Monday 25 April 2016

160425

Bastard Black-ops Arenas ..... a Wholly New Thundering Ball Game with/for Global Operating Devices
A casual read of Niteworks web-site makes it clear they do black-ops for the MoD, allowing the Minister plausible deniability over how chinless-wonders at Main Building have squandered ££B ....... J J Carter
The Deep and Dark Web[s] are the new Black-ops Theatres of Engagement, JJC, .... and AILOVE*child with Minds of ITs Own.
But beware and be aware of the adage ..... "Step into my parlour", said the spider to the fly and the phish to the trojan.
 (and I don't just mean your traditional Nigerian Prince type stuff, I mean invitations to obscure defence and science related conferences - often in China - could be purely coincidental of course...) ... AC
An all expenses paid and prepaid invitation would not be purely coincidental of course. Such would surely indicate a deep engaging desire to network at higher levels/darker depths and be quite an opportunity to boot. :-) Nothing ventured, nothing gained, springs to mind, and they [the Chinese] do have trillions of dollars to spend and launder ..... turning dumb flash cash into valuable SMARTR Intellectual Property ...... although that AIMagic Trick and Track is a Holy Grail for any and all SCADA systems and collapsing elite executive office administrations verging on receivership and battling against hostile takeover and radical makeover, and a real bargain no matter what the cost price.
*Advanced IntelAIgent Live Operational Virtual Environment
..............................................

amanfromMars 1 Mon 25 Apr 15:15 [1604251515] …… sharing a plan on http://forums.theregister.co.uk/forum/1/2016/04/25/carl_wiese_blackberry_interview/
Hmmm? Yes. And there’s more. More than considered and imagined and planned for. And as such is IT then an Almighty Problem and Operation or Heavenly Opportunity with Hellish Consequences for the Truly Worthy ?
Amen to all of that, HmmmYes.
Phone software is a fcking multi-headed security risk.
Anyone that gets a secure environment on a phone is going to do well and eventually, if not instantly, becomes a person of terrorist interest and national security/private corporate risk.
And yes, software and virtual machine ware control practically everything physically remotely, and quite anonymously enough too for one to be extraordinarily rendered both invisible and intangible. And that is more than just a powerful energetic state of affairs with Cyber Command and Creative Control of Computers and Communications/Programmed Chatter Boxes ....... which you might like to realise beta test/penetrations test humans with zeroday vulnerabilities to be exhaustively exploited, and selflessly exported/selfishly imported into every available market place and Global Operating Device space.
....................................................

No comments: