I have mentioned previously the authority held by CPS and similar organisations. This story illustrates it: During the summer, many families take the opportunity to go […]
Month: June 2015
How The TPP Came From The U.N and Agenda 21
I quote from the YouTube page: In this video Luke Rudkowski interviews whistleblower and research Richard Grove of tragedyandhope.com. Richard describes how he whistleblowed (sic) […]
Greek debt line: banks close, ATM lines mount & IMF payment looms
This brief video summarises the Greek financial situation today. For me, the question is, will this situation be used to trigger the unravelling of the […]
Labour peer Lord Janner WILL face prosecution for historic child sex abuse
Labour peer Lord Janner will face prosecution for child sex offences, Britain’s most senior prosecutor Alison Saunders revealed this morning. The ruling comes just months […]
Hackers Stole Secrets of U.S. Government Workers’ Sex Lives
The above is a good headline that should draw lots of readers. The article is revealing more detail of what was exposed by the recent […]
The fascinating Kailasa Temple in Ellora Caves
I quote from the YouTube page: What is so special about this temple? This temple was not constructed by adding stone blocks, but an entire […]
Wikiweasel Coverup As Saudi Contact With Israel Censored
Gordon Duff poses a scenario regarding WikiLeaks that is different from the mainstream, and also the view I have formed. I quote: Similarly, we also […]
How much should the average American worry about “radical Islam”?
As those who look below the surface know, this Islamic terrorist picture has been a creation of those behind the scenes. Whilst I do not […]
David Icke – Possession is not a myth
As David says in this video, the notion that non-physical entities can exist and interfere with someone is widely dismissed, when it’s been widely accepted […]
Google’s ‘listening network’ could be exploited by NSA – Falkvinge
Voice recognition technologies are part of the future, but should trigger concern that IT companies are essentially building “listening networks” which can be exploited by […]
Recent Comments