Andrew “Weev” Auernheimer of Jewish Descent on Both Sides of His Family, His Mom Says

Posted by DanielS on Thursday, 04 January 2018 14:31.

JTA, “Neo-Nazi who co-runs Daily Stormer has Jewish relatives on both sides of family”, 3 Jan 2018:

Andrew “Weev” Auernheimer

(JTA) — The mother of a neo-Nazi who co-runs the white supremacist website Daily Stormer and said Jewish children “deserve to die” has Jewish relatives on both sides of his family.

Andrew “Weev” Auernheimer’s mother, Alyse, confirmed to Newsweek magazine in an article published Wednesday that her son comes from a “large, mixed race family” with Native American heritage, and that he has Jewish lineage “on both sides of his family.” His Jewish heritage was first reported by Gawker in 2012 when he volunteered the information to a reporter, but this is the first time a family member has confirmed his background.

Auernheimer, who runs the technical side of the Daily Stormer, with its more well-known editor Andrew Anglin, is believed to be in Ukraine, where he has lived since serving jail time in the United States on a computer hacking charge. He has been estranged from his mother for over a decade, she told Newsweek.

“Weev” Auernheimer works for both Daily Stormer and TRS.

Auernheimer, 32, on the podcast Radical Agenda last month said Jews were to blame for the Daily Stormer website losing its dot-com status, causing it to jump from domain to domain in recent months.

“If you don’t let us dissent peacefully, then our only option is to murder you. To kill your children. To kill your whole families,” he said in an interview. “There is only one thing absent free speech that we can do to express our dissent and that’s to slaughter you like dogs, and you’re gonna have it coming and your children will deserve to die.”

While normal WN have been intent on denying a supremacist message in favor of a separatist message, Weev sent this missive everywhere from China to the University of Massachusetts at Amherst

Podcast host Christopher Cantwell, who is under house arrest in Virginia on two felony charges for allegedly using tear gas and pepper spray at the Charlottesville rally in August, tried to walk back the statements, saying that killing Jews “is certainly an undesirable option I’ll state for the FBI agents and prosecutors who are listening to this show.”

Auernheimer also said that the retaliation against the Jews should focus on the “top” Jews, “the most Jewish Jews.”


Related, Weev added in that show that he just wants Jews to convert to Christianity. He has in mind a special new denomination of Christianity which would conform to “natural order.”

The Paleoconservative deal…

Mancinblack remarked, “Oy vey Maria. Weev should go poke a polar bear with a crucifix. I’d pay good money for the film rights.”


Related, “Weev: Master Tactician, Semi-Tactful Infiltrator or Tactless Fool?”


Stuxnet, the most sophisticated piece of malware ever seen, devised for just one specific target.

Posted by DanielS on Thursday, 04 January 2018 06:25.

It was quite picky on its target. It went through several checks and when those checks failed, it would not implement the attack. It was obviously probing for a very specific target…you have to put this in context - this was the most sophisticated piece of malware that we have ever seen. So, its kind of strange that someone makes this huge effort to hit one specific target…well, that must be quite a significant target:

Whoever was behind Stuxnet hasn’t admitted they were behind it.

Even after the cyberweapon had penetrated computers all over the world, no one was willing to admit that it was loose, or talk about the dangers that it posed.

Stuxnet first surfaced with a Belarusian security company servicing Iran.

“Had you ever seen anything quite so sophisticated before?”

“Not with this kind of ‘zero-day’ capacity…......... it was the first time in my practice.”

... a third kind of hactivist is sponsored by state governments…

It went beyond our worst fears… our worst nightmares ..and this continued the more we analyzed….

The first time we opened up Stuxnet there was just bad things everywhere.

Just to give you some context, we can go through and understand every line of code for the average threat in minutes… and here we are one month into this threat and we are just beginning to discover what we call its payload, or its whole purpose…

When looking at the Stuxnet code, its twenty times the size of the average piece of code but contains almost no bugs inside of it, which is extremely rare, code always has bugs inside of it. It’s dense and everything does something or does something right in order to conduct its attack.

One of the things that surprised us was that Stuxnet utilized what is called a zero day exploit.

...its a piece of code allows it to spread without you having to do anything…

A zero day is an exploit which nobody knows about except for the attacker; so there’s no protection against it, there’s been no patch released.

There’s been zero days protection against it. That’s what attackers value because they know 100 percent that if they have this zero day that they can get in whenever they want

They’re actually very valuable - you can sell them for hundreds of thousands of dollars.

Then we became worried because immediately we discovered we had more zero days, and again, these zero days are extremely rare.

Inside Stuxnet we had four zero days, and for the entire rest of the year we only saw twelve zero days used.

It blows everything else out of the water ..we’ve never seen this before and never seen it since, either.

Seeing one in a malware you could understand because the malware offers a means to make money, they’re stealing people’s credit cards so its worth their while to use it, but seeing four zero days…could be worth half a million dollars right there in one piece of malware ..this is not your ordinary criminal gang doing this, this is someone bigger.

It’s definitely not traditional crime. Not hacktivists.

It was evident early on, just given the sophistication of this malware that there must have been a nation state involved - at least one nation state involved in the development.

However, there were “breadcrumbs” left…they had to have some human assets steal certificates, which they did, traceable from two companies in close proximity in a business park in Taiwan.

Eventually we were able to see that Iran was the number one infected country in the world.

That immediately raised our eyebrows.

...we’d never seen a threat before where it was predominantly in Iran.

So we began to follow what was going on in the geopolitical world, what was happening in the general news.

At that time there were actually multiple explosions of pipelines going in and out of Iran.

And we noticed that there had been assassinations of nuclear scientists

More breadcrumbs showed that Stuxnet was targeting Siemans progammable logic controllers.

The PLC is like a very small computer attached to physical equipment like pumps, like valves, like motors.

So, this little box is running a digital program and the actions of this program turns that motor on, off, or sets the specific speed.

They control things like power plants, power grids… things in factories… in critical infrastructure ...critical infrastructure is everywhere around us ...transportation, telecommunication, financial services, health care..

So the payload of Stuxnet was designed to attack some very important part of our world.

The payload was going to be very important..

We knew that Stuxnet could have very dire consequences.

Stuxnet caused the centrifuges (of Iranian nuclear reactors) to spin much faster (than programmed for, to the point where they would explode).


US Navy Information Dominance Warfare: the question is…

Posted by DanielS on Tuesday, 02 January 2018 07:28.

          A kiss and a medal for Jack Posobiec

Mission

Per JP 1-02, Information Operations is “the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.”

The question is: Is their mission virtually one and the same as Israel’s at this point? .... The crew of the USS Liberty might have hoped not.

Center for International Maritime Security, Current Operations, Cyber War

CIMSEC, “Navy Information Warfare — What is it?”, 13 Sept 2016:

By Richard Mosier

U.S. Navy Information Dominance Warfare Officer Breast Insignia

United States Navy Information Dominance Warfare Officer warfare pin breast insignia is two-and-three-quarter inches by one-and-one-eighth inches, gold matte metal pin showing a background of ocean waves, a crossed Naval officer’s sword and lightning bolt, a fouled anchor, and a globe.

Defining a warfare area’s mission and function is the foundation for all activities required to conduct mission area analysis to determine requirements, develop doctrine and tactics, and structure, train, and equip the fleet to accomplish the mission.

Within the U.S. Navy, the terms Information Warfare (IW), Information Operations (IO), and Information Operations Warfare are widely used but not well defined. Nor are they linked to provide coherent definitions from joint and service perspectives that are essential to successful communication regarding IW’s relationship to other warfare areas and supporting activities. The result is confusion, a lack of progress in structuring, training, and equipping the U.S. Navy to perform this emerging predominant warfare area

The following are examples of how these terms mean different things to different groups:

Reference: Station Hypo, 14 Jul 16, “CWOBC, a Community’s Course“: “The Cryptologic Warfare Officer Basic Course (CWOBC) formerly known as the Information Warfare Basic Course (IWBC) is an entry level course for all officers, regardless of commission source, who are coming into the Cryptologic Warfare Officer (CWO) community. Six weeks in length with an average annual throughput of 154, the course focuses on Signal Intelligence (SIGINT), Electronic Warfare (EW), Cyber Operations, as well as security fundamentals and community history.” Inasmuch as the content of the basic course remained the same, the terms “Information Warfare” and “Cryptologic Warfare” appear to mean the same thing for this group. 

