You are here

terrorism

All the Shah's Men: An American Coup and the Roots of Middle East Terror (2003) [audiobook+ebook]

SizeSeedsPeersCompleted
173.43 MiB3091
This torrent has no flags.


 

With breezy storytelling and diligent research, Kinzer has reconstructed the CIA's 1953 overthrow of the elected leader of Iran, Mohammad Mossadegh, who was wildly popular at home for having nationalized his country's oil industry

The Management of Savagery: How America's National Security State Fueled the Rise of Al Qaeda, ISIS, and Donald Trump (2019)

SizeSeedsPeersCompleted
576.96 KiB30129
This torrent has no flags.


 

Even though the ending is known, Max Blumenthal’s book The Management of Savagery draws the reader through an intriguing tale of media management, political management, financial management all with the goal of achieving the management of savagery. The title derives from a 2004 al-Qaeda document of the same title which advises “jihadist groups to exploit the chaos that resulted from the destabilization of previously stable states.

American Radical: Inside the World of an Undercover Muslim FBI Agent (2017)

SizeSeedsPeersCompleted
169.8 MiB0081
This torrent has no flags.



.
The explosive memoir of a Muslim American FBI agent fighting terror from the inside

It’s no secret that federal agencies are waging a broad, global war against terror. But for the first time in this memoir, an active Muslim American federal agent reveals his experience infiltrating and bringing down a terror cell in North America.

Ole Dammegard - Terror - Are You Kidding Me (2017)

SizeSeedsPeersCompleted
327.16 MiB5081
This torrent has no flags.


Ole Dammegard - Terror - Are You Kidding Me (2017) At the Open Mind Conference 2016, Ole Dammegard discussed the templates and methods normally used in false flag operations. This year, he is back again with another angle on the subject. Ole has been a returning guest at the Open Mind Conference since 2013. The reason for this has been because of the recurring alleged terror attacks in Western Europe and the USA. As an expert, he has been able to debunk the official stories behind many of these alleged terror attacks, such as the Copenhagen shootings, the mass shooting in Norway, the Nice, Charlie Hebdo, Bataclan and Brussels airport attacks, to mention but a few. This year, he will talk about the Berlin, Istanbul, Jerusalem, Fort Lauderdale and Melbourne attacks. Prepare yourself for some explosive information. Ole Dammegård is an author, inventor, former journalist and investigator who has dedicated some 30 years of his life into researching global conspiracies. His main focus has been finding out the real truth behind the assassinations of the Swedish Prime Minister Olof Palme, John F. Kennedy, Robert F. Kennedy, Martin Luther King, John Lennon, Lady Diana and the truth behind 9/11, the Oklahoma City bombing, the Boston Marathon bombings etc. Ole has discovered very strong links between the terror attacks e.g. identifying people that he alleges are linked to both the JFK and Olof Palme murders. The global elite seem to have used the same ‘skilled mechanics’ for decades who do their dirty jobs for them. Ole has been a special guest on many programmes, such as The People’s Voice, Red Ice Creations (10 hours) (Sweden/USA), Project Camelot, (USA), Veritas Radio (USA), The Real Deal with Prof. Jim Fetzer (USA), No Lies Radio with Dr Kevin Barrett (USA), Super Woo Radio (Australia), Global Peace Radio (UK), Open Your Mind Radio (Ireland), Talk Radio Europe (Spain), Freedom Radio (Denmark) and Freedom Reigns, Australian Phi in the Sky. He has also had articles published on prominent websites such as Veterans Today. His books include Coup d’état in Slow Motion, Shadow of Tears, Re-Mind Me, and Yolanda Yogapanda. Ole was awarded the Prague Peace Prize as an investigator researching the truth and is considered a leading expert on false flag operations. He has been a speaker at many international conferences, including the recent JFK Conference, Dallas, in 2016. videos: Ole Dammegard - Terror - Are You Kidding Me (2017).mp4 ebooks: Ole Dammegard - Coup d'Etat in Slow Motion - The Murder of Olof Palme.pdf tags: terrorism, false flags, deception, conspiracy, elites, crime, investigation, Matrix, illusion

Programmed Sub-personalities Bluebird [pack]

SizeSeedsPeersCompleted
1.03 GiB50141
This torrent has no flags.


