed between September 6 and 7, 2001 and on American on September 10 at the Chicago Board of Options Exchange. Put options are bets that a stock will fall in value and the owner has the option of selling the stock at a lower rate and sell them at the highest rate, thus earning a quick windfall profit. The put options on the two airlines' stock was reportedly six times higher than normal. Other unusual "put option" activity was registered with three European re-insurance firms, Germany Re, Swiss Re, AXA of France, in addition to World Trade Center occupant Morgan Stanley Dean Witter.

The following chart illustrates Madsen’s point.



Vice President Dick Cheney’s former oil service company Halliburton cleaned up on  no-bid contracts in both Afghanistan and Iraq . In addition, soon after 9/11 Americans invaded Afghanistan and began immediate work on a pipeline through Afghanistan .  Prior to this, Cheney’s big oil colleagues had been butting their heads in negotiations with the Taliban.  Amazing how the Afghanistan government suddenly changed its tune once former big oil employee Hamid Karzai got installed as President courtesy of Uncle Sam.
World Trade Center landlord Larry Silverstein landlord cleaned up on insurance policies that he procured only months before 9/11. (see "Zionist Circles Benefit From WTC collapse"). He also eliminated a functionally obsolescent real estate money-loser with a huge asbestos problem and removed over 10 million square feet of floor space from the Manhattan real estate market.  This tightened up rental prices for other Jewish real estate owner buddies.
According to the documentary 9/11 False Flag, the day before 9/11 Secretary of Defense Donald Rumsfeld announced $2.3 trillion in unaccounted for transactions, under the auspices of Jewish neo-con controller Dov Zakheim.  The audit department with records just happened to be in the wing that got hit on 9/11, the same wing which had been mostly vacated for renovations and reinforcement.
The documentary also noted that just prior to 9/11 there was an increase by $15 billion in stock market transactions betting that the market would fall.
WTC 7, which was not hit by a plane, collapsed at
5:23 PM, over seven hours after the two World Trade Center towers came down. It was a 47 story modern steel frame building which somehow collapsed on top of itself like a perfect controlled demolition.   The building housed Securities and Exchange Commission records regarding major Wall Street scandals under investigation.
As later developments would prove, there was quite a lot to cover up on Wall Street.  In 2003, ten major Wall Street firms agreed to pay out a $1.4 billion settlement for defrauding investors with deliberately faulty research during the 1995-2000 bubble.   Then in 2008 we saw the $700 billion taxpayer bailout over the mortgage crisis, accompanied by the collapse of Lehman Brothers, the sale of Merrill Lynch to Bank of America, the conversion of distressed Morgan Stanley and Goldman Sachs into bank holding companies (thus ending the era of independent investment banking).  Unregulated derivatives, which billionaire investor Warren Buffet calls “Weapons of Mass Financial Destruction”  continued to skyrocket out of control during this entire period.
Last, but not least, many members of Congress profit from “make war” situations.  According to “151 Congressmen Derive Financial Profit From War: Blood money stains the hands of more than 25% of members of the U.S. House and Senate” by Ralph Forbes, May 5, 2008, American Free Press

According to the latest reports, 151 members of Congress invested close to a quarter-billion in companies that received defense contracts of at least $5 million in 2006. These companies got more than $275.6 billion from the government in 2006, or $755 million per day, according to, a website of the watchdog group OMBWatch.

There are many more examples of insider profiteering in other areas, but for the purposes of this chapter, the point should now be well taken.

False flag attacks usually require massive use of illusion

 "See, in my line of work you got to keep repeating things over and over and over again for the truth to sink in, to kind of catapult the propaganda."
-- George Bush, "President Participates in Social Security Conversation in New York, " May 24, 2005. 

“The average White American hasn't an idea in his head that didn't come from his television receiver." - Dr. William L. Pierce

Captain May commented in an interview:

They have to put the public in a receptive frame of mind to the act they are going to help the government commit. You could call it like seduction. They have to tranquilize us. They have to seduce us by putting us in a mind receptive to the idea that we are going to be attacked. And that is the whole idea. If you blow that line, if you get into their decision cycle, if you put information out that blows their scenario, they are impotent. They can’t do it. They can’t do it because now it doesn’t look like random Al Qaeda terror, does it? It looks like a government operation.


False flag operators must milk illusions for a number of reasons.  First, the whole point of false flag terror is to create public outrage towards certain alleged “terrorists.” Therefore, the more ways to magnify this outrage, the better. 
Secondly, since a false flag attack is by its very nature a self-inflicted wound, they need to figure out a way to control the damage while simultaneously magnifying public perception of the injury.
A good example involves the Pentagon on 9/11.  It just so happened that the explosion hit the only wing which had been left mostly vacated.  Coincidentally, it had been recently renovated and hardened.   It also held the office investigating the missing $2.3 trillion mentioned earlier. 
Our government and national media tell us that the soft nose of a commercial airline somehow punched through three massive corridors of the Pentagon and left a circular exit hole.  Usually bulbous noses and air frames, which consist of titanium frames wrapped with thin steel skins, crumple and splatter then they hit hardened structures.  Obviously a much more plausible hypothesis for this kind of explosive effect would be something like a depleted uranium-tipped cruise missile. 



The famous Pentagon C ring punch out hole


The more recent Establishment story is that some “aircraft part” went flying through the buildings, missed support columns and furniture, encountered mostly open space, and produced this hole.  Therefore, the warhead theory is “an error.”
By simply repeating its rationalizations to smooth over unanswered questions, the Establishment hopes the public will simply shrug its shoulders and stop worrying.  In providing this answer, it ignores the fact that many serious 9/11 researchers question whether a commercial airline ever hit the Pentagon to begin with. explains how the official government fairy tale may have been created utilizing the following principles of magic tricks;


1. Palm:  To hold an object in an apparently empty hand.


(In essence this means to set up the illusion.  This was done on 9/11 by showing the 2nd plane crash into the south tower in Manhattan on live TV.  This mentally conditioned everyone in Arlington to instantly expect a low flying airliner headed fast towards the Pentagon to hit the building.)


2. Ditch:  To secretly dispose of an unneeded object.


(Flight 77 was lost on radar as early as 8:56 while the alleged impact was not until just after 9:30.  This gave the perpetrators approximately 30 minutes to “ditch” the original plane for the flyover drone.)


3. Steal:  To secretly obtain a needed object.


(The plane swap was initiated as the flyover drone was launched and took over the flight path of the ditched original plane.)


4. Load:  To secretly move a needed object to where it is needed.


(The drone passenger jet was put on course to the Pentagon and flown treetop level over Arlington .)


5. Simulation:   To give the impression that something that hasn’t happened, has.


(The plane reaches the Pentagon with a perfectly timed explosion and fireball creating the impression that it hit the building.)


6. Misdirection:  To lead attention away from a secret move.


(The massive fireball and smoke plume divert attention from, and help conceal, the flyover drone as it flies away.)


7. Switch:  To secretly exchange one object for another.


(The C-130, E4B, and additional flying craft in the area are introduced to serve as cover and confusion for anyone who may have witnessed the drone fly over or away from the building.)*



Controlled national media typically pre-condition Americans to accept false flag illusions prior to the attacks



In many ways this step is much more important than whatever clever little tricks are embedded within a false flag attack itself.  This involves pre-conditioning the audience to make it receptive to illusions in the first place.
This is analogous to situations in ancient times where “propaganda” created on a day-by-day basis outside a temple would ultimately support whatever illusions priests might try to create within the temple.  The propaganda preconditioning might include the sheer size and beauty of the temple itself as well as public pageantry outdoors in which rulers support the priesthood.  It can also include indoctrination inserted in school texts.
The power elite may also wish to subtly shape how people interpret possible future events in advance by giving them premonitions in science fiction, drama, and other art forms. In this way, the public will become indoctrinated to connect the dots in a manner acceptable to the power elite.
A number of alternative media leaders have popularized the term predictive programming to connote this form of subtle programming. They include Alan Watt, host of Republic Broadcating Network's "Cutting Through the Matrix" show, and producer of the two part film "Predictive Programming / Occultic Connection," and James Corbett, whose Corbett Report covers predictive programming in some detail in Episode #088 "You Are Being Programmed" and Episode #091 "Beware Operation Blackjack." Later in Chapter 37 "Operation Blackjack, Kansas City, KS, and the Zombie March to Stalingrad II" I also cover the use of predictive programming in Operation Blackjack in some detail.
One of the paradoxes of predictive programming is that often the power elite will tell the masses exactly what sinister things they have in mind through such vehicles as science fiction. Alex Jones has noted that it would seem strange to put people on guard, since even cattle in a slaughter house that catch a peep that they are about to get executed have been known to go crazy, breaking their legs trying to kick down walls and barriers.
One possible answer is that since the events are portrayed as fiction, people do not take them seriously but instead simply register the fantasies in their subconscious as a way to interpret reality. Clever and patient propagadists can cause the general public to incrementally accumulate impressions over time to that they eventually change major attitudes, much like the proverbial frog in the pan of water on a stove who does not recognize that he is being boiled to death if the heat is turned up slowly enough.
According to Diffusion of Innovations Theory, only 2.5% of the population is made up of innovators, and 13.5% made up of early adopters (as a side note, these percentages may vary depending on racial, ethnic, political, social, and cultural factors), and the rest tend to mindlessly role-model their behavior, even when role models are promoting destructive social policy. Such people might experience a subconscious sense of "inevitability" to such sinister events as a global depopulation pandemic or a national martial law lockdown and Orwellian police state, which in turn helps encourage a sense of fatalism and Stockholm syndrome. As one example, just look at the millions of Christian Zionists in America today discussed in Chapter 21 who are passively resigned to global catastrophe as a "fullfillment of prophecy." People will often forget the source of ideas that shape their thought processes, even when they are purely fictional films such as A Beautiful Mind mentioned elsewhere in this chapter..
Sometimes predictive programming is not subtle at all, but is deliberately meant to serve as a form of fear-mongoring, also known as "psychological terrorism." The idea is to not only frighten the sheepish part of the population into compliance, but also keep men of courage and patriotic conviction continuously busy addressing the steady stream of threats in piecemeal. There is no time left over for them to pursue viable long term solutions, such as building forms of popular sovereignty that might some day effectively challenge the power of false flag malefactors. Instead, they continuously face false flag attack threats, not to mention a steady stream of disinformation and ugliness pouring through mainstream media that erodes America on a moral and cultural level.
This use of fear-mongoring reminds me of a basic infantry tactic taught in the U.S. military for conducting what is known as a "single envelopment." This is a situation where a small U.S. infantry unit attacks an enemy unit who is inside a defensive position. Typically one portion of the assault unit will set up what is called a "base of fire," which a stationary position at standoff range with the enemy where friendly forces try to pin down the enemy with machine gun and rifle fire. Then another part of the assault unit tries to circle around and attack the enemy where they can achieve surprise or some other tactical advantage. Meanwhile, the steady stream of harassing fire from the "base of fire" tries to force enemy defenders to keep their heads down to impair their ability to see what is going on or react in other appropriate ways.
Similarly, "fear mongoring" can serve just like a military "base of fire" to keep genuine patriots "pinned down" and "busied."
Predictive programming can also be aimed at mid-level authorities as well as the general public, with different messages for each. Predictive programs often portray people in authority as acting in a calm, wise, and professional manner as they wittingly or unwittingly carry out a New World Order agenda. In contrast, rebels are often portrayed a violent lone wolves. In the real world, "loner" strategies are often relatively ineffective all by themselves compared to people who can engage in a calm, patient, and natural grass roots organization building processes. It is also very important to network from the "top down" as well as "bottom up" with powerful, talented, and high net worth people who should comprise "natural leaders"within ones own commuity. (I explain how my paleoconservative ideological leanings influence my own sense of political strategy in greater detail in Chapter 34 and Chapter 38). People often lose credibility when they are perceived to be "acting out" and "angry" as opposed to patiently following a wise and well-reasoned plan that is sensitive to people's needs.
Incidentally, the process of bolstering potential allies with effective attitudes, while simultaneously steering potential adversaries into ineffective modes of conduct, is often called the false "problem-reaction-solution" paradigm or the "false Hegelian Dialetic" strategy. I cover this in more detail in Chapter 38.
Last, but not least, the process of creating predictive programming creates the perfect cover for the power elite to create and test on audiences special effects necessary to support actual false flag illusion later on. For example, many people in the 9/11 Truth Movement believe that some of the video scenes of planes flying into the World Trade Center Towers may have been doctored. The techniques, if not the videos themselves, may have been pioneered under the cover of making a TV series like Lone Gunman. For a false flag operation as critical as 9/11, it was absolutely critical that the power elite indoctrinate the masses with the idea that planes hijacked by terrorists hit the World Trade Center Towers. Even if something were to go wrong and actual airlines were not able to fly into the towers according to the false flag script, they still had to go ahead with this script. There is strong evidence that the 9/11 inside job malefactors preplanted explosives inside the buildings at the alleged aircraft impact sites to greatly magnify impact explosions. I do not have the space to go into alternative explanations of 9/11 here, but suffice to say that there are a number of plausible alternative hyptheses such as whether or not the World Trade Center towers were in fact hit by smaller drones made to look like airlines, but whose drone capabilities made them vastly more reliable for supporting the desired illusion than regular commercial aircraft. The passengers aboard the actual hijacked airlines may have been flown to another location and murdered.
Similarly, in regard to the Moon Hoax controversy discussed in Chapter 38, many researchers believe that the extensive investment in production values behind Stanley Kubrick's 1968 film 2001 A Space Odyssey may have given important cover for the Zionist establishment in control of Hollywood as well as NASA to develop all the special effects necessary to fake the "sugar false flag" operation of a moon landing and moon walk. (In Chapter 38 I also discuss this "sugar false flag" concept in greater detail, whereby the public is decoyed and manipulated by events which are artificially contrived to be "too wonderful" as opposed to the "too horrible," such as in the case of 9/11.)
Illusion and predictive programming by themselves are not enough.  Typically these methods are only successfully when they are “leveraged” off a substantial power base.  
The old newspaper SPOTLIGHT, predecessor to The American Free Press, once observed that the key to solving the John F. Kennedy assassination involves not only isolating whoever had the motive to kill the President, but more importantly, who in national media and government has had both the will and the power to sustain a coordinated cover up for decades.   
Michael Collins Piper demonstrated in his classic work Final Judgment, that there is only one group in America that has had this capability.  This involves a conglomeration of the Jewish Lobby, Israel, Israel-friendly parts of the CIA, Jewish-run organized crime, Jewish-controlled national media, America’s Jewish plutocracy, Jewish-controlled members of Congress, and the military-industrial complex.   
For those of you who came in late, please see Joel Stein’s article “How Jewish is Hollywood ?” mentioned in Chapter 1. Added references, to help make this point.
Americans are saddled with one of the most powerful propaganda machines in world history, also known as “ Hollywood ,” or the American motion picture and television industry. 
Captain May described in his 19 Jan 2006 Cracking Satan’s Code hr 2 interview how Hollywood starting setting up 9/11 well before the event.


Capt May: But the most obvious movie I can think of in the Info War is a movie that was made five years before September 11th. It was already preparing us for September 11th. September 11th was a shattering event that made us suddenly hate an alien race that we did not even think about before and want to exterminate them. That was an exact parallel to a movie that was brought out as an identification for 9-11. And the movie was called "ID-4." That was the code by which it was issued by Fox Studios, by the way, you know Fox is owned by Rupert Murdoch, a big time pro-Zionist guy. Most conservative pro-war of all the networks. Fox brought out a movie coded as ID-4, which of course means "Identification For..." Right?
Capt May:
So that was already a coded movie. And even the way they marketed it was coded. "ID-4" means "identification for something else." You know what the movie was called in the long title?
Capt May:
"Independence Day."
Oh my goodness.
Capt May:
You know what the first place you ever saw two towers totally evaporate because of an explosion was? Independence Day, the first day. Remember, the death ray comes down, and what happens? Two towers, one in LA and one in New York , vaporized because of an alien attack against America . They were setting us up to be ready for the two towers of 9-11. Which is why the CNN reporter on hand when 9-11 happened, who was asked, "The World Trade Centers?" said, "Ohmigod! This is just like..." and what did he say? "Independence Day."
Capt May:
They set the public up years in advance so that the public would be ready for the idea that a totally brutal enemy that we had to utterly exterminate was going to come and blow up two skyscrapers. And they put one of the skyscrapers in the movie in New York , and the other skyscraper in the movie in L.A. That is the only thing that was different.
Capt May:
But of course what are the two media capitols of the Zionists? Movies -- L.A. , news -- New York . They already told you that. And remember they blew up the White House in Independence Day, right?
Capt May:
A strike against the Capitol, right? OK, they turned that into the Pentagon. The same hit. There were three hits in the first day of Independence Day. One in D.C., one in New York , and one in L.A. There were three hits on 9-11. And by the way if you remember the movie --I take it you saw it?
Yes. A long time ago.
Capt May:
The president gets away and he is up in an aircraft all night long to escape the alien attack.

Hughes: Yes.
Capt May:
What happened to Bush after 9-11? They put him up in an airplane.
In an airplane, yes.
Capt May:
Now you remember that scene in Independence Day he keeps saying "I'm a combat pilot, I'm a combat pilot." That is the president they put in Independence Day. What does Bush continually bring up as his background?
Oh yes, on the aircraft carrier, yes.
Capt May:
And then he says, "I'm a war president. I'm a war president." In Independence Day they set us up with the idea of an ex-pilot war president. And the same is seen in Independence Day where the President personally leads the armies of righteousness to exterminate the evil aliens, right?
Capt May:
It looks exactly like Bush looked on the aircraft carrier. Do you remember?
Oh my goodness.
Capt May:
They set it up. They set every--that is why it’s called--they set up the scene. They prepare the public mind. Bush was anointed to be President the year they made Independence Day. Independence Day was made by Fox Studios, Fox Network, the most right wing, war hungry of all the networks, and they built the Bush character. Think about the guy, for God's sakes, anyone who is listening to me. "A Beautiful Mind" is kind of a little bit tricky, but Independence Day ain't even tricky.
(Laughter) Yes.
Capt May:
You get to see exploding towers, just like 9-11. You get to see exploding buildings in Washington , just like 9-11. You get to see a president character who is about the same age Bush was, about the same build Bush was, has about the same hair color Bush did, wears a pilot suit the same way Bush did on the aircraft carrier, don't you see?
Oh, yes.


The article “The Semiotic Deception of September 11th  by Phillip D. Collins shows how this subliminal suggestion was effective, even on a professional MSNBC reporter such as Ron Insana on the day of the attack:  

"[A]s we were going across the street, we were not terribly far from the World Trade Center building, the south tower. As we were cutting across a, a quarantine zone actually, the building began disintegrating. And we heard it and looked up and started to see elements of the building come down and we ran, and honestly it was like a scene out of Independence Day. Everything began to rain down. It was pitch black around us as the wind was ripping through the corridors of lower Manhattan .” (THE SEMIOTICS OF MEDIA IMAGES FROM INDEPENDENCE DAY & SEPTEMBER 11TH 2001, by Prof. Elliot Gaines )

An example of a YouTube video that compares the mayhem of ID4 and 9/11 is “Alien Terrorist Attack
Quite coincidentally, ABC News later claimed that the Library Tower in Los Angeles, which was once of the towers blown up by Aliens in Independence Day, was a real Al Qaeda target on 9/11; 
U.S. Intel Chief: Tall Buildings and Mass Casualties Top AQ's Hit List” July 20, 2007, Krista Kjellman: reported last week that senior law enforcement and intelligence officials had "multiple and credible" reports that an al Qaeda terror cell may be on its way to the United States or could already be in the country.
The Library Tower in Los Angeles has always been on al Qaeda's hit list.
In February 2006, ABC News reported that al Qaeda's original plan for 9/11 was to use a fifth jet to bring down the 73-story tower on the West Coast.
And as previously reported on the Blotter on, 9/11 mastermind Khalid Sheikh Mohammed, in a written statement, admitted he was responsible for planning and financing a "second wave" of attacks targeting the Library Tower in Los Angeles, the Sears Tower in Chicago, the Plaza Bank in Washington state and the Empire State Building in New York.

There were some other noteworthy “set up” works that came out before 9-11.  In his interview with Frank Whalen, 23 Feb 2006, after discussing Independence Day, Whalen raised the topic of Three Kings released in 1999. Whalen commented,


In Three Kings it almost made it look like Gulf War I was an unfinished job… That movie makes it seem like we are abandoning all these poor people. We need to go in there because now Saddam is going to just kill them all. And that is what I got out of that film.


In the article “Media Mogul’s Sinister Links to 9-11,” former AFP writer Chris Bollyn describes The Lone Gunman, another prescient work. Like Independence Day, it was also produced by Murdoch interests:


Rupert Murdoch sits at the helm of News Corp. and is described as television’s “most powerful man in the world with the capacity to reach more than 110 million viewers across four continents…In the United States, Murdoch owns, among other things, The New York Post and the Fox News network..”
An old, close friend of Israeli Prime Minister Ariel Sharon, Murdoch openly supports the extremist Likud Party of Israel and the Anglo-American “war on terrorism.”
What is less well known, however, is Murdoch’s involvement in the production of a television program in 2000, which foreshadowed the attacks on the twin towers, and his personal connections to the key individuals who came into possession of the World Trade Center shortly before its destruction….
On March 4, 2001, Fox TV, a branch of Murdoch’s media empire, broadcast the pilot episode of a program called “The Lone Gunmen.” A spin-off of the popular “X-Files,” Murdoch-owned companies produced the pilot episode in Vancouver , Canada , and New York from March 20 to April 7, 2000.
The pilot episode depicted a passenger aircraft being hijacked by a hostile computer hacker and flown directly into one of the towers of the World Trade Center .
The climactic sequence actually shows the plane heading for one of the twin towers; but, at the very last moment, the pilots are able to regain control of the plane and avoid the building by inches…


Then there are the "Illuminati playing cards, which the "Socio-Economics History Blog" claims foreshadowed 9/11 along with an episode of the "X-files." The web site states:

Predictive X-Files episode

# This episode of the X-Files was aired on 4 March 2001. For those who understand the modus operandi of the Illuminati: it comes as no surprise. They seem to have this need to telegraph their intentions and plans before hand publicly. This is perhaps an early warning system to inform their Illuminati henchmen. It is a very effective public warning system to their fellow Satanists to take precautions by hiding their plans in plain sight.

# In 1995, someone came out with the
Illuminati card game. Take a good look at these cards. See what they predicted. How did the card designer know? See also what else is predicted. Truth or lies? Who knows?

“Terrorist Nuke” – This card is one of the most shocking of all, especially in light of the fact that this game first hit the specialty stores in 1995! How in the world did Steve Jackson know that the Twin Towers of the World Trade Center were going to be attacked? In fact, this card accurately depicted the World Trade Center attack in great detail. This card accurately depicts several facts of 9/11 — on cards created all the way back in 1995! The picture accurately depicts:

* That one tower was going to be struck first; this picture accurately depicts the moments between the first tower strike and the second.

* The card accurately depicts that the place of impact is some distance from the top of the twin towers. The plane hit in this approximate area of the first tower. How in the world could Steve Jackson know this fact?

* The card accurately depicts the Illuminati leadership by showing on the building to the extreme left of the card the Illuminist pyramid with an all-seeing eye in the middle.

* The caption at the top properly identifies the perpetrators of the attack as “terrorists”

However, what does the caption to this card mean? It says, “Terrorist Nuke”. Now, what could this possibly mean? The Twin Towers were not destroyed by a terrorist nuclear device, or were they? In our article on the Bali Blast, we noted the scientific data that suggested the hotel was taken down by a micro-nuclear device of about 0.10 kilotons [Read
NEWS1715]. One can only ask: was a micro-nuclear device used at the base of the Twin Towers as well? That kind of small, but nuclear, explosion would account for the sudden manner the reinforced concrete and steel shell simply crumbled into dust as it fell. That kind of nuclear explosion would also explain the tremendous heat that stayed at “Ground Zero” for several months after 9/11. As we head into the planned “terrorist attacks” and attendant panics, we have to remain cognizant that a micro-nuke device might be the real culprit in some of these attacks.



The date “9-11” itself was a set-up by a Bush cabal insider.  George Bush, Sr. introduced the numbers “9” and “11’as emergency call numbers when he was Vice President under Ronald Reagan.  The false flag insiders chose the date 9-11 to heighten the “crisis emergency” character of the attack, as well as the sense that Americans must call on their government the same way that they call a local first responder. 

National media treatment also set up audience perceptions regarding how the World Trade Center towers came down. 
Looked at objectively, the official story is a joke.   Jet fuel does not burn hot enough to melt steel.  There are virtually no historical incidents of major skyscrapers hit by airplane crashes or that have been subjected to prolonged fires that have resulted in collapses of their steel frames.  “Pancaking” could never account for the near free fall speed of  11 seconds in which the towers came down.  Nor does the official story account for puffs of explosive smoke recorded on video well below the collision floors, or explosions reported by witnesses prior to the aircraft impacts.  Nor does it account for the super-hot pools of molten metal that persisted for weeks following the collapse, or the extreme pulverization of most building materials.
Many physicists now believe that even conventional controlled demolitions may have been adequate to achieve such fine pulverization of most of the building.  Perhaps mini-nukes were been used on top of controlled demolitions.
Despite all of this, because national media promoted the “pancaking” theory while the collapses were in progress, much of the public disbelieves its own eyes.
Capt. May observed that if people were to watch the World Trade Center collapses for the first time without any narration at all, combined with videos of buildings being brought down by controlled demolitions, they would probably unanimously agree that the collapses closely resembled controlled demolitions.  However, the sound narration on national media did an excellent job of convincing most Americans at that time that controlled demolition was not a factor.  
An important term currently being employed by 9/11 Truth
researchers to describe how a power elite utilizes a long term preconditioning process to mold population groups is called predictive programming.



False flag operators usually require powerful intimidation propaganda



It is important that a propaganda machine be allied with an effective intimidation machine. 
Aside from 9/11, many Americans are already scared that government conducts surveillance of their emails, web surfing habits, and phone conversations.   They are frightened about getting arbitrarily fired from their jobs, unfairly audited by the IRS, or hounded by the Jewish ADL.  They are cowed into keeping their heads down and not thinking.  Not surprisingly, this silence and acquiescence by “sheeple” supports illusions. 
A good example of a movie that deliberately attempted to thwart critical analysis of terror date coding was A Beautiful Mind. Capt May commented in his 19 Jan 2006 Cracking Satan's Code interview, 2nd hr:


Captain May:  The most embedded of all the media is not the news media, its the movies.

Hughes: Mind control, yes.
Capt May: Oh yes, the movies are the most basic programming imposed on the American public and they made a movie before 9-11, right before 9-11, they gave that movie --you know the Zionists heavily control Hollywood and they heavily control the Academy Awards-- a movie was made before 9-11 by a few months, and released after 9-11 by three months and given the award for being the greatest movie. Meaning the Hollywood Zionists did everything they could to make sure everybody just took what this movie had to say and went to bat with it to accept it at face value. The movie was "A Beautiful Mind." Did you see it?
Hughes: No, I didn't.
Capt May: "A Beautiful Mind" is about a brilliant Princeton mathematician named John Nash, a real person who had an IQ like Einstein, was doing mathematical models and analysis, wound up coming up with theories that totally revised economic sciences, and wound up working for one of these Rand corporations, one of these brilliant think tanks that work for the government. And all of this was true. This was a biographical movie. And at a certain point in the movie they show that this John Nash comes to believe that he has cracked a code embedded --the word is used-- into the media, magazines and newspapers, and that putting this code together he can figure out a terrorist group that is going to bring a nuke into the United States . Now that sounds exactly like what I am talking about. Right? Except that at that moment in the movie, they begin to show you that John Nash had had a nervous breakdown. Everything involving the imagining of a code was really psychosis. He winds up having to be tackled by the government, given shock therapy, loses his wife, almost kills his baby, everything bad in the world happens because he has this delusion and this breakdown surrounding an embedded code and the idea that he could see a terrorist attack coming with a nuclear bomb.
Hughes: Right. His programming broke.


Capt May: The only thing, is I got the book, from which the movie is extracted, and that part of the John Nash story was fiction. John Nash was indeed a Princeton mathematician. Did indeed work for the Rand corporation. He did indeed have a nervous breakdown, and other things. He was indeed a homosexual. All kinds of things. The only thing is that he had nothing to do with an embedded code in the media and a nuclear terrorist strike. What they did with that part of the movie, the movie was created by, written by a guy named Akiva Goldsman, a Zionist Jew who is now working on the Da Vinci code movie, by the way. He works the code movies, especially. The movie was brought about to give us an immunization, so to speak, against any bright guy like me, military intelligence fellow, linguist, high IQ, actually sitting down with a pen and paper and starting to draw on the newspapers and figure out the code. They came up with a movie in advance that said anyone who does this is insane. Has a beautiful mind. That movie was made before 9-11 ever happened, and then their release date is their little joke. They released it on December 21st, 2001. And do you know what is cool about December 21, 2001? December --you have to break the months down to the code. That is 12, right?
Hughes: Right.
Capt May: The 21st? 12-21, you see the mirror?
Hughes: OK.
Capt May: 2001. Knock out the zeroes, 21. So the code for the movie is --the dates are important -- 122121. They are throwing a number code into it. And then, as if to go a little bit further, 12-21 is the winter solstice, another occult date.
Hughes: Oh sure.
Capt May: The Winter Solstice is the date of greatest darkness in the northern hemisphere. It is the day of ignorance. So they brought out a movie, executed before 9-11 happened, which already was preparing the public not to ask questions involving code, and they issued that movie with a numeric cabala date 122121 on the darkest, most ignorant day in the northern hemisphere. And then just to make sure everyone thought it was greater, the Zionist Academy Awards gave it Best Picture of the Year. How many people do you think along the way have been stopped from doing the kind of number analysis that I do because somebody said, "You have got a beautiful mind?" Any time you ever started talking about what I am talking about --unless, you are, and I say modestly, unless you are someone like me who can sit there and argue in four or five different languages and probably is the smartest guy at the table --unless you are supremely confident and have a deep background, if somebody says, "He has a beautiful mind" you are going to shut down and quit. Because a "beautiful mind" became a code for people who were crazy enough to think that there are codes in the media. Do you see what I am saying?
Hughes: Yes, they can peer behind the veil.
Capt May: And that is why they had to come up with a movie to make sure that anybody who could do that would be called insane.



Capt May added in a separate article:


I liked the movie so much that I read the book from which it was extracted, "A Beautiful Mind," and found -- curiously -- that although the real Dr. Nash did go crazy, it had nothing at all to do with finding a numeric code embedded in the mainstream media!  Hmm..., I wonder why the Jewish film industry would make a mistake like that, rewriting the plot of reality to convince us -- with a powerful movie -- not to obsess about the prospect of embedded code in the mainstream Jewish news media?  You don't think there's a conspiracy do you?  If you do, then you've got a problem:  a beautiful mind!
By the way, now do you think you understand why it is that Ma Bush -- Barbara herself -- went around talking about how she hoped that conspiracy theorists didn't "start getting a beautiful mind about 911," and why she wouldn't trouble her "beautiful mind" with things?  Well, if you think she knows what the rest of the Bush Family knows:  that they've couped -- and are controlling -- us with the 911 scam, then you have a beautiful mind!
…One last thing, the bright Jewish screenwriter who rewrote the John Nash story to make it say something that the John Nash biography didn't say (that it's insane to try to decode news) is Akiva Goldman.  Goldman has also written the screenplay for another "code" movie, "The Da Vinci Code!"  Seems like the Jews think about codes all the time!  They run the movies that set us up to blindly accept the media, and they've dumbed us down to the level of dirt.  They told us at the beginning of the war that media would become "embedded," and even that was a code -- for the fact that they were coding!


