9/11 The Anatomy of a Great Deception – Please Watch This Is If You Want To Know The Basics About 9/11 Conspiracy Theories
By Dark Politricks
I do apologise for some of the grammar mistakes in the first draft of this article but I did state that I have been in and out of hospital lately which has affected my ability to write due to the high doses of pain killers I am on.
Therefore I want to re-introduce newcomers to the 9/11 conspiracies to a great video that gets you up to speed on some of the key points ASAP.
It doesn’t go as far as naming real names such as the head of the Israeli Mossad Operation team who has admitted carrying out 9.11. Neither does it mention how Mossad were following some of the hijackers around for up to a year before the attack which even FOX News reported on before being forced to remove the articles.
However this video does open the door far enough for people to be intrigued enough to want to investigate more to go out and do that research.
Most people know all about the various parts discussed in the aforementioned film but for others this is a good starting place for anyone interested in 9.11.
Well it’s all about one man’s personal story from how he went from an average American husband and father who believed the Governments line on the 9/11 attacks to someone who nearly lost his marriage and friends over his investigation. It had most people he knew thinking he was going loopy for speaking out about the glaring inconsistencies in the 9.11 story.
These were lies being told to the American people to get them to fight wars in foreign lands.
He talks about the fast falling of the three World Trade Tower buildings, the super fast clean up, the ejected steel poles embedded in other buildings, the samples of dust consisting of a substance called nano-termite a substance only produced in top US military laboratories to the amount of people who had pre-knowledge of the attacks – especially WTC-7.
This was a building not hit by a place that collapsed looking like a perfect controlled demolition in almost free fall time, with no resistance from all the floors to slow the collapse down.
The institution called in to explain this mystery (that included a free fall unexplainable by physics) for over 2 whole seconds, was called NIST, yet the computer projection they came up with had no bearable resemblance to the actual way the building fell, and even they could not explain the 2 seconds of free fall.
He talks about how vans were turning up at 3am every morning after the janitors of WTC had left and then left again before they returned.
What were these people doing?
Has anyone asked and actually found an answer?
The people in the Government who tried to ask questions were silenced and prevented from speaking out about what they knew. These were CIA and FBI analysts trying to do their job as American patriots.
He also discusses how all the companies running the security of the WTC buildings, and even airports that the hijackers used were owned by Bush family members. Also how the close connection between Saudi Arabia where the hijackers came from, and the Bush family, allowed members of the bin-Laden family to fly out of the country without the FBI being able to ask them questions about the supposed architect of the whole attack.
Also it ponders on the question of why so many of the of the families of dead victims from the attack want a fresh investigation. Even the people of New York who voted to hold their own investigation were prevented from doing so.
What makes this video different from the others you might have seen about 9/11 is how it’s set from the perspective of one mans journey from an air of nonchalance about 9.11 and his belief in the honesty of the US Government to the total opposite. All because he saw one bit of video footage that changed his whole world view.
What was this thought? Just the single one about why George W Bush carried on reading to school kids when the country was under attack.
Any other President who had just been told there were multiple hijacked planes in the sky would have been taken out from the building to a secure location ASAP.
Who would have known whether the hijackers knew the location of the Presidents whereabouts that day?
Why did the Secret Service feel so safe remaining in the school and more concerned about scaring the children than getting the Present to protective custody in a time of “war”.
So he watched more videos, read more articles, and went down the “rabbit hole” until it almost broke his marriage apart by his obsession with the 9/11 conspiracy.
Therefore he started making his own video for his wife and family to explain to them WHY he was so obsessed with the 9.11 attacks. This is the video you will watch.
It worked, they watched it and changed their minds.
His marriage and family were saved.
Because of this he recently put this it up on YouTube for others to see and I suggest that you do spend the time to watch it, especially if you still believe the official report of what happened on 9.11.
For someone new to 9/11 and the discussions about all the various topics about who did it, why they did it, and who had something to gain from starting what is now becoming a 3rd World War between the West and Islam this is a great starter video.
It goes at a nice pace, fills you with facts and quotes from the mainstream media around 9.11 and then shows how the same media turned on anyone attempting to claim it was an “inside job” as nutters and weirdos. These were ex Government officials, Generals, Pilots, CIA and FBI investigators. Not your average garden variety loon.
Then if you want a real debate just read the comments below the article.
Just before I show you the video I want to show you a some film of what happens when a plane flying at the same speeds the hijacked planes were going when they hit the WTC and Pentagon hit solid concrete.
Does the plane enter the wall or does it just crumble into dust on the outside?
Now watch the video and send it to your friends, family and other people who believe the official conspiracy story.
9/11 – Anatomy of a Great Deception – Complete Version
Use The Pirate Bay Browser and stick two fingers up to the authorities and corporations who jailed the Pirate Bay creators
By Dark Politricks
Gottfrid Svartholm Ward and Peter Sunde
Help these two prisoners by sending them comfort items whilst they rot away in prison. Gottfrid can only receive letters whilst Peter can get letters, books and vegan candy!
These two prisoners are in jail for doing something that Google and BING do everyday and make millions from. The only difference is that Google and Microsoft work hand in hand with the US Police State authorities such as the NSA, GCHQ and the CIA.
So why not help these two out whilst they are stuck in jail as political prisoners for doing something Google a multi billion dollar company does constantly but on a much larger scale and is given a free pass from the Government to carry on doing it.
“It is collecting as much information about people as possible, storing it, indexing it, and using it to create profiles of people and then selling that to advertisers and others.”
“Those are the same procedures that security agencies go through. That is why the NSA has latched on top of what Google is doing.”
Watch the interview below.
Julian Assange: Google Is Like The NSA
A search engine like Pirate Bay or Google is just that – a way to search for items hosted on other computers. The search engines don’t host the files themselves they just supply a mechanism for searching for certain files JUST like Google.
I wonder how many “illegal” documents, videos, films, music, pictures and other items can be found with a Google or YouTube.com search? Lots – I know because I find them constantly!
So if you want to screw big business and the crackdown on Internet freedom help these two prisoners and continue to use the Pirate Bay by going through “proxies” – just search for “Pirate Bay Proxies” or if you have WAMP Server on your PC or a LINUX server that can run PHP scripts download this script to find out which proxies are not being blocked by your ISP.
Despite it supposedly being banned more and more people are pointing their servers to it so that you can use it. If you want do to the same hire a server in a freedom loving country like Iceland (not the USA or UK!) and set your DNS to point at the Pirate Bay IP address.
Now to use the Pirate Bay without getting caught – and by that I mean not getting a letter kindly warning you not to use it through in the UK. To do so you can do all of the following.
If you are being blocked from the Pirate Bay by your ISP then you have a number of choices.
On clicking the page will change (usually to an advert with a blue bar at the top) and in the top right corner will be another countdown saying “Please Wait”. Usually after 5 seconds it will say “SKIP AD”and on clicking it you will end up at the Pirate Bay mirror site.