Vegas Shooter Programmed Sub-personalities Bluebird [pack] This is a very interesting online discussion about the recent Vegas false flag shooting. I'm posting this, because it gets as close to my own views as possible, and because the shooting may have been a test run for much greater things to come. You may see the Vegas event as the tip of an iceberg, a mere symptom of a massive occult underground network, comprised of a large number of secret societies, intelligence agencies, cults, CIA front organizations, and an army of programmed assassins. Just imagine 20'000 Vegas shootings, all happening at the same time, in all major cities all over the globe, and what such an event would mean to our liberties, and the plans of the Luciferian elites. They will do whatever it takes, to get where they want to get. They have a motive, they have an opportunity, and surely they have the means, so what should prevent them from using those means to get where they want to get? Maybe they won't do it because they believe in Jesus Christ, or because they have a sense of morality? But they don't, and they haven't. If you believe that things are bad now, you just wait, things are going to get much worse, before they will improve. Welcome to the fringe of the fringe of the fringe! The deeper you go, the lonelier you will get. Each time you delve deeper down the conspiratorial rabbit hole, the number of people still with you will diminish, until eventually, almost nobody will remain. Do you have the courage to boldly go where almost no man has ever gone before? Eventually, this search for truth without any compromise and without any taboo, will manifest itself as a search for the ultimate truth, and therefore also a search for GOD - it is a spiritual quest, it is the Great Work. Eventually, any path will lead to GOD, if you're dedicated enough, courageous enough, serious enough, authentic enough, honest enough, and desperate enough. videos: Derren Brown Derren Brown - Assassin with Audio Commentary Only.mp4 Derren Brown - How to Make a Mind-Controlled Assassin.mp4 Vegas Shooter 01 Vegas Shooter - Programmed Sub-personalities - Bluebird - Jared Wore A Girls Beanie.mp4 02 Greg Reid - More Thoughts On Vegas - The Black Awakening.mp4 docs: Secrets of the Black Awakening Archived Article Sue Bradley's 'The Men Who Stare at Goats' – PID News.pdf What the Media Won't Tell You About Jared Loughner.pdf ebooks: Dave McGowan - Programmed to Kill.pdf Demon Possession Handbook.pdf Encyclopedia of Demons in World Religions and Cultures.pdf Marshall Thomas - Monarch II Victims.pdf Mind Wars - Marie D Jones.epub Mind Wars - Marie D Jones.pdf Thanks for the Memories - Brice Taylor, 1999.pdf The Great Nephilim Deception.pdf The Mammoth Book of Killers at Large.pdf The Ultimate Evil - Maury Terry.pdf Tranceformation of America.pdf tags: Vegas, terrorism, assassin, mkultra, black awakening, shootings, conspiracy, occult, CIA, Illuminati

Synthetic Chaos - How Fake Has Terror Become (2017)

SizeSeedsPeersCompleted
293.47 MiB60109
This torrent has no flags.


Synthetic Chaos - How Fake Has Terror Become (2017) How Fake Has Terror Become In today’s show Richard speaks to Dr. Nick Kollerstrom about state fabricated terror. His new book is entitled “A European Perspective : Chronicles of False Flag Terror”. There is no doubt that fabricated terrorist attacks in the early 2000’s exhibited real victims. Real people were killed. Nick Kollerstrom contends that the modus operandi of the more recent terror attacks is different. He believes that the fakery is not just being applied to the perpetrators, but now includes many of the victims (or vic-sims as he would describe them). There have been so many events it is difficult to “keep up” with them, let alone de-construct them. At the very least we can state there are major anomalies in the official narratives of all the major recent attacks. In today’s show we discuss the Manchester and Westminster Bridge attacks, highlighting some of the anomalies. “You furnish the pictures and I’ll furnish the war.” – William Randolph Hearst, January 25, 1898 This old adage seems to have become more actual than ever before. We do know that the corporate controlled media are endlessly deceiving us, they deceive us by omission, by simply not reporting relevant events to us, they deceive us by the art of reframing, by making good people appear as evil, evil people appear as good, by putting current events in a different framework or context to create a different effect on our minds, or they may deceive us simply by lying on a small or on a grand scale. "Make the lie big, make it simple, keep saying it, and eventually they will believe it." - Adolf Hitler, 1925 But there's another even more shocking level to this scheme of deception: More and more often the elites are literally manufacturing their own news. They're hiring crisis actors to set up completely artificial scenes of tragedy, such as terror events, only with one purpose in mind, to turn them into news, to imprint such fake narratives into the minds of unsuspecting sheeple, to ideologically indoctrinate them, to scare them, to infuriate them, and modify their patterns of behavior, and their perception of the world around them. "Perception Management" was pioneered in the 1980’s under the Reagan administration in order to avoid the public opposition to future wars that was seen during the Vietnam War. The United States Department of Defense defines perception management as: "Actions to convey and/or deny selected information and indicators to foreign (or domestic) audiences to influence their emotions, motives, and objective reasoning as well as to intelligence systems (systems of artificial intelligence, AI) and leaders at all to influence official estimates, ultimately resulting in foreign behaviours and official actions favourable to the originator’s objectives. In various ways, perception management combines truth projection, operations, security, cover and deception, and psychological operations." So far even hardcore conspiracy researchers haven't realized to what amazing degree innumerable of the world's tragic and shocking events have been staged and completely fabricated - it is purely synthetic chaos. Bear in mind: The greater the shock, the greater the imprint on your mind will be, and the more your behaviour and perception will get modified. Why create real terror, if you can fake it? What matters is the effect on the human mind, and illusions can be as effective as the real thing. After all, we're all living in the matrix, and the matrix is all about illusions, and then the Illuminati are magicians, and what do magicians do, if not create illusions? "The people's minds are just wax in the hands of the Illuminati." - (me) They're waging a war on the American people, the American people is the enemy now, and the massive military industrial complex is being used against the minds of the American people now. Other types of warfare, such as eavesdropping, gangstalking, targeting and the spraying of Chemtrails are being used as well. It is a multilevel wide-spectrum warfare with the goal of achieving total domination on all levels of human existence. The often talked about totalitarian one world government is merely the inevitable logical outcome and consequence of such a process. "Power always wants more power, and never less power, and once having attained it, it will do anything in its power to retain it, independent of the cost in human lives." One day you may wake up, realizing that everything is fake. videos Breathtaking - Democrats Accused of Hiring Actors Prior to Charlottesville Rally.mp4 Alex Jones, Gary Heavin, and Owen Shroyer expose how democratic operatives hire actors online to agitate people assembling at opposition events across the country. How Fake Has Terror Become How Fake Has Terror Become - PART 1 OF 3.mp4 How Fake Has Terror Become - PART 2 OF 3.mp4 How Fake Has Terror Become - PART 3 OF 3.mp4 tags: perception, psychology, manipulation, indoctrination, propaganda, matrix, chaos, terrorism, warfare

The Jihadis Next Door (2016)

SizeSeedsPeersCompleted
1.02 GiB000
This torrent has no flags.


Rense.Show.03-20--03-24

SizeSeedsPeersCompleted
267.59 MiB002
This torrent has no flags.


03-20 MONDAY Texe Marrs Why Is The World Hiding The Truth? Gertjan Zwiggelaar Down the Rabbit Hole Dana Durnford FukushimaàThe Greatest Disaster In Recorded History Special Guest Kevin Blanch Kevin Blanch YouTube Channel 03-21 TUESDAY John Rappoport Govt Medical Madness Blake Sawyer Black Islamic Culture That Teaches Hate Jim Kirwan The View From SF 03-22 WEDNESDAY Devvy Kidd Not Looking Good Out There... Congress At Home In April - Get Out In Huge Numbers George Webb Hillary's Hackers Patricia Doyle, PhD 100% Proof Trump Is Bringing In Unvetted, Diseased Muslims Into America 03-23 THURSDAY Dr Leonard Coldwell Europe's Horror Coming Here Prof James Fetzer Who's In Charge? Jim Marrs 03-24 FRIDAY Dean Henderson (Left Hook) David John Oates More Amezing New Speech Reversals Ralph Ring Flew On One Of Otis T. Carr's Flying Discs

Got all my trackers fired up and ready to go!
Love your trackers-
don't be a tracker racist!

How to Survive in the West – A Mujahid Guide (2015)

SizeSeedsPeersCompleted
195.52 MiB0019
This torrent has no flags.


How to Survive in the West – A Mujahid Guide (2015) WARNING: This book is for information purposes only. The following report is a complimentary offering from MEMRI's Jihad and Terrorism Threat Monitor (JTTM). On March 19, 2015 the Twitter account @Shahadastories distributed a link to an e-book titled "How to Survive in the West: A Mujahid Guide." This is the latest in a series of e-books compiled by supporters of and recruiters for the Islamic State (ISIS), that provide practical guidance to young Muslims in the West who wish to join ISIS or to wage jihad in their countries. This e-book's chapter titles include: "Hiding the Extremist Identity," "Earning Money," "Internet Privacy," "Training," "Bomb-Making," "Transporting Weapons," and "What Happens When You Are Spied On And Get Raided." Say thank you to your criminal politicians who have been flooding Europe with probably ten thousands of Syrian ISIS terrorists. These fighters are all potential sleeper assassins, and the day they will get triggered by their handlers, either over their cell phones or by their Imam leaders in their Mosques, large numbers of innocent people may get killed before our armies will ever be able to get activated and put an end to the slaughter. This book proves without a doubt that we're not dealing with wild conspiracy theories here, but with real possibilities. The Muslim Jihad is mandatory to all Muslims. It's going to get very nasty, and alas most western people are still in denial about such a possibility. Of course these Muslim fanatics are being handled by Illuminati controlled western intelligence agencies, but this doesn't make it any better. Bear in mind that ISIS had been set up by the CIA right from the get go. Ordo ab Chao. The following is a review of the main topics in the e-book: Chapter 1: "Hiding The Extremist Identity" Chapter 1 provides various instructions for both converts to Islam and for those born into the faith. To the former, the guide notes: "By not showing you're Muslim, you've already excluded yourself being in the 'Terrorist watchlist.'" The latter group is cautioned: "Don't make it too obvious you have become a practicing Muslim. For example: If you haven't grown a beard, don't grow it now, because you will bring unwanted attention onto yourself. Mujahideen in Muslim lands remove their beards for deceptive purposes." In addition, "Practicing Muslims" are instructed "not remove their beard if they already have one. This would only draw unwanted attention to yourself from friends and family, and this will in turn lead them to spy on you." The e-book recommends to women: "If you wear a hijab and go to a place where Muslims are searched (i.e. airports) then do not wear a black hijab, but a colored one instead. Muslim women who wear black hijabs are searched more in airports than those wearing other colored hijabs. This is merely due to a stereotype of fully black-clothed Muslim women being stricter in their religion." Chapter 2: "Disguise" The e-book suggests that extremists should disguise themselves and alter their appearance to resemble non-Muslims in the West. In addition, they should change their first name or their nickname. "When a Muslim goes out in public, he wants to fit into society to make himself look as normal as possible. Remember this isn't because he fears his Islamic identity, but he is doing this so he is not suspected of being an outsider enemy." It is also recommended that Muslims in the West change their behavior and go out of their way to appear more friendly: "Making yourself look more friendly and open minded to the Western public – For example: Muslims who call themselves by a Western nickname gain more acceptances by their non-Muslim colleagues." According to this chapter, having a Western name carries additional advantages: "People with Islamic names get less jobs than those with Islamic names. This alias might be important if you need an important position in a specific job, i.e. Mujahideen send people to work in power plants or enemy governmental positions to spy on and leak reports to the Islamic State leadership (as double agents)." The book even suggests that agents change their voices, for example, when speaking anonymously to others they should put a cloth over the telephone receiver, or use a different tone or accent. Chapter 3: "Easy Money Ideas" This chapter lists ways in which people in the West can steal money to finance terror operations. "If you are an expert in credit card fraud, Paypal/Ebay scams, phishing, [or] hacking, or you know the secret of a big company, then take advantage of your skills. If you can claim extra benefits from a government, then do so. If you can avoid paying taxes, then do so. There is a report that a Muslim accountant 'took' $50 million from his boss and fled to the Islamic State. Other Muslims 'borrowed' a loan as maximum as they could and used it to emigrate to the Islamic State. Another Muslim hacked some Israeli credit cards and used the money to go to the Islamic State." Phishing is another means suggested by the e-book to acquire funds; however, the book specifies: "Attacks should be focused and prioritised on those who insult Islam and the Muslims most of all. They are the real enemies." Chapter 4: "Internet Privacy" This section is broken down into two types of Internet privacy. The first deals with having a clean home IP address. It explains, "When you browse the Internet, you want your Internet activity to look as normal as possible. You do not type anything jihadi, and possibly not even Islamic on your searches, and especially not in your computer." The second type involves jihad searches on TOR. The chapter states: "The safest way to get a basic overview on Jihad is to watch the news channels (such as Al-Jazeera). They do not tell the clear picture, but at least you get an overview of what is going on. This is safe because these channels are broadcasted on Satellite for free, and no one can do a search on your history." Chapter 5: "Training" The e-book explains that physical training is a vital part of getting in shape for jihad. It should be noted that portions from this section were previously printed in e-book “The Islamic State.” However, the tips and advice are more detailed in this version. "Mujahideen go through a range of training to build up their stamina [and] strength, and to gain new skills. Going to the gym and running in the park is considered normal in the West. However, wearing army clothes, a backpack, and weights does look abnormal. You have to train like a normal person. You cannot look different. So men may wear a t-shirt and ¾ jogging trousers whereas sisters may go to the gym [during] female only sessions or run on a treadmill at home to build up stamina." The book claims that "Mujahideen run for a few hours, daily on mountains before having their breakfast," and adds, "In urban warfare, people need to run outside and inside of buildings. So running up and down the stairs is a really good exercise. Learning how to climb walls, and get off walls is also important." The chapter also encourages readers to study krav maga and to take up martial arts, and stresses the importance of honing shooting skills and of target practice. It recommends the use of Nerf guns and paintball guns for practice, and also recommends that would-be jihadis use video games such as Call of Duty to familiarize themselves with movement through urban terrain. Chapter 6: "The Survival Kit" The section titled "Survival Kit" details essential items that, it says, should be transported in a "cigarette tin." The tin, it says, should contain "Matches, Candle, Flint, magnifying glass, needles, small fish hooks, beta light (a small light which lasts for 15 yrs- it is good for reading maps in the dark,) snare wire, flexible saw, medical kit, surgical blades, waterproof plasters, water purifying tablets, condoms (they can hold 1 litre of water), compass, cotton wool." Conclusion: "Resources" ... ebook: How to Survive in the West – A Mujahid Guide (2015) 71p.pdf audiobook: specs: Mac computer voice Tessa South Africa, MP3, 64 kbps, 02 hrs 10 min 08 sec video: Three Stages of Jihad (480p).mp4 tags: Islam, Muhammad, Muslims, terrorism, assassins, sleepers, war, revolution, CIA, ISIS

Pages

Subscribe to RSS - terrorism