If you have just happened on this website, or you’re a loyal visitor, we wanted to breakdown how this site is designed. The short and skinny is that this site is designed to save your life. We know that’s a bold claim, but it’s a scientific fact that the more you read our articles, and open your mind to their Truth, the more everything in the world that was chaotic and unpredictable will immediately come into focus and seem like a well oiled plan.

The sad news is that the world population is under attack. A small group of people that we refer to as the elite are right now several decades into their plan to poison the world, destroy our freedoms, our health, and thus continue their strangle hold on us. This website is the single best place to arm yourself with how and why they do what they do.

We are not right, we are not left, we are not tea party, we are not libertarians. We fight for the human race, and believe that the United States Constitution in its original form was the best approximation of how to ensure freedoms within a nation. If you read something that makes you feel like we’re loyal one way over another, please understand this is your internal indoctrination fighting to end the debate prior to discovering the culprit.

Even though we use a blog WordPress layout, and even though we have topical articles throughout the month, all of our content is designed as a reference of freedom. Every article has a single goal, and that is to alert the public of what we call a “Pattern Of Deception.” This would be a formula that is designed to trick the public into a way of thinking that robs them of their liberties.

Many people believe that greed and incompetency is at the heart of all that is wrong. We think that once you focus on how your freedoms are being systematically destroyed, you will soon discover the patterns we write about so much. The elite of the world are gaining ground on repressing societies using technology and financial systems that are con games at their core. We as a people can defeat these patterns as long as we recognize them.

We ask that in the name of freedom you promote our website however you can. On your Facebook pages, Twitter accounts, or anonymous posts in any public forum. You’ll notice we do not have a personality you have to worry about. No one is yelling through a bullhorn. No ads. We aren’t interviewing UFO abductees. We aren’t predicting martial law or a police state. We aren’t selling hopelessness and despair. We have created OnePageNews.com to provide a place where normal people can refer their friends without being associated with the embarrassing content that tends to follow.

We simply work every single day to distill down the misdirections and manipulations on society. We want your family healthy and free. If there ever was a time in history for you to ask what you can do for your country, it is now. Regardless of where you live, you need this information to help expose the elite and their agendas. They will fall in a single day once the consciousness of the world overflows with knowledge.

Click on any article, because it is sure to open your mind in some way. Above all explore, and be a part of the movement to set man free. Use the “Recommended Path” to the right to get started.

Once upon a time there was a man named Stanley Meyer. He invented an engine that could fracture hydrogen from normal tap water. He then created a replacement for your spark plugs that allowed you to retrofit any vehicle on Earth for around $1,500 to run on water. On March 20th 1998, Stan was poisoned to death for daring to create freedom from the mega oil companies. Since then, people around the world have collaborated to build his devices and decipher his electronics. Below is one of the best videos presented by Stanley himself. What you are seeing are the electronics that will replace the normal combustion engine with digital circuits. Next Stanley will demonstrate the installation of the technology on a vehicle.

You are being duped into believing that oil is our only option. We don’t need electric cars. We don’t need petrol cars. We don’t need refineries. We just need to use what mother nature has already provided. Clean burning hydrogen that is only created at the moment it is needed. No tanks of dangerous explosive chemicals. No more fuel stations. Just water, and a tiny battery to get the ball rolling.

We’ve been very cautious to jump into the conspiracies surrounding Flight 370, but we believe that Bill Still has finally created a paper trail of convincing proof that many factions are working together to hijack this plane, kill its occupants, and get away with it having pitted the crash in the Southern Indian ocean.

Regardless if Bill Still is right, this is what real reporting feels and looks like. Demand that your local “reporters” do the journalistic exploration that Bill does on a daily basis. And if you can, donate to Bill Still on a monthly basis. Subscriptions start at $12 a year. You might be broke, but you’re not that broke.

DEFCON 3

No one goes to jail for 9-11. No one goes to jail for MF Global. No one goes to jail for JP Morgan’s crimes. No one goes to jail for missing Pentagon funds. No one goes to jail for invading Iraq under false pretenses. No one goes to jail for Benghazi and the running of weapons to Al Qaeda. The list goes on.

YOU go to jail for an unpaid speeding ticket, overdue tax payments, not kicking up to the IRS Don Corleone, YOU got to jail for any number of small infractions or transgressions, YOU are treated like a criminal in the airport, immediately suspected of a crime and searched like a convict while these very same people exempt from their own laws reap huge profits from the cancer spreading body scanners.

You had better wake up and understand that both parties are infiltrated. Neither one of them will do a goddamn thing to represent you, your interests, or anything you care about. They serve their corporate masters who make them wealthy and exempt from all law, taxation, and accountability. We labor to fund their excess. They labor to bury the nation in debt and division. Don’t take the bait.

defcon3We are at DEFCON 3 with these people, and we had better decide how it’s going to go. There are solutions out there. Our enemy is within our walls, and that, my friends, is the most dangerous kind.

These people, this wretched Ruling Class, will never ever lift a hand to help you or anything you care about. You will never have a voice on anything that matters as long as the east coast, blueblood, ivy league, skull and bones crew run the show.

They want you to jump through their hoops. They want you dependent on their idiotic programs, handouts, and regulations. They want you poor, stupid, watching TV and taking your pharma drugs.

Do not be deceived. Your taxes do nothing to help the nation. It’s a screwjob that’s been in place for a hundred years to feed the slovenly bellies of Europe’s power class at the expense of our labor and time.

The Fed winks 85 billion dollars into existence monthly, slaying the dollar’s value and our purchasing power, but you have to vomit up nearly 30 percent of your wages – not income – to the Don.

It’s mafia. It’s crime. It’s larceny.

Voting for Republicans isn’t the answer. They’re only pretending to be Libertarian so you’ll stand down and put the same people, the same mafia, into the driver’s seat.

The future is in a very dangerous cradle. Step one, Learn The Rules That Rule You!

The Global Warming CROCK

Global-Warming-Facts-Losing-Support-In-US-Considered-A-Fake-Climate-Change-Hoax-665x385Even the best in the business get persuaded to believe in things that are repeated enough. Global Warming, now named Climate Change, because of its obvious lie to the world is one of these horrific tales. We have found that most people deep down inside know this is a scam, but the utter pressure from do gooders who lack any basic scientific backgrounds can’t weed through the pier reviewed documents that claim otherwise. This article will empower you forever to prove that it is indeed a lie, and that the sources you get that the temperature is rising all over mother Earth is either a lie or a temporary manmade alteration.

What causes heat in the atmosphere?

The atmosphere is warmed by water, not carbon. The amount of total carbon in the atmosphere averages .054%. That’s a fraction of a single percent if you’re not good at math. Carbon does not have the atomic properties to harbor heat, and that’s a fact. We make objects about of carbon fibers because they are stable in this manner. They don’t make nose cones on jets out of fiber because they consume and hold heat. That would be stupid. Out of this ridiculously low amount of carbon, man can only be blamed for 5% of the .054% of carbon in the atmosphere, so in the end, even if the scientific facts about carbon not holding heat were wrong, you couldn’t do anything about it anyway.

Who’s guilty?

The first assertion of Global Warming (yes, we’re going to use the original lie name for this theory to keep you on track) is that we the people chose the energy sources that we use, and that it’s our fault that these choices hurl carbon into the atmosphere. Now carbon is a bad particulate to be ejected into our breathing supply, but so is aluminum and barium oxide, and the governments around the world are dumping that on us in megatons. We at OnePageNews would love nothing more than to see all carbon pollution caused by man to be erased, but not at the cost of a lie like Global Warming.

There are two man factions that are guilty of polluting this planet with amazing amounts of carbon: third-world countries like China and India, and corporations that are funded by the elite bankers of Europe. So, let’s take a quick look at what pressures are being put on them to stop….computing…nothing. Nothing at all is happening to them. In fact, China and India have been deemed exempt from the only global drafted piece of paper trying to curb carbon emissions, better known as the Kyoto Agreement. That should tell you something. The bankers make a lot of money by exporting your jobs to these two countries, and you can rest assured this exemption will only continue to South America and Africa once they’ve set up shop in those regions. As of Spring 2014, the only individuals pressured to change their carbon emissions are first-world countries like America and Europe. That’s funny, because our emissions are the lowest in the world.

Who’s blocking carbon free programs?

