Bradley Manning Nominated For Nobel Peace Prize

Bradley Manning Nominated For Nobel Peace Prize

Bradley Manning, the U.S. Army private accused of leaking classified U.S. information to WikiLeaks in 2010, has been nominated for a Nobel Peace Prize.

Manning was arrested in May 2010 after allegedly leaking more than 250,000 U.S. diplomatic cables, 400,000 U.S. Army reports about Iraq and another 90,000 about Afghanistan, as well as the material used in the “Collateral Murder” video produced by WikiLeaks. He was detained for nine months — first in solitary confinement at the Marine Corps Brig in Quantico, Va., and then at a medium-security military prison at Fort Leavenworth, Kan. — for nine months before formal charges were brought against him last week.

Manning faces 22 charges in sum, the most serious is “aiding the enemy,” a crime punishable by death. Army prosecutors have insisted, however, that they are seeking a life imprisonment and not a death penalty sentence, should Manning be found guilty. He has also been charged with disclosing classified information to a person not authorized to receive it, wrongfully causing intelligence to be published on the Internet knowing that it is accessible to the enemy and violating Army computer use rules.

The names of 191 individuals and 43 organizations were submitted to the Norweigan Nobel Committee for consideration. Every year, the five-member Committee sends out thousands of letters to qualified individuals — lawmakers, university professors and other figures involved in the public sphere — calling for nominations. The lists of nominees are kept secret for 50 years, but some voting individuals choose to announce their nominations publicly.

In addition to Manning, former Ukrainian Prime Minister Yulia Tymoshenko and Russian human rights activist Svetlana Gannushkina were nominated for the prize, the AP reports. The winner — or winners, should the prize be shared — will be announced in October.

SOURCE: https://mashable.com/2012/02/27/bradley-manning-wikileaks-nobel-peace-prize/

Government Resignations Happening Worldwide

Government Resignations Happening Worldwide

2/6/12
Romanian prime minister and cabinet resign en masse
http://www.guardian.co.uk/world/2012/feb/06/romania-pm-cabinet-resign
2/20/12 (GERMANY) GERMAN PRESIDENT Christian Ruff resigns (financial corruption charges)
http://www.dailymail.co.uk/news/article-2102524/German-President-Christian-Wulff-forced-resign.html
RESIGNATIONS FROM WORLD BANKS:
(1) 9/25/11 (SWITZERLAND) Bank chief resigns over £1.5bn rogue trader crisis
http://www.dailymail…ng-scandal.html
(2) 10/29/11 (CHINA) Resignations Suggest Shift for China’s Banks
http://online.wsj.co…4190522426.html
(3) 11/01/12 (INDIA) More directors of the Beed district bank resign
http://www.thenews.coop/article/more-directors-beed-district-bank-resign
(4) 11/21/11 (JAPAN) UBS’s Japan Investment Banking Chairman Matsui to Resign
http://www.bloomberg…-to-resign.html
(5) 11/29/11 (Iran) Iran’s Bank Melli CEO Resigns Over Loan Scam
http://www.dailymoti…-loan-scam_news
(6) 12/15/11 (UNITED KINGDOM) Senior private banker resigns from Coutts [a very exclusive private bank]
http://www.reuters.c…E7NF23S20111215
(7) 12/22/11 (FRANCE) Societe Generale’s Investment Banking Chief Steps Down
http://dealbook.nyti…ief-steps-down/
(8) 1/05/12 (UNITED KINGDOM) Chief executive of Saunderson House [Private Bank] steps down
http://www.ftadviser…GM/article.html
(9)1/09/12 (SWITZERLAND) Switzerland’s central bank chief resigns
http://www.aljazeera…5612935171.html
(10) 1/12/12 (United Kingdom) Lloyds’ head of wholesale quits
http://www.bankingti…holesale-quits/
(11) 1/19/12 (SPAIN) Spanish bank Santander’s Americas chief quits
http://www.expatica….its_202395.html
(12) 1/20/12 (JAPAN) Normura’s head of wholesale banking quits
http://www.euromoney…king-quits.html
(13) 1/29/12 (NEW ZEALAND) New Zealand Reserve Bank Governor Alan Bollard to Step Down in September
http://www.bloomberg…-september.html
(14) 1/21/12 (Greece) Banks’ top negotiator quits Greece, but talks go on
http://www.france24.com/en/20120121-banks-top-negotiator-quits-greece-but-talks-go
(15) 2/06/12 (INDIA) Dhanlaxmi Bank CEO Amitabh Chaturvediquits:http://www.livemint.com/2012/02/06160111/Dhanlaxmi-Bank-CEO-Amitabh-Cha.HTML
(16) 2/07/12 (INDIA) Falguni Nayar quits Kotak Mahindra Bank
http://articles.econ…hanti-ekambaram
(17) 2/07/12 (IRAN) Iran denies central bank resignation rumor (don’t believe until its denied?)
http://finance.yahoo…-164154294.html
(18) 2/09/12 (VATICAN) Four Priests Charged In Vatican Banking Scandal
http://articles.busi…nces-italian-tv
(19) 2/10/12 (INDIA) Tamilnad Mercantile Bank CEO resigns
http://www.business-…resigns/464259/
(20) 2/13/12 (KUWAIT) Kuwait Central Bank CEO resigns
http://www.washingto…rOAR_story.html
(21) 2/14/12 (NICARAQUA) Nicaraqua Central Bank Pres Rosales resigns
http://www.bloomberg…s-amid-row.html
(22) 2/14/12 (UNITED KINGDOM) Social finance pioneer Hayday steps down from Charity Bank
http://www.socialent…wn-charity-bank
(23) 2/15/12 World Bank CEO Zoellick resigns
http://business.time.com/2012/02/15/world-bank-president-zoellick-resigns/
Did the White House tell the World Bank president that he’s out?
http://bosco.foreignpolicy.com/posts/2012/02/15/did_the_white_house_tell_the_world_bank_president_that_hes_out
(24) 2/15/12 (SLOVENIA) Slovenia TWO largest Banks CEO’s (2) resign
http://www.bloomberg.com/news/2012-02-15/slovenia-s-nova-kreditna-banka-maribor-ceo-plos-resigns.html
(25) 2/15/12 (KENYA) Governor of Kenyan Central Bank to Resign
http://www.centralbanking.com/central-banking/news/2152753/parliamentary-committee-calls-kenyan-governor-resign
(26) 2/16/12 (GHANA) Ken Ofori-Atta steps down as Executive Chair of Databank Group
http://business.thinkghana.com/pages/finance/201202/57429.php
(27) 2/16/12 (SAUDI ARABIA) Saudi Hollandi Banks Managing Director Quits
http://webcache.googleusercontent.com/search?q=cache:ZVfFZypqVIcJ:www.a1saudiarabia.com/4489-saudi-hollandi-banks-md-quits/+&cd=4&hl=en&ct=clnk&gl=us
(28) 2/16/12 (AUSTRALIA) Anz Bank CFO Australia resigns
http://www.proformative.com/news/1470243/cfo-anz-bank-resigns-amid-turmoill
(29) 2/16/12 (AUSTRALIA) Royal Bank of Scotland Austrailan CEO Stephen Williams resigns
http://www.theaustralian.com.au/business/wall-street-journal/andrew-chick-to-lead-royal-bank-of-scotlands-australian-arm/story-fnay3vxj-1226272513981
(30) 2/17/12 (USA) Blankfein out as Goldman Sachs CEO by summer
http://finance.fortune.cnn.com/2012/02/17/gary-cohn-goldman-sachs/
(31) 2/18/12 (PAKISTAN) AJK Bank’s executive steps down
http://www.nation.com.pk/pakistan-news-newspaper-daily-english-online/national/18-Feb-2012/ajk-bank-s-executive-steps-down?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+pakistan-news-newspaper-daily-english-online%2F24hours-news+%28The+Nation+%3A+Latest+News%29
(32) 2/20/12 (RUSSIA) Head of Russian Bank Regulator Steps Down
http://newsley.com/articles/head-of-russian-bank-regulator-steps-down/206711
(33) 2/20/12 (SWITZERLAND) Credit Suisse Chief Joseph Tan resigns
http://www.businessweek.com/news/2012-02-20/credit-suisse-s-private-bank-chief-asian-economist-tan-resigns.html
(34) 2/10/12 (KOREA) Korea Exchange Bank chief steps down
http://english.yonhapnews.co.kr/business/2012/02/10/0503000000AEN20120210005100320.HTML

 

RELEASE: Anonymous Hands Over Stratfor Emails to Wikileaks

RELEASE: Anonymous Hands Over Stratfor Emails to Wikileaks

   LONDON–Today WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example:

“[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.

The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.

The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the “Yes Men”, for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.

Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees: “We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either.”

Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and  Stratfor CEO George Friedman hatched an idea to “utilise the intelligence” it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS: “What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical  instruments, particularly government bonds, currencies and the like”.  The emails show that in 2011 Goldman Sach’s Morenz invested “substantially” more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff: “Do not think of StratCap as an outside organisation. It will be integral… It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor… we are already working on mock portfolios and trades”. StratCap is due to launch in 2012.

The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and “other government intelligence agencies” in “becoming government Stratfors”. Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability.  Stratfor claims that it operates “without ideology, agenda or national bias”, yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.

Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused “gravy train” that sprung up after WikiLeaks’ Afghanistan disclosures:

“[Is it] possible for us to get some of that ‘leak-focused’ gravy train? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet… Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information…  In fact, I’m not so sure this is an IT problem that requires an IT solution.”

Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ‘alpha’, ‘tactical’ and ‘secure’. The correspondence also contains code names for people of particular interest such as ‘Izzies’ (members of Hezbollah), or ‘Adogg’ (Mahmoud Ahmedinejad).

Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s “Confederation Partners”, whom Stratfor internally referred to as its “Confed Fuck House” are included in the release. While it is acceptable for journalists to swap information or be paid by other media  organisations, because Stratfor is a private intelligence organisation that services governments and  private clients these relationships are corrupt or corrupting.

WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant  “Geronimo” , handled by Stratfor’s Former State Department agent Fred  Burton.

WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents.

Public partners in the investigation:

More than 25 media partners (others will be disclosed after their first publication):

Al Akhbar – Lebanon – http://english.al-akhbar.com
Al Masry Al Youm – Egypt – http://www.almasry-alyoum.com
Bivol – Bulgaria – http://bivol.bg
CIPER – Chile – http://ciperchile.cl
Dawn Media – Pakistan – http://www.dawn.com
L’Espresso – Italy – http://espresso.repubblica.it
La Repubblica – Italy – http://www.repubblica.it
La Jornada – Mexico – www.jornada.unam.mx/
La Nacion – Costa Rica – http://www.nacion.com
Malaysia Today – Malaysia – www.malaysia-today.net
McClatchy – United States – http://www.mcclatchy.com
Nawaat – Tunisia – http://nawaat.org
NDR/ARD – Germany – http://www.ard.de
Owni – France – http://owni.fr
Pagina 12 – Argentina – www.pagina12.com.ar
Plaza Publica – Guatemala – http://plazapublica.com.gt
Publico.es – Spain – www.publico.es
Rolling Stone – United States – http://www.rollingstone.com
Russia Reporter – Russia – http://rusrep.ru
Ta Nea – Greece –- http://www.tanea.gr
Taraf – Turkey – http://www.taraf.com.tr
The Hindu – India – www.thehindu.com
The Yes Men – Bhopal Activists – Global http://theyesmen.org
Nicky Hager for NZ Herald – New Zealand – http://www.nzherald.co.nz

MAP: CIA Interventions Since World War II

MAP: CIA Interventions Since World War II

invasions … bombings … overthrowing governments …
occupations … suppressing movements for social change …
assassinating political leaders … perverting elections …
manipulating labor unions … manufacturing “news” …
economic and political sanctions … death squads …
torture … biological warfare … depleted uranium …
drug trafficking … mercenaries …

THROWBACK: Ron Paul Confirms CIA Drug Trafficking

THROWBACK: Ron Paul Confirms CIA Drug Trafficking

http://youtu.be/SBh_hzU-jdI

Released on April 13, 1989, the Kerry Committee report concluded that members of the U.S. State Department “who provided support for the Contras were involved in drug trafficking…and elements of the Contras themselves knowingly received financial and material assistance from drug traffickers.”

In 1996 Gary Webb wrote a series of articles published in the San Jose Mercury News, which investigated Nicaraguans linked to the CIA-backed Contras who had allegedly smuggled cocaine into the U.S. which was then distributed as crack cocaine into Los Angeles and funneled profits to the Contras. According to Webb, the CIA was aware of the cocaine transactions and the large shipments of drugs into the U.S. by the Contra personnel and directly aided drug dealers to raise money for the Contras.

In 1996 CIA Director John M. Deutch went to Los Angeles to refute the allegations raised by the Gary Webb articles, and was famously confronted by former LAPD officer Michael Ruppert, who testified that he witnessed it occurring.

Italian Police Seize Fake Bonds Worth 6 Trillion

Italian Police Seize Fake Bonds Worth 6 Trillion

The fake bonds and other securities were seized from a Swiss trust company during a joint operation by Italian, Swiss, and US authorities.

From: Russia Today
Italian police seize fake bonds worth a third of US national debt (VIDEO)
Published: 18 February, 2012, 16:37
A huge batch of fake US Treasury bonds worth some $6 trillion — more than a third of the US national debt — has been seized by Italian police. Eight Italians have been arrested and accused of a large-scale international fraud.

­The fake bonds and other securities were seized from a Swiss trust company during a joint operation by Italian, Swiss, and US authorities. The fake certificates signed “Chicago, Illinois, Federal Reserve Bank” were stored in trunks stamped with “Federal Reserve System, Treaty of Versailles” marks. The bonds were carrying the false date of issue of 1934.

The forgers were planning to use the fake certificates as collateral to secure loans in a number of Swiss banks, prosecutor of the southern Italian city of Potenza said as cited by Reuters.

The investigation began over a year ago as a trivial probe into Italian mafia loan-sharking. However, after the Italian authorities uncovered an international network plotting a full-scale fraud, they called upon their Swiss and US colleagues. The US experts helped to identify the bonds as fakes.
http://rt.com/news/fake-us-treasury-bonds-661/
*****************************************************
17 February 2012 Last updated at 15:45
Fake US bonds worth trillions seized
Italian prosecutors say they have broken up an organised crime ring that was hiding trillions of dollars of fake US bonds.

Worth $6 trillion, the bonds were found in three metal boxes in a warehouse in the Swiss city of Zurich.

Italian authorities have arrested eight people and are investigating them for fraud and other crimes.

Prosecutors are not sure what the gang was planning, but think they intended to sell the counterfeit bonds.

Investigators, based in Potenza in southern Italy, say the fraud posed “severe threats” to international financial security.

In cooperation with Swiss police, they tracked down three metal boxes to a warehouse in Zurich. The crates contained thousands of fake US bonds that gave the appearance they had been issued by the US Federal Reserve in 1934.
http://www.bbc.co.uk/news/business-17076378
*****************************************************
Record $6 Trillion of Fake U.S. Bonds Seized
By Elisa Martinuzzi – Feb 17, 2012 6:01 PM GMT
Italian anti-mafia prosecutors said they seized a record $6 trillion of allegedly fake U.S. Treasury bonds, an amount that’s almost half of the U.S.’s public debt.

The bonds were found hidden in makeshift compartments of three safety deposit boxes in Zurich, the prosecutors from the southern city of Potenza said in an e-mailed statement. The Italian authorities arrested eight people in connection with the probe, dubbed “Operation Vulcanica,” the prosecutors said.

The U.S. embassy in Rome has examined the securities dated 1934, which had a nominal value of $1 billion apiece, they said in the statement. “Thanks to Italian authorities for the seizure of fictitious bonds for $6 trillion,” the embassy said in a message on Twitter.

The NSA – Behind The Curtain

The NSA – Behind The Curtain

By Deep_Thought

Say hello to Mr Computer…

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

 

What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

 

We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

 

I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

 

Mr Computer

 

The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

 

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

 

Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

 

Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

 

Mr Computer’s capabilities and human-like reasoning cannot be understated.

 

Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.

 

Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.

 

The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.

 

Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.

 

Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.

 

The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.

 

Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.

 

It knows bull@!$%# when it hears it and will let you know in no uncertain terms.

 

As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.

 

Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.

 

The Pipes Are Calling

 

First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.

 

We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.

 

The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.

 

This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.

 

We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.

 

The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.

 

Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.

 

Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.

 

These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.

 

So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.

 

In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.

 

The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.

 

Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.

 

A mixture of ground, air and satellite-based networks are used to deliver this capability.

 

Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.

 

With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.

 

In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.

 

Input, Input, Input

 

Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.

 

The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.

 

Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.

 

Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.

 

Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.

 

We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.

 

With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.

 

Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.

 

If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.

 

Ignore any suggestion that this too much data.  The truth is that all the communications happening on the planet right now can be monitored in near real-time.

 

As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.

 

As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.

 

Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.

 

Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.

 

These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.

 

Hardware

 

This can be very difficult to estimate. Despite popular belief that the NSA will hit a Yottabye by 2015, it seems a little outragous given the space requirements and modern hardware.

 

My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems.  With their base costs, they could be running several hundred easily.

 

In fact, it is likely that the following video shows an early variant of Mr Computer’s infrastructure. The segment reveals that the most powerful machine is called “The Thinking Machine”. I feel that this is a dumbed down reference to Mr Computer.

 

The Thinking Machine

 

 

Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.

 

The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.

 

A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.

 

If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:

 

 

Eidolon TLP – Mr Computer in incognito

 

 

Conclusion

 

The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others, they always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak.

 

At some point, it could be your turn.

 

What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. This claim is supported in the following document:

 

81. Within eleven (11) days of the onset of the Bush administration, and at least seven (7) months prior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.

 

91. International Business Machines Corporation (IBM) was one of the parties working with ATT and the NSA to develop the monitoring center and IBM personnel participated in meetings with ATT and NSA officials in the development of the monitoring center.

http://cryptome.org/mayer-016.htm

 

The US government is quite adept at lying through its teeth, especially to its own citizens. The typical approach is to start a public version such as the “Information Awareness Office” with the same goals as the classified program which provides cover. The general public and privacy groups attack the public program, resulting in its closure, meanwhile the classified program remains operational. The general public believe they have won a victory, any leaks are associated with the now defunct public program and the government gets the information it wanted in the first place.

 

The NSA is a deeply corrupt organisation, that has little regards for the rights of others.  Never trust a government, even your own, implicitly.  Nations change, opinions change and people change.  It just takes the right catalyst for it to happen.

 

In most cases, you will find the seeds were always there, you just chose to ignore them.

Obama Food Czar Is Former Monsanto Exec

Obama Food Czar Is Former Monsanto Exec

Obama Food Czar Is Former Monsanto Exec, One of the Four Horsemen of the Food Apocalypse

It’s not enough that former Monsanto executive Michael Taylor is the Food Czar in Obama`s administration. Monsanto recently purchased Xe Intelligence Services. Xe is the new name for Blackwater, the largest private mercenary military outfit in the world. Within that same time frame, Bill Gates purchased $23 million of Monsanto stock. –

By Paul Fassa at Natural News

Let`s take a look at each of the four horsemen.

Michael Taylor
He was Monsanto`s chief attorney and lobbyist. He knows his way around the FDA and USDA since he`s influenced both agencies. Monsanto Mike was the one who pushed Monsanto`s rBGH (recombinant Bovine Growth Hormone) to help poison milking cows and consumers` milk. Then he made it illegal for non-cooperating dairy farms to display “no rBGH” on their milk cartons. He made life financially miserable for those dairy farmers who didn`t play ball.

Some suspect a Food Czar link with the current raw milk raids. After all, milk is Monsanto Mike`s familiar turf, and his chief administrative duty is food safety.

Monsanto

In case you`re not sure of Monsanto`s destructive nature, here`s a short list of Monsanto`s toxic products: Agent Orange, PCBs, aspartame, rBGH, and Ready Roundup. Google them.

Monsanto developed terminator seeds, forcing farmers to buy new seeds because they cannot be recycled after first harvest. Monsanto is the world`s leading GMO producer. And they sue farmers for violating patent laws when non-GMO farms` crops are inadvertently infested by neighboring GMO crops.

Monsanto is making sure they own patents on almost all other non-GMO seeds as well. Their stated goal is to own the world`s food production. Think food mafia!

Bill Gates

Under the guise of philanthropy, Gates is constantly funding vaccine development and distribution. This includes GM crops containing vaccines and mosquitoes to deliver vaccines. The targets of these developments are usually developing countries.

Vaccines have been exposed as carriers for sterilization agents in developing countries over the past two decades. Perhaps Bill Gates` comment on reducing the population by ten to fifteen percent with vaccines was not a slip of the tongue or taken out of context.

Gates is also funding the Alliance for a Green Revolution in Africa (AGRA). The Gates Foundation hired Robert Horsh in 2006 when he was a director at Monsanto! The AGRA is a front for stripping African farmers of their traditional seed use and force selling them GM seeds. This type of operation has had tragic results for poor cotton farmers in India.

Xe AKA Blackwater

Blackwater has a history of black ops and secret illegal activities. Their services are available to corporate as well as government operations. They changed their name to Xe because of their soiled reputation for exposed dirty deeds in Iraq. As a private mercenary army, Blackwater has been able to terrorize targets under secret contracts, while enabling their employers to claim deniability.

Through different shell company names, Xe has developed secret contracts with several multi-national corporations. Jeremy Scahill, the author of Blackwater: The Rise of the World’s Most Powerful Mercenary Army, has recently exposed Monsanto`s relationship with Xe.

According to Scahill, Cofer Black the director of Total Intelligence, one of Blackwater`s shell companies, started pitching Monsanto in 2008. Black is former CIA director with a nasty reputation. Now Total Intelligence is part of Monsanto. That division`s purpose is to covertly infiltrate anti-GMO activists and resisting farmers. This would enable splintering those groups, or even assassinating some key individuals.

We must resist the evil synergy of this alliance. Jeffrey Smith`s anti-GMO campaign with his Institute for Responsible Technology is a starting point.

Sources for more information include:

Michael Taylor

MONSANTO POSITIONS vs. FEDERAL POSITIONS

Telecomix Crypto Munitions Bureau

Telecomix Crypto Munitions Bureau

Telecomix Crypto Munitions Bureau is part of Telecomix. This wiki is used for discussing technology and philosophy. This wiki is also essentially the technical twin to the political WeRebuild.EU wiki. Both share the same fundamental goal: To defend and increase information freedom.

If you find anything here interesting and want to talk about it (we dont bother with e-mails) join us at irc.telecomix.orgOr just press this link.

Telecomix Crypto Munitions Bureau?

A decentralized organization without membership. The bureaus goals are described in this paper issued by Cameron. Beyond that, we also do whatever we want.

News

Scratchpad(s)

Software

  • Encrypted Communication
    • GPG / Mac Encryption for mails, files and more. No forward secrecy!
    • JavaScript GPG for the GMail webinterface
    • OTR Extremely IMPORTANT for Instant Messaging – USE THIS
    • Tomb strong semi-deniable encryption for the desktop and safe transports
    • Tcpcrypt a protocol that attempts to encrypt (almost) all of your network traffic.
    • CurveCP Usable security for the Internet
    • Crayfish Safe IRC shelter server (concept).
    • LUKS LUKS is the standard for Linux hard disk encryption.
    • Truecrypt Disk encryption
    • Silc : Secure Internet Live Conferencing : IRC like but much more safer (to be written) SILCNET Offical Website
  • Anonymous and Alternative Networks
    • Tor (Peer reviewed, understood and very secure anonymity network.)
    • I2P (Likely unsafe in extremely dangerous situations, peer review needed)
      • OnionCat (Anonymous IPv6 tunneling on top of Tor/I2P.)
    • Netsukuku – Internet Protocol based alternative to ICANNnet – currently lacks dedicated anonymization mechanism, mainly based on physical WLAN links
    • CJDNS (this is not Domain Name System!)
    • Do we need something better?
  • General-purpose VPN software
    • curvetun (lightweight multiuser IP tunnel based on elliptic curve cryptography)
    • OpenVPN (Direct p2p VPN.) – Lacking peer review
    • VTun – Lacking peer review
    • PPTP (Knowledge needed to set up a linux computer as an IPREDATOR-router for your entire net.) PPTP is not safe to use
    • tinc
    • quicktun – uses Elliptic Curves, popular in dn42 community
    • SSH
    • IPSec (for example OpenSWAN)
  • Sousveillance/Counter Surveillance

 

The telecomix cluster – Wiki –Communiqués – Cameron –Telecomix News Agency –Organizational overview –irc.telecomix.org (SSL on port 9999, also available through irc.telecomix.i2p)

Adopt a politician. The politicians will soon be voting about the Data Retention Directive.

Needed Software – projects

Software we may need for further projects, still to be found or written

Physical infrastructure

Repository of research articles

Mission: Helping to undermine one authority after the other…

Among the tasks given to TCMB by Cameron is to develop and spread knowledge about cryptography and security. So, here it is:

Cryptography

Cryptography for The Post-Quantum Computing Era

Books, papers and logs

Further Links

Meetings and seminars

TCMB official documents

Interesting papers/pads

Software watch list

Interesting software that is yet to be investigated.

  • CrypTool / JCrypTool: graphical cryptography teaching tool
  • AlpineLinux hardened and lightweight Linux distribution for setting up routers / gateways

Not sure what this is

Over Unity Magnet Motor Demonstration

Over Unity Magnet Motor Demonstration

An inventor from Argentina has posted a video showing a prototype motor that is claimed to produce more power than it consumes. A video he has posted demonstrates the device in action, and seems to show there are no obvious hidden power sources.

by Hank Mills with Sterling Allan
Pure Energy Systems News


Many inventors have built various types of magnet motors over the years. Some have been purely permanent magnet systems, and others have incorporated both permanent magnets and electromagnets. The fascination with these motors seems to be their potential to produce “free energy” from magnetic fields. When you see a magnet on a refrigerator door holding quite a bit of weight, even though no “work” is being done (the definition of “work” requires movement), a lot of force is represented. What if you could harness that force somehow into a rotational system?

Now, another magnet motor claim has came on the scene. Another inventor from Argentina has posted a video of a magnet motor that he claims produces more power than it consumes. This is different from Jose Zapata‘s all-magnet motor, also from Argentina.

This inventor has setup a blog http://torianproyect.blogspot.com/ about his efforts, which he calls the “Torian Project.” His prototype magnet motor is named the “Torian III.” The prototype features three circular, stationary stators with permanent magnets embedded in them. A rotor that is free to spin fits inside each of the circular stators. The first stator appears to have a number of coils attached, which may be used to influence the permanent magnets (the whole device may be some type of pulse motor). The device is started when the inventor manually spins a wheel on the far left side of the device. Apparently, this manual input is enough to start the device, which then seems to self sustain — and produce enough extra power to light some LEDs. Near the end of the video, he lifts up the device off the table it is on, and shows there are no hidden wires attached.

The inventor speaks Spanish in the video. Also, the written comments he provides with the video are a bit confusing. This is obviously due to the language barrier that can hopefully be overcome with the help of PESN’s readership.

[September 13 update: A translation of this video, along with a subsequent video that was made has been posted at PESWiki.]

Here is the video and the comments that he provides.

Description:

In this opportunity, I would like to show you a completely magnetic motor. This kind of motor DOES NOT need to be supply by any kind of battery, or electrical net or solar energy, because it uses his own alimentation by spinning. And, at the same time, can generates extra electric current (as we can see, the led lights connected to the motor are on).

The principle is easy to understand. All the motors have one rotor and one stator, but in this motor, we have three neodymium discs (instead of a rotor) and two neodymium rings (instead of a stator) and one last neodymium ring that functions as a magnetic oscillator, self-excited by a stage of captors. This captors commutes the magnet’s polarities.

This very same principle its now being use in our last prototype: 1 HP (600 W free). We will upload as soon as possible an explication video for the HP.

The prototype that you seeing in this video provides 50 W free (12V CC – 4 Amp).

There is not a lot of additional information about this device or the inventor. So far, his name has not been revealed. Also, the video he posted is the only one that has been uploaded to his YouTube account. Unfortunately, very little information has been added to his blog, which he has only posted to once. The blog only provides a link to the YouTube video, and features almost the exact same text that he posted with the video.

Thankfully, he has provided an email address for those who would like to contact him. [email protected]

As time passes, hopefully we can learn more about this device, how it works, and it’s performance. It would be great to have another party test it, to determine if it is really producing more power than it consumes. Of course it is possible such testing has already been done, and we just don’t know about it.

There is an expired Brazilian patent that definitely is relevant here, from which the Perendev all-magnet motor was almost surely pirated.  It was granted in 1989 based on a working motor that was presented to the Brazilian patent office.  Using ceramic magnets, it degaussed rapidly, and because the cost of the magnets and the ridicule heaped on him, the inventor shelved the project.  The inventor does not want to be contacted.

In a year when cold fusion technology, noble gas engines, solid state generators, and other devices are emerging, it is nice to know that the classic overunity magnet motors are still alive and kicking!

# # #

This story is also published at BeforeItsNews.

What You Can Do

  1. Pass this on to your friends and favorite news sources.
  2. Subscribe to our newsletter to stay abreast of the latest, greatest developments in the free energy sector.
  3. Let professionals in the renewable energy sector know about the promise of this technology.
  4. Consider investing in this group.

Source: http://pesn.com/2011/07/29/9501879_Torian_Project_Overunity_Magnetic_Motor/

US Military Drones targeting Rescue Workers and Funerals in Pakistan

US Military Drones targeting Rescue Workers and Funerals in Pakistan

The CIA’s drone campaign targeting suspected militants in Pakistan has killed dozens of civilians who had gone to rescue victims or were attending funerals. So concludes a new report by the London-based Bureau of Investigative Journalism. It found that since President Obama took office three years ago, as many as 535 civilians have been killed, including more than 60 children. The investigation also revealed that at least 50 civilians were killed in follow-up strikes when they had gone to help victims. More than 20 civilians have also been attacked in deliberate strikes on funerals and mourners. We speak to Chris Woods, award-winning reporter with the Bureau of Investigative Journalism. “We noted that there were repeated reports at the time, contemporaneous reports in publications like New York Times, news agencies like Reuters, by CNN, that there were these strikes on rescuers, that there were reports that there had been an initial strike and then, some minutes later, as people had come forward to help and pull out the dead and injured, that drones had returned to the scene and had attacked rescuers,” Woods says. “We’ve been able to name just over 50 civilians that we understand have been killed in those attacks. In total, we think that more than 75 civilians have been killed, specifically in these attacks on rescuers and on mourners, on funeral-goers.” [includes rush transcript]

VIDEO

http://www.democracynow.org/2012/2/6/us_accused_of_using_drones_to

 

The Right to Anonymity is a Matter of Privacy

The Right to Anonymity is a Matter of Privacy

This January 28marks International Privacy Day. Different countries around theworld are celebrating this day with their own events. This year, we are honoring the day by calling attention to recent international privacy threats and interviewing data protection authorities, government officials, and activists to gain insight into various aspects of privacy rights and related legislation in their own respective countries.


Throughout history, there have been a number of reasons why individuals have taken to writing or producing art under a pseudonym. In the 18th century, James Madison, Alexander Hamilton, and John Jay took on the pseudonym Publius to publish The Federalist Papers. In 19th century England, pseudonyms allowed women–like the Brontë sisters, who initially published under Currer, Ellis, and Acton Bell–to be taken seriously as writers.

Today, pseudonyms continue to serve a range of individuals, and for a variety of reasons. At EFF, we view anonymity as both a matter of free speech and privacy, but in light of International Privacy Day, January 28, this piece will focus mainly on the latter, looking at the ways in which the right to anonymity–or pseudonymity–is truly a matter of privacy.

Privacy from employers

Human beings are complex creatures with multiple interests. As such, many professionals use pseudonyms online to keep their employment separate from their personal life. One example of this is the Guardian columnist GrrlScientist who, upon discovering her Google+ account had been deleted for violating their “common name” policy, penned a piece explaining her need for privacy. Another example is prominent Moroccan blogger Hisham Khribchi, who has explained his use of a pseudonym, stating:

When I first started blogging I wanted my identity to remain secret because I didn’t want my online activity to interfere with my professional life. I wanted to keep both as separate as possible. I also wanted to use a fake name because I wrote about politics and I was critical of my own government. A pseudonym would shield me and my family from personal attacks. I wanted to have a comfortable space to express myself freely without having to worry about the police when I visit my family back in Morocco.

Though Khribchi’s reasoning is two-fold, his primary concern–even stronger than his need for protection from his government–was keeping his online life separate from his employment.

Even Wael Ghonim–the now-famous Egyptian who helped launch a revolution–conducted his activism under a pseudonym…not to protect himself from the Egyptian government, but rather because he was an employee of Google and wanted to maintain an air of neutrality.

Privacy from the political scene

In 2008, an Alaskan blogger known as “Alaska Muckraker” (or AKM) rose to fame for her vocal criticism of fellow Alaskan and then-McCain-running-mate Sarah Palin. Later, after inveighing against a rude email sent to constituents by Alaska State Representative Mike Doogan, AKM was outed–by Doogan–who wrote that his “own theory about the public process is you can say what you want, as long as you are willing to stand behind it using your real name.”

AKM, a blogger decidedly committing an act of journalism, could have had any number of reasons to remain anonymous. As she later wrote:

I might be a state employee. I might not want my children to get grief at school. I might be fleeing from an ex-partner who was abusive and would rather he not know where I am. My family might not want to talk to me anymore. I might alienate my best friend. Maybe I don’t feel like having a brick thrown through my window. My spouse might work for the Palin administration. Maybe I’d just rather people not know where I live or where I work. Or none of those things may be true. None of my readers, nor Mike Doogan had any idea what my personal circumstances might be.

Though Doogan claimed that AKM gave up her right to anonymity when her blog began influencing public policy, he’s wrong. In the United States, the right to anonymity is protected by the First Amendment and must remain so, to ensure both the free expression and privacy rights of citizens.

Similarly, in 2009, Ed Whelans, a former official with the Department of Justice, outed anonymous blogger John Blevins–a professor at the South Texas College of Law–in the National Review, calling him “irresponsible”, and a “coward.” Blevins took the fall gracefully, later explaining why he had chosen to blog under a pseudonym. Like Khribchi, Blevins’ reasons were numerous: He feared losing tenure and legal clients, but he also feared putting the jobs of family members in the political space at risk.

Privacy from the public eye

A friend of mine–let’s call him Joe–is the sibling of a famous celebrity. But while he’s very proud of his sibling, Joe learned early on that not everyone has his best interests at heart. Therefore, Joe devised a pseudonym to use online in order to protect the privacy of himself and his family.

In Joe’s case, the threat is very real: celebrities are regularly stalked, their houses broken into. His pseudonym keeps him feeling “normal” in his online interactions, while simultaneously protecting his sibling and the rest of his family from invasions of privacy.

Achieving anonymity online

Anonymity and pseudonymity may seem increasingly difficult to achieve online. Not only do companies like Facebook restrict your right to use a pseudonym, but even when you do think you’re anonymous, you might not be–as blogger Rosemary Port found out in 2009 after Google turned over her name in response to a court order.

While we should continue to fight for our privacy under the law, the best thing we can do as users to who value our right to anonymity is to use tools like Tor. Anonymous bloggers can use Global Voices Advocacy’s online guide to blogging anonymously with WordPress and Tor. And all Internet users should educate themselves about what is–and isn’t–private on their online accounts and profiles.

SOURCE: https://www.eff.org/deeplinks/2012/01/right-anonymity-matter-privacy

Anonymous reveals Haditha massacre emails

Anonymous reveals Haditha massacre emails

Anonymous have unveiled their second major release for this week’s installment of FuckFBIFriday. Their target this time around is Frank Wuterich, the US Marine that admitted to killing Iraqi civilians — and received no jail time for his crime.

Early Friday afternoon, members of the loose-knit online collective Anonymous began circulating news that the website for Puckett and Faraj, the high-profile attorneys that represented Sgt. Frank Wuterich in his recent trial, had been hacked. Wuterich admitted to leading Marines into two civilian homes in Haditha, Iraq in 2005, massacring 24 civilians including women, children and an elderly man confined to a wheelchair.

In response, hacktivists with Anonymous have uncovered gigabytes worth of correspondence from Sgt. Wuterich’s attorneys and affiliated parties.

Last month, a military tribunal finally finished their hearing on Sgt. Wuterich, more than six years after the notorious slaughter. Insiders reported before his sentencing that he was expected to receive only 90 days behind bars. When the case ended, he was sentenced to zero.

Anonymous members have hacked into the website for Sgt. Wuterich’s attorneys and have since defaced it with a detailed message explaining how the self-proclaimed “cold-blooded killer” became their latest target.

“As part of our ongoing efforts to expose the corruption of the court systems and the brutality of US imperialism, we want to bring attention to USMC SSgt Frank Wuterich who along with his squad murdered dozens of unarmed civilians during the Iraqi Occupation,” reads a message now on the homepage of his attorney’s website. “Can you believe this scumbag had his charges reduced to involuntary manslaughter and got away with only a pay cut?”

“Meanwhile,” adds the Anonymous-penned message, “Bradley Manning who was brave enough to risk his life and freedom to expose the truth about government corruption is threatened with life imprisonment.”

“When justice cannot be found within the confines of their crooked court systems, we must seek revenge on the streets and on the internet – and dealing out swift retaliation is something we are particularly good at. Worry not comrades, it’s time to deliver some epic ownage.”

In addition to defacing the website of his attorneys, nearly 3 gigabytes of email correspondence belonging to his attorneys have been leaked online.

Anonymous reveals Haditha massacre emails“And to add a few layers of icing to this delicious caek, we got the usual boatloads of embarrassing personal information. How do you think the world will react when they find out Neal Puckett and his marine buddies have been making crude jokes about the incident where marines have been caught on video pissing on dead bodies in Afghanistan? Or that he regularly corresponds with and receives funding from former marine Don Greenlaw who runs the racist blog http://snooper.wordpress.com? We believe it is time to release all of their private information and court evidence to the world and conduct a People’s trial of our own,” writes Anonymous

The announcement this afternoon comes only hours after Anonymous operatives posted a recorded phone message that they intercepted from the FBI and Scotland Yard. Hours later, The Associated Press reports that the FBI confirmed the interception and says it is going after the parties responsible.

 

SOURCE:  http://rt.com/usa/news/anonymous-time-wuterich-attorneys-463/

Doomed Vessels: Olympic and Titanic

Doomed Vessels: Olympic and Titanic

“The perfunctory trials of the Titanic, a pale imitation of the Olympic’s, were followed by an outbreak of fire in bunker number ten. It could have been dealt with at Southampton, with all a great port’s fire-fighting facilities and without affecting sailing time; instead, an extra twelve firemen were specially signed on to deal with it at sea. The blaze, . . . was concealed from [Captain Maurice Harvey] Clarke, the Board of Trade inspector. Why did Smith not have the fire put out as soon as possible? Why did he hide it? Come to that, why did his ship consistently show a slight list to port in a calm sea before the collision, as noted by several aboard? Was there some undeclared damage to account for this—a leak in the weakened stern, for example? Why after the collision did Smith run the engines slow ahead for some minutes, as attested by witnesses, a move which would have exacerbated the flooding the forward compartments? Why was counter- flooding not attempted as a means of keeping the ship on an even keel for longer? Why did Dr. [Robert D.] Ballard find a bulkhead not on his plan of the Titanic when exploring the wreck? . . .

Neither Dr. Ballard nor anyone else who has visited the wreck for pictorial or plundering purposes has produced a single object or photograph of anything showing the name “Titanic”—except on the bow and on one luggage–tag. The name is shown on nothing else both built into the ship and recovered or recorded so far. We found this sufficiently remarkable to invite every likely source to settle the matter once and for all by furnishing proof that the wreck was the Titanic. Reactions ranged from amusement via irritation to ridicule and shock that anyone would raise such a question.

Our difficulty was that a substitution, far-fetched or no, looked like a promising explanation for so many puzzles [the author inferring that White Star’s severely damaged Olympic was marginally repaired and sent to sea as the “Titanic;” that the real Titanic, renamed “Olympic,” went on to be used in World War I; and that J. P. Morgan benefited from the wreck] . . . .

But in terms of interest and importance, J. P. Morgan, the real owner of the ill-fated ship, is the outstanding absentee, topping the unusually lengthy list of fifty-five passengers known to have cancelled their bookings at the eleventh hour [including Morgan’s business partner and the outgoing Ambassador to Paris Robert Bacon, American steel baron Henry C. Frick, railroad and shipping tycoon George W. Vanderbilt; America’s chocolate king Milton Hershey, New York finance magnate Horace J. Harding and Rev. J. Stuart Holden, rector of St. Paul’s Anglican Cathedral in London]. He was too ill to sail on the world’s most lavish liner, but well enough to reunite with his mistress in Aix-les-Bains, where he was found ‘in excellent health’ by a reporter ‘just after the ship went down.’ Asked about the disaster, he ‘indicated extreme distress.’ He had arrived at the French resort after a Nile cruise and visits to Rome and Florence [having conferred with his masters in the Vatican and Borgo Santo Spirito]; the news confirming the disaster broke on his seventy-fifth birthday, 17 April [imparting to this murderous, financial tyrant a most enjoyable birthday!]. Fortunately a large part of his art collection, kept in Europe to avoid American import duty (happily eased just as Britain introduced death duties), happened to miss the ship ‘because of last-minute hold-ups in crating.’ The ultimate owner of the lost ship was thus twice blessed: to him that hath shall be given.” {3}

Robin Gardiner & Dan van der Vat, 1995 English Maritime Historians The Titanic Conspiracy

“House Party At the Harcourts’ Nuneham Park, 1907

Seated in the center is King Edward VII (1901-1910), the Black Pope’s most
powerful Freemason over his British Empire. Standing on the stairs, fourth
from the top, is John P. Morgan, the Black Pope’s most powerful Freemason in
his “Holy Roman” Fourteenth Amendment American Empire. Both men were
beholden to the dictation of the Company, English Jesuit Bernard Vaughan being
one of several. The King and Morgan were intimate friends and mutually
ruthless; Edward (while the Prince of Wales), covering for the murders of artist
Walter Sickert (alias “Jack the Ripper”); and Morgan, having caused the four
major US financial crises from 1873 to 1893. In 1907 both men, in ruling their
national banking empires, caused America’s greatest financial panic leading to
the secret drafting of the Federal Reserve Act at Georgia’s Jekyll Island by
Morgan agent Henry P. Davison. Aware of the conspiracy to monopolize the
nation’s credit into the hand of James Cardinal Gibbons’ Morgan-ruled empire,
Jewish Freemason John Jacob Astor and others resisted the plot. The remedy
was to send Astor to his grave on the Titanic (or possibly the damaged Olympic),
the ensuing American and British investigations to serve as mere cover-ups.
Neither Edward VII nor Morgan lived to see the creation of the Order’s Federal
Reserve Bank, which, with the Pope’s Masonic Bank of England, financed WWI.

Morgan: American Financier, Jean Strouse, (New York: Random House, 1999).
“ ‘Why was the true role of J. Pierpont Morgan, the banker and tycoon who was the real owner of the Titanic, covered up at the American inquiry? How did the Attorney-General [Sir Rufus Isaacs], who dominated the British inquiry, get away with insider-trading in shares of the Marconi Company at the very moment its value was boosted by the key role of wireless in the rescue?’ . . . Were two of the surviving crewman who were on watch at or near the bridge of the Titanic when she struck her iceberg bribed by White Star to keep their mouths shut, both at the inquiries and long afterwards? What guilty secret did they share? Did the officer of the watch ignore three earlier warnings of ice from the crow’s nest?’ . . .

‘Why did Captain Smith accelerate into an exceptionally large and southerly ice field of which he had been warned repeatedly, both before and during his last voyage?’

 

See More ….

TITANIC: Sunk To Pave Way For Federal Reserve Approval

One Ruling Bloodline

One Ruling Bloodline

The German Philosopher Johann Von Goethe, once said, there are none more hopelessly enslaved, than those who falsely believe they are free.

But few who hear the words realize that they are the ones to whom Goethe was referring for the reality is that every person in the civilized world is enslaved from childhood. They are enslaved in a prison without walls or bars and so few ever even realize it but all are enslaved none the less. And what the people of the world are enslaved to, is a system of perpetual self generating debt that is created for them wholly by design by private international banking interests, and the people are taught from an early age to just accept this debt, because this is ‘just the way things are’ but the real reality is that it is not just the way things are, but more the way things have been designed and all one has to do is glance around them at the state of the world today to realise that though this is the way things current are, it is most definitely not the way things should be.

The most powerful and useful tool a person can ever gain in their life is knowledge for with knowledge comes wisdom and a deeper understanding and real truth can be exhilarating because real truth will set you free.

Now whether you believe in the Illuminati or not, whether you will take the time to listen to so called conspiracy theories or not, there are some things that should be clearly understood by all and these are not conspiracy theories by any stretch of the imagination, they are well documented, quite traceable and very provable facts and these facts are as follows.

There is one ruling bloodline that exists on this earth. This ruling Bloodline is very old. It is the same bloodline that has always ruled the earth ever since the days of ancient Egypt and it is very pervasive. For example: many people think that anyone can get to be President of the United States, but the reality is, that all US presidents have been freemasons, a large number of them are in fact related, and that their lineage can be traced back to European Monarchy and in particular to the line of William of Orange. This elite Bloodline can actually be traced back a good deal further than of William of Orange and can even back as far as the royalty of ancient Egypt. It is this very same bloodline that has ruled the earth ever since and to which the british Monarchy and the current US president can both be ultimately traced. Many people may surprised to learn That US President George W Bush is in fact the 13th cousin of Queen Elizabeth the second, the current British Monarch.

Reverence for the royal bloodline and worship of Amen Ra is still carried out in the world today though it is veiled and secretive but the symbolism remains true, as always, hidden in plain view. Adherence to such traditions is why each of the 3 city states of London, Vatican and the District of Columbia all have their own obelisks. The London Obelisk is also accompanied by 2 sphinx wrought in the image of Thutmoses indicating that it is in london that the royal bloodline actually resides. The fact that out of all the Pharo’s to choose from, the London sphinx depicts Thustmoses, is actually very telling indeed for a number of reasons but that is another tale.
The British Monarchy is steeped in ancient traditions and symbolisim and they do not attempt to hide these connections, they just dont mention them or answer questions about them, but the signs and symbols are right there for discerning eyes to clearly see, again and as always, hidden in plain view. Just a look at the Royal Coat of Arms, the Royal Regalia and the Coronation Throne clearly demonstrates these connections. The evidence linking that these rulers to the one bloodline is does exist and all the information to verify these claims is available within the public domain. It is up to each of you to connect the dots yourself.

More importantly however is the fact that Over the last 200 odd years there has devoloped behind this ruling bloodline, another elite class, somewhat similar to a priesthood, that remains hidden in the shadows. This shadowy priesthood, is the money changers. The international banking elite, consisting of 13 very influential families and it is this shadowy elite who ultimately controls things from behind the scenes. This control is achieved through covert manipulation of the global money systems, and maintained through an intricate web of interconnected secret societies, through which control over the flow of all money, all resources, all food, and most importantly, all information, through manipulation of the worlds educational institutions and corporate media, is also achieved. Many of these smaller secret societies, are completely oblivious to the existence of the others, but all lead back to a round table of six, and ultimately, to just one at the very top, that is populated by a virtual handful of individuals. It is this handful of very powerful men that controls all the other societies, and through them the heartbeat of the entire world.

The society that sits at the very top, was founded on Knights Templar traditions in Bavaria in 1776 by a man called Adam Weishaupt, and this is the order of the illuminati. The man who commissioned Weishaupt for the task was Mayer Amschel Rothschild, and it was done in order to carry out a plan conceived by Rothschild and the heads of 12 other families at a secret meeting that took place in 1773. These families included the Warburgs, the Schiffs and the Oppenheimers. The Illuminati has since become the most powerful society in the world, and in the last 230 years, it has been instrumental in helping the Rothschild family accumulate over one half of the worlds total wealth, at the cost of quite literally, millions of innocent lives. The horded wealth of this one family alone, could comfortably feed, clothe, and house, every man, woman, and child on earth. And this just one of the 13 illuminati families.

The goal of the illuminati has always been a simple one and that is to achieve, by whatever means possible, total ownership and control, over no less than every resource, every government, every rock, every drop of water, every blade of grass,and every living creature, both human, and non human, in the entire world and since its inception, for over 230 years, the order of the illuminati has been tirelessly, relentlessly, and unfalteringly, steering its members towards the achievement of that one ultimate goal. Through secrecy, they have so far been extremely successful in their endeavors, in fact so much so, that we are, right now, living in the time when they intend to see this long spanned work come to fruition. The situation we are witnessing in our world, right now, is in fact the final endgame of the illuminati. This is their big grab for ultimate power and mass de-population.

Some people claim that the Illuminati is a myth and that what is really to blame are oganizations such as zionism but I assure you that such is not the case. It goes far deeper than Zionism and such people have simply limited the scope of their vision. They have locked to to an anwser that supports their beliefs and have refused to delve any deeper. They are not seeing the Bigger picture. Greek Philosopher Socrates once said that true wisdom is knowing how little we actually know and he was absolutely correct and this is why is important to keep an open mind and allow your beliefs to be flexible enough to change as new knowledge is acquired. And it is important to listen to all the information and not just that which reinforces your beliefs because this conspiracy goes very deep and Zionism and the jewish influence over the money system is merely one layer of it – and it goes still deeper than even the illuminati. Those whom we know as the illuminati are merely the shadowy controllers.

The plan that is unfolding in the world today is indeed an old one, and it is a plan that is very complex, but not so with the system of control that is in place to blind the people to its existence. This system of control just appears to be complex, but in reality, it isn’t. In reality, its very simple, and very fragile, however it is its apparent complexity, that has kept it so well veiled, and it has also been kept very well hidden by constructing a conspiracy culture to breed around it, and by then promoting an air of endless ridicule towards such concepts. Indeed, the creation and proliferation of such a culture, and the promotion of constant ridicule towards it, has been one of the illuminati’s most valuable assets in obscuring the reality of the society’s existence.

The entire Illuminati system is today operated by the crown, and what is the crown exactly? Well contrary to popular belief the crown does not refer to the Royal family or to the british monarchy but to the Inner city of London which, in actual fact, is a privately owned corporation that functions as a completely seperate sovereign state, outside the Jurisdiction of Englnd, the same as its two sister city states of Vatican and Washingtons District of Columbia, all of which combine to form the Empire of the three cities. Most people are completely unaware that when they swear alliegence to the crown they are actually swearing alliegence to this a private Corporate Empire owned by the the 13 Illuminati families. These are the same private individuals who also indirectly own and operate the world bank – and what does the world bank do exactly? Well apart from other things, like control global oil prices, it lends money to whole countries by supplying each countries Federal Reserve Bank and then it collects interest on these loans which is paid by taxing the the labor of the people of each country.

Now let me just run that by you again so you clearly understand how this really works.

If you live in a country that has a federal reserve bank, then the world bank, a privately run company that is able to legally create money from thin air, is who supplies your country with money, at interest, and you the individual is required to pay a tax on your labor to pay off the interest on the governments loan from this private bank. Many people are duped into believing that their taxes pay for infrastructure and without taxes their would be no roads or schools and the country would fall apart, but this is completely untrue. The Government has the legal right to coin its own money and control its value but it does not, it borrows money from a private bank and uses this bank loan to pay for infrastructure and you are taxed in order to pay of the interest on the loan, interest, which from a business perspective, is pure profit for the international banksters.

How ever you choose to look at it one thing must be very clearly understood and that is that each person in the western world who has a job, is forced every year, to give away approximately 3 months worth of wages in taxes and that tax money goes directly into the pockets of the private individuals who own and run the world bank.

Its one big, privately run scam and if you ever allow yourself to be microchipped and cash money is abolished altogether, which is their plan, then all bills and all taxes will be automatically removed from your account when they are due, whether you actually owe the money or not, and if you complain about the system, well they can simply turn off your chip. Since all commerce will center around the chip, you will not be able to buy food, or pay rent or do anything and there will be absolutely nothing whatsover that you can do about it. And that is their goal – to limit the size of the population on earth and microchip those that are left. Then its game set and match and total control of the world and everyone in it will be in the hands of an international cartel of criminal banksters.
This whole scam is being planned and carried out very methodically. It is these people and their minions and puppets who attend such gatherings as bilderberg meetings and the Bohemian Grove summer festival and who still adhere closely to the schools of ancient mystery which many such as the late Bill Cooper have referred to as the Ancient Mystery Religion however it is more a mechanism of control designed to reach an ultimate goal rather than a religion.

Though steeped in ritual and what many would term ‘black magic’, It is simply a system, the illuminati system and though its workings seem complex to the layman, In reality its quite simple, and its also very easy to see, once one has acquired the correct manner of looking at things. And there is definite purpose and reason in the ritualistic nature of this system, in its use of numerology, symbolism and ritual, and all that is needed to realize this is a deeper understanding of the true nature of the Universe and how we are all connected to it however this film directs its focus on the system itself and the key to this system functioning, which is through covert control of the money supply by very few people.

It is crucial that people become aware of this because the methods by which society could free itself from this system of control are also very simple, once a person has gained an understanding of the true realities of this world we live in – and this is not as difficult a task as you may at first think, because due to its complexities, the illusion the elite have created, that most perceive as reality, is a very fragile one.

It is fragile because it is not reality.

The reality is that the world does not have to be this way at all, it does not have to be heading in the direction it is heading, people do not have to live in a never ending sea of self generating debt, wars do not have to be fought and children do not have to starve, and dont think people starve because the world is over populated. Dont believe what the Televisions tells you, the world isnt over populated at all. In fact lets look at it realistically with a simple comparison of population versus land mass, and we can do a rough estimate and formulate a quick hypothetical to demonstrate this very easily.

There are approximately 6 billion people in the world and there is 2.97 million square miles of land in the Island continent of Australia. 2.97 million square miles breaks down to 1 billion, 900 million, 800,000 acres which then converts down to 7,603,200,000 quarter acre blocks of land. So we could hypothetically give every person in the world a quarter acre block of land and they would all fit into an area the size of australia, each would have enough land that they could all have gardens and grow a substantial supply of their own food, and we would still have 1,603,200,000 quarter acre blocks, or an area roughly half the size of queensland left over – plus the entire rest of the world. Now just pause to let that sink in to your brain for a second. ALL the people, thats every man woman and child on earth would comfortably fit inside australia, each individual person could have a quarter acre block of land and we would still have half of queensland and the entire rest of the planet left totally unoccupied.

The world is not over populated at all. Its just very badly managed and and you need have absolutely no doubt whatsoever that this bad management is intentional, and it is methodical. It would however, be very simple to fix things and all that is required is for people to wake up to how much they are being lied to and how much they are being scammed – and this goes for everyone.

People really need to gain an understand of how this system actually works because this bad management is crippling the world and it is crippling the people. The methods that are used to do this become truly transparent once a person has gained a clear enough vision to see it and people really do need to open their eyes to see it right now because now that the world has been made smaller and now that all resources have been discovered and there are no frontiers left to conquer, the criminal elite intend to carry out a mass depoplulation of this world and their plan to do this is well underway. They are doing it in the middle east with war, in countries such as Africa through starvation and now in western countries through water additives, aerial spraying and through the introduction of toxic and nutrient deficient GM foods. This is to very soon be taken to the next level with the Global Implementation of Codex Alimentarius, an insidious set of food guidelines that are due to come into effect world wide on dec 31st 2009. But people are now beginning to wake and realize that all is not right and they are beginning to speak out. The police need to understand this situation and take action to address these matters as well, and this is very important and there is no reason the Police should act against the people who are waking up and speaking out about this corrupt system, for the police are also being scammed, just as badly and in some ways even worse than everyone else. Worse because it is the Police who are being coerced and tricked into defending this elitist corruption by puppet govts put in place by the banksters who coerce these officers into compliance by applying creative names to such public awakenings such as ‘social unrest’ or ‘civil disobedience’ and by instilling a robot like adherence to authority within the minds of police officers rather than a stong set of moral values.

The police in these cases should stand by the people they are sworn to protect, not blindly follow instructions given to them by the criminal elites. The police need to realize that they too are the people and they are being stolen from and used as well and the way to beat this system is for the people, the police and everybody else is to simply stop agreeing with it – and the also the politicians who bow to these corrupt money cartels and enact these ridicluous pieces of legislation. These Politicians, need to think seriously about what they are doing. They need to realise that these money cartels dont care about them or their families, these politicians have children and grandchildren who are also going to have to live in this world that is being created and dont kid yourself that there is a politician in a position of power who isnt a puppet. All are puppets of the money cartels without exception. These people may well have been voted into power but the voting process is simply theater for the masses, to promote the illusion of peoples choice. The people may vote for one particular candidate over another, but they do not get to actually decide who these candidates will be to begin with.
The people of the world need to realize their own potential and wake up from the dream they are living in. Forget what you are told and trained to you by the TV because its a lie. TV is there to train people what to think and how to act. End of list. It is nothing more than a tool of propaganda that has successfully brainwashed 95% of the western world by feeding people manufactured news, disinformation and by giving people an utterly false perception of the the world and of their relationship to each other. Turn your TV off and leave it off, after even a month of no TV, you will be surprised at how much better and healthier you feel.

It needs to be clearly understood by people everywhere that the elite only have the power over the people that the people themselves grant to them, so stop giving it to them. Stop doing what the TV tells you to do and stop complying with the system. Understand that there truly is no division among the people of the world no matter who they are or where they are from. We are all people and we are all one. It is through the constantly promoted illusion of division that the system is able to function but in order for it to do so, it needs public compliance. Stop complying and you will shut the system down. You will shut it down completely because if people stop complying, it will simply implode. It will collapse like a house of cards. And all it would take for this to occur, is global awareness of how it really works.

We have reached a turning point in history and the veil of secrecy that has always surrounded the illuminati system is now at last being lifted. Now is the time for the people of the world to look after each other, and not the system. It really is that simple, and the world is almost on the verge of that happening now, because a new awareness is growing among the people. More and more are waking up every day, and they are spreading the word, as we all should do as often and as loudly as we can, because the masses who are still sleeping really must be woken up to what is occurring, there is quite literally nothing more important than this issue and this plan goes even deeper than the International money Cartels. There truly are deep dark forces at work controlling things here but it is through the maniplulation of the money system that global control is maintained and it is that system that must first be addressed
Its all very well for us to all talk about this stuff and to continue learning and gathering more information about it, but the time for merely gathering information is now passed. What is needed now is action, and it is needed very quickly because the prison door is swinging shut.

Please understand that these people plan on depopulating at least 80% of the world and that most likely includes you. This is not a joke and it is not some wild conspiracy theory. It is the absolute truth and this matter seriously needs to be addressed. All the information on how they intend to do this is available in the public domain though of course you are not hearing it reported by the mainstream media because the money cartels own the mainstream media.

A great deal of information regarding this is posted on my youtube channel and I highy reccommend that you view it and distribute it to as many people as you are able, because the time for talk really is over. What is truly needed at this time is for the good people of the world to act and to act now. The key is in love and unity among all of mankind because it matters not who you are, what country you are in or where you are from, it makes no difference whether you are black or white or christian, or muslim, or jew, it makes no difference at all what your beliefs are, because the prison that is being constructed affects every one of us equally.

The world that we are allowing to be created for our childrn to live in is a world that will not be worth living in. and if we just allow the situation to continue along its current path then we are condemning our decendents to hell on earth, but we are many and they are few and it simply must not be allowed to occur.

It is time for the people of the world to stop and realise that the divisions that supposedly exists amongst us are an illusion. There is no division. Its time for everyone to understand the truth of this. Its time to approach the world and each other in a state of love rather than a state of fear. Its time for you to tap into the source and realize your own potential and its time for us all to collectively stand together and address the root cause of the problem. And all of you need to spread this information, its very important that you do. Burn DVD’s and hand them out to people. Bring the conversation up at every opportunity. This issue is too important to ignore and if your not part of the solution then your part of the problem, theres simply no middle ground.

Bring all the truth factions of the world together under one banner, the banner of human unity. Set aside your differences and work the finer details out later. Regardless of who or what is the ultimate intelligence behind this plan for global control, everyone needs to understand clearly that the Fascist New World Order that is being introduced and the mass depopulation that is occurring across the globe is being implemented by the criminal banking elite.

The money system is the head of the snake.

Cut the head off the snake and the rest of it will whither and die.

The time for talk is over and the time has come for action. It is now time for the people of the world to stop complying with the system.

Everyone.

Stop complying with it and you will shut it down. And the best form of non compliance is love. Approach every issue with love. Rather than obediently following orders given to you by a commanding officer, and rather than doing what is right for you personally. Do what is actually right. And if a leader wants to send you to war, say no sir, I wont murder other peoples children for you any more. You’ll have to go and do it yourself. You will be called coward by the military but such is not the case. It is much easier to fight for principles than to live up to them and it takes a far braver man to stand up for what is right and spit in the face of authority than it does to blindly follow orders due to fear of the consequences. Understand that we are all one and the key to real change and unity in this world lies with love.

There need be no violence, no guns, no banners, no slogans, no group think, just a united act of global non compliance. Non compliance for any thing in conflict with the directives out lined in the universal declaration of human rights would be a good start. Simply stop giving these people the power to control you. Understand that the only power they have is the power the people themselves grant to them. Understand that injustice towards one is injustice towards all. Injustice against him, is injustice against you and there should be no grey area in you mind in regard to that. Everyone needs to stop going along with it and it needs to be done immediately. Its time to cut the head off the snake.

The Revolution is not coming.

The Revolution is now.

 

 

The Heart’s Code: Tapping the Wisdom and Power of Our Heart Energy

The Heart’s Code: Tapping the Wisdom and Power of Our Heart Energy

Book Description

Publication Date: April 6, 1999

A fascinating synthesis of ancient wisdom, modern medicine, scientific research, and personal experiences that proves that the human heart, not the brain, holds the secrets that link body, mind, and spirit.You know that the heart loves and feels, but did you know that the heart also thinks, remembers, communicates with other hearts, helps regulate immunity, and contains stored information that continually pulses through your body? In The Heart’s Code, Dr. Paul Pearsall explains the theory and science behind energy cardiology, the emerging field that is uncovering one of the most significant medical, social, and spiritual discoveries of our time: The heart is more than just a pump; it conducts the cellular symphony that is the very essence of our being.

Full of amazing anecdotes and data, The Heart’s Code presents the latest research on cellular memory and the power of the heart’s energy and explores what these breakthroughs mean about how we should live our lives. By unlocking the heart’s code we can discover new ways of understanding human healing and consciousness and create a new model for living that leads to better health, happiness, and self-knowledge.

Pearsall states that we have been too brain-focused and have not listened to all the heart has to offer. We should learn to be patient, connected with others, pleasant, humble, and gentle, Pearsall says, and for those who want to find out whether they are cardiosensitive, he presents a personal inventory. Although hardly a work of completely hard science, Pearsall’s effort has much to offer thoughtful readers. William Beatty –This text refers to an out of print or unavailable edition of this title.

The Age of Treason: 1958 Book Exposes Chemical Attack on Humanity

The Age of Treason: 1958 Book Exposes Chemical Attack on Humanity

Dr. R. Swinburne Clymer was in many ways a man ahead of his time, and most certainly controversial. He was attacked by the medical establishment for connecting diet with disease and mental health in his 1917 book Dietetics. Dr. Clymer received his medical degree in 1902 from the College of Medicine and Surgery in Chicago and began practicing Osteopathy. Accusations of fraud surround Dr. Clymer’s career, including this 1923 edition of the Journal of the American Medical Association which claims that, “Our records fail to show that this man was ever regularly graduated by any reputable medical college.” What Clymer had to say more than likely had something to do with the denouncement that he received from the medical establishment.

Though Dr. Clymer may be surrounded with controversy, his 1958 book Your Health and Sanity in the Age of Treason exposes toxic food additives and fluoride with documentation – the majority of which are mainstream scientific studies – that can be verified many times over. What makes this book unique is the fact that Dr. Clymer was one of the first to point out that statements by the elite indicated that these toxins were to be deliberately released “…for the mental deterioration and moral debasement of the mass…”

Dr. Clymer introduces readers with a stark warning for the future

The book is appropriately subtitled; “Food and Liquids Used as a Medium in Deliberately and Carefully Planned Methods Developed by the Vicious Element of Humanity, for the Mental Deterioration and Moral Debasement of the Mass, as a Means Toward Their Enslavement.”

Dr. Clymer introduces readers with a stark warning for the future, writing, “Imagine yourself if you can, becoming conscious that you are gradually losing your manhood; that your mind is rapidly deteriorating so that you are no longer capable of thinking clearly; unable to plan your future actions. Your resistance is becoming so weakened that you are no longer master of yourself. In short, you are rapidly developing into a moron, a robot, a zombie, readily subject to the dictates of others…”

Bertrand Russell’s 1953 book The Impact of Science on Society is cited by Clymer as one example of the elite’s desire to dominate the masses. Russell stated that under scientific tyranny, “Diet, injections, and injunctions will combine, from a very early age, to produce the sort of character and the sort of beliefs that the authorities consider desirable, and any serious criticism of the powers that be will become psychologically impossible.”

Diethylstilbestrol – Endocrine Disruption

Dr. Clymer identified the synthetic estrogen Diethylstilbestrol – developed in 1938 – as a means to achieve the aims of the elite. Clymer explains that some of the toxic additives discussed in the book may not have been employed for the express purpose outlined by the elite, but “…they served their purpose admirably…” Dr. Clymer elaborates,

“The employment of Stilbestrol by the laity with absolutely no knowledge of the dangerous agent they are employing, in conditioning chickens and meats, is mass medication without license, with a dangerous toxic drug that may have universal disastrous results on all who eat such adulterated foods. This is especially true as it concerns children, youths, young women and men, resulting as it may, in their sterilization or cancer – something fervently hoped for by the enemies of mankind.”

Because Stilbestrol is a synthetic chemical, “…the natural protective activity of the bodily organs are ineffective in prohibiting harmful results. Natural Estrogen, on the other hand, is decomposed, and any of its possible harmful effects may be more or less made ineffective,” writes Dr. Clymer. Stilbestrol was used as a treatment for various types of cancer and menopausal symptoms, but as Dr. Clymer states, “Physicians versed in the use of Endocrines agree generally that Stilbestrol is a dangerous drug in all except experienced hands.”

Dr. E. Malcolm Stokes, in an article published in the Western Journal of Surgery, Obstetrics and Gynecology, September 1948, wrote: “Single large doses of [natural] estrogen substances are quickly excreted… long continued, repeated administration in relatively small doses [as in daily consumption of meats permeated with stilbestrol] may intensify tissue response to the hormone.”

Dr. Clymer warns that such chemicals are to feminize men,

“Every vigilant human being should be concerned with several important factors involved: The methods or means by which it is possible to change man’s characteristics as easily as the animal’s. Man is a warrior by nature, the protector of his family, and his own rights and privileges; an individual, a free man… A being who has wrought great things and who, if not interfered with, will do even greater things. This being is to be turned into a lesser female; unable, even unwilling, to defend himself, much less his family or country; becoming a slave…”

Dr. Clymer’s concerns over Stilbestrol have been vindicated over time, as the chemical has been phased out of use as a growth hormone in the late 1970′s due to concerns over cancer. Additionally, in 1971 the FDA advised physicians to stop prescribing Stilbestrol to pregnant women due to high cancer risk. The drug is no longer being manufactured as of 1997.

Flashforward – Bisphenol A

Today there are continuing concerns as substantial levels of Bisphenol A (BPA) have been found in a large percentage of the western world’s population. Like Diethylstilbestrol, BPA is a synthetic estrogen with similar to identical effects on the human body. BPA is perhaps a much larger threat due to the fact that unlike Stilbestrol – which was primarily consumed in meats – it is found in many household products, including the food we eat. A recent study from the Canadian Health Measures Survey found that over 90% of Canadians have detectable concentrations of BPA in their urine. Studies conducted by the CDC found Bisphenol A in the urine of 95% of adults sampled in 1988–1994 and in 93% of children and adults tested in 2003–04. Other studies have shown that Bisphenol A causes feminization of males and reduced sperm count.

As Dr. Frederick vom Saal states in this local Fox News report, levels of BPA below a trillionth of a gram have been found to alter cell function and growth. Additionally, BPA was found to feed cancer cell growth and impact the reproductive system of rats.

Fluoride

Yet another danger to human health and well being identified by Dr. Clymer is Sodium Fluoride. Fluoride, we are told, is placed in the water supply to help protect our teeth from decay. Today some are proposing that fluoride and other forms of mass medication will serve as a means of “Cognitive Enhancement.” In his expose of fluoride, Dr. Clymer quotes Rene M. Vale, a former Communist and party worker in her book Red Court, published in 1952. She writes,

“In regions of the country where resistance was most apt to develop we saw to it that virus diseases struck, and when antibiotics threatened our program, we devised other means of vitiating the populace. Fluoridation of drinking water was found to be about the most successful…”

Dr. Charles E. Perkins, who Dr. R. Swinburne Clymer was in personal contact with, was, “… sent by the United States Government to help take charge of the I. G. Farben chemical plants in Germany at the end of the second world war. What follows are quotations from a letter which Mr. Perkins wrote to the Lee Foundation for Nutritional Research, Milwaukee, Wisconsin, dated October 2, 1954.”

Mr. Perkins letter states,

“The German chemists worked out a very ingenious and far-reaching plan of mass control which was submitted to and adopted by the German General Staff. This plan was to control the population in any given area through mass medication of drinking water supplies. By this method they could control the population of whole areas, reduce population by water medication that would produce sterility in women and so on. In this scheme of mass control, sodium fluoride occupied a prominent place.

“We are told by the ideologists who are advocating the fluorination of water supplies in this country that their purpose is to reduce the incidence of tooth decay in children, and it is the plausibility of this excuse, plus the prominence of those who are responsible for the present spread of artificial water fluoridation in this country.

“However – and I want to make this very definite and very positive – the real reason behind fluorination is not to benefit children’s teeth. If this were the real reason there are many ways in which it could be done that are much easier, cheaper and far more effective. The real purpose behind water fluoridation is to reduce the resistance of the masses to domination and control and loss of liberty…

“I was told of this entire scheme by a German chemist who was an official of the great Farben chemical industries and was also prominent in the Nazi movement at the time…”

Dr. Clymer additionally cites a 1956 letter written by the then New York Water Commissioner Arthur C. Ford (available in full here). In the letter, Ford speaks out openly against fluorides as “…extremely toxic substances…” Ford writes,

“We are aware that the fluorides are extremely toxic substances, and evidence exists to show that even at the recommended level of one part per million of fluoride in drinking water, people in fluoridated communities have been harmed.

We know of reputable, independent medical authorities throughout the United States and in the local area who have found evidence of fluoride damage to persons living in fluoridated communities. These medical authorities disagree with the fluoride hypothesis, and they have raised grave questions with respect to the safety of the procedure for an entire population which includes the young, the old, the susceptible and the infirm as well as the healthy.

Fluoride, besides being a toxic substance, is not all excreted when taken into the system, a significant percentage remaining cumulatively. Fluoridation of the drinking water at any level of concentration is a very indiscriminate procedure, since children drink widely varying amounts of water…”

Australian television recently reported on fluoride’s harmful impact on human health and efforts to expand water fluoridation on the continent.

As sperm counts continue to fall world-wide and GMO crops escape into the environment, exposure to untold numbers of environmental toxins like BPA is a continuing threat. In the United States, several EPA scientists have denounced fluoridation, calling for a national moratorium on the fluoridation of water supplies. Citizens in Wichita Kansas are becoming active in raising awareness of fluoride, drawing attacks from the local media. Awareness of these issues is essential not just for those living today, but for future generations. Open admissions of the intent to chemically alter humanity should leave us with nothing but a sense of duty to warn others of the grave threat that we face.

http://www.oldthinkernews.com/?p=11

The Holographic Universe

The Holographic Universe

Book Description
Publication Date: May 6, 1992
Today nearly everyone is familiar with holograms, three-dimensional images projected into space with the aid of a laser. Now, two of the world’s most eminent thinkers — University of London physicists David Bohm, a former protege of Einstein’s and one of the world’s most respected quantum physicists, and Stanford neurophysiologist Karl Pribram, one of the architects of our modern understanding of the brain — believe that the universe itself may be a giant hologram, quite literally a kind of image or construct created, at least in part, by the human mind. This remarkable new way of looking at the universe explains now only many of the unsolved puzzles of physics, but also such mysterious occurrences as telepathy, out-of-body and near death experiences, “lucid” dreams, and even religious and mystical experiences such as feelings of cosmic unity and miraculous healings.

List Price: $14.99

IBM and the Holocaust : The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation

List Price: $21.95
Price: $16.46 & eligible for FREE Super Saver Shipping on orders over $25. Details
Deal Price:
You Save: $5.49 (25%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 1 to 3 months.
Ships from and sold by Amazon.com. Gift-wrap available.
8 new from $13.00 29 used from $7.54
Kindle Book
Print Book
Feedback | Help | Expanded View | Close
Go to “IBM and the Holocaust : The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation” page
IBM and the Holocaust : The Strategic Allianc… (Paperback)
by Edwin Black
4.4 out of 5 stars (80)
Paperback $16.46
37 used & new from $7.54
Book sections
Front Cover
Copyright
Table of Contents
First Pages
Index
Back Cover
Surprise Me!
Search Inside This Book
Just so you know…

Front Cover
Your Browsing History
Page of
>
Customers Also Bought
Page of
Formats
Amazon Price New from Used from
Expand Collapse Kindle Edition $9.39 — —
Expand Collapse Hardcover — $8.50 $1.86
See # more hardcovers
Show fewer hardcovers
Expand Collapse Paperback $16.46 $13.00 $7.54
See # more paperbacks
Show fewer paperbacks
Expand Collapse Audio, CD, Audiobook $22.27 $15.00 $15.00
See # more audio books
Show fewer audio books
Book Description
Publication Date: April 20, 2008
Published to extraordinary praise, this provocative international bestseller details the story of IBM’s strategic alliance with Nazi Germany. IBM and the Holocaust provides a chilling investigation into corporate complicity, and the atrocities witnessed raise startling questions that throw IBM’s wartime ethics into serious doubt. Edwin Black’s monumental research exposes how IBM and its subsidiaries helped create enablling technologies for the Nazis, step-by-step, from the identification and cataloging programs of the 1930s to the selections of the 1940s.
Show More
Show Less
Frequently Bought Together
IBM and the Holocaust : The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation + Nazi Nexus: America’s Corporate Connections to Hitler’s Holocaust + War Against the Weak: Eugenics and America’s Campaign to Create a Master Race
Price For All Three: $46.49

Some of these items ship sooner than the others. Show details
Buy the selected items together

* This item: IBM and the Holocaust : The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation by Edwin Black Paperback $16.46

* Nazi Nexus: America’s Corporate Connections to Hitler’s Holocaust by Edwin Black Paperback $12.75

* War Against the Weak: Eugenics and America’s Campaign to Create a Master Race by Edwin Black Hardcover $17.28

Customers Who Bought This Item Also Bought
Page 1 of 20 (Start over)
Back

*
Nazi Nexus: America’s Corporate Connections to… by Edwin Black
4.1 out of 5 stars (9)
$12.75
*
War Against the Weak: Eugenics and America’s C… by Edwin Black
4.6 out of 5 stars (31)
$17.28
*
Internal Combustion: How Corporations and Governme… by Edwin Black
4.3 out of 5 stars (30)
$8.00
*
The Transfer Agreement–25th Anniversary Edition:… by Edwin Black
4.7 out of 5 stars (18)
$13.31
*
The Farhud: Roots of the Arab-Nazi Alliance in the… by Edwin Black
4.4 out of 5 stars (14)
$15.61

Next
Editorial Reviews
Amazon.com Review
Was IBM, “The Solutions Company,” partly responsible for the Final Solution? That’s the question raised by Edwin Black’s IBM and the Holocaust, the most controversial book on the subject since Daniel Jonah Goldhagen’s Hitler’s Willing Executioners. Black, a son of Holocaust survivors, is less tendentiously simplistic than Goldhagen, but his thesis is no less provocative: he argues that IBM founder Thomas Watson deserved the Merit Cross (Germany’s second-highest honor) awarded him by Hitler, his second-biggest customer on earth. “IBM, primarily through its German subsidiary, made Hitler’s program of Jewish destruction a technologic mission the company pursued with chilling success,” writes Black. “IBM had almost single-handedly brought modern warfare into the information age [and] virtually put the ‘blitz’ in the krieg.”

The crucial technology was a precursor to the computer, the IBM Hollerith punch card machine, which Black glimpsed on exhibit at the U.S. Holocaust Museum, inspiring his five-year, top-secret book project. The Hollerith was used to tabulate and alphabetize census data. Black says the Hollerith and its punch card data (“hole 3 signified homosexual … hole 8 designated a Jew”) was indispensable in rounding up prisoners, keeping the trains fully packed and on time, tallying the deaths, and organizing the entire war effort. Hitler’s regime was fantastically, suicidally chaotic; could IBM have been the cause of its sole competence: mass-murdering civilians? Better scholars than I must sift through and appraise Black’s mountainous evidence, but clearly the assessment is overdue.

The moral argument turns on one question: How much did IBM New York know about IBM Germany’s work, and when? Black documents a scary game of brinksmanship orchestrated by IBM chief Watson, who walked a fine line between enraging U.S. officials and infuriating Hitler. He shamefully delayed returning the Nazi medal until forced to–and when he did return it, the Nazis almost kicked IBM and its crucial machines out of Germany. (Hitler was prone to self-defeating decisions, as demonstrated in How Hitler Could Have Won World War II.)

Black has created a must-read work of history. But it’s also a fascinating business book examining the colliding influences of personality, morality, and cold strategic calculation. –Tim Appelo –This text refers to the Hardcover edition.
From Booklist
The publisher has ordered a print run of 100,000 copies, indicating that they expect high demand for this contentious expose. The author asserts that a collusion existed between IBM Corporation and the government of the Third Reich, wherein IBM supplied the technology enabling Nazi authorities to systematize their persecution of European Jews. Expect much discussion in the press and on the street about this very controversial book. Brad Hooper
Copyright © American Library Association. All rights reserved –This text refers to the Hardcover edition.
See all Editorial Reviews
Product Details

* Paperback: 560 pages
* Publisher: Dialog Press; 1 edition (April 20, 2008)
* Language: English
* ISBN-10: 0914153102
* ISBN-13: 978-0914153108
* Product Dimensions: 9.2 x 6 x 1.6 inches
* Shipping Weight: 1.8 pounds (View shipping rates and policies)
* Average Customer Review: 4.4 out of 5 stars See all reviews (80 customer reviews)
* Amazon Best Sellers Rank: #129,380 in Books (See Top 100 in Books)

Would you like to update product info, give feedback on images, or tell us about a lower price?

More About the Authors
Discover books, learn about writers, read author blogs, and more.
Edwin Black
Edwin Black
Edwin Black
Edwin Black

Customer Reviews
80 Reviews
5 star:
(52)
4 star:
(11)
3 star:
(12)
2 star:
(4)
1 star:
(1)

Average Customer Review
4.4 out of 5 stars (80 customer reviews)

Share your thoughts with other customers:
Create your own review
Most Helpful Customer Reviews

143 of 157 people found the following review helpful:
5.0 out of 5 stars Important Questions Unraised Before Now, March 16, 2001
By
Donald Mitchell “Jesus Loves You!” (Thanks for Providing My Reviews over 109,000 Helpful Votes Globally) – See all my reviews
(VINE VOICE) (HALL OF FAME REVIEWER) (TOP 100 REVIEWER)
This review is from: IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America’s Most Powerful Corporation (Hardcover)
This book is the most important new work on the Nazi era in the last two decades. The book is even more significant for the questions it raises about what the purpose of a corporation is and should be, what role companies and governments should play in directing cutting edge technology, and the danger that misuses of advanced information technology bring to individuals.

The core of the story is how a key IBM technology, the Hollerith-based card tabulating machines, became available for the Nazi war and Holocaust efforts. Although the details are murky (and may remain so), it is fairly clear that the use of this technology was sustained during the war years in part by shipments of customized (for each end user) tabulating cards from IBM in neutral countries for everything from blitzkriegs to slave camp scheduling to transportation to the death camps. There was not enough paper capacity to make the cards in Europe (that the Nazi and IBM records show were used), and there is no evidence that Nazis created substitutes for these essential supplies.

As Mr. Black warns, “This book will be profoundly uncomfortable to read.” I agree. My sleep will not be the same for some time after experiencing this powerful story.

Mr. Black makes an even stronger statement. “So if you intend to skim, or rely on selected sections, do not read the book at all.” I took him at his word, and did not even read the book quickly. I also arranged to read it in several sittings, so I could think about what I had read in between. I recommend that you do the same.

The reason for my recommendation is that your thinking will change very fundamentally through reading the book. Having read dozens of books by fine historians about the Nazi period, and knowing a great deal about the history of data processing, I assumed that there would be little new to the story here. But the title intrigued me. By the fourth time I saw the book, I could no longer resist it.

What I found inside the book surprised, shocked, and amazed me.

First, many authors claim that it was not clear in the United States that Jews were losing their lives in Europe during the Nazi years until just before the end of the war. This book documents many articles that appeared in the New York Times that certainly seemed to be saying that this systematic killing was going on from very near the time when it began. Anyone who ignored these reports just didn’t want to know.

Second, the book makes many connections between Thomas Watson, Sr. and Nazi Germany. Many things surprised me about this. One, he was there once or twice a year until just before World War II began. The horrible human abuses were probably observed first hand by him then. Two, he had friends who were victimized by the Nazis. Three, he accepted a very prestigious medal from Hitler in 1937 (which he returned in June 1940). Four, he spoke in favor of making U.S. policy pro-German until just before the United States entered World War II. Five, it appeared that he had a lot more concern about IBM’s profits and machines in Europe than about any people there.

Third, although I was very familiar with the improvements in industrial and transportation effectiveness in Germany during the Nazi years, I did not realize that IBM’s design of Hollerith machines for card tabulation was a breakthrough technology that enabled this progress.

Fourth, I had always been amazed that the Nazis had such detailed records of the geneologies of European Jews. What I did not realize was that much of this information was provided by Jewish citizens in government censuses, and was quickly processed into records used by oppressors on Hollerith machines leased from IBM or its subsidiaries.

In France, where the use of these machines was subverted by the Resistance, the percentage rate of Jewish deaths was one-third of what occurred in Holland where this technology was well applied. It is hard to avoid the feeling that millions of people died because these machines were available and kept supplied with parts and punch cards for the Nazis.

One cannot help but draw the comparison between this historical example and the companies and countries (including, apparently, the United States) that have more recently allowed critical nuclear, rocket, and satellite technology to become available to repressive regimes. It seems that by not asking questions about IBM and the Holocaust, we may be continuing to make many of the same mistakes today.

I salute the incredible imagination and back-breaking effort that went into assembling this astonishing set of documents and perspectives. I hope that many people will read the book, that scholars will look for more information to expand our understanding, and that the fundamental questions raised by this book will be debated wherever free people live.

Remember: Your freedom is only as good as that of the least free person, who is most vulnerable.

“Ask not for whom the bell tolls. It tolls for thee.”
Help other customers find the most helpful reviews
Was this review helpful to you? Yes No
Report abuse | Permalink
Comment Comment

38 of 42 people found the following review helpful:
5.0 out of 5 stars IBM and the Holocaust, December 7, 2006
By
Nancyrae Kjelgaard (Tallahassee, FL) – See all my reviews
(REAL NAME)
This review is from: IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation (Paperback)
I did not want to read this book.

My grandfather worked for International Time Recording (ITR) in Endicott, NY before IBM was formed and Mr. Watson came on board. My father’s first job, at the age of seventeen, was caretaker of the Watson Homestead. My family has had a hand in virtually every product that issued from the IBM manufacturing effort since its inception in 1924. I have deep affection for the company my family labored to build.

I approached “IBM and the Holocaust” with a high degree of skepticism. The book sat on my nightstand for two months before I opened it. Finally picked it up for the sake of completing my 14-book IBM historical reading cycle.

This book is astounding. It is impeccably researched, artfully written, highly detailed, painstakingly documented, remarkably objective and thoroughly engaging.

“IBM and the Holocaust” has finally exposed the undeniable truth: IBM became the world’s most powerful corporation largely because it assisted in identifying, cataloging and exterminating millions of innocent people for Hitler. The evil that lurks in IBM history was not exposed previously only because IBM management was smart enough and powerful enough to “hide its tracks” in Nuremburg. No investigator has ever dug deeper into IBM history than Edwin Black.

A close reading of the book makes it absolutely clear that Mr. Watson (IBM CEO) knew the exact purpose, goal and expected outcome of the IBM solution in Europe. The book details the fact that unlike previous IBM engagements for the Third Reich that were completed by Dehomag (IBM’s German subsidiary), the engagement in Romania (1941) was conducted directly under the management of IBM New York. That engagement resulted in the swift identification, transportation and extermination of hundreds of thousands of innocent Jews. All in the name of “IBM.”

As a result of reading “IBM and the Holocaust”, I no longer view Mr. Watson as the glamorous benevolent industrial icon depicted in hollywoood newsreels. Though the affectionate “shop talk” tossed through the air when I was young still captures my imagination, Mr. Watson is no longer the focus of my unqualified admiration.

Watson, for me, now stands beside Carnegie, Rockefeller, Vanderbilt, Mellon, Jeffrey Skilling, Kenneth Lay and all the other American Industrialists throughout history who had many fine qualities yet are outrageously flawed–so good yet so very, very bad.

This book is remarkable. Have since read “Internal Combustion”, Banking on Baghdad” and “War Against the Weak.”

Edwin Black is “the bomb.”

If you have an interest in history, corporations, corruption, good, bad, evil or fine nonfiction; you will appreciate the works of Edwin Black.

NancyRae Kjelgaard
Tallahassee, FL
December 7, 2006

Help other customers find the most helpful reviews
Was this review helpful to you? Yes No
Report abuse | Permalink
Comment Comment (1)

26 of 29 people found the following review helpful:
5.0 out of 5 stars Story from the Past and a Tech Warning for the Future, September 4, 2001
By
Linda Marinus (Dartmouth College, Hanover, NH) – See all my reviews
This review is from: IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America’s Most Powerful Corporation (Hardcover)
I just came upon this book this past week, but I have read research on the Holocaust for over 30 years and always wondered how the Nazis could be so efficient in rounding up people, how they could exactly know so much as they took over Poland and France, etc., etc., Now I think I know and the knowledge is most disturbing.
Reading this book made me stop and think about where technology is going today in our world where all the bits of information about everybody are carefully stored, collated, and applied to “appropriate” use. I think there is a warning from the book about having too much data about individuals. I for one will never answer census questions completely again, certainly not the petty questions that inquire into the specifics of my personal life.
A few months ago, I watched the HBO Movie Conspiracy which was an exact dramatization of the Wannesee Conference in 1942 in Berlin. The script was based on the sole transcript of that meeting found after the war and belonging to one of the attendees. As I was watching the movie and later when I poured over the actual transcript which I found on the net, I wondered, “How did they have such exact figures for each country and group? So exact that the numbers were down to the single digits. How did they find these people?” It puzzled me. In reading IBM and the Holocaust, I found my answer.
History has an ostentatous way of rationalizing what actually happened to fit current viewpoints that are acceptable to people and institutions. We don’t want to think that a company like IBM could be so dreadful for profit or that our Government refused to bomb camps or take in refugees when they knew horror was happening. There was a rationalization that there ” must have been other circumstances”, mitigating circumstances, and today simply bad historical recollection. It is much easier to go forward and forget and rationalize and look for “reasonable” solutions, that is, until it all happens again and we have to say once more, “but that simply couldn’t be possible.”
A n important and courageous book that every young person especially should read as the years pass and the witnesses of that time leave us.
http://www.amazon.com/IBM-Holocaust-Strategic-Alliance-Corporation/dp/0914153102/ref=sr_1_1?ie=UTF8&qid=1290211067&sr=8-1

Getting Out: Your Guide to Leaving America (Process Self-reliance Series)

Getting Out: Your Guide to Leaving America (Process Self-reliance Series)

Book Description

Series: Process Self-reliance Series | Publication Date: November 1, 2006

Had enough?Whether you find the government oppressive, the economy spiraling out of control, or if you simply want adventure, you’re not alone. In increasing numbers, the idea is talked about openly: Expatriate.

Over three hundred thousand Americans emigrate each year, and more than a million go to foreign lands for lengthy stays.

But picking up and moving to another country feels like a step into the void. Where to go? How to begin? What to do?

Volume 2 of the Process Self-Reliance Series, this smartly designed two-color guidebook walks you through the world of the expat: the reasons, the rules, the resources, and the tricks of the trade, along with compelling stories and expertise from expatriate Americans on every continent.

Getting Out shows you where you can most easily gain residence, citizenship, or work permits; where can you live for a fraction of the cost of where you’re living now; and what countries would be most compatible with your lifestyle, gender, age, or political beliefs.

So if you’ve had enough of what they’re selling here and want to take your life elsewhere—well, isn’t that the American way? At any rate, it’s not illegal. Not yet, anyway.

Had enough?

Whether you find the government oppressive, the economy spiraling out of control, or if you simply want adventure, you’re not alone. In increasing numbers, the idea is talked about openly: Expatriate.

Over three hundred thousand Americans emigrate each year, and more than a million go to foreign lands for lengthy stays.

But picking up and moving to another country feels like a step into the void. Where to go? How to begin? What to do?

Volume 2 of the Process Self-Reliance Series, this smartly designed two-color guidebook walks you through the world of the expat: the reasons, the rules, the resources, and the tricks of the trade, along with compelling stories and expertise from expatriate Americans on every continent.

Getting Out shows you where you can most easily gain residence, citizenship, or work permits; where can you live for a fraction of the cost of where you’re living now; and what countries would be most compatible with your lifestyle, gender, age, or political beliefs.

So if you’ve had enough of what they’re selling here and want to take your life elsewhere—well, isn’t that the American way? At any rate, it’s not illegal. Not yet, anyway.


Customers Viewing This Page May Be Interested in These Sponsored Links

(What’s this?)

  –
Learn, Live and Lead BIG Your source for on-line learning
  –
Find Leaving America on Facebook. Sign Up Free Now!

Editorial Reviews

From Publishers Weekly

Taking a decidedly pessimistic view of the current American moment, Ehrman’s well-designed, all-encompassing guidebook provides detailed instructions for fleeing “before America comes crashing down upon you.” Ehrman includes a large number of first-person stories from folks who did just that, starting new lives in China, Australia, Slovakia and Israel, among other destinations. The majority of these voices come from 20 to 30-year-olds, and some of the advice here skews to a younger sensibility, listing, for example, how each country prosecutes pot possession. However, there is valuable and comprehensive information here for a wide range of readers, including a globe-spanning country-by-country guide on how to immigrate-including Old Europe standbys as well as a number of countries in Latin America, Africa and Eastern Europe-with helpful sections on visa and residency requirements, acclimating to foreign culture and how to earn a living, as well as a handy list of online resources. Though the negative tone of the book might prove off-putting for readers planning an overseas move for reasons unrelated to politics, the wealth of information it carries-as well as its wide range of expatriate perspectives-will prove valuable. Illustrations.
Copyright © Reed Business Information, a division of Reed Elsevier Inc. All rights reserved.

About the Author

Mark Ehrman is a frequent traveler and freelance writer whose work regularly appears in the Los Angeles Times, Playboy, Travel and Leisure, and numerous travel magazines city guidebooks.


Product Details

    • Paperback: 320 pages
    • Publisher: Process (November 1, 2006)
    • Language: English
    • ISBN-10: 0976082276
    • ISBN-13: 978-0976082279
    • Product Dimensions: 8.9 x 5.9 x 0.9 inches
    • Shipping Weight: 1.2 pounds
    • Average Customer Review: 3.8 out of 5 stars  See all reviews (18 customer reviews)
    • Amazon Best Sellers Rank: #374,004 in Books (See Top 100 in Books)

More About the Author

Mark Ehrman

Biography

See www.gettingoutofamerica.com.or on facebook:

http://www.facebook.com/?ref=logo#!/?sk=2361831622

You can “like” the page at

http://www.facebook.com/pages/Getting-Out/365774971266?sk=info

twitter @getting_out


Customer Reviews

18 Reviews
5 star:  (8)
4 star:  (3)
3 star:  (4)
2 star:  (2)
1 star:  (1)
Average Customer Review
3.8 out of 5 stars (18 customer reviews)
Share your thoughts with other customers:
Most Helpful Customer Reviews

96 of 97 people found the following review helpful:
4.0 out of 5 stars A good place to start,January 24, 2007
By
Amazon Verified Purchase(What’s this?)
This review is from: Getting Out: Your Guide to Leaving America (Process Self-reliance Series) (Paperback)

The strength of this book is that it favors breadth rather than depth.

If you are thinking about leaving the US but don’t really know where you’d like to go, or if you have a destination in mind but don’t really know what you don’t know about emigration, this book is for you. Getting Out covers the top 50 destinations for US expats, with information about the quality of health care, cost and standard of living, and social permissiveness. Also included are brief accounts of the experiences of expats living around the world. There is also good general information about the different pathways available to the potential expat.

Reading it will definately leave you with more questions than answers, since any comprehensive emigration/immigration guide to all the countries in the world would fill a small library. Getting Out will give you the basics and point you in the right direction to find more in-depth information. You won’t find anything here that will help you decide to settle in one country over another, but it will help you either narrow your list or give you reason to consider some place you otherwise would not have.

Help other customers find the most helpful reviews
Was this review helpful to you? Yes No

82 of 84 people found the following review helpful:
4.0 out of 5 stars Excellent book with no peers,November 30, 2006
By
W. Webber (Austin, Texas United States) – See all my reviews
(REAL NAME)
This review is from: Getting Out: Your Guide to Leaving America (Process Self-reliance Series) (Paperback)

This is a great book that is a good foundation in researching the how-to’s in leaving the country. In a category where there are very few books to choose from, this book is timely and reasonable well written. If you are interested in leaving the United States and not completely sure of where to go, this is a good resource along with the CIA factbook & other well known websites.

Pros:
1) Great list of helpful websites in the back for each country.
2) Excellent group of countries considered around the globe.
3) Decent foundational info about each country considered (50 countries).
4) Very readable style.
5) Good cross section of short blurbs about various peoples rationales in leaving.
6) Fair price for the book.

Cons:
1) No specific info as to why certain countries were included and other excluded.
2) Many countries mentioned in passing (in a positive light) in various parts of text are not considered as possibilities (i.e.: not profiled).
3) No easy way to see how countries stack up against each other at a glance based on various factors.
4) Poor editing… Many typos.
5) Could have had much more specific info about each country for various factors to consider (e.g. Pet specifics for each, education system, etc…)
6) Would have been nice to have at least one person for each country cited. Although difficult to pull off, this would have been better than people telling their stories for a subset of the countries profiled.

In short, this book has very little dead weight material and is a must have if this topic is relevant to you.

Help other customers find the most helpful reviews
Was this review helpful to you? Yes No

46 of 46 people found the following review helpful:
3.0 out of 5 stars Fascinating and almost complete,January 14, 2007
By
This review is from: Getting Out: Your Guide to Leaving America (Process Self-reliance Series) (Paperback)

This book is a fun read with lots of very useful information; it’s just as good for Americans looking to get out as it would be for non-Americans looking for someplace to go, as it profiles many countries and also has a wealth of suggestions for moving and income that are not country-specific.

On the downside, as an American living in Japan, I can say that its section on Japan is woefully incomplete. Jobs here are said to pay “the mighty yen”, but my friends and I always grimace when it’s time to send money home. It doesn’t even mention the astounding bureaucracy or the racism that often goes hand in hand with it. And it only mentions Tokyo, despite that there are foreigners living in beautiful, cheap, and friendly cities and villages all over the country.

This is a fun read but should not be your last source of information!

http://www.amazon.com/Getting-Out-Leaving-America-Self-reliance/dp/0976082276