About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Politics
Anarchism
Central Intelligence Agency (CIA)
Corporatarchy - Rule by the Corporations
Economic Documents
Federal Bureau of Investigation (FBI)
Foreign Military & Intelligence Agencies
Green Planet
International Banking / Money Laundering
Libertarianism
National Security Agency (NSA)
Police State
Political Documents
Political Spew
Right to Keep and Bear Arms
Terrorists and Freedom Fighters
The Nixon Project
The World Beyond the U.S.A.
U.S. Military
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Central Intelligence Agency (CIA)

$230-Billion Offshore Bank Hughes Vault? by ShoreLines
 $230-billion offshore bank hides assets from CIA in Howard Hughes Nevada storage vault.
1977 Senate Hearing on MKULTRA by U.S. Senate
 Perhaps most disturbing of all was the fact that the extent of experimentation on human subjects was unknown. The records of all these activities were destroyed in January 1973, at the instruction of then CIA Director Richard Helms. In spite of persistent inquiries by both the Health Subcommittee and the Intelligence Committee, no additional records or information were forthcoming. And no one -- no single individual -- could be found who remembered the details, not the Director of the CIA, who ordered the documents destroyed, not the official responsible for the program, nor any of his associates.
A Study of Assassination: A CIA Manual by CIA
 Assassination is a term thought to be derived from "Hashish", a drug similar to marijuana, said to have been used by Hasan-Dan-Sabah to induce motivation in his followers, who were assigned to carry out political and other murders, usually at the cost of their lives.
Admissions and Omissions: The CIA in Guatemala by Linda Haugaard
 The president's advisory Intelligence Oversight Board (IOB) report on human rights cases and the ClA's role in Guatemala, released on June 28, shows that the CIA knowingly hired paid informants who were involved in assassinations, kidnappings and torture. The report also asserts that U.S. support was "vital" to the Guatemalan intelligence services.
An Overview of the Political and Paramilitary Operations of the CIA
 The purpose of this work will be to survey the covert operations that have been undertaken by the CIA in the past forty years and to assess the effectiveness of a number of these activities.
BCCI, The CIA and Foreign Intelligence
 The relationships involving BCCI, the CIA, and members of the United States and foreign intelligence communities have been among the most perplexing aspects of understanding the rise and fall of BCCI. The CIA's and BCCI's mutual environments of secrecy have been one obvious obstacle.
Born in the CIA by Amjad Hussain
 How a religious school located along the North Western Frontier of Pakistan came to be the training ground for the likes of Taliban of Afghanistan and their supporters in Pakistan is an interesting question. The answer lies in Langley, Virginia, the home of America's Central Intelligence Agency.
Bush, Clinton, and the CIA by By Paul DeRienzo
 An independent group of researchers in Arkansas are charging that Governor Bill Clinton is covering up an airport used by the CIA and major cocaine smugglers in a remote corner of the Ozark mountains.
CIA - Nicaraguan Contra Cocaine Smuggling by Jack Blum
 I will review briefly the history of the relationship between drug trafficking and intelligence operations and finally, I will make some suggestions for further investigation oversight and reform.
CIA Death Squad Timeline by Ralph McGehee
 CIA set up Ansesal and other networks of terror in El Salvador, Guatemala (Ansegat) and pre-Sandinista Nicaragua (Ansenic). The CIA created, structured and trained secret police in South Korea, Iran, Chile and Uruguay, and elsewhere - organizations responsible for untold thousands of tortures, disappearances, and deaths.
CIA Documents Seized in Iran Continue to be Published
 The CIA's destruction of records concerning the 1953 covert action in Iran, first reported in the New York Times on May 29, 1997, provides an occasion in the following three articles to recall a forgotten episode in the history of the CIA collection
CIA Exec. Director Managed Firm That Handled "Put" Options on UAL by Michael C. Ruppert
 There is abundant and clear evidence that a number of transactions in financial markets indicated specific foreknowledge of the September 11 attacks. In the case of at least one of these trades, the firm used to place the "put options" on United Airlines stock was, until 1998, managed by the man who is now in the number three Executive Director position at the Central Intelligence Agency.
CIA Experiments with Mind Control on Children by Jon Rappoport
 In unpublicized sessions, New Orleans therapist Valerie Wolf introduced two of her patients who had uncovered memories of being part of extensive CIA brainwashing programs as young children (in one case, starting at age seven). Their brainwashing included torture, rape, electroshock, powerful drugs, hypnosis and death threats.
CIA Front Companies by JJ
 The following companies, corporations and organizations are used by The Central Intelligence Agency as "Front Companies" This "leaked" list shows the "front companies" that even most people in the CIA don't even know about.
CIA General Counsel Nomination Hearing
 Today's hearing of the Select Committee on Intelligence is for the single purpose of receiving testimony from the President's nominee for the position of General Counsel of the Central Intelligence Agency, Mr. Scott W. Muller.
CIA Intelligence Networks
 The Central Intelligence Agency, like many revoluntionary organizations(including the Russian KGB), organize their agent networks on a "cell" system, with small groups who meet and carry out specific activities.
CIA Mind Control Experiments: Building the Manchurian Candidate by Dr. Colin Ross
 Lecture given at 9th Annual Western Clinical Conference on Trauma and Dissociation, April 18, 1996, Orange County, California.
CIA Proprietaries, CIA Infiltrated or Influenced Organizations, and CIA Contractors by Michael Sweeney
 This is a mere outdated sampler of the (approximately 400, mostly older) infrastructure of CIA, which has now likely morphed to become the infrastructure of Shadow (an entity described below) and, on an unnofficial basis, CIA proper.
CIA Report on Communist Brainwashing
 Brainwashing, as a technique, has been used for centuries and is no mystery to psychologists. In this sense, brainwashing means involuntary re-education of basic beliefs and values. All people are being re-educated continually.
CIA facts of all nations #2
CIA facts of all nations #3
CIA's Abstract of the Ames Affair, by the Inspector General
 In the spring and summer of 1985, Aldrich H. Ames began his espionage activities on behalf of the Soviet Union. In 1985 and 1986, it became increasingly clear to officials within CIA that the Agency was faced with a major CI problem.
CIA's METC Explosives
 The chief difference in METC unit (Multiple Explosives Transitional Container) design over traditional explosive devices moves away from a densely packed explosive core towards a large volume of highly explosive but low-density mass in the form of a gaseous cloud.
CIA's Report on the Contras and Cocaine by Frederick P. Hitz, IG CIA
 October 23, 1996 - The Select Committee on Intelligence, United States Senate - Regarding Investigation of Alleged Connections Between CIA, the Nicaraguan Contras and Cocaine Trafficking in the 1980s.
CIA-Initiated Remote Viewing At Stanford Research Institute by H. E. Puthoff, Ph.D.
 In July 1995 the CIA declassified, and approved for release, documents revealing its sponsorship in the 1970s of a program at Stanford Research Institute in Menlo Park, CA, to determine whether such phenomena as remote viewing "might have any utility for intelligence collection" [1]. Thus began disclosure to the public of a two-decade-plus involvement of the intelligence community in the investigation of so-called parapsychological or psi phenomena.
CIA: Out of Control by Russ W. Baker
 In the Post-Soviet Era, Congress Slumbers and the Intelligence Community Creates New Bogeymen to Vanquish
CIABASE by Ralph McGehee
 Ralph McGehee's Database, CIABASE, Prompts Harrassment
Clay L. Shaw's Trial and the CIA by Lawrence R. Houston
 The investigation of District Attorney Garrison of New Orleans into the assassination of President Kennedy, and his attack on the Warren Commission report, now focuses on one facet--the trial of Clay L. Shaw, who has been indicted for conspiracy to assassinate the President. In his public announcements Garrison has been careful not to reveal his theory of the trial.
Congress to Probe Contra Cocaine Link: Mission Impeachable? by Rob Koenig
 In the midst of a sanctimonious and self-serving "War on Drugs," the Costa Rica branch of the Contra support operation has been shipping cocaine into the USA with the apparent blessings of the White House.
Counterintelligence Challenges in a Changing World by William S. Sessions
 There can be no doubt that important changes are taking place in the world today. However, improved diplomatic relations do not necessarily decrease the foreign intelligence threat to U.S. national security. The truth remains: That threat still exists, as it did in the past and as it will in the future.