2. Use a proxy to access the Pirate Bay. There are many free proxies out there and you can find a good list at http://nntime.com/proxy-list-01.htm. Use a tool like FoxyProxy to manage your proxy lists and toggle between them. Or you can go into your browsers network / proxy settings and manually enter the IP address and port number you want to use.
“Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.”
So do yourself a favour and use the Pirate Bay browser or the TOR Mozilla Browser. Not only does making use of the TOR network help protect your privacy but the Pirate Bay Browser will let you access a number of Pirate Bay Mirror sites and bypass any censorship that your ISP or country may have introduced.
Once installed when you open the .EXE you will connect to the TOR network.
Once connected you can use the Firefox based browser that comes with The Pirate Bay software to surf the web and access various torrent sites like Bitsnoop, Torrentz and of course various Pirate Bay proxies where people have pointed their own domains at the site as mirrors to keep it alive. The more they shut the sites down the more they will spawn like a virus.
All your Pirate Bay Mirror sites and other Torrent sites are linked at the top in the icon bar. Pick one and then carry out your search for movies, applications or other content.
As you can see it’s just a search engine like Google which makes it very unfair that the Pirate Bay is being blocked by ISP’s as Googlealso indexes illegal content such as porn and copyrighted material.
This is a search for the US TV show Dexter.
Like most search engines once you run a search you get your results.
As you can see from the results on the right there are two columns, seeders and leachers.
You want to choose an item with as many seeders (uploaders) and as few leachers (downloaders) as possible to get a quick download.
You can also tell from the names of the file what sort they are e.g if the file has the word CAM in it then it’s a poor quality camera in a cinema job.
If it’s HDTV quality it will be a bigger better quality file and BRRip is a BluRay copy.
Check for comments under each torrent download page to see what people have rated the audio and video quality and the type of file you will be downloading.
There are plenty of programs that will play all formats and I suggest downloading VLC Media player as well as your standard software to play .avi and .mp4 movies as it will play almost any format of movie file you might download.
Clicking on the file you want to download will open up the result page. Hopefully you will get comments telling you the quality of the file, the type of file, the quality of sound and video and other information.
Click on “Get This Torrent” to download your torrent file.
When you want to download a torrent from the Pirate Bay you will first need to have a torrent client. There are many out there including:
I use utorrent myself as it’s very easy to use and configure. It lets you set a folder for movies currently being downloaded, then you can move them to a “finished” folder once complete.
You can easily see which files are seeding or leaching at the time and you can change download and upload rates from unlimited to 1KB as well as set a proxy up to pass data through and change the port number all traffic passes through.
Once you have one installed your application of choice you can just click on the torrent in your search results and it will open up in the client and start downloading.
As you can see whilst you download the file you will also be uploading at the same time. This way you are not just taking without giving back the files you have already leached.
However be-warned, ISP’s are also on the lookout for people downloading (leaching) and uploading (seeding) torrents so you need to protect yourself.
Preventing Being Tracked Downloading
Some of the ways to stop or reduce people or companies from seeing you download torrents include the following and as always with security (in this case your own) it is better to use a variety of defence methods than just one:
-Using someone else’s WIFI or network. If your neighbour has an unlocked wi-fi or you can get onto a cafe, hospital or other open WI-FI networks with applications like “The Cloud” that let you use their WI-FI network for free.
-Using an anonymous proxy that doesn’t leak identifying information or even better a VPN. A paid for tool like BTGuard which is both a proxy and encryption tool which helps prevent your ISP throttle your traffic.
-Using a block list which will mean that all traffic is bounced around ISP routers so that they cannot scan the traffic, PeerBlock is an application that you can download that will do this although other Torrent applications can accept the uploading of lists of IP addresses into the application as well. PeerBlock just runs on your PC as you run your P2P software.
-Setting your download port to a common port for HTTP traffic such as 80 or 8080/8888 so that it doesn’t look obvious to your ISP that you are downloading P2P data. Most people use a “random port” but it is better to look like you are downloading HTTP content especially if you are encrypting your traffic as well.
-Limiting your upload rate to a minimum. Although this violates the spirit of P2P (sharing) the people going after you for stealing copyrighted material are more interested in those spreading (uploading) the content rather than downloading it.
-Ensuring you force outgoing traffic to be encrypted. This will help prevent your ISP see that you are using BitTorrent traffic and may prevent them throttling your bandwidth.
-Set a download cap on your traffic. Even if you are encrypting your traffic some ISP’s may see the amount you are downloading and throttle it if they think you are up to no good.
-Using an application like PeerBlock which will block traffic from known bad IP addresses such as P2Pblocklists, known bad IP addresses, spyware, FBI and copyright monitoring sites and so on. It is worth downloading and just sits in the background running as you do you’re downloading.
As with most security measures a wide range of different measures is much better than just relying on one system.
Hopefully this article will help you make use of The Pirate Bay if you have been blocked from accessing the website by your ISP then The Pirate Bay browser, UTorrent and Peerblock will help you out.
Remember the founders of The Pirate Bay do not deserve to be in prison. They are like the criminals that refuse to grass when they are interviewed. Because they won’t play ball with the authorities like Google and BING they are just criminals in the eyes of the Empire.
So stick two fingers up to the Empire and use to download your movies and hopefully Hollywood will soon get it into their thick heads that people want to watch films ASAP without going to the cinema all the time.
Netflix and Amazon TV do a good job for a cheap price but they don’t have the latest programmes and films on as soon as you want.
If they can sort that out people will be willing to pay a small fee once a month instead of using P2P.
Therefore the authorities need to come up with a cheap fix for their biggest problem instead of jailing people and just getting ripped off.
With Google taking seed money from the CIA and helping the US intelligence agencies improve their search algorithms and Microsoft buying up Skype, which used to be a way for people to talk securely over VOIP, there are now major doubts about Microsoft’s reasons for buying this loss leading company.
Why build in backdoors to popular applications when you can just buy out the company and have access through the front door to all the traffic and conversations users have by using the application.
However despite the gloom and talk of cut off switches and the blocking of social media in times of trouble, there are ways to minimise your “Internet footprint”.
Remember the saying from those who don’t seem to care about this invasion of privacy
“If you are not a serious criminal or terrorist then you shouldn’t have anything to fear”- A quote by idiots
However we all have something to fear when our governments share data between each other without our knowledge and systems like PRISM, ECHELON and TRAPWIRE monitor all our movements on and offline.
Do you really want private naked photographs or videos of you and your girlfriend passed around the offices of GCHQ and NSA for everyone to have a giggle. The workers are still human believe it or not. Even if your not into sending pictures of your junk to strangers or partners online you still might have a love note, a private business deal or idea that you want to keep quiet and not intercepted by the NSA.
Who knows what back-doors the big tech companies like Microsoft, Google and Facebook have allowed the US Government to install into their code and do you really want some nerd in Langley delving into all your data and Internet history just because you mentioned words like terrorist or bomb in an email or message?
However if you’re a reporter daring to expose the state crimes of the USA or the axis of war then you’re probably being watched through your webcam right now whilst your iPhone’s microphone is being channeled into GCHQ or Langley for analysing – tough luck!
The best defence against this is a bit of masking tape covering the webcam! If you don’t think they do this then you haven’t read a lot about modern techniques MI5 and others used to trap terrorists by reverse engineering their mobile phones so that they could not only track their movements but listen to their conversations through the microphone speaker on the mobile.
From a users perspective the Internet contains a myriad of security and privacy issues which if the user is not aware of could cause potential problems on all manner of levels.
For the privacy conscious person who wants to be able to surf the net without worrying about someone looking at the content they have visited in real time or at a future date e.g your work, government or Police then there are a number of issues they need to be concerned about.
When even the head of the CIA, America’s most powerful spy, David Petraeus gets sacked due to technical snooping we know that no-one is safe.
Howeverknowing how he was caught is very helpful for everyone. The more ways you know of that help the Government and Corporations spy and sell your data for money the better. You can then decide whether to take the risk or take measures to protect yourself.
This is an update of an older article and with the Internet constantly changing the ways you can be tracked this article will also constantly change as newer technologies come out.
For example with a few lines of code you can find out details that can be used to identify your computer, even down to geo-graphical location.
As with most web content if you wanted to be 100% anonymous on the web it will be pretty hard to do.
If you want to stay totally anonymous you should probably move underground somewhere as there is always a satellite up there somewhere and with Google Earthyou cannot even escape commercial companies any-more! So moving to the woods to live in a hut without electricity or broadband is not even a safe option, let alone a comfy one!
However there are various forms of tracking that you should be aware of so that you can limit the risks to you whilst surfing or using the Internet or phone. These don’t have to be to hide from the Government but could just be to prevent your personal details from being sold to advertisers or having horrible popup boxes show when you close a window.
This is not a comprehensive list but it is a start and it is also one that is constantly changing as technology changes. When I originally wrote this tablets (iPads etc) were not that common. Now they are just another place to accumulate your browsing history and a tool to be used against you if you are ever in that unfortunate position.
This is how the head of the CIA was caught out. He wasn’t sending the emails but he was saving them as a draft under an anonymous Google account and then letting his mistress login and read them.
This way there was no Internet trail as when you send an email the mail is routed from server to server and the IP addresses of the mail servers it traveled through are recorded in the headers of your mail.
Check it yourself. If you use a mail client find the option to “View All Mail headers” and then view an email that has been sent to you. At the top you should see the details of the route that the email took which should show the originating mail server, the receiving mail server and the IP addresses of any it traveled through in-between.
For example here are some of the headers from a spam email sent to me earlier.
So I can still find out some useful information such as (sometimes) the senders real email address if they host their own server and other mail server addresses that the email passed through on the way to your own account.
Usually hackers use email to spread viruses in this day and age by attaching files to the email and tricking you into opening them. If you get an email from your best freind with an attachment, check the headers, it will tell you whether someone else sent the email and just changed the “From” name to one you trust which is easily done.
This is a common trick to try and get you to open files attached to the email that because of your admin privileges (if it’s your computer) could install nasty software on your PC and possibly use your own address book to spread the virus on to others.
Even if your friend HAS sent the email, remember that they themselves might have been hacked, and remember your bank is never going to send you an email requesting you go to a page (that may look exactly like your bank) and ask you to re-enter your PIN code and card number and other personal details that could be used in identity and bank fraud.
Remember every time you visit a website every file that makes that page up (images, HTML, scripts and CSS) is downloaded into temporary files on your own PC before being rebuilt by your web browser into a usable format. This is you browser cache and it makes re-visiting commonly visited sites quicker as if you already have the files it saves time re-downloading them. However the larger this cache gets it can slow down your surfing if you don’t clear these files out regularly.
There is also software out there that takes seconds to rip off any site. I could just point it at the HSBC bank website and it would make me a copy of their client side HTML within minutes. I could then buy a domain with the name HSCBC in it somewhere so it looks “semi” legit and then send spam emails asking people to re-enter (or change) their security details as a “safety” precaution.
Remember any real email from your bank would never ask you to do this and just because the name of your bank is mentioned in the address e.g
www.security-update-hsbc.com (made up site) as opposed to www.hsbc.com (real site) does not mean that the bank OWNS that domain.
Phishing relies on people not checking email headers, or trusting that their friend or bank would never send them dangerous content by email. However you should never rely on that and remember that HSBC will own their own mail servers so would never send you an email from hotmail, gmail or yahoo.
However the head of the CIA was caught out by NOT sending the email. The reason was due to that all invasive “cloud” we keep hearing about that stores everything on multiple servers owned by big companies like Google allowing you to use multiple devices to access the same information without actually having to have the data you want on your machine.
When people use this draft save only technique they are trying to avoid this trail. However you are defeating yourself in the first instance by:
a) Using an online mail server such as Gmail or Hotmail. All the data including drafts are saved on THEIR servers i.e “in the cloud” so if they disable your account, or are served with a warrant there is a good chance your draft emails will be accessed and read along with your sent, read and junk emails.
b) If you don’t hide your origin when signing up for a throwaway Gmail or Hotmail account (you have to fill in a form to get one in the first place) then they will still get your IP address unless you have gone through known secure Proxy servers or used someone else’s computer without their knowledge (e.g an open Wi-Fi router). Do a scan on your PC / Phone now and see if there are any around you. Open ones won’t have a lock symbol next to them.
c) Remember that Microsoft computers store all deleted emails, web history and other files even when you think they have been deleted on your computer. Here is a very old article from 2000 which shows even back then Microsoft was hiding emails, web searches and other files from users. The scripts and batch files you might find if you search for “Microsofts Really Hidden Files” probably won’t work anymore but they probably have no need for such old methods especially when people are buying computers and defaulting them to backup everything to the cloud.
It may pain you but by using any Internet-based email service it means recording the data as it leaves the device you write your message on, storing it on a computer system you have no control over and by signing the Terms and Conditions you have allowed them to “own” your data and use it for advertising and God knows what else.
Plus nothing leaves the Internet, you can view cached versions of Google (or any site) all the way back to the 90′s on this site: http://archive.org/web/web.php
If you don’t want your own website to appear on this search engine that archives everything forever then they are pretty good about obeying the robots.txt directives so you can put this in your robots.txt file (read about it here) to prevent that site indexing your site.
To be really sure you can block the IP 220.127.116.11 in your .htaccess file or at your firewall if you wanted to stop them crawling your robots.txt file at all.
Also use throwaway email addresses if you can or even create your own with some basic scripting (not hard if you can be bothered) and put it on a server in another “more freedom friendly country” and use proper proxies to access the webpage front end to send your emails (the part about proxies come later on).
The need for these disposable email systems sprung out of the need for a quick email address to sign up to a site or set up an anonymous blog or anything else that you don’t want all the spam emails that follows. I also have found with some basic hacking you actually use them to send AND receive email – it all depends on how good the programmer is.
Either do a search for “Disposable Email Addresses” to find the latest ones or check out guerrillamail.com or Mailinator however a word of warning – there are lots of disposable email accounts out there who knows who really owns them? If you do use them make sure their URL starts with https:// (this means data is encrypted from your PC to their server).
As for Internet files you can use “cleaner” tools like CCleaner to remove cookies, old registry files, old programs, start up applications and Internet history easily. Plus you should never use Internet Explorer anyway, as there are a myriad of more security conscious browsers such as FireFoxout there which are much better on the privacy front as they are not tied into the operating system of your computer.
Using the Cloud to backup your “Secure” data
Storing anything on anyone else’s computer means you don’t have control over it. Therefore cloud based storage systems should be avoided for anything personal or secure. Even phones nowadays have settings to automatically back up your numbers, texts, photos and videos to iCloud or other cloud servers.
It might be good if you ever lose your computer or phone but remember that if the cloud based backup server is in the USA then they are probably sniffing everything inputted into it anyway.
This is the same for Facebook, Google, Tumblr and any other social media site. As soon as you put anything on that site THEY own it and if they are served a subpoena or warrant to hand the data over there is nothing you can do.
How to bypass
It may pain you but just don’t use Facebook, Google, Twitter or any other social media system if you are going to put anything dodgy on it.
The same goes for dropbox and any other web based storage center that may have to hand over your data to the authorities one day.
If you must keep files secret then keep a portable external hard drive at home and backup all your files to that device before hiding it. At least that way you have control and ownership over the backed up data and you are the only person who knows where it is located.
Using your computer hardware to spy on you
There have been many cases lately where computers and phones have been used against their owners to spy on them.
Take the battery out of your phone whenever you don’t want to be tracked. If you have a smart phone that makes it very hard to do this then the next best thing is to turn GPS off or turn on “Flight Mode” so no signals are sent out or received. If you are really paranoid a lunchbox wrapped in tinfoil is a good container to prevent strong signals from escaping.
It’s what shoplifters do to bypass door scanners as the foil prevents the alarms going off. Just owning a bag lined with tin foil is an offence in the UK called “going equipped”.
As the earlier report shows cellphone triangulation tracking takes less power than GPS tracking and even when your phone is turned off a tiny amount of battery charge is available to the phone which is enough to log your presence at a nearby tower and then log your presence down to the nearest 100 metres or so. Either that or use pay phones (if you can find any) or pay passers-by to use their phone when you need to make a call when your phone is unavailable.
On your computer turn off the microphone and webcam with your settings e.g on Windows it’s in Control Panel. On Windows 7 it will be under Speech Recognition and Audio Devices. To be extra safe wrap masking tape over the webcam when you don’t want to use it as well as the speaker (blue-tack or something else that would muffle the sound). Anything that can be useful to you can be useful to someone with control of your computer.
To test if your microphone is working either go into your computers settings e.g control panel or go to the old Google Search Engine (if it’s still available at http://www.google.com/webhp?hl=all ) hit the microphone symbol in the input box and talk.
If you see the blocks under the microphone move up and down and then a result similar to what you said appear in the box – the microphone is still on. If it’s off it will say so.
How to bypass
Similar to urchins these are little images, usually so small they cannot be seen, that point back to a web server and run some code whenever the image is loaded by a client. They tend to be used by email marketing tools and are embedded within HTML emails so that they can record who has actually opened the email and track the email if its forwarded it on.
They can also exist on web pages or within desktop applications and as the image is hosted remotely and whenever it is loaded it records the location of the application or user who is loading it.
How to bypass
Many email clients if they don’t do it automatically have the option to display emails as plain text which would prevent these webbugs from working.
I use Thunderbird which is free and you can set to ask you first whether to load any remote content at all whether they are images, scripts or anything not already embedded within the email. In Browsers you can disable images easily with the Web Developer toolbar, Google Chromes privacy settings or by using a text browser like Lynx.
Server Side logging by the page
Most pages on the web nowadays are more than pure HTML/CSS and contain code that runs server side e.g .asp, .php, .jsp, .aspx etc.
When the page is requested the web server parses the page and runs any code before returning the generated HTML to the client. This code has access to a lot of information about the client requesting the page such as IP address which can be used for GEO tagging, User-agent details, accepted file types and other information contained within the headers. They could choose to log this information to a database or file if they wanted to even if the IIS or Apache web server had its own logging disabled.
For example if you got to whatsmyip.org you will see all the information that is passed to each webpage you request including geo-location information, details about the type of computer you are using and much more. Whilst not totally accurate they can pinpoint the last location of the computer used to access a webpage which could be your own PC or could be someone else’s (if you use a proxy – see below).
How to bypass
Please read the guide under the following section about web server logging as it applies to both.
Logging by the Web Server
Every time you make an HTTP request e.g access a web page, a record is made on the web server that hosts that page to a log file. Each separate file contained within that web page is logged so every image, CSS file and script is logged along with your IP address, the method e.g POST or GET, the URL, bytes sent and received and much more.
How to bypass
As you must assume that the web servers you are visiting sites on have logging enabled then the only way to not get tracked is to go through proxy servers or use tools like the FireFox add-ons Modify Headers or Tamper Data which allow you to change the headers sent from your PC to the webserver in question and act as a mini proxy on your own PC. They cannot however change the REMOTE_ADDR header which holds the IP address of the PC making the request.
You can however make it difficult for the trackers by modifying as many X-Forwarded-For, Forwarded-For, HTTP-VIA, X-FORWARDED, HTTP_XPROXY and many more as you can, all giving them different IP addresses from different countries. This will make it look to anyone analysing a log file that you have bounced your traffic through multiple proxy servers even if you haven’t.
Remember a proxy is just an intermediate server that sits between you and the web server you want to access. If someone was tracking you they would only see your request to the proxy server and not the actual content that the proxy server requests on your behalf.
There are various forms of proxy server, some that are anonymous and others that pass your IP address along in the HTTP_FORWARDED_FOR, HTTP_X_FORWARDED_FOR or any number of other headers. You can also use code or tools to fill these headers with random IP addresses to make it harder for a tracker to find you as it will look like you have bounced round a lot of proxies when in fact you haven’t.
There is also a form of proxy known as an “anonymizer”, which is called this because it hides all the users identifying information such as headers that hold the IP and user-agent. There are lots online for you to use.