Here we begin to see a pattern where national media is willing to outrageously exaggerate or fabricate lies to promote one part of a story, whereas completely omit other aspects (such as Battle of Baghdad War dead) to create just the right spin in the public mind. 
There are quite a few cover-up elements to 9-11. For example, the FBI confiscated all the videos to the Pentagon strike. All the World Trade Center Tower wreckage was shipped out and disposed of, much like the Kansas City and Waco evidence.
Significantly, radiation detection meters were not allowed on the 9-11 site.  As mentioned, many physicists now believe that in addition to controlled demolitions used to bring down the World Trade Center towers, there might have also been mini-nukes.   
Interestingly enough, there were also enhanced levels of radiation detected at the Pentagon.



False Flag attacks typically have Kabbalistic or Masonic numerological significance.

Numeric analysis is typically the last line of analysis that Capt May uses to possible false flag dates in making his predictions. 
We already covered one of the first lines of analysis in Chapter 5 where we talked about profiling the opposing forces commander and his kosher handlers.  In the “why we fight” section of Chapter 6, we also discussed important trends and structural changes in American history that must also be considered in any deep analysis.
Occult numerology may be the last line of analysis, but since there is strong evidence that it influences the behavior of false flag malefactors, we would be unprofessional to ignore it.
Captain May often points out, “It is not that I believe any of this stuff.   I don’t.  I do not carry a rabbits foots or regard myself as superstition in any way.   I only work with this stuff because I believe that they believe in it.”
The use of occult numerology by the power elite probably performs a similar psychological function for conspirators compared to the precise murder rituals practiced by the Thugs of India when they systematically killed off millions of innocent people in piecemeal. Ritualism helps criminals compartmentalize whatever guilt feelings they might experience and also puts a thin veneer of religious sanctity over their foul deeds.
Special codes and rituals also reinforce a fraternal feeling among secret society members to help maintain group discipline and secrecy. 
Lastly, it provides a method to openly signal important information to insiders on all everywhere  in a way that is understood by few.   That also gives insiders a smug sense of esoteric knowledge and in-group power.  They feel that they know something that no one else knows that they can flaunt right under their noses.
Captain May explained in an Oct 2005 email to Dr. Fredrick Toben:


….I had no clue about the existence of encrypted (hidden) messages in the media, or of the cult significance of numbers -- in dates, in statistics, in death-counts -- in everything, simply put, that can carry a string of numbers that mean nothing unless you're acquainted with the system.
It wasn't until the 3/11/2004 Madrid bombings that I began to "play the numbers" of the "Embedded Code" (so-named by Ghost Troop because the media had already called itself embedded as a tip-off to the savvy that embedding of code was the order of the day!).  The key fact that tipped me off, incidentally, was the number of days from the 9/11/2001 event to the 3/11/2004 event:  911!  From there it was easy to infer that 9/11 and 3/11 were really 11-series variants, with 9 being the square of 3, and 3 being the square-root of 9.  In effect, they were mirroring bookends of the same event:  9/11=3/11.  They occurred on opposite sides of the Atlantic , thereby achieving a kind of symmetry, too!  The body counts were telling:  the first Madrid count was 199 (911 inverted, math-wise); then it went to 191 (911 anagrammed), which was a dead (pardon the pun) give-away, since it meant that 8 folks who had been counted as dead in the morgue got up and left!  Yep, it was a sure-enough code.  The little New-World-Order gangsters were "signing," in the street parlance of inner-city Houston , where…. I learned more about cryptoanalysis than I ever learned in military intelligence!
Let's take two coded messages that will convince the unconvinced:
If you find a 187 scrawled across your car or apartment door, get out of town.  The graffiti is a message:  code 187 of the penal code is murder.  In other words, a gang is "signing" your death warrant with a warning sign!
Now another, from my wayward teen years, alas:  One teen calls another teen (both teens' moms standing nearby in those days of one-per-house telephones).  Teen A says to Teen B that he has a couple of pages of health homework to do, and Teen B replies that he's going to have a whole chapter over the weekend.  Teen A suggests that they get together for his homework now, and then he'll pay the favor back by joining Teen B for his health homework assignment over the weekend.  Both moms beam loving glances at their assiduous scholars.
Neither one knows that the two teens have just made arrangements to share marijuana, with one page of "health homework" (aka, "pot" if you're in on the gag) being one joint, and a whole chapter being an ounce bag of marijuana!  Teen A will help Teen B our (with smokeable!) tonight in exchange for some of Teen B's weekend bounty!

When Capt May cracked the code, he discovered that it is based off ancient Chaldean and Kabbalistic lore. 
Significantly, the Hebrew alphabet has 22 letters, neatly divisible by 11. For esoteric reasons beyond the scope of this work, cabalists seem to really like sets that involve 11 and 12.
The ancient Chaldean (Babylonian) number system was base 60, from which we today get 60 seconds in a minute, 60 minutes in an hour, 360 degrees in a circle, and (under an older calendar) 12 months of 30 days each to get 360 days plus annual adjustments.
Chaldeans liked the six sided hexagon (“signifying a knowledge of how to measure’)  fitted inside a circle (“circle of time”).   The Star of David fits neatly inside a hexagon, which in turn creates 12 triangles with 3 sides each, and an internal hexagon with 6 sides.   Perhaps this is a reason why we see lots of “6’s,” “3’s,” “12’s, “11’s” in their numbering and numerological systems, and multiples of these numbers.  
There is an important tie-in between ancient Babylon and all things Jewish, incidentally. As Isaac Asimov points out in Asimov’s Bible, the real center of gravity of ancient Jewry lay not in Palestine , but rather in Babylon , and later Babylonia for over a 1,500 years. 
The most important works in Judaism, such as the Talmud and Zohar, were developed in Babylonia .  The Rev Ted Pike goes into considerable detail about the overriding influence of the exotica and depravity of Babylon in the formulation of Judaism as it really is.
Masons have derived much of their lore from Jewish cabalism. The highest level, 33rd degree masonry, probably has something to do with multiplying the favored numbers 3 and 11. 
Capt May is quick to observe that most low level Mason’s are simply ordinary people who consider Masonry nothing more than a social or service fraternity. Most of them are reasonably honest and decent people who want nothing to with conspiracy.  His own grandfather, active in Texas politics, once observed that in order to have a viable political career, one usually required both a law degree and membership in a Masonic lodge. 
At the very top of American Masonic organizations, Capt May believes it is a different story.  For centuries Jewish plutocrats and other power elites have infiltrated Masonry.  They have inserted lore that conditions the rank and file to accept cabalistic numerology and Zionist goals such as rebuilding the Temple of Solomon in Jerusalem . (As a reference, see “ARE ADL/B'NAI B'RITH MASONIC, NOT JEWISH?” by Rev Ted Pike at:). 
In regard to 9/11, there were many numerical indicators. For example, the Bush CIA-Mossad cabal likes to use in dates, body counts, and mission numbers days that are either odd numbered, are repeated, or are divisible by 11.
9/11 involves the odd numbers 9 and 11, and the 11 is obviously divisible by 11.  Consider also the description from Wikipedia regarding what happened on 9/11:


Nineteen hijackers [author’s note: allegedly –according to the government story] took control of four commercial airliners en route to San Francisco and Los Angeles from Boston , Newark , and Washington ( Washington Dulles International Airport ). The hijackers flew two of the airliners, American Airlines Flight 11 and United Airlines Flight 175, into the North and South Towers of the World Trade Center . Another group of hijackers flew American Airlines Flight 77 into the Pentagon. A fourth flight, United Airlines Flight 93, whose ultimate target was either the U.S. Capitol building or the White House, crashed near Shanksville, Pennsylvania.

Please note that the flight numbers: 11, 175, 77, and 93 are all odd numbered.   
Remember, out of 9 digits, the odds should be 50-50 that any particular digit would be odd rather than even. The odds that all nine would be odd by chance alone is .5 to the 9th power, or .0019531 or about 1 in 512.   The alleged 19 hijackers is odd, and two planes for one target city, and two planes for another city creates 2-2, which is divisible by 11.
The World Trade Center towers themselves formed a big “11” in the New York Skyline, and each tower had 110 stories (in occult numerology, knock out the zeros, so they represented a pair of “11’s.) 

According to the 9// web site: New York’s Channel 11”
New York's Channel 11 spotted this obvious feature and used it in a mid-1980s ad campaign, in which the station's director of marketing wanders desperately around the city looking for the "Biggest 11 in New York," and yet never notices the towers, which are always in the background behind him.  This web site also observes that if you add the digits of the last three flight numbers, one goes in sequence from flight 11 to 12, 13, and 14.  
11 let it remain 11.
Consider also that the letter “A” has a numerological value of “1,” so that American Airlines flights (or “AA”) give us “11’s” The aforementioned web site explains: 
The first of the crash flights was AA11. As the first letter of the alphabet, A has a numerological value of 1, so "AA" is also an eleven. The second flight, UA175, thus has an eleven in the form of "A1." The third flight, AA77, is a multiple of 11 (7x 11=77). That's already seven semi-unfudged elevens.”  
The total number of victims inside all the hi-jacked planes was 254. 2+5+4=11.   September 11 is day number 254 of the calendar year. Again 2+5+4=11.   The first plane crashing against the Twin Towers was Flight 11, which was carrying 92 passengers. 9+2=11.  Flight 77 which also hit Twin Towers , was carrying 65 passengers. 6+5=11

There are other interesting date coincidences that we will cover later, such as the John F. Kennedy assassination on 11-22-1963. [Add the digits within the year field, and one gets 19.  Numerologists allow even number “doubles” and adding digits within a day, month, or year field to produce an odd number as a “work around]. 

There many are interesting coincidences in Jewish history with repeated numbers that are in essence multiples of 11, or 111, or 1111. For example, “of the 21 men on the dock at Nuremberg , only 11 were preordained to be sentenced by hanging.” (p. 168, Barbarians Inside the Gates). 
The World War I Armistice was signed “on the
eleventh hour of the eleventh day of the eleventh month." (Woodrow Wilson was surrounded by Jewish advisors.) 
Ex-Mossad chief Efraim Halevi stated: “
It was at 77 Great Russell Street that Dr. Chaim Weizmann, a renowned chemist, presided over the effort that culminated in the issuing of the Balfour Declaration, the first international recognition of the right of the Jewish people to a national home in what was then still a part of the Ottoman Empire .” 
Consider also that when we add the digits for 911, that is 9+1+1=11.  Zionist landlord of WTC Larry Silverstein seems to be an “11-divisible freak,” for example when he acquired the Sears Tower on the day of the 3-11-2004 Madrid bombing, he changed its zip code number to 60606, which is 666 (in numerology you knock out the zeroes).
As another example, “According to the New York Times, Silverstein Properties had planned to meet on 9/11/01 on the 88th floor of one of the towers to "discuss what to do in the event of a terrorist attack," but cancelled the meeting Monday night "because one participant could not attend."(Reinsurance Companies Wait to Sort Out Cost of Damage, New York Times, 9/12/01, page C6).
We also see an interesting place name repetition coincidence in terror attacks.  There was Oklahoma City , Oklahoma (which Michael Collins Piper has identified as a likely Mossad-CIA inside job), followed by New York City , New York and Pentagon, Pentagon City for 9/11.