Cults, Anti-Cultists, and the Cult of Intelligence by Daniel Brandt
 Modern secret services not only mimic the cult leader's cynicism, but intelligence professionals themselves are locked into a self-perpetuating mind-set.
Dead-Letter Boxes by Lee Adams
 DLB is an acronym for dead-letter box. It is also called a dead drop. A DLB is a physical location where material is covertly placed for another person to collect without direct contact between the parties.
Declassified Army and CIA Manuals Used in Latin America by Lisa Haugaard
 The unstated aim of the manuals is to train Latin American militaries to identify and suppress anti-government movements. The manuals provide detailed techniques for infiltrating social movements, interrogating suspects, surveillance, maintaining military secrecy, recruiting and retaining spies, and controlling the population.
Domestic Surveillance: The History of Operation CHAOS by Verne Lyon
 For over fifteen years, the CIA, with assistance from numerous government agencies, conducted a massive illegal domestic covert operation called Operation CHAOS. It was one of the largest and most pervasive domestic surveillance programs in the history of this country.
Ex-CIA Director Orders Hit on His Own Agent by Daniel Hopsicker
 Three Colombians were convicted of gunning him down, and they may have had cartel connections, but speculation has long been that Seal was assassinated at the behest of the CIA.
Ex-CIA Offical Speaks Out
 Victor Marchetti on the difficulty of writing about the CIA
Fooling America: A Talk by Robert Parry by Robert Parry
 They had to create the impression the Contras were better than they were, so people wouldn't get tired of supporting them in Congress. So they decided the CIA would have to start sending in its OWN people, its own specially-trained Latino assets to begin doing attacks which the Contras could then claim credit for.
Funny CIA Story by Craig
 So what does the CIA a cat and surveillance have to do with each other,find out here.
HR 611: The Bill to Close the School of the Americas
 Not later than 30 days after the date of the enactment of this Act, the Secretary of the Army shall close the military education and training facility known as the United States Army School of the Americas at Fort Benning, Georgia.
Handling of Sources by U.S. Army
 The term Special Counterintelligence Agent (SA) refers to all those persons who convey or contribute in to counteract the collection of information of the multidisciplinary intelligence of hostile services. This booklet is primarily directed to those persons involved in the control or execution of CI operations.
How DOD Code Names are Assigned by Paul McGinnis
 We tend to use code-names such as SENIOR CITIZEN or MERIDIAN without understanding how these are assigned. I've done some research on this and here's what I've found.
ICML Common Object Element Types by IC Sub-Working Group
 The column headings of this table have the following meanings: Name: The identifier of a specific element type. Must be unique within the class of documents defined by a DTD or schema. It is the tag name.
ICML Technical Addendum by IC Metadata Sub-Working Group
 This Technical Addendum is provided to supplement the evaluators of ICML v0.5 during their evaluation. It covers some background material and documents some of the research and perspectives that affected key decisions made in the ICML development. This addendum along with the release notes will be expanded in the future to become formal ICML documentation.
Inside the Shadow CIA by John Connolly
 It is not possible to overstate the special relationship Wackenhut enjoys with the federal government. It is close. When it comes to security matters, Wackenhut in many respects *is* the government.
Intelligence Community Markup Language (ICML) Release Notes by IC Metadata Sub-Working Group
 The first focus of ICML is to aid finished intelligence production. Since a majority of the intelligence content being produced within the IC takes the form of documents, it was felt by the MSWG that limiting the scope of the initial ICML release to this type of intelligence content would yield the most benefits in the shortest period of time. The ICML standard as written is incorporates key writing styles, metadata, and structure requirements of typical IC products.
Intelligence Memo 05MAY04 by AnExCIA
 Five (5) of the seven (7) people killed, Al-Kabariti Jumah and Zuluaga-Ochoa along with their two (2) bodyguards and Zuluaga-Ochoa's relative were travelling in a late-model armored 4X4 Sports Utility Vehicle, one Toyota Land Cruiser, at the time of their deaths. There were no shots fired or explosions that may have otherwise been instrumental for having been able to overtake the vehicle or any of its occupants.