Anonymizers are not entirely secure. If an anonymizer keeps logs of incoming and outgoing connections and the anonymizer is physically located in a country where it is subjected to warrant searches then there is a potential risk that government officials can reverse engineer and identify all users who used the anonymizer and how they used it.
Most anonymizers state they do not keep logs but there is currently no way to confirm that. However, if the user used another anonymizer to connect to the exposed anonymizer, that user is still anonymous. This is sometimes called daisy-chaining. The safest way therefore is to use a chain of proxy servers to make your requests or use a specialist service like TOR which is designed to make it hard to track Internet usage.
Search Engines – e.g Google
Search engines such as Google make their money by selling targeted adverts to their users. To target their advertising more accurately they scan your search terms and emails (gmail) for words and then pass them along as you go to provide adverts that match your “needs”.
If you ever run a search in Google and look in the address bar you will see your search terms e.g if you search for “Dark Politricks” you might see this
Even though Google themselves are passing the data through a secure HTTPS port they still have control and full knowledge over your searching habits. Also as the request is a GET request (the details are passed in the URL address) then any company server or gateway will be able to log your searching habits in log files.
I used to run one myself that went through a number of anonymous proxies and if you can code it is not hard to obtain a list of proxies and use a chain to pass Google/BING searches through them to get your own search results. However as they keep changing their source code my own super search engine no longer works but there are many still about even if the most famous one Scroogle has been shut down.
These pass all your searches through HTTPS so that the content is encrypted and not readable by log files. They also claim not to set or pass cookies or other identifying information about you or your PC around to the sites you visit. I prefer www.startpage.com as you can see that your search is carried out by a POST not a GET request (e.g your search terms are not in the address bar) so it’s an added extra bit of safety.
Browser finger printing
Even if your browser has plugins installed to stop cookies, using secure HTTPS if the site offers it and you have other advert or flash blocking settings or tools enabled it is still possible to uniquely identify your browser by looking at all the information that your computer passes along when it makes HTTP requests.
For example by looking at all the plugins you have installed, your user-agent, your screen size, your IP address, whether you have cookies enabled and which fonts you have installed a clever coder could log them and create a “browser fingerprint”.
The following site panopticlick.eff.org will let you test your own browser for it’s “uniqueness” and it will give you a result of how unique it is compared to all other browsers it has tested so far. So far around 83% of all browsers have a unique fingerprint from their statistics.
How to bypass
You can also still use proxies, VPN’s, private search engines and anonymisers to hide your true location and user-agent switchers but instead of changing your whole Browser e.g from FireFox to IE you would just constantly change other parts of the user-agent such as the version number and any plugin support.
E.g if you are using FireFox: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:21.0) Gecko/20100101 Firefox/21.0 You could constantly change the numbers within the string between visits but not the main identifying section e.g Mozilla/5.0 (Windows NT 6.1; rv:21.1) Gecko/21100100 Firefox/21.1
The more frequently you change these without changing the actual Browser name (FireFox) it will reduce browser fingerprinting.
People use torrents to download films, music and other software. Sometimes these are illegally obtained copies or pirated software.
The Pirate Bay was one of the most famous sites that people used to obtain torrents and the people behind it are currently involved in legal action as the US movie industry is trying to sue them for facilitating the illegal download of copyrighted material.
Even though they are just a search engine on the same lines as Google or BING (and you can find torrents on those search engines as well!) – it is pretty unfair as the Pirate Bay are not uploading the films themselves they are just a search engine that lists files of a certain type.
When you download torrents you use special software such as uTorrent or Deluge to download all the tiny pieces of the file you want. The idea is that because you are not downloading a whole file from one location but rather tiny bits it from lots of locations you are not really breaking the law.
When you download you are a “leecher” and when you upload you are a “seeder“.
The software simplifies all this by allowing you to download a film and it connects all the tiny bits up for you so you don’t have to worry about where they are coming from. As you download you are also uploading the bits you have already downloaded so other people can obtain those parts of the object you are obtaining. You can change your settings to prevent the uploading part of this if you want to.
A detailed explanation (from a comment) would be:
A torrent file consists of only metadata; data about the file or files to be downloaded. The file names, sizes, and data that is used to check the accuracy of downloaded files are stored in the .torrent file, along with a list of ‘trackers’ – servers whose function is to make introduction between users who have the files, and those who wish to download them.
A large portion of the downloaded data -will- come from peers who -do- have the entire file (or files); not a collection of people or servers holding different pieces.
-Some- of the data will come from other peers who don’t have all the data, but that is because they are in the process of downloading it themselves, and the protocol is designed to encourage peers to download different sections of the data from those who have it all first, so as to reduce the bandwidth load on the ‘seeds’ who hold the complete data, as well as so in the event all the seeds go offline the full thing can be reconstructed by those with incomplete data downloading from each other.
The Pirate Bay was the biggest site on-line which is why it is being targeted and if you try accessing www.thepiratebay.org in your browser now I bet you it will be blocked by your ISP.
How to bypass
There are many proxies for the Pirate Bay which will allow you to access the site from a different URL. Just search for “Pirate bay proxies” and then pick one either that or download The Pirate Bay browser that uses TOR and allows you to access Torrent Sites including The Pirate Bay, Torrentz and BitSnoop from a different IP address than your own.
You might find an advert at the top of the page counting down – this is a way to access the site once the count is down to 0. Ignore the main part of the page and click on the “view” button that might appear after the countdown in the top right corner which should take you to the pirate bay proxy.
You might have to try a few out first but I use https://piratereverse.info. As soon as the ISP shuts one down another one will pop up (just like the thousands of people who pointed domains at WikiLeaks when it was blocked) so you will always be able to find a site to get them from whether it’s the Pirate Bay or a User Group or discussion board.
If your ISP is blocking all your Pirate Bay Proxies then you should download the Pirate Bay Browser which uses TOR to give you an identity that allows you access to a number of Pirate Bay mirror sites. You should read this article of mine on how to use the browser and P2P software to download torrents.
Also beware that many torrent tools will be flagged as Trojan down-loaders (even when they are not) and also that ISP’s and other government organisations insert their own trackers that log the IP addresses of people downloading the torrents so that they can contact/blacklist/reduce your bandwidth etc. Therefore be careful and pick a good one and read up about trackers before engaging in torrent downloading.
To make the chance of being caught a lot less you can should change your torrent tool settings to go through a proxy server - preferably HTTPS (encrypted) or use any option that forces encryption when transferring files
You should also change the port used by the tool in your settings from a random number to 80 or 8080 as these are common webserver ports and make it hard for ISP’s to tell what kind of traffic is being transferred.
If possible use a “block list” that will mean that all the data packets sent to or from you will bypass known ISP routers where they can be sniffed and identified. More and more ISP’s are doing this so this is wise to prevent yourself from being caught.
Read these articles to help you install a torrent down-loader and set-up measures to prevent yourself being blocked.
Cookies are small text files that are stored on the clients computer and contain very small pieces of text. They are mainly used by websites to store flags that enable the site to know whether you have previously been to their site or not. Advertisers also use them to track the type of sites you visit so that they can deliver targeted advertising the biggest offender being Google which uses their domination of the market to track the sites users visit so they can target content specific adverts to the user.
Another type of cookie is a session variable which is used by many sites to store a unique ID that refers to a visit on the site. The ID is generated by the web server and the session cookie only stores this ID so that on each request to the server the system knows that the visitors requests belong to one visit.
How to bypass
If you are concerned about tracker cookies then you easily disable site related cookies in your browser but if you disable all cookies then Session variables won’t work and you will most likely find yourself getting logged out of member only areas of websites or not being able to login in the first place. The best option is to disable 3rd party cookies (those set by advertisers) and to delete non essential cookies after using the internet (Incognito mode in Chrome).
Flash, ActiveX, Java Applets
3rd party components such as Flash, ActiveX controls and Java applets come with their own security concerns. There have been numerous security vulnerabilities reported with these types of component as due to their complexity and power they have more access to the clients computer than a normal web page. They should be seen as mini applications rather than just a fancy banner, game or helpful utility to enable you to upload files to Facebook more quickly.
You shouldn’t install these types of application unless you are totally sure they are safe as they could have a lot more control over your computer than you realise. There have even been hacks that have enabled remote users to video and record a user through their webcam without them knowing.
How to bypass
You should also regularly check your PC for viruses and spyware. One of the first things modern Trojans do nowadays is download good anti-virus software so that they don’t get overwritten by another spyware app!
They also try to disguise themselves as virus checkers to avoid detection. Even the best off the shelf virus checkers don’t catch all forms of spyware especially those that have to regularly download virus definition patterns as it means new viruses don’t get caught until they have been identified, a pattern created and downloaded by the client.
Virus payloads can also be modified randomly to avoid pattern detection so tools that don’t use pattern matching such as hijackthis.exe which runs an analysis of all currently running processes looking for odd behaviour are good tools to use. This tool will generate a report which can then be analysed by members of the special Hijackthis.exe message board for signs of infection.
One of the best removers of Trojans I have found is a tool called SDFix.exe which managed to detect and remove a Trojan that four other tools including an off the shelf app didn’t detect. There are also a number of good free products such as MalwareBytests Anti-Malware and AdAware anti adware and spyware software which can be run regularly to check your PC for spyware and viruses.
However keyloggers that are based around hardware such as cable extensions that you don’t notice that have been inserted by your employer are undetectable unless you know what you are looking for and will store every key pressed on your PC whilst enabled. Check your cables that come out your computer to see if anything strange is connecting two parts of a wire together.
If you are caught out by such a tool make sure your employer has followed the law by informing you of all anti-privacy measures such as monitoring your PC and web usage in your contract, as if they haven’t then you have a good legal case to sue.
Article 8 of the Human Rights Act that is used in the UK has been successfully used in previous cases by employees who have been sacked due to unknown spying by their employers and should be used by anyone taking their employer to court if they have been sacked due to such technological spying.
Tools to use to aid privacy on the web Firefox Add-Ons
Flashblock disables flash movies until you enable them. Allows creation of a white-list of allowed sites.
FoxyProxy manage your proxies with an easy to use tool.
Tamperdata or Modify Headers acts like a proxy and allows you to modify HTTP requests as they are made from your client.
HTTP Fox, Firebug and even the Chrome developer toolbar allows you to see all the data your PC send to websites and the data sent back by the webserver you are accessing. It also shows any redirects or code loaded in that you might not be aware of.
Use Incognito browsing to prevent browser and search history and cookies from being stored.
Enable the DNT (Do Not Track) option – many sites don’t support it but people hope they will soon.
Turn off all options for using 3rd party tools to help you complete searches, navigation errors and automatically send crash reports to Google.
Firefox and IE9 also have privacy modes that can be used to remove cookies and reduce your internet footprint but I would not trust anything Microsoft as it’s hooked into the computers main system and parts of the browser are shared with other non Internet based software.
De-activate 3rd party cookies used by trackers, advertisers and sites wanting to keep track of you as move around the web such as Google Analytics.
If you share a PC Clear your cache, autocomplete, download list and history regularly – use CCleaner, AdAware etc.
If you need more details about the various forms of Internet Censorship and how to bypass it then check out the following article that contains a lot of details about the various methods used and how to bypass them.
If you want to quickly access some web based proxies you can pick from the following list or you can read my guide on creating your own web proxy which comes with an example and some code you can use to get running. It’s just something I knocked up in a hour or two so don’t expect it to be a fully functional proxy server however it shows how even minimal coding skills can be used to generate your own web proxy.
As he rightly says, Saudi Arabia, a country we are allied with, has beheaded numerous people since August the 4th. Despite this we continue to sell weapons and do big business with that Islamic State.
Russell wonders whether if the man dressed in black in the video brought out by ISIS had a Saudi accent, instead of an English one, whether it would have even made the news. I suspect it would, but only because it was an American journalist being beheaded.
If it was an ordinary Saudi women being beheaded for getting raped (adultery) or a man having his hand chopped off for theft, then we wouldn’t have heard the news. I ask, have any of you heard any news about the recent beheadings in Saudi Arabia? Yet we continue to rely on its intelligence and do business with the 7th century state despite it’s proven links with terrorist groups.
Why is it that we don’t stop our relationships with such counties as Saudi Arabia and Qatar that fund the the same terrorist groups that David Cameron wants more working class English and American people to go off and fight. Could it be that money talks and our foreign policy isn’t based around any ethical considerations at all?
Remember just months ago our leaders were saying that the evil enemy was President Assad of Syria. Our own governments were supporting, funding and even arming groups that were fighting his government. People going off to do Jihad in Syria were fighting an “evil tyrant“, one that only recently used to dine with US Secretary of State John Kerry and who was actually considered by the west as reformative compared to his father.
Now that these groups have crossed the border into Iraq and become ISIS they suddenly become the enemy.
People who were “bravely” fighting Assad are now “terrorists“.
Groups we trained and armed are now in Iraq causing havoc under the banner of the Islamic State. However why is this Islamic State, along with Iran, evil whilst Saudi Arabia is allowed to continue to arm and fund the exact same groups that we are supposed to fight?
As Russell Brand rightly says. For people like millionaire David Cameron, and his fellow Etonion friends, who are directors and shareholders in arms companies and other businesses who benefit from wars, to tell us to fight another war is hypocritical beyond belief.
For Cameron to lecture us that we must go over to Iraq and lose more freedoms and liberties at home due to another UK/US foreign policy that has gone awry, just like the arming of the Mujahideen in Afghanistan who then became the Taliban and al-Qaeda, is pure bullshit.
He isn’t going to go an fight for his belief that we must go to war with ISIS.
No it will be the poor, working classes, who join the army as the only way out of communities that have been decimated by Tory policies, that will be doing the fighting for him.
When our leaders send their own sons and daughters to war zones and don’t skip military service like many US Presidents or politicians have, then we can look at them with more respect when it comes to war.
Even our Royal Family force their sons to serve in the armed forces, although safely, to show the public that they are “doing their bit”.
Prince Harry fought in Afghanistan, Prince Andrew in the Falklands and Prince Charles, Prince William and even Prince Andrew (for a short while) served in the armed forces.
There is nothing I hate more than chicken hawks telling me that I must go and fight for their own mistaken foreign policy blowbacks.
I am tired of people who haven’t seen real violence telling people who have to go and fight.
When you have actually heard a knife enter a body, the sound and memory stays with you forever.
When you have killed another human being it stays with you.
Serious violence effects the human brain.
Why else do you think there are so many homeless drunks, people with mental health issues, and prisoners who are ex soldiers?
This is why so many ex-generals and military leaders are against war whilst politicians and people who have never been in one are all for them.
These ex military men have actually witnessed the mayhem and chaos at first hand.
The stench of death and the sight of murder right up close and first hand.
They are not sitting in their nice offices writing OP-Ed’s on why we should start World War III with Russia over Ukraine or why we should send troops into Iraq again to fight ISIS like so many US journalists are currently doing.
Only psychopaths enjoy this kind of killing which is why our armed forces are trying to remove the soldiers from the battlefields and replace them with drones.
They are trying to make war into a computer game. One where kids and women are just characters in a computer game to be killed without any thought. Drones ensure that the killer can sit far away in a room in Las Vegas whilst the murdered victims are thousands of miles away.
The millions of people who marched against the war in Iraq through London a decade ago knew that war wasn’t the answer.
Some people, like Tony Blair and David Cameron, still claim that our interference in the region, in Iraq, Iran and Syria hasn’t led to this creation of the monster called ISIS or Islamic State, they are wrong!
The only solution to a regional crisis such as the formation of the Islamic State has to come from the region itself, without us sending more troops to the region.
We can help by stopping our crusades on former leaders who were our friends only a few years ago and instead removing our links with the real enemies in the region such as Saudi Arabia and Qatar who are funding these terrorist groups. These are the epitomy of the two-faced coin country.
Here are just a few ideas for how regional countries could help solve the ISIS problem without us sending troops in.
Israel could do itself a massive PR job and use its massive armed forces to attack ISIS instead of Palestinians for instance.
The US has spent billions giving Israel tons of fighter planes, missile systems and other arms. Why can’t Israel see the real terror on its borders rather than the poor, malnourished, suffering people of Gaza, and do the world a favour by going after them instead?
They have the means they just need to act on the threat beside them instead of going after Iran who also see’s ISIS as a threat to the region.
Iran could be allowed to help Iraq, along with Syria, to form a pincer movement on ISIS for instance.
Attacks from both sides, along with Israel from the east and the Kurds could easily encircle and destroy this monster. How likely this scenario is can be measured in the 0.1+% range, yet if actually carried out it would probably crush the newly formed Islamic State in it’s infancy.
Isn’t it a shame that Israel and Iran can’t actually put aside their differences and come together to fight a common enemy?
We could help by stopping to claim Assad is a war criminal without facts and remember our leaders used to have dinner with the same people we are now trying to remove e.g Assad and former leaders Col. Gaddafi and Saddam Hussein.
It’s because we removed these strong men leaders, and yes dictators, that underlying sectarian factions came bubbling to the surface and were unleashed along with a pile of weaponry supplied by the west.
I’m not saying these leaders were not problematic themselves but for the West to believe that democracy would just flourish in a region where none had ever existed if we removed them was naive at the least and crazy at the worst.
President Assad having dinner with John Kerry
Donald Rumsfeld meeting Saddam Hussein
Tony Blair meeting Col Gaddafi
If we stopped labeling Iran and Syria as the enemy and realised that these countries could actually help form the solution to a problem we actually caused then they could become rehabilitated members of the international community again. Not that they shouldn’t be already just that it would be a massive boost to their credibility if they helped destroy this ISIS monster without our interference.
And most of all we need to realise that countries like Saudi Arabia and Qatar are funding and arming these groups whilst we make billions from arms sales to these same countries.
Let’s remember that if the US Government’s story of what happened on 9.11 is correct. Then the people who attacked the country was Saudi Arabia not Afghanistan or Iraq.
Logically the US should have gone to war with this despot backward 7th century country, where people are beheaded or mutilated daily as punishment for crimes we don’t even send people to prison for.
A country where thousands of Princes and Royal members live a life of luxury, holiday in Dubai, send for models to have sex with or pay millions to have famous pop stars sing at their parties. All whilst the majority of the population live in absolute poverty.
This was the country the US should have attacked if their conclusions on who the terrorists on 9.11 were was correct.
However that would have meant the Bush family falling out with their favourite despots, Bandar-Bush incorporated has been causing havoc for years.
The Bushes and the leaders of Saudi Arabia were too closely linked and yet the US claimed 19 Saudi hijackers were behind the 9.11 attacks. Hypocrites and liars.
When we can actually have a real ethical foreign policy and see the real enemies in front of us all then the region can come together to fight them. I for one would rather live in Iran than the Islamic State or Saudi Arabia any day of the week.
Yes they have their own religious based issues but they also have a vibrant modern youth population that we are making suffer with our unwarranted sanctions and name calling.
Let’s see the real “axis of evil” for what it is. Saudi Arabia, Qatar and ISIS are all linked corruptly together and the West hasn’t helped by funding the same groups that were rebel fighters one day and terrorists the next.
This might be a generational issue that we are fighting but let’s not allow our leaders to implement more anti-terror laws to remove more liberties and freedoms at home when the real enemies are those we helped create thousands of miles away.
Lets listen to Russell Brand talk about ISIS and David Cameron’s support for more US/UK war as the solution to it.
Operation Protective Edge - Israelis looking for kidnapped IDF soldier can destroy whole Palestine communities
By Dark Politricks
I have just spent a few hours watching the nightly news on a few UK TV channels such as BBC, ITV and CH4 plus RT.com and Al-Jazeeraa for some opposing points of view, and then of course FOX, MSNBC and CNN for a one sideded laughable attempt at anything like news reporting.
I am sick to the bottom of my stomach.
Gaza is one big rubbish tip.
Children are playing in the rubble, remnants of their old homes with raw sewage running down the street.
The sad thing is that their whole lives have been full of this type of Israeli bombardment and treatment. In their little minds this is “normal life”.
IDF Troops are patrolling their streets menacingly treating each Palestinian they meet as the potential head of al-Qaeda. Maybe they should be looking a bit closer to home for that one……
At the moment we are met with overran with Hasbra social media BS and PR Quotes from the Israelis like “Gaza will feel the full force of our army until our troops are returned”, as they blow massive holes into the Palestinian bomb sites they used to call villages, all trying to stop Hamas sneaking the kidnapped IDF Lieutenant, Fawzi Barhoum, away from them. OR maybe it’s just another excuse to go “medieval on their arses” with impunity.
Something called the Hannabal Protocol means that IDF Generals can do anything they want to find and release the captured soldier whether OR not if it brings the captured soldiers own life into risk by their tactics.
It seems they would rather kill the captured soldier than allow him to become a Hamas prisoner.
After the capture of Gilad Shalit, the Israeli solider who was released for hundreds of Palestinian prisoners (probably just innocent teenagers caught throwing stones as a tank), The Jewish News says IDF commanders reviewed this policy which declared that everything possible must be done to prevent soldiers from being abducted - even if it means endangering them.
The swap of Palestinian prisoners stuck in the throats of many and new tactics were drawn up that allow for total destruction of anything that could save the kidnapped soldier before they were held for ransom.
It doesn’t just mean just endangering the Israeli’s of course it means killing dozens, hundreds if not thousands of Palestinians who are treated as “collaborators” or “terrorists” just because they are forced to allow masked Hamas fighters into their homes to fire rockets from their roofs. All in the knowledge that within 10 minutes an Israeli missile will come and destroy their house.
Why the rockets are not fired from Palestine into disputed areas and illegal Israeli occupied territories which would be outside the main Israel air space protection and would cause more damage I don’t know. But then we do know Hamas was helped in it’s creation by the Mossad to split up Palestinian solidarity and drive the Fatah secular movement that was delivering towards peace talks straight to failure.
The Israelis wanted in-fighting between the Palestinians, secular and religious. It worked and when recently the two groups made up their differences which has kept them divided since the “free elections” that the US so badly wanted except the result that is.
Our election result or the highway it seem when it comes to “spreading freedom and democracy” as a major tenant of US war policy. The west hated the outcome of the election result yet the Israelis were secretly very happy when it broke the solidarity of the Palestinian resistance,
However now that the two sides are once again “making up” the Israeli’s are fuming.
Divide and conquer is their tactic not peace, making up and detailed discussions over fair and balanced treaties and border lines that have been agreed already by the International community.
Having a secular group fight an Islamic group bent on Israel’s total destruction is the perfect excuse to keep the Israeli population frightened with “outside enemies” and the Palestinians pre-occupied with in-fighting.
It’s not as if every Palestinians loves Hamas, but saying “no” to a group of armed men when they enter your house to fire missile when it could risk you being shot or thrown off your own roof top, is not exactly an appetising prospect in front of your own family.
Hamas maybe controlling the Gaza Strip with an iron clad fist but it doesn’t mean Israel should control them by deciding which food, medical items and other products should be allowed in or out of the territory.
Israel may claim they don’t “control” Gaza any-more, but they certainly control the air space, waters and entry points into the territory. So if that isn’t control I don’t know what is.
And when people come together in peace, to send vital items such as food, medicine, glasses, wheelchairs, saline, rubber gloves and so on into Gaza by the way of peace flotilla’s they are met by force on the high seas.
Force which by law can be met by equal force to repel it and prevent such illegal pirate attacks – the same kind of force we are told we can use against Somalian Pirates.
Make no doubt about it the attack on the Mavi Marmara was illegal piracy in international waters by the IDF who attacked a peace flotilla perfectly within its right’s to deliver its cargo and defend itself against an illegal attack on the sea near Gaza.
And if the USA cannot even stop their own citizens being assassinated by their “close ally” then what can they do to stop the massacres, illegal settlement buildings and other international war crimes by the one ally who spies on it more than any other “friendly” other country in the world.
In fact will America EVER stand up to Israel?
Previous history has shown they haven’t so far despite the worst ever spy in US history Johnathan Pollad spying for Israel, and over 60 CIA spies being executed due to his revelations.
He is such a sore point due to Israel celebrating his birthday as a national holiday and that every time peace talks are brought up over Palestine their bought off Congressmen and Senators bring up his release from life imprisonment as a pre-condition, something the CIA will never agree too.
It’s probably the whole reason this demand is always brought up at these peace talks in the first place due to that fact they know it will never happen.
The Israeli’s don’t want true peace only peace on THEIR terms.
Killing US citizens whether they look slightly “Muslim” or not doesn’t seem to change the balance of power in the US/Israeli relationship.
Below are the details of the assassination of Furkan Dogan a 19 year old Turkish Americanwho was the youngest person killed by the IDF on the Mavi Marmara, in the Gaza peace flotilla raid.
Here was a US citizen executed by IDF troops caught on camera and nothing was done or said about it publicly by the USA.
How would you feel if your country allowed you to be treated like this by a supposed ally?
So should IDF generals use the kidnap of second Lieutenant Hadar Goldin, 23, the soldier that the Israeli army said went missing in the Rafah area of Gazabe allowed to useIsrael’s Hanibal Military Protocol to destroy everything in sight “just in case“.
The Palestinians see this kidnap as just another cover for more massacres of Palestinian people.
A Hamas spokesman, Fawzi Barhoum, would not confirm or deny Goldin’s capture, saying that it was being used an excuse to attack the prison population of Gaza who have nowhere to run and hide from the constant shelling of their territory despite the “caring” IDF spokesmen who are constantly on US TV saying how they drop leaflets telling the people of the area that they should move to safety.
The problem is that these areas are usually schools that the IDF then go on to bomb and shell-like the 6 so far confirmed by Israel alone in this conflict alone.
I mean is it okay if someone drops a leaflet on your house saying it will be attacked and destroyed by the IDF in 10 minutes time ? Does that make it completely okay under international law for them to blow up your hard-worked for home?
I wonder how many of the thousands of Palestinians who have been beaten and jailed since the latest operation started are actually linked to Hamas in any way whatsoever or are they just poor lads who were beaten in the past by the IDF and have their names down on a list somewhere.
Probably the latter I suspect.
Anyway watching one-sided institutional news programming for the last few hours has made me sick.
I just hope it has made a few other people sick as well.
Dark Politricks is a site dedicated to investigating the dark side of politics including corruption, propoganda, the police state, war on terror, the intelligence services and their misdeeds, false flag attacks and much more. The site also promotes free speech, internet freedom and social justice. For an overview of my beliefs and political leanings please read this.
Whereas the site contains many articles from various sources I do write a lot of my own essays and I am now having to pay for hosting to ensure that this under reported content is available. So please help me continue to do so by visiting advertisers sites or making a small donation.
Get instant notification of new article postings and other news collated from the best sites on the net by following me on