CIA Operation "9/11". By Mikhail Kryzhanovsky
CIA Operation “9/11″
June 21, 2001
I’ve sent a letter to the following US Senators on America’s national security collapse and CIA anti-American activity:
Richard Shelby ,Jeff Sessions (R),Ted Stevens (R),Frank Murkowski (R) ,Lisa Murkowski (R),John McCain (R), 2008 presidential election candidate, Jon Kyl (R),Tim Hutchinson (R), Blanche Lincoln (D), Dianne Feinstein (D), Barbara Boxer (D), Ben Campbell (R), Wayne Allard (R), Christopher Dodd (D), Joseph Lieberman (D), Joe Biden (D), the US Vice President since 2009, Tom Carper (D), Bob Graham (D), Bill Nelson (D), Max Cleland (D), Zell Miller (D),Daniel Inouye (D), Daniel Akaka (D), Larry Craig (R), Mike Crapo (R), Richard Durbin (D), Peter Fitzgerald (R), Richard Lugar (R),Evan Bayh (D), Chuck Grassley , Tom Harkin (D), Sam Brownback (R), Pat Roberts (R), Mitch McConnell (R), Jim Bunning (R), John Breaux (D), Mary Landrieu (D), Olympia Snowe (R), Susan Collins (R), Paul Sarbanes (D), Barbara Mikulski (D), Ted Kennedy (D), John Kerry (D), 2004 presidential election candidate, Carl Levin (D),Debbie Stabenow (D), Paul Wellstone (D), Mark Dayton (D), Thad Cochran (R), Trent Lott (R), Kit Bond (R),Jean Carnahan (D)
,Max Baucus (D), Conrad Burns (R), Chuck Hagel (R), Ben Nelson (D), Harry Reid (D),John Ensign (R), Bob Smith (R),
Judd Gregg (R), Robert Torricelli (D), Jon Corzine (D), Pete Domenici (R), Jeff Bingaman (D), Charles Schumer (D),
Hillary Clinton (D), US Secretary of State since 2009, Jesse Helms (R), John Edwards (D), Kent Conrad (D), Byron Dorgan (D), Mike DeWine (R), George Voinovich (R), Don Nickles (R), James Inhofe (R), Ron Wyden (D), Gordon Smith (R), Arlen Specter (R), Rick Santorum (R), Jack Reed (D), Lincoln Chafee (R), Strom Thurmond (R),Ernest Hollings (D), Tom Daschle (D), Tim Johnson (D), Fred Thompson (R), Bill Frist (R), Phil Gramm (R) , Kay Bailey Hutchison (R), Orrin Hatch (R), Robert Bennett (R), Patrick Leahy (D), John Warner (R), George Allen (R),Patty Murray (D), Maria Cantwell (D), Robert Byrd (D), Jay Rockefeller (D), Herbert Kohl (D), Russ Feingold (D), Craig Thomas (R).
Michael Enzi (R)
Nobody wanted to get a bullet from CIA sniper, right Mr. Joe Biden ?Senator Hillary Clinton was the only one who responded under pressure.
Obama and VP Joe Biden, a former US Senator
Still in the office:
Daniel Akaka (D – HI), Max Baucus (D – MT), Jeff Bingaman(D – NM) , Barbara Boxer (D – CA), Maria Cantwell, (D – WA), Thomas Carper, (D – DE), thad Cochran,(R – MS), Susan Collins, (R – ME), Kent Conrad, (D – ND), Mike Crapo, (R – ID), Richard Durbin, (D – IL), Michael Enzi, (R – WY), Dianne Feinstein (D – CA),Chuck Grassley (R – IA), Tom Harkin (D – IA), Orrin Hatcch (R – UT), Kay Bailey Hutchison (R – TX), James Inhofe (R – OK), Daniel Inouye
(D – HI), Tim Johnson (D – SD), John Kerry (D – MA), Herb Kohl,(D – WI), Jon Kyl, (R -AZ), Mary Landrieu (D – LA),Patrick Leahy (D – VT), Carl Levin (D – MI), Joseph Lieberman (ID – CT), Richard Lugar (R – IN), John
McCain (R – AZ), Mitch McConnell (R – KY), Barbara Mikulski (D – MD), Patty Murray (D – WA),Ben Nelson (D – NE) , Bill Nelson, (D – FL), Rand Paul (R – KY), Jack Reed (D – RI), Harry Reid (D – NV), Pat Roberts (R – KS),
John Rockefeller (D – WV), Chuck Schumer (D – NY), Jeff Sessions (R – AL), Richard Shelby (R – AL),Olympia Snowe, (R – ME), Debbie Stabenow (D – MI), Ron Wyden (D – OR).
I can tell how I would plan special operation like this one. I’m sure the CIA followed the same scheme (and used their own satellites for technical support).
1. Objectives.
al-Qaeda to be blamed, Iraq to be invaded, oil to be taken.
2. Preparation.
CIA undercover explained to bin-Laden unusual plan to attack America. The plan approved, terrorists sent to USA.
Another group of terrorists, no links to al-Qaeda, was allowed to pack Twin Towers with explosives. Right after the #2 terrorist team was eliminated, their bodies burnt.
3. Action.
September 11, 2001
19 al-Qaeda terrorists boarded 4 jets.
Right after that they were secretly arrested, taken away and killed. Their bodies burnt.
8 a.m. EDT. American airlines Flight 11, a Boeing 767 with 92 people on board, took of from Boston’s Logan international Airport to Los Angeles.
8:14 a.m. United airlines Flight 175, a Boeing 767 with 65 people on board, took off from Logan to Los Angeles.
8:21 a.m. American Airlines flight 77, a Boeing 757 with 64 people on board, took off from Washington Dulles International Airport for Los Angeles.
8:41 a.m. United Airlines Flight 93, a Boeing 757 with 44 people on board, took off from Newark International Airport for San Francisco.
After 4 jets took off, their pilots were ordered emergency landing on one of the military bases where crews and passengers boarded another jet packed with explosives. It exploded in the air and crashed into a field in Pennsylvania. Two other empty jets , guided by autopilots, with explosives crashed into Twin Towers.
Cruise missile hit Pentagon. I’ll pay $1, 000, 000 to anybody who’ll melt a piece of steel with kerosene jet-fuel.
Osama bin-Laden was sure he did it.
After bin-Laden’s death al-Qaeda has to prove its strength one more time and attack two more American symbols – Capitol or the White House. Wait.
THE BIGGEST LIE ABOUT 9/11
I’ll pay $1, 000, 000 to anybody who’ll melt a piece of steel with kerosene jet-fuel.
KGB instructions for Bill Clinton and Obama. “The Professional” by M. Kryzhanovsky
Terrorism is the unlawful use of violence (t e r r o r) against people or property to coerce or intimidate governments or societies, often to achieve political, religious or ideological objectives. It’s also a form of unconventional and psychological warfare. The common strategy of terrorists is to commit acts of violence. Each act of terrorism is a violent act , devised to have a big national or international impact. Terrorism is a political tactic. “Red” terror is aimed against certain politicians; “black” refers more to mass murders. The two can be mixed.
Purposes: to scare the nation, neutralize the government and show its inability to rule the country; to make the government admit that terror organization is a real political power; to draw media and public (international) attention to a certain political problem, to provoke the government to use military force and start civil war; to prove some political or religious ideology; prevent or delay important political decisions or legislation; discourage foreign investments or foreign government assistance programs; change the government through revolution or civil war.
Types of terrorism.
Civil disorders .
Political terrorism – violent acts designed primarily to generate fear in the nation for political purposes. Civil disorders are very effective here. .
Non-political terrorism – terrorism that is not aimed at political purposes but which exhibits conscious design to create and maintain high degree of fear for coercive purposes. .
Official or state terrorism – referring to nations whose rule is based upon fear and oppression that reach similar to terrorism or such proportions. .
Terrorist objectives.
1.Recognition
Groups seeking recognition require events that have high probability of attracting media attention. Specific incidents may be suicide bombing in public place (e.g. a green market), hijacking of an aircraft, the kidnapping of a politician or other prominent person, the seizing of occupied buildings (schools, hospitals) or other hostage barricade situations. Once they gain attention, the terrorists may demand that political statement be disseminated. Terrorist groups sometimes use organizational names or labels designed to imply legitimacy or widespread support. For example, a tiny isolated group may use “front”, “army”, or “brigade” in its name to achieve this effect.
2. Coercion.
Coercion is the attempt to force a desired behavior by individuals, groups, or governments. This objective calls for a strategy of a very selective targeting which rely on publicly announced bombings, destruction of property and other acts which are initially less violent than the taking of human life. Contemporary examples include the bombing of corporate headquarters and banking facilities with little or no loss of life.
3. Intimidation.
Intimidation attempts to prevent individuals or groups from acting: coercion attempts to force actions. Terrorists may use intimidation to reduce the effectiveness of security forces by making them afraid to act. Intimidation can discourage competent citizens from seeking or accepting positions within the government. The threat of violence can also keep the general public from taking part in important political activities such as voting. As in the case of coercion, terrorists use a strategy of selective targeting although they may intend the targets to look as though they were chosen indiscriminately.
4. Provocation.
Provoking overreaction on the part of government forces. The strategy normally calls for attacking targets symbolic of the government ( for example, the police, the military, and other officials). Attacks of this type demonstrate vulnerability to terrorist acts and contribute to a loss of confidence in the government’s ability to provide security. More important, if the security forces resort to a heavy-handed response, the resulting oppression can create public sympathy, passive acceptance, or active support for an insurgent or terrorist group.
5.Insurgency support.
Terrorism in support of an insurgency is likely to include provocation, intimidation, coercion and the quest for recognition.. Terrorism can also aid an insurgency by causing the government to overextend itself in attempting to protect all possible targets. Other uses of terrorist skills in insurgencies include acquiring funds, coercing recruits, obtaining logistical support, and enforcing internal discipline.
The media is a valuable “helper” by giving terrorists international recognition and also to attract recruits, obtaining funds. Once they gain attention, the terrorists may demand that political statements be disseminated. The danger is that this kind of attention tends to incite acts of violence by other terrorist groups. Terrorists use different methods and taking hostages, bombing, arson (low risk action) assassinations, ambushes and hijacking are the most popular ones.
Factors that may contribute to terrorism: high population growth rates, high unemployment, weak economies, extremism, ethnic , religious or territorial conflict.
Organization and tactic.
Organized terror is “organized construction”:
-search and recruitment of people (active and passive supporters), including informants and supporters in government agencies, counterintelligence and police
-getting money (robberies, illegal operations with drugs and weapons, legal business, searching for donors with the same political views)
-security system, including a system of “cells” or small groups (some groups may organize multifunctional cells that combine several skills into one tactical unit). Preparing places where members can hide, relax, get medical care; keep weapons, money, special literature. System also includes fake IDs and counter-intelligence (detection of traitors, preventing collapse of the group and uncontrolled criminal activity (robberies)
-training camps (shooting, working with explosives). If the group is state supported or directed, the leadership usually includes one or more members who have been trained and educated by the sponsoring state
-“brainwashing” sessions (the group may include professional terrorists for hire who are not necessarily ideologically motivated)
-planning the actions
-making special connections with other groups and mafia
The typical terrorist organization is pyramidal. This format takes more people to support operations than to carry them out. Therefore, the majority of people who work in terrorist organizations serve to keep terrorists in the field. The most common job in terrorist groups is support, not combat.
Usually, organization is divided into 4 levels:
1st level. Command level. The smallest , most secret group at the top.
2nd level. Active cadre. Responsible for carrying out the mission of the terrorist organization. .
3rd level. Active supporters. The active supporters are critical to terrorist operations. Any group can carry out a bombing, but to maintain a campaign of bombings takes support. Active supporters keep the terrorists in the field. They maintain communication channels, provide safe houses, gather intelligence. This is the largest internal group in the organization, and one which can be effectively countered by economic measures.
4th level. Passive supporters.
Most terrorist groups number fewer than 50 people and are incapable of mounting a long-term campaign. Under the command of only a few people, the group is divided according to specific tasks. Intelligence sections are responsible for assessing targets and planning operations. Support sections provide the means necessary to carry out the assault, and the tactical units are responsible for the actual terrorist action.
Terrorist organizations tend to have two primary types of subunits: a cell and a column.
The cell is the most basic type. Composed of 4 to 6 people, the cell usually has a mission specialty, but it may be a tactical cell or an intelligence section. In some organizations, the duties of tactical cells very with the assignment. Other cells may exist as support wing.
Sometimes groups of cells will form to create columns. Columns are semiautonomous conglomerations of cells with a variety of specialties and a separate command structure. As combat units, columns have questionable effectiveness. They are usually too cumbersome to be used in major operations, and the secrecy demanded by terrorism prevents effective inter-column cooperation. Hence, columns are most often found fulfilling a function of combat support.
Terrorist groups can be divided into three categories:
a. non-state supported groups which operate autonomously, receiving no support from any government
b. state supported groups, which operate alone but receive support from one or more governments
c. state directed groups, which operate as the agents of a government, receiving substantial intelligence, logistic, and operational support
Methods.
Hostage-taking.
An overt seizure of one or more people to gain publicity, concessions , or ransom in return for the release of the hostage or hostages. While dramatic, hostage situations are risky for the terrorist in an unfriendly environment. .
You must always negotiate if hostages have been taken. Negotiation produces some advantages for you. These advantages are: (a) the longer situation is prolonged, the more intelligence can be gathered on the location, motivation and identity, (b) the passage of time generally reduces anxiety, allowing the hostage taker to assess the situation rationally, (c) given enough time, the hostages may find a way to escape on their own, (c) the necessary resolve to kill or hold hostages lessens with timer, (d) terrorists may make mistakes. The negotiation team must have information to support negotiations (you get it from interviews with witnesses, escaped and released hostages, and captured suspects — it’s very important to get the identities, personalities, motives, habits and abilities of the offenders).
One of the complications facing you in a siege involving hostages is the Stockholm syndrome where sometimes hostages can develop a sympathetic rapport with their captors. If this helps keep them safe from harm, this is considered to be a good thing, but there have been cases where hostages have tried to shield the captors during an assault or refused to co-operate with the authorities in bringing prosecutions. (In Britain if the siege involves perpetrators who are considered by the government to be terrorists, then if an assault is to take place, the civilian authorities hand command and control over to military).
Bombing.
Advantage includes its attention-getting capacity and the terrorist’s ability to control casualties through time of detonation and placement of the device. The bomb is a popular weapon, because it is cheap to produce, easy to make, has variable uses, and is difficult to detect and trace after the action. In Iraq they usually use booby-trapped vehicles and car-bombs. A car bomb is an explosive device placed in a car or other vehicle and then exploded. It is commonly used as a weapon of assassination, terrorism or guerrilla warfare to kill the occupant(s) of the vehicle, people near the blast site, or to damage buildings or other property. Car bombs act as their own delivery mechanisms and can carry a relatively large amount of explosives without attracting suspicion. The earliest car bombs were intended for assassination. These were often wired to the car’s ignition system – to explode when the car was started. Ignition triggering is now rare, as it is easy to detect and hard to install – interfering with the circuitry is time-consuming and car alarms can be triggered by drains on the car’s electrical system. Also, the target may start the car remotely (inadvertently or otherwise), or the target may be a passenger a safe distance away when the car starts. It is now more common for assassination bombs to be affixed to the underside of the car and then detonated remotely or by the car motion. The bomb is exploded as the target approaches or starts the vehicle or, more commonly, after the vehicle begins to move, when the target is more likely to be inside. For this reason, security guards have to check the underside of vehicles with a long mirror mounted on a pole.
The effectiveness of a car bomb is that an explosion detonated inside a car is momentarily contained. If the force of explosion were to double each fraction of a second and the car were to contain the explosion for one second before its chassis gave way, this would result in a much greater force then if the detonation took place outside the car. Therefore a greater amount of damage is obtained from a given amount of explosive. Car bombs are also used by suicide bombers who seek to ram the car into a building and simultaneously detonate it. Defending against a car bomb involves keeping vehicles at a distance from vulnerable targets by using Jersey barriers, concrete blocks or by hardening buildings to withstand an explosion. Where major public roads pass near government buildings, road closures may be the only option (thus, the portion of Pennsylvania Avenue immediately behind the White house is closed to traffic. These tactics encourage potential bombers to target unprotected targets, such as markets.
Suicide attack.
A major reason for the popularity of suicide attacks is tactical advantages over other types of terrorism. A terrorist can conceal weapons, make last-minute adjustments, infiltrate heavily guarded targets and he does not need a remote or delayed detonation, escape plans or rescue teams. Suicide attacks often target poorly- guarded, non-military facilities and personnel. Examples of different suicide attacks include:
-attempted suicide attack with a plane as target
-suicide car bomb
-suicide attack by a boat with explosives
-suicide attack by a woman
-suicide attack by a bicycle with explosives
-suicide attack by a hijacked plane with fuel: September 11,2001 attacks
-suicide attack by diverting a bus to an abyss
-suicide attack with guns
Ambush
A well-planned ambush seldom fails. The terrorists have time on their side, and can choose a suitable place. Raid (armed attack) on facilities usually have one of three purposes: to gain access to radio or TV stations (to make a public statement); to demonstrate the government’s inability to guarantee the security of critical facilities; or to acquire money and weapons ( by bank pr armory robberies).
Assassination
Assassination is the oldest terrorist tactic. Targets mostly are government officials, as well as the defectors from the terrorist group.
Kidnapping
Kidnapping is usually a covert action and the perpetrators may not make themselves known for some time, while hostage –takers seek immediate publicity. Because of the time involved, a successful kidnapping requires elaborate planning and logistics, although the risk to the terrorists is less than in a hostage situation.
Sabotage
Its objective is to demonstrate how vulnerable society is to the terrorists’ actions on utilities, communications and transportation systems. In the more developed countries they are so interdependent that a serious disruption of one affects all and gains immediate public attention. Sabotage of industrial, commercial or military facilities is a tool to show vulnerability of the target and the society while simultaneously making a statement or political, or monetary demand.
Hoaxes
A threat against a person’s life causes him and those around him to devote more time and effort to security measures.. A bomb threat can close down a commercial building, empty a theater, or disrupt a transportation system at no cost to the terrorist. The longer-term effects of false alarms on the security forces are more dangerous than the temporary disruption of the hoax. Repeated threats that do not materialize dull the analytical and operational effectiveness of security personnel.
Counterterrorism
Responses to terrorism include:
-targeted laws, criminal procedures, deportations and enhanced police powers
-target hardening, such as locking doors or adding traffic barriers
-pre-emptive or reactive military action
-increased intelligence and surveillance activities
-pre-emptive humanitarian activities
-more permissive interrogation and detention policies
-official acceptance of torture as a valid tool
You must gather the following information:
1.Group information.
Names, ideology (political or social philosophy), history of the group, dates significant to the group, and dates when former leaders have been killed or imprisoned (terrorist groups often strike on important anniversary dates).
2.Financial information.
Source of funds, proceeds from criminal activities, bank accounts information (sudden influxes of funding or bank withdrawals indicate preparation for activity). It’s also important to determine the group’s legal and financial supporters. Generally, anyone who would write an official letter of protest or gather names on a petition for a terrorist is a legal supporter. Sometimes, an analysis of support will reveal linkages and mergers with other groups.
3.Personnel information.
List of leaders, list of members (and former members), any personnel connections with other groups of similar ideology. The skills of all group members (weapons expertise, electronics expertise) – knowing the skills of the group is an important part of threat assessment. If the philosophy revolves around one leader, it’s important to know what will occur if something happens to that leader. Often, the analysis of family background is useful to determine how radically a leader or member was raised. Group structure, particularly if the organizational pattern is cellular, determines who knows whom.
As a group, terrorists are very team-oriented and always prepared for suicide missions. They are well-prepared for their mission , are willing to take risks and are attack-oriented. If captured, they will usually not confess or snitch on others as ordinary criminals do. Traditional law enforcement are not that effective when it comes to the investigation or intelligence of terrorism.
4.Location information.
Location of group’s headquarters, location of group’s “safe” houses (where they hide from authorities) and location of the group’s “stash” houses (where they hide weapons and supplies). Regular attacks on “stash” houses is the most frequently used counterterrorism technique). It’ important to specify the underground that exists where terrorists can flee. Terrorists like to live in communal homes instead of living alone.
Remember this:
1. Knowing just the functions of terrorism is a fight. Since terrorists are usually trying to provoke government’s overreaction, anything the government can do to keep itself from overreacting works against them.
2. Since terrorists are usually trying to provoke government’s overreaction, anything the government can do to keep itself from overreacting works against them. Since terrorists are trying to gain control of the media, anything on the part of the media which stifles exposure also stiles terrorism. Bombings make the best pictures (watch TV!), that’s why terrorists use them mostly.
3. Terrorists often demand to release political prisoners, but this is never a true objective. The real trick is politization of all prisoners, the winning over of new recruits among the prison population.
4. Go after financial supporters of terrorism, not the terrorists themselves. It’s only with narcoterrorism that this strategy fails, since the drug market doesn’t respond to simple supply-demand forces.
5. Terrorists are imitators, not innovators. They often wait until some other group makes the first move. Most of them do this because they are sorely trying to imitate military strategy, others do it because of standardized paramilitary training or textbook lessons in guerrilla tactics, and still others do it to throw off suspicion from themselves..
6. The Stockholm Syndrome works in the favor of anti-terrorist forces. The longer the hostages stay alive, the less likelihood harm will come to them. With this syndrome, the hostages come to think of their captors as protecting them from the police and soon start to identify with their captors. The captors themselves start to develop a parent/child relationship with their hostages. Other syndromes include the Penelope Syndrome , where women find violent criminals sexually attractive.
7. In assessing the threat of terrorism, it’s important to concentrate on counting the number of incidents, not the number of victims or the value of harm. The only true comparison is the number of attacks since terrorists often have no idea themselves about how many victims will be killed by their actions. Nationalist groups tend to seek a high number of fatalities while revolutionary groups tend to seek fewer deaths and more wounds or injuries. Splinter or spin-off groups seem more interested in death counts and fatalities. The point is that no matter how many victims are targeted, the group is only a threat via its number of attacks as a percent of total activity.
8. Do count the number of victims saved by any preventive action. If you manage through some leverage to get the terrorist leader to stop things with a cease-fire agreement, regardless of whether further negotiation follows or not, it will help your agency if you have calculated how many lives you’ve saved, and can report this information to policymakers. Everyone wins by a cease-fire – the terrorist leaders look good, your leaders look good too. After the cease-fire, it’s important to also measure the resumed level of violence and compare to pre-cease-fire levels.
9. Giving into terrorists’ demands for political change only changes the pattern of violence , not violence itself. Economic and political reforms aimed at helping a certain group and resolving its grievances will win over some supporters among the general population, but in the long-run, will create new problems and a new set of grievances over the precise implementation of policy and the degree of power sharing. A much better strategy is to initiate economic and political reforms for all nation. Economic development solutions have worked in Ireland, Uruguay and Italy.
10. Reduction of recruits, supplies and support. You have to reduce the number of active trainee members of the terrorist organization. Capture and imprisonment works (it has helped to keep Spain fairly terrorism-free), as well as preemptive strikes against training camps. The number of terrorists captured or killed should be counted, and this can be put as the denominator in a fraction with the number of government security forces killed in the numerator. You’ve also got to keep weapons, ammo and supplies out of hands of terrorists by destruction of their “stash” houses. Unfortunately, many religious terrorist groups operate under the cover of religion and blowing up religious buildings has a strong negative effect.
11. Terrorism does not respond to coalition-based sanctions which are intended to express the international community’s disregard for them. Terrorist actually want their enemies to wage a war on terrorism because this gives them some pseudo-legitimacy that they are soldiers-at war. If they are broken up from receiving any psychological rewards or sympathy from their social support groups, this strategy might work.
12. Sharing of information and intelligence by counter-terrorism agents is essential. But there’s always a threat, that a secret source might be “burnt out” during such “sharing”.
13. Terrorist groups with a cell structure are most likely to thwart human intelligence since the purpose of the cell structure is to prevent any members from knowing who is the immediate leader. This may or may not be true with some groups (like the IRA) which mix family with business, depending upon levels of fidelity. The best approach for such groups may electronic surveillance. However, groups with military or paramilitary organization might be easier to infiltrate or penetrate.
Bonus
In November ,2011 more than a dozen spies working for the CIA in Iran and Lebanon have been caught by Hezbollah security and the U.S. government fears they will be or have been executed. The spies were paid informants recruited by the CIA for two distinct espionage rings targeting Iran and the Beirut-based Hezbollah organization.
In Beirut, two Hezbollah double agents pretended to go to work for the CIA. Hezbollah then learned of the Beirut Pizza Hut restaurant where multiple CIA officers were meeting with several agents, according to the four current and former officials briefed on the case. The CIA used the codeword “PIZZA” when discussing where to meet with the agents. From there, Hezbollah’s internal security arm identified at least a dozen informants, and the identities of several CIA case officers.
CIA officers ignored the rule that the operation could be compromised by using the same location for meetings with multiple assets. Idiots who loved free pizza paid by the U.S. goverrnment too much .
Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.
"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.
Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world. Anyone can join. Anyone can contribute. Anyone can become informed about their world. "United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.
LION'S MANE PRODUCT
Try Our Lion’s Mane WHOLE MIND Nootropic Blend 60 Capsules
Mushrooms are having a moment. One fabulous fungus in particular, lion’s mane, may help improve memory, depression and anxiety symptoms. They are also an excellent source of nutrients that show promise as a therapy for dementia, and other neurodegenerative diseases. If you’re living with anxiety or depression, you may be curious about all the therapy options out there — including the natural ones.Our Lion’s Mane WHOLE MIND Nootropic Blend has been formulated to utilize the potency of Lion’s mane but also include the benefits of four other Highly Beneficial Mushrooms. Synergistically, they work together to Build your health through improving cognitive function and immunity regardless of your age. Our Nootropic not only improves your Cognitive Function and Activates your Immune System, but it benefits growth of Essential Gut Flora, further enhancing your Vitality.
Our Formula includes: Lion’s Mane Mushrooms which Increase Brain Power through nerve growth, lessen anxiety, reduce depression, and improve concentration. Its an excellent adaptogen, promotes sleep and improves immunity. Shiitake Mushrooms which Fight cancer cells and infectious disease, boost the immune system, promotes brain function, and serves as a source of B vitamins. Maitake Mushrooms which regulate blood sugar levels of diabetics, reduce hypertension and boosts the immune system. Reishi Mushrooms which Fight inflammation, liver disease, fatigue, tumor growth and cancer. They Improve skin disorders and soothes digestive problems, stomach ulcers and leaky gut syndrome. Chaga Mushrooms which have anti-aging effects, boost immune function, improve stamina and athletic performance, even act as a natural aphrodisiac, fighting diabetes and improving liver function. Try Our Lion’s Mane WHOLE MIND Nootropic Blend 60 Capsules Today. Be 100% Satisfied or Receive a Full Money Back Guarantee. Order Yours Today by Following This Link.

Mickey, spammer!
It’s all junk! SECOND HAND!
Read his own nonsense yourself!