50828-N-PU674-005 PENSACOLA, Fla. (Aug. 28, 2015) Officers attending the Information Professional Basic Course at Center for Information Dominance Unit Corry Station listen to Rear Adm. Daniel J. MacDonnell, commander of Information Dominance Corps Reserve Command (IDCRC) and Reserve deputy commander of Navy Information Dominance Forces (NAVIDFOR). Macdonnell spoke with them about career opportunities in the Information Dominance Corps and active and reserve integration.

PENSACOLA, Fla. (Aug. 28, 2015) Officers attending the Information Professional Basic Course at Center for Information Dominance Unit Corry Station listen to Rear Adm. Daniel J. MacDonnell, commander of Information Dominance Corps Reserve Command (IDCRC) and Reserve deputy commander of Navy Information Dominance Forces (NAVIDFOR). Macdonnell spoke with them about career opportunities in the Information Dominance Corps and active and reserve integration.

Reference the BUPERS Information Warfare Community Management web page. It only addresses Information Professionals (1820), Cryptologic Warfare Specialists (1810), Cyber Warfare Engineers (1840), Intelligence Officers (1830), and Oceanography Specialists (1800), implying that together this aggregation of legacy support specialties constitutes Information Warfare. All of these are restricted line designators that by definition exercise command only over organizations that perform these specialties. There are no unrestricted line designators for specializing in and exercising Information Operations Warfare Commander (IWC) functions described in Naval Warfare Publication NWP 3-56 below.

Reference: NAVADMIN 023/16, DTG 021815 Feb 16, Subject: Information Dominance Corps Re-designated Information Warfare Community. The message states Information Warfare’s mission is: “providing sufficient overmatch in command and control, understanding the battlespace and adversaries, and projecting power through and across all domains.” This description of the Information Warfare mission is substantially different from the definition of Information Operations defined by Secretary of Defense, adopted by the JCS, and reflected in Naval Warfare Publications.

The Secretary of Defense defines Information Operations in DOD Directive 3600.1, dated May 2, 2013, as: “The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.” This definition was incorporated in Joint Pub 1-02 and Naval Warfare Publications.

Naval Warfare Publication (NWP) 3-13 Information Operations, Feb 2014, defines Information Operations as: “the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.” Paragraph 1-3 states: “Evolving joint and Navy doctrine has refined IO as a discrete warfare area, not just a supporting function or enabling capability, and the IE [information environment] as a valuable and contested part of the battlespace.”

160123-N-PU674-018 PENSACOLA, Fla. (Jan. 23, 2016) Information warfare Sailors from the Center for Information Dominance Unit Corry Station mentor high school students during CyberThon, an event designed to develop the future cybersecurity workforce. Hosted by the Blue Angels Chapter of the Armed Forces Communications and Electronics Association, CyberThon challenged the students to play the role of newly hired information technology professionals tasked with defending their company’s network.

PENSACOLA, Fla. (Jan. 23, 2016) Information warfare Sailors from the Center for Information Dominance Unit Corry Station mentor high school students during CyberThon, an event designed to develop the future cybersecurity workforce. Hosted by the Blue Angels Chapter of the Armed Forces Communications and Electronics Association, CyberThon challenged the students to play the role of newly hired information technology professionals tasked with defending their company’s network.

Naval Warfare Publication (NWP) 3-56, subject: Composite Warfare Commander, Feb 2010, Paragraph 3.7 identifies twenty-three typical functions assigned to the “Information Operations Warfare Commander (IWC)” that are summarized below:

Planning IO, EW, Military Deception, Operations Security, PSYOP, and Spectrum Usage. 

Developing, coordinating, and practicing preplanned responses for counter-surveillance, counter-influence, and counter-targeting in response to changes in the tactical situation.     

Recommending the EMCON profile and coordinating with ASWC to manage acoustic emissions in response to changes in the tactical situation.

Controlling ES and EA assets, and coordinating employment of ES and cryptologic sensors.

Conducting computer Network Defense (CND) and COMSEC monitoring.

READ MORE...


Gas Under Gaza

Posted by DanielS on Monday, 01 January 2018 06:43.

Middle East Monitor, “Palestinians discuss development of gas field with Shell”

In February of 2017, The Palestinian Investment Fund (PIF) announced that it has been discussing the development of Gaza Marine Gas Field with Shell, Anadolu has reported.

Gaza Marine is about 30km off the coast of the Gaza Strip in the eastern Mediterranean; it is estimated to contain about 28 million cubic metres of gas.

British Gas bought the concession from the Palestinian Authority in 1999 but the development of the project has been on hold due to Israeli obstacles. Preventing the development of the project is part of the internationally-backed Israeli siege of the Gaza Strip. Shell bought the British Gas stake in Gaza Marine recently, and it is now the main developer of the field.

The Director of the PIF, Mohamed Mustafa, told Anadolu that the current discussions with Shell concentrate on accelerating the development of the project. He noted that there had been a study to connect a pipeline from the field to the sole electricity plant in Gaza. “The most important thing, though, is that we get Israel’s permission for this pipeline because it crosses its land,” he explained.

According to Offshore-technology.com, Shell holds a 90 per cent interest in the field. The stake will reduce to 60 per cent if the PIF and Consolidated Contractors Company (CCC) decide to exercise their options. PIF and CCC would subsequently hold 30 per cent and 10 per cent interests respectively.

The PIF is a sovereign Palestinian fund with capital of $800 million.


Natural gas in the Gaza Strip
, From Wikipedia:

Significant reserves of natural gas were found offshore from the Gaza Strip. As of early 2015, Gaza’s natural gas was still underwater and the same for almost all of the Levantine gas.[1]

History

The Palestinians signed a memorandum of intent on November 8, 1999 with British Gas and a company linked to the Palestinian Authority, the Consolidated Contractors Company, giving them rights to explore the area.[2][3] The discovered natural gas reserve was calculated to have 35 BCM, larger than Israel’s Yam Tethys maritime gas field.[3] It was found in two small gas fields dubbed Gaza Marine 1 and Gaza Marine 2.

In 1999, Israeli Prime Minister Ehud Barak set aside exploration of Gaza’s offshore resources for a future Palestinian state, with no prior consultation with Israel stipulated.[2] According to Michael Schwartz, Barak deployed the Israeli navy in Gaza’s coastal waters to impede the implementation of the terms of the modest contract between the Palestinian Authority and British Gas (BG) to develop Gaza’s Mediterranean gas resources.[1] Israel demanded that the Gaza gas be piped to facilities on its territory, and at a price below the prevailing market level[4] and that Israel also control all the (relatively modest) revenues destined for the Palestinians — to prevent the money from being used to “fund terror.” In Schwartz’s view, with this Israeli action the Oslo Accords were officially doomed, because by declaring Palestinian control over gas revenues unacceptable, the Israeli government committed itself to not accepting even the most limited kind of Palestinian budgetary autonomy, let alone full sovereignty. In Schwartz’s view, since no Palestinian government or organization would agree to this, a future filled with armed conflict was assured.[1]

READ MORE...


Egyptian “Migrant” Terror Attack in Pennsylvania

Posted by DanielS on Saturday, 30 December 2017 00:46.

New Observer, “Egyptian ‘Migrant’ Terror Attack in Pennsylvania”, 25 Dec 2017:

An Egyptian legal immigrant who entered the US on a “chain migrant” visa carried out the triple terrorist attack on police in the Pennsylvanian state capital Harrisburg this week—an attack largely deliberately ignored the by controlled media.

According to a statement issued by the Department of Homeland Security, “the suspect involved in a terror attack in Harrisburg, Pennsylvania and another suspect arrested on terror-related money laundering charges were both beneficiaries of extended family chain migration.”

The invader, named as Ahmed Amin El-Mofty, was a naturalized U.S. citizen who was admitted to the United States from Egypt on a family-based immigrant visa.

El-Mofty was killed on Friday December 22 in a shootout after opening fire and targeting police at multiple locations in Harrisburg, Pennsylvania.

The Egyptian invader started his attack at the 100 block of State Street, when Ahmed El-Mofty started firing gunshots. He then got into a vehicle and headed off towards the State Capitol Building, rounded a corner and shot several times at a Capitol Police car near Third and Walnut streets.

One shot came “very close” to hitting the officer driving, but he was able to escape without injury, according to Dauphin County District Attorney Ed Marsico.

About 30 minutes later, El-Mofty fired several shots at a Pennsylvania State Police trooper. The officer suffered minor injuries and was chased by the shooter more than a mile to Allison Hill near the intersection of 17th and Mulberry streets. By then more officers had converged on scene and killed El-Mofty in the resulting shootout.

“The long chain of migration that led to the suspect’s admission into the United States was initiated years ago by a distant relative of the suspect. One of the most recent links in that chain was an extended family member admitted into the United States from Egypt on an F24 visa,” the DHS statement said.

“Separately, Zoobia Shahnaz, who has been charged with laundering bitcoins to support ISIS, is a naturalized U.S. citizen who came to the United States from Pakistan on an F43 visa.

“The F43 visa is available to the children of F41 visa holders who were sponsored by other family members that obtained citizenship.”


Hermeneutic construction of Putin and Trump’s character, positions and relation:

Posted by DanielS on Thursday, 28 December 2017 05:38.

Correction: I spoke too soon about Timothy Snyder being an anti-nationalist, and I did that in light of his estimation that Britain and France were not really nations while they were empires, that their “nationhoods” were creations of post hoc political convenience. Nevertheless, to say that he is against nationalism would not be correct, since in fact he sees the weak state and the destruction of the state as that which abets genocide.

Snyder’s characterology of how Putin’s and Trump’s positions have emerged in fairly conjoint construction is uncanny…

As such he does make of himself a useful idiot in that he exposes one side of the YKW equation - the specific origin and characters of their right wing cohorts, Putin and Trump.

Youtube, “A Republic, If You Can Keep It: Masha Gessen Talks Autocracy with Timothy Snyder”, 12 July 2017:
       
As his fellow Trump/Putin critic, (((Masha Gessen))) would suggest, we would miss the truth of these characters, more like mafia dons than statesmen, if we were to maintain a policy of sheer fact checking. Because essentially, they don’t care. They both have a cynical world view and it is about power - logical consistency is for the naive. By contrast to that, one must have the courage and confidence to tell the true story -

Youtube, “Chatham House Primer: Modern Authoritarianism”, 30 Oct 2017:

This guy, (Ivan) Ilyin, I think was a very interesting philosopher; he is kind of the grandfather of the current Russian “fascism.”  Current Russian “fascists” like Alexander Dugin are a little jealous of him and say that he just serves a technical function in the Kremlin and he’s not that interesting. I think he’s interesting. One of his ideas is that for Russia to have a leader, that person has to be free of history, which is a high demand.

He (Ilyin) was a right-wing Hegelian ...his whole idea was that god created the world and that was a mistake. It’s an interesting view, those of you who know anything about Orthodox theology know that there are references… god created the world, it was a mistake, the factuality of the world is itself sinful, history is itself sinful, contingency, to use the technical term, contingency is sinful, all these facts and passions we have, they’re inherently sinful.

So, in order for Russia to be rescued it has to be rescued by someone who is somehow clean of history.

It has to be a redeemer who comes from beyond history.

What I find so interesting is that this actually happened in a way.

The place that is not history is fiction.

When Mr. Putin came to power, Surkov and the others in the Kremlin literally had a kind of game and then a public opinion poll where they tried to figure out which Russian fictional character would be most attractive to Russians. They came up with this character (Max Otto von) Stierlitz, who was a double agent and a person in a novel, and in a film, in the 70’s, who was a Russian spy who spoke German. That’s why they chose Mr. Putin. So, he literally .. this true people! This is the world we live in. So he literally came from fiction.

Then you connect Mr. Putin to Mr. Trump. Mr. Trump is Not a successful real estate developer! That never happened. Mr. Trump bankrupted six companies. He owed billions of dollars to, I think, seventy banks. Until, low and behold, some nice Russians came and said, ‘hey, why don’t you just put your name on some buildings and we’ll give you money for that, and we will build the buildings - which then became his business plan. Which is a great (((business plan))) if you can get it.

Rob Goldstone relaxing, chatting with Trump

The Miss Universe pageant. How did he run (((the Miss Universe pageant)))? The Russians gave him twenty million dollars and he showed up. Which is a great business plan if you can do it.

So, a fictional Russian character comes to power and then creates a fictional American character called Mr. Trump. This happened!

Once the Russians had bailed him out, he then appeared on American television, on celebrity apprentice, playing a successful real estate developer - which he never was.

But as a character, he was great, he could say, “you’re fired!” in a really convincing way.

So, one fictional character then creates another fictional character. And that fictional character also comes to power. ..with the help of all kinds of fictional devices, mostly delivered through the internet.  So there really is an interesting problem of (((genre))) going on in our life.


Hindu women forced to convert to Islam while mass graves of their Hindu men discovered in Rakhine

Posted by DanielS on Tuesday, 26 December 2017 06:11.

India Today reports on the forced conversion to Islam of Rakhine Hindus in the Bangladesh refugee camps and the discovery of Hindu mass graves in Rakhine by the Myanmar security services. This report dates from September and has gone unnoticed in the West. I found it as the latest entry on the Facebook account of Shwe Eain Si, so the girl obviously hasn’t given up the fight. Good for her.

                    - Mancinblack

                           


Goyim!?! It’s an easy way to say ‘non-Jew.’ That’s your Christmas present I guess.

Posted by DanielS on Sunday, 24 December 2017 08:31.

Millennial Woes Talks to Mike Isaacson, 24 Dec 2017:

Mike Isaacs: So, yeah, so the point is that ultimately, the issue is not a matter of ethnicity or nationality, the issue is that we have a social system, an economic system that perpetuates this kind of continued defamation of anyone who isn’t of the ruling class.
Millennial Woes: Ah, well, or you could say that it’s to do with rich Jews, ah..
Mike Isaacs:...n-no ... It’s rich, it’s rich like uh rich goyim too.
Millennial Woes: Goyim!?!
Mike Isaacs: Uh, yeah, uh, yeah that is the word I used. It is an easy way to say ‘non-Jew.’ Uhm, that was your Christmas present I guess, I don’t know…

And of course what Isaacson is saying is true - the problem is rich goyim as well - and in their case, they deserve that title when they are complicit with selling out their ethnic genetic interests.

The problem is that neither side is allowing for a White Left, its steady ethno nationalist perspective - which would provide not only a steady perspective on the antagonism of the YKW, but a steady perspective on susceptibilities to elite betrayal.

A fundamental problem with MW is that while he does well in assembling pre-manufactured components, it is his wont therefore, he’s accepted, in fact has insisted upon, the terminological schematic that he’s been handed to assemble .. and it has been provided by the YKW to allow them a back door.

That aside for the moment, he’s conducted a ‘Millenniyule’ of sixty some odd intelligent and informative conversations with people concerned for ethnonationalism in one way or another - unfortunately, with the Alt-Right brand, but we’ll be advancing our more sound platform in days to come…

We’ll be addressing these matters, but lets first give credit where credit is due - this was one of the better moments:

MW(42:00): That’s interesting. Why is that you are against Israel?

Mike Isaacs: That’ primarily because I’m an anarchist, so I’m against all states.

MW: I imagine the Jews in Israel wouldn’t like you very much.

Mike Isaacs: Well there are anti-Zionist Jews who grew up there; and that’s their country right now; and also I don’t like ethnostates, in particular.

I think the Palestinian people deserve the right to happiness, a fulfilling life, freedom without persecution.

MW: Yeah, you know, it’s too bad for the Palestinians really, I have no position on this one way or the other. It’s not my problem, really.

Mike Isaacs: That’s so easy to say…like at the end of the day, that fact that Palestinians are in captivity means just like your goverment is in alliance with the Israelis to keep them that way so, if they can like..

MW: Oh, well I’d rather we didn’t ...

Mike Isaacs: You help the system to make money. This is how the system operates. They expect us to turn a blind eye to other people’s problems.

MW: Hold on a minute. You and I are in agreement here. I don’t want us to be sending any money to Israel. With their high I.Q. they should be able to deal with this themselves, make money and all the rest of it… so I don’t think there is a need for us to be sending aid money to them. You know, I agree with you, so I don’t like being implicated, or my people being implicated in these things.

Mike Isaacs: It’s not about implicating your people. This is what I’m trying to get the point across with.. it’s that your people are actively harmed. ..because your people are ultimately in a position, and when I say your people, I mean working class people…

MW: I’m not working class, but anyway, go on…

 
Mike Isaacs: Ok, but anyway, the common people, of Britain, they are ultimately at the mercy of the people who rule them .. the politicians who are in the pockets of big financiers…and big executives.. uhm, and those people continually profit from the bondage of the Palestinian people. The British weapons industry makes money by virtue of this foreign aid going to Israel then coming back in the form of weapons purchase. The Unites States is even more so…The United States is a huge funder not only of Israel but also of Egypt…
 
MW: I must say, I am delighted that we’ve found something that we can agree on, Mike, this is really nice…I totally share your views on this…
 
Mike Isaacs: So, yeah, so the point is that ultimately, the issue is not a matter of ethnicity or nationality, the issue is that we have a social system, an economic system that perpetuates this kind of continued defamation of anyone who isn’t of the ruling class.

       
MW: Ah, well, or you could say that it’s to do with rich Jews, ah..
       
Mike Isaacs...n-no…It’s rich, it’s rich like uh rich goyim too.  MW: Goyim!?!
     
Mike Isaacs: uh, yeah, uh, yeah that is the word I used. It is an easy way to say ‘non-Jew.’
...Uhm, that was your Christmas present I guess, I don’t know…


Page 122 of 229 | First Page | Previous Page |  [ 120 ]   [ 121 ]   [ 122 ]   [ 123 ]   [ 124 ]  | Next Page | Last Page

Venus

Existential Issues

DNA Nations

Categories

Contributors

Each author's name links to a list of all articles posted by the writer.

Links

Endorsement not implied.

Immigration

Islamist Threat

Anti-white Media Networks

Audio/Video

Crime

Economics

Education

General

Historical Re-Evaluation

Controlled Opposition

Nationalist Political Parties

Science

Europeans in Africa

Of Note

Comments

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Sat, 26 Aug 2023 11:37. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Sat, 26 Aug 2023 00:56. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Fri, 25 Aug 2023 22:52. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Fri, 25 Aug 2023 12:00. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Fri, 25 Aug 2023 11:21. (View)

Al Ross commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Fri, 25 Aug 2023 04:23. (View)

Al Ross commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Fri, 25 Aug 2023 04:00. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Fri, 25 Aug 2023 01:36. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Thu, 24 Aug 2023 12:02. (View)

Thorn commented in entry 'A year in the trenches' on Wed, 23 Aug 2023 18:02. (View)

Thorn commented in entry 'A year in the trenches' on Wed, 23 Aug 2023 17:19. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Wed, 23 Aug 2023 17:13. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Wed, 23 Aug 2023 12:01. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Tue, 22 Aug 2023 16:33. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Tue, 22 Aug 2023 13:24. (View)

Timothy Murray commented in entry 'A year in the trenches' on Tue, 22 Aug 2023 13:22. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 23:14. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 22:52. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 22:15. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 21:38. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 21:28. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 16:06. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 15:59. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 14:16. (View)

timothy murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Mon, 21 Aug 2023 01:49. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Sun, 20 Aug 2023 13:05. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Sun, 20 Aug 2023 12:57. (View)

timothy murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Sun, 20 Aug 2023 02:18. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Sat, 19 Aug 2023 20:29. (View)

timothy murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Sat, 19 Aug 2023 01:51. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Fri, 18 Aug 2023 16:06. (View)

Timothy Murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Fri, 18 Aug 2023 11:57. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Thu, 17 Aug 2023 22:52. (View)

timothy murray commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Thu, 17 Aug 2023 21:18. (View)

Thorn commented in entry 'A couple of exchanges on the nature and meaning of Christianity's origin' on Thu, 17 Aug 2023 17:57. (View)

Majorityrights shield

Sovereignty badge