Iraqi Embassy Raid Staged By CIA? by Anonymous
 The agreement focused on obtaining records from the Iraqi embassy (and consular offices in particular) in Berlin, either covertly or overtly “before November.” It appears that the latter was selected (perhaps as a result of a subsequent agreement with the BND and/or others in the Shroeder administration).
John Stockwell on the Secret Wars of the CIA
 The Inner Workings of the National Security Council and the CIA's Covert Actions in Angola, Central America and Vietnam
KUBARK Counter-Intelligence Interrogations by CIA
 This manual cannot teach anyone how to be, or become, a good interrogator. Its purpose is to provide guidelines for KUBARK interrogation, and particularly the counterintelligence interrogation of resistant sources. Designed as an aid for interrogators and others immediately concerned, it is based largely upon the published results of extensive research, including scientific inquiries conducted by specialists in closely related subjects.
National Security Council Directive on Covert Operations
 NSC 5412, "National Security Council Directive on Covert Operations," continued to be the U.S. Government's basic directive on covert activities until the Nixon administration's NSC 40 in 1970.
New Government Software by -@OsiriS@-
 New Programs the G-Men are using.
Open Source Intelligence Resources for the Intelligence Professional by The 434th Military Intelligence Detachment
 The purpose of this handbook is to enhance the capabilities of MI Officers by incorporating Open Source Information (OSI) into their thinking, training and war-fighting agenda.
Organizational Culture's Contributions to Security Failures by Troy M. Mouton
 A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Arts in The Interdepartmental Program in Liberal Arts by Troy M. Mouton B.A., University of Southwestern Louisiana, 1996 May 2002
Oversight Hearings on Wackenhut Covert Operations at the Alyeska Pipeline
 This is the first of two days of hearings before the House Interior Committee on the subject of covert surveillance authorized by the Alyeska Pipeline Service Company and conducted by The Wackenhut Corporation.
Paranoid Shift by Michael Hasty
 The transformation of James Jesus Angleton from an enthusiastic, Ivy League cold warrior, to a bitter old man, is an extreme example of a phenomenon I call a “paranoid shift.” I recognize the phenomenon, because something similar happened to me.
Profiles of the U.S. Intelligence Community
 Profiles of most of the agencies involved with collection and dissemination of intelligence for the United States.
Propaganda in Theory and Practice
 "If you give a man the correct information for seven years, he may believe the incorrect information on the first day of the eighth year when it is necessary, from your point of view, that he should do so. Your first job is to build the credibility and authenticity of your propaganda, and persuade the enemy to trust you although you are his enemy."
Psychological Operations in Guerrilla Warfare by CIA
 This book is a manual for the training of guerrillas in psychological operations, and its application to the concrete case of the Christian and democratic crusade being waged in Nicaragua by the Freedom Commandos.
Reading List on Intelligence Agencies and Political Repression by Chip Berlet & Linda Lotz
 This is the reading list circulated by Phil Agee at his Speakout lectures.
Review of the Book SECRET AGENDA by Anthony Marro
 His account goes well beyond, to include a prostitution ring, heavy CIA involvement, spying on the White House as well as on the Democrats, and plots within plots, with McCord scheming at the end to sabotage his own break-in.
School of the Americas Report
 The CIA confirmed at a hearing before the Senate Select Intelligence Committee in 1988 that it provided intelligence and counterintelligence training to Honduran military groups. At the hearing, Richard Stolz, Deputy Director for Operations at the CIA, testified that from February 8 to March 13, 1983, the CIA trained Caballero, Maro Turo Regalatta, and other Hondurans in interrogations.
School of the Americas: GAO Report (1996)
School of the Americas: Report of the Latin Americ
Secrecy and Accountability in U.S. Intelligence by Steven Aftergood
 While U.S. intelligence agencies have done an astonishingly poor job of protecting the nation's secrets from foreign adversaries, they have been more successful in blocking access by American citizens to the most basic categories of intelligence information.
Secrecy and Accountability in U.S. Intelligence by Steven Aftergood
 Questions of secrecy and accountability have figured prominently in the most important intelligence controversies of the last several years. While U.S. intelligence agencies have done an astonishingly poor job of protecting the nation's secrets from foreign adversaries, they have been more successful in blocking access by American citizens to the most basic categories of intelligence information.
Silent Weapons For Quiet Wars
 A REAL CIA Manual. This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war.
South Central CIA Transcript by Charles Overbeck
 The following is a transcript of a Town Hall meeting between residents of South Central and other areas of Los Angeles and CIA Director John Deutch. The intense question-and-answer session was hosted by Rep. Juanita M. McDonald (D-California, 37th District) on the evening of Friday, November 15, 1996, at Locke High School in Los Angeles. The first part of McDonald's opening remarks was omitted for brevity, but otherwise, this transcript is a continuous verbatim record of the event. Transcription by Charles Overbeck, [email protected], for ParaScope, http://www.parascope.com/
Statements by the DCI and the NSA Director on Economic Spying by George J. Tenet and Michael V. Hayden
 I am here today to discuss allegations about SIGINT activities and the so-called Echelon program of the National Security Agency with a very specific objective: To assure this Committee, the Congress, and the American public that the Intelligence Community is unequivocally committed to conducting its activities in accordance with US law and due regard for the rights of Americans.
Suffering and Despair: Humanitarian Crisis in the Congo by Wayne Madsen
 The covert programs involving the use of private military training firms and logistics support contractors that are immune to Freedom of Information Act requests is particularly troubling for researchers and journalists. These U.S. contractor support programs have reportedly involved covert assistance to the Rwandan and Ugandan militaries.
The C.I.A. 500
 The following is a list of alledged and/or suspected C.I.A. "front" companies, corporations, or organizations.
The CIA
 On January 22, 1946, President Harry S. Truman issued an executive order setting up a National Intelligence Authority, and under it, a Central Intelligence Group, which was the forerunner of the Central Intelligence Agency.
The CIA & LSD
 The following examines the development of the CIA's interest in the mysterious new drug, LSD. It is alternately funny, disgusting, and horrific.
The CIA's Regulations and Guidelines on the FOIA
 The CIA's regulations and guidelines on the Freedom of Information Act as recorded in the Federal Register. Guess what? They don't have to tell you anything.
The CIA's Role in the Study of UFOs Between 1947 and 1990 by Gerald K. Haines
 An extraordinary 95 percent of all Americans have at least heard or read something about Unidentified Flying Objects (UFOs), and 57 percent believe they are real. (1) Former US Presidents Carter and Reagan claim to have seen a UFO. UFOlogists--a neologism for UFO buffs--and private UFO organizations are found throughout the United States. Many are convinced that the US Government, and particularly CIA, are engaged in a massive conspiracy and coverup of the issue.
The CIA's Secret Weapons Systems by Andrew Stark
 The CIA has spent a great deal of its time, and your money, developing countless bizarre weapons for assassination, sabotage, and mass destruction.The information about CIA weapons that you will read in this article generally has not been made public before. It was not intended to be.
The CIA's Use of Clergy, Journalists and Peace Corps
 Notes from July 17, 1996 hearing of the Senate Intelligence Committee. Not verbatim, the gist.
The CIA, LSD, and The 60's Rebellion by Beatrice Devereaux
 A review of the book "Acid Dreams" by Martin A. Lee and Bruce Shlain, publisher, Grove Press.
The Central Intelligence Agency: A Short Primer
 The Central Intelligence Agency of the United States (CIA)is one of several organizations responsible for gathering and evaluating foreign intelligence information vital to the security of the United States.
The Intelligence Underground: The Spookiest of the Spooks by Jim Beetel
 America's funniest CIA expose.
The Napa Secret Installation by Harry V. Martin
 The Sentinel has obtained over 200 pages of unclassified and secret documents which outline the purpose of a special communications and government continuity base in the Napa Hills.
The Secret Team, Part 1 by L. Fletcher Prouty
 At the heart of the Team, of course, are a handful of top executives of the CIA and of the National Security Council (NSC), most notably the chief White House adviser to the President on foreign policy affairs. Around them revolves a sort of inner ring of Presidential officials, civilians, and military men from the Pentagon, and career professionals of the intelligence community. It is often quite difficult to tell exactly who many of these men really are, because some may wear a uniform and the rank of general and really be with the CIA and others may be as inconspicuous as the executive assistant to some Cabinet officer's chief deputy.
The Secret Team, Part 2 by L. Fletcher Prouty
 Intelligence professionals become so accustomed to using and living with cover stories, cover language, and code terms that they use them interchangeably with their normal, or dictionary, usage. Thus the outsider has little opportunity to break through this fabric to get to the real thing.
The Secret Team, Part 3 by L. Fletcher Prouty
 The CIA as an intelligence agency offers no unusual elements on most counts. It is pretty much what it seems to be. Special operations has been exposed one way or another so many times that there is not too much guesswork about its role. But researchers have been unable to work their way into what it really is that makes the Agency what it is today. This distinctive characteristic is its superior logistics support.
The Secret Team, Part 4 by L. Fletcher Prouty
 BY THE SUMMER OF 1955 THE CIA had grown to the point where it was ready to flex its wings in areas in which it had never before been able to operate and in ways that would test its intragovernmental potential. The first wave of Army Special Forces support of CIA war-planning initiatives and of U.S. Air Force Air Resupply and Communications activity had waned following the Korean War
The Use of Covert Paramilitary Activity as a Policy Tool by Major D. H. Berger
 From a pure cost-benefit analysis point of view, covert paramilitary operations conducted by the US between the end of World War II and the Korean conflict were a dismal failure. Manpower and money were allocated in tremendous amounts to the various operations, yet in every case the objectives of creating and expanding a viable anti-Communist resistance effort were not met.
Transcript of House Debate on Covert Operations
 The following excerpts from the debate Oct. 17 in the House of Representatives on the Boxer Amendment, which would have required the President to seek the approval of the Congressional intelligence committees before initiating most covert operations, with the exception of operations to save American lives or rescue American hostages.
Transcript of Tenet's Resignation as CIA Chief
 CIA director George Tenet announced his resignation Thursday, speaking to CIA employees hours after President Bush made the first official announcement. Following is a transcript of his remarks:
Treason 101
 Espionage is a high-risk criminal offense. The traitor must fear arrest for the rest of his or her life, as the statute of limitations does not apply to espionage. Former National Security Agency employee Robert Lipka was arrested in 1996 -- 30 years after he left NSA and 22 years after his last contact with Soviet intelligence. There are four principal ways by which spies are detected.
UN Report on El Salvador and the FMLN
 It's very purpose and function have been to seek, find and make public the truth about the acts of violence committed by both sides in El Salvador during a civil war in which more than 75,000 Salvadorans were killed.
US Intelligence Objectives and Programs in Guatemala
 On March 30, 1995, the President directed the Intelligence Oversight Board (IOB) to conduct a government-wide review concerning allegations regarding the l990 death of US citizen Michael DeVine, the 1992 disappearance of Guatemalan guerrilla leader Efrain Bamaca Velasquez, and related matters. Under terms of reference issued on April 7, 1995, the scope of this inquiry covers any existing intelligence bearing on the torture, disappearance, or death of US citizens in Guatemala since 1984, including the cases of Dianna Ortiz, Griffith Davis and Nicholas Blake.
What The CIA Won't Declassify: Old Secrets and New by Deirdre Griswold
 There are a few things the CIA doesn't want you to know. Like how it organized the 1961 Bay of Pigs invasion of Cuba. How it overthrew the elected government of Guatemala in 1954, setting off a long and bloody struggle that continues to this day.
What is a Security Clearance
 Certain federal employees and certain employees in the private sector are required to have security clearances because their job requires them to have access to classified documents. The occupant of any such job is said to hold a "sensitive" position, defined as "any position, by virtue of its nature, could bring about a material adverse effect on national security".
Who's keeping the U.S. Domain Name System by Frank X. Sowa
 In March 1995, NSI was purchased by the largest employee-owned research and engineering company in the United States, a little-known company with $2 billion in annual sales and more than 20,500 employees world-wide, whose Board of Directors reads like a Who's Who list of former intelligence, federal laboratory, defense industry, and military operatives
 
This page Copyright © 1997-2006 totse.com.
 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
george galloway what do you think of him?
Hinchey Amendment
why UK accepts US subjugation and infiltration?
George galloway suspended from HP
Why Marxism IS Economically Exploitive...
Situation in Turkey
Putin not playing nicely
So, I hear they have Mcdonalds in China...
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS