Thursday, 1 August 2013


Posted Thursday 1st August 2013 03:32 GMT amanfromMars 1 …. replying to E. Olson on who was a'wondering.
Re: I have to wonder... Posted Thursday 1st August 2013 01:54 GMT, Eric Olson
Quite so, Eric Olson, and everything also revolves around, because of its simple and effective enough control of human behaviour, the ready unlimited supply of money/fiat currency/pretty good paper, which nowadays needs be no more than just a lot of zeros following after a one on a balance sheet. Such a facility easily makes any person of interest or novel system of executive administrative control to the system, a lifelong friend with the practically instant electronic transfer of fiat wealth to an account which gives them access to always available unlimited funds. It aint rocket science, is it, and it is IT which delivers everything instantly nowadays for the future with that Third Party Trick and APT Magic ACT AAA+rated for Leaderships....... and a Prime Constant which cannot be ignored as an Advanced Persistent Cyber Threat in AI Theatres of Dreams and in The Bigger Picture … … with Added Nightmares?
However, whenever that paper turns bad and delivers only debt and deficit and sub-prime service, which is invariably the case whenever it is given to the wrong people buying up all the wrong stuff, ..... and as may very well have been is the case over these last number of years especially, ergo the continuing decline in the global banking and equities and derivative markets which are primarily designed to hedge wealth production against catastrophic losses caused by arrogant abuse and/or ignorant use of the system for personal individualised profit/increased dumb wealth ....... for profit is money for nothing isn't it and therefore makes everything purchased with it practically for free but paradoxically, also everything increasingly unsustainably more expensive and unaffordable ..... then does the system collapse and the artificial wealth creation scheme/scam produce considerably smart enemies, which the system would need to employ to ensure that it and its failed leaderships survive in a changed commanding environment controlled by machines both virtual and real.
The initial problem and most probable present difficulty and current enigmatic dilemma for resolution though, are those simple facts and inevitabilities being accepted and realised as the undeniable truth by those and/or that which would be thinking itself in charge of things and leading the Great Game, but in virtual reality and actuality, presiding over madness and mayhem, chaos and confusion.
Posted Thursday 1st August 2013 03:50 GMT amanfromMars 1
Here's the black ops pot clarifying the dark matter kettle
Press Statement on 30 July 2013
As the IC and NSA have stated previously, the implication that NSA's collection is arbitrary and unconstrained is false. NSA's activities are focused and specifically deployed against - and only against - legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interest. Public release of this classified material about NSA collection systems, without context, does nothing more than jeopardize sources and methods, and further confuse a very important issue for the country. Although it is impossible to provide full details of classified programs and still have them remain effective, we offer the following points for clarification:
1. XKEYSCORE is used as part of NSA's lawful foreign signals intelligence collection system. By the nature of NSA's mission, which is the collection of foreign intelligence, all of our analytic tools are aimed at information we collect pursuant to lawful authority to respond to foreign intelligence requirements - nothing more.
2. Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKEYSCORE, as well as all of NSA's analytic tools, is limited to only those personnel who require access for their assigned tasks. Those personnel must complete appropriate training prior to being granted such access - training which must be repeated on a regular basis. This training not only covers the mechanics of the tool but also each analyst's ethical and legal obligations. In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.
3. Our tools have stringent oversight and compliance mechanisms built in at several levels. One feature is the system's ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst's defined responsibilities. Not every analyst can perform every function, and no analyst can operate freely. Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.
These types of programs allow us to collect the information that enables us to perform our missions successfully - to defend the nation and to protect US and allied troops abroad. (For example, as of 2008, there were over 300 terrorists captured using intelligence generated from XKEYSCORE.)
Continuous and selective revelations of specific techniques and tools used by NSA to pursue legitimate foreign intelligence targets is detrimental to the national security of the United States and our allies, and places at risk those we are sworn to protect - our citizens, our war fighters, and our allies.

No comments: