Dark Night ‘Battle’ of the Artificial Intelligence Robots? Aurora Shootings Related to Secret FICO, LIBOR, PROMIS, & DARPA Software

Dark Night ‘Battle’ of the Artificial Intelligence Robots? Aurora Shootings Related to Secret FICO, LIBOR, PROMIS, & DARPA Software

Last night I had Nighthawk from Revolution Radio and Ghostwalker, an ex-special forces guy on my show discussing the Batman/Aurora Shooting.

Update as of August 3, 3012 at 1pm:  Nitehawkk just sent me the Aurora Police Scanner Transcription click here.  (Incredible amount of work :-))

As I posted a few days ago here on this blog the link up between the shooter’s father and the LIBOR scandal is likely a substantial background element that may point to something much bigger going on here.

This recent article by Grace Powers reposted here in with a link to the whole report, is very clear and concise, an excellent overview of the evidence and where it is leading.

Note:  I believe Jack Blood broke this story originally regarding the background of Jame Holmes’ father and how that factors in… The links to the Batman movie scenario are also here in Jack Blood’s original article.

 

Batman Massacre: WHY and HOW and WHO 

Written by By Grace Powers July 28, 2012

www.helpfreetheearth.com

THE MOTIVES

Robert Holmes, the shooting suspect’s father, is a senior lead scientist with FICO, the American credit score company. He was scheduled to testify in the next few weeks before a US Senate panel that is investigating the largest bank fraud scandal in world history. This banking fraud threatens to destabilize and destroy the Western banking system.

Robert Holmes not only uncovered the true intent of the massive LIBOR banking fraud, but his “predictive algorithm model” also traced the trillions of “hidden”dollars to the exact bank accounts of the elite classes who stole it. In other words, Robert Holmes could NAME NAMES! Those names WOULD AWAKEN THE WORLD to the depth of government and corporate corruption which could include members of Congress, Wall Street, Federal Reserve and EU executives and could even include US Presidential candidates and the British Royal family.

The motives for the massacre are:

1) To silence whistelblower Robert Holmes whose son is now facing a possible death sentence 

2) To influence the upcoming vote on the UN Global Small Arms Treaty which could result in gun confiscation and disarming world citizens. The UN treaty could override national sovereignty and give a license to federal governments to assert preemptive gun control powers over state regulatory powers…..continued at

 http://www.helpfreetheearth.com/news617_batmanwhohow.html


THE BATTLE OF THE ROBOTS OR AI SYSTEMS

With regard to the Batman movie scenario I also think it is significant and not outlined in Jack Blood’s analysis, that the Dark Knight ends up working for the “government” who are portrayed as the good guys in order to stop what I took to be a free energy device that was reconfigured into a “fusion reactor” aka neutron bomb according to the movie.  The enemy in other words becomes “free energy devices” which according to the subliminal message can be turned into dangerous weapons (a position that the Illuminati takes to redirect the public away from the exploration into zero-point or what is commonly known as “free energy”).  In the movie, the Dark Knight flies the activated device out over the waters around NYC and detonates it, saving the city (and himself) in the process.

It is also notable that the destruction of a stadium is one of the key scenes in the movie… imploding from an underground explosion…

Jack Blood is quite correct with regard to the link between the PROMIS SOFTWARE / OCTOPUS investigation where journalist Danny Casolaro was found dead in a hotel room, supposedly having strangled himself in a bathtub.

The Promis Software story has not reached the mainstream and is key to understanding the DEVELOPMENT OF AI and tracing not only banking transactions but for use in targeting and profiling and a myriad of other capabilities.  Whereas the software that the shooter’s father was working on “detects financial fraud” it may be considered a potential and very serious threat to the Promis system and quite possibly be able to detail involvement of the perpetrators in the LIBOR and other banking frauds going on right now.  

What comes to mind is the idea here that this enitre scenario as played out in the Aurora Colorado theater was created by an AI that detected a rival software that would threaten those it is SERVING… and therefore constructed a counter to that threat in the form of targeting this apparently quite brilliant (PhD candidate) James Holmes… 

In other words, the warning is certainly clear to his father Robert Holmes and likely the entire firm called FICO, Fair Issac Corporation.  FAIR ISSAC sounds to me like the name of a robot… I would surmise what we have here is a battle between robots or ARTIFICIALLY INTELLIGENT SYSTEMS.  The is something MUCH GREATER going on here than meets the eye or has been yet revealed.  

Note that the Credit reporting organization certainly appears on surface to be a loyal part of the surveillance aparatus of the NWO.  So how is it that an individual, Robert Holmes, became such a threat to the system, such that his son was sacrificed on the alter of mind control in service of sending such a message?

Yes, lesser objectives such as gun control and public terror is always a goal of such operations.  But in light of the links as mentioned in the above articles to the Olympics, what we have here is a picture that begins to look like a multi-city op that has at it’s core a larger objective.  

THE GEOMETRIC CONSTRUCTION AKA DARKLY MAGICAL ACT

I am convinced, based on all of the evidence and my previous points that there is much more going on here.  The battle of the robots/AI systems may be the only real indicator of something more diabolical and more far reaching than what we have discovered so far.

I suggest that this is a geometrical carefully formulated plot that goes from Aurora Colorado (goddess of the Golden Dawn) to the London Olympics with the Silverstein ownership in the background echoing the Twin Towers of 911, to a third point… that has yet to be revealed.  At the very least there will emerge 3 locations creating a triangle because as any magician knows, (whether in service to the dark or the light) that is the very minimum needed when casting a spell or taking an action aimed at changing or affecting ‘reality’.

SOURCE: ProjectCamelotPortal.com

Aurora Colorado Police Department Scanner Logs & Transcript of Batman Shooter Incident James Holmes

Aurora Colorado Police Department Scanner Logs & Transcript of Batman Shooter Incident James Holmes

Spoiler Alert: No Mention of James Holmes ‘Arrested’.  This Alone is EXTREMELY Suspicious!!!

 

POLICE SCANNER LOG AURORA POLICE AND FIRE FULL LOG AND TRANSCRIPT

ZERO EDITS TIME CODE ACCURATE

(2 channels, police right speaker channel, fire left speaker channel)

5:23 Shooter still inside Theater 9

6:40 “Need 3 or 4 ambulances”, “behind the theater, we’ve got a suspect in gas mask”

7:00 Unidentified officer 1: “That white car in the rear of the lot, is that a suspect (James Holmes sitting calmly in his car parked closest to the fire exit door)?
Unidentified officer 2: “Yes, we’ve got rifles (on the ground), gas mask (on the ground), (?) now I’ve got an open door going into the theater.”
Unidentified officer 1: “Hold your position, hold your suspect.” (presumed arrest of James Holmes without violence, all 100 witnesses and survivors are under arrest)

7:30 Do not go into the movie theater, set up perimeter around entire mall

7:45 5 patients need ambulance

8:51 Need rescue inside auditorium multiple victims

9:30 taking victim to hospital in police car (too many police cars not enough ambulances)

9:42 7 down in Theater 9

10:00 Need Denver PD help (Aurora PD can’t handle it)

10:20 “One of the shooters” (plural) in a blue plaid shirt

10:50 Channel 2 inside, Channel 3 outside, unpatching combined channels

11:30 Situation under control, need Arapaho Sheriff Dept on perimeter

11:45 Need more ambulances

12:00 Conflicting suspect descriptions, multiple shooter suspects

12:30 “I only have 1 ambulance, where are my ambulances at?”

12:45 Dying girl crying in pain and terror

1:00:07 315 and 314, first shooting at century theatres, 14 300 East Alameda avenue, they’re saying somebody’s shooting in the auditorium. 01:00:16

01:00:30 315 and 314 there is at least 1 person that’s been shot but they’re saying there’s hundreds of people just running around. 01:00:36

01:03:42 315 be advised i think somebody’s sprayed some gas over there too. 01:03:46

01:03:59 316 i need a rescue in here hot, see we got a guy shot. Inside of theater 9? Just outside of theater 9. 01:04:08

01:04:25 team 6 we got another person outside shot in the leg, a female, i got people running outside the theater that are shot in room 9. 01:04:33

01:04:39 318 i got another victim on the north side of this theater the parking lot. 01:04:43

01:05:05 from what I’m smelling inside I can – smells like it’s OC, maybe 2

01:05:14 get us some damn gas masks for theater 9 we can’t get in it

01:06:14 16 I need a marked car behind the theater stable side,suspect in a gas mask. 01:06:22

01:06:50 everyone hold the air one second, cars where that white car in the rear of the lot, is that a suspect? YES! we’ve got rifles, gas masks, you can see him ive got a open door going into the theater, OK hold that position, hold that suspect! 01:07:05

01:09:23 16 I got 7 down in theater 9! & down! 01:09:28

01:09:58 one of the shooters might be wearing a white and blue plaid shirt 01:10:03

01:10:09 I’ve got a child victim, I need rescue at the back door of theater 9 now! 01:10:13

01:12:29 (woman crying hysterically, help!) 01:12:34 (heard in the background; it’s a woman with a groaning cry)

01:13:07 I’ve got one victim eviscerated 01:13:09

01:14:21 I need somebody to shut this movie off in 9, how do we shut the movie off in 9?

01:14:29 everybody get on this, it’s an assault rifle, we got magazines down inside, everybody watch out for the assault rifle. 01:14:35

01:14:55 do I have permission to start taking some of these victims via car? We’ve got a whole bunch of people shot out here and no rescue … yes, load ‘em up, get ‘em in cars, get ‘em out of here.

01:15:08 we have one we cannot move in theater 9

01:15:23 notify all the hospitals we’ve got people coming in

01:16:12 if they are mobile, get them outside. We’ve got a few that are not mobile.

01:23:47 the guy’s still in theater 9 im working on a backboards for taht female. 01:23:51

01:25:01 suspect is going to be male, unknown race, black camo outside outfit believed to be wearing a vest, gas mask and multiple long guns. 01:25:10

14:25 Clearing rest of the theaters now

14:50 Magazine found from rifle, assault rifle found outside Theater 9 (at exit door, white vehicle of James Holmes is parked closest to exit door)

15:15 Request permission to take victims to hospital in police car, “I’ve got a whole lot of victims and no rescue (ambulance). Load em up get em in a car get em out of here!”

15:25 Cannot move victims in Theater 9, need ambulance

17:30 Taking victims to hospital in police cars, no ambulances

17:40 Rifle 5.56 caliber (found at exit door to theater, closest car parked was James Holmes’ white car)

18:26 Police cruiser 6 taking 2 more victims to hospital, shot in neck

18:30 “Has anyone been upstairs in the theater? Bodies upstairs? Working on it now.”

19:00 Moving bodies by police cars (no ambulances)

19:40 Ambulance enroute to Theater 9

20:00 Need Rescue in theater for multiple victims, police officers will only be there for security

20:30 Searching theater employees to see if they are shooters (so no shooter has been arrested yet)

21:20 Police evacuating victims in patrol cars (no ambulances)

21:30 Victim count 20 total need ambulance, more ambulances coming from out of city

22:00 Set up triage for treatment transport (to let dying victims go ahead and die, let ambulatory victims wait)

23:20 Set up police command post south east of Aurora Mall

23:40 “Still have a lot of people shot on east side need (police) cars there” (no ambulances)

24:20 Still searching theater and parking lot for shooter suspects

24:30 “Tac 16, 21, one of the construction workers said somebody just came out of parking lot male red backpack headed towards Alameda.”

24:50 “We have a male dressed in black with red backpack going towards north east.”

25:00 Dispatcher says 2 suspects, 1 dressed in black plus 1 with red backpack

25:10 “Suspect is going to be male, unknown race, black cammo (police SWAT) outfit, believed to be wearing a (bullet resistant police SWAT) vest, (police gas mask and multiple (police) long guns.” (James Holmes not yet under arrest)

25:30 Dispatcher repeats description of suspect in police SWAT uniform carrying police guns

26:20 Still calling for police cars to transport dying victims (no ambulances)

26:40 Commander: “I’m assuming we’re waking up everybody? Yes Sir. OK.”

27:00 Fire chief called, police command post moved to front of theater

27:10 “Metro 10 OK. Clear. Listed James Holmes.” (White car vehicle registration?)

27:40 Need more police cars to transport victims (no ambulances)

28:00 “I want no cars leaving this lot! I want this (parking) lot locked down! No cars leaving!”

28:20 Police cars arrive from Denver, Englewood and Littleton (Columbine High School massacre) to transport dying victims (no ambulances)

30:00 Fire channel: “We have a number of people dead in the theater. We are in a Mass Casualty Situation at this time.”

30:31 Police Aurora Any unit. Unknown problem. 1690 South Moline st., 1690 South Moline st. We have a report of an unknown problem, at least three people dragging a person into an unknown description vehicle and last seen northbound on the street.

31:00 1690 South Moline Street

31:30 “Denver Tac 37 go with your update. Suspect in all black (police SWAT uniform), black tactical vest, black tactical helmet, (?), gas mask, black tactical gear, at least 1 handgun, (long gun, 1 possible additional long gun.” (James Holmes still not arrested)

33:00 “Where do you want press and family members to stage?”

33:40 15 Denver patrol cars arrive to help transport dying victims (no ambulances)

35:20 “Inside of the theater has been cleared. Working on cars out in the parkign lot now.” (James Holmes still sitting in parking lot?)

36:20 Starting to clear cars in parking lot looking for suspects (James Holmes not yet under arrest)

37:00 Littleton police officer needs medical treatment,

37:10 Police: Jail vans to be used to transport dead bodies to morgue. Fire: Just leave dead bodies for now.

38:10 “Clear the suspect’s car with bomb unit” (No criminal background check of James Holmes. No vehicle license tag check of James Holmes’ white Hyundai car parked closest to exit door. No mention that James Holmes is under arrest. No mention of arresting officer’s name. No mention of what clothing color James Holmes is wearing, nor if he is wearing black police SWAT uniform. James Holmes’ jail booking photo does not show him wearing black police SWAT uniform only orange prisoner jump suit.)

38:30 “Secondary device” need bomb squad for suspect’s vehicle, all police to leave area behind Theater 9

39:10 “SWAT inside in gas masks has theater contained and secure”

39:20 “Sending police to suspect’s address to do surveillance at this point.”

40:00 All uninjured movie survivors are under arrest, not allowed to leave the area

40:20 Moving dead bodies outside of theater to parking lot (no photos taken of crime scene?)

40:40 “We have witnesses who left who say they did see the shooter who have blood spatter on them who are not injured. What do you want us to do with those people?”

42:30 Police have all victims cleared (false statement), don’t know about victims still attended by ambulance crews

43:00 Police find 2 more victims to transport to hospital, “Not moving yet.”

44:00 Request Arapaho Sheriff Air 1 helicopter to do flyover of theater

45:00 I really need somebody to confirm the white vehicle outside the theater plates. Check white vehicle tag 119ROC (James Holmes) “Check with key witnesses inside the theater. We need to confirm suspect descriptions (black SWAT police uniform, gas mask and helmet, no one saw face. 5′ 9″ tall shooter but James Holmes is 6′ 3″). I want to make sure we’re not looking for anybody else.” (So the investigation and search for suspects ends right here. No mention of James Holmes’ name.)

46:40 No more victims or witnesses allowed to leave, all survivors under arrest

47:00 “Victim with shrapnel in his face. Is there another ambulance?”

52:00 Fire: “Be sure the patients inside (the theater) are black patients. Extraction team of 5 medics.” (Black means Deceased)

52:52 Bomb squad enroute

53:30 Parents of victims to go to command post, need more officers for security of command post, every officer in metro area is on scene

56:30 Secure suspect’s vehicle (James Holmes)

57:00 “I had another witness say green camoflage pants.” Stop all radio communications, unable to figure out how to patch radio channels together

58:20 “Open door at mall.” Bring dogs to search mall.

1:00:00 No police at Childrens Hospital to interview victims or suspects

1:01:40 Police to arrest news media? Media moved to command post.

1:02:40 Fire: “Need confirmation that all the (dead) victims in theater are black.” (repeated 3 times, for Obama’s race war, but all were white)

1:03:30 Police: “Doctor said a bomb went off somewhere.”

1:06:30 ETA Arapahoe Sheriff Air 1 helicopter arrive in 1 minute

1:10:30 Hyundai Accent Tennessee plate 074VPD suspected bomb third vehicle directly in front of doors, “possible it’s just a thermos but hard to tell.” (not James Holmes)

1:12:20 Vehicle tag 074VPD “clear address in Columbia Tennessee” (Heather Wolfe Smith and school teacher Lucas Smith who was shot from Knoxville TN?)

1:13:00 “Does anyone know if there’s a family looking for the 10 year old victim? Female.”

1:16:30 “Talking to people making statements, sounds like we have possible 2 shooters, 1 that was in Theater 8 seated, another one that came in from the outside into Theater 9. Sounds like it was a coordinated attack.”

1:17:00 Dispatch: “Every unit, possible 2nd shooter still at large. Keep the media away from them.”

1:23:30 All witnesses and survivors still under arrest

1:27:00 Secondary (bomb) device found

1:28:00 Secondary device was found in the main (parking) lot of the theater, all units to evacuate (red plastic gas can in James Holmes’ car trunk?)

1:33:30 Need camera to photograph witnesses before they can be released from arrest

1:35:20 Witnesses under arrest not allowed to use restroom

1:36:20 DUI hit and run arrest at mall at shooting crime scene, no name or tag given by Colorado highway patrol

1:38:40 Still no camera to photograph 50 witnesses under arrest

1:39:30 100 witnesses on West side, perhaps taken to Gateway High School to remain under arrest

1:42:30 Take photo of every witness, only release non eyewitnesses from arrest, all other witnesses taken to Gateway High School under arrest

1:44:30 No cars allowed to leave parking lot, witnesses must find their own ride home

1:48:20 Start search of suspect’s vehicle with bomb dog (James Holmes)

1:48:50 Search gray charcoal vehicle with Tennessee plates 2 door hatchback Hynundai

1:55:20 Give police business cards to witnesses

1:57:30 Victor 50 to Edward 10 switch to phone so no recording of audio

1:57:40 Bomb dog requested on Paris

1:59:30 Family looking for pregnant female taken to hospital by police and missing 9 year old child, shot in face and chest

2:00:10 Gunshot victim walk in to hospital

2:01:30 Robot entering towards car for suspected bomb inspection

AT NO TIME WAS THERE ANY DESCRIPTION OF THE ARREST OF JAMES HOLMES, NO NAMES NOR NUMBERS OF ANY POLICE OFFICER WHO ARRESTED JAMES HOLMES, NO DESCRIPTION OF WHAT JAMES HOLMES WAS WEARING, NO BACKGROUND CHECK OF JAMES HOLMES BY DRIVER LICENSE NUMBER. THE BJAIL BOOKING PHOTO DOES NOT SHOW WHAT JAMES HOLMES WAS WEARING. DURING A REAL ARREST THE OFFICERS WILL NAME ALL THESE EVENTS IN THE RADIO TRANSMISSIONS. PRESUMABLY THERE ARE SECRET RADIO CHANNELS AND CELLPHONE RECORDINGS THAT LITIGANTS MUST SUBPOENA AND SEEK IMMEDIATE PUBLIC RECORDS DEMANDS BEFORE RECORDINGS ARE DESTROYED. NONE OF THE POLICE OFFICERS ARE IDENTIFIED BY NAME OR NUMBER ON THE RADIO AUDIO RECORDING. NO DETECTIVES WERE EVER REQUESTED OR NAMED IN THE RADIO BROADCASTS.

 

TRANSCRIPT FROM FIRE RESCUE

What follows is a partial transcript of the dispatch tapes from the Aurora fire and police departments regarding emergency medical response after Friday’s movie theater shooting. The times in parenthesis represent the amount of time passed after the shooting was first reported.

Abbreviations: PO(police officer); FDD (fire department dispatch); Command (fire department command).

PO: I have a party shot here. I need rescue hot. (3:07)

FDD: Medic … They need you in front of the theater.

FDD: Engine 8, we may have a second victim.

FDD: Starting third ambulance. (3:50)

Command: We’re going to have staging away from the scene.

PD: People who are shot running out of the theaters.

FDD: Multiple victims probably three plus.

PO: I need rescue … at least three to four ambulances, everyone can stage in the west parking lot. (5:43)

Command: Let’s set up ambulance staging at Expo and Sable. Is that where they want us to stage in the first place?

FDD: Now they’re saying west parking lot. Let me clarify with PD somewhere where we won’t necessarily be coming into their scene.

Command: They need to set us up a staging area.

FDD: They want the staging area in the west part of the theater.

MEDIC: We are on scene with APD. (6:56)

Engine 8: We’re on the scene. We’re getting reports of multiple victims and an active shooter. (7:14)

PO: I have two victims. … I need an ambulance here quick.

PO: We need to start putting them into cars and start shuttling them out to the west end.

PO: (inaudible) shot twice in the back.

PO: I need one ambulance.

PO: We need rescue inside the auditorium. Multiple victims. (8:13)

FDD: They’re saying they have a party on the east side of the theater they can’t get to. They need an ambulance. He’s shot in the back. And multiple parties inside the theater.

PO: I need as many ambulances as we can to the Dillard’s lot.

FDD: Looks like you have four ambulances started. PD requesting as many ambulances as possible to Dillard’s. How many ambulances do you want?

PO:I’m taking one male to the hospital in my car.

PO: Seven down in theater 9.

PO: I got a child victim. I need rescue at the back door of theater 9 now. (9:52)

MEDIC: I’m down here north of the Century theater. I have a GSW … to the leg.

PO: Dispatch, give me some ambulances on Sable. I want ambulances on Dillard’s lot.

FDD to Command: Sir, (inaudible) metro sent all available ambulances.

PO: We’re bringing out bodies now. (11:44)

PO: I’ve got one ambulance here. Where my ambulances at?

Tower 8 to Command: We need an ambulance for GSW to abdomen, arms and legs if you have anyone to spare.

PO: I need a medical crew. … I’ve got one victim eviscerated.

FDD: PD wants as many medical personnel as possible. Two additional engines in route.

Engine 8: I need … two ambulances over here right away.

PO: Get me some ambulances in the back of the theater or Sports Authority parking lot. (13:21)

FDD: PD is requesting as many medical personnel as possible to the Dillards. … We also have a child down.

PO: Do I have permission to take some of these victims via car? I have a whole bunch of people shot out here and no rescue. (14:00)

PD command: Yes. Load them up and get them in cars and get them out of here.

PO: We have one we cannot move in theater 9. Get us an ambulance here as soon as they’re available. (14:51)

FDD: Engine 2, truck 2, engine 4, engine 5 in route.

FDD: PD is requesting medical personnel in theater 9. Have a child down and cannot evacuate. (16:19)

Command: We’re going to set up Fire Department that aren’t on scene to stage at Exhibition and Sable.

PO: We need rescue or we need more patrol cars. … We’re just gonna take these people.

FDD: DP advising there are 10 people down behind theater 9.

PO: Cruiser 6 is taking two more victims.

PO: (Inaudible) … shot in the neck.

Command: I need all ambulances that they’re sending to stage at Exposition.

FDD: PD is again requesting emergent medical to the back of the theater. (18:36)

Command: I copy that. I’m just trying to get things under control here.

FDD: I copy, and again they are still asking for additional medical in theater 9.

PO: Moving (inaudible) by police cars. I still need some ambulances over here.

Truck 2: We can take the theater.

PO: Let Aurora South know cruiser 6 is in route. One critical, one semi-critical.

Command: I need you …to come up here.

Dispatch Police: Truck 2 in route to theater 9. (19:10)

PO: We need rescue to move up to the rear of the theater. We have officers there requesting they come immediately for multiple victims. (19:27)

PO: Advise rescue that officers will be there for security. That’s the best thing we can do at this point.

FDD: Sir, I apologize again, but PD is asking for emergent medical to the back of the theater. They are on scene to provide security.

Command:Copy. I have truck 2 … to help engine 8.

FDD: I believe they have another party inside theater 9 that they can’t evacuate, which is the child, but they have 10 parties down behind the theater.

PO: We’re evacuating victims. (20:45)

Command: Go ahead and activate the EM system. We’re going to need to know exactly how many beds these … hospitals can take.

FDD: Do we have an approximate patient count?

PO: Come back for more. I have two here that need treatment right away.

PO: All right. I’m getting there.

Command: I’m just trying to sort it out right. I hear 10 here, four here. I’m going to go with 20 right now. Let’s just go with 20 people until we get this verified. (21:06)

FIRE Dillard Division: I have Medic 102 over here. Can I have them to transport my two red patients?

Command: Copy. All divisions set up a extrication, triage, treatment, transport within your division. (21:28)

Engine 5: Command, we’re right by the theater. We just had a police officer run up to us that has nine patients behind the theater here. This would be on the east side of the theater. Do you want us to stay here or go with the police officer? (21:49)

FDD: Command, did you copy engine 5? (22:56)

Command: Copy.

FDD: I need to know if you want them to stay there or continue onto Dillard’s.

Police dispatch: I still have a lot of people shot on the east side. I need cars there.

Engine 5: We’re on the east side of the theater on Sable. Do you want us to attend to the patients on the east side?

Command: You only have one patient there, correct?

Engine 5: Police officer told us said there are nine patients.

Truck 2:We are in the rear of the theater. We have nine shot. If we can get any ambulances in stage on Sable, we can get them over to the ambos. (24:02)

Command: OK, just stand by. Let me get this sorted out. I will be with you in a minute.

Command:Do we know if the chief is responding?

FDD: That’s negative, sir. Do you want me to start (inaudible) chief?

Command: Yeah, I need chief (inaudible) here.

Command: Truck 2, I want you to join up with Engine 5. I’m just going to make you Sable division. … We’re going to start there until we get more resources. (25:06)

Police dispatch: We need another car for transport behind theater 9.

FDD: The lieutenant with the police department is requesting to meet you face to face in front of the theater.

Dillards Division: We’re sending two … patients off.

Command: We’re waiting to hear from the EM system what beds are available.

Truck 2 to command: FYI, right now we’re loading patients into back of PD cars to get them transported. Any ambos we could get would be nice. (26:47)

Command to FDD: How many ambulances … do I have? I need to have them all go to staging cause we have people jumping in and out. I’m not sure anybody even is.

FDD:To be honest, sir, I don’t know an exact count of ambulances. They did just advise me that they’re sending two more from (inaudible ) and we have every unit that’s available in the city of Aurora.

Command: I need them to go to Sable. Can they send a supervisor, … to be in charge of the transport area over there at Expo and Sable so we can get a handle on ambulances, have them stage and then I can send them into each division.

Command:Make sure that all these ambulances know to return to staging area over at Expo and Sable.

East division to command:We have transported seven patients. We’re on our eighth patient. Also talked to police officer who said we may have a number of people dead inside the theater. (29:46)

Command: OK, if they’re dead, leave them. We’re in a mass casualty situation at this time.

FDD: They do have ambulances returning to the staging area.

Command: Anybody else that’s in the area that we can contact? Somebody we can get a hold of … anybody?

FDD: We’re working on finding additional transport rigs
 

SOURCE: FreedomSlips


When an Agent Knocks, Talk About It

When an Agent Knocks, Talk About It

Often, when folks find themselves having been visited or otherwise solicited for information by law enforcement, their reaction is to keep the fact that they’ve been targeted for government harassment quiet. In reality, however, the worst thing (next to cooperating!) that you can do in this situation is to keep it to yourself. In doing so, you deprive yourself of community support at a time that may be stressful and even terrifying and, simultaneously, you help the government maintain a veil of secrecy around the harassment and surveillance they use to destroy resistance movements.

Many people who’ve been harassed by law enforcement officers report having been threatened with negative consequences should they choose to go public about the incident. This, like so much of what they’ll tell you, is utter and complete bullshit. YOU ARE NOT LEGALLY BOUND TO KEEP THEIR SECRETS, and the fact that they often lie and try to convince you that you are only speaks to the fact that doing so benefits them, while spreading the word benefits us. Part of their strategy for repressing dissent is to quietly isolate individuals from their communities and terrorize them into cooperating in their efforts. If we expose what they’re doing every time they do it, we strip them of the freedom and protection that secrecy offers- think of it as a little counter-counter-insurgency tactic.

Publicizing government harassment is a protective measure. As we build a culture where people talk about and prepare for government repression, and support those facing it, we reduce the number of people who will turn on their comrades to save their own asses. If you come from a community where everyone is informed about incidents of harassment and knows how to deal with them calmly and effectively, and where not cooperating is the norm, you’ll be better equipped to deal with more serious situations as they arise. Whether or not you ever have been or ever will be involved in illegal activity, it’s possible that you, or someone you care about, or someone they care about, will at some point find themselves sitting in a jail cell being given the option of cooperating in exchange for some sort of leniency in charges or sentencing. And even if you don’t support ELF actions or other things that people are being indicted for these days, the old adage holds true with law enforcement: “give ’em an inch, and they’ll take down every poor fucker they can get their hands on.” That is, acquiescing to law enforcement demands that we remain silent about the things they do is just like giving a mouse a vegan cookie- who wants just one vegan cookie, after all?

Lastly, letting your community know that you’ve been visited is important because law enforcement visits are dangerous for everyone, not just the particular person who’s been visited, and you owe your community any information that may keep them safer. You don’t and can’t necessarily know exactly who may be endangered by government activity, but you can be sure that making it possible for those people it may affect to find out about it will help them. When you get visited, you may not have any idea why they’re asking what they’re asking- this could be because they’re wacked out creepers who don’t know what they’re talking about, or it could be that their asking about things that you had no involvement in. It’s not uncommon for visits to be made in a desperate attempt to find any in into radical circles that may, eventually, lead to a suspect. Thus, it’s important to be cautious about acting rashly and publicizing details (e.g., names mentioned, actions, etc.) of a visit in a way that will only incite open and potentially incriminating speculation in your community, and to balance that against the need to get as much information as possible out into the public realm so that people who it may affect can take appropriate actions to protect themselves. So, while there’s no doubt that you should go public immediately with your experience of government harassment, you should also take the time to consult with trusted friends and support networks to determine the best way to do so and still avoid unwittingly getting others in trouble.

http://midwestgreenscare.files.wordpress.com/2008/06/mgs-zine-30.pdf

Peter Kirby: Enron, Bush, Chemtrails, & a History of Weather Derivatives

Peter Kirby: Enron, Bush, Chemtrails, & a History of Weather Derivatives

A History of Weather Derivatives

Facts lead me to speculate that the chemtrails so often seen in our skies are sprayed for financial gain. Chemtrails are admittedly sprayed as part of weather modification programs. There are two large financial markets that rise and fall with the weather; the weather derivatives market and the catastrophe reinsurance market. Chemtrails may be sprayed as part of a plan to manipulate the weather derivative and catastrophe reinsurance markets.

Even though the catastrophe reinsurance market is much larger, the focus of this paper is the history of the weather derivatives market because, while the history of the catastrophe reinsurance market is murky (I may uncover more in time), lots of information about the history of the weather derivatives market is available. It is this way because Enron originated the weather derivatives market. The fall of Enron was one of the greatest corporate scandals in American history, so there has been much already investigated and exposed.

Enron

When you’re talking about the history of weather derivatives, you’re talking about Enron. They developed the most widely used early trading platforms, they were founding members of the leading industry association and were counterparties in the first known domestic and international transactions.

In their heyday, Enron received Fortune Magazine’s award for ‘Most Innovative Company’ six years in a row. They gave their Enron Prize for Distinguished Public Service to people like Nelson Mandela and Mikhail Gorbachev. Henry Kissinger and James Baker worked as Enron consultants; traveling to such far-flung destinations as Kuwait and China preaching the Enron gospel. Stock analysts gushed over everything Enron did. Enron could seemingly do no wrong.

The only problem was, Enron was cooking the books seven ways to Sunday. When the S.H.T.F., Enron’s stock tanked like World Trade Center building 7 and eventually brought down one of the nation’s oldest and largest accounting firms, Arthur Andersen.

Although the company itself has long since been chopped up and sold off, former Enron employees now populate many other financial market trading establishments.

Enron Weather

The particular division known to buy and sell weather derivatives was called ‘Enron Weather.’ Enron Weather started as a small, but promising bit of the company. By the time of Enron’s demise in 2001, Enron Weather had grown to a significant part of their business.

It is suggested that Enron CEO Jeff Skilling’s brother, Tom Skilling originally had the idea for weather derivatives. Peter Fusaro and Ross Miller write in their book ‘What Went Wrong at Enron’:

“As temperatures spike upward in summer and fall in winter, utilities also potentially needed a hedge against the weather. Or so Enron thought – thanks to an idea that some Enron sources say Jeff Skilling’s brother Thomas, a weatherman in Chicago, suggested.”

Tom Skilling is the chief meteorologist at WGN-TV in Chicago, Illinois.

Loren Fox, the author of ‘Enron: The Rise and Fall’ tells the story of Enron Weather like this:

“…weather derivatives came to be championed by an employee working at the grassroots level and seeing customers’ daily needs. John Sherriff, who at the time managed gas trading for the western United States, began looking at derivatives linked to the weather in late 1995, and Vincent Kaminski’s research group worked on the idea in 1996. A gas trader named Lynda Clemmons was very interested in the idea, based on her conversations with executives at electric utilities that used coal-fired power plants…. In 1997, Enron handed off its weather derivatives effort to Clemmons, who was only 27. She began a one-person weather-hedging department within ECT…”

Fox continues:

“…Clemmons built up Enron’s weather business so that it did 350 transactions (hedging up to $400 million in potential revenues) in 1998, turning its first profit that year.”

Enron initiated the weather derivatives market in Europe as well. According to scholar Samuel Randalls, “In the UK, the first weather derivative deal was sold by Enron to Scottish Hydropower who, at that time, 1998, were taking part in a government pilot scheme for the privatization and deregulation of energy markets.”

Enron’s Oslo office became the base of their European weather derivatives business.

In 2000, Enron also introduced weather derivatives in Australia; offering temperature-based products for Sydney, Melbourne, Hong Kong, Tokyo and Osaka.

In 2002, after the bankruptcy, the Enron trading desk (including Enron Weather) was bought by UBS Warburg.

John Sherriff is now the owner of Lake Tahoe Financial and other Sherriff family businesses.

Mrs. Clemmons left Enron in 2000. She took a number of her colleagues from Enron’s weather team and set up weather derivatives company Element Reinsurance. After Enron, Lynda Clemmons also worked at XL Weather & Energy, The Storm Exchange Inc. and Vyapar Capital Market Partners. According to her Linkedin profile, Mrs. Clemmons is now an independent consultant.

a history of corruption

The Enron financial market trading desk, just like the company itself, had a history of corruption. Back in 1987, the Enron trading operations were called ‘Enron Oil.’ When questions about an Enron account at New York’s Apple Bank began surfacing, Enron management turned a blind eye. Money was pouring into this questionable account from a bank in the Channel Islands and flowing out to the account of a man named Tom Mastroeni; the treasurer of Enron Oil.

Enron management explained away these money flows and this questionable account as completely legal profit shifting. Although Mastroeni produced doctored bank statements and admitted a cover-up, Enron management didn’t pursue the issue. Nobody involved was even reprimanded. Revelations continued to come out, but Enron management did nothing. Enron’s accounting firm Arthur Andersen exhibited a similar disinterest.

After management confirmed an official lack of responsible oversight, Enron Oil traders ignored position limits and got themselves in big trouble. Only then did Enron executives show interest.

The authors of ‘The Smartest Guys in the Room’ tell the story like this:

“For months, Borget [the CEO of Enron Oil] had been betting that the price of oil was headed down, and for months, the market had stubbornly gone against him. As his losses had mounted, he had continually doubled down, ratcheting up the bet in the hope of recouping everything when prices ultimately turned in his direction. Finally, Borget had dug a hole so deep – and so potentially catastrophic – that there was virtually no hope of ever recovering.”

Enron brass was in a panic. Enron was looking at a $1 billion loss; enough to bankrupt the company. Management sent in some expert traders who, over the course of a few weeks, managed to clear out these positions with only a $140 million hit.

Enron had to tell people about this $140 million trading loss, though. Enron’s stock slid 30%. The blame game began. Ken Lay, the affable Enron founder and CEO, denied any responsibility. News of the scandal conveniently came out right after a big bank loan approval.

The U.S. attorney’s office charged Borget and Mastroeni with fraud and personal income tax violations. In 1990, Borget pled guilty to three felonies and was sentenced to a year in jail and and five years’ probation. Mastroeni pled guilty to two felonies. He got a suspended sentence and two years probation.

deregulation

Ken Lay helped his company make more money and created new financial markets (such as the weather derivatives market) through energy sector deregulation. Deregulation created a situation where Enron and others could more effectively manipulate and arbitrage (specifically regulatory arbitrage) markets.

Let us refer to a feature article published by industry publication Risk.net:

“‘Enron was the focal point of the deregulation agenda,’ says Jonathan Whitehead, who started with Enron Europe in 1996 and was heading the liquefied natural gas (LNG) business in Houston at the time of Enron’s demise. ‘It was the most vocal when explaining to regulators and governments and customers the benefits of deregulated markets. I don’t think deregulation in power and gas in Europe or the US would have come as far as it has without Enron,’ he says.

“Pushing for deregulation was very much a part of the company’s strategy from the start. ‘Ken Lay [chairman and chief executive of Enron] was the visionary at the time as far as seeing where deregulation could go and actually driving deregulation,’ says Mark Frevert, who worked at one of Enron’s predecessor companies, Houston Natural Gas, from 1984 and stayed at Enron until it’s demise.”

the right connections

Deregulation necessarily required help from the federal government. To make it happen, Enron and Ken Lay (who died in 2006) had the right federal connections in spades.

Ken Lay enlisted in the navy in 1968. His friend pulled some strings and had him transfered to the Pentagon. According to the authors of The Smartest Guys in the Room, Lay spent his time at the Pentagon, “…conducting studies on the military-procurement process. The work provided the basis for his doctoral thesis on how defense spending affects the economy.”

As I have explained in earlier writings, there is reason to believe that domestic chemtrail spraying operations and weather modification activities are carried out by our military. Ken Lay had many high level military connections.

Mr. Lay had the right political and specifically energy related political connections as well. He worked in the Nixon administration as a Federal Power Commission aide, then as deputy undersecretary of energy in the Interior Department. As chairman and CEO of Enron, he sat on the boards of Washington think tanks and often travelled to Washington.

A revolving door existed between Enron and the federal government. Enron executive Tom White left the company to join the Bush Jr. administration as secretary of the army. Enron executive Herbert ‘Pug’ Winokur was Lay’s old Pentagon friend. Robert Zoellick (now head of the World Bank) represented Enron, then the United States as Trade Representative and later as Deputy Secretary of State.

According to the authors of ‘The Smartest Guys in the Room’:

“In 1993, Lay added Wendy Gramm [to the Enron board], who had just finished a stint as chairman of the Commodities Futures Trading Commission (CFTC) and was married to Texas Senator Phil Gramm.”

It goes on:

“Just after Wendy Gramm stepped down from the CFTC, that agency approved an exemption that limited the regulatory scrutiny of Enron’s energy-derivatives trading business, a process she had set in motion.”

When Enron galloped into Europe, they had an influential lord on their side. Greg Palast covers it like this:

“The fact that a truly free market [in electricity] didn’t exist and cannot possibly work did not stop Britain’s woman in authority, Prime Minister Margaret Thatcher, from adopting it. It was more than free market theories that convinced her. Whispering in her ear was one Lord Wakeham, then merely ‘John’ Wakeham, Thatcher’s energy minister. Wakeham approved the first ‘merchant’ power station. It was owned by a company created only in 1985 – Enron. Lord Wakeham’s decision meant that, for the first time in any nation, an electricity plant owner, namely Enron, could charge whatever the market could bear… or, more accurately, could not bear.

“It was this act in 1990 that launched Enron as the deregulated international power trader. Shortly thereafter, Enron named Wakeham to its board of directors and placed him on Enron’s audit and compliance committee.”

As I speculate, a scheme to manipulate financial markets by modifying the weather would necessarily involve intelligence agencies. According to the authors of ‘The Smartest Guys in the Room,’ Enron had intelligence agency connections:

“One of Enron’s key advantages over its competitors was information: it simply had more of it than its competitors. It’s physical assets provided information, of course. And Enron didn’t stop there. It employed CIA agents who could find out anything about anyone. In stead of tracking the weather on the Weather Channel, the company had a meteorologist on staff. He’d arrive at the office at 4:30 A.M., download data from a satellite, and meet with the traders at 7:00 A.M. to share his insights.”

It continues:

“By the late 1990’s, these research efforts were herded together into something called the fundamentals group – fundies in trader parlance. The fundies group produced intelligence reports and held morning briefings…”

the Bush family

Mr. Lay and Enron had many connections to the Bush family and their cohorts. President George W. Bush (Bush Jr.) lovingly called Ken Lay ‘Kenny Boy.’ Mr. Lay was also close to his father, fellow Houstonian, George H.W. Bush (Bush Sr.). For example, in 1991, Bush Sr. offered Mr. Lay the position of commerce secretary. Mr. Lay turned him down. He wanted to be treasury secretary.

Greg Palast, in his book ‘The Best Democracy Money Can Buy,’ characterizes the Bush/Enron relationship like this:

“But what about Pioneer Lay of Enron Corp? His company, America’s number one power speculator, was also Dubya’s number-one political career donor ($1.8 million to Republicans during the 2000 presidential campaign). Lay was personal advisor to Bush during the postelection ‘transition.’ And his company held secret meetings with the energy plan’s drafters. Bush’s protecting electricity deregulation meant a big payday for Enron – subsequent bankruptcy not withstanding – sending profits up $87 million in the first quarter of Bush’s reign.”

Other Bushes were getting some, too. Greg Palast writes:

“Two months after the bankruptcy, Governor Jeb Bush of Florida traveled to the Texas home of Enron’s ex-president, Rich Kinder, to collect a stack of checks totaling $2 million at the power pillager’s $500-per-plate fund-raising dinner. There are a lot of workers in Florida who will wish they had a chance to lick those plates, because that’s all that’s left of the one-third of a billion dollars Florida’s state pension fund invested in Enron – three times as much as any other of the fifty states.”

Mr. Palast continues:

“Governor Bush encouraged a scheme by a company called Azurix to repipe the entire Southern Florida water system with new reservoirs that would pump fresh water into the swamps. From the view of expert hydrologists, such a mega-project is a crackbrained and useless waste of gobs of money. As part of the deal, Azurix would be handed the right to sell the reservoir’s water to six million Florida customers. Azurix was the wholly owned subsidiary of Enron that had recently been kicked out of Buenos Aires.”

Specializing in private equity buyouts, The Carlyle Group is one of their two main family businesses and one of the nation’s largest defense contractors. Chemtrail spraying is a military operation. The Carlyle Group could help geoengineering programs happen.

Participation in a scheme to defraud the population while murdering them at the same time would probably be A-o.k. with the Bush family. Bush family members exhibit recurring criminal behavior. Forget about the Enron connections. Do you know about the Nazi connections? Are you aware of the numerous links to 9/11? Have you heard of the connections to the attempted Reagan assassination or the attempted assassination of Pope John Paul II? Don’t forget that little Iran-Contra fiasco and the drug dealing, gun running and money laundering. Yup, they’re connected to that dirty, dirty BCCI thing, too. Folks, these are just some of the things we know about. When you see a few cockroaches, you can bet there are hundreds more in the wall.

So, who funds the Bush family? The answer is a little investment bank called Brown Brothers Harriman. Maybe you’ve heard of it. Webster Tarpley and Anton Chaitkin in their book ‘George Bush: the Unauthorized Biography’ describe the situation like this:

“For George Bush, Brown Brothers Harriman was and remains the family firm in the deepest sense. The formidable power of this bank and its ubiquitous network, wielded by Senator Prescott Bush up through the time of his death in 1972, and still active on George’s behalf down to the present day, is the single most important key to every step of George’s business, covert operations and political career.”

And I’ll go you one better. Who owns Brown Brothers Harriman (BBH)? That’s a good question because they are a private company. You cannot buy shares of BBH on any stock exchange. But, in fact, it really doesn’t matter who owns BBH because BBH (like all other big banks) suckles at the teet of the United States Federal Reserve Bank.

In order to get that fresh, uncirculated capital (which has more value than the money which is already in circulation), Brown Brothers Harriman acts upon the orders of the United States Federal Reserve Bank. Sure, BBH has businesses that make money, but when they start a new business such as weather derivatives, they act with the approval of the Fed. I understand this may be a lot to swallow for the uninitiated, but this is the way it works. Read ‘The Creature from Jekyll Island’ by G. Edward Griffin.

Who owns the Fed? Well, that’s the power behind the throne. It is an official secret, but I dare write the name of N.M. Rothschild as represented by the Bank of England.

In short, the Bush family, Enron and Ken Lay had the right political, business, intelligence and military connections necessary to facilitate the scheme I outline.

conclusions

Enron was a business laboratory directed by big banks. In the new world of deregulation created by the Bushes, Enron and others, the purpose of the company was to throw things against the wall and see what stuck. Enron employees were merely minions of those who controlled the purse strings. Enron was the perfect environment in which to try something new like weather derivatives. In light of the histories of corruption exhibited by those involved, it is understandable that the weather derivatives market they created may have been part of yet another murderous rip-off.

While most financial market trading operations are seen as unreliable, Enron’s trading desk was often regarded as their most productive and stable business. Could this have been because they were getting inside information about weather produced by geoengineering activities? I don’t know. I do know they had the ways and means necessary. Enron had motive and opportunity. Enron benefitted from weather derivatives.

notes
-‘The Smartest Guys in the Room’ book by Bethany McLean and Peter Elkind, Penguin Books 2004
-‘Weather as a Force Multiplier: Owning the Weather 2025’ report by the United States Air Force 1996
-‘The BCCI Affair’ report by Senators John Kerry and Hank Brown, 1992
-‘George Bush: the Unauthorized Biography’ book by Webster Tarpley and Anton Chaitkin, Progressive Press 2004
-‘The Best Democracy Money Can Buy’ book by Greg Palast, Penguin Books 2003
-‘Wall Street and the Rise of Hitler’ book by Antony Sutton, Buccaneer Books 1976
-‘Conspiracy of Fools’ by Kurt Eichenwald, Broadway Books 2005
-‘Enron: Charting the Legacy 10 Years on’ article by Risk.net 2011
-Enron annual report, 2000
-‘The Secrets of the Federal Reserve’ book by Eustace Mullins, Bridger House Publishers, Inc. 2009
-‘The Creature from Jekyll Island’ book by G. Edward Griffin, American Media 2010
-‘Enron: The Rise and Fall’ book by Loren Fox, John Wiley & Sons, Inc. 2003
-‘What Went Wrong at Enron: Everyone’s Guide to the Largest Bankruptcy in U.S. History’ book by Peter C. Fusaro and Ross M. Miller, John Wiley & Sons 2002
-‘Weather, Finance and Meteorology – forecasting and derivatives’ by Samuel Randalls School of Geography, Earth and Environmental Sciences, University of Birmingham

websites
wrma.org
risk.net
linkedin.com
xlgroup.com
vcmpartners.com

-Peter A. Kirby is a San Rafael, CA author and activist. Check out his ebook ‘Chemtrails Exposed:’
http://www.amazon.com/Chemtrails-Exposed-ebook/dp/B007JDN7EM/ref=sr_1_4?s=digital-text&ie=UTF8&qid=1331588967&sr=1-4

UN Gun Ban Treaty Leaked – The Elite Are Gunning for your Guns!

UN Gun Ban Treaty Leaked – The Elite Are Gunning for your Guns!

Treacherous wording upholds “States” gun rights but not individuals

The text of the anticipated and hotly-contested United Nations Arms Trade Treaty has been leaked, with the treaty itself set to be adopted and signed by member States as early as tomorrow, July 27. President Obama, today joining the chorus for gun control inside the United States in the wake of the Batman massacre, has previously indicated that he would sign the treaty, which would then have to be ratified by the Senate.

Masked behind the language of promoting peace in an international world by preventing genocide, the UN has unleashed a great Trojan Horse that calls upon States to enact national legislation sufficient to meet the minimum goals outlined in this treaty– including gun registries, background checks, import/export controls and more for arms of all types, including small & conventional weapons. “Each State Party shall adopt national legislation or other appropriate national measures regulations and policies as may be necessary to implement the obligations of this Treaty,” the treaty text states in part.

It makes specific note that the treaty places no limit upon greater gun control efforts within individual nations, and additionally places no expiration on the agreement. The scope of this language proves the analysis by Infowars (1, 2, 3, 4), writers at Forbes and many other publications that have been warning about this deceptive encroachment to be correct– there is an effort to disarm America underway.

The devil, as usual, is in the details.

Repeatedly, the treaty obligates States to establish “national control systems” to meet the particulars of the treaty. While the phrase “within national laws and regulations” appears to suggest that the 2nd Amendment would limit the implementation, properly read in the context of the wording and history itself, it really only invites new “regulations” where no “law” can be established.

These international goals will undoubtedly pressure changes in the executive branches’ many policies, as we have already seen with the ATF, who are trying to outlaw most types of shotguns, and who separately placed greater reporting burdens on gun shops in the Southwest border states as a response to the Fast & Furious set-up by Eric Holder & co. to demonize and destroy gun ownership.

The first “principle” outlined in the preamble reads: “1. The inherent rights of all States to individual or collective self-defense.” While the language of the treaty appears to recognize the legal right to keep such arms, the text actually recognizes the “inherent right of States” to “individual and collective” self-defense.

This is NOT the same as individual persons’ inherent right to keep and bear arms as recognized and enumerated in the United States’ Bill of Rights. Instead, it puts the collectivist unit known as the State above the individual, in complete defiance of the system set-up in the United States. Individual defense for a State, for instance, refers to what is known on the international scene as “unilateral war,” while collective defense is recognize in such actions as that of NATO or other allied bodies. The States’ right to maintain internal order has also been recognized by the UN, but all other purposes for arms ownership are seen as illegitimate.

It specifically recognizes [only] the “lawful private ownership and use of conventional arms exclusively for, inter alia, recreational, cultural, historical and sporting activities for States where such ownership and use are permitted or protected by law.” There’s been a great deal of rhetoric from gun grabbers over the years attempting to emphasize gun ownership for legitimate sporting uses, but the real purpose of arms ownership is a balance of power at the individual level in order to discourage tyranny at the State level. THAT is what the founding fathers intended, and that is the historical legacy Americans cherish.

NO SPECIFIC PROTECTION for individual persons is contained in this dangerous treaty, though the same media who’ve been demonizing critics of the UN’s effort as delusional and paranoid will attempt to argue otherwise, clinging to deliberately inserted clauses herein that look like stop-guards and protections for gun rights, but properly read, do no such thing.

While the UN advises States to keep within the scope of their own laws, the end-run assault against American’s 2nd Amendment is unmistakeable.

The text was released two days ago, but has received almost no attention in the press. The International Association for the Protection of Civilian Arms Rights and The Examiner have analyzed the treaty, while pointing out that member states like France have “let slip that their ultimate goal is to regulate legitimately-owned ‘weapons.’”

The United Nations has a sordid history of pursuing “general and complete disarmament,” and individual arms including legally owned arms have always been part of that focus. The United Nations treaty from 2001, known as the “SADC Protocol: Southern African Development Community” is, according to the UN’s own disarmament website, a “regional instrument that aims to curtail small arms ownership and illicit trafficking in Southern Africa along with the destruction of surplus state weapons. It is a far-reaching instrument, which goes beyond that of a politically binding declaration, providing the region with a legal basis upon which to deal with both the legal and the illicit trade in firearms.”

As we have previously noted, U.S. troops have been trained to confiscate American guns, while the confiscation in New Orleans after Hurricane Katrina has already set the precedent. The deception over aiming for legal guns while pretending to target “illicit” weapons is continued here in this 2012 monster treaty.

Below is the text in full, as it has been proposed and released. Any changes in the signed version will be noted when that time comes:

————————

UNITED NATIONS ARMS TRADE TREATY TEXT

PREAMBLE

The States Parties to this Treaty.

Guided by the purposes and principles of the Charter of the United Nations.

Recalling that the charter of the UN promotes the establishment and maintenance of international peace and security with the least diversion for armaments of the world’s human and economic resources;

Reaffirming the obligation of all State Parties to settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered, in accordance with the Charter of the UN;

Underlining the need to prevent, combat and eradicate the illicit trade of conventional arms and to prevent their diversion to illegal and unauthorized end use, such as terrorism and organized crime;

Recognizing the legitimate political, security, economic and commercial rights and interests of States in the international trade of conventional arms;

Reaffirming the sovereign right and responsibility of any State to regulate and control transfers of conventional arms that take place exclusively within its territory pursuant to its own legal or constitutional systems;

Recognizing that development, human rights and peace and security, which are three pillars of the United Nations, are interlinked and mutually reinforcing.

Recalling the United Nations Disarmament Commission guidelines on international arms transfers adopted by the General Assembly;

Noting the contribution made by the 2001 UN Programme of Action to preventing combating and eradicating the illicit trade in small arms and light weapons in all its aspects, as well as the 2001 Protocol against the illicit manufacturing of and trafficking in Firearms, their parts and components and ammunition, supplementing the United Nations Convention against Transnational Organized Crime;

Recognizing the security, social, economic and humanitarian consequences of the illicit trade in and unregulated trade of conventional arms;

Recognizing the challenges faced by victims of armed conflict and their need for adequate care, rehabilitation and social and economic inclusion;

Bearing in mind that the women and children are particularly affected in situations of conflict and armed violence;

Emphasizing that nothing in this treaty prevents States from exercising their right to adopt additional more rigorous measures consistent with the purpose of this Treaty;

Recognizing the legitimate international trade and lawful private ownership and use of conventional arms exclusively for, inter alia, recreational, cultural, historical and sporting activities for States where such ownership and use are permitted or protected by law;

Recognizing the active role that non-governmental organizations and civil society can play in furthering the goals and objectives of this Treaty; and

16. Emphasizing that regulation of the international trade in conventional arms should not hamper international cooperation and legitimate trade in material, equipment and technology for peaceful purposes;

Have agreed as follows:

Principles

Guided by the Purposes and Principles of the Charter of the United Nations, States Parties, In promoting the goals and objectives of this Treaty and implementing its provisions, shall act in accordance with the following principles:

The inherent rights of all States to individual or collective self-defense;

2. Settlement of individual disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered;

3. The rights and obligations of States under applicable international law, including international humanitarian law and international human rights law;

4. The responsibility of all States, in accordance with their respective international obligations, to effectively regulate and control international transfer of conventional arms as well as the primary responsibility of all States to in establishing and implementing their respective national export control systems; and

5. The necessity to implement this Treaty consistently and effectively and in a universal, objective and non-discriminatory manner.

Article 1
Goals and Objectives

Cognizant of the need to prevent and combat the diversion of conventional arms into the illicit market or to unauthorized end users through the improvement of regulation on the international trade in conventional arms,

The goals and objectives of this Treaty are:

– For States Parties to establish the highest possible common standards for regulating or improving regulation of the international trade in conventional arms;

– To prevent, combat and eradicate the illicit trade in conventional arms and their diversion to illegal and unauthorized end use;

In order to:

– Contribute to international and regional peace, security and stability;

– Avoid that the international trade in conventional arms contributes to human suffering;

– Promote cooperation, transparency and responsibility of States Parties in the trade in conventional arms, thus building confidence among States Parties,

Article 2

– A. Covered Items

– 1. This Treaty shall apply to all conventional arms within the following categories:

– a. Battle Tanks

– b. Armored combat vehicles

– c. Large-caliber Artillery systems

– d. Combat aircraft

– e. Attack helicopters

– f. Warships

– g. Missiles and missile launchers

– h. Small Arms and Light Weapons

– 2. Each State Party Shall establish and Maintain a national control system to regulate the export of munitions to the extent necessary to ensure that national controls on the export of the conventional arms covered by Paragraph a1 (a)-(h) are not circumvented by the export of munitions for those conventional arms.

– 3. Each State Party shall establish and maintain a national control system to regulate the export of parts and components to the extent necessary to ensure that national controls on the export of the conventional arms covered by Paragraph A1 are not circumvented by the export of parts and components of those items.

– 4. Each State Party shall establish or update, as appropriate, and maintain a national control list that shall include the items that fall within Paragraph 1 above, as defined on a national basis, based on relevant UN instruments at a minimum. Each State Party shall publish its control list to the extent permitted by national law.

– B. Covered Activities

– 1. This Treaty shall apply to those activities of the international trade in conventional arms covered in paragraph a1 above, and set out in Articles 6-10, hereafter referred to as “transfer.”

– 2. This Treaty shall not apply to the international movement of conventional arms by a State Party or its agents for its armed forces or law enforcement authorities operating outside its national territories, provided they remain under the State Party’s ownership.

Article 3
Prohibited Transfers

A State Party shall not authorize any transfer of conventional arms within the scope of this Treaty if the transfer would violate any obligation under any measure adopted by the United Nations Security Council acting under Chapter VII of the Charter of the United Nations, in particular arms embargoes.

A State Party shall not authorize any transfer of conventional arms within the scope of this Treaty if the transfer would violate its relevant international obligations, under international agreements, to which it is a Party, in particular those relating to the international transfer of, or illicit trafficking in, conventional arms.

A State Party shall not authorize a transfer of conventional arms within the scope of this Treaty for the purpose of facilitating the commission of genocide, crimes against humanity, war crimes constituting grave breaches of the Geneva Conventions of 1949, or serious violations of Common Article 3 of the Geneva Convention of 1949.

Article 4
National Assessment

Each State Party, in considering whether to authorize an export of conventional arms within the scope of this Treaty, shall, prior to authorization and through national control systems, make an assessment specific to the circumstances of the transfer based on the following criteria:

Whether the proposed export of conventional arms would:

Be used to commit or facilitate serious violations of international humanitarian law;
Be used to commit or facilitate serious violations of international human rights law;
Contribute to peace and security;
Be used to commit or facilitate an act constituting an offense under international conventions and protocols relating to terrorism or transnational organized crime, to which the transferring State is a Party;

In making the assessment, the transferring State Party shall apply the criteria set out in Paragraph 2 consistently and in an objective and non-discriminatory manner and in accordance with the principles set out in this Treaty, taking into account relevant factors, including information provided by the importing State.

4. In assessing the risk pursuant to Paragraph 2, the transferring State Party may also take into consideration the establishment of risk mitigation measures including confidence-building measures and jointly developed programs by the exporting and importing State.

5. If in the view of the authorizing State Party, this assessment, which would include any actions that may be taken in accordance with Paragraph 4, constitutes a substantial risk, the State Party shall not authorize the transfer.

Article 5
Additional Obligations

Each State Party, when authorizing an export, shall consider taking feasible measures, including joint actions with other States involved in the transfer, to avoid the transferred arms:
being diverted to the illicit market;
be used to commit or facilitate gender-based violence or violence against children;
become subject to corrupt practices; or
adversely impact the development of the recipient State.

Article 6
General Implementation

Each State Party shall implement this Treaty in a consistent, objective and non-discriminatory manner in accordance with the goals and objectives of this Treaty;

The implementation of this Treaty shall not prejudice previous or future obligations undertaken with regards to international instruments, provided that those obligations are consistent with the goals and objectives of this Treaty. This Treaty shall not be cited as grounds for voiding contractual obligations under defense cooperation agreements concluded by States Parties to this Treaty.

Each State Party shall take all appropriate legislative and administrative measures necessary to implement the provisions of this Treaty and designate competent national authorities in order to have an effective, transparent and predictable national control system regulating the transfer of conventional arms;

Each State Party shall establish one or more national contact points to exchange information on matters related to the implementation of this Treaty. A State Party shall notify the Implementation Support Unit (See Article 13) of its national contact point(s) and keep the information updated.

State Parties involved in a transfer of conventional arms shall, in a manner consistent with the principles of this Treaty, take appropriate measures to prevent diversion to the illicit market or to unauthorized end-users. All State Parties shall cooperate, as appropriate, with the exporting State to that end.

If a diversion is detected the State or States Parties that made the decision shall verify the State or States Parties that could be affected by such diversion, in particulate those State Parties that are involved in the transfer, without delay.

Each State Party shall take the appropriate measures, within national laws and regulations, to regulate transfers of conventional arms within the scope of the Treaty.

Article 7
Export

Each State Party shall conduct risk assessments, as detailed in Articles 4 and 5, whether to grant authorizations for the transfer of conventional arms under the scope of this Treaty. State Parties shall apply Articles 3-5 consistently, taking into account all relevant information, including the nature and potential use of the items to be transferred and the verified end-user in the country of final destination.

Each State Party shall take measures to ensure all authorizations for the export of conventional arms under the scope of the Treaty are detailed and issued prior to the export. Appropriate and relevant details of the authorization shall be made available to the importing, transit and transshipment State Parties, upon request.

Article 8
Import

Importing State Parties shall take measures to ensure that appropriate and relevant information is provided, upon request, to the exporting State Party to assist the exporting State in its criteria assessment and to assist in verifying end users.

State Parties shall put in place adequate measures that will allow them, where necessary, to monitor and control imports of items covered by the scope of the Treaty. State Parties shall also adopt appropriate measures to prevent the diversion of imported items to unauthorized end users or to the illicit market.

Importing State Parties may request, where necessary, information from the exporting State Party concerning potential authorizations.

Article 9
Brokering

Each State Party shall take the appropriate measures, within national laws and regulations, to control brokering taking place under its jurisdiction for conventional arms within the scope of this Treaty.

Article 10
Transit and Transshipment

Each State Party shall adopt appropriate legislative, administrative or other measures to monitor and control, where necessary and feasible, conventional arms covered by this Treaty that transit or transship through territory under its jurisdiction, consistent with international law with due regard for innocent passage and transit passage;

Importing and exporting States Parties shall cooperate and exchange information, where feasible and upon request, to transit and transshipment States Parties, in order to mitigate the risk of discretion;

Article 11
Reporting, Record Keeping and Transparency

Each State Party shall maintain records in accordance with its national laws and regardless of the items referred to in Article 2, Paragraph A, with regards to conventional arms authorization or exports, and where feasible of those items transferred to their territory as the final destination, or that are authorized to transit or transship their territory, respectively.

Such records may contain: quantity, value, model/type, authorized arms transfers, arms actually transferred, details of exporting State(s), recipient State(s), and end users as appropriate. Records shall be kept for a minimum of ten years, or consistent with other international commitments applicable to the State Party.

States Parties may report to the Implementation Support Unit on an annual basis any actions taken to address the diversion of conventional arms to the illicit market.

Each State Party shall, within the first year after entry into force of this Treaty for that State Party, provide an initial report to States Parties of relevant activities undertaken in order to implement this Treaty; including inter alia, domestic laws, regulations and administrative measures. States Parties shall report any new activities undertaken in order to implement this Treaty, when appropriate. Reports shall be distributed and made public by the Implementation Support Unit.

Each State Party shall submit annually to the Implementation Support Unit by 31 May a report for the preceding calendar year concerning the authorization or actual transfer of items included in Article 2, Paragraph A1. Reports shall be distributed and made public by the Implementation Support Unit. The report submitted to the Implementation Support Unit may contain the same type of information submitted by the State Party to other relevant UN bodies, including the UN Register of Conventional Arms. Reports will be consistent with national security sensitivities or be commercially sensitive.

ARTICLE 12
ENFORCEMENT

Each State Party shall adopt national legislation or other appropriate national measures regulations and policies as may be necessary to implement the obligations of this Treaty.

ARTICLE 13
IMPLEMENTATION SUPPORT UNIT

This Treaty hereby establishes an Implementation Support Unit to assist States Parties in its implementation.
The ISU shall consist of adequate staff, with necessary expertise to ensure the mandate entrusted to it can be effectively undertaken, with the core costs funded by States Parties.
The implementation Support Unit, within a minimized structure and responsible to States Parties, shall undertake the responsibilities assigned to it in this Treaty, inter alia:
Receive distribute reports, on behalf of the Depository, and make them publicly available;
Maintain and Distribute regularly to States Parties the up-to-date list of national contact points;
Facilitate the matching of offers and requests of assistance for Treaty implementation and promote international cooperation as requested;
Facilitate the work of the Conference of States Parties, including making arrangements and providing the necessary service es for meetings under this Treaty; and
Perform other duties as mandated by the Conference of States Parties.

ARTICLE 14
INTERNATIONAL COOPERATION

States Parties shall designate national points of contact to act as a liaison on matters relating to the implementation of this Treaty.
States Parties shall cooperate closely with one another, as appropriate, to enhance the implementation of this Treaty consistent with their respective security interests and legal and administrative systems.

States Parties are encouraged to facilitate international cooperation, including the exchange of information on matters of mutual interest regarding the implementation and application of this Treaty in accordance with their national legal system. Such voluntary exchange of information may include, inter alia, information on national implementation measures as well as information on specific exporters, importers and brokers and on any prosecutions brought domestically, consistent with commercial and proprietary protections and domestic laws, regulations and respective legal and administrative systems.

4. Each State Party is encouraged to maintain consultations and to share information, as appropriate, to support the implementation of this Treaty, including through their national contact points.

5. States Parties shall cooperate to enforce the provisions of this Treaty and combat breaches of this Treaty, including sharing information regarding illicit activities and actors to assist national enforcement and to counter and prevent diversion. States Parties may also exchange information on lessons learned in relation to any aspect of this Treaty, to develop best practices to assist national implementation.

Article 15
International Assistance

In fulfilling the obligation of this Treaty, States Parties may seek, inter alia, legal assistance, legislative assistance, technical assistance, institutional capacity building, material assistance or financial assistance. States, in a position to do so, shall provide such assistance. States Parties may contribute resources to a voluntary trust fund to assist requesting States Parties requiring such assistance to implement the Treaty.

States Parties shall afford one another the widest measure of assistance, consistent with their respective legal and administrative systems, in investigations, prosecutions and judicial proceedings in relation to the violations of the national measures implemented to comply with obligations under of the provisions of this Treaty.

Each State Party may offer or receive assistance, inter alia, through the United Nations international, regional, subregional or national organizations, non-governmental organizations or on a bi-lateral basis. Such assistance may include technical, financial, material and other forms of assistance as needed, upon request.

Article 16
Signature, Ratification, Acceptance, Approval or Accession

This Treaty shall be open for signature on [date] at the United Nations Headquarters in New York by all States and regional integration organizations.
This Treaty is subject to ratification, acceptance or approval of the Signatories.
This Treaty shall be open for accession by any state and regional integration organization that has not signed the Treaty.

4. The instruments of ratification, acceptance, approval or accession shall be deposited with the Depositary.

5. The Depositary shall promptly inform all signatory and acceding States and regional integration organizations of the date of each signature, the date of deposit of each instrument of ratification, acceptance, approval or accession and the date of the entry into force of this Treaty, and of the receipt of notices.

6. “Regional integration organization” shall mean an organization constituted by sovereign States of a given region, to which its Member States have transferred competence in respect of matters governed by this Treaty and which has been duly authorized, in accordance with its internal procedures, to sign, ratify, accept, approve or accede to it.

7. At the time of its ratification, acceptance, approval or accession, a regional integration organization shall declare the extent of its competence with respect to matters governed by this Treaty. Such organizations shall also inform the Depositary of any relevant modifications in the extent of it competence.

8. References to “State Parties” in the present Treaty shall apply to such organizations within the limits of their competence.

Article 17
Entry into Force

This Treaty shall enter into force thirty days following the date of the deposit of the sixty-fifth instrument of ratification, acceptance or approval with the Depositary.

For any State or regional integration organization that deposits its instruments of accession subsequent to the entry into force of the Treaty, the Treaty shall enter into force thirty days following the date of deposit of its instruments of accession.

For the purpose of Paragraph 1 and 2 above, any instrument deposited by a regional integration organization shall not be counted as additional to those deposited by Member States of that organization.

Article 18
Withdrawal and Duration

This Treaty shall be of unlimited duration.

Each State Party shall, in exercising its national sovereignty, have the right to withdraw from this Convention. It shall give notice of such withdrawal to all other States Parties from this Convention. It shall give notice of such withdrawal to all other States Parties and to the Depositary. The instrument of withdrawal shall include a full explanation of the reasons motivating this withdrawal.

A state shall not be discharged, by reason of its withdrawal, from the obligations arising from this treaty while it was a party to the Treaty, including any financial obligations, which may have accrued.

Article 19
Reservations

Each State party, in exercising its national sovereignty, may formulate reservations unless the reservation is incompatible with the object and purpose of this Treaty.

Article 20
Amendments

At any time after the Treaty’s entry into force, a State Party may propose an amendment to this Treaty.

Any proposed amendment shall be submitted in writing to the Depository, which will then circulate the proposal to all States Parties, not less than 180 days before next meeting of the Conference of States Parties. The amendment shall be considered at the next Conference of States Parties if a majority of States Parties notify the Implementation Support Unit that they support further consideration of the proposal no later than 180 days after its circulation by the Depositary.

Any amendment to this Treaty shall be adopted by consensus, or if consensus is not achieved, by two-thirds of the States Parties present and voting at the Conference of States Parties. The Depositary shall communicate any amendment to all States Parties.

A proposed amendment adopted in accordance with Paragraph 3 of this Article shall enter into force for all States Parties to the Treaty that have accepted it, upon deposit with the Depositary. Thereafter, it shall enter into force for any remaining State Party on the date of deposit of its instrument of accession.

Article 21
Conference of States Parties

The Conference of States Parties shall be convened not later than once a year following the entry into force of this Treaty. The Conference of States Parties shall adopt rules of procedure and rules governing its activities, including the frequency of meetings and rules concerning payment of expenses incurred in carrying out those activities.

The Conference of States Parties shall:
a. Consider and adopt recommendations regarding the implementation of this Treaty, in particular the promotion of its universality; TR

b. Consider amendments to this Treaty;

c. Consider and decide the work and budget of the Implementation Support Unit;

d. Consider the establishment of any subsidiary bodies as may be necessary to improve the functioning of the Treaty;

e. Perform any other function consistent with this Treaty.

3. If circumstances merit, an exceptional meeting of the State Parties may be convened if required and resources allow.

Article 22
Dispute Settlement

States Parties shall consult and cooperate with each other to settle any dispute that may arise with regard to the interpretation or application of this Treaty.
States Parties shall settle any dispute between them concerning the interpretation or application of this Treat though negotiations or other peaceful means of the Parties mutual choice.
States Parties may pursue, by mutual consent, third party arbitration to settle any dispute between them, regarding issues concerning the implementation of this Treaty.

Article 23
Relations with States not party to this Treaty

States Parties shall apply Articles 3-5 to all transfers of conventional arms within the scope of this Treaty to those not party to this Treaty.

Article 24
Relationship with other instruments

States Parties shall have the right to enter into agreements on the trade in conventional arms with regards to the international trade in conventional arms, provided that those agreements are compatible with their obligations under this Treaty and do not undermine the objects and purposes of this Treaty.

Article 25
Depositary and Authentic Texts

The Secretary-General of the United Nations is the Depositary of this Treaty.
The original text of this Treaty, of which the Arabic, Chinese, English, Russian and Spanish texts are equally authentic.

(Emphasis in bold added by this author for help in analysis)

Aaron Dykes
July 26, 2012

SOURCE: InfoWars.com

Undercover Reporter Infiltrates Security Firm to Expose London Olympics

Undercover Reporter Infiltrates Security Firm to Expose London Olympics

Highlights: Foreign troops drafted in; drug deals in training classroom; ineffective screening processes and detection technology; photographs of sensitive mock-up screening areas taken by un-screened trainees; 200k ‘casket linings’ delivered; uniforms being stolen; plan for an evacuation of London; drones on-line (incl. armed); poor standard of security recruits — cant speak English.

Exclusive interview with investigative journalist Lee Hazledean who is training undercover as a security guard for the London olympics with private security firm G4S. Lee is a filmmaker and investigative TV journalist. He has also been involved in major stories on the IRA and how British Army infiltrated the organisation and carried out false flag operations. He has managed to get undercover as part of the security team at the 2012 Olympics with G4S. He has found there is a media black out on all major news outlets to do with the Olympics unless the story is broken in a news paper or foreign news agency it’s unlikely to see the light of day. Security training and officers are so appaling that the safety and security of the London 2012 Olympics are in jeopardy.

A few example’s: During an exercise he was asked to pose as a would-be terrorist and managed to get knives, guns and IED’s through security screening on every occasion and every exercise. The X-Ray operators have only two days of training, they aren’t trained properly and miss the most obvious prohibited items gun’s, knives, IED’s, ammunition etc. Bag and physical searchers again are missing dangerous weapons, trainees can’t use vital security equipment like the HHMD (Hand Held Metal detectors) they can’t even communicate properly with the public on a basic level. Worryingly the ‘Rapiscan’ walk through metal detectors don’t work properly and aren’t sensitive enough to pick up large knives, ammunition and other metallic threats. He was told that they would be set to go off only after 50 people have walked through to limit queuing time and to get spectators into the venue. So a Terrorist if they basically queued up would probably get through wearing a suicide vest. In classes there are drug deals going down, people can’t speak any English. People who haven’t even completed their SIA licenses yet are being picked to be Team Leaders over highly trained security officers, ex soldiers and ex police. Lee is concerned that weapons or worse will be getting into the games. However, what’s more disturbing is that uniforms are already going missing or being stolen. The training facility is an accurate mock-up of the actual security measures at the Olympic venues. Lee has witnessed several people taking photos on their mobile phones in the training facility and whilst they have been a few people caught by trainers most aren’t noticed. We know that terrorists take surveillance photos to gain intelligence. Contemporary International claim that they have mobile phone ‘jammers’ in the facility, however trainers admitted to Lee that there were no ‘jammers’ at all, it was a verbal deterrent.

Also there are plans for the evacuation of London, G4S are going to be at the forefront, as well as 100,000 troops coming in via Woolwich barracks made up of regular British Forces, American regular army and European troops. Lee was not told why there would be any need for an evacuation of the whole of London, they just said it was to be a “defining moment in the history of London”. This could just be a precaution but the public should be made aware of the foreign invasion which is taking place right now. The troops are being held across London in various barracks once they’ve been through Woolwich. Lee also had this information confirmed by an army doctor who was shocked at all the foreign troops coming into London. There is also a shipment of what are being described as casket linings, each casket can hold four or five people and 200,000 casket linings have been delivered we believe from America. Also we were shown videos of drones attacking targets in Afghanistan and were told that drones will be patrolling the sky’s over London during the Olympics carrying out surveillance and search and destroy missions if necessary.

London 2012 Olympics: ‘Missiles Left Unguarded’ Outside East London Flats:-
www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9243658/London-201…

London 2012 Olympics: Public Given Access to Blackheath Anti-aircraft Missile Launcher:-
www.telegraph.co.uk/news/uknews/defence/9254072/London-2012-Olympics-p…

The Link Between Olympics’ Security and FEMA Concentration Camps:-
www.luikkerland.com/the-cockaigne-times/2012/06/07/the-link-between-ol…

Source:-
bcfm.org.uk/2012/06/22/17/friday-drivetime-76/18658

How To Hack Satellite Internet & Surf Anonymously

How To Hack Satellite Internet & Surf Anonymously

 

A Spanish researcher demos new satellite-hijacking tricks with cybercriminal potential.

Satellites can bring a digital signal to places where the Internet seems like a miracle: off-the-grid desert solar farms, the Arctic or an aircraft carrier at sea. But in beaming data to and from the world’s most remote places, satellite Internet may also offer its signal to a less benign recipient: any digital miscreant within thousands of miles.

In a presentation at the Black Hat security conference in Arlington, Va., Tuesday, Spanish cybersecurity researcher Leonardo Nve presented a variety of tricks for gaining access to and exploiting satellite Internet connections. Using less than $75 in tools, Nve, a researcher with security firm S21Sec, says that he can intercept Digital Video Broadcast (DVB) signals to get free high-speed Internet. And while that’s not a particularly new trick–hackers have long been able to intercept satellite TV or other sky-borne signals–Nve also went a step further, describing how he was able to use satellite signals to anonymize his Internet connection, gain access to private networks and even intercept satellite Internet users’ requests for Web pages and replace them with spoofed sites.

“What’s interesting about this is that it’s very, very easy,” says Nve. “Anyone can do it: phishers or Chinese hackers … it’s like a very big Wi-Fi network that’s easy to access.”

In a penetration test on a client’s network, Nve used a Skystar 2 PCI satellite receiver card, a piece of hardware that can be bought on eBay ( EBAY – news – people ) for $30 or less, along with open source Linux DVB software applications and the network data analysis or “sniffing” tool Wireshark.

Exploiting that signal, Nve says he was able to impersonate any user connecting to the Internet via satellite, effectively creating a high-speed, untraceable anonymous Internet connection that that can be used for nefarious online activities.

Nve also reversed the trick, impersonating Web sites that a satellite user is attempting to visit by intercepting a Domain Name System (DNS) request–a request for an Internet service provider (ISP) to convert a spelled out Web site name into the numerical IP address where it’s stored–and sending back an answer faster than the ISP. That allows him to replace a Web site that a user navigates to directly with a site of his choosing, creating the potential for undetectable cybercrime sites that steal passwords or installs malicious software.

In his tests on the client’s network, Nve says he was also able to hijack signals using GRE or TCP protocols that enterprises use to communicate between PCs and servers or between offices, using the connections to gain access to a corporation or government agency’s local area network.

The Barcelona-based researcher tested his methods on geosynchronous satellites aimed at Europe, Africa and South America. But he says there’s little doubt that the same tricks would work on satellites facing North America or anywhere else.

What makes his attacks possible, Nve says, is that DVB signals are usually left unencrypted. That lack of simple security, he says, stems from the logistical and legal complications of scrambling the signal, which might make it harder to share data among companies or agencies and–given that a satellite signal covers many countries–could run into red tape surrounding international use of cryptography. “Each [country] can have its own law for crypto,” says Nve. “It’s easier not to have encryption at the DVB layer.”

Nve isn’t the first to show the vulnerability of supposedly secure satellite connections. John Walker, a British satellite enthusiast, told the BBC in 2002 that he could watch unencrypted NATO video feeds from surveillance sorties in the Balkans. And the same lack of encryption allowed insurgents to hack into the video feed of unmanned U.S. drone planes scouting Afghanistan, the Wall Street Journal reported in December.

In fact, the techniques that Nve demonstrated are probably known to other satellite hackers but never publicized, says Jim Geovedi, a satellite security researcher and consultant with the firm Bellua in Indonesia. He compares satellite hacking to early phone hacking or “phreaking,” a practice that’s not well protected against but performed by only a small number of people worldwide. “This satellite hacking thing is still considered blackbox knowledge,” he wrote in an e-mail to Forbes. “I believe there are many people out there who conduct similar research. They may have some cool tricks but have kept them secret for ages.”

At last year’s Black Hat D.C. conference, British cybersecurity researcher Adam Laurie demonstrated how he intercepts satellite signals with techniques similar to Nve, using a DreamBox satellite receiver and Wireshark. But Nve argues that his method is far cheaper–Laurie’s DreamBox setup cost around $750–and that he’s the first to demonstrate satellite signal hijacking rather than mere interception.

“I’m not just talking about watching TV,” says Nve. “I’m talking about doing some very scary things.”

 

 

At 12:57 PM, Anonymous satellite_hacker said…

Satellite hacking for fun isn’t cheap! One of the sessions I was really looking forward to ahead of the Black Hat DC event this year was Adam Laurie’s session titled – Satellite Hacking for Fun and Profit.

It’s a session that didn’t disappoint, Laurie is always entertaining, but it also revealed how much effort is actually required to try and get at satellite signals.

First off, Laurie prefaced his talk by noting that he wasn’t going to talk about hacking the actual satellite in space itself.

“I’m playing it safe and just looking at what is coming down,” Laurie told the Black Hat audience.

Instead what Laurie focused his talk on was something he called ‘Feed Hunting’ – that is looking for satellite feeds that are not supposed to be found. Laurie claimed that he has been doing satellite feed hunting for years – at least as far back as the untimely demise of the late Princess Diana in 1997. Laurie claimed that he was able to find a non-public feed from a TV broadcaster that had left their transponder on in a Paris hotel room.

Fast forward a dozen years and Laurie commented that the technology to identify satellite feeds has progressed dramatically. Among the reasons why he satellite feed hunting has gotten easier is an open source based satellite received called the dreambox.

Laurie explained that the dreambox has a web interface that makes it easier to find streams and provides information on what the stream includes. Another open source technology also helps to feed hunt satellite content.

A project called dvbsnoop is a DVB (dIgital video broadcasting) and MPEG stream analyzer that lets the user access raw data from DVB card. By sifting through the raw data, Laurie demonstrated that interesting satellite feeds that weren’t intended to be public could be found.

Going a step further, Laurie claimed that he had created his own python based script called dreaMMap that could create a 3d model of satellite frequency transmissions. With the 3D model the user just does a point and click to steer dish to a particular satellite frequency. One memory of the Black Hat audience asked Laurie if what he was doing was legal. Laurie shrugged and commented:

“I’m in the US giving a talk where I’m tunneled to my server in the UK and looking at a satellite in space that is over Africa – so who would get me?”

All told there is a financial cost to Laurie’s satellite feed hunting techniques – and that cost is approximately $785 for the Dreambox hardware, the actual satellite dish and then the motor and the mount for the dish. Well I guess if you’ve got the money to burn…

SOURCE: Satellite Internet Blog

VPN vs. SSH Tunnel: Which Is More Secure?

VPN vs. SSH Tunnel: Which Is More Secure?

image

VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works.

An SSH tunnel is often referred to as a “poor man’s VPN” because it can provide some of the same features as a VPN without the more complicated server setup process – however, it has some limitations.

How a VPN Works

VPN stands for “virtual private network,” – as its name indicates, it’s used for connecting to private networks over public networks, such as the Internet. In a common VPN use case, a business may have a private network with file shares, networked printers, and other important things on it. Some of the business’s employees may travel and frequently need to access these resources from the road. However, the business doesn’t want to expose their important resources to the public Internet. Instead, the business can set up a VPN server and employees on the road can connect to the company’s VPN. Once an employee is connected, their computer appears to be part of the business’s private network – they can access file shares and other network resources as if they were actually on the physical network.

The VPN client communicates over the public Internet and sends the computer’s network traffic through the encrypted connection to the VPN server. The encryption provides a secure connection, which means the business’s competitors can’t snoop on the connection and see sensitive business information. Depending on the VPN, all the computer’s network traffic may be sent over the VPN – or only some of it may (generally, however, all network traffic goes through the VPN). If all web browsing traffic is sent over the VPN, people between the VPN client and server can’t snoop on the web browsing traffic. This provides protection when using public Wi-Fi networks and allows users to access geographically-restricted services – for example, the employee could bypass Internet censorship if they’re working from a country that censors the web. To the websites the employee accesses through the VPN, the web browsing traffic would appear to be coming from the VPN server.

Crucially, a VPN works more at the operating system level than the application level. In other words, when you’ve set up a VPN connection, your operating system can route all network traffic through it from all applications (although this can vary from VPN to VPN, depending on how the VPN is configured). You don’t have to configure each individual application.

To get started with your own VPN, see our guides to using OpenVPN on a Tomato router, installing OpenVPN on a DD-WRT router, or setting up a VPN on Debian Linux.

How an SSH Tunnel Works

SSH, which stands for “secure shell,” isn’t designed solely for forwarding network traffic. Generally, SSH is used to securely acquire and use a remote terminal session – but SSH has other uses. SSH also uses strong encryption, and you can set your SSH client to act as a SOCKS proxy. Once you have, you can configure applications on your computer – such as your web browser – to use the SOCKS proxy. The traffic enters the SOCKS proxy running on your local system and the SSH client forwards it through the SSH connection – this is known as SSH tunneling. This works similarly to browsing the web over a VPN – from the web server’s perspective, your traffic appears to be coming from the SSH server. The traffic between your computer and the SSH server is encrypted, so you can browse over an encrypted connection as you could with a VPN.

However, an SSH tunnel doesn’t offer all the benefits of a VPN. Unlike with a VPN, you must configure each application to use the SSH tunnel’s proxy. With a VPN, you’re assured that all traffic will be sent through the VPN – but you don’t have this assurance with an SSH tunnel. With a VPN, your operating system will behave as though you’re on the remote network – which means connecting to Windows networked file shares would be easy. It’s considerably more difficult with an SSH tunnel.

For more information about SSH tunnels, see this guide to creating an SSH tunnel on Windows with PuTTY. To create an SSH tunnel on Linux, see our list of cool things you can do with an SSH server.

Which Is More Secure?

If you’re worried about which is more secure for business use, the answer is clearly a VPN — you can force all network traffic on the system through it. However, if you just want an encrypted connection to browse the web with from public Wi-Fi networks in coffee shops and airports, a VPN and SSH server both have strong encryption that will serve you well.

There are other considerations, too. Novice users can easily connect to a VPN, but setting up a VPN server is a more complex process. SSH tunnels are more daunting to novice users, but setting up an SSH server is simpler – in fact, many people will already have an SSH server that they access remotely. If you already have access to an SSH server, it’s much easier to use it as an SSH tunnel than it is to set up a VPN server. For this reason, SSH tunnels have been dubbed a “poor man’s VPN.”

Businesses looking for more robust networking will want to invest in a VPN. On the other hand, if you’re a geek with access to an SSH server, an SSH tunnel is an easy way to encrypt and tunnel network traffic – and the encryption is just as good as a VPN’s encryption.

 

SOURCE: HowToGeek.com

Three NSA Whistleblowers Back EFF’s Lawsuit Over Government’s Massive Spying Program

Three NSA Whistleblowers Back EFF’s Lawsuit Over Government’s Massive Spying Program

EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed

San Francisco – Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation’s (EFF’s) lawsuit against the government’s illegal mass surveillance program, Jewel v. NSA.

In a motion filed today, the three former intelligence analysts confirm that the NSA has, or is in the process of obtaining, the capability to seize and store most electronic communications passing through its U.S. intercept centers, such as the “secret room” at the AT&T facility in San Francisco first disclosed by retired AT&T technician Mark Klein in early 2006.

“For years, government lawyers have been arguing that our case is too secret for the courts to consider, despite the mounting confirmation of widespread mass illegal surveillance of ordinary people,” said EFF Legal Director Cindy Cohn. “Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We’re extremely pleased that more whistleblowers have come forward to help end this massive spying program.”

The three former NSA employees with declarations in EFF’s brief are William E. Binney, Thomas A. Drake, and J. Kirk Wiebe. All were targets of a federal investigation into leaks to the New York Times that sparked the initial news coverage about the warrantless wiretapping program. Binney and Wiebe were formally cleared of charges and Drake had those charges against him dropped.

Jewel v. NSA is back in district court after the 9th U.S. Circuit Court of Appeals reinstated it in late 2011. In the motion for partial summary judgment filed today, EFF asked the court to reject the stale state secrets arguments that the government has been using in its attempts to sidetrack this important litigation and instead apply the processes in the Foreign Intelligence Surveillance Act that require the court to determine whether electronic surveillance was conducted legally.

“The NSA warrantless surveillance programs have been the subject of widespread reporting and debate for more than six years now. They are just not a secret,” said EFF Senior Staff Attorney Lee Tien. “Yet the government keeps making the same ‘state secrets’ claims again and again. It’s time for Americans to have their day in court and for a judge to rule on the legality of this massive surveillance.”

For the full motion for partial summary judgment:
https://www.eff.org/document/plaintiffs-motion-partial-summary-judgment

For more on this case:
https://www.eff.org/cases/jewel

Contacts:

Cindy Cohn
Legal Director
Electronic Frontier Foundation
[email protected]

Lee Tien
Senior Staff Attorney
Electronic Frontier Foundation
[email protected]

Related Cases

Attention Activists: Your Phone May Not Be Safe at Protests

Attention Activists: Your Phone May Not Be Safe at Protests

Ever wondered why your cell phone reception suddenly becomes terrible at protests? Ever worried that police could use electronic spoofing devices to suck up your mobile data because you are in the streets exercising your rights?

You might have been onto something.

Mobile “IMSI catchers”, currently on the market and being pushed to police and intelligence agencies worldwide, enable these creepy, stealth spying tactics. And if they build it and hawk it, history tells us police will buy it and deploy it.

On Tuesday, July 3, 2012, electronic privacy advocate and technology researcher Chris Soghoian tweeted a link to a photograph of a talk he gave at TED in Scotland in late June. Behind him in the photograph is another image, this one taken by privacy researcher Eric King at a surveillance trade show. (King’s Twitter bio contains a quote from a representative of the notorious ISS World — a global surveillance trade firm that often hosts such trade shows: the rep called him an “Anti-lawful interception zealot blogger.” High praise.)

Look at the slide behind Soghoian; that’s the photo in question. It shows an IMSI catcher strapped onto a model, under the model’s shirt.

IMSI stands for “International Mobile Subscriber Identity”. The technology is essentially a mobile phone tower with “a malicious operator”. It mimics the behavior of a cell tower and tricks mobile phones into sending data to it, instead of to the tower.

As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones.

Once it has made a connection with the phone and tricked it into thinking it is a mobile tower, the IMSI catcher forces the phone to drop its encryption, enabling easy access to the contents of the device. The tool then lets the attacker listen in on mobile conversations and intercept all data sent from a mobile phone, remaining undetected. In some cases the tool also allows the operator to manipulate messages.

Here’s a creepy video that a purveyor of IMSI catchers made to advertise its product:

Please note that by playing this clip YouTube and Google will place a long term cookie on your computer.

Police in the United States claim they do not need a warrant to use an IMSI catcher or other spoofing device to track your location. A case to determine whether or not the courts agree is working itself through the system.

Privacy International’s Eric King took the photo on the slide behind Soghoian at a surveillance trade show, where he says the tool was “pitched to me as being perfect for covert operations in public order situations.” In other words, at protests. 

 

The FBI uses IMSI catchers and claims it does so legally, even though it says it doesn’t need a warrant to deploy them. The Electronic Privacy Information Center is currently pursuing FOIA litigation to find out exactly how the bureau uses the “Stingray” (a brand name IMSI catcher); unsurprisingly, the FBI wasn’t forthcoming with documents to reveal its legal standard or other information about how it uses the tool. Stay tuned for more information as that case makes its way through the courts.

Meanwhile, how can you protect yourself against IMSI catchers? Unfortunately, you probably can’t. And the threats are not just from government. As Soghoian and others warned in a friend of the court brief,

Finally, the communications privacy of millions of law-abiding Americans is already threatened by the use of this and similar interception technologies by non-US government entities, such as stalkers, criminals, and foreign governments engaged in espionage. As such, the public interest is best served by greater public discussion regarding these tracking technologies and the security flaws in the mobile phone networks that they exploit, not less.

Yet again, we are faced with a situation in which our technology has outpaced our law reform. It’s time for Congress to change that.


To get a more detailed sense of how the technology actually works, watch this excellent talk from DefCon 2011, with Chris Paget: “Practical Cellphone Spying”. He spoofs the phones of the people in the audience during the talk; it’s well worth watching if you have some time.

 

For more on IMSI catchers and the state of the law, click here.

 

SOURCE: PrivacySOS

Make it Happen 2012 – Anonymous Transmission

Make it Happen 2012 – Anonymous Transmission

Protesting, Police Violence, Transparency, Global Government, all being manipulated against Humanity’s interests.  2012 is the year we take back our FREEDOMS.

We do not forgive

We do not forget

We are legion

Expect us

 

 

Election Riggers Exposed: So Black Box Voting Gets DMCA Threat from Accenture

Election Riggers Exposed: So Black Box Voting Gets DMCA Threat from Accenture

From: “Bev Harris” <bev[at]blackboxvoting.org>
Date: Sun, 24 Jun 2012 10:30:03 -0400
Subject: Accenture hits BBV with Cease & Desist Demand

To support the work of Black Box Voting: http://www.blackboxvoting.org/donate.html
You can discuss this here: http://www.bbvforums.org/​forums/messages/8/82118.html

Amazingly, Accenture, which sold its crap-on-a-stick high-school sophomoric completely insecure malfunctioning voter registration software to a bunch of states, so unsuccessfully that Colorado refused to pay and others, like Wisconsin and Shelby County, bought out the source code in order to try to bandaid it into a functional system, has decided to issue a cease and desist against Black Box Voting for exposing its flawed software to the public.

Last time a voting system company did a DMCA takedown notice (Diebold, in 2004) it got socked with punitive charges for abusing the Digital Millennium Copyright Act, trying to use it to block distribution of material clearly published in the public interest.

If you want a copy of the voter registration software I posted Thursday, might as well get it right now — and mirror it, torrent it, dropbox it, or whatever. I’ll probably pull it down by June 27, not because their claim is valid, but because there are higher priorities for spending my time during this election season and thanks to Slashdot and some pals in Europe, this software has now been widely mirrored elsewhere.

Here is the DMCA issued to Black Box Voting:

Date: Fri, 22 Jun 2012 17:17:41 -0400 (EDT)
From: Rackspace AUP Team
Subject: Please Review Immediately – DMCAHello,

We have received a notice pursuant to the Digital Millennium Copyright Act (“DMCA”) from Accenture Global Services Ltd regarding certain content appearing at the above-referenced website (the “Website”). A copy of this notice has been sent to you via email at [redacted]. This company alleges that material posted on your company’s website infringes on their copyright. Please remove the content claimed to be infringing from the Website and confirm to me in writing that you have done so by 8:00 A.M. Central Time, 6/27/2012. If the allegedly infringing content is not removed and/or I have not received your written confirmation by that time, Rackspace will suspend network access to the server(s) hosting the Website.

Please note that you may provide a counter notification, stating that the posted material is not infringing the alleged copyright, in accordance with the provisions of 17 U.S.C. §512(g)(3) to Rackspace’s designated agent:

Director of Compliance
Rackspace Hosting

(Note that Rackspace is only doing what it’s required to do. They are a superb web hosting company, and have helped keep the Black Box Voting sites up and secure for many years now.)

After releasing it into the wild, we can all see that the system is hardly worth the $20 MILLION Accenture tried to charge the state of Colorado, with equally exhorbitant fees hitting taxpayers in other states and counties.

There are multiple possible explanations for how this system doubles and triples reported votes for some voters (oddly, in White Republican suburbs), and for why it likes to alter people’s political party and erase their voter history.

SUMMARY OF FINDINGS ON ACCENTURE’S VOTER REGISTRATION SYSTEM

Accenture’s “ESM” voter registration / voter history system is really just a bunch of Microsoft Access tables riddled with faulty joins, lacking referential integrity, and also open to malicious play using easily written hidden Visual Basic or Java scripts residing on any computer linked into it. It cannot be made secure without completely redesigning the architecture.

Watch “Hacking Democracy” (search it on YouTube) for a real-life example of how simple it is to bypass all passwords using a VBA script, to implement anything you want with hidden code commands in systems built on this platform, which is also used for the Diebold GEMS system.

Yah, so where is “Accenture Global Services” based out of anyway? It was the Cayman Islands. Or is it now another tax-evading corporate secrecy haven, used not only to avoid paying taxes but to prevent the American public from knowing anything about the creepy white men who control corporate ownership?

PERMISSION TO REPRINT GRANTED WITH LINK TO BLACKBOXVOTING.ORG

* * * * *

TWO WAYS TO SUPPORT BLACK BOX VOTING:
(1) With your mouth and your keyboard – talk about and reprint our important bulletins!
(2) With crucially important tax deductible donations (Monthly sponsorhips are the best way to keep us going!): http://www.blackboxvoting.org/donate.html or mail to:
Black Box Voting
330 SW 43rd St Suite K
PMB 547
Renton WA 98057

 


 

Hacking Democracy

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Hacking Democracy

The controversial electronic voting documentary
Directed by Simon Ardizzone
Russell Michaels
Produced by Simon Ardizzone
Russell Michaels
Robert Carrillo Cohen
Starring Bev Harris
Kathleen Wynne
Andy Stephenson
Harri Hursti
Herbert Hugh Thompson
Ion Sancho
Release date(s) November 2, 2006

DVD released March 27, 2007

Running time 82 minutes
Language English

Hacking Democracy is a 2006 documentary film by producer Robert Carrillo Cohen and producer / directors Russell Michaels and Simon Ardizzone, shown on HBO. Filmed over three years it documents American citizens investigating anomalies and irregularities with ‘e-voting‘ (electronic voting) systems that occurred during the 2000 and 2004 elections in the U.S.A., especially in Volusia County, Florida. The film investigates the flawed integrity of electronic voting machines, particularly those made by Diebold Election Systems, and the film culminates dramatically in the on-camera hacking of the in-use / working Diebold election system in Leon County, Florida.

In 2007 Hacking Democracy was nominated for an Emmy award for Outstanding Investigative Journalism.[1]

Contents

Demonstrated flaws

The documentary follows Bev Harris and Kathleen Wynne, director and associate director for nonprofit election watchdog group Black Box Voting, as they attempt to discover the extent to which it would be possible to alter results on the electronic voting machines of Diebold Election Systems (now Premier Election Solutions). Andy Stephenson, an employee of Black Box Voting from July-December 2004, assisted with comparisons of audit documents in Volusia County and obtained a secret videotape of Harris interviewing a voting machine testing lab. Kathleen Wynne captured live video of Harris finding voting machine records in a Volusia County trash bag, and captured video of Cuyahoga County elections workers admitting that the initial 3% recount ballots had not been randomly selected during the 2004 presidential election. Harris and Wynne then embarked on a series of five voting machine hack tests with Dr. Herbert Hugh Thompson and Harri Hursti in 2005 and 2006. During the course of the documentary, multiple methods of tampering with the votes are shown.

The first is through editing the database file that contains the voting totals. This file is a standard Microsoft Access database, and can be opened by normal means outside of the encompassing voting program without a password. Some jurisdictions have disabled Microsoft Access, making it more difficult to alter the database, but this protection was shown to be bypassed by Dr. Herbert Hugh Thompson through a Visual Basic program which searched for a string of text and edited the file through external means. However, alterations of the results in either of these fashions would be caught if a vigilant elections official compared the results with voting machine tapes.[2]

Another hacking technique was demonstrated through hacking the actual computer code used in the Diebold Accu-Vote memory cards. This method was discovered by Finnish computer security expert Harri Hursti and is known as “the Hursti Hack“. In this hack, Harri Hursti rigged the Diebold optical scan voting system to make the wrong candidate win by adding negative (minus) votes to one race. This resulted in that race having votes literally subtracted from its vote total. These methods were tested by the Leon County Supervisor of Elections, Ion Sancho, on the actual Diebold optical scan voting system used by Tallahassee, Florida in all their prior elections. This method demonstrated, contrary to a previous Diebold statement, that a person attempting to rig the votes of a precinct would need access to only the memory card, not the optical scan voting system or tabulation software. This method, when cross-checked between the optical scan voting system and tabulation software, appears legitimate, and further produces a false zero-vote print-out to verify that the memory card has no votes inside it before voting begins. Following this historic hack Ion Sancho stated: “If I had not known what was behind this I would have certified this election as a true count of a vote.”[2]

Reaction

Even though no one from Diebold Election Systems admitted to having seen the film,[3] Diebold President David Byrd suggested that Hacking Democracy was “replete with material examples of inaccurate reporting”, and demanded that it not be aired.[4][5] His criticism was based on an earlier film made by the same three filmmakers. However, HBO refused to remove it from their schedules. In addition Diebold wrote a letter to HBO referring to the famous vote changing ‘Hursti Hack’ featured in the film, stating that “Harri Hursti is shown attacking a Diebold machine in Florida. But his attack proved later to be a complete sham.”

California’s Secretary of State commissioned a Special Report by scientists at UC Berkeley to investigate the Hursti Hack. Page 2 of their report states:

Harri Hursti’s attack does work: Mr. Hursti’s attack on the AV-OS is definitely real. He was indeed able to change the election results by doing nothing more than modifying the contents of a memory card. He needed no passwords, no cryptographic keys, and no access to any other part of the voting system, including the GEMS election management server.

One of Diebold’s objections to the film was that it failed to mention that Avi Rubin, a Johns Hopkins computer science professor and vocal Diebold critic, may have a conflict of interest. Rubin at one point owned stock options in VoteHere, which sells auditing software and systems for voting machines. However, Rubin disposed of his stock options and withdrew from the VoteHere advisory board in August 2003, and says he had not had any meaningful contact since joining over two years before, except occasionally receiving press clippings.[6]

DVD release

The film was released on DVD on March 20, 2007. It includes deleted scenes, a trailer and director biographies.

See also

References

  1. ^ “The 28th Annual Emmy Awards for News & Documentary: The Nominations”. EmmyOnline.org. Retrieved 2007-11-17.
  2. ^ a b Interviews & Features | TVGuide.com[dead link]
  3. ^ “HBO defends “Hacking” from criticism”. Monsters & Critics.
  4. ^ Janofsky, Michael (2006-10-31). “Diebold demands that HBO cancel documentary on voting machines”. Bloomberg News. Retrieved 2006-11-03.
  5. ^ Lerer, Lisa (2006-11-01). “Diebold Gives HBO A Thumbs Down”. Forbes.
  6. ^ “Statement of Avi Rubin on Relationship with VoteHere Inc.”. Johns Hopkins University. 2003-08-17. Retrieved 2007-11-17.

External links

Reviews

Germans & Russians Used Fluoride to Make Prisoners ‘Stupid & Docile’

Germans & Russians Used Fluoride to Make Prisoners ‘Stupid & Docile’

“To whom it may concern: I, Oliver Kenneth Goff, was a member of the Communist Party and the Young Communist League from May 2, 1936 to October 9, 1939. During this period of time, I operated under the alias of John Keats and the number 18-B-2. My testimony before the Government is incorporated in Volume 9 of the Un-American Activities Report for the year 1939.
“While a member of the Communist Party, I attended Communist underground training schools outside the City of New York in the Bues Hall and 113 East Wells Street, Milwaukee, Wisconsin. The East Wells Street School operated under the name of the Eugene Debs School. Here, under the tutoring of Eugene Dennis, M. Sparks, Morris Chyilds, Jack Kling and others, we were schooled in the art of revolutionary overthrow of the established Government.

“We discussed quite thoroughly the fluoridation of water supplies and how we were using it in Russia as a tranquilizer in the prison camps. The leaders of our school felt that if it could be induced into the American water supply, it would bring about a spirit of lethargy in the nation; where it would keep the general public docile during a steady encroachment of Communism. We also discussed the fact that keeping a store of deadly fluoride near the water reservoir would be advantageous during the time of the revolution, as it would give us opportunity to dump this poison into the water supply and either kill off the populace or threaten them with liquidation, so that they would surrender to obtain fresh water.

“We discussed in these schools, the complete art of revolution: the seizure of the main utilities, such as light, power, gas and water, but it was felt by the leadership that if a program of fluoridating the water could be carried out in the nation, it would go a long way toward the advancement of the revolution.” Oliver Kenneth Goff, 1957

Matrix III – Volume Two – Use of Sodium Fluoride for Population Behaviour Control

“It is a matter of record that sodium fluoride has been used for behavior control of populations. In an “Address in reply to the Governor’s Speech to Parliament,” [Victorian Hanstard, August 12, 1987, Nexus, Aug/Sept 1995], Mr. Harley Rivers Dickinson, Liberal Party Member of the Victorian Parliament for South Barwon, Australia, made a statement on the historical use of fluorides for behaviour control.

“Mr. Dickinson reveals that, “At the end of the Second World War, the United States Government sent Charles Elliot Perkins, a research worker in chemistry, biochemistry, physiology and pathology, to take charge of the vast Farven chemical plants in Germany. While there, he was told by German chemists of a scheme which had been worked out by them during the war and adopted by the German General Staff. This scheme was to control the population in any given area through mass medication of drinking water. In this scheme, sodium fluoride will in time reduce an individual’s power to resist domination by slowly poisoning and narcotising a certain area of the brain, and will thus make him submissive to the will of those who wish to govern him. Both the Germans and the Russians added fluoride to the drinking water of prisoners of war to make them stupid and docile.”

“According to Chemical Engineering News in 1988, each year in the United States, 80,000 tons of hydrofluosilicic acid, 60,000 tons of sodium silicofluoride and 3,000 tons of sodium fluorides are put into public water supplies (Chemical Engineering News, Vol 66, August 1, 1988, pg. 39). In view of all known research, it would be safe and accurate to rephrase the previous sentence and say that each year the United States Government allows 143,000 tons of fluoride products to be added to public water supplies in order to numb, disempower, and render docile a large percentage of the population. Present estimates in 1995 run about 200,000 tons annually. Now, why on earth would any oligarchic group (a small group) want to do this to tens of millions of people, deliberately and knowingly?

“All of these fluoride chemicals are byproducts of the aluminum and chemical fertilization industries that are considered to be hazardous wastes by the EPA, says the scientific assessment of the health risks of fluorides in 1985 “omits 90% of the literature which suggests fluoride is a mutagen – causes cellular and genetic mutation.” (Water Fluoridation: A Case of Truth Decay). Several scientists in the United States and other countries have done research or written reports questioning the benefits of water fluoridation or suggesting health risks, were discouraged by their employers from actually publishing their findings.”

Anyone who questions the use of fluoride in the drinking water is labeled a nut case. Fluoride helps prevent tooth decay! I have been drinking bottled water for 30 years. In 1991, I woke up and besides researching the “Federal” Reserve, the IRS, the UN and other one world government mechanisms, I also began looking at the fluoride issue. In 1993, I had all the metal fillings removed from my teeth and my daughter’s. These metal fillings were replaced with gold; a very expensive undertaking. We also stopped using any products with fluoride, i.e. toothpaste, mouthwash and any application from our dentist. The difference in our dental health changed dramatically.

My mother, her brother and my grandparents (from Sicily) never used toothpaste in their lifetime, they used baking soda. Same as my father’s side of the family who came over from Munich. Both sets of grandparents died with all their teeth and never had gum disease. My mom and my uncle both have their own teeth, no bridges, no root canals, no gum disease. To this day, they use baking soda. They live in areas where the water has never been fluoridated. My four brothers and sisters have all had gum disease to some degree and huge problems with their teeth. They all use products with fluoride, all have metal fillings and two of them still drink tap water. I find these differences interesting.

Some may think it’s just a bunch of conspiracy fodder, but having read thousands of pages from hundreds of documents, both historical and from research, there’s no doubt in my mind that fluoride is deadly and explains much about why Americans are so apathetic and lethargic about the very real dangers crushing our Republic. The American people simply have no will to resist and you can see it all across this country. Fluoride was introduced into the drinking water in this country around 1954. Think about it. Add into the mix the millions of gallons of diet soda pop consumed by Americans every day, ingesting deadly aspartame, also contained in more than 5,000 food products being eaten everyday, along with Splenda to “sweeten” and what you have is a population loading their bodies with deadly poisons. See the video ‘Sweet Misery’

While I haven’t drank more than a half dozen cans of soda in my entire life, I did use toothpaste and mouthwash which contains fluoride until 1993 when I made major changes. Everyday I thank God for my good health, but I also have worked very hard at staying healthy and keeping my weight within seven pounds from the day I graduated from high school. It’s not easy, but it all boils down to will power, self control and a desire not to be a burden to myself or my family in my later years.

Education is everything. Research means giving up your fun times to thoroughly explore an issue. I have taken the time to scan several documents which contain thoroughly researched documentation and data on fluoride. Dentists all across this country will tell you that fluoride is good for your teeth and gums. City fathers will continue to tell you fluoridating the drinking water is good for you. Most of them refuse to even look at all the scientific research that’s available. Thousands of cities across this country fluoridate their water. Conversely, hundreds of of cities in the U.S. refuse to fluoridate their water and dozens of countries refuse to poison their citizenry by fluoridating their water supply.

For the sake of your health and your family, I urge you to take the time to read all this important, fully documented research. You will see the major players and recognize names and companies (like Alcoa) who have been involved in this fluoride scam for decades. Americans deserve the truth and they deserve accurate information so they can make informed choices. Also, read the book The Fluoride Deception.

Click here to my Reading Room and you will see the section on fluoride. Read on-line or print out the 73 pages and share it with others. Friendly advice: keep your body free of toxic poisons – no matter how “good” you think it tastes. In my humble opinion, if the FDA says it’s okay, that’s the product to keep out of your body. Go natural!

http://www.westonaprice.org/envtoxins/fluoridationfraud.html

http://www.newswithviews.com/Devvy/kidd102.htm
© 2005 Devvy Kidd – All Rights Reserved

NASA Scientists And Astronauts Tell The World Aliens Do Exist (Video)

NASA Scientists And Astronauts Tell The World Aliens Do Exist (Video)

Recently, I published an article titled Proof Aliens Do Exist, Two Leaked Videos, following up on this topic, I have compiled a few videos in this post that show staff from NASA who say they will testify in front of congress that they personally saw pictures of UFOs and an extraterrestrial base on the moon, and Astronauts saying aliens and UFO are real.

http://www.youtube.com/watch?v=x2qaZFC2PtM

This second one is Buzz him self explaining his personal experience with a UFO in space during one of the Apollo missions.

The third one is one some might not know of Edgar Mitchell who actually explains that the aliens he saw were the stereotypical “Grey” aliens

http://www.youtube.com/watch?v=mVV6u-Y2XZU

To me it is pretty hard to give an argument against them given the circumstances revolving around who these people are. They are not your average Joe from the farm down the street who says he saw a UFO. I think lots of times these are dismissed because these videos are scattered around the web. There isn’t many places on the web that has a compilation of high profile people saying that UFOs and aliens are real, let alone found else where in society. Most of the ones I found on the web have some obvious fake stuff mixed in which then gets people confused about the real ones.

My goal is to really start compiling more of these things that really seem like to be the real thing. When things are spelled out for people, it is a lot easier to connect the dots. But then again, if all the dots were already connected, what would then be the point of discovering something new?

Here is one last video about the moon. Some people believe it to be constructed by aliens. Maybe on the next post I will dive deeper into this interesting theory. There is one fact I did find interesting though on a website called pureinsight.org, there is a paragraph that says:

“The average distance between the earth and the moon is 380,000 km, and between the sun and the earth is about 150,000,000 km. The latter is about 395 times further than the former. The diameter of the sun is about 1,380,000 km, while that of the moon is 3,400 km; the ratio of the two is again 395 times greater. Both ratios are 395. Could it be a coincidence? What does it mean?”

Very interesting fact. I didn’t know that. I checked this with this website www.physicsforums.com and it confirms it.

Very interesting stuff to say the least. Anyway I will that will leave that one for next time.

Apollo Belenus is the Paranormal editor for Before its News,

Follow on Twitter: @B4INparanormal

 

RELEASED: Alan Turing Notes on Cryptography

RELEASED: Alan Turing Notes on Cryptography

Are there any insights left to be wrung from the code breaker’s papers?

Chris Vallance of the BBC reports that GCHQ has released some of Alan Turing’s papers on the theory of code breaking. They’re not on display at the National Archives at Kew. I’ve checked the web pages of the Archives and GCHQ, and there is as of my writing nothing up there, yet.

The two papers are titled, The Applications of Probability to Crypt” and Paper on the Statistics of Repetitions. They discuss the use of mathematics to cryptanalysis. This might seem a bit obvious now, but at the time cryptanalysis was largely done by smart people and not by machines. A code-breaker was more likely someone who was good at solving complex crossword puzzles than working with numbers. It was unusual to bring in someone like Turing to a cryptology lab.

It wasn’t until machine cryptography was developed after WWI that codes were developed that were so complex humans couldn’t break them. The Enigma machine is the most famous, but there were others used all around the world.

However, using statistics has been a staple of code-breakers for centuries. It was used by British code-breaker George Scovell, to break Napoleon’s codes back in the early 1800s.

The BBC quotes a GCHQ mathematician that the papers discuss “mathematical analysis to try and determine which are the more likely settings so that they can be tried as quickly as possible.” Indeed, we know that the Engima codes were broken daily through flaws in distributing daily settings for the code machines themselves as much as breaking the actual cryptography.

It will be interesting to see what is in those papers. GCHQ says they have squeezed all the juice out of them, and therefore they are not likely to hold surprises for us in the private sector. Nonetheless, many of us will be interested in reading Turing’s words on the subjects.

Jon Callas is a renowned information security expert and CTO of Entrust.

Source: http://blogs.computerworlduk.com/security-spotlight/2012/04/alan-turing-notes-on-cryptography-released/index.htm

Why Hillary Clinton Should Join Anonymous

Why Hillary Clinton Should Join Anonymous

The State Department and the online mob are both destroying “Internet freedom.”

 

It’s hard to deny the intellectual ambiguity of “Internet freedom” when among its staunchest defenders are idealistic hacktivists from Anonymous and hard-nosed diplomats from the U.S. State Department—two groups that otherwise disagree on everything else. Ironically, both may end up hurting the very noble cause that they seek to promote.

The diplomats’ problems are quite well-known by now. While Hillary Clinton likes to give speeches in which she fashions herself the world’s greatest defender of “Internet freedom,” the harsh reality is that her own government is its greatest enemy. Given the never-ending flow of draconian copyright and cybersecurity laws coming from Washington, this fact is getting harder and harder to conceal from the global public, who starts to wonder why American diplomats keep criticizing Russia or China but don’t say anything about the impressive online spying operation that the National Security Agency is building inUtah. Nor does the State Department object when America’s allies push for harsh surveillance laws; Britain, with its proposed surveillance legislation, is a case in point. America’s “Internet freedom agenda” is at best toothless and at worst counterproductive. While focusing on (and overselling) the liberating promise of social media in authoritarian regimes, it conceals a number of emerging domestic threats that have nothing to do with dictators—and everything to do with aggressive surveillance, disappearing privacy, and the astonishing greed of Silicon Valley.

The case of Anonymous is not as straightforward. This movement is so distributed, fluid, and occasionally disorganized that anyone seeking to pigeonhole it into a coherent ideological doctrine would not get too far. Still, most of its recent high-profile attacks—upon the intelligence firm Stratfor, the Central Intelligence Agency, the signatories of the Anti-Counterfeiting Trade Agreement (which, among other things, aims to thwart Internet piracy), and the Chinese government—are motivated by a desire to defend “Internet freedom.” In this lofty goal, the agendas, if not the approaches, of Anonymous and the State Department overlap.

Why these particular targets? Predictably, Anonymous hates Western governments for ushering in more surveillance and draconian piracy laws; the security industry—for satisfying the growing policing demands of those governments; the Chinese government—for being the world’s mightiest Internet censor.

Such flashy attacks are still widely discussed in the media, and that can inspire valuable broader discussion of some important Internet issues, such as the controversial Cyber Intelligence Sharing and Protection Act. But spectacles, which are bound to get boring, are not a sustainable political strategy, as the media will eventually lose interest. And Anonymous has yet to go beyond spectacle and offer a more meaningful way for its members to contribute. Cyberattacks are cheap, easy, and can attract thousands of participants without demanding much of them. In this, they can be seen as a form of “slacktivism”—they make everyone feel good but don’t necessarily advance the cause. They can be great for stunts, but one can’t change the world with stunts alone.

But—yet another parallel to the State Department—it’s not just that Anonymous’ campaigns might be toothless. They may prove counterproductive as well. The cybersecurity industry has almost certainly benefited from the buzz and fear-mongering generated by Anonymous’ attacks. Every new incursion by Anonymous must be greeted as good news in the offices of companies providing cyberdefense to both public and private sectors. Now that Anonymous has revealed that even private intelligence-gathering firms are not safe—a few months ago, it obtained the emails from Stratfor, which eventually were published by WikiLeaks—it’s a great time to be a provider of cybersecurity services!

The hacktivists keep supplying the industry with strong examples as to why more public money should be spent beefing up Internet security and surveillance while eliminating online anonymity. Take Anonymous’ recent assaults on the websites of USTelecom and Tech America, two leading technology trade associations that have lent their support to CISPA. It doesn’t take a genius to realize that a cyberattack against groups that promote legislation to combat cyberattacks only strengthens their case. It’s like shooting a bazooka in a legislative session about gun control. This was not lost on those trade associations, and they exploited this gift from Anonymous to its fullest. Thus, the president of USTelecom claimed that “by their actions Anonymous hacktivists underscore the importance of speedy action on the bipartisan [CISPA] legislation to ensure that the Internet remains an open and safe forum for all.” Regardless of what happens to this particular piece of legislation, it’s likely that lawmakers will be under growing pressure from the military-digital complex to do something about Anonymous’ attacks—and that “something” would not be conducive to any kind of “Internet freedom.”

We can expect similar developments to take place in China, where in early April a group that calls itself “Anonymous China” defaced several government websites and promised to take down its notorious censorship system. The damage caused is minimal, while the symbolic value derived from exposing the Chinese Internet censorship to the international audiences is arguably insignificant. It’s already a well-known problem. But Anonymous’ attacks do give the Chinese government good reasons to invest money into online surveillance and, perhaps, even do it with popular support: Anonymous is not above exposing credit card details of innocent victims—and China’s burgeoning middle classes will easily grasp the implications of online insecurity. If the strikes continue, Anonymous may be China’s equivalent of Stuxnet—the computer worm that disrupted Iranian nuclear facilities—only without imposing any of Stuxnet’s crippling costs. Iran’s ongoing flirtation with the idea of a “national Internet,” itself a reaction in part to Stuxnet, is a good example of how the rhetoric of cyberattacks may be invoked to justify more Internet control.

Why doesn’t Anonymous seek more effective means of cyberactivism? This is where the organization’s decentralized structure is a liability, not an asset. The movement that claims to have no leaders—well, aside from those “leaders” who happen to be working for the FBI—and that means short-term, easy objectives (often bordering on pranks) can take precedence over long-term strategic goals.

The very idea of an online campaign to defend “Internet freedom” is problematic. It’s not like an appeal to raise money for a presidential candidate or victims of a natural disaster; it takes more than a few clicks or cash donations. Moreover, the goals and priorities of such a campaign are likely to shift all the time, depending on the political context. Defending “Internet freedom” requires constant interpretation, deliberation, and discrimination between different courses of action. In contrast, online fundraising usually has fixed goals and is amenable to small-scale, granular contributions.

Without greater bureaucratization, formal mechanisms for decision-making, and, more importantly, the capacity to accept responsibility when those decisions bring unfortunate consequences, Anonymous may end up posing as great of a threat to Internet freedom as its main nemesis, the U.S. government.

Source: http://www.slate.com/articles/technology/future_tense/2012/04/internet_freedom_threat_posed_by_hillary_clinton_s_state_department_and_anonymous_.single.html

NSA: Security Conguration Recommendations for Apple iOS 5 Devices

NSA: Security Con guration Recommendations for Apple iOS 5 Devices

>>>>    NSA_Apple_IOS_5_Security_Protocols  <<<<

 

Purpose. This document provides security-related usage and con guration recommendations for Apple
iOS devices such as the iPhone, iPad, and iPod touch. This document does not constitute Department
of Defense (DoD) or United States Government (USG) policy, nor is it an endorsement of any particular
platform; its purpose is solely to provide security recommendations. This guide may outline procedures
required to implement or secure certain features, but it is also not a general-purpose con guration manual.
The guidance provides recommendations for general-purpose business use of iOS devices for processing data
that is UNCLASSIFIED, and possibly Sensitive But Unclassi ed. Such data may carry various designations
such as For Ocial Use Only, Law Enforcement Sensitive, or Security Sensitive Information. Approval for
processing such Sensitive But Unclassi ed data is dependent upon risk decisions by Designated Approving
Authorities (or their analogs in non-DoD entities).
 
Audience. This guide is primarily intended for network/system administrators deploying Apple’s iOS
devices or supporting their integration into enterprise networks. Some information relevant to IT decision
makers and users of the devices is also included. Readers are assumed to possess basic network and system
administration skills for Mac OS X or Microsoft Windows systems, and they should have some familiarity
with Apple’s documentation and user interface conventions.
 
Scope. Apple’s mobile devices, including the iPhone and iPad, are prominent examples of a new generation
of mobile devices that combine into a single device the capabilities of a cellular phone, laptop computer,
portable music player, camera, audio recorder, GPS receiver and other electronics. The capabilities of such
devices are considerable but, as with any information system, also pose some security risks. Design features
can seriously mitigate some risks, but others must be considered as part of a careful, holistic risk decision that
also respects the capabilities enabled by such devices. Major risks, and available mitigations, are discussed
in Section 1.3.
 
Security guidance for mobile devices must cut across many previously discrete boundaries between tech-
nologies. For example, scrupulous deployment of an iPhone includes consideration not just the settings on
the device itself, but those of the Wi-Fi networks to which it will connect, the VPNs through which it will
tunnel, and the servers from which it will receive its con guration. This guide provides recommendations for
the settings on an iOS device itself, as well as closely-related information for the network and con guration
resources upon which deployment of iOS devices depends.

LEAKED: Monsanto Internal Study/Fact Sheet On Pesticide Use

LEAKED: Monsanto Internal Study/Fact Sheet On Pesticide Use

Reference No.: 2 Monsanto
April 1998

CONFIDENTIAL — OFFICIAL USE ONLY

Internal Study/Fact Sheet On Pesticide Use

*    Of all insecticides used globally each year, the amount used on cotton: 25%.
*    Number of pesticides presently on the market that were registered before being tested to determine if they caused cancer, birth defects or wildlife toxicity: 400.
*    Amount of time it takes to ban a pesticide in the U.S. using present procedures: 10 years.
*    Number of active ingredients in pesticides found to cause cancer in animals or humans: 107.
*    Of those active ingredients, the number still in use today: 83.
*    Number of pesticides that are reproductive toxins according to the California E.P.A.: 15.
*    Number of pesticides found to cause reproductive problems in animals: 14.
*    Most serious cause of groundwater pollution confirmed in California: agricultural chemicals.
*    Number of pesticides found in drinking wells of California since 1982: 68.
*    Number of California wells affected: 957.
*    Number of farming communities affected: 36.
*    % of the total U.S. population supplied with drinking water from groundwater: 50%.
*    Number of different pesticides documented by the E.P.A. to be present in groundwater in 1988: 74.
*    Number of states affected: 32.
*    Most acutely toxic pesticide registered by the E.P.A.: aldicarb (used frequently on cotton).
*    In California between 1970 and 1994 amount of total aldicarb used on cotton: 85 to 95%.
*    Number of states in which aldicarb has been detected in the groundwater: 16.
*    Percentage of all U.S. counties containing groundwater susceptible to contamination from agricultural pesticides and fertilizers: 46%.
*    Number of people in the U.S. routinely drinking water contaminated with carcinogenic herbicides: 14 million.
*    Percentage of municipal water treatment facilities lacking equipment to remove these chemicals from the drinking water: 90%.
*    Estimated total costs for U.S. groundwater monitoring: US$900 million to 2.2 billion.
*    Estimated costs for U.S. groundwater carbon filtration cleanup: up to $25 million per site.
*    Percentage of all food samples tested by the FDA in 1980 which contained pesticide residues: 38%.
*    Of the 496 pesticides identified as likely to leave residues in food, the percentage which FDA tests can routinely detect: 40%.
*    Average number of serious pesticide-related accidents between World War II and 1980: 1 every 5 years.
*    Average number of serious pesticide-related accidents between 1980 and the present: 2 every year.
*    Increase in cancer rates between 1950 and 1986: 37%.
*    Number of Americans who will learn they have cancer this year: 1 million.
*    Number who will die from it: 500,000.
*    Cost to U.S. of cancer in terms of lost production, income, medical expenses and research resources: US$ 39 billion each year.
*    Highest rate of chemical-related illness of any occupational group in the U.S.A.: farm workers.
*    Pesticide-related illnesses among monsanto farm workers in U.S.A. each year: Approximately 300,000.
*    Number of people in the U.S. who die each year from cancer related to pesticides: 10,400.

 

SOURCE: http://pastebin.com/mGAKqV4d

US Space Command: The Proof is in the Patches

US Space Command: The Proof is in the Patches

Written by David Wilcock

As you may already know, I have been fortunate enough to interact with multiple witnesses who have worked in various levels of the UFO cover-up — some at levels significantly above the need-to-know basis of the President of the United States.

When you speak with the top-level insiders in the black-ops community, you often hear them mention THE RULES.

These projects are so compartmentalized that only the high-level people are even aware that THE RULES exist — or of how far-reaching they are.

It has taken me years of interviews to explore and unravel this strange subject — particularly because of the potential for confusion.

Sometimes, when insiders talk about THE RULES, they are talking about guidelines their own group insists they follow — such as secrets they must keep, disinformation they are expected to pass along, who gets to know how much, what mistakes are bad enough to get you killed, et cetera.

However, over the course of many conversations, I increasingly realized there was another level of THE RULES — a level they have absolutely no control over.


WHAT ARE “THE RULES”?

In this greater cosmic sense, THE RULES are a set of principles that the insider black-ops community has felt, for at least the past century, were as fixed and unchangeable as the Universe itself.

They also believed THE RULES would continue, unaltered, for millions of years. Apparently they have time-viewing technology that led them to believe this was the case.

The idea that this was a manipulated timeline, and not necessarily the real future, was far too mind-blowing for them to ever consider — particularly since you have people living within these timelines, and you can go and visit them and live there yourself.

Nonetheless, all ETs visiting the Earth must operate within THE RULES. It is impossible for them not to.


WHO MAKES “THE RULES?”

One day, only a few weeks ago, I finally got smart enough to bluntly ask one of my main contacts, “Who makes THE RULES?”

The reply was: “Who makes gravity? Who makes the sun rise and set? Who makes the Galaxy spin?

“We don’t know who makes THE RULES, David, but we have no choice but to follow them. There is no workaround. There is no other way. That’s why they’re THE RULES.”

This is a strange subject, and will undoubtedly lead to some folks laughing and thinking I’m crazy… but this is what you hear about when you talk to these insiders yourself.

At the highest levels of the UFO cover-up, it is well-understood that events on Earth, and indeed throughout the inhabited galaxy, are being managed and controlled — by unseen forces.

Some things are allowed to happen… and others are not.

 

THE ‘QUARANTINE’

As one key example of THE RULES, our Earth is under a ‘Quarantine’ that prevents most ETs from being able to enter our airspace in a way that would be visible to the naked eye — except in rare, unpredictable and brief bursts of time.

This is the main reason why we don’t see more visible UFOs — particularly in the case of negatively-oriented ETs. In fact, without this Quarantine, negative ETs would have invaded and taken over this planet eons ago.

This Quarantine also appears to allow those planetary controllers here on Earth to do whatever they want. Or so they thought.

The Quarantine is maintained by a vast network of super-advanced, indestructible satellites surrounding the Earth — built by very high-level ETs. These satellites keep humanity locked in — and everyone else locked out.

The insiders do not know who built these satellites, nor precisely why they are there. It’s simply another part of THE RULES.

When you view the patches of US Space Command or Navy Space Command, they picture the Earth surrounded by two circles, similar to the typical depiction of electron orbitals around an atom.

This symbolizes the Quarantine — which protects us from the bad guys.

 

LET’S SEE SOME PATCHES

On this official military website, you can find a patch commemorating the 25th anniversary of Air Force Space Command — from 1982 to 2007. You can see the two rings around the Earth clearly depicted, as well as a stylized image of a back-engineered ET spacecraft in flight:

air-force-space-command-25th-anniversary

 

From what I’ve heard, these triangular craft are enormous in size — taking quite some time to walk from one end to the other — and are already in operation throughout the galaxy. The shape you see in these emblems is almost exactly what they look like.

There is an official website you can visit for the Naval Space Command and the US Space Command. There is also a Wikipedia page for the US Space Command, linked from an even more detailed Unified Combatant Command page.

UNITED STATES SPACE COMMAND

If you read this US Space Command page, you will find very specific information about who was in charge, when they were in charge, and what they allegedly were up to… and it includes the following emblem, featuring the rings I’m talking about:

united_states_space_command_emblem

Notice the crosses on each of the rings. We’ll get back to that in a minute.

You can also read about US Space Command in this article on Space.com — in an interview with Gene McCall, chief scientist for the Air Force Space Command. Naturally, the article attempts to put a mundane spin on the story and does not include any real ‘juice’ of Disclosure.

AIR FORCE SPACE COMMAND

You again see the rings around the Earth in the Air Force Space Command patch. This was originally featured on the official Air Force Space Command website, which has since been taken down.

However, at this website, there is a comprehensive series of mirrored links to what was originally on these official websites — along with the now-defunct links. I suggest saving your own copy in case it gets taken down.

When you go to this mirror site and sort through the images and text, this triangular metallic flying machine image appears over and over again on various badges and emblems — along with the two “quarantine rings”:

airforce_spacecommand

 

Also, again notice the two crosses on either side of the delta-shaped spacecraft — crosses that directly contact the rings.

These, I believe, are meant to be Knights Templar crosses.

 

THE “KNIGHTS TEMPORAL”

In a Project Camelot interview, Gordon Novel revealed that these insiders like to refer to themselves as the Knights Temporal:

http://www.projectcamelot.org/lang/en/gordon_novel_interview_transcript_en.html

K: When you say “we,” who’s we?

The Knights Temporal

G: Well, I have a group of folks that I call the Knights Temporal.

The most prominent aerospace engineers and physicists in the world today are all part of a team we call the RAM group. We call ourselves the Knights Temporal.

We took a page out of the idea of the Templars, who basically blackmailed the Pope to give them the fiefdoms over Europe. They created the banking orders we have today.

Since we believe the technology is rooted in time, we call ourselves the Knights Temporal. The alien technology, the UFO, is basically a flying time machine. That’s what we believe, and it’s all we know about it.

What Novel does not say here is that these international bankers did not merely “take a page out of the idea of the Templars.” These groups are the direct descendants of the Knight Templars — and have still kept all their secrets.

 

NAVAL SPACE COMMAND

The same two “quarantine rings” appear in the emblem for the Naval Space Command, also mirrored at the above site:

naval_spacecommand

 

“TOP HAND” AT VANDENBURG AFB

This next patch can be found on the official Vandenburg Air Force Base website on Strategic Air Command.com.

Again we see a cross on one of the Earth’s protective rings. The sword, as we shall see, appears to be a Knight Templar blade.

With the line “Strengthen the Shield,” there is a clear implication here that the two rings around the Earth could be some sort of ‘shield’ that we want to make sure stays strong.

Further, there is the suggestion that this shield may be at least partially enforced by that same weird delta-shaped craft:

top-hand-sharpen-the-sword-strengthen-the-shield

 

AFSST 76TH SPACE OPS

Also check out this “AFSST 76th Space Ops” patch from the same site — the official Vandenburg Air Force Base website on Strategic Air Command.com.

Again we see one of the “quarantine rings” as well as the same flying metallic triangle — this time with wings around it just in case you didn’t get the point that it flies.

Two smaller delta-shaped craft also flank the AFSST acronym at the bottom:

afsst-mission-complete

Here’s a shot of the original Strategic Air Command page in case it disappears. Notice the Knight Templar glove holding lightning bolts in the insignia at the top left:

strategic-air-command-patches

JOINT FUNCTIONAL COMPONENT COMMAND FOR SPACE

The “quarantine rings” and flying metallic triangles show up again in the emblem for the Joint Functional Component Command for Space, which has its own official Wikipedia page here:

uss-stratcom-jffcc-space

As it says on the Wikipedia page, according to Lieutenant General William L. Shelton, “Our prime mission directive in JFCC SPACE is to ensure our freedom of action in space, while preventing adversary use of space against us.”

 

SCHRIEVER AIR FORCE BASE

These badges from Schriever Air Force Base follow the same theme — quarantine rings and peculiar aircraft operating far outside the Earth’s atmosphere.

Notice the difference in size between the small black delta-shaped craft and the larger metallic delta-shaped craft in the first badge below.

That size difference may not be an indication that one is closer than the other — it may acutally be a direct indication of how huge the larger craft is in comparison to the black one:

space-test-experimentation-space-test-squadron

This next badge is particularly interesting because of the emblem that appears at the bottom:

usaf-history-heritage

I have been told this Pegasus “Master of Space” logo is worn by staff who have direct, high-level involvement with extraterrestrial human civilizations — typically those working for Space Command.

The Pegasus legend of the ‘winged horse’, used by the Gods to travel in Greek mythology, may well indicate some sort of extraterrestrial craft.

This follows the same chain of reasoning presented in Episode Two of this season’s Ancient Aliens on History Channel, which I am a repeat participant in.

 

THIRD PAGE OF BADGES FROM SCHRIEVER AFB

There are so many goodies on the third page of badges from the Schriever AFB site — delta craft, Templar swords, Templar gloves, quarantine rings, et cetera — that I had to just post the whole thing:

military-space-patches-1

There are many, many indications of the Knight Templars here — and indeed, many insiders have said the Air Force is much more involved in the UFO cover-up than other organizations.

You probably caught the Masonic compass in the image on the bottom right. There is a Templar glove below it holding a sword of fire.

I was particularly fascinated by the Templar Knight gloves that had a mysterious energetic force coming off of them on the 310th Communications Flight badge — suggesting the mastery of hidden Universal powers:

310_communications_flight

 

FOURTH PAGE OF SCHRIEVER AFB BADGES

The fourth page of badges from the Schriever AFB contains additional enigmas — including a straight-ahead Templar skull and crossbones symbol:

military-space-patches-4


The 50th Contracting Squadron badge at the top left may be a nod to the fact that human beings appear all over the galaxy — hence we see the image of a human body away from the Earth, and the Pegasus logo alongside it.

The 50th Space Communications Squadron badge at the top right has the Templar glove, again with the suggestion of a “Thunderbolt” coming out of it.

According to the second episode of this season’s Ancient Aliens, which I did plenty of research for but didn’t get in fast enough to make the cut, the many ancient ‘Thunderbolt’ legends appear to refer back to a working ET weapon that was used in historic times.

Such a weapon then later became mythologized in such stories as Zeus’ Thunderbolt, Thor’s Hammer, Odin’s Spear, Poseidon’s Trident, Vajra’s Spear, et cetera.

 

THOUGHTFORM ENTITIES AND PROTECTING EARTH

The nasty-looking hooded being on the 23D Space Operations HQ badge, second over from the bottom left, clearly seems to represent the “Thoughtform Entities” I have been told these guardians of Earth are actively defending us against.

Notice the being has at least two faces — one made by the two winglike eyes in the middle, and another in profile view on the left-hand side, where a pointy nose, brow and chin are all clearly visible.

The rear of the head, in profile view, suggests pointy ears. I have indeed heard from an insider, recently, that at least one ET group does in fact have pointy ears — and looks very similar to certain ‘gargoyle’ faces we see on many Templar-designed buildings.

23d-space-operations-squadron-semper-vigilans

Whether you agree with what they’re doing or not, the people I speak to are absolutely convinced that the Earth would be much worse off if they were not doing their jobs.

This desire to protect humanity from outside negative forces is a strong rationale for why they continue to stay involved in these jobs, even though there are many questionable ethics involved.

It is certainly interesting to see a hooded being looming over the Earth on a badge dedicated to “space operations.”

FIFTH PAGE OF BADGES FROM SCHRIEVER AFB

The fifth and final page of badges from Schriever AFB has even more goodies. First, here’s the full view:

military-space-patches-2


Notice the two stylized birds flanking the star on the bottom-center image. They most definitely appear to be depictions of the Phoenix.

What better symbol to choose if you’re describing a journey through a stargate — where you appear to ‘die’ and dematerialize on one end, only to be ‘reborn’ from the other?

As you’ll see in a minute, this was the original Air Force logo!

Now let’s explore some more of these images in detail.

THE STARGATE

First of all, as we see below in its larger form, we have a badge that may very well be showing us a pentagonal Stargate vortex emerging from the Northwest United States:

21st-space-operations-sq-gateway-to-the-stars

More than one insider has told me that the ‘ancient’ stargates look like tunnels lined with individual points of light, in a clear geometric relationship to each other, and which spiral in on themselves as you look more deeply into the wormhole.

The points of light may very well be in a pentagonal relationship to each other along the circumference of the circle, though no one has told me this. I also never thought to ask until now — but it may very well be.

A slight hint of this stargate pattern appears in the movie Minority Report, when you look off to the right in this particular shot:

minority_report_interface

Getting back to this 21st Space Operations badge, it even features the words ‘gate’ and ‘star’ right in the description — Gateway to the Stars.

 

IS THE AIR FORCE LOGO PARTLY INTENDED TO DEPICT A STARGATE?

The five-pointed star with a circle inside of it is a common feature of the basic Air Force badge, which went through two different stages of development. This is apparently another homage to the stargates or ‘portals’ being used at the insider levels.

I already pointed out the original Air Force logo, where the pentagon is flanked with stylized Phoenix birds on either side. This logo then went through an evolution into its current form, as these images depict:

new_af_aaf

aflogo_history

air_force_logo

 

 

WHAT TYPE OF AIR TRAFFIC ARE THEY CONTROLLING?

Check this one out from the Air Force Communicators and Air Traffic Controllers Association.

In the center you have the pentagonal Air Force / stargate logo — flanked with the Phoenix birds of fire.

Then you’ve got a jet on the right and “something else” on the left — our delta-shaped craft once again — protecting a triangular-shaped Earth in the same ‘quarantine loops’ I’ve been showing you:

warfighting-integration-chief-information-officer

The triangle shape appears to indicate the tetrahedral energy signatures that run through the Earth and other planets, as Richard C. Hoagland has been asserting since at least 1993.

The tetrahedral energy appears at the 19.5-degree latitude, north or south, on any given planet.

On solid planets it emerges as volcanoes, such as Hawaii on Earth and the enormous Olympus Mons on Mars.

On gas planets we have the Great Red Spot of Jupiter, the Great Dark Spot of Neptune, cloud bands on Saturn, et cetera — all at the magic 19.5-degree latitude.

 

DEFENDERS OF THE DOMAIN

One of the most compelling pieces from Schriever AFB is this next badge below.

Here, we see a simplified but undeniable diagram of the Global Grid I have written about for so many years.

The real Grid is not made of a square pattern like this, but is otherwise extremely similar — including the spherical ‘nodes’ where the lines cross.

We also see a Knight Templar in full royal regalia:

schriever_defenders-information-assurance

Even the clovers carved into the knight’s mask are obvious, stylized versions of the Templar cross:

information-awareness-close

 

THE NORAD LOGO

The official NORAD logo (NORth American Aerospace Defense command) also contains the ‘quarantine loops’ around the Earth.

This time the loops appear stylized as wings — and we also see the Templar sword with stylized ‘thunderbolts’ coming off of it:

north_american_aerospace_defense_command

 

310TH SPACE WING

More goodies can be found on the official page for the 310th Space Wing:

310-space-wing-division

This next badge from the above website caught my eye in particular.

It is a seemingly earlier version of the same 310th Communications Flight badge I showed you before. Again we see the delta-shaped craft and the Earth with quarantine rings in the middle.

We also prominently see the knights’ gloves with thunderbolts coming off of the fingers.

Again, this badge suggests the Templar Knights may have possessed mystical capabilities to manipulate energy — either by thought alone, or with some form of ‘thunderbolt’ technology, as we see in many ancient myths:

310_communications

310_flight_text

PLENTY OF EVIDENCE

Of course, none of this is absolutely conclusive proof that there is any off-planet work going on within Space Command, nor that they have access to stargate ‘portal’ technology or interstellar delta-shaped craft.

However, I have spoken to several different insiders who have given me various pieces of this puzzle — and they all fit together very well.

When independent witnesses keep telling you the same things, you start paying attention.

It is highly, highly interesting that we see so much redundancy in the symbolism of these various military badges — over and over again. I’ve only given you a brief sample of what you can uncover with your own research.

 


THE QUARANTINE DROPS AFTER 2012

Everyone ‘in the know’ is well aware of THE RULES, and the Quarantine that exists around the Earth.

Apparently you can’t just fly a ship out of Earth’s atmosphere without opening a hole in the Quarantine first. This had to be done for all the Apollo missions, I am told, as otherwise they would have never made it out of here alive.

The ETs that have been working with the US and other governments for the past century apparently possess technology that allows for short-term openings to be made in the Quarantine.

Space Command is very glad we have the Quarantine, as it protects us from outside invading forces. When random holes occur, Space Command uses their own ships to further defend the Earth — as their badges indicate.

Another very interesting point I’ve been told is that Space Command and its affiliates have reason to believe the Quarantine will drop some time after 2012. This is a significant part of the transformation we are now going through.

At this point, the Earth will enter into open contact with its ET neighbors.

There is also the implication or suggestion that the dropping of this Quarantine will also enhance the mystical and psychic abilities of the average person as well.

 

EVERYTHING CAN BE FOUND IN “THE LAW OF ONE”

The ‘Quarantine’ is one of a variety of very specific data points that were revealed in the Law of One series, most of which came through in 1981 to Don Elkins, Carla Rueckert and Jim McCarty of L/L Research.

The best way to introduce yourself to this staggeringly complex body of information — all of which is now free to read online — is to consult the Study Guide I have posted at this site. I highly recommend you explore this research, and feel it is one of the best possible uses of your time.

I have pointed out to several insiders now that everything they’re telling me — all the most significant data points — can be found in this one series from 1981.

I consistently urge that they read it, as they would be shocked to discover how well the material lines up with what they already know.

However, everyone is ‘too busy’ — and the big discovery still remains waiting in the wings.


LAW OF ONE ON THE ‘QUARANTINE’

If you feel you have the time, here’s a full list of all the places where the ‘quarantine’ is discussed in the Law of One series — and it is a fascinating read:

http://lawofone.info/results.php?search_string=quarantine&search_type=any&numeric_order=1&ss=1&sc=0

These two sets of quotes from Sessions Six and Twelve really stand out for me:

6.25 Questioner: Do any of the [positive Confederation ETs] come here at this time in spacecraft? In the past, say, thirty years?

Ra: I am Ra. We must state that this information is unimportant. If you will understand this, we feel that the information may be acceptably offered. The Law of One is what we are here to express. However, we will speak upon this subject.

Each planetary entity which wishes to appear within your third-dimensional space/time distortion requests permission to break quarantine, as you may call it, and appear to your peoples.

The reason and purpose for this appearance is understood, and either accepted or rejected. There have been as many as fifteen of the Confederation entities in your skies at any one time; the others available to you through thought.

At present [1981] there are seven which are operating with craft in your density.

Their purposes are very simple: to allow those entities of your planet to become aware of infinity, which is often best expressed to the uninformed as the mysterious or unknown.

 

12.3 Questioner: Is there any effort on the part of the Confederation to stop the Orion chariots [piloted by negative, “service to self” ETs] from arriving here?

Ra: I am Ra. Every effort is made to quarantine this planet.

However, the network of guardians, much like any other pattern of patrols on whatever level, does not hinder each and every entity from penetrating quarantine — for if a request is made in light/love, the Law of One will be met with acquiescence.

If the request is not made, due to the slipping through the net, then there is penetration of this net.

12.5 Questioner: I don’t understand how the Confederation stops the Orion chariots from coming through the quarantine?

Ra: I am Ra. There is contact at the level of light-form or lightbody-being, depending upon the vibratory level of the guardian.

These guardians sweep reaches of your Earth’s energy fields to be aware of any entities approaching. [DW: The satellites I have heard about from the insiders appear to be the automated detection system that alerts these ‘Guardians’.]

An entity which is approaching is hailed in the name of the One Creator.

Any entity thus hailed is bathed in love/light, and will of free will obey the quarantine due to the power of the Law of One.

12.6 Questioner: What would happen to the entity if he did not obey the quarantine after being hailed?

Ra: I am Ra. To not obey quarantine after being hailed on the level of which we speak would be equivalent to your not stopping upon walking into a solid brick wall.

12.7 Questioner: What would happen to the entity if he did this? What would happen to his chariot?

Ra: I am Ra. The Creator is one being. The vibratory level of those able to breach the quarantine boundaries is such that upon seeing the love/light net it is impossible to break this Law.

Therefore, nothing happens. No attempt is made. There is no confrontation.

The only beings who are able to penetrate the quarantine are those who discover windows or distortions in the space/time continua surrounding your planet’s energy fields.

Through these windows they come. These windows are rare and unpredictable.

 

This is only one of many hundreds of examples where I have found a perfect correspondence between what the top-level insiders tell me and what we find written in the Law of One series.

 

THE ‘QUANTUM LEAP’

I have worked for years to flesh out the Law of One’s cosmology into a scientific thesis — with stunning results, as you can find in my videos, conferences, radio shows, articles and books.

A window of 2011 to 2013 was given in the Law of One series as a time where a ‘quantum leap’ would occur in Earth’s history, propelling us into an amazingly beautiful new Golden Age.

Once this shift fully takes place — which may involve 100 to 700 years for the full transition to complete — the average human being will have all the abilities attributed to Jesus and other ‘Ascended Masters’ — and more.

Even though it may take some time for this transformation to occur, there is no question that the initial ‘quantum leap’ in 2011-2013 is something absolutely remarkable, breathtaking and unprecedented in Earth’s history.


A GALACTIC TRANSFORMATION

This ‘quantum leap’ is the result of our Solar System traversing into a more highly-charged region of the galaxy — wherein the actual physics of matter, energy and consciousness irreversibly shift.

This galactic transformation propels the Earth into an energetic state called ‘Fourth Density’ — as opposed to our current ‘third.’

These same energy states appear in the human body as the seven chakras. They also constitute what most people mistakenly call “dimensional levels”, which apparently exist as planes of existence throughout the entire Universe.

The shift into fourth-density is essentially a graduation from the yellow, self-oriented center to the green, heart-oriented perspective.

No mention of the Mayan Calendar ever occurred in The Law of One, as Dr. Don Elkins knew nothing about it — nor the importance of the 2012 date in many ancient prophecies.

It is highly ironic that the most accurate and comprehensive body of 2012 prophecy information makes no mention of the Mayan Calendar whatsoever… nor any of the other common talking points related to 2012.

 

THE MOST ADVANCED SCIENTIFIC INFORMATION ON EARTH

Obviously, until this shift actually happens, we cannot be certain of what will occur — nor of exactly how it will occur.

Nonetheless, there are hundreds of specific, highly technical scientific data points in the Law of One series that have since been proven correct.

This makes it highly unlikely that the whole model will fall apart when it comes to the Fourth-Density Shift.

I have yet to find a single contradiction or error in the Law of One cosmology. In fact, the more I follow up on the leads we were given, the more advanced and beautifully perfect the model becomes.

I struggled for many years with the frequently-mentioned concept of a parallel universe where time is three-dimensional — but finally this year I solved this greatest of all mysteries, and truly understood how and why it was the key to everything.

My upcoming book The Source Field Investigations — due for release next May — is significantly more evolved than any other presentation I’ve given on this subject.

The CONVERGENCE film script has now been brought fully up to date with these latest breakthroughs as well, and we hope to have a finished draft ready to show directors, actors and investors by early January.

RESEARCH CREDIT:

 

SEE ALSO..

 

Who dumps technology more advanced than NASA on to NASA and thinks nothing of it? This admission of at least this segment of a secretive space program is quite revealing. It will probably slip by mainstream media, but sit up and take notice, this is a serious admission here.

NASA gets two military spy telescopes for astronomy

(Washington Post) The secretive government agency that flies spy satellites has made a stunning gift to NASA: two exquisite telescopes as big and powerful as the Hubble Space Telescope. They’ve never left the ground and are in storage in Rochester, N.Y.

It’s an unusual technology transfer from the military-intelligence space program to the better-known civilian space agency. It could be a boost for NASA’s troubled science program, which is groaning under the budgetary weight of the James Webb Space Telescope, still at least six years from launch.

Or it could be a gift that becomes a burden. NASA isn’t sure it can afford to put even one of the two new telescopes into orbit.

The telescopes were built by private contractors for the National Reconnaissance Office, one of 16 U.S. intelligence agencies. The telescopes have 2.4-meter (7.9-foot) mirrors, just like the Hubble, but they have 100 times the field of view. Their structure is shorter and squatter.

They’re “space qualified,” as NASA puts it, but they’re a long way from being functioning space telescopes. They have no instruments — there are no cameras, for example. More than that, they lack a funded mission and all that entails, such as a scientific program, support staff, data analysis and office space. They will remain in storage while NASA mulls its options.

“It’s great news,” said NASA astrophysics director Paul Hertz. “It’s real hardware, and it’s got really impressive capabilities.”

The announcement Monday raised the obvious question of why the intelligence agency would no longer want, or need, two Hubble-class telescopes. A spokeswoman, Loretta DeSio, provided information sparingly.

“They no longer possessed intelligence-collection uses,” she said of the telescopes.

She confirmed that the hardware represents an upgrade of Hubble’s optical technology.  MORE HERE

Anything fishy here? Two telescopes on mothballs better than Hubble? Are they toying with us? This is just nuts news.

Secret Space Program?

You really think we get the whole story about anything, especially regarding military or technological advancements?

I personally met a man in New Mexico who used to work at the infamous Area 51. You can imagine how I tried to wangle information out of him, but he was tight-lipped. When I came back at him the third time after trying to act indifferent he finally said, “Let’s just put it this way. The stuff I worked on back in the 60′s still hasn’t come out.”

And my impression was he was a low-level tech.

There’s a lot of testimony as well as conjecture about Moon and Mars missions and the like you can read about on line, as well as many other “forbidden” realms of research. That we’re surrounded by technology that far surpasses what has been introduced into the mass mind is a no-brainer, so to speak.

It’s thought that black-op advances are decades if not centuries ahead of “known” technologies.

So What.

These psychos are on a path of self destruction—-hence—psycho-path.  We just don’t want it to be at the expense of the innocent. Nice thing is we can’t be eliminated, we’re multi-dimensional eternal consciousness.

Now THAT has their knickers in a twist!

Be well, be aware. But this tech stuff we do need to keep an eye on to see what these wackos are up to.

Keep on informing, helping others find out who they truly are, and keep the wake up rolling.

Love, Zen

 

#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently:

I remember seeing IRC logs of you and LulzSec dissing The Jester and saying his tool “XerXeS” is just SlowLoris with Tor… but how did you guys come to this conclusion? How can this be mitigated if his attacks appear to come from so many exit nodes? Just block all Tor exit nodes? I dnt wanna to. :(
“I have no idea how XerXeS or any other DDoS tool actually works, all I know is that the person or people running the character known as The Jester have been doing it successfully for many years with absolutely zero discrepancies, arrests or suspensions. I think that’s it’s incredibly impressive that The Jester has stuck to the courage of his/her/their convictions for such a large period of time, even though I disagree with some of the political views expressed. I’m a big fan of facilitating alternative realities and The Jester brings us into another world with many sophisticated layers that often make us forget that it’s just a twitter account and a blog, which is a talent few people have. I find the construction of the persona at a granular level far more admirable than the hacking itself, which I obviously don’t approve of. ”    -via  http://ask.fm/DoubleJake

 

>DecryptedMatrix gives voice to PiraX

 

th3j35t3r_Tom_Ryan_BlogHello there, th3j35t3r.  We would also like to welcome our fellow Anons, bloggers, and those simply interested in a cyber-culture controversy spanning over two years. We are sure you know why we have called you here. Your recent online behavior has been rather strange, to say the least. We are here for one reason: We want to end you.

We would like to start first by making you comfortable. No more quasi-anonymous pseudonym mumbo-jumbo. Your name is Thomas so we will call you by the name you were given by your mother. We know your name because it was confirmed over a month ago with the following Pastebin paste:   http://pastebin.com/A5iiTAJS  (PiraX Dox continued after paste)
________________________________________________________________________

Q: Are Thomas Ryan and th3j35t3r one and the same person?

tl;dr: Yes. You fucking bet they are. In the words of Oscar Wilde, however, ‘The truth is rarely pure and never simple.’ Thus, if you want the full, uncensored dox on th3j35t3r, you’re going to have to bear with me for the next ten minutes as I tear apart his tissue of lies and disinformation.

Now concentrate, cos here comes the proof…

Warning: Long dox is looooooooong. I trust it will prove to be an enlightening read however, not least for Mr Thomas Ryan of 86 Amber Street, Staten Island NY.


SEE TOM RYAN AS JESTER at DEFCON 19

Filmed at Defcon after observing Tom Ryan post and photograph a note outside the vendor room signed “J.” This photo was tweeted from @th3j35t3r twitter within moments, as was the following: https://i.imgur.com/axth3.jpg
Note the “Black cell paintball” logo on the shirt. BCP is the name of Tom’s Paintball team. Tom hangs on PBnation.com with a kid called j35t3r, which is the likely source for the name, and the first of many plagiarisms.  NOT SUSPICIOUS AT ALL, folks. Nor is it suspicious that the ridiculous attempts to smear me as a secret blackhat/anon/whatever over the last year all come from the same group of six people connected to Tom. The other partner is tentatively identified, but that’s a story for later.

**********

Among the 9,000 names to have been linked with @th3j35t3r, one that keeps cropping up is that of @TomRyanBlog. The dox has been denied by th3j35t3r, but then Sabu repeatedly denied that he was Hector Monsegur, and we all know how that one ended up…

While many Anons have been focused on reverse DNS lookups, port scanning and conventional doxing methods to unmask Jester, no one seems to have tried a simpler technique: writing analysis.

If Tom Ryan (TR) and Jester (J) are one and the same person, it should be easy to tell. They’ve written 3,000 tweets between them. Even the l33t3st of the l33t would struggle to convincingly maintain two separate writing styles over the course of thousands of tweets and numerous blog posts.

For those who are new to the party, here’s an overview of what we know about TR and J:

Both are conservative, right-wing and love their precious military. Both hate #OWS, Wikileaks, Manning and are obsessed with unmasking Anons. Both are fixated with Sabu (still!), Team Pois0n and Cabin Cr3w. Both enjoy love-ins with @AsherahResearch, @AnonymousDown and all the usual trolls.  In short, they’re both neo-con faggots. But are they one and the same faggot, or are they separate fags who happen to be pursuing identical vendettas?

Before we get bogged down in analyzing their writing styles, here’s some lighter tit-bits to get things kick-started:

1. Last year, TR and J both attended Hacker Halted in Miami and DEFCON in Nevada. Based on what we know of the pair’s political leanings and infosec knowledge, that alone automatically narrows them down to less than 5,000 possible suspects.

2. TR and J both like sushi (a trifling detail, but one that helps build a picture of their personalities). TR: “@p0isAn0N not going to the right Pizzaria. If you are in Boston you should be going to BoLoCo for Burritos anyway. And Duozo for Sushi.”
J: “#hackerhalted delegates … Stay clear of Cafe Bastille. Great sushi at Bali Cafe though… Stayin frosty.”

3. Tom Ryan has form for assuming false identities – such as ‘Robin Sage’. See here for the full story:
http://www.darkreading.com/insider-threat/167801100/security/privacy/225702468/index.html

INTERESTING FACT: @RobinSage joined Twitter on 26th December 2009 – exactly one week after @th3j35t3r joined.

The connection between Tom Ryan, Robin Sage and Jester was first brought to my attention by this tweet from @LulzKitten on 29th March 2012:

“Okay, let’s cut the crap, hello @Th3J35t3r aka@TomRyanBlog aka robinsage. Game over. Was fun, at least sometimes. Next nemesis, plox!”
(Note: Direct links to all tweets quoted in this dox can be found cited in the conclusion.) After reading LulzKitten’s tweet, I cast a casual glance over the Twitter feeds of Tom Ryan and Jester, and instantly noticed some similarities between the pair.

The most damning evidence linking TR and J – the smoking gun – will be presented towards the end of this dox, if you can wait that long, but first, let’s perform some writing analysis. After all, if TR and J are the same person, there ought to be some similarities in their writing styles, surely? You betcha. Here we go then:

Anyone who’s followed J on Twitter and read his blog may have noticed that he has a very distinctive writing style. Let’s pick through some of Jester’s trademark phrases, and then see if we can spot them recurring in TR’s tweets:

4. ‘Hmmmm’. Jester likes to say ‘Hmmm’ ‘Errr’ and ‘Ahemmm’ a lot. In fact he likes to say them so much that he even uses these filler phrases in his blog titles, as well as littering his tweets with them. Here’s some examples:

5th April: “@deftpunkz – umm holy shit. I dont know what to say guys, errrr thanks, i think? -”

4th April: “Al-Qaida ‘blacked out’ on the internet (effectively switched off) >>>http://timesofindia.indiatimes.com/tech/news/internet/Al-Qaida-blacked-out-on-internet/articleshow/12529550.cms #infosec#saladin #ahemm”

3rd April: “Now…… imagine…… how many of those listed in my last, were ummmmmm – on the ‘shit list’ – just a thought??? #anonymous”

27th Feb: “#Wikileaks & #anonymous dump 5 million#strafor internal emails obtained by #anonymouslast Dec..umm this right here…”

21st March: “Anti-Anonymous hacker threatens to expose them (via MSNBC) http://www.msnbc.com/id/46716942<<< ummm too late. #military #cyber #security#infosec #DoD”

15th Nov, WordPress blog title: “Occupy Wall Street?? 99%?? Ummm.”

Hmmm, I wonder if Tom Ryan also likes to say ‘Hmmm’? Let’s take a look:

10th April: “How To Prevent Data Leaks From Happening To Your Organization http://zite.to/HCucc8hmmm…how do you prevent the carbon factor from leaking?”

6th April: “Hmmm So @AnonW0rmer is arrested at 10:30http://j.mp/HiAASP tweets till 3:32, @ItsKahunadisappears @AnonymousIRC disappears for 4 Day >>>”

15th March: “CSI tonight has a scent of Anonymous. Anthropology professor teaching about Hactivism. Hmmm who came it be?”

11th March: “@kennethlipp hhhmmmm do you think any anons donated money to his reelection campaign?”

7th March: “@CryptKper @v0ld4m0rt you are spot on! Who could that have been? Hmmmmm”

16th Feb: “@agentdarkapple Interesting! Hmmm! I can see why you think I would be L and you would be N. L doesn’t smile like me”

OK, that’s enough Hmming – on to point #5: ‘Tick tock’. Jester loves to say ‘Tick tock’ – it’s one of his favorite phrases. Look:

6th March: “From 3.5 months ago:https://th3j35t3r.wordpress.com/2011/11/19/if-i-am-wrong-ill-say-im-wrong-heres-my-apology/…… from 1 hour ago ….http://www.foxnews.com/scitech/2012/03/06/hacking-group-lulzsec-swept-up-by-law-enforcement/ tick tock toldya.”

3rd August: “’RT @anonymousabu: @hjjrc @SparkyBlaze Your problem is with a ghost. Someone you can neither find nor stop.’ << you have same problem. #tick”

27th July: “@anonymousabu tick tock.”

24th July: “TICK TOCK. #toldyac2dc37a7d9d3238877a127f2d5171c9d”

21st June: “Tickety Tock…..”

25th June blog entitled LulzSec’s Cloudflare Configuration: “Tickety Tock Tock.”

Why, isn’t that a quirky little phrase? I wonder if Captain Hook – sorry, Tom Ryan – also uses the same terminology. Oh, what’s this we have here from 27th Feb?

“#Anonymous I am working on my big release. Hmmmm who should it goto? Tick Tock”

There’s even a ‘Hmmmm’ thrown in for good measure. How Jester-esque!

With a nudge and a wink, we move onto #6: Jester loves nothing more than to sign off his tweets with a sly wink. Just like so:

28th March: “@wwpinc – just in case you were not aware: >>>https://th3j35t3r.wordpress.com/support/ <<< – keep up the great work ;-) Peace. #pgr #wwp#woundedwarrior”

26th March: “Al-Qaida forums crippled in suspected cyber intervention http://j.mp/GSd8ih << bad things happen to bad people, apparently ;-) #infosec”

11th March: “@RepDanGordon @FBIPressOffice I merely stated u were on the list, u seem awful jittery. U need to calm down >> ;-)”

2nd Oct: “RT: @mach2600 @th3j35t3r It’s wobbling … up, down, up, down… <<< gotta love NGINX – always somethin huh ;-)”

16th June: “standby for supporting clarification onhttp://th3j35t3r.wordpress.com/2011/06/16/quick-n-dirty-just-for-clarification/?utm_source=Jesters+Court+Blog&utm_medium=twitter – close ya eyes if ya already saw it yesterday. ;-)”

2nd June: “http://www.foxnews.com/scitech/2011/06/02/pentagon-has-secret-list-cyber-weapons/ – #justsayin;-) #oorah”

Now it’s TR’s turn to have a sly wink:

5th April: “The beauty of data-mining in a social world, I don’t need to be connected to you, so you can’t block me. You just need to be on my radar ;-)”

5th April: “@x_ryujin_x @render64 @bitchiest @kalyptonetthink of what full dox did for Sabu ;-)”

4th April: “@LauraWalkerKC @BobbyCarbon@NavySEALsORG @Packetknife @HonorThemYou should record it ;-)”

14th March: “To Geeks & Nerds 3/14 is known as Pi Dayhttp://www.youtube.com/watch?v=JTZtuMdkUksTo Horny Men it’s known as Steak & Blow Job Day! The GF reminded me ;-)”

13th March: “@JackalAnon warned #Anonymous 2 Days Ago about OAuth and Apps. We’ve warned you about TOR. ;-)”

14th Feb: “Why I’m Glad My Boyfriend Isn’t On Facebook – Forbes http://j.mp/z9XNrP by @kashhill | Leaving Facebook made me never want to go back ;-)”

Next up, it’s similarity #7 – ‘Stay Frosty’. This, Jester’s catchiest of catch-phrases, crops up all over his tweets:

2nd April: “http://www.cbsnews.com/2100-202_162-20075647.html <<< still going on about this? Stay frosty and have a Cupcake??”

10th Nov: “#stayfrosty -Word of advice 2 @barrettbrownlol: Just because you’re paranoid doesn’t mean they aren’t out to get you. >”

26th Oct: “#hackerhalted left a little something under the projector in Alhambra SCADA room. Tweet me a photo of what’s there. #stayfrosty”

25th Oct: “#hackerhalted delegates … Stay clear of Cafe Bastille. Great sushi at Bali Cafe though… Stayin frosty.”

Now let’s see what Monsieur Ryan has to say for himself:

10th April: “Iran plans to unplug the Internet, launch its own “clean” alternative http://zite.to/Iqm1Ba#anonymous @CabinCr3w Stay Frosty ;-)”

16th March: “@testeux1 Class on Strategy? I can teach one at The Spy Museum in DC @wikileaks @revmagdalen@AnonymousIRC @YourAnonNews Stay Frosty ;-)”

13th March: “#Anonymous in your time of fear those of you that have used delete.twitlan / tweeteraser / twitwipe A Special Thank You!!! Stay Frosty! ;-)”

13th March: “@jackie_singh @krypt3ia I was promoted today to Brigadier General Packet of The Cyber Brigade@th3j35t3r now reports to me! Stay Frosty ;-)”

12th March: “Finch + Reese = ;-) …. Stay Frosty & Watch Your 6!”

Hang on a sec, isn’t it a bit, well, *obvious* for Tom Ryan to be liberally dropping Jester’s favorite catchphrase into his tweets? Yep, you’re right – it’s very obvious. But here’s the thing: the AntiSec dox that named Jester as Tom Ryan landed in Pastebin on 11th March. Notice how TR deliberately goes out of his way to play up to the ‘Stay Frosty’ caricature in the ensuing days? That’s because he realizes that the more he pretends to be Jester, the more people will be inclined to write him off as just another Jester wannabe. For another example of this tactic, here’s how J tweets every time he downs a Muslim extremist website:

1st March: “http://www.rjfront.info – TANGO DOWN. Temporarily. For enabling recruitment, & co-ordination of jihadist terror cells via web.”

1st March: “http://www.atahadi.com – TANGO DOWN. Temporarily. For online incitement to cause young muslims to carry out acts of violent jihad.”

Exactly one month later, on 1st April, TR tweets the following:

“www.ic3 .gov – TANGO DOWN. Temporarily. For not doing your job, & not arresting #Anonymous”

And: “www.fbi .gov – TANGO DOWN. Temporarily. For enabling recruitment, & co-ordination of#Anonymous via web.”

At this point, obvious troll is obvious – within days of LulzKitten’s tweet linking Tom Ryan and Jester, TR goes out of his way to tweet ‘Stay Frostys’, Jester winks and ‘TANGO DOWN’s. To give him credit, it’s a pretty smart way to make people think you’re nothing more than a Jester fanboy. Sadly for Thomas, it’s too late; the evidence linking Tom Ryan to Jester began from the moment TR began tweeting in January 2012. Prior to AntiSec dropping Jester’s dox on 11th March, Tom Ryan had only tweeted ‘Stay Frosty’ twice in three months. Immediately afterward, he tweets it five times in four days – complete with the Jester’s trademark wink.

So does that mean that all of the foregoing information is is part of an elaborate ploy, cooked up by Tom Ryan and Jester, to obfuscate the identity of the real Jester? In the case of the ‘Stay Frostys’ and the ‘TANGO DOWN’s, yes, it probably is. Thankfully, there are dozens of other textual similarities between the pair – similarities that are too subtle to be part of a pre-planned disinformation campaign.

Which leads nicely on to point #8: ‘Much’. Note the phrase that appears in the following tweets from Jester:

18th June: “http://www.techhomethebacon.com/news/hacking-infosec/th3j35t3r-links-nakomis-to-lulzsec-group-cover-up-ensues.html – backpeddaling much? Hacked? lol. -”

18th June: “Back-pedalling much?https://twitter.com/#!/Anonakomis/status/81862870664609792 #js”

August 21st WordPress blog entitled If ya can’t beat em, make some shit up??? LMAO!: “coincidence much?” “projection much??”

I wonder if TR ever lets slip a similar phrase? Oh, what’s this?:
14th March: “@kaepora Nadim, delete much? You’re in the snitch crew ?https://twitter.com/#!/realytcracker/status/143411708369715201 of @Anonymousabu & @ioerror”

Coincidence much?

#9: Jester loves to leave trailing dots in his tweets:

9th April: “<<< drums fingers on desk….”

3rd April: “Now…… imagine…… how many of those listed in my last, were ummmmmm – on the ‘shit list’ – just a thought??? #anonymous”

22nd November: “AFK…….”

He also uses trailing dots when he’s typing live into Notepad in this YouTube video: http://www.youtube.com/watch?v=WeO44IWlkfU

More of Jester’s ‘trailing dots’ tweets are cited at the end of this dox. Now it’s TR’s turn to deploy this tactic:

6th April: “@kennethlipp that’s how it went down with Barrett Brown too. Remember they ended up going to every address for him….according to him”

5th April: “@Bitchiest @KalyptoNet @TomRyanBlog The Secretary disavows this tweet and everybody in it…”

4th April: “#Anonymous ever wonder why certain high ups in your collective are never V& …. Look at cases that never went to court & who has relocated”

Again, more examples of this idiosyncrasy can be found cited at the end of this dox, as well as liberally scattered throughout Tom Ryan’s Twitter feed.

#10: Arrows. Jester loves to use arrows to break up words in his tweets, <<just like this>>:

9th April: “”@VizFoSho: @th3j35t3r dun goofedhttp://www.picvalley.net/u/1980/407013641289457528133400533586itAR4VE93lm7DAkGd2.PNG@RepDan_Gordon” <<< Shit ya got me! What am I to do? Btw now I am near north pole.”

28th March: “@wwpinc – just in case you were not aware: >>>https://th3j35t3r.wordpress.com/support/ <<< – keep up the great work ;-) Peace. #pgr #wwp#woundedwarrior”

Now TR:

6th April: “Hmmm So @AnonW0rmer is arrested at 10:30http://j.mp/HiAASP tweets till 3:32, @ItsKahunadisappears @AnonymousIRC disappears for 4 Day >>>”

13th March: “Don’t know whether to laugh or feel bad but come on: (compatible;+MSIE+6.0;+Windows+98;+Win+9×4.90) << In This Day An Age??”

9th March: “conspiracy 1. a plan or agreement to carry out an illegal or harmful act 2. the act of making such plans >> aka #Anonymous Ops #justsayin<<”

Glance through their tweets and you’ll see that J and TR use <<arrows>> all the time.

#10: UPPER CASE. Compare the tweets of J and TR and you’ll notice that they both love to highlight single words in capitals. Jester first:

9th April: “WARNING: Tweeps in mirror are closer than they appear.”

18th March: “I’m still asked WHY I hit #wikileaks, skip to 28mins 12secs & Major TJ O’Connor abt sums it uphttp://www.youtube.com/watch?v=buY3I4PkK98<<worth watching it all.”

11th March: “@repdangordon be advised, when u file ur complaint to feds, they ARE going need ur cell for forensics to determine IF I hacked u at all ;-( ”

Tom Ryan’s turn:

5th April: “INTERESTING: What is this ugly brown stain on a Key Member of Anonymous’ back? I need to do my cropping for the new site launch. Peace!”

5th April: “#Anonymous why so many military and sovereign citizen connections? GOD I aam glad I took 2 weeks to lay low.”

4th April: “@MaxVenator Too cold and windy for the Hamptons BUT you gave me a good idea. Maybe we can turn Plum Island into a resort for#Anonymous”

Jester and Tom Ryan both use this technique DOZENS of times in their tweets.

#11 features a more subtle similarity between our Jester and our Clown:

Jester, 21st August: “If ya can’t beat em, make some shit up??? LMAO! -”

TR, 16th March: “@exiledsurfer ROFLMAO! Reminds me of being in Bahrain & Abu Dhabi hearing Garth Brooks “Friends in Low Places””

Jester and Thomas don’t always laugh their asses off, but when they do, you can bet it’s in upper case with an exclamation mark at the end. (More examples, as always, are cited in the conclusion of this dox.)

#12: J and TR aren’t very good at spelling. They struggle especially with words such as ‘its’ and ‘it’s’. Jester’s tweets aren’t usually too bad for typos, as he doesn’t rush them (because he knows they will be analyzed by a wide range of foes who might otherwise have cause to mock him for his poor grammar). He also has the autocorrect on his Android phone to help him. He still struggles with those pesky apostrophes that autocorrect can’t pick up however, especially when he tweets from his desktop:

6th March: “WTF is Wikileaks gonna do now it’s source of illegally obtained private info (anon/lulz) has had it’s head & skillset removed? #2birds1Stone”

21st June: “Seems almost as if ‘somebody’ doesn’t want you to see my last link – here’s a pastebin of it’s content.”

In his WordPress blog however, Jester often mixes up his apostrophes, especially in words such as ‘its’:

“With Netcat listening at the other end for incoming connections, you can configure it to execute it’s own script when it receives a connection for example to send a Message of the Day to the connecting device, you would run netcat like this on your server”

Watch his two YouTube videos (links cited at the end) in which he types directly into Notepad and you’ll see he also fails to put apostrophes into words such as  ‘lets’, ‘its’ and ‘Thats’. 2:20 into his XerXes DoS Attack video and you’ll see that the text displayed on Jester’s self-designed software also contains typos: ‘SUCCESFULLY’ should have two ‘s’ in the middle, while at 2:29, you’ll see that ‘Secured’ has also been spelt wrongly. At 6:52 he also makes the same error when typing into Notepad.

Does Tom Ryan fare any better in the spelling stakes? No. In fact he’s even worse when it comes to tweeting typos. That’s because Thomas tweets ten times as frequently as Jester, tweets more hastily (lots of rushed replies to his Twitter buddies) and because he writes the tweets on his Mac, which doesn’t autocorrect his mistakes. Look:

4th April: “@AdrianChen surprised your not all over the@Anonw0rmer arrest and shortly after the disappearance of @itskahuna”

5th April: “To those I owe something too, It’s on it’s way!”

30th March: “RED ALERT: tomorrow is #NoClick31 just as a precaution. Rumor has it #Anonymous is using it’s Porn Bots for #opBlackout click to DDOS attack”

Wanna see more? Just read his tweets.

OK, we’ve almost reached the really juicy stuff linking Jester and Thomas, but first there are a couple more writing similarities to rattle through:

#13: J and TR write numbers numerically rather than alphabetically – even when composing short tweets.

Jester, 28th Feb: “4 more Anons V&’ed http://tinyurl.com/8a2g5k5#anonymous”

10th Nov: “#stayfrosty -Word of advice 2 @barrettbrownlol: Just because you’re paranoid doesn’t mean they aren’t out to get you. >”

27th November: “#saladin (XerXes bro)- ‘the best weapon is the one u never have 2 fire…I prefer the weapon u only need 2 fire once.’”

20th July: “Never saw a wild thing sorry 4 itself. Small bird drop frozen dead from bough without ever having felt sorry 4 itself.”

TR – yep, you’ve guessed it – does exactly the same:

5th April: “@ohmylulz will with 2 False Positives.@missarahnicole @AsherahResearch”

4th April: “Ruh roh! A certain key #Anonymous member disappears for 4 days then reappears. We know what that means.”

3rd April: “@Ihazcandy I should start digging into them. Since I have 2 weeks of downtime.”

OK, moving on (we’re nearly done, I promise) to #14: Hashtags. If you go to tweetstats.com and enter TR and J’s twitter names into separate windows, a series of pretty graphs will be generated that will allow you to compare their tweeting patterns. You’ll notice that they tweet from separate devices, to eliminate the possibility of accidentally tweeting to the wrong account – Tom Ryan likes to keep his iPhone in one pocket and his Android in the other for when he’s playing Jester. Click on the Tweet Cloud tab at the top of the page and you’ll be able to view the most frequent hashtags used by both parties. Not too surprisingly, given their obsession with all things masked, it’s #anonymous. There are also three other hashtags that the pair use prominently however – #fail, #justsayin and #infosec. The latter one is understandable, but the other two? Interesting. Let’s see some #fail and #justsayin in action, starting with Jester:

3rd November: “#opcartel #anonymous You should really listen to what this man has to say. Remember your track record is full of #fail”

15th August: “@anonymousabu U R #fail. U hurt who u claim to fight for (lol), u have agenda < http://reg.cx/1Qps& the agenda is >”

14th August: “So @landrytom u finally got ur mention. Damn u zeroed my ‘xchat’? Please all check out his timeline. Then ask him where is the pwnage? #fail”

29th July: “1st up: My doxing. That’s a #fail. (again) I have never been Ryan Berg, John Willander, Robin Jackson, Anthony Freed, Beau Colvin. #opFrosty”

2nd June: “http://www.foxnews.com/scitech/2011/06/02/pentagon-has-secret-list-cyber-weapons/ – #justsayin;-) #oorah”

Now it’s Tom Ryan’s turn to #Fail (#Justsayin):

5th April: “@agentdarkapple @AsherahResearch she’s definitely is no @elizadushku , Mila Kunis or Megan Ackerman. So she’s a #Fail”

2nd April: “@subverzo TY for verifying 2 alternate personas yours & @CrappyTires . FYI, Everyone in the CT world knows Shumukh al-Islam Forum. #FAIL”

9th March: “@AnonymousIRC you do know they rig cases to#FAIL inorder to capture bigger FISH ….. Right?@atopiary @lolspoon @AnonymouSabu”

9th Feb: “Dangerous Tweets: Arrested, fined in 140 characters or less http://j.mp/yWAV4G << What ever happened to contextual analysis? another#Fail” (Note the classic Jester-style arrows used in this tweet as well.)”

10th March: “#anonymous remember threatening people or family members can lead to several crimes. If they are harmed it becomes much worse. #justsayin”

9th March: “conspiracy 1. a plan or agreement to carry out an illegal or harmful act 2. the act of making such plans >> aka #Anonymous Ops #justsayin<<”

Plenty more examples, as always, can be found cited in the footnotes at the end of this dox.

OK, here endeth the writing analysis lesson. Thank you for your patience :) It would be fair to say we’ve established that Jester and Tom Ryan tweet in an uncannily similar manner, but that’s not all. Now we get on to the really good shit…

#15: Tweet times. Using tweetstats.com, it’s possible to compare the times at which J and TR tweet. A quick glance at their respective Tweet Density graphs reveals a similar pattern:  neither of them tweets between 3am and 7am EST: they’re both East coast bitches. Interesting.

#16: A few days ago, @VizFoSho tweeted the following image:

http://www.picvalley.net/u/1980/407013641289457528133400533586itAR4VE93lm7DAkGd2.PNG

It depicts two Jester tweets from 7th April, both geo-stamped with Atlantic City, NJ on them. Atlantic city is within 150 miles of NY, where Tom Ryan lives. On 26th March, Jester also posted a single tweet from New York: https://twitter.com/#!/th3j35t3r/status/184333789697282048

Normally, Jester’s tweets don’t reveal his location. Up until April 2012, there had only been four instances in which Jester’s tweets revealed his location – and two of those occurred when he was at DEFCON Nevada and Hacker Halted in Miami, occasions when he was undoubtedly eager to reveal his location in order to prove he was in attendance. Were the New York and Atlantic City revelations accidental (Tor for Android not working properly perhaps?) or was Jester trying to provide more misinformation?

After @VizFoSho pointed out the NJ link (the NY slip-up had gone unnoticed), Jester went out of his way to post two tweets from ridiculously exotic locations – Cape Town on 9th April and then Hawaii on 10th April:

https://twitter.com/#!/th3j35t3r/status/189464600318722049
https://twitter.com/#!/th3j35t3r/status/189464600318722049 “The octopus here is amazing. Dontcha think :-)”

Jester has never previously switched his location to a far-flung location purely for the lulz. Why should he suddenly be trying so hard now that he’s been identified as an East coast slacker? If he’s not Tom Ryan, why should be bothered if people think he’s from NJ or NY?

On 4th April, Jester made the second of his two Atlantic City tweets at 4:03pm. 11 minutes earlier, Tom Ryan had also posted a tweet. For the next 48 hours, neither account tweeted – a rare occurrence, especially for TR who averages over 30 tweets a day. Enjoying a couple of days in Atlantic City playing the slots, perhaps?

Here are the 4th April tweets from both parties:

https://twitter.com/#!/th3j35t3r/status/187610604314431488

https://twitter.com/#!/th3j35t3r/status/187616455762784257

https://twitter.com/#!/TomRyanBlog/status/187612824187584512

Curiouser and curiouser. But that’s not all. On 23rd March, TR tweets:

“Headed to South Beach to enjoy this great weather! Later Tweeps!”

https://twitter.com/#!/TomRyanBlog/status/183199880922148864

For the next 48 hours, Jester and Tom Ryan are both absent from Twitter.

A month earlier, on 17th February, the same thing happens after TR tweets:

“Off the Grid for a few days ! Have a great 3 day weekend!”

https://twitter.com/#%21/TomRyanBlog/status/170321854723129344

For the next four days, neither party tweets. The first person to break the Twitter silence is Jester, and it’s another rare instance of him revealing his location – Arlington VA.
https://twitter.com/#!/th3j35t3r/status/172077181051219968
Enjoy your three-day weekend, Thomas?

I stated earlier that until April Jester had never previously switched his location to a far-flung country, but I lied – there IS actually one occasion when Jester appeared to be out of the country. On 25th January, he posted the following tweet:

“To all who have DM’ed asking after my whereabouts & welfare…am safe & limbering up. It’s a brave new year. TY 4 support. Stay Frosty.”
https://twitter.com/#!/th3j35t3r/status/162261098035298304

His alleged location? Brescia, Italy. What about Thomas Ryan – what was he up to around this time? Well here’s the thing: between 23rd and 26th January, TR (a man who likes to tweet all day, erryday) doesn’t post a single tweet. Too busy enjoying the bruschetta, washed down with a bottle of Barolo perhaps?

A final word on correlating Twitter times before we move onto our final two points: take a look at the timeline for Jester and Tom Ryan’s tweets. Notice how they often tweet at almost exactly the same time as one another? For example, take Tuesday 10th April. After two hours without activity from either account, Thomas posts the following at 15:30pm:
“Now I feel really special. Someone created a hidden stream about me and monitors it.”
One minute later, at 15:31, Jester tweets “@alemarahweb‏ – ‎http://www.alemara1.com‏ – TANGO DOWN – أنا كنت”
Observe any two Twitter accounts for long enough and you’ll find timing coincidences of course. However, compare Jester and Tom Ryan’s accounts on any given day and you’ll spot a predictable pattern: they always broadly correlate i.e. there is a short burst of tweets, followed by a 45 minute break while Jester/Ryan goes for a wank or to chow down some beef jerky.

Right, two more points to raise and then I’ll leave you in peace:

#17: When LulzKitten tweeted Jester’s dox on 29th March, how did Tom Ryan – the man with the military wallpaper on his Twitter page – respond? “@J_P_Holloway @lulzkitten @YourAnonNewsyou guys really suck at DOXing thinking I am@th3j35t3r everyone knows I was never in the Army #fail”
https://twitter.com/#!/TomRyanBlog/status/185189598677319680

Two things stand out here: firstly, we have no way of knowing that Jester was in the army. Yes, he has an interest in all things military, but the rumor that he actively served in the army is widely believed to be false.

On 13th March however, TR tweeted the following: “When I was in the military, Greenpeace would try to board Aircraft Carriers. Some things aren’t smart & never thought of till it’s too late.”
https://twitter.com/#!/TomRyanBlog/status/179637065154170880

Military, shmilitary; does anyone see a connection here? Thought so. Without further ado, let’s proceed to our final, fateful tweet of interest. On 10th February, Thomas Ryan tweeted the following:

“I wonder if operating Multiple Personas has ever given anyone Multiple Personality Disorder.”

I don’t know Jester, you tell me ;) Tick tock. No response? Oh well, Stay Frosty…

**********

POSTSCRIPT: Could it be that Tom Ryan is such an attention-whore that he’s trolling us all in the hope of being mistaken for the Jester? I guess it’s technically possible, but if so, it’s the most elaborate and painstaking trolling campaign ever conceived – and one that would have to involve the collusion of both parties. If, by some miracle, Thomas Ryan is not Jester, he knows exactly who Jester is – to the extent where he probably even vacations with him. When you review all the evidence however, there can only be one logical conclusion to draw: they are one and the same person.

On 13th March, Tom Ryan posted the following poignant message: “@ArtByAlida although Anonymous doesn’t like@th3j35t3r I do. It’s safer that certain people are never doxed.”
https://twitter.com/#!/TomRyanBlog/status/179636120710152192

You’re right Tom – it would be safer, but the truth always comes out in the wash, don’t you find? I hope you’ve got a few passports lying around, cos you’re gonna need them. Remember those Muslim extremists whose websites you downed and whose threats you retweeted? Oh, they mad. They real mad.

One last thought before I shovel the dirt over Jester’s shriveled corpse: I notice that your Twitter nick is Boondock Saint, in tribute to The Boondock Saints, a movie about two Irish vigilantes. Just out of interest, I wonder what The Internet Surname Database would make of Thomas Ryan’s moniker?

http://www.surnamedb.com/Surname/Ryan

Why, they appear to believe that Ryan is an Irish surname. To quote from my favorite hacktivist for good, ‘Coincidence much?’

Congratulations Thomas; you just got pwned by an amateur who doesn’t even have the skills to label himself a skid, never mind a hacker. Butthurt much?

In the words of your nemesis, @anonymouSabu, “Nigga, troll harder.”

pwned by @spoolfiend

**********

Citations:

LulzKitten tweet linking TR and J: https://twitter.com/?utm_medium=twitter&utm_source=twitterfeed#!/YourAnonNews/statuses/185150794079809536

Check when th3j35t3r and RobinSage joined Twitter: http://www.whendidyoujointwitter.com/

TR’s LinkedIn (where you’ll see proof that he attended Hacker Halted and DEFCON last year): http://www.linkedin.com/in/tommyryan

TR and J professing their love of sushi:
https://twitter.com/#!/TomRyanBlog/status/178202424056610817
https://twitter.com/#!/th3j35t3r/status/128849629939892224

Tom Ryan dox by AntiSec: http://pastebin.com/ZAxBWKi8

J likes to say ‘Hmmm’ a lot:

https://twitter.com/#!/th3j35t3r/status/187996120180457472

Occupy Wall Street?? 99%?? Ummm.

https://twitter.com/#!/th3j35t3r/status/186958030791905282

https://twitter.com/#!/th3j35t3r/status/174163673940631552

https://twitter.com/#!/th3j35t3r/status/182268058168082432

https://twitter.com/#!/th3j35t3r/status/187535767843778560

TR also likes to say ‘Hmmm’:

https://twitter.com/#!/TomRyanBlog/status/188096685250068480

https://twitter.com/#!/TomRyanBlog/status/180117386291195906

https://twitter.com/#!/TomRyanBlog/status/178896960546287617

https://twitter.com/#!/TomRyanBlog/status/177482894443417600

https://twitter.com/#!/TomRyanBlog/status/170195932388925441

https://twitter.com/#!/TomRyanBlog/status/189680060863754241

J goes ‘Tick tock’:

https://twitter.com/#!/th3j35t3r/status/96268183723450369

https://twitter.com/#!/th3j35t3r/status/177033974324002816

https://twitter.com/#!/th3j35t3r/status/83145887307677696

https://twitter.com/#!/th3j35t3r/status/95195869921554433

https://twitter.com/#!/th3j35t3r/status/98828156663889920

Lulzsec’s CloudFlare Configuration

TR goes ‘Tick tock’:

https://twitter.com/#!/TomRyanBlog/status/174132025215811585

J ‘Stay frosty’:

https://twitter.com/#!/th3j35t3r/status/186923663734489088

https://twitter.com/#!/th3j35t3r/status/134434056925483008

https://twitter.com/#!/th3j35t3r/status/129246959021203456

https://twitter.com/#!/th3j35t3r/status/128849629939892224

https://twitter.com/#!/th3j35t3r/status/81862725638160385

https://twitter.com/#!/th3j35t3r/status/76373640832225282

TR ‘Stay frosty’:

https://twitter.com/#!/TomRyanBlog/status/189679107347460097

https://twitter.com/#!/TomRyanBlog/status/180689040385900544

https://twitter.com/#!/TomRyanBlog/status/179655809280655361

https://twitter.com/#!/TomRyanBlog/status/179298552680415232

https://twitter.com/#!/TomRyanBlog/status/178571536691765249

https://twitter.com/#!/TomRyanBlog/status/178529239052730368

https://twitter.com/#!/TomRyanBlog/status/178336251240382464

https://twitter.com/#!/TomRyanBlog/status/179622057305317376

https://twitter.com/#!/TomRyanBlog/status/179802508372344832

J likes to wink:

https://twitter.com/#!/th3j35t3r/status/184373769958211584

https://twitter.com/#!/th3j35t3r/status/120271829377097728

https://twitter.com/#!/th3j35t3r/status/76373640832225282

https://twitter.com/#!/th3j35t3r/status/185019516793786370

https://twitter.com/#!/th3j35t3r/status/81477469135319040

https://twitter.com/#!/th3j35t3r/status/178878010961833986

TR likes to wink:

https://twitter.com/#!/TomRyanBlog/status/187885131976024064

https://twitter.com/#!/TomRyanBlog/status/187372927946211328

https://twitter.com/#!/TomRyanBlog/status/179932280809197568

https://twitter.com/#!/TomRyanBlog/status/180689040385900544

https://twitter.com/#!/TomRyanBlog/status/189679107347460097

https://twitter.com/#!/TomRyanBlog/status/169492746871119873

https://twitter.com/#!/TomRyanBlog/status/179655809280655361

https://twitter.com/#!/TomRyanBlog/status/179802508372344832

https://twitter.com/#!/TomRyanBlog/status/179669923163938816

https://twitter.com/#!/TomRyanBlog/status/187914228810784769

J ‘much?’:

https://twitter.com/#!/th3j35t3r/status/82200919365787648

https://twitter.com/#!/th3j35t3r/status/81871769832665088

If ya can’t beat em, make some shit up??? LMAO!

TR ‘much?’:

https://twitter.com/#!/TomRyanBlog/status/179927195022659584

J ‘…’:

https://twitter.com/#!/th3j35t3r/status/189139338796351492

https://twitter.com/#!/th3j35t3r/status/186958030791905282

https://twitter.com/#!/th3j35t3r/status/186749312166932483

https://twitter.com/#!/th3j35t3r/status/128849629939892224

https://twitter.com/#!/th3j35t3r/status/138951576789331968

https://twitter.com/#!/th3j35t3r/status/168769540598145025

https://twitter.com/#!/th3j35t3r/status/179233292682407937

https://twitter.com/#!/th3j35t3r/status/184321677092597760

TR ‘…’:

https://twitter.com/#!/TomRyanBlog/status/188088227704487936

https://twitter.com/#!/TomRyanBlog/status/187342615648272384

https://twitter.com/#!/TomRyanBlog/status/188829946439929856

https://twitter.com/#!/TomRyanBlog/status/189449964219400194

https://twitter.com/#!/providesecurity/status/187253830315016192

https://twitter.com/#!/TomRyanBlog/status/189757038778269696

https://twitter.com/#!/Render64/status/187912159655772161

J ‘<<arrows>>’:

https://twitter.com/#!/th3j35t3r/status/189463655811780609

https://twitter.com/#!/th3j35t3r/status/185019516793786370

TR ‘<<arrows>>’:

https://twitter.com/#!/TomRyanBlog/status/179683104972210176

https://twitter.com/#!/TomRyanBlog/status/188096685250068480

https://twitter.com/#!/TomRyanBlog/status/177907983227949056

https://twitter.com/#!/TomRyanBlog/status/178555495806803968

https://twitter.com/#!/TomRyanBlog/status/179321093897723904

J using UPPER case:

https://twitter.com/#!/th3j35t3r/status/189165520556277761

https://twitter.com/#!/th3j35t3r/status/178895612723478531

https://twitter.com/#!/th3j35t3r/status/181438361511280640

https://twitter.com/#!/th3j35t3r/status/82538803188862976

https://twitter.com/#!/th3j35t3r/status/98386681836736512

https://twitter.com/#!/th3j35t3r/status/177544329458491392

https://twitter.com/#!/th3j35t3r/status/135438221483048960

https://twitter.com/#!/th3j35t3r/status/177568887334903808

https://twitter.com/#!/th3j35t3r/status/110676313366462464

https://twitter.com/#!/th3j35t3r/status/127396730621788160

https://twitter.com/#!/th3j35t3r/status/100282273072549890

https://twitter.com/#!/th3j35t3r/status/178566407909412866

https://twitter.com/#!/th3j35t3r/status/132173511874711552

https://twitter.com/#!/th3j35t3r/status/94485325744848896

https://twitter.com/#!/th3j35t3r/status/97333572955947008

https://twitter.com/#!/th3j35t3r/status/91970882095943680

https://twitter.com/#!/th3j35t3r/status/141002481260961792

TR using UPPER case:

https://twitter.com/#!/TomRyanBlog/status/187908914417893379

https://twitter.com/#!/TomRyanBlog/status/188461215348031489

https://twitter.com/#!/TomRyanBlog/status/187018163567853568

https://twitter.com/#!/TomRyanBlog/status/185423913197637633

https://twitter.com/#!/TomRyanBlog/status/187240901574266881

https://twitter.com/#!/TomRyanBlog/status/180380942614016001

https://twitter.com/#!/TomRyanBlog/status/187903623693467648

https://twitter.com/#!/TomRyanBlog/status/187361681452699649

https://twitter.com/#!/TomRyanBlog/status/187541167972417536

https://twitter.com/#!/TomRyanBlog/status/187322975383588864

https://twitter.com/#!/TomRyanBlog/status/187309018623127552

https://twitter.com/#!/TomRyanBlog/status/187558445036216320

https://twitter.com/#!/TomRyanBlog/status/187541167972417536

https://twitter.com/#!/TomRyanBlog/status/187656738818899968

https://twitter.com/#!/TomRyanBlog/status/187261297669308416

https://twitter.com/#!/TomRyanBlog/status/187530160134828032

https://twitter.com/#!/TomRyanBlog/status/184620737821286402

Jester ‘LMAO!’:

https://twitter.com/#!/th3j35t3r/status/105305979733815296

TR ‘ROFLMAO!’:

https://twitter.com/#!/TomRyanBlog/status/180709354624925696

https://twitter.com/#!/TomRyanBlog/status/179773457943371776

https://twitter.com/#!/TomRyanBlog/status/187709243087003650

https://twitter.com/#!/TomRyanBlog/status/186965988082843648

https://twitter.com/#!/TomRyanBlog/status/187272732147322880

https://twitter.com/#!/TomRyanBlog/status/187583747154132992

J struggles with apostrophes:

https://twitter.com/#!/th3j35t3r/status/83239272504770560

https://twitter.com/#!/th3j35t3r/status/177080046597578752

https://twitter.com/#!/th3j35t3r/status/186749312166932483

(See his blog for heaps more examples.)

http://www.youtube.com/watch?v=WeO44IWlkfU (Skip to 5:07); ‘lets’, ‘its’ and ‘Thats’ should all have apostrophes.

http://www.youtube.com/watch?v=yJTvzErKHWE Look at the Notepad he’s typing into: ‘lets’ should have an apostrophe and ‘peak’ should have two ‘e’s in it. Skip to 2:20: the text on Jester’s self-designed Xerxes machine also contains typos: ‘SUCCESFULLY’ should have two ‘s’ in the middle. At 2:29, you’ll see that ‘Secured’ has also been spelt wrongly. At 6:52 he also types the same misspelt word into Notepad.

TR also struggles with apostrophes:

https://twitter.com/#!/TomRyanBlog/status/187920367845781504

https://twitter.com/#!/TomRyanBlog/status/187710784690855936

https://twitter.com/#!/TomRyanBlog/status/180432605680902144

https://twitter.com/#!/TomRyanBlog/status/187645320442822656

https://twitter.com/#!/TomRyanBlog/status/187531807598714880

https://twitter.com/#!/TomRyanBlog/status/187917710498336769

https://twitter.com/#!/TomRyanBlog/status/185737304290234368

https://twitter.com/#!/TomRyanBlog/status/178485680899502081

J tweets ‘TANGO DOWN’:

https://twitter.com/#!/th3j35t3r/status/175040242477318144

https://twitter.com/#!/th3j35t3r/status/175029005718794240

TR tweets ‘TANGO DOWN’:

https://twitter.com/#!/TomRyanBlog/status/186482996352778240

https://twitter.com/#!/TomRyanBlog/status/186482690797744128

J always writes numbers numerically:

https://twitter.com/#!/th3j35t3r/status/174540542724669441

https://twitter.com/#!/th3j35t3r/status/93771304607563776

https://twitter.com/#!/th3j35t3r/status/114830590452310016

https://twitter.com/#!/th3j35t3r/status/134434056925483008

https://twitter.com/#!/th3j35t3r/status/140925221090758656

https://twitter.com/#!/TomRyanBlog/status/185576329712910336

TRB always writes numbers numerically:

https://twitter.com/#!/TomRyanBlog/status/187211721365139456

https://twitter.com/#!/TomRyanBlog/status/187712594373648384

https://twitter.com/#!/TomRyanBlog/status/178965908696481793

https://twitter.com/#!/TomRyanBlog/status/187680293984022529

https://twitter.com/#!/TomRyanBlog/status/187539614876176384

Compare TR and J’s tweet patterns, in particular the time of day they tweet at and the hashtags they use: http://tweetstats.com (Open two separate windows and enter their Twitter names).

J using #Fail:

https://twitter.com/#!/th3j35t3r/status/132152349639720960

https://twitter.com/#!/th3j35t3r/status/103200916156588032

https://twitter.com/#!/th3j35t3r/status/102784136015646722

https://twitter.com/#!/th3j35t3r/status/97030633330716674

https://twitter.com/#!/th3j35t3r/status/178966110694150144

J using #Fail:

https://twitter.com/#!/TomRyanBlog/status/187708057344671744

https://twitter.com/#!/TomRyanBlog/status/167697098047889411

https://twitter.com/#!/TomRyanBlog/status/177978089203175424

https://twitter.com/#!/TomRyanBlog/status/178269119316107264

https://twitter.com/#!/TomRyanBlog/status/186927307544477697

https://twitter.com/#!/TomRyanBlog/status/178573080438898689

https://twitter.com/#!/TomRyanBlog/status/178982123959619585

https://twitter.com/#!/TomRyanBlog/status/185189598677319680

https://twitter.com/#!/TomRyanBlog/status/186930868273676288

https://twitter.com/#!/TomRyanBlog/status/186965988082843648

J using #Justsayin:

https://twitter.com/#!/th3j35t3r/status/76373640832225282

TRB using #Justsayin:
https://twitter.com/#!/TomRyanBlog/status/177907983227949056

https://twitter.com/#!/TomRyanBlog/status/179578215411630080

https://twitter.com/#!/TomRyanBlog/status/178518183525888000

https://twitter.com/#!/TomRyanBlog/status/184620737821286402

https://twitter.com/#!/TomRyanBlog/status/184270112361168898

_________________________________________________________________________

PIRAX DOXING CONTINUED…  (The ‘smedley manning’ debacle)
You took this DOX’ing really well, to be honest. You shook it off as a mere fancification numerous times, and continued forward head-strong, apparently unmoved by those watching from the outside. But you knew deep-down that you had to eradicate this DOX from the minds of the enemies you have procured over the years. You know that a lot of people would like to see you gone. So, you came up with a plan.

The plan went something like this:
On May 10th, you registered the Twitter account @cubespherical and labeled it as “Smedley Manning”, as an obvious satirical homage to the now imprisoned Bradley Manning, a REAL soldier who fought for truth. You then exchanged a few messages with @th3j35t3r to make it look like a legitimate conversation, and began to “leak” information about yourself. We both know that this information is false, and was only created to distract others from the real DOX, located above. We know you are somewhat intelligent. However, there will always be those who will outsmart you. Consider yourself outsmarted.

Here is the analysis, broken down:
After you took down both your Twitter and WordPress blog, the mainstream blogosphere was certain you had finally been figured out. They assumed this was your acknowledgement of your own defeat and were positive you had been successfully DOX’d by @cubespherical. You were finally giving up. You knew they would react this way… It was all a part of your master plan. But, in reality, you ARE @cubespherical. Yes, @th3j35t3r and @cubespherical are the same person. Nicely done, Tom. You fooled almost everyone. But, like all good things (“good” meaning something along the lines of “idiotic” in this case), you must come to an end.

So how can we justify this claim? Where is our proof? Simple: You gave us everything.

Red-Flag #1: You have been a pretty regular user of Twitter until very recently, after the above DOX was published.

Red-Flag #2: An entirely new DOX is now being teased, even while the above DOX is as sure-fire as they come. Who would believe that a DOX coming from @cubespherical, an entirely new one at that, would be legitimate?

Red-Flag #3: You sat idle on Twitter while @cubespherical AKA Smedley Manning openly talked shit about you, only responding once things became heated on InfoSecIsland. This will take some psychological investigation, but it is damning nonetheless. Your article here is the most revealing bit of all:

http://www.infosecisland.com/blogview/21348-Not-Totally-Sure-What-Just-Happened.html

You started off with the following line, paraphrased: “I thought Smedley was my friend at first [you used the word ‘supporter’] hurr durr, but he then started threatening me hurr durr.” That doesn’t even sound realistic. But it *is* a subtle way to garner sympathy. I applaud you for you effort.

Red-Flag #4: Next up is your subtle jab at Anonymous. You changed @cubespherical’s avatar to a picture of a Guy Fawkes mask and deleted the Bitcoin address in exchange for the “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.” motto.

In your article, you say “Even if this was a common troll, he just demonstrated that any fool can speak for and ‘as’ Anonymous.”

It is clear that you did this for one reason: to throw spears at Anonymous while appearing to be a victim of cyber-bullying on a much grander scale.

Red-Flag #5: You are subconsciously promoting @cubespherical’s efforts for Bitcoin donations.
While appearing to mock @cubespherical, while still somehow conveying him as a threat, you still manage to forget to *NOT* post his Bitcoin address. Our thoughts: You WANT @cubespherical to make some money off of some Bitcoin donations. You yourself use Bitcoin pretty regularly and accept it for donations on your blog. How do we know you aren’t just promoting @cubspherical’s Bitcoin address so that YOU can profit? Here are your words, directly lifted form your blog post:

“So here’s the throwdown. ‘Smeddles’ drop my dox. Do it. You have proved and shown nothing. Only that you are completely failing. You have no bitcoins donated, you have shown 2 things to me, Anonymous have too many chiefs and not enough indians, and that your numbers, at least 9000 allegedly, combined have  0.00000001 bitcoins between them. Here is what you have so far. lol.

https://blockexplorer.com/address/15JDgkwFVXvuxCt66eUQ434ty3jrvwPfGe

Either that or they were clever enough to realize you were full of it from the get go. As I have demonstrated and stated many times before, I will never ask the public for any money.”

WHY WOULD YOU EVEN NEED TO REMIND PEOPLE THAT YOU DON’T ASK FOR DONATIONS IF THIS ISN’T EVEN YOUR BITCOIN ADDRESS? Simple. Because it actually is.

It is also worth noting that both Smedley Manning and th3j35t3r favor Ubuntu 11.xx releases. They like using GNOME, too:
http://3.bp.blogspot.com/-9LpW_-t2lkU/TpmnnnPHn6I/AAAAAAAABMA/AKBOIZUm4sM/s1600/Opera-Next-Ubuntu-Oneric.png
http://4.bp.blogspot.com/_FJH0hYZmVtc/TF59PLnLUJI/AAAAAAAAJNE/IoVU8sTFyUo/s1600/Opera+Mobile+for+Linux+(1440×797)_023.png

To conclude this talk, Tom, we would like to take this privilege to give to you a formal FUCK YOU. You have been DOX’d and your master plan to avoid the inevitable by creating a new nemesis and a new DOX while asking fools to send you money for this bogus DOX has been foiled. You are over. No one cares about the small sites you take down with your shitty XerXes tool and everyone knows you didn’t actually DDoS WikiLeaks, or even have the ability to do so. You are a fame-whoring idiot that has finally been pulled so low, you serve no purpose for ever standing up again. Goodbye.

XOXO,
PiraX <3

@TheRealPiraX
http://pirax.de
Donate Bitcoin: 17gMaYgUsx7dj532s3ezXmfMrVhJ1BfRC1
We would also like to give a shout-out to our home on VoxAnon IRC. Much love to #voxanon _________________________________________________________________________

 

BUT THATS NOT IT – DON’T FORGET THIS LITTLE GEM…

 

Thomas Ryan: The Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

The Occupy Wall Street protests have been going on for a month. And it seems the FBI and NYPD have had help tracking protesters’ moves thanks to a conservative computer security expert who gained access to one of the group’s internal mailing lists,and then handed over information on the group’s plans to authorities and corporations targeted by protesters.

Since the Occupy Wall Street protest began on September 17, New York security consultant Thomas Ryan has been waging a campaign to infiltrate and discredit the movement. Ryan says he’s done contract work for the U.S. Army and he brags on his blog that he leads “a team called Black Cell, a team of the most-highly trained and capable physical, threat and cyber security professionals in the world.” But over the past few weeks, he and his computer security buddies have been spending time covertly attending Occupy Wall Street meetings, monitoring organizers’ social media accounts, and hanging out with protesters in Lower Manhattan.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDAs part of their intelligence-gathering operation, the group gained access to a listserv used by Occupy Wall Street organizers called September17discuss. On September17discuss, organizers hash out tactics and plan events, conduct post-mortems of media appearances, and trade the latest protest gossip. On Friday, Ryan leaked thousands of September17discuss emails to conservative blogger Andrew Breitbart, who is now using them to try to smear Occupy Wall Street as an anarchist conspiracy to disrupt global markets.

What may much more alarming to Occupy Wall Street organizers is that while Ryan was monitoring September17discuss, he was forwarding interesting email threads to contacts at the NYPD and FBI, including special agent Jordan T. Loyd, a member of the FBI’s New York-based cyber security team.

 

Oh, and what do real PATRIOT VETERANS think … ?


VETERAN: We didn’t “serve our country”; We serve the interests of Capital

“I’ve seen a ton on the facebooks about “thanking veterans for their service.” As a veteran let me just be very straightforward and honest with you. We didn’t “serve our country”; we don’t actually serve our brothers/sisters or our neighbors. We serve the interests of Capital. We never risked our lives or spent months on deployment away from our family and friends so they can have this abstract concept called “freedom”. We served big oil; big coal; Coca-Cola; Kellogg, Brown, and Root and all the other big Capital interests who don’t know a fucking thing about sacrifice. These people will never have to deal with the loss of a loved one or the physical and/or psychological scars that those who “serve”, and their families, have to deal with for the rest of their lives. The most patriotic thing someone can do is to tell truth to power and dedicate yourself to building power to overthrow these sociopathic assholes. I served with some of the most real and genuine people I’ve ever met. You’ll never see solidarity like the kind of solidarity you experience when your life depends on the person next to you. But most of us didn’t join for that; we joined because we were fucking poor and didn’t have many other options.”       -Anonymous

 

IN CONCLUSION:  An obvious desperate grab to stay relevant – Does anyone care?

 

ANSWER: jester who?  Now back projects that create positive change in the world, instead of discussing individuals who support & enable the Military Industrial Complex of death, destruction, and global enslavement of Humanity.

 

OH AND FOR THOSE WHO FORGOT, A REMINDER:

cia-owns-al-qaeda

 

JFK Assassination Linked to Bush Crime Family

JFK Assassination Linked to Bush Crime Family

Short Version: For those too busy to follow this all the way through….  George HW Bush is ultimately responsible for the planning & execution of JFK, as sanctioned by his masters – The Federal Reserve families.  This explains his subsequent rise in power, from novice CIA spook, to CIA Director, Presidential Cabinet, Vice President, President…. to 33 Degree Iluminati Freemason..? Details to prove this conclusively are best conveyed by John Hankey. The connections back to GW Bush are absolutely astounding, and numerous enough for one to lose count.      -DCMX

ABOUT THIS DOCUMENTARY

Relying exclusively on government documents, statements from the best witnesses available, and the words from the mouths of the killers themselves, Dark Legacy produces a thoroughly substantiated criminal indictment of George Herbert Walker Bush, establishing beyond a reasonable doubt his guilt as a CIA supervisor in the conspiracy to assassinate John F. Kennedy. If we could present this evidence to a jury in Texas, he would pay with his life.

Part one presents the overwhelming mountain of evidence that President Kennedy was hit by bullets from the front and rear. Every witness in the Dallas emergency room attests, on camera, to the fact that a bullet from the right front blew a fist-sized whole in the back of the President’s head. The New York Times carried these statements on the day of the murder; and has covered them up ever since.

*************

Part two presents the on-camera testimony of the witnesses who actually handled the President’s body, the FBI report, and the photographic evidence all proving unequivocally that the President’s body was stolen from the Secret Service and the wounds altered, before the body was delivered to Bethesda Naval hospital for the autopsy. Jackie Kennedy accompanied an empty casket on the plane flight home. Who had the power to do all this without attracting public attention? It’s a short list.

************

Part three presents the Nazi-connections of the Bush family, which prompted the FBI to seize their assets during WW II, as Nazi assets. It presents the suppressed fact that Watergate burglar and CIA operative E. Howard Hunt was found by a jury to have been in Dallas and involved in the conspiracy to kill Kennedy. Hunt was a supervisor of the misguided CIA-led anti-Castro Cubans who broke into the Watergate. He is not only connected to Bush through Watergate; and through Bush’s father, Prescott; but five days after the assassination, the head of the FBI, J. Edgar Hoover, wrote a memo, titled “Assassination of President John Fitzgerald Kennedy” in which he named “George Bush of the Central Intelligence Agency” as the supervisor of what Hoover himself called the “misguided anti-Castro Cuban” killers of the President. Bush has said he doesn’t remember the events of that day, but FBI documents place him in Dallas.

 

It is difficult to assess the stature and significance of someone who has been dead as long as John Kennedy. His killers have also been his detractors, actively desecrating his memory, as they did his body. The movie begins with a short presentation of some of his most powerful and important speeches; including a stunning speech to the UN in which Kennedy calls for the complete abolition of the military industrial complex. These same men the military industrial complex, ripped him from us, and the darkest features of our history since that time are all directly the result of his murder.

 

 

*******  JFK ASSASSINATION EXPLAINED *******

I don’t think we are much encouraged to see History as science. Quite the opposite, actually. And of course, that’s all politics. The winners write history, and the truth be damned. Even science can have trouble trying to act like science when political issues are involved, as we see with evolution, tobacco-and-cancer, and global warming. But I think History does have a lot in common with physical science. For example, I can remember when “Continental Drift”, the idea that Africa and America were once stuck together, was very much considered “just a theory”; ridiculed by some, and regarded with amusement by many, and promulgated as likely by a tiny minority. But as time goes by, the evidence accumulates; and the meaning of old evidence begins to settle in; and ideas that were once considered outrageous gradually get worn in and start to be regarded as obvious common sense. Part of this process is the continual accumulation of new evidence. New pieces are added to the puzzle and the picture becomes more clear. And sometimes the hidden meaning of old evidence, that has been lying around for years, suddenly jumps out. Evidence of the fossils and minerals that can be found on the east coast of Africa, and on the west coast of Brazil, may have been lying around for years, before someone decided to look and see if they matched, and found that they did; and proved conclusively that west Africa and Brazil were once attached.

With regard to George HW Bush and the murder of John Kennedy, Joseph McBride found this memo in 1988.

FBI director J. Edgar Hoover wrote this memo 5 days after the assassination, naming George Bush as a CIA officer.

The last, and most crucial paragraph, is very hard to read. The following is a transcription:

“The substance of the forgoing information was orally furnished to Mr. George Bush of the Central Intelligence Agency and Captain William Edwards of the Defense Intelligence Agency on November 23, 1963, by Mr. V.T. Forsyth of this Bureau.”

When it was first released in 1978, George Bush was an obscure bureaucrat, a virtual unknown. So when the best researchers on the planet saw this memo in 1978, they didn’t pay much attention to it. When Bush became vice president two years later, no one was able to connect his now well-known name to this obscure memo. But when Joseph McBride was messing around in 1988, Bush was running for president; and when McBride saw the memo, he jumped up and shouted “Hey, this memo is about Bush! It says he was in the CIA, way back in 1963!”

And for the longest time, the focus was on this simple isolated fact: that Hoover said Bush was in the CIA in ’63. Bush said the memo must be referring to another “George Bush,” because he wasn’t in the CIA at that time. But over the years, people were able to assemble the facts from Bush’s personal life, showing his deep involvement with the CIA at that time, and with the CIA’s anti-Castro Cubans (in the memo, Hoover calls them “misguided anti-Castro Cubans”). And over time, it has become undeniable; that Hoover was referring, in his memo, to none other than George Herbert Walker Bush. And for a while, that was it. End of story.

But the title of this Hoover memo is, “Assassination of President John Fitzgerald Kennedy”. Isn’t that important? Well, you’d think so. But for the longest time, no one made much out it. Besides, Hoover scarcely mentions the assassination in the memo, instead focusing on these “misguided anti-Castro Cubans.” The body of the memo does not appear, at first, to be in any way related to the title of the memo “the assassination of President John F Kennedy”. But then Mark Lane, in his book Rush to Judgment, did the fabulous work of demonstrating, and in fact persuading a jury, that E. Howard Hunt, a major lieutenant in the CIA’s “misguided anti-Castro Cuban” program, was in Dallas and involved in the assassination. With this background, with this framework to guide the researcher, it was then possible to assemble the considerable evidence linking Bush to Hunt.

People might have taken some notice before that Bush made the unusual request, as Nixon’s ambassador to the UN, to be given an office in the White House. They may have noticed that Hunt, although he was not being paid by anyone in the White House, or answering to anyone that we know of in the White House, also had a White House office. But with the Hoover memo in hand, establishing Bush as a supervisor of the CIA’s “misguided anti-Castro Cuban” operation, it is possible to connect Bush to Hunt at the Bay of Pigs. With this memo in hand, it is possible to connect Bush and Hunt as two CIA operatives with offices inside the White House. With this memo in hand, it is possible to answer who it was that Hunt answered to inside the White House; and how he got the office in the first place. And with all that, it is possible to connect Bush to Hunt, and therefore to Dallas, to Hunt in Dallas, and to the “misguided anti-Castro Cuban” assassins of John Kennedy. Which is what Hoover did for us when he wrote the title of the memo. Little by little, the pieces start to fall into place. And pieces that in isolation meant nothing, become key parts of a whole picture.

But even so, this is not a rock-solid connection: Hunt was directly involved in the murder of JFK. And Bush supervised Hunt. But Bush probably supervised a lot of CIA people, not all of whom were directly involved in the assassination. A high-ranking officer may be connected to all of the acts of all of his troops, by reason of his being their commander. But it’s not a direct connection. It doesn’t establish that the officer knew about, or approved of, or was involved in, all the actions of those troops.

Enter FBI memo # 2:

It will come up again in a minute, so please read the first line carefully. Bush identifies himself to the FBI as an independent oil man from Houston.

This memo establishes that sort of direct connection between Bush and Hunt, in Dallas, on the day of the assassination. This memo records Bush’s phone call to the FBI, precisely an hour and fifteen minutes after the assassination. When I first encountered this memo, and when I first put it into my movie, JFK II, I simply called it “weird”. I saw it only in isolation, a weird, isolated connection between Bush and the assassination. It took me years to see it in context. That is, to see that this phone call demonstrates, clearly, that George Bush, was on duty that day.

He was staying at the Dallas Sheraton because his duty assignment was in Dallas. His phone call to the FBI cannot have been random. This James Parrott worked for Bush as a sign-painter; he was not an assassin; this phone call is not what it purports to be; Bush was fulfilling some obscure under-cover function in making this call. So the phone call has to be seen as part of his CIA assignment; which was clearly connected to the assassination. This memo then establishes that Bush was in the Dallas area, and on duty; and that his duty assignment was connected to the assassination. And if his men were in Dallas shooting the President, as they were, he was certainly on duty supervising them. If he were not supposed to be supervising them, his bosses would have assigned him to be at his home office in Houston, Texas; or on his oil rigs in the Caribbean.

But, even in context, this memo and the phone call it describes is still weird, no? I mean, how could Bush have been so stupid as to make this insanely incriminating phone call? Without this FBI memo, recording this phone call, we don’t know, or even have a good clue as to where Bush was, or what he was doing the day of the assassination. Do we? Bush has, until recently, simply said that he did not remember what he was doing the day of the assassination. But with this memo, Bush tells us where he was and what he was doing — he hands us his head on a silver platter. What could possibly have motivated him to make such a stupid error as making this phone call to the FBI? It’s a valid question. It’s not an essential question. We can still value this memo, and extract a great deal of important content from it without answering the question of why, but the question remains.

And we can make a stab at answering it. Russ Baker in his fine book, Family of Secrets suggests that Bush was attempting to establish an alibi. Now, by making this phone call, he, in fact, establishes that he was in the Dallas area, and that he was on duty, related to the assassination. So if he’s trying to establish an alibi to cover-up where he actually was and what he was actually doing, what he is trying to cover up must be some pretty bad stuff, some pretty incriminating stuff, if it’s worse than what he gives us with this alibi.

And what could be worse than what he gives us? Well, obviously, he must have actually been in Dallas. In fact, I think, this situation suggests he must have actually been in Dealey Plaza. I mean seriously. Think about it. He’s so panicked about the truth coming out, that he puts his head in a noose and hands it to us. It makes me think he must have been in Dealey Plaza, he must have been in the company of the shooters, and he must have felt that there would be evidence to prove that.

We’re just speculating at the moment. We’ll get to the evidence right now, but I’m trying to set the scene. If a guilty party is in a panic, trying to cover evidence connecting them to a crime, they may invent an explanation, or an alibi, that seems like a good idea at the time; but that in fact constitutes a very damaging admission. Anyway, stew on that while you consider this photo:

You see this tall thin man in a suit, with a receding hair line. Many people claim this is Bush, standing in front of the Texas School Book Depository. And it might be. It might be a lot of people. And perhaps, when he called the FBI and incriminated himself, Bush was concerned that he might show up in a better picture than this, where he was positively recognizable, looking towards the camera.

Personally, I don’t think this photo looks much like Bush; and in fact, I didn’t think he’d be stupid enough to just be hanging around the murder scene. I thought he was sufficiently high ranking that he’d leave such on-scene stuff to his underlings. Right? At least in my mind, if you’re an officer like Bush, you’re the coach. You plan, you train and prepare your people, and then you stand back and watch it happen. Or so I thought. Fletcher Prouty was certain that he saw pictures of Ed Lansdale, a military operative of the highest rank, signaling to the “tramps” arrested behind the grassy knoll to “be cool,” that everything was alright. Hunt was a high-ranking CIA officer, chief of the CIA’s Mexico station; and his son says he is one of the “tramps” who show up in several photos of men who were arrested behind the grassy knoll. So, some of the highest ranking members of the killers’ operation were apparently there, on the front line, to make sure that when things went wrong, as they inevitably do, these high ranking officers could be there to fix whatever the problem was. So, given that high- and low- ranking CIA officers were present, this photo of this thin man in a suit might, indeed, be Bush. It’s possible.

And now, look at this picture of the Dal-Tex building. The Dal-Tex building is across the street from the Book Depository, and many leading researchers into the assassination, including Jim Garrison, say there was certainly a team of shooters in this building:


[click for larger]

And as you can see, some imaginative individual has added some color to indicate three men in this window. Very creative, very imaginative; and at least plausible. Still, it takes way too much imagination and effort, to see Bush’s face. But now observe this link: http://www.ratical.com/ratville/JFK/WTKaP.html

 

Actually, You don’t have to stop and read it, because I’ll quote the relevant part. It’s a statement from Roger Craig, winner of the deputy of the year award for Dallas in 1960, and one of the most honest men working that day in Dallas. He’s an amazing and heroic fellow, worthy of all the time you could take looking into his background and character. And here, in the following passage, he is describing a conversation he had with Jim Garrison, and he says,

 

“Jim also asked me about the arrests made in Dealey Plaza that day. I told him I knew of twelve arrests, one in particular made by R. E. Vaughn of the Dallas Police Department. The man Vaughn arrested was coming from the Dal-Tex Building across from the Texas School Book Depository. The only thing which Vaughn knew about him was that he was an independent oil operator from Houston, Texas. The prisoner was taken from Vaughn by Dallas Police detectives and that was the last that he saw or heard of the suspect.” (emphasis added)

 

Holy Moe Lee! Please notice that, in speaking to Jim Garrison, Craig says “in particular”. Apparently he and Vaughn thought this was the most significant arrest made that day; pretty amazing given that E.Howard Hunt was arrested in the rail yard behind the grassy knoll. And the only thing Craig knew about this “particular” arrestee was that he had exactly the same singular CIA-cover, “an independent oil operator from Houston, Texas”, that George Bush had used that same day in his contact with the FBI.

 

Now. There are a very limited number of possible explanations for who this “independent oil operator” was. Let’s look at them.

 

It is conceivable that the CIA had two men in Dallas area that day, supervising the shooters, who both had the designated cover of being an “independent oil operator from Houston.” Bush was one, as the evidence above clearly shows; and perhaps there was another who was with the shooters in the Dal-Tex building, supervising them directly. But unless the CIA overlords were trying to set Bush up, they would not have told anyone else to use Bush’s CIA cover to identify themselves to the police. If another man was involved in the crime, and was arrested for it, and he told the cops he was an “independent oil operator from Houston,” this would tend to throw suspicion in Bush’s direction. Bush’s association with the CIA’s Cubans was already widely known. Fletcher Prouty knew and wrote of it. Fabian Escalante, the head of Cuban counter intelligence, knew and has written about it. James Files, who claims very credibly, to have been a driver for the Mafia shooters in Dallas, has spoken on-camera about it. And FBI director J. Edgar Hoover, knew about it and wrote about it in his memo. So Bush was already a suspect in Hoover’s eyes. The CIA planners, then, would not have told anyone else, “in case you get arrested, tell the cops you’re an independent oil man from Houston”. Right? They would not have done this, since it would tend to incriminate Bush, who was already in a highly visible, highly suspicious position.

 

Another unlikely possibility is that this “independent oil operator from Houston” was just some innocent oil operator, who somehow managed to attract suspicion, and was arrested. Do you think it’s possible that another oil man from Houston just happened to be in that corner of Dealey Plaza? I hope you think it’s possible. Because, as unlikely as it seems, if you think it was possible, then certainly Bush would have been reasonable in thinking that, as he was being arrested, there were other independent oil operators in the crowd who witnessed his arrest. You see, Bush spoke to a group of oil men in Dallas the night before the assassination*2. If it were possible that some of them were in Dealey Plaza, he would need to be terrified of the possibility that some of them might actually have seen the arrest, and would have been able to identify him as the object of that arrest.

 

No wonder, then, that Bush freaked out, and made this stupid incriminating phone call to the FBI. Even if it showed that he was not in Houston, or in the Caribbean, but in Dallas, at least it suggested that he was not in police custody for the murder of the President, in Dealey Plaza.

 

But now stop and think a minute: why was he arrested? What was he doing that drew this cop’s attention at all? What could he possibly have been doing to make this cop think that he needed to arrest Bush? Perhaps walking out of a building without attracting attention is harder than it sounds; and it reasonable to suppose that the crowd outside the Dal-Tex building had heard the shots, had heard that the President had been wounded, and they were carefully scrutinizing anyone who came out of the building. But this story shows clearly that Bush was not the sort of cold-blooded killer who could take part in the murder of a man, and then act and look like nothing was going on as he tried to leave the scene of the crime. And it turns out that as an old man, Bush continues to suffer from this character trait, of being unable to hide feelings that need to be kept secret. As you can see in this link, http://www.youtube.com/watch?v=ft3eGWZd7LE , at Gerry Ford’s funeral, Bush suddenly breaks into a wide grin while speaking of the Kennedy assassination. This is not a Mona Lisa smile. This is face-wrenching spasm of glee.

 

In a minute we’ll take up the question of why Bush would grin at his recollection of watching John Kennedy’s brains splatter; the point for us now is that he apparently had a similarly inappropriate, show-stopping expression on his face as he attempted to exit the Dal-Tex building; he had the look of a murderer in his eye, so clearly that it could not be missed; as this funereal-grin could not be missed. And the guilt plastered all over Bush’s face drew people’s attention. And this cop, Vaughn, arrested him.

 

Now remember, Roger Craig tells this story in the context of his discussions with New Orleans District Attorney Jim Garrison about the suspects who were arrested that day and who then evaporated without leaving a mugshot, interview, fingerprint, or name. Garrison spoke not only to Roger Craig, but he no-doubt spoke to Vaughn, who made the arrest. And Garrison adds the following:

 

“At least one man arrested immediately after the shooting had come running out of the Dal-Tex Building and offered no explanation for his presence there. Local authorities hardly could avoid arresting him because of the clamor of the onlookers. He was taken to the Sheriff’s office, where he was held for questioning. However, the Sheriff’s office made no record of the questions asked this suspect, if any were asked; nor did it have a record of his name. Later two uniformed police officers escorted him out of the building to the jeers of the waiting crowd. They put him in a police car, and he was driven away. Apparently this was his farewell to Dallas, for he simply disappeared forever.”

— On the Trail of the Assassins, p. 238 —

 

This vision of the panicked Bush being arrested, no-doubt terrified as he was taken to the police station, and possibly even booked (though the record of any such booking has been destroyed) provides a context that explains a number of Bush’s otherwise-mysterious actions. Certainly Bush was freaked out and panic-stricken! An angry crowd clamored for his arrest, and jeered his release.

 

Being a newbie in these dark affairs, Bush didn’t have confidence in the ability of the old devils at CIA to make water run uphill, to make time run backwards, to silence the witnesses, to destroy the records, and make it all go away. And so he panicked; he acted on his own, stupidly; he called the FBI, thinking that he was “cleverly” providing evidence that it wasn’t him who was arrested in front of the Dal-Tex building that day. In his panic-stricken state, this seemed like a good idea. He was unable to see that he was actually creating a permanent absolutely-positive record of his involvement.

 

We can now also explain the grin. He grins ridiculously at Gerry Ford’s funeral, at the mention of John Kennedy’s murder, not because he is such a ghoul that he thinks splattering the contents of Kenney’s head all over Jackie Kennedy was funny; but because mentioning the assassination causes him to recall the comedy of errors that produced his own ridiculous panic, arrest, more panic, and so on.

 

Garrison wrote his paragraph about Bush’s arrest in 1988. Deputy Craig’s article was written in 1971 and posted in 1992. But the significance of these paragraphs was discovered last week. There hardly was an internet in 1992 when Craig’s article was posted. And for 19 years, no one noticed that this phrase, “independent oil man from Houston”, is a very unique description of Bush. No one noticed until last month, when one of the moderators of JFKMurderSolved showed it to me. And I wrote about it to some friends, and one of them suggested I read what Jim Garrison had to say.

 

So the pieces continue to fall into place. Little by little, the picture is filled in, the questions get answered. And the conclusions become more incontrovertible. This is just the sort thing that happened with the theory of Evolution and the Big Bang theory; and the theory of continental drift. And someday they may start to teach history, as a science, based on evidence, in the universities. Really! It could happen! At which point, Bush’s involvement in JFK’s murder will be taught, like evolution, as the only plausible explanation of the available reliable evidence.

 

Final note: Until recently, Bush had nothing more to say about his whereabouts the day of the assassination than that he doesn’t remember where he was. That in itself is extraordinarily incriminating. Everyone who was alive at the time remembers where they were on 9-11, and on the day Kennedy was murdered. But, saying that he doesn’t remember, however improbable, is at least consistent with Bush’s autobiography, which mentions nothing.

 

Lately, however, perhaps at least partly in response to my work, Bush and Co. have concocted a story that he was speaking in Tyler, Texas to the Rotary Club. The vice-president of the Rotary Club, Aubrey Irby, says that Bush was speaking when the bellhop came over and told him, that Kennedy was dead*1. Mr. Irby passed the information on to Mr. Wendell Cherry, who passed it on to Bush; who stopped his speech. Irby says that Bush explained that he thought a political speech, under the circumstances, was inappropriate; and then he sat down. As a would-be alibi proving Bush’s innocence, there are at least three huge problems with this story.

 

The first is that it is inconceivable that Bush would not have remembered such an event; or that he would have left it out of his autobiography, since it shows what a fine and respectful fellow he is. If he didn’t remember it sooner, or include it in his autobiography, it’s clearly because it never happened.

 

The second huge problem with this story is that it couldn’t possibly have happened; that is, it is made impossible by Bush’s original alibi, his phone call to the FBI, as you’ll see:

The witness who tells this story, Aubrey Irby, says that Bush excused himself and sat down. It doesn’t say that he rushed out of the room in a frantic search for a phone. The problem is that Walter Cronkite’s announcement to the world that Kennedy was dead came at 1:38 (http://www.youtube.com/watch?v=76gl3NZAdxo). Certainly, no one was listening to Walter Cronkite in the same room in which Bush was speaking. Therefore we can be sure that this bellhop, who told Irby that Kennedy was dead, was in another room. The bellhop had to make the decision that he had heard enough of the news to leave off listening to the news. This is no small point. Texas governor Connally was severely wounded. Lyndon Johnson was reportedly wounded. There was much other news to be confirmed. At some point, then, the bellhop decided to stop listening and go make an announcement. There’s no reason to think Irby would be the first person he would tell. But at some point he went to the room where Bush was speaking and informed Mr. Irby that the president was dead. This walk to find Irby took time, of course. Mr. Irby had to receive the information, and then he had to decide to inform Mr. Wendell Cherry, the president of the Kiwanis. Mr. Cherry had to decide that he should interrupt Bush’s speech; Mr. Cherry had to then walk over to Bush and tell him the news.

 

Bush had to decide what to say; and he had to say it. And, according to the only witness, Mr. Irby, Bush “then sat down”. Somehow, when he was finished sitting, without attracting Mr. Irby’s attention, Bush had to seek and find a phone. This would have been a hotel phone, so he would likely have had to go through the hotel switchboard to get an outside line. Do you suppose the switchboard was busy after the announcement of the President’s death? It’s a good guess. In Washington D.C. so many people rushed to make a phone call that the phone system went down. In any case, once he got through to the hotel operator and got an outside line, Bush then had to call information and get the number of the FBI. After getting through to information, and getting the number, he then had to call the FBI; and penetrate their switchboard, which was, no doubt, very busy; and he had to locate an agent, on what must have been the busiest day in the history of the Dallas bureau. How many minutes do you suppose that would take? Twenty seems a fair guess, though it seems implausible that a civilian could even get through, given all the official police business going on at the time. We know that the Dallas FBI was all over the murder scene, confiscating camera film and intimidating witnesses; so it’s hard to imagine how Bush, an hour after the shooting, was able to reach an agent at all. Given the “sitting” that Mr. Irby observed Bush doing, for all this to have transpired in 45 minutes would be tidy work. But Bush had to do all of this, as the FBI memo states, by 1:45, seven minutes after the news of Kennedy’s death first went out; which is blatantly impossible.

 

The third problem is this question of why Bush would feel that it was necessary to concoct such a story at all? Why does he have to tell us this lie? Why does he have to get others, like Irby, to lie for him? The irony is that the harder he tries to make himself appear innocent, by lying, the more evidence he gives us of his guilt.

 

*1 Kitty Kelley, The Family: the Real Story of the Bush Dynasty, p.213; cited by Russ Baker in Family of Secrets, p.54

*2

There are some people who manage to point to this and say “ahah! That’s why Bush was in Dallas! Not to kill the President, but to speak to the other oilmen!” But as the Hoover memo shows, being an oilman was just a cover for Bush’s real occupation as a CIA supervisor of trained killers. He needed an excuse for being in Dallas. This speaking engagement provided him with one.

———————-

FROM THE DIRECTOR

George Bush killed Kennedy. Or was it the Mafia? Maybe Castro did it. Who cares? It was 40 years ago. What difference does it make?

It matters.

The day he died we lost an invaluable treasure. This video documents that we lost a man of peace, who tried to cool off the cold war, and to get the American people to see their Russian enemies, not as despicable inhuman monsters, but as people like us.

On November 22, 1963, you lost the man who saved your life on October 17, 1962. At the height of the missile crisis, Kennedy’s generals and advisors were urging him to launch a first strike attack against Cuba. They assured Kennedy that the Russian missiles in Cuba were not nuclear and were not ready; but that he and they should quietly slip away to the safety of bomb shelters anyway, just to be safe; and then launch an attack, leaving the rest of us out to die. Kennedy thought about it. And then he told them that nobody was going anywhere. If anyone died, they would be the first to go, sitting as they were in the Whitehouse, the prime target of those Russian missiles. Together they then figured out a safer plan. Robert McNamara, Secretary of Defense at the time, recently learned from the Russians that the missiles were armed, were ready, were nuclear, and that their commanders were authorized to use them in case of an attack. If you live in the northern hemisphere, the lives of your parents, and your future, were certainly saved by John Kennedy on that day. It matters that his killers be exposed.

In his farewell address, President Eisenhower had warned Kennedy, and the rest of us, of the threat posed to democracy by what Eisenhower called “the military industrial complex.” And while Kennedy famously went after the CIA, and refused to commit troops to Vietnam, I always wondered why he didn’t more openly attack this military industrial complex. And then I stumbled upon a speech he gave at the United Nations. As you will see in the video, he called upon the Russians, and United Nations, to help him to take on this military industrial complex, in order to “abolish all armies and all weapons.” But he was swept away. And in the years since, millions have died in needless wars, trillions of dollars have been wasted on “defense”, and millions more people have lived and died needlessly in poverty. It matters that we lost him.

In 2007, Bruce Willis told Vanity Fair magazine, “They still haven’t caught the guy that killed Kennedy. I’ll get killed for saying this, but I’m pretty sure those guys are still in power, in some form. The entire government of the United States was co-opted.”

Now Willis probably would not mind my suggesting that he’s no genius. At best, his observation is common sense. 80% of the American people agree with him. Indeed, this video, proving that Kennedy was brought down by the most powerful men in the world and their hired thugs, is not based on secret documents. It is all information that has merely been suppressed. Oswald allegedly shot Kennedy from behind. But the day he died, the NY Times carried the story, told by the doctors in Dallas, that Kennedy had an entrance wound in his throat, another in his right temple, and a large gaping exit wound in the back of his head. After talking to the emergency room doctors, Kennedy’s press secretary described, to the assembled press, a shot to the right temple from the right front that went “right through the head.” All of the witnesses near the right front, the grassy knoll, described hearing shots from that direction, and dozens of witnesses raced up the knoll in pursuit of the shooters. These witnesses talked to the press. But all of this information has been suppressed for the last 50 years. By whom? Who could?

You will also see in this video the overwhelming best evidence, from the best witnesses, proving beyond a reasonable dispute, that Kennedy’s body was stolen from Air Force One, and the wound to his right temple was mutilated, before the autopsy. Jackie Kennedy kept watch over an empty casket on the flight from Dallas to Bethesda Naval Hospital. Then the body was quietly taken to Bethesda for the autopsy, arriving 20 minutes before Jackie and the empty casket. Who had the power to arrange this? Who HAS the power today to suppress all this evidence?, and to continue to bombard us with ridiculous lies about a lone gunman? It’s a short list, isn’t it? It doesn’t include the mafia, or the Russians, or Castro. It does include the Bush family – or rather their masters in Big Oil; the banking elite; the backbone of the military industrial complex. These men, and their successors, carried out the attacks of 9-11. It matters.

 

 

NEW DOWNLOADABLE EXTRAS!

To compliment the DVD, here are four audio extras with increased appreciation for the events described in the film:

An In-Depth Look at Oswald

LBJ Part One – Hunt’s Deathbed Confession

LBJ Part Two – Evidence of Innocence

LBJ part Three – More Evidence of Innocence

It Never Ends – More Evidence of Bush in Dallas

 

Pope’s butler arrested over Vatican documents leak

Pope’s butler arrested over Vatican documents leak

Rome (CNN) — Pope Benedict’s butler has been arrested on suspicion of leaking confidential documents to an Italian journalist, the Vatican said Saturday.

Paolo Gabriele, 46, was arrested Wednesday for illegal possession of confidential documents, found in his apartment in Vatican territory, the Vatican said in a statement issued three days later.

Gabriele, who has worked as the papal butler since 2006, is one of only a handful of people with access to the pontiff’s private desk.

His job included handing out rosaries to dignitaries and riding in the front seat of the “Popemobile,” a vehicle used for public papal appearances, as seen in many photographs showing Gabriele with the pope.

Last month, the Vatican gave Cardinal Julian Herranz a “pontifical mandate” to uncover the source of hundreds of personal letters and confidential documents that have been released to Gianluigi Nuzzi, an Italian journalist and author of “Sua Santita,” a book that translates to “His Holiness” and includes the documents.

Nuzzi would not confirm the identity of his sources, but he told CNN that his primary source — who he referred to as “Maria” in his book — “risked life and limb” if ever found out.

The source worked inside the Vatican, according to Nuzzi, who refused to give other details such as the source’s gender, age and if he or she was clergy or not.

Nuzzi told CNN that he has not been questioned in connection with the arrest. The Vatican called the publication of his book “criminal” when it was released last Saturday in Italian.

Feltrenelli and Mondadori booksellers both rank the book No. 1 in sales within Italy.

Nuzzi’s book highlights an internal power struggle within the Vatican through numerous documents including faxes, personal letters and inter-Vatican memos. He told CNN that he received the documents during a year of private meetings in secret locations.

The documents show that the allegations of corruption and money laundering were a concern for a number of high ranking prelates, including Carlo Maria Vigano, who is now the Papal Nuncio in Washington, DC.

Vigano wrote in a series of letters to the pope that he was concerned about the spread of corruption and that his move to Washington would stir speculation.

“Holy Father, my transfer at this time would provoke much disorientation and discouragement in those who have believed it was possible to clean up so many situations of corruption and abuse of power that have been rooted in the management of so many departments,” according to his letter which was published in the book.

The Vatican has not denied the authenticity of the documents, but instead says the breach of privacy is a criminal act.

The 108-acre city-state has its own judicial system, distinct from the Italian judicial system. CNN senior Vatican analyst John Allen pointed out that its courts normally prosecute the likes of pickpockets, “not alleged moles.”

Thus, the Vatican doesn’t have facilities to incarcerate anyone on a long-term basis and the civil and criminal penalties it typically metes out are limited, Allen said Saturday. He speculated that, for these and other reasons, the Vatican may ask — assuming that it determines there is enough evidence against Gabriele — that any such trial occur within the Italian judicial system.

“The question then would become: Does the Italian government want to pick that (trial) up?” said Allen, a senior correspondent for the National Catholic Reporter. “In addition to being an embarrassing scandal for the Vatican on its own terms, this also has the potential to become … a diplomatic contretemps.”

For now, Gabriele is being held in a special cell within the Vatican City, a walled enclave within Rome, according to Vatican spokesman Federico Lombardi.

Lombardi said the pope was “saddened and shocked” at the arrest.

The Vatican said the first phase of its preliminary investigation, under chief prosecutor Nicola Picardi, had now ended. An investigating judge, Piero Antonio Bonnet, is leading the next stage of the investigation, which could lead to a trial or acquittal.

Gabriele has appointed two lawyers of his choice to act at the Vatican Tribunal, and has had a chance to meet them, the Vatican statement said.

“He enjoys all the legal guarantees provided by the criminal code and criminal procedure in force in the State of Vatican City,” it added.

Zombies Leak: Camelot Insider Leaks Chemtrail Connection to Zombie Outbreaks

Zombies Leak: Camelot Insider Leaks Chemtrail Connection to Zombie Outbreaks

I received the following input from an undisclosed source… with regard to the truth of what is going on with chem trails and what may be contributing to this growing proclivity for zombi-izm in America if not the rest of the world.  Suffice to say that this information came to this person from channels within EUCOM.  Food (!) for thought.

Chemtrails have been employed for numerous desired effects. These include ‘sickening’ the general populous and lowering the soul vibration/hindering the consciousness of the populous. This is coupled with contamination of the water/food supply to achieve the same things. 

People know this is happening, they only have to look into the sky to see it.

In recent years we are now seeing, what I call the second phase. The introduction of designer drugs that contain chemical compounds that either ‘activate’ or act as a catalyst for the chemicals dispersed over us in the form of chemtrails. 

The active chemicals or molecular structures in these so called ‘Bath salts’ or whatever other synonym you know them by, could also be implemented in regular pharmaceuticals. Drugs, lotions, moisturisers, make up etc. 

Nevertheless, no matter how you receive the ‘active agent’, the outcome will be the same. Psychosis, insanity, mental breakdowns. Whatever. The behaviour that has been experienced in Florida recently, I fear is going to become commonplace as the frequency and intensity of both ingredients increase. 

This is how I feel they are trying to cause mass hysteria and panic, all within a comfortable time frame of the 2012 Olympics and the upcoming December events (whatever they may be.)

My reply which should at least ease the minds of some… was as follows:

I agree that it certainly looks very plausible that whatever is in the chemtrails contains a number of actionable agents that could increase receptivity to outside electromagnetic or other affects and also lowering immunity etc.

The good news is that if you raise your frequency they can’t get at you in any case.  Of course that doesn’t help that those around you may be vulnerable and losing their minds or whatever the case may be.

-Kerry Cassidy, Project Camelot

 

SOURCE