So if you want to buy an electric car, you’re going to be taxed with a higher price simply because it doesn’t use oil. Why? Because the same banks who control the world make the profit from your car and your oil. So if you’re not going to buy their oil, they’re going to stick it to you during the car purchase. Why else would a car company collude with an oil company? They don’t own oil pumps right? Oh, but their owners do, and this is where you can start to smell the stinking piles of shit in this Global Warming fear mongering.

If you’ve been paying attention to the news during this last year, you’ve heard all about the frakking method of extracting combustable materials from shale. You’ve long been indoctrinated to believe that we’re running out of oil, and that natural gas, one of the most abundant resources on planet Earth is running out. The truth is that the alternative facts would waste the value of oil in a heartbeat. If we drilled off the coast of Alaska, Scotland or Brazil, we’d have more oil than we’d know what to do with, but since the value of every monetary unit controlled by the elite banks is valued by the sale of a barrel of oil, it’ll never happen.

The truth is we have fully functional blueprints from the 1950s about Geothermal power plants that do not bring toxic gases to the surface. They could be built to tap the Earths infinite mantel warmth, and generate as much clean electricity as we’d ever need.

Sourcing the warming data

So you’ve heard all about this warming of the atmosphere and the ocean right? Just where do you think that data comes from? Have you ever looked into how these numbers are derived? Do you think there is a single agency that isn’t sponsored by big banking that’s gather data to counterbalance the Global Warming claims? Of course not. The only people worried about the temperature anywhere are those trying to push this agenda. There is no profit in sitting around gathering temperature data unless you’re selling it right into the groups pushing this lie, and how much do you think they’ll pay for data that proves them wrong? Right, nothing.

There are no deep sea sensors taking readings that are independent. The thermometers that test city temperatures have been moved into the concrete islands where readings are catastrophically higher than actual temperatures. If NPR, Reuters or Associated Press articles are your only sources, and check it carefully, because 99% of all news is, then you’ve been duped categorically. It is important you stop pushing fear mongering data that will result in the ultimate enslavement of man by the bankers.

The dark truth about energy and population growth

One fact that the late Michael Ruppert so brilliantly pointed out is that since man discovered oil, the world’s population has skyrocketed to six times its previous levels. Energy afforded many luxuries that led to more babies through the growth of individual countries. The flip side to the equation is that we know that a population that is educated, does not multiply as much, but we also know that education leads to knowledge that could threaten the stranglehold the elite bankers have on the population. So this diametrically opposing forces cannot resolve themselves, so they have chosen to crash the energy market to create horrific conditions to reduce population through starvation, sickness, and a lack of strategic resources to live.

So if the world ever broke free from our controllers and wanted to implement these alternative means of generating energy, we would have to simultaneously begin educating individuals globally to one, get along, and two, find value in their individual paths in life, i.e., stop attaching child rearing as an exclusive means of valuing oneself. We’ve written careful articles on population control if you want to know our plan for reducing without draconian measures. Just remember the elite get their way quicker than most, and therefore want a risk free method of ensuring complete victory while maintaining their control.

Where is Greenpeace? 

Greenpeace isn’t the only one, but it doesn’t take more than ten minutes of research to confirm that green groups around the world aren’t protecting us from anything. They’ve largely been co-opted by the bankers pushing for Global Warming. After all, the founding members are gone. Patrick Moore, and ecologist who helped create Greenpeace has done his homework. He wanted to know if it was true, because nothing would motivate him more than to know the world was about to end due to Global Warming. He discovered it was bullshit and pulled out. We salute his bravery in the midst of all the pressure to concede.

What would happen of Michael Ruppert’s fears were true?

If carbon did indeed have the ability to retain heat, which it doesn’t, ending any manmade contribution to carbon emissions would be a damn near overnight plan. Let’s review:

  • Electric vehicles would be a mandate within ten years.
  • Car manufactures would not be allowed to gouge pricing for going to electric.
  • Geothermal plants would begin replacing coal and nuclear immediately (albeit with the original design).
  • China and India would immediately lose preferred trade status with all countries noted in the Kyoto agreement.
  • Sanctions would be applied to China and India to turn off their factories OR ELSE.
  • All attempts to modify weather would be prohibited immediately to allow the world to stabilize its natural cycle.
  • Banks and corporations found to be engaging any level of carbon emission funding would be apprehended like criminals.

The fact is nothing like this is happening at all, and don’t you think the end of the world would mandate this behavior if it were true? The elite have to live in this world too, and if you think they’re going to live in Iron Mountain for the next 150 years, you’re out of your mind.

Why Global Warming was invented

The real reason for the Global Warming alarmist is many fold. First and foremost, the elite want off oil. It’s a messy business, and they don’t enjoy drilling it offshore. It was fun when it floated on the plains of Texas, but that time has long since passed. Given this reality, they need us the people to feel guilty about their choice of energy. They want us to pay for it, because if they had to spend their money, they’re infinite coffers would run dry, and they can’t lose control of their money, nor expose it in any way. They have you thinking they don’t exist let along that they live in some moderate level of wealth.

Secondly, they noticed what happen when oil catalyzed world population. They want the numbers down. Way down. Like Georgia Guidestones down, and debuting a quick solution to Global Warming is only going to cause another explosion, which they want to avoid. So control is of the utmost importance. They want to ensure that before they give us the next utopia, of which you can be sure they’ve planned, they want world population closer to 500 million, probably way lower. They’re trying to make this an orderly demise. A logical demise, so that their nefarious plans are never revealed. They want world population reduction to feel like an evolutionary process, and not of their hand.

Through carbon taxation, every man woman and child will be for the foreseeable future, controlled by bills that will accrue as a result of being alive. Obamacare is only the beginning of “existence tax.” This was something that old Earth knew all too well. You exist, you pay Caesar. You don’t? You die. Well we know they control the majority of jobs in the world. They conspire to shut down competitors until the mouth breathing citizens of the world only shop from the European owned and operated Walmart.

Conclusion

If we don’t kill this virus thought known as Global Warming, we’re going to lose the last two thousand years of human evolution. Our freedoms will pale in comparison to times when human sacrifices were a standard mechanism of fear and persuasion. And if this characterization sounds extreme, then we dare say your understanding of the problem is in its infancy stage. Get educated. Read OnePageNews thoroughly, and you’ll have the ammo to break free forever of their plans to destroy humanity.

Michael Ruppert, We Salute You

about_mike_new

US Patriot Michael Ruppert

On April 13th, 2014, we lost one Michael Ruppert. We at OnePageNews were initially awaken by Mr. Ruppert’s works to expose 9/11. Although we shared different views on peak oil, and the exact details on “who done it,” Michael’s meticulous investigating led us down the right path to stitch together information we had for years. He helped us find the right professionals to interview to confirm his claims and to deduce for ourselves the budding Truths that led us out of the matrix that is.

Thank you Michael Ruppert for all your contributions, and may the universe greet you with open arms.

How The NSA Can Spy On You

data-center-nsaGiven the recent climate of unconstitutional NSA spying on American citizens, we thought it would be healthy for us to inform you of the many methods that could be used to harvest data from your machines. Sadly there is very little we can do to recommend methods of avoiding these problems aside from passing notes and carefully uttering whispers out of mic range of a cellular device, but this should help you understand how to evaluate technology moving forward to prevent unlawful snooping on your electronic devices.

What Is Unseen: Don’t Trust Any Hardware

Imagine that spying by your government has been going on ever since computers hit the market. Imagine that every chip on every computer made by companies from far off lands have backdoors for monitoring data that travels through their silicon runways. Imagine all the firmware (the software embedded in those chips that give them life) has tiny lines of code that can respond to commands at any point in the future. Keep this in mind as you use any electronic device. It is routinely said that our government has technology 20+ years ahead of mainstream technology. We’d like to suggest that certain companies have solid relationships with these defense and intelligence organizations and purposely use their heavily designed hardware to ensure that backdoors are limitless. Any device claiming to be safe from spying would have to prove through open source circuit and firmware design that their components have been built from the ground up and without any ties to defense contractors in order to approach the reputation of being secure.

Your Keyboard: Where It All Begins

The first line of human input into a computer is at the keyboard. Every key that you press is turned into a series of numbers in a chart and relayed into the CPU. This fundamental action is where many spies begin their journey. Your keystrokes can be saved by both software programs and hardware devices like chips that process this data through the bowels of your computer.

The CPU

The average computer CPU contains virtually incomprehensible details in their architecture. The sheer level of storage and routines that a microchip can be configured to carry out is limited only by the designers imagination. You should know that as long as non-encrypted data is traveling into your central processor, it can perform the function of storing, routing, and even decrypting that data should you attempt to secure yourself. It is vital that any computer design in the future keep the CPU at arm’s length to ensure that only encrypted data is allowed in for processing.

Non-Encrypted Memory

The memory of your computer (not to be confused with the storage of the hard drive) is a location that can be freely scanned for values. If your program isn’t making an effort to encrypt the value before it enters memory, then the data is wide open for scanning. This includes passwords, document data, and anything else that you are staring at on screen. Future computers will need to ensure that all  private information be encrypted before it enters memory chips on your computer.

Importing Personal Information

When importing personal information like photos and movies, it is good to note that the software developed by some companies like Apple, impose a feature set that invades your privacy whether you like it or not. iPhoto and iMovie for instance come with a feature you cannot disable that scans all your photos faces, dates, and GPS locations. This data is stored in such a way that intelligence agencies can search your computer for a suspect at will based on a date range, likely location, and with a face in mind. Given that people that tell the truth like Edward Snowden have already received public death threats from acting government politicians, intelligence officers and other military personnel, it is safe to say that being a good person is qualifications for illegal searches of your data. You might think twice before using these products even if they’re free.

Indexing Personal Data

So you’ve written a letter to grandma, or had a fun conspiracy conversation with your friend, well did you know that every word of your communications and documents that are stored on your local computer have been searched and sorted for easy look up by anyone who has access to your machine? That’s right. There is something called a binary tree that allows a programmer to find one record in 10 million in less than a millisecond. This is what features like OS X’s Spotlight gives your average intelligence agency. Windows has its own version of this that goes nameless. Unless your data is stored securely, it is open market for those trying to use anything you say against you.

Communicating Over The Internet: Open Range For Data Theft

Transmitting anything over the internet is tantamount to passing an open letter through a crowd of people who want to read your letter. It needs to be noted that no communications, secured or not, are secure over the internet. The NSA can immediately decrypt any communication within milliseconds and create a database of your content forever. Every company on the internet claiming to secure your content with locked web browsers is merely selling you a feeling, and not a function. Because we as world population operate computers with zero encryption built into every component of the machine, your data is eventually stored non-encrypted at the destination server, and any attempts to obfuscate the data is again very easy to decipher back to its original form.

However, internet data is more devious than you might think. To understand this you need to understand that any transmission of data or power to your computer, however small, can use a method of communication with your device or computer. So every single zero and one, every single surge or loss in power can be translated into instructions on that device and used against you in the act of spying. Here’s an example:

Imagine you receive an email from a friend. This friend isn’t evil, doesn’t want your data, and really just wants to know if you’re up for a movie tonight. Little did you know that that message came to your computer over a communication protocol known as TCP/IP, and within the multiple packets to receive that email, your computer received a series of bits (ones and zeros) that weren’t necessary for your email software. They might have been hidden under some umbrella of “error correction bits” that are meant to keep your transmissions complete, but in reality were binary instructions that told your computer to do something. Perhaps send back the last stored up keystrokes on your computer. Perhaps the NSA wants to know how much FoxNews you read, some other piece of private information you are constitutionally allowed to have private. It is these bits that can manipulate software in chips on your computer that can open Pandora’s box for the NSA.

Now imagine a method by which your network card or power supply or other peripheral physical adapters can receive power surges and drops along a non-traced coax that signals a certain behavior to your computer or device. Remember those ones and zeros? Well if any of you have seen how a telegraph machine worked, then you know how power surges and drops can be used to communicate instructions to your computer. Imagine your entire hard drive being downloaded over a cable connection you never knew existed? So much for tracking software.

Routers; Oh They Route Alright

Routers are the boxes that make the internet possible. They route information from your computer or device into the network that is the internet. They figure out the fastest path from point A to point B around the world. Every router comes with software built-in called firmware. This software can be updated remotely and configured to do anything the hard ware inside the router will allow. Most namely, route your data to places you don’t want your data, like into massive server farms at the NSA. Many companies like Google, Apple, Microsoft, AT&T, and every other communications company thanks to the Military Commissions act route all their data by law into the NSA servers either by using direct pipes to them, or by storing your data in a location that is harvested on a daily interval. The only way your data can be safely transmitted over the internet is if it is encrypted with multi-level encryption techniques pioneered by legacy methods known as Triple DES using modern giant prime numbers. Sadly, most of us don’t have computers powerful enough to be able to create such secure methods in a timely manner. Computer manufacturers will have to assist us with new encryption chips that are designed to fight the NSA and not provide them cozy backdoors to our data.

Software And Hardware Listeners

You might think that you’d be able to monitor all the data coming in and out of your computer. Many devices have this software available, and give the user a sense of control. This software unfortunately is based on cooperation with the operating system. The OS of your device has to volunteer all network data into a listener than can then be sensed by the software trying to help. If for instance a computer company like Apple or Microsoft have backdoor agreements with intelligence agencies either voluntarily complying or being forced by law, there will be data allowed to enter and exit your computer that will not be reported by these listeners.

Hardware devices can also be gamed by the methods we spoke of above where binary instructions can enter covertly under the label of error correction bits, or packet headers. Only the firmware inside the receiving hardware knows what this data is to be used for. It is theoretical that a piece of hardware could be created to monitor all incoming data, but the requirements would be microscopic in nature and have to account for every binary bit, and every fluctuation in voltage to the computer from internet connections and power supplies.

Cellular Communication: Open Season For Data Snooping

Nothing is more elusive than cellphone data. It is out of sight, and out of mind, which is why there is such a push for the post-pc era. Intelligence agencies know you have the power to fight on a computer, but you are merely a lame duck user on a cellphone.

Your cellphone can transmit images and sound from your cameras and microphone all without your knowledge. This data can be packed up in a special protocol that is ignored by your bandwidth charges on your phone bill. Given that Apple made it trendy to never be able to remove your phone’s power supply, there is a 99.9% chance you are being monitored 24/7 without your permission. Remember, the NSA has publicly stated they are storing every single piece of information they can get their hands on. There is no reason to believe they are drawing the line at your personal data.

Game Consoles With Eyes

It should be blatantly apparent that Microsoft and Sony are working with intelligence agencies to make spying on your home a trend. Microsoft, who has recently lost favor with the NSA to mega giants like Google has been trying to fight back and stay relevant with its ability to do something that Google can’t (so far), make kids spy on themselves. As embarrassing videos have surfaced from XBox One customers personal lives being secretly broadcast to the world, the NSA is surely working with other agencies to provide Microsoft with any and all resources necessary to make XBox the prefer game console globally. Always online, always spying will be your mainstay existence if we don’t start refusing to use these products. If you have one in your house, get rid of it.

But Your Favorite CEO Said They Don’t Spy!

If there is one thing we know is that CEOs never lie right? What these CEOs say isn’t important, it’s what they don’t say that’s most important. Apple and Google’s CEO have stated that they don’t have any backdoors in their devices. They say they don’t give your data away to the NSA, which they actually do by law. What they aren’t saying is that they know for a fact their hardware is made from components that absolutely CANNOT be back doored by spying agencies for they know their devices are wide open. So they cling to this technicality that they aren’t actively doing something that they don’t have to. Their responsibility is to prepare the data for harvesting.

Conclusion

These are just some of the fundamental techniques used to spy on your personal life. The extent and creativity to which these methods are implemented in the real world are so vast that you wouldn’t believe a word of it if we told you. Bottom-line: start fighting back now or you’ll end up in THX-1138 before you know it.

John Kerry: Professional Liar

John_Kerry_official_Secretary_of_State_portrait

Professional Liar

Attention World Population! If you see this man, you are to  ignore all communications! He is serving the world Elite. He has conspired to throw a Presidential election, start wars with sovereign nations with fabricated evidence, and is now pushing for the carbon taxation of the United States of America and the world. He is being rewarded with political employment despite a complete lack of any measurable qualifications.

Beware: this man is armed with lies and an army of gullible drones who cannot think for themselves. You have been warned!

Boeing_777-200ER_Malaysia_AL_(MAS)_9M-MRO_-_MSN_28420_404_(9272090094)

Boeing 777 – Malaysia Airlines

On March 8th 2014, Malaysia Airlines Flight MH370 took off from Kuala Lumpur International Airport headed for Beijing China. After an hour and twenty minutes, the plane, its passengers and crew vanished from radar. As of March 12th, 2014, only rumors of debris have been found.

However, the most important reveal of the missing Flight 370 is the reaction from societies everywhere, and especially Americans. Independent citizens are drawing nefarious conclusions based on preprogrammed fear mongering installed in them from years of negative indoctrination. What has been put in is finally coming out. People are full of nothing but darkness when it comes to the unknown.

The most disturbing realization about society’s reaction is that their internal IDs have been so programmed with fear mongering terrorism, that man is struggling to give this story a peaceful ending. It can’t have crashed. It had to be hijacked. It had to be hijacked by one of America’s “Axises Of Evil.” The theories were limited, however immediately acidic in nature. The world needs to understand that our souls have been programmed for nearly 15 years with nothing but illogical made-up stories about other cultures hating our way of life. This needs to change.

We as a people need to publicly discuss this lame duck pattern of deception of blaming terrorism. Will there be more banker sponsored terrorism? Of course, but we need to understand who carries out these acts. We need to understand that even a suicide bomber is having his family paid off by a banker who wants to overthrow a country, or at a minimum control its citizens through fear. We need to expose this pattern and search for those with the means to move money into the pockets of those either too gullible to know who they are helping, or too self-loathing to care about who they are hurting.

The Absurd Iranian Connection

It has been suggested that Iran used two forged passports to hijack Flight 370. The idea is that Iran wants to use a commercial Boeing 777 to hurl a bomb into the bowels of its notorious foe Israel. Nothing could be more ridiculous than this idea. For one, people do fly in Iran. They fly in normal commercial aircraft. Iran, if they wanted to bomb Israel, and wanted to do this via some 9/11 attack, wouldn’t need to steal another country’s plane to do it. They would simply hijack their own craft, and divert it to whatever target they wish.

But let’s take a step back for one logical moment. Iran knows that the West is yearning to bomb them. Israel knows they’ve wronged millions of Arabs in segregating their promise land from its previous Arab owners. Iran knows its in the middle of a diplomatic balancing act between surviving the 21st Century, or being wiped out by some manipulated coup or outright act of war that would leave her a sheet of glass in the desert. Iran isn’t stupid, and has never engaged in such a proactive act of massive terrorism. Hurling a bomb into Israel via a plane would constitute an immediate and devastating retaliation, and that is why it will never happen UNLESS it’s conducted by Israel or her allies to accuse Iran of such deeds.

They Know What Happen To It

In today’s day and age, countries like America and Europe have the ability to sense a missile launch within seconds. They know where every vehicle in the sky is, and where its headed. When 9/11 happened, we quickly learned that all flights in the air are tracked in a global X,Y coordinate system, but that the plane is responsible for reporting its altitude. When the hijackers of 9/11 turned off their transponders, it was reported that the planes suddenly appeared on every air traffic controllers monitors for their triangle of responsibility. However, the traffic controllers couldn’t determine who’s altitude triangle the plane was in. For some reason, this reality doesn’t apply or hasn’t been reported for Flight 370.

With tensions running high between Asian nations like North Korea and China to the United States, it is safe to say that extra surveillance has been applied from space to monitor the actions of such vehicles in the region. The moment a plane vanishes from radar, these systems and their recorded histories would be reviewed by the military authorities until resolved. Of course these organizations don’t want to reveal their abilities to the public, so they confirm it wasn’t hijacked, and or poses a threat and they move on with their standard operations.

In conclusion, try to resist the theories that push this story into a dark pocket of your mind. Hijacking planes is no longer a viable way of accomplishing anything since 9/11. The authorities know how to track this above all other means of terrorism. The plane had limited fuel, and could not have escaped identification into enemy territory.  Take a deep breath and accept for one second that we don’t know what happen. Try not to draw from your internal Department Of Defense programming to see evil in everything unknown.

%d bloggers like this: