Tag Archives: Google

Alternative News Forum #1 in Search Results for Japan Earthquake Reports, Updates

24 Mar
Clouds along a jet stream over Canada.

The Pacific Jet Stream Aerial View

Copyright 2011-3011 Alternative News Forum, All Rights Reserved.

The sparsity of actual solid news reporting by American media outlets on the emerging radioactive aftermath of multiple Fukushima Reactor explosions has distressed the American public, further it’s made “breaking news reports” more urgently needed from competent bloggers and online alternative news outlets.

While the mainstream American media has now moved on to renewed interest in their more routine topics such as Libya, US politics,  Hollywood et al,  successive waves of incoming weather set adrift by the constant pacific jet stream have suddenly become urgent topics of news and commentary for Americans, especially those on the west coast. You tube reporters working from home have made constant and valuable contributions to our understanding of what is taking place, and it’s now becoming clear that soon the so called “alternative” news media, may in fact become THE FUTURE of news media.

While “We the People” press on, slowly taking back their country, a NEW news media that supports and actually follows and listens to “We the People” is now emerging with them. With one eye on the post I am always writing, and another on what Big Media is doing, I have been incredulous as I watched in recent days while Big Media moved on from the Japan disaster, minimizing and mostly ignoring the concerns of American families, who still wonder how safe our own air is in the wake of multiple explosions at Fukushima.   In contrast I have watched brilliant citizen journalism explode out of nowhere, as more alternative news media sources sprang to life with hourly updates, videos showing USA Geiger counter reports, and up-to-date jet stream data.

This point was driven home tonight when I innocently ran a Google search, looking to see if any new earthquakes had hit Japan in the past 24 hours.  It was my own web portal, Alternative News Forum, that came up number 1 in the search results. I’m definitely pleased to be #1 in the results, but it does make me wonder: where are the reporters who should be writing about the ongoing radiation issues surrounding the collapsing Fukushima Reactor complex?

When a part time home based news blogger hits number one in the search results for news about earthquakes in Japan and jet stream radiation reports, shouldn’t we all be really worried about the lack of reporting on this issue?  I’m not ready to speak the dreaded phrase “news blackout” because it’s just too insane to even consider. But why are there so few American media outlets reporting hourly on this situation in the United States?

Here’s the screen shot:

Chase Kyla Hunter 3.24.11 1:22 am  pacific time

Yahoo.com’s Email Privacy Policies, Datamining Accounts Without Your Consent

22 Mar
Headquarters of Yahoo! next to Mathilda Avenue...

Yahoo's Headquarters in California

Copyright 2011-3011 Alternative News Forum, All Rights Reserved.

Privacy is disappearing on the web, and the only real way to avoid having details about your life posted without your permission or consent is to NOT use the internet. Since many millions now depend on the web, this is not an option that works. I recently found out that all my yahoo.com emails were being read by someone, somewhere, on their back end, and the salient details about me were being harvested from them. This is also called “data mining.”

I was in a dialogue with a distant relative via email. This relative had not seen or heard from me in 20 years. I temporarily forgot where I was during our email exchange [which was on Yahoo.com email ] and told her my age.

Within 48 hours my age appeared in my Youtube.com channel, without my consent, without my permission and without me even knowing it until I logged and found it posted. I quickly deduced where this information had been datamined from. Someone from Yahoo.com had provided it to Google, which owns Youtube and it appeared in my Youtube account so quickly I was stunned. And furious too.

I need to warn all readers and subscribers not to EVER discuss anything of a private or confidential nature on yahoo.com email. Your emails are being archived, examined and harvested for details about you with each send.

I learned the hard way. What made this worse is that there is NO function now operative in the new youtube.com settings where you can remove your age from their database. Now every time I log into youtube my channel is hammered with ads for a certain age group that I have no interest whatsoever in viewing or clicking. Below are yahoo.com’s protocols for “deactivating” and then eventually deleting your account. All information that passed through the account, as far as I can tell from their statements, may be stored on their servers indefinitely. Not good.

Here it is. Read, and learn.

CK Hunter

Data Storage and Anonymization

In order to provide products and services, Yahoo! collects and stores information from user account registration and site usage. Yahoo!’s policy is to de-identify user log file data within 90 days of collection, with limited exceptions to fight fraud, secure systems, and meet legal obligations. Yahoo! takes additional steps so that data collected and used to customize interest based advertising and some content on Yahoo! are not associated with personally identifiable information. Yahoo! is committed to continuous improvements and implementation of our data protection and de-identification measures.  We describe the data we store, our processes and your choices in more detail here.

Account Information

  • When you register with Yahoo! or submit information to Yahoo!, a temporary copy of that information is routinely made to prevent accidental loss of your information through a computer malfunction or human error.
  • Yahoo! keeps your account information active in our user registration databases in order to provide immediate access to your personalization preferences each time you visit Yahoo!.
  • If you ask Yahoo! to delete your Yahoo! account, in most cases your account will be deactivated and then deleted from our user registration database in approximately 90 days. This delay is necessary to discourage users from engaging in fraudulent activity.
  • Please note that any information that we have copied may remain in back-up storage for some period of time after your deletion request. This may be the case even though no account information remains in our active user databases.

Servers Log Files

  • The Yahoo! computers (called “servers”) that send your web pages and advertising banners process and store an enormous amount of information every day. These computer records are called “log files”.
  • Log files are used for analysis, research, auditing, and other purposes, as described above. After this information has been used, it is stored and is inaccessible. Until the information is stored, your Yahoo! ID may remain in our active server log files.

Anonymization/de-identification

  • Anonymization is a process of removing or replacing personal identifiers in data records so that the resulting data is no longer personally identifiable. This is also referred to as de-identification. We use these terms interchangeably.
  • Yahoo! uses a multi-step process to replace, truncate, or delete identifiers in order to de-identify data.

Log file anonymization

  • Yahoo!’s anonymization policy applies to user log file data and includes searches, ad views, ad clicks, page views and page clicks.
  • Yahoo! stores this data in an identifiable form for up to 90 days for most log file data.
  • There are certain exceptions to this policy. Yahoo! will store a limited amount of log file data in identifiable form for up to 6 months for select log file systems involved in product and financial fraud detection and abuse management. There are also exceptions for legal obligations.

Your Interests and Yahoo!

  • Yahoo collects and maintains information about your interests based on your web surfing activity when you are visiting the branded Yahoo! network of web sites as well as when you are visiting other websites in the Yahoo! advertising network.
  • Yahoo! maintains information in both identifiable and de-identified forms. When you are signed-in to the Yahoo! network, Yahoo! associates your observed interests and activity with your Yahoo! account.
    • When you log in to your Yahoo! account, a cookie is placed on that computer which contains information about your interests. This is stored on the hard drive of whatever computer or device you are using when you log in. Your browsing habits on your work computer or a library computer may affect the kinds of advertisements you see when using your home computer.
    • Information that Yahoo! collects related to your activities and interests on and off the Yahoo! network is maintained by Yahoo! on its servers and is associated with Yahoo! cookies regardless of what computer or device you use to sign in to Yahoo!.
    • If you are a Yahoo! registered user who is not signed-in, Yahoo! will continue to store information about your interests based on a unique browser cookie. This cookie is an encrypted (or “one-way secret hashed”) form of a Yahoo! cookie that is de-identified from your Yahoo! account information. This de-identified cookie cannot be used by any third-parties to identify you.
    • When you are not signed in to Yahoo!, Yahoo! will use this encrypted cookie and its stored associated interest information, to match advertisements and content to your interests.

Your Preference and Opt-out Choices

  • To see and/or customize the information that Yahoo! has stored about interests that we use for advertising customization, you can visit our Ad Interest Manager. Ad Interest Manager allows you to opt out of one or more specific interest categories or opt out of all interest-based ads that Yahoo! serves.
  • Yahoo! refreshes cookie information for registered Yahoo! users each and every time you log in to Yahoo! on whichever computer or device you are using at that time. Accordingly, if you do not want Yahoo! to store your interests to deliver more relevant advertising, deleting your cookies will not be an effective way to express this choice. Instead, you should use the persistent opt-out that Yahoo! provides for you. If you are signed-in when you exercise the opt-out, your opt-out cookie will be refreshed each time you log in to Yahoo! – even if you have had previously deleted your cookies and/or moved to a new computer.
  • You can visit the Network Advertising Initiative site to see other networks that you may want to opt-out of or to use other tools to manage your opt-out choices.

2.17.11 Update, Confirmed: Earthquake Clusters in Yellowstone, New Madrid Fault Region Being Censored by USGS

12 Feb
Grand Prismatic Spring, Yellowstone National Park

Image by Alaskan Dude via Flickr

Copyright 2.12.11 By CK Hunter, All Rights Reserved.

2.17.2011 Update: CONFIRMED, new earthquake clusters in Yellowstone and in the New Madrid fault region are being removed by the USGS right after they happen. This is unprecedented censorship of geologic activity that millions depend on for emergency preparedness. Watch this video:

Live Internet Seismic Server 24/7 Earthquake Records Worldwide

Earlier this week I wrote …

[ File this under “more pole shift warning signs.” Yesterday there was a 7.0 quake in Chile, today 2 am I see reports of a 4.6 quake in Yellowstone. ]

Live Internet Seismic Server [ Going Ballastic ]

I found something on Youtube late tonight, went to Google to confirm it, and found some unusual entries in the search results. Here they are:

Magnitude 4.6 – YELLOWSTONE NATIONAL PARK, WYOMING
Feb 12, 2011 … Magnitude 4.6 – YELLOWSTONE NATIONAL PARK, WYOMING … Page URL: http:// earthquake.usgs.gov/earthquakes/recenteqsus/Quakes/uu00005729.php …
earthquake.usgs.gov/earthquakes/recenteqsus/Quakes/uu00005729.php
4.6 Magnitude earthquake near Yellowstone park | Fromtheold
Oct 24, 2010 … A 4.6 Magnitude earthquake hit Wyoming at around 17:43:59 UTC today. The earthquake was near Yellowstone park and was above average for that …
fromtheold.com/…/46-magnitude-earthquake-near-yellowstone-park-20626 – South Africa – Cached
Magnitude 4.6 – YELLOWSTONE — JUST DELETED! – Page 7
Feb 12, 2011 … [link to earthquake.usgs.gov] This usgs link says 4.6 at the top! …. The ” deleted 4.6 Yellowstone event” was listed at 2:36 :09 UT. …
http://www.godlikeproductions.com/forum1/message1358594/pg7
YELLOWSTONE — JUST DELETED! – Page 5‎ – Feb 11, 2011
YELLOWSTONE — JUST DELETED! – Page 3‎ – Feb 11, 2011
YELLOWSTONE — JUST DELETED! – Page 2‎ – Feb 11, 2011
YELLOWSTONE — JUST DELETED!‎ – Feb 11, 2011

More results from godlikeproductions.com »
Earthquake Notices — 2011-02-12 02:36:09 (Ml 4.6) YELLOWSTONE NAT
Feb 12, 2011 … Earthquake Notifications: 2011-02-12 02:36:09 (Ml 4.6)

YELLOWSTONE NAT. PARK, WYOMING 44.3 -111.0 (ebb0)
http://www.spinics.net/lists/quake/msg30649.html

Live Internet Seismic Server 24/7 Earthquake Records Worldwide

Live Internet Seismic ServerThese data update automatically every 30 minutes!

First Dead Birds, Fish Now: Dead Cows, 10,000 of Them, Dead Seals

22 Jan
Map of USA with South Dakota highlighted

USDA Poisoned Bird Flocks in South Dakota, No Reason Given

Copyright 2011-3011 By Chase Kyla Hunter All Rights Reserved.

Breaking: 01.20.2011

I am just learning tonight of two reports of dead cows: the first via video comes out of Vietnam, the second dead cow reports I am getting off Google, has not hit the news portal yet. Members at Godlikeproductions.com are speculating the entire dead creature scene is a global PSY OP and I am inclined to agree. Someone somewhere wants people to be afraid, [i.e. we can kill the birds, fish, the animals, we can kill you too].Dead seal reports from Hopedale Labrador on the northeastern coastal seaboard are coming in as well. See video at end.

Bible students and end time prophets like Paul Begley are posting alot on this topic.

The USDA has admitted poisoning birds in Maryland and South Dakota and gave no real justifiable reason for doing so. What are American citizens to think when our government decides it has the authority and means to begin killing off wild flocks? Will they soon begin yet another lie by telling people the flocks were killed to prohibit the spread of a new bird flu virus?

How deep does the rabbit hole of government lies actually go?

Ask John P. Wheeler, except you can’t. He died over all this. Breaking blog post tells the story. I had speculated last week on this blog that shortly the final dots would be connected between Wheeler’s brutal murder and the cascading tons of dead birds falling from the sky.

This page updated daily:

Theories abound: [ from Godlikeproductions.com ]

[link to news.nationalgeographic.com]

Could these Mysterious plumes of magnetism effect animals and humans on the surface? Are they poisonous? Could these magnetic plumes effect navigational compass on Birds, Fish etc… When they protrude from deep within the core onto our surface, Do they make sound or light? Majority of animal deaths have been in areas of great seismic activity?

Another member posted this phrase:

Operation Killswitch

I really have no idea, I am just passing along morsels from the trail.

Without A Trace: Tips for Using the Web with Little or No Digital Footprint

21 Jan

Reposted from the Web By Chase Kyla Hunter on 01.20.2011

Without a Trace

If you value your rapidly disappearing privacy while surfing the Internet you need to know about these tools. Whether you want to protect yourself from snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. The best part about them is they are FREE!

“If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”

-Google CEO Eric Schmidt

Without a Trace

If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number or email address, then these tools are for you.

  1. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients.
  2. Mozilla Firefox, Portable Edition. This free web browser leaves no personal information on your computer. Not only can you use this anywhere, but no one will know you were there.
  3. x Paranoia mod. This Firefox extension is great for those who want to leave nothing behind on the computer. With a couple of clicks you can clear all your Internet history, passwords, cookies, and cache.
  4. Bugmenot.com. If you’ve ever had to register with a site just to read an article or watch a video, then you will want this tool. Find login information for many websites that require registration and never have to give your information again.
  5. 10 Minute Mail. Use this tool to get an email address that is good for 10 minutes, then expires. This is a great way to register with sites that require an email validation or just to cover your tracks.
  6. inumbr. Get a disposable phone number that you can use to forward calls to any other phone in the U.S. No one will be able to trace you with this number.
  7. GrandCentral. Here’s another phone option when you don’t want to be traced by your number. Consolidate all your phones into one with this tool that gives you one voice mailbox and one number for all your phones.
  8. drop.io. Want to share a top-secret online file with someone and then have no sign of the evidence later? This is the tool for you. The file is deleted after 30 days.
  9. Fake Name Generator. If you need a name, address, email, or even a UPS tracking code, use this handy tool to generate any one of the necessary fakes.
  10. cl1p.net. Create a note or upload a photo that you can keep for yourself or share, then delete it when you are finished with absolutely no sign of what you had.

Browsing Security

If you want to browse the Internet in privacy, these tools will help you do just that. Use these to do the actual browsing or to check the security of your browsing privacy.

  1. Hide My Ass!. Hide your identity with this free tool. This proxy service will hide your IP address so no one will know you.
  2. Tor. Like getting secreted away, this free service allows you to hide your Internet identity with a “network of virtual tunnels.” Join journalists, government agencies, and more who use Tor for the ultimate in Internet privacy.
  3. Guardster. Another proxy service that hides your IP, this one is available in both free and for a fee versions. The free version does not work with encrypted SSL sites.
  4. Megaproxy. Paste the URL for whatever website you want to visit into this tool and you will have a completely private look at your target site. No registration or downloads needed to use this tool.
  5. Scandoo. Get real time protection when surfing the Internet with warnings about websites before you click on them. Based on ScanSafe technology, this home version is free.
  6. ShieldsUP!. Check out this tool to learn what information your browser is sending out. You can also test the effectiveness of your personal firewall when running ShieldsUP! testing.
  7. Privoxy. Privoxy is an open source non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk.
  8. What Is My IP Address?. Use this tool to ensure your IP blocking software is working correctly and not revealing your true IP address.
  9. Clusty. Use this search engine when browsing. Clusty doesn’t save your information or track you at all when you use it.
  10. Scroogle. Try searching Google with this tool. Scroogle uses SSL to send your search terms to Google with encryption, then does the same when sending the results back to you.

Computer Security

Using the Internet is a huge open door for people to stick their nose in your business. Use these tools to slam that door tightly shut.

  1. Malwarebytes’ Anti-Malware. This anti-malware software is one of the best tools available for removing crap from your computer. Best when used in conjunction with Ad-Aware to keep your PC 99.999% malware free.
  2. avast!. This free anti-virus software is one of the best available (for free or for a fee) at protecting your computer. This tool will alert you any time malware is detected and even checks incoming email. avast! also includes a boot-time scan option.
  3. Ad-Aware. The free version of this software does an excellent job of protecting your computer against spyware and adware. The paid version gives you real-time protection which is not available with the free one.
  4. Sandboxie. This free tool is great for both protecting your computer and getting rid of evidence. It works as a temporary storage area for information that would normally go to and from your hard drive. When you are finished in the “sandbox,” you can just clear it out.
  5. ThreatFire. Use this in conjunction with your anti-virus to fend off malware. ThreatFire detects malicious behavior such as capturing keystrokes and also serves to defend against zero-day threats.
  6. SnoopFree Privacy Shield. The ultimate free software for the ultra-cautious, this tool will detect any method of privacy invasion through your keyboard, screen, and open windows.
  7. Comodo Firewall. Keep out hackers with this free firewall. This program is one of the best when it comes to protecting your computer.
  8. WinPatrol. Protect your privacy and your computer with this free tool that works by alerting you to “hijackings, malware attacks and critical changes made to your computer without your permission.”
  9. AVG Free Anti-Virus. Get anti-virus and anti-spyware protection from this free software. This software also includes a scheduled scan option.
  10. TrueCrypt. This disk encryption software will keep nosey-parkers at bay. You can create a virtual encrypted disk, encrypt USB flash drives and hard drives, and more.
  11. Trustable Downloader. Download files from the Internet without worries of Trojans, worms, or viruses with this free application. As described, this tool will help guard you against government spying on its citizens.
  12. SiteAdvisor. This software alerts you before you visit a website that has spyware or harvests your information for spam. Use their color-coded system to alert you to the potential dangers of websites.
  13. Peer Guardian 2. This IP blocker is capable of blocking incoming and outgoing connections. You can also select to block spyware, adware, and educational and government ranges.
  14. GlowWorm FW Lite . Mac users can use this software to be informed when a program attempts to make an outgoing connection. Not only will this tool protect your information, it also guards against malware.

Laptop Tracking

If someone makes off with your laptop, know how to stop them with these tools.

  1. Adeona. If you want to guard against someone taking your laptop, check out this tool. This software continually tells you where your laptop is located without the interference of any third party to help you track and recover your computer.
  2. iAlertU. Another laptop protection and tracking device, this one specifically for Macs, this software is based off mouse and keyboard movement which sets off an alarm, takes a photo of the thief, and emails the photo to a specified email address.

Spying on Those Out to Get You

If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them.

  1. GotVoice. Take advantage of the 14 day free trial to have your target’s voice mail sent directly to you. If you need more time, get another 14 day trial with different information.
  2. Decoding Social Security Numbers in One Step. You can’t get everything out of that magical number with this tool, but you can narrow down the state and year of issue with any social security number instantly.
  3. Keylogger. This free software allows you to log everything entered on the keyboard so you can track computer usage. Be sure to use the stealth mode so your target doesn’t know you are tracking him.
  4. Decode Your License. This article describes how you can get a driver’s license from any state and decode the barcode on it to receive personal information. You will need the Internet tool described in the article and a scanner.
  5. Webcam Spy. Use this software to spy on your target using a webcam. The software activates the webcam with a motion sensor for an auto on and off feature. Spying on your target isn’t the only use for this–you can also use it in your home to see who comes by when you are gone.

Maps for Monitoring Occurrences

Whether you are looking for evidence for your conspiracy theory or trying to put all the pieces together on a plot you know is about to be hatched, then these maps will help you get all the information you need.

  1. Global Incident Map. Find out where terrorism is occurring around the world with this mapping tool. You be able to find plenty of patterns to put together your own theories.
  2. HealthMap. This tool will keep you posted on health alerts. Find outbreaks by geographical location, disease, or chronological occurrence.
  3. Who is Sick?. This Google map-based tool shows symptoms for any geographical spot. You’ll be able to track any type of outbreaks with this tool.
  4. Incident1. Track police, fire, and emergency services on this map. You can also do a search by zip code or select a region within the states.
  5. Incidentlog. If you live in the northeast and couldn’t find anything on Incident1, try Incidentlog for more options. This map is populated from a different pool of data.
  6. Havaria Information Service Alert Map. Find everything from earthquakes to hazmat incidences to biological hazards on this world map. You can narrow the results by country if you don’t want to see the world view.
  7. GeoMAC Wildfire Information. This map shows where wildfires are currently burning throughout the United States or check out past wildfires since 2002.
  8. Piracy Attacks Maps. Pirates on the high seas are not a thing of the past. Use this map to track current piracy around the world.
  9. UNEP: Atlas of Our Changing Environment. Sponsored by the United Nations Environment Programme, this map includes incidents that document environmental changes around the world. Click on each incident to see photos and read the story.
  10. Google Maps Mania. This unofficial site follows the incredible array of various interactive maps being used in conjunction with Google Maps. Find a map that tracks your favorite passion or create one of your own.

 

 

Tags: internet privacy

National Clandestine Service Is Recruiting Arab Americans as Spies Using TV Adverts

12 Dec
Seal of the Central Intelligence Agency of the...

Image via Wikipedia

Copyright 12.11.2010 By Chase Kyla Hunter, re-posts permitted leaving author info, content and links intact.

File this item under “things you discover that you sincerely wish were not true.” I stumbled onto this bizarre piece of news buried deep in several hundreds news tweets. It originates with Boing-Boing. If the CIA is recruiting for more Arab-American people to train as spies, what is the likelihood those spies might be let loose on American citizens one day on native soil under martial law? How will Americans know whether such spies and employees of the CIA have loyalties to America, or hidden loyalties to their own country of origin, further, how many of them will be Muslims?

I don’t particularly feel that it’s a good development for America that there may be any number of Arab born CIA employees scattered among us on any given day, who most likely are Muslims. I don’t really care whether that comes off as “politically correct” or not. It’s just one more development that follows the tone of “creeping Sharia law” and the silent spread of “everything Muslim” into the wellspring of American life and culture.

Here’s the original Boing-Boing post link:

http://www.boingboing.net/2010/12/11/the-cia-honeypot-wik.html

CIA Recruiting Advertisements & Print Media Materials

So I am now digging around to see what else the CIA and NCS might be doing these days in the back halls of power that other Americans might want to know about.

Iranian American CIA Recruiting TV Advertisement video Note the voice-over states “I support global intelligence” – that’s a” very new world order” sounding phrase. I wonder if these new recruits are taking oaths of allegiance to a UN global governance, rather than the United States of America?

Arab American CIA Recruiting TV Commercial video This TV commercial shows Arab Americans living the good life, entertaining at home. Voice over: “Your nation, your world, the world is protected, careers at the Central Intelligence Agency…” The words America, or American, or United States, or USA are never spoken in this advertisement. Think it over. Whose nation? It’s a dark and unnerving message in the ad, with implications I don’t like at all.

American patriots should be keeping a close eye on the alphabet spy orgs that claim to keep a close eye on American National Security. Those are our tax dollars they are using you know. And if all this makes you as squeamish as it does me, you can cap off this post read by playing around on the CIA’s Kid’s Page on their website. Not to be outdone, the NSA also has a kid’s page. Whooppee.

Chase Kyla Hunter

 

Related Youtube videos:

CIA TV Commercial Recruitment Ad Aimed at Kids

 

CIA Mind Control Experiments Post WWll 1950s

 

Former CIA Spy Speaks Out

 

CIA, FEMA & Black Ops, Blacklisted Video

 

 


Breaking: Jesse Ventura TV Video on REX 84 FEMA Camps Censored

11 Dec
Map of regions of the Federal Emergency Manage...

Image via Wikipedia

12.10.10 By CK Hunter

[Google H.R. 645, rex 84 FEMA camps, operation garden plot]

I first alerted my American readers, subscribers, friends and neighbors about the existence of FEMA Rex 84 USA concentration camps in early 2008. There are [ or were ] at least a half dozen old guard patriot websites going back to 1996, 97 that had posted extensive lists of the locations of these camps, photos, details.

Seven years later with Youtube.com came the first wave of videos taken by curious and worried neighbors, locals, which have been posted to Youtube by same in a fairly steady stream since 2005, 2006. So I am quite surprised that today’s late 2010 internet community seems so alarmed by all of this now. In fact, why now? Where have you all been for the past few years? Watching American Idol and playing video games? You’re busted. While you watched inane TV, played bloodlust video games, doodled on your Ipod, Ipad, Ithis, Ithat, they have been fleecing out these camps, staffing them, hiring and training military people to run them. It’s all been happening right under your nose. Don’t you think it’s high time that more American people began to really raise a stink about this? Alex and Jesse can’t do it alone.

This research has been out and about on the web for more than 10 years now. Have people refused to believe these things [ the fema camps ] were real until either Alex Jones or Jesse Ventura told them so on “network TV?”

If that’s true, it’s a sure and certain sign the typical “socially engineered TV programming” which is done on Americans from the cradle to the grave is working. The average Joe, who has had the evidence plainly in his face for 13 years about the existence of these FEMA USA detention camps [Alex Jones has been screaming about this at the top of his lungs for at least 4 years] will still refuse to believe his eyes until another alpha male on “network TV” tells him and shows him they are VERY real. What’s up with that?

At any rate, below are just a few of the several dozen posts and pages I have written about these camps since the spring of 2008, when I first learned of them from a woman in Ohio who is retired military and worked at one for a season.

Chase Kyla Hunter

Here’s the censored video – share this:

Browse all research I have compiled on FEMA Rex 84 USA concentration camps on another blog.

Browse all research and posts I have written about these camps on Alternative News Forum.

More video links showing  these camps:



http://www.youtube.com/user/NufffRespect?recommended=0

Tags: usa concentration camps, rex 84 fema camps on us soil, operation garden plot, H.R. 645, jesse ventura tv, alex jones, usa police state, martial law 2011