Last, but not least, there is interesting symbology that keeps creeping up in unexpected places. Capt May has described insights provided by his high school students the day after the 9-11 attack:


Candidly, the thing that most broke the Skulls/Mossad angle for me was something some street-gang members brought to me on 912, the day after the attack, which I had analyzed for them in real time on 911. These high school students of mine went to the computer lab and began to crunch numbers for "signatures," which the assured me were always part of their acts of gang activity (graffiti being a good example). They brought me the following flight code for the plane that hit first in NY: NYC11Q. They then explained that the often used the Wingdings font (symbolic) to covey messages themselves, and that this is what happened if you translated the letter (not numbers) of NYC11Q into Wingdings: NYC11Q=NYC11Q


No sooner had Captain May begun to ponder all these characteristics of the 9/11 inside job in late February 2004, than his new insights would be put to the test with the March Madrid bombings.   



Additional References:



2012-10-20 A Very Creepy Factoid; Another short additional editor's Note by William B. Fox. Question: How high up has the U.S. government's security establishment been infiltrated? Here is something that an informal acquaintance just pointed out to me. Type the word "illuminati" backwards to get "itanimulli," then type in "www.itanimulli" as a URL, and what do I get? I get "" --This is official web site of the National Security Agency! If this is a prank done by non-NSA outsiders, how would the pranskers be able to pay for a redirection URL -- and maintain it over time without an NSA override, and vector it in on "" without access to NSA's domain service passwords? I don't know (if anyone has done any research on this issue, please send me an email at my contact address to bring me up to speed), however, my acquaintance explained that he thinks it likely that NSA has been infiltrated at the highest levels by Satanists and/or Illuminati, and one of their occult "tags" is to spell things backwards (as a private inside joke, or whatever). Other occult tags often used by high level insiders are the all-seeing eye motif and "666." As one example, I have reproduced above an illustration by David Dees about how Lady Gaga, who is Jewish, likes to do all-seeing eye symbolism. My acquaintance pointed out to me the YouTube video "Illuminati Symbolism - Everywhere!!!" published on May 21, 2010 by ANONYMOUS7787 that goes into all of this in greater detail. Speaking of running things backwards, he also recommended: Obama - Yes We Can = Thank You Satan (YouTube), uploaded by 17Stormy17 on Jan 18, 2009. There is an interesting reverse speech coincidence behind the "Yes We Can" mantra that Obama has repeatedly over and over again in his speeches. Last, but not least, my acquaintence said that he is seeing occult symbolism everywhere now in Hollywood movies (I myself stopped regularly watching Hollywood movies a long time ago because I dislike their brainwashing tactics). He also went to a local church service where I live in western Pennsylvania, anbd it turned it his stomach to see the Christian minister make not-so-subtle references to pro-New World Order and pro-occult symbolism. He strongly suspects that this minister has been brainwashed by the FBI's clergy response team program, which he thinks has as one of it's main aims to prepare ministers and their flocks to passively submit to the passive surrender of their First and Second Amendment rights and round-ups of major portions of the U.S. population into FEMA concentration camps.
2011-09-15 America’s Sham War on Terrorism by James Bovard
2011-09-13 Ten years after 9/11, the great power still cowers by Lawrence Martin,
2011-09-12 9/11 - Echoes Of The Big Lie by Stephen Lendman,
2011-09-12 Money Matters and 9/11: Delving into Darker Truths by Bill Bergman
2011-09-11 The 23 Biggest 9/11 Coincidences by Hal Stanton, []
2011-09-11 You Only Believe the Official 9/11 Story Because You Don't Know the Official 9/11 Story by Jesse Richard, []
2011-09-11 9-11-2001 to 9-11-2011 Ten Years Of Lies by Karl Schwarz,
2011-09-11 Official 9/11 Fairy Tale by Barbara Peterson
2011-09-11 Afghanistan Had Nothing To Do With 9/11 by Mohammed Daud Miraki, MA, MA, PhD,
2011-09-11 9/11 Ten Years After by SARTRE,
2011-09-11 Bomb at US base reminder of raging Afghan war by Patrick Quinn, Associated Press, Rahim Faiez, AP. "KABUL, Afghanistan (AP) — A powerful Taliban truck bomb that wounded 77 American soldiers and killed five Afghans outside a combat outpost served as a reminder on Sunday that 10 years after the Sept. 11 attacks, nearly 100,000 U.S. troops are still fighting a war that shows no signs of slowing down..." [Editor's Note: How amazingly coincidental and creepy that controlled mainstream news media would report a cabalistic number like "77" for a casualty count on the 10th anniversary of 9/11. See also Bomb at US base in Afghanistan wounds 77 Americans, by Rahim Faiez, AP,].
2011-09-10 10 Lies Enshrined by H.Res. 391 to "Never Forget" 9/11,, []
2011-09-10 In the Wake of 9/11: 33 of 50 States Are Actively Spying on Americans,, []
2011-09-10 9/11/11: Orgy of Deception by Henry Makow
"For me, the 9-11 Commemoration is a repeat of the original outrage and therefore very painful to witness.
The original attack was mass trauma brainwashing perpetrated by a traitor class within America. Now, they're reinforcing the original programming. It is all designed to perpetuate war and strip Americans of their civil rights under the bogus pretext of a terrorist threat.
Americans are acquiescing in their own enslavement, and many seem willing to go along. I think the majority know 9-11 was an inside job but are afraid to say so..."
2011-09-10 9/11 Occult Trauma-Based Mind Control by Zen Gardner
2011-09-09 9/11 Commission Admits It Never Got The Facts ... But No One Wants to Hear From the People Who Know What Happened,, by Washington's blog
2011-09-09 Post 9/11 America has become the land of the fearful: The lasting damage of the al-Qaeda terrorist attacks has been to the mindset of the Americans and their economy by Neil Tweedie,
2011-09-06 Media Manipulation Of 9/11 Truth by Stephen Lendman,
2011-09-05 How private firms have cashed in on the climate of fear since 9/11: The past ten years have seen the growth of a national security industrial complex that melds government and business by Paul Harris,
2011-09-03 Health Impacts of 9/11,
2011-07-14 No Room for 9/11 Survivors at 10th Anniversary Ceremony, City Says,
2011-06-14 Pentagon Papers Whistleblower Daniel Ellsberg Says that the Government Has ORDERED the Media Not to Cover 9/11 by
2010-07-02 Israeli Investors Made Huge Profits From 9/11 Event by Walter Storch
2010-03-18 "Expect a False Flag Terror Attack To Precede Invasion Of Iran" by Dr. Paul Craig Roberts, " ...If the past is a guide, Americans will fall for the deception. In the February issue of the American Behavioral Scientist, a scholarly journal, Professor Lance DeHaven-Smith writes that state crimes against democracy (SCAD) involve government officials, often in combination with private interests, that engage in covert activities in order to implement an agenda...Former CIA official Philip Giraldi in his article, “The Rogue Nation,” makes it clear that the U.S. government has a hegemonic agenda that it is pursuing without congressional or public awareness..."


The Coming Attacks On America at judicialinc-biz.
Biblical References of the Numbers
How 9/11 Was Done. A good resource overview page demonstrating Israeli orchestration of the event.
False Flag Covert Operations: A web page with an interesting compilation of article links about 9/11 and post-9/11 -related false-flag related topics
1983 Bombing of US Marine Barracks=Israeli False Flag Op. A discussion thread, in which participant "Anonymous Coward" provides an overview of the bombing of Marines:


August, 1982 - Reagan steps in and tells Arafat if he withdraws to Tunis the US will protect their families.

Reagan sends in 800 U.S. Marines to help evacuate the 14,000 PLO from Lebanon after which the marines leave.

Two weeks after the marines leave Ariel Sharon unleashes his fury on the PLO families.

The PLO's families are massacred

Israel sends in their Christian Lebanese militia and they kill 5,000 women and children in the Sabra and Shantila refugee camps.

September 1982, a Multinational force from the US, France and Italy arrive. The U.S. sends in 1800 marines to Beirut and they set up in temporary barracks at the Beirut airport.

The marines stop Sharon's bloodshed and the Jews decide to teach America a lesson.

October 23,1983

241 Marines died when a truck packed with explosives blew up a Marine barracks at Beirut International Airport. At the same moment a similar explosion blew up a French military barracks a few kilometers away, killing 56 French troops. It was confirmed Israel knew of the attacks and suspected they engineered both of them.


According to former Mossad officer Victor Ostrovsky in By Way of Deception, Mossad had an operative in the shop that fitted out the truck bomb that killed the Marines. "Anonymous Coward" then reviewed the history of other Mossad-related false flag attacks as follows:


To understand the behavioral patterns and historical precedence of fanatical Israeli Zionists repeatedly using false flag terror operations against us so that we will become their proxies and attack and eliminate the Arabs or Persians for them, as we do now in the bogus “War on Terror,” we will, in Part Three of this paper, look at the following highlights from the sequential history of Israeli-connected, false flag terrorist operations –

July 22, 1946 – The King David Hotel Attack:
The Irgun bombing of the King David Hotel in Jerusalem where British officers were headquartered during the British Mandate period. Ninety-one people lost their lives. The bombers were caught, and as would become a familiar modus operandi, they turned out to be militant, extremist Jews dressed as Arabs.

August 1946 – The Plot Against British Foreign Secretary Ernest Bevin:
The attempted assassination by Irgun of British Foreign Secretary Ernest Bevin, who was not a big fan of the Zionist project to begin with, and who infuriated the Zionists by announcing that the British government had decided that the land dispute between the Jews and Arabs in Palestine should be decided by the United Nations.

June 1949 to September 1950 -- Operation Magic Carpet:
Amongst a host of tactics, Mossad-planted explosives and bombs were used to blow up synagogues in Iraq and Yemen. These attacks were, of course, blamed on Yemeni and Iraqi Arabs, and were used to inspire the Jewish populations of Iraq and Yemen to emigrate to Israel out of fear of further “Arab attacks.” The operation was quite successful.

July 1954 – The Lavon Affair:
Explosives and bomb attacks, some using phosphorus, directed against British and American interests in Egypt were to be blamed on Egypt and Gamal Abdel Nasser. A thirteen-member terror cell of Israeli saboteurs, engaging in what they called “Operation Susannah,” is caught red-handed by Egyptian security personnel, and Israeli Defense Minister Pinhas Lavon is forced to resign over the revelations of Israeli involvement. In 2005, Israel officially admitted responsibility for the attacks.

November 22, 1963 – The Kennedy Assassination:
The Meyer Lansky (Majer Suchowliński) Zionist crime syndicate was implicated in the assassination of President John F. Kennedy for his threats to shut down the Zionist-controlled Federal Reserve Bank and put a halt to Israel’s nuclear weapons program, the technology for which was stolen from the U.S. through the work of Israeli espionage agents.

June 9, 1967 – Attack on the U.S.S. Liberty:
A vicious aerial and naval attack on an American military ship by the Israeli Air Force and Israeli torpedo boats on the fourth day of Israel’s preemptive “Six Day War.” The attack on the U.S.S. Liberty was to have been blamed on Egypt if the Israelis had been able to fully sink the ship and kill all of its sailors. They were not able to finish their mission, and only 34 American sailors were killed and 171 others wounded by our psycho “friends” and “allies.”

June 27 to July 4, 1976 – The Entebbe Incident:
The hijacking of Air France 139, an Airbus A300, by Israeli Shin Bet-controlled Arab and German patsies. Some one hundred passengers were held for eight days by the hijackers after they landed the hijacked flight at Entebbe International Airport in General Idi Amin’s Uganda. Shin Bet’s connection to this hijacking is detailed in newly declassified British government documents as reported in the June 3, 2007 Jerusalem Post.

February to April 1986 -- Operation Trojan:
(As told by former Mossad agent Victor Ostrovsky)
An operation involving the February 1986 installation of a Mossad-controlled transmitter (“the Trojan”) in Tripoli used to send out interceptable, fake Libyan intelligence communications in order to trick Ronald Reagan into bombing Libya. The April 5, 1986 bombing of a West Berlin dance club called La Belle, a popular nightspot frequented by U.S. military personnel, was blamed on Libya by the Mossad through their “Trojan” transmitter sending out fake Libyan messages about how Qaddafi ordered the nightclub bombing. Finally, on April 14, 1986, one hundred and sixty American aircraft dropped over sixty tons of bombs on Libya. Operation Trojan, ordered by Israeli PM Shimon Peres, was an evil success, and clearly illustrates why the motto of the Mossad is – “By way of deception, thou shalt do war.”

October 7, 1985 & July 11, 1988 – The Twin Cruise Ship Attacks:
Jordanian and French intelligence, and even PLO sources, pointed out at the time, that the Abu Nidal “Palestinian” terrorist organization, responsible for over a hundred vicious attacks during the years it operated, was a completely Mossad-controlled asset. Off the coast of Egypt on October 7, 1985, the attack on the Italian cruise ship Achille Lauro, where Leon Klinghoffer, a 69-year-old Jewish American in a wheelchair, was murdered by throwing him overboard to drown, was the work of the Abu Nidal organization, and was designed to portray Palestinians as terrorist animals, thugs and cut-throats. Just over two and a half years later, on July 11, 1988, this same Mossad-directed terror group attacked the Greek cruise ship “City of Poros,” leaving nine dead and eighty wounded. This attack was seen by analysts as a move by Israel to damage the sympathetic relationship that had developed between Greece, its prime minister, Andreas Papandreou and the Palestinians. This attack damaged the Greek tourist trade and helped bring about the fall of the Papandreou government.

The October 1985 "Palestinian terrorist" hijacking of the Achille Lauro was reported to have been directly ordered and funded by the Mossad. This is detailed by former Israeli Defense Force (IDF) arms dealer Ari Ben-Menashe in his 1992 book, “Profits of War: Inside the Secret U.S.-Israeli Arms Network.”

February 26, 1993 – The Bombing of the World Trade Center:
Zionist-controlled, FBI-directed False Flag Attack on the WTC blamed on blind Shaykh Omar and his followers. This attack was used to set up the precedent that “Arab terrorists” had their eyes on bringing down the World Trade Center. The example of this 1993 attack on the World Trade Center, with explosives being provided by the FBI, would be used later on in 2001 to provide a fake historical targeting precedence for the “al-Qaeda-directed” 9/11 attacks. This type of operation involves the strategy of, over several years, executing a series of attacks to set up the “back-story” for a much larger attack. Each time, the attacks are to be blamed on the Arabs, so that when the “big attack” happens, it will seem logical to the public that the “Arabs did it.” In such operations, setting up “the enemy” is an integral part of the job, and such events as the filming and publicizing of CIA asset Usama bin Ladin’s 1998 fake “fatwa” and declaration of war against America was, likewise, strategically used to help build up and legitimize the “al-Qaeda back-story” to 9/11.

August 8, 1999 – The African Embassy Bombings:
U.S. Embassy bombings in Kenya and Tanzania executed by local Mossad operatives and blamed on CIA operative and asset, Usama bin-Ladin. This Mossad operation was used to build up Bin Ladin’s and al-Qaeda’s mythic terrorist credentials in the public mind in order to set him and his organization up as the “logical perpetrator” of the next big al-Qaeda attack.

October 31, 1999 – Remote controlled takeover and crashing of Egypt Air 990:
Blamed on one of Egypt Air’s finest pilots, who all of a sudden, out of the blue, went “suicidal” while co-piloting Egypt Air 990, a Boeing 767, over the Atlantic. On this fateful flight were thirty-three Egyptian military officers, including two Major Generals from the Army and two Brigadier Generals from the Air Force. Many investigators look at this event and see it as a possible early test run for the same Israeli-developed remote control technology that was most probably used for the 9/11 operation -- the FTS system of Rabbi Dov Zakheim’s System Planning Corporation.

September 11, 2001 – The Attacks Against America:
1) Usage of remote-controlled planes to simulate multiple suicide hijacks.

2) Thermate cutter charges, military-grade explosives, and radio controlled bombs placed in three World Trade Center buildings to provide the illusion that the crashing of the remote-controlled planes into the buildings were the cause of their collapse. The third building, WTC7, was an “evidence hut” and had to be destroyed.

3) Anthrax attacks and murders by mail just after 9/11, made to appear to be the work of Arab Muslims, but ended up being discovered to actually be a project engineered by a former Fort Detrick employee, Dr. Lt. Col. Philip Zack, a rabid and devoutly racist Zionist.

All 9/11 events were blamed on Saudi Arabians working for a fake Islamic terror group called al-Qaeda, whose “top leaders” all individually work as contractors for the American CIA, Israeli Mossad, British MI6, or Pakistani ISI (Inter-Services Intelligence). In case you were interested to know, the full name for Israeli Intelligence is “Ha Mossad, le Modiyn ve le Tafkidim Mayuhadim” (Institute for Intelligence and Special Operations).

October 10, 2001 – The Plot to Blow up the Mexican Parliament:
Foiled terrorist bomb plot on the Mexican Parliament building, briefly mentioned for a single second by CNN, and given front-page coverage by papers such as El Diario. Two terrorists -- a Mexican Jew named Salvador Gerson Sunke and a Mr. Sar ben Zui, discovered to be a Colonel with Israeli Special Forces -- were caught red-handed inside the Mexican Parliament building with a machine gun, nine hand grenades, and a sizable cache of C-4 plastic explosives. The terrorists were deported back to Israel with a hand slap and given pardons by a Mexican official named Jorge Gutman.

July 7, 2005 – The London Tube and Bus Bombings:
Most probably executed by operatives working through the Israeli-owned security company which handles security for the London Underground -- ICTS (International Consultants on Targeted Security), headquartered in London’s Merry Christmas House South. These attacks, of course, could not have been pulled off without the assistance of the British intelligence agency MI6 and moral support from former Israeli PM and Father of the “War on Terror,” Binyamin Netanyahu, who, as on the morning of 9/11 in New York, was also remarkably present in London on the morning of the London tube and bus bombings.



Missing Links: (2:07)


Missing Links (2 hrs; 7 min). According to Google video site write up: "Now you will discover the definitive truth about 9/11 and learn why even the most popular movies on the subject have failed to address the evidence exhaustively presented in this video. The facts will make it abundantly clear that the so-called 9/11 `Truth' movement has been infiltrated and is ultimately controlled by the same criminals group who masterminded the attacks. As they say, 'if you want to control the dissent you lead the dissent.' Utilizing evidence from the FBI, CIA, NSA, US Armed Forces Intelligence sectors, Foreign Intelligence organizations, local law enforcement agencies and independent investigators, Missing Links goes where no other 9/11 video has dared to. For more 9/11 truth see also:"


Other articles of interest:

2005 The Destruction of the World Trade Center: Why the Official Account Cannot Be True by Dr. David Ray Griffin
The Last Secrets of Skull and Bones in Which We Contemplate Certain Occult Rituals of the Ruling Class by Ron Rosenbaum, Esquire Magazine, September, 1977


Wikipedia caption: Domenico di Michelino, La Divina Commedia di Dante (Dante and the Divine Comedy). 1465 fresco, in the dome of the church of Santa Maria del Fiore in Florence (Florence's cathedral). Dante Alighieri is shown holding a copy of his epic poem The Divine Comedy. He is pointing to a procession of sin.


The "Divine Comedy" & Kabala, Dante Alighieri (1265 - 1321) by Jack Courtis, Kabala Library. This explains how the Catholic Church has used Kabbalistic numerological methods at the highest levels as part of its own "world view."
Editor's Note: According to Wikipedia "The Divine Comedy (Italian: la Divina Commedia) is an epic poem written by Dante Alighieri between 1308 and his death in 1321. It is widely considered the preeminent work of Italian literature,[1] and is seen as one of the greatest works of world literature.[2] The poem's imaginative and allegorical vision of the afterlife is a culmination of the medieval world-view as it had developed in the Western Church."
This is very significant for our study of numerology and Mossad-CIA black ops, to the extent that it shows a clear example of occult numerology providing "structure" to a "worldview" of a "major establishment" that involves the "journey of life" and a "journey into the after life." Latter-day practitioners of the "Cult of Intelligence" seem to feel a strong need to "structure time" according to similar superstitions.
There is also a deeper sociological significance to all of this. Numerology is embedded within Catholicism as well as Judaism. This reinforces the theme of the "decline of the WASP" also covered in my Libertarianism vs. Nationalism web page, and my "Handling Real Nazis" section of Chapter 34.
The Protestant Reformation was characterized by various "Nordic" and even certain "Celtic" tendencies towards "rationalistic," individualized interpretations of scripture within church organizations that became politically decentralized away from the Vatican. Rites of excommunication and damnation, saint-worship, icons, indulgence rent-seeking, arrogant priest classes, and superstitious numerological practices were jettisoned throughout many Northern European Protestant church communities. Not surprisingly, the Northern European Protestant countries have always produced vastly more scientific innovation and technological development per capita than Southern European Catholic countries. Whether engaged in military pursuits, engineering, or business development, they generally show a superior capacity for rational long term operational planning and self-disciplined execution. Therefore, using a predator vs. counter-predator social model, when WASP "counter predators" against superstitious numerological "mumbo jumbo" go into decline, guess what starts to rise? You guessed it --we start getting more and more numerological "mumbo jumbo" at the highest levels of [what was once] "American" society.
The rise of numerological practices through covert government operations promulgated by the U.S.-Israeli "odd couple" ("possessed" by a "Passionate Attachment") is symptomatic of Jewish-Catholic infiltration and takeover of the strategic bases of American society, to include the CIA and the Department of Defense at the highest levels (see The High Priests of War by Michael Collins Piper about Zionist neocon takeover). This power grab is being continually reinforced by false flag attacks, the rise of the homeland security police state, the unrelenting push for "New World Order" globalism, expanded bureaucratic rent-seeking everywhere, continuing threats of Internet lock-down and national martial law (see Chapter 28 and Chapter 31), TSA fondling of genitalia at airports, and permanent war against make-believe terrorists (see Chapter 12).
There is a lot of truth in the old saying that when it comes to politics, there is nothing new under the sun, or "The more things change, the more they stay the same." "Federal" paranoia and abuses of power look suspiciously like a "modern" secular version of Malleus Maleficarum, the selling of indulgences, forever recurring Catholic priest pedophilia scandals, deliberate Jesuit subversion of Protestant and republican societies in pursuit of global domination (see the "Jesuit oath" in my Libertarianism vs. Nationalism web page), and total Catholic Church control of the political and educational systems of various Catholic countries extending from the Middle Ages into at least the 19th century.
On a deep sociological level, all of the aforementioned trends go completely against both the American Revolution and Protestant Reformation.
Elsewhere in this series I document various Catholic "musclemen" and "wise guys" who serve high-level Jewish psychopaths such as Roman Catholic former mayor Rudolph Giuliani of New York City, the "Catholic" head of DHS Janet Napolitano (although superficially a "Methodist" according to Wikipedia, many researchers note the Jewish name "Winer" of her mother and her likely Italian Catholic ancestral origins indicated by her last name and physical appearance), or the Irish-Roman Catholic mayor Richard M. Daley of Chicago. (In Chapter 19 "The Chicago mayor was curiously absent from the city at the time on a first-ever visit to Israel, in the company of Israeli intelligence" at a time when Ghost Troop and anti-false flag activists in the Chicago area were issuing red alerts warning of a possible repeat 9/11 for the Chicago Sears Tower).
In many ways, 9/11 was not only an "inside job," but reflects a continuing Jewish-Catholic covert war against WASPs, especially now that Catholics have become as numerous as Protestants in America. In my web page Libertarianism vs. Nationalism I make the case that Zionists never would have got so far out of control were it not for the steadfast political support they received from hardcore Catholic political machines (who have always deeply envied WASPs) in America's big cities throughout much of the late 19th century and most of the 20th century.
In the racial nationalist section of the Libertarianism vs. Nationalism web page, I present some interesting anthropological arguments that the "WASP: vs "Catholic" conflict runs much deeper than conflicting religious theologies, but also reflects fundamental biological antagonisms between Nordics, Celts, and other "Cro-Magnons" on one end of the scale (the "WASPs"), in opposition to Alpines, degenerate and race-mixed versions of the once formidable Mediterranean branch of the Caucasoid peoples, and even latter day "Neanderthals" on the other end of the scale (the "Catholics"). I explain how there are many different racial types who make up Catholics, to include smatterings of Nordics and Celts in some areas of Europe. My analysis of "Catholics" is focused on the more primitive and degenerate racial types that give rise to mindless authoritarianism and dog-like personalities or rat-like viciousness.
In regard to Jewish racial hatred, to the extent that 9/11 was principally planned and orchestrated by the Mossad, and Jews have a higher percentage of Neanderthal blood than most other peoples, it may not be far-fetched to characterize 9/11 as a "Neanderthal attack" on America, along with "Sicilian" (like Guiliani), or shanty Irish Catholic (like Daley) minions who have infiltrated enough of mass media, U.S. security services, the privately owned Federal Reserve Banking System, and the federal bureaucracy to think they can pull it off. In many ways, the landmark article "Zoological Subspecies of Man" by Dr. Norman E. Hall (The Mankind Quarterly, Vol. 1, No. 2 - October 1960), which explains innate overt and covert war between "subspecies" (the analog of "races") within most mammalian species in nature. This probably does more to explain the real motivations behind 9/11 than 99% of what appears in "modern liberal" American mainstream media.
The 19th century Jewish British Prime Minister Benjamin Disraeli once remarked through a character in one of his novels "All is race; there is no other truth" (intrepreted by many to mean "In the long run, it is all racial"). I lived in New York City myself for ten years, and was amazed to observe how the city is an enormous cauldron of seething racial and ethnic hostility just beneath the facade of "modern liberalism." Racial conflict analysis is, in my opinion, extremely relevant to any deep analysis of 9/11, to include drawing up a list of "suspects" based upon the basic murder investigation question "cuo bono?" ("Who benefits"). Motivations can be racial and ethnic as well as financial and geopolitical in nature.
It requires a considerable amount of subterranean racial hatred towards the American host population for Jews to pull off an inside job like 9/11, and mass-murder 3,000 Americans in broad daylight in eyesight of the Statue of Liberty in a country that has shown the Jews more hospitality, more accommodativeness, and more direct support than any other nation in history. Not only does it require a very cold, cynical, and psychopathic mentality to resort to this kind of extreme treachery on an individual level, but also this feeling must extend across vast groups of Jews and their confederates in order to carefully plan and coordinate such a complex operation in secrecy for years --to include hijacking the Pentagon, NSA, and FBI. It takes even more enduring racial hatred to continually cover up the real malefactors behind 9/11 in national media, and to profit from unnecessary cancer-inducing full body scan X-ray machines while training the American public for slavery with invasive genitalia fondling at airports (see Chapter 39 for a discussion about how arch-Zionist and former DHS Czar Michael Chertoff has profited from the "panty bomber" false flag operation that was used as in excuse to inflict more "dog training" on Americans.)
In terms of "ethnic genetic distance" theory, various genetic studies show that Jews are about twice as distant from any European white ethnic groups as any of these groups are towards each other. See further discussion in my analysis of Jewish criminal totalitarian psychopathology in my online "mutualism vs. parasitism" article, which includes a genetic study which indicates that Jews have about 5-10% Negro genes in addition to Neanderthal blood.
Getting back to "Catholics," unlike the early 19th century period of majority WASP control that repealed three privately owned and corrupt central banks up through the administration of President Andrew Jackson (see Chapter 33), the period of substantial "Catholic" political influence in the 20th century never made any serious effort to stop the ultimate Jewish power machine -- the privately controlled and highly corrupt Federal Reserve Banking System -- since its inception in 1913.
If one studies the tragic history of Ireland, one discovers a considerable amount of festering racial and ethnic hatred by certain Irish Catholics towards "Anglos," particular among the more degenerate and Alpinid and Neanderthal "Shanty Irish" types as opposed to the more Nordic and Celtic "Lace Curtain" Irish Catholics. Many southern Italian Catholics -- many of whom show traces of Negro blood from slave importation during the Roman Empire or invaders from swarthy areas -- hate "Nordic" and "Celtic" northern Italian Catholics, and vice versa.

Hollywood dramatized a "hidden race war" dimension that involves many Sicilians as well as Jews and Shanty Irish Catholics in America in the movie True Romance (1993). Journalist and political activist John de Nugent wrote in his Dec 2010 blog about "Flying Squirrels in Norway and Sore Point in Sicily:"


This is a key clip from the movie “True Romance” with Christopher Walken playing (in a ludicrous physical miscasting, using black hair color on top of Germanic features!), yes, a Sicilian mafia don.
(Walken, to whom in his movie hayday I used to often be compared physically, is actually pure German; his parents were both from Hamburg, the great German port city on the North Sea.)
Dennis Hopper plays a retired cop living alone in a trailer. The mafiosi burst in and demand to know where his ne’er-do-well, double-crossing, drug-dealer son is who has betrayed them.
Hopper’s character decides that, as disappointing as his son has been, still he loves him enough to not want to betray his location to these Sicilians out to get him.
And so he provokes Don Vicenzo deliberately with the most cutting remarks he can possibly utter to him, so as to avoid further torture for himself and the betrayal of his son’s whereabouts.
This is a fascinating psychological scene of mental warfare between two masters of mindwar. Guess who wins?




[John de Nugent's commentary continued...]
Actually, there is both black and also neanderthal blood throughout Europe. I have seen it in Germans, Irishmen and Poles too, way up north.
The Roman Empire brought slaves all over. And this is why it collapsed before the onslaught in the 300s and 400s A.D. of the tall, blond, milk-and-meat-drinking, protein-powered, blue-eyed Germanic tribes. Rome was racially and morally corrupt, just like the Jewnited Snakes today. And history will repeat itself.

The statement by the former policeman character played by Dennis Hopper that the "Moors were niggers" is not accurate. A "white history" web site reacts to this scene by observing:

  • a) Contrary to the opinion of Tarantino's Afrocentric friend [a black friend of the filmmaker of True Romance who gave him the idea that Negroidal Moors altered the Sicilian gene pool for good], the Saracens [referred to as "Moors" in the film] were not (predominantly) Negroid.
  • (b) It is unlikely that most Sicilians ever "were like the wops in northern Italy. Blond hair, blue eyes." Sicily had genetic ties to the eastern Mediterranean and North Africa long before Moors invaded.

It is worth noting that the racial composition of not only Sicily, but also North Africa and the Middle East is also more complicated than the film implies --or current forces of "political correctness" would have us believe.
Since ancient times, there have been waves of Nordic-Germanic peoples who have trickled down to North Africa as either individuals or have swept down as entire tribes and mixed in with peoples of North Africa. For example, archeologists have found quite a few light-skinned, blond-haired mummies from early Egyptian dynasties (contrary to "politically correct" histories which give the false impression that blacks founded and ran Egyptian civilization). Statues of Hannibal of ancient Carthage, or Cleopatra of ancient Egypt, depict Caucasian people, not Negroes (contrary, once again, to certain fabricated "political correctness" histories taught in American schools). The Berbers of North Africa, who have controlled much of the caravan trade across the Saharra, have been noted by certain anthropologists as having many "Indo-European" (or "Nordic" or "Germanic" or "Aryan," take your pick) characteristics, to include "chivalrous" treatment of women, compared to the more "Neanderthal" approach of various neighboring Arab tribes who are more inclined to treat women like chattel. The Wikipedia article on "Moors" includes "Berbers" within its definition. Also, many Visigothic (Germanic) tribes swept into North Africa after the fall of the Roman Empire. A number of racial historians believe they provided the racial basis for the existence of blond-haired, blue-eyed Sultans and Caliphs who played a key role behind the "Islamic Golden Age" or the "Islamic Renaissance" from the mid-7th century to the mid-13th century A.D., which involved the spread of "Algebra" and the creation of universities from Spain to the Middle East. There was also another interesting "Nordic" migration that directly impacted on Sicily in the 11th and 12th centuries, in which both Sicily and Southern Italy were conquered by Normans. The Normans were descended from Norwegian and Danish Vikings, as well as admixtures of northern French Celts. However, the Normans set up a fairly thin ruling class, and I doubt they were able to have sex with enough Sicilian women to shift the island's entire population towards blond hair and blue eyes any more than Hopper's alleged "Moors" were able to shift everyone towards black hair and swarthy skin.
Speaking of the Middle East, in places like Syria and Turkey today one can find pockets of Nordic or Celtic-looking people whose ancestors came from ancient migrations, or perhaps even later with the Crusades. "Galatia" of New Testament fame is one example of such migrations. It was named after a tribe of Celtic Gauls who migrated from Thrace in Greece to what is today Turkey during the during the Third Century B.C., following an earlier Gallic invasion of the Balkans. Many of these "Gauls" traced their ancestors from southern France, and who knows where they came from before that.
The name of the country "Iran" comes from the word "Aryan" from an ancient era when a much larger percentage of the population had Nordic and Celtic features than today based upon numerous migrations from the north. To this day, many Iranians refer to themselves as "Persians" and take offense at being confused with "Arabs."
According to The Dispossessed Majority by Wilmot Robertson, while there are some Negro genetic strains found in various pockets in Southern Italy and Sicily, these genes probably comprise less then 5-10% of the total genetic makeup of certain individuals.(That is, regarding individuals within stabilized populations that existed before WWII. In the post war era, Italy has been flooded like most other European countries with fresh waves of Arabs, blacks, and other nonwhites). Negro genes that entered European gene pools centuries ago seem to account for curly hair and somewhat darker skin among whites today.
The blockbuster racial case made about the ill effects of Negro gene absorption into a white European country apparently has more to do with Portugal than Sicily, as presented in the online article "The Black Man's Gift to Portugal" by Ray Smith (which also appeared on pages 8-9 of Best of Attack!). Smith stated: "What you can see in Portugal today is the product of uniform, non-selective mixing of the 10 percent Negroes and 90 percent Whites into one homogeneous whole. In effect, it is a new race - a race that has stagnated in apathy and produced virtually nothing in the last 400 years."
Obviously Hopper's retired cop character was not motivated to make all these academic distinctions, since the prime purpose of his foray into racial history was to provoke Walken's mafia don character into quickly terminating the torture session "with extreme prejudice," as intelligence operatives used to say during the Vietnam era.
Regardless of determining exact genetic percentages in ancestry, we can still discern enormous stores of anti-"Anglo" racial hatred in the behavior of certain "Catholics" like Richard Daley of Chicago and Rudy Giuliani of New York City, and also in their amazing willingness to form tight alliances with Jews and continually shill for them.
The closest "Catholics" ever came towards interdicting the Federal Reserve came under the leadership of Rev. Charles Couglin in the 1930's, that is, until the Catholic hierarchy stopped his political momentum cold by telling him to shut up. And Rev. Coughlin did in fact shut up for the rest of his life, with the exception of writing anti-communist pamphlets.
Oh well, so much for loyalty to American national interests as opposed to Vatican politics...

Then there is the story about how Joe Kennedy decided to join the Jews after WWII to get a first Roman Catholic President of the United States (for details see my Libertarianism vs. Nationalism web page).
Oh well, I guess "Roman Catholic" interests just had to trump American national interests once again.
As two side notes, contrary to legend, Final Judgment claims that while JFK opposed Israeli construction of an atomic bomb, he did not make any overt moves against the Federal Reserve. Also, for more on the decline of WASPs, see The Dispossessed Majority by Wilmot Robertson or the following articles:
2010-06-20 The Death of the WASP by Paul Gottfried, Taki's Magazine.
2010-05 Elena Kagan and the Decline of WASP America by Kevin MacDonald, Ph. D, The Nationalist Times, May 2010

Getting back to the commentary by Jack Courtis of Kabala Library regarding The Divine Comedy and Kabala:
"...Although Dante’s classical and philosophical education was extensive, we cannot say for certain that he followed specific doctrines. In this article we will see that at the very least, he wrote consistently with what might be termed Christian kabala. We will only examine the broad structure of his work, because he wrote in great detail of both classical and contemporary issues that are beyond the scope of this article.
First, the Divine Comedy is in 3 parts; Inferno, Purgatorio and Paradiso. This is not only a reference to the Christian Trinity, but also a reference to the three-fold structure of the Hermetic kosmos. His classical education should not be underestimated. Secondly, he writes 34 cantos for Inferno and 33 cantos for each of Purgatorio and Paradiso. If the first canto of Inferno is understood as an introduction to his entire work, then there are 33 cantos that relate specifically to Inferno. So what does 33 mean? Obviously, it alludes to the age of Christ at his crucifixion and resurrection. A superficial reading of the Divine Comedy suggests a parallel in Dante’s own life experiences. However, 33 also alludes to the kabalistic Tree of Life. There are 32 internal paths on the Tree and then there is the external 33rd path that leads to God...
...Dante has described the kabalistic scheme of Salvation in Christian terms. There is no evidence that he studied the kabalistic texts, but the structure of the Divine Comedy is entirely consistent with kabala."


Other False Flag-Related Events:


2010-08-23 Mossad in America by Philip Giraldi, American Conservative. Mossad brazenness rises to a new level:
"...U.S.S. Liberty survivor Phil Tourney was recently accosted in Southern California by a foreigner who eventually identified himself as an Israeli government representative. Tourney was taunted, and the Israeli threatened both him and journalist Mark Glenn, who has been reporting on the Liberty story. Tourney was approached in a hotel lounge, and it is not completely clear how the Israeli was able to identify him. But he knew exactly who Tourney was, as the official referred to the Liberty, saying that the people who had been killed on board had gotten what they deserved. There were a number of witnesses to the incident, including Tourney’s wife. The threat has been reported to the FBI, which is investigating, but Tourney and Glenn believe that the incident is not being taken seriously by the bureau.
FBI sources indicate that the increase in Mossad activity is a major problem, particularly when Israelis are posing as U.S. government officials, but they also note that there is little they can do to stop it as the Justice Department refuses to initiate any punitive action or prosecutions of the Mossad officers who have been identified as involved in the illegal activity."
2010-06-16 From 9/11 to 4/20: BP Gulf Oil Leak and a Planned Course for History by Justin O’Connell, the Intelligence Daily. Topics: 9/11 skullduggery vs. BP-Gulf malfeasance. Topics: "Shorting the Gulf Region: environmental and financial terrorism?" and "Corporate Operational Defiance Disorder and the Management of Globalization."
2010-07-15 De-classified Vietnam-era Transcripts Show Senators Knew Gulf Of Tonkin Was A Staged False Flag Event, by Steve Watson, Prison
2008-06-15 Flashback: U.S. Counterinsurgency Manual Leaked, Calls for False Flag Operations, Suspension of Human Rights by Julian Assange, Statism Watch,, "Wikileaks has released a sensitive 219 page US military counterinsurgency manual. The manual, Foreign Internal Defense Tactics Techniques and Procedures for Special Forces (1994, 2004), may be critically described as `what we learned about running death squads and propping up corrupt government in Latin America and how to apply it to other places'. Its contents are both history defining for Latin America and, given the continued role of US Special Forces in the suppression of insurgencies, including in Iraq and Afghanistan, history making..."
2007-07-27 FDR, Pearl Harbor and the U.N. by John V. Denson
2005-10-11 Cheney's Halliburton stock options rose 3,281% last year, senator finds, The Raw Story


More examples of Hollywood movies with themes related to false flag manipulation, or dystopian futures created by plutocratic elites covertly at war with the host population:


2011-09-16 Planet Forum web page by "Dig" on the topic of "FF in films"

FF in films

If someone could do a montage, that would be awesome

The film version of V For Vendetta has the British government stage a biological warfare attack against the London Underground and a primary school, also imitating the Reichstag incident.
The Princess Bride has the titular character almost becoming the victim of a False Flag Operation when her fiance, evil Prince Humperdinck, hires agents to pose as enemy soldiers and murder her. This, so her death can be blamed on the neighboring country of Guilder, whom the Prince wants to go to war with.
The James Bond movie You Only Live Twice has S.P.E.C.T.R.E. running a dual false flag operation against both the US and the USSR space programmes, making it look like each nation is hijacking the other's capsules out of orbit.
The Spy Who Loved Me has a similar plot, where two nukes are simultaneously launched towards Moscow and New York, prompting nuclear war. The Big Bad, of course, is safe in his undersea base.
Tomorrow Never Dies also reused this plot, with an evil media mogul trying to provoke a nuclear war between Britain and China.
In the Woody Allen comedy Bananas, the dictator of San Marcos (a Fictional Counterpart of Cuba) attempts to assassinate a bumbling American tourist and frame a revolutionary group, in order to obtain American aid against the insurgents. It backfires, ultimately leading to the tourist becoming the leader of San Marcos.
In Star Trek VI The Undiscovered Country there were a bunch of false-flag operations going on, with Klingons firing on themselves to try and start a war, then (at least in the video releases) Humans pretending to be Klingons to assassinate the Klingon Chancellor at a peace conference. (Both incidents were part of the same conspiracy: Humans, Klingons and Romulans coming together to prevent peace. Awww...)
While a Film example, apparently Star Wars 1 through 3 was all about false flag operations; To trigger the creation of the Republic Grand Army for instance, to later become his own Imperial Army, and one huge galactic, totalitarian dictatorship. Palpatine/Sidious played off both sides, which he both controlled.

1997 Wag The Dog (Trailer) "Trailer for Barry Levinson's film starring Dustin Hoffman, Robert De Niro..." In this case of "art immitating life [the Clinton administration]," a U.S. President starts a bogus war to distract the public from a scandal and make himself look like a hero before an election. The Bush and Obama administrations would later become cases of "life immitating art" on steroids, to include Obama's "We killed Bin Laden" hoax of 2011 (See Chapter 12 which covers Bin Laden-Hussein fakery).


Web sites that routinely cover black ops (subscription site)



Forward to Chapter 9
Back to Chapter 7
Return to Contents
Books I-III Summary Table of Contents

Short URL for this web page:

Flag carried by the 3rd Maryland Regiment at the Battle of Cowpens, S. Carolina, 1781

© America First Books
America First Books offers many viewpoints that are not necessarily its own in order to provide additional perspectives.