Friday 12 October 2012

121012

Posted Thursday 11th October 2012 19:13 GMT amanfromMars 1 …. http://forums.theregister.co.uk/forum/1/2012/10/10/supreme_court_telco_spying_immunity/

Re: Catch 42 …… at the 33rd Degree of Arrogant Ignorant Madness

Howdy, Luther B,

Methinks nowadays the fashion is that governments are not popularly overthrown in revolution but rather more invaded with foreign aided hordes acting as savages might in a madhouse. Certainly peace and stability and a lively and democratic administration, which is pimped to fools by idiots who probably know no better and delude themselves that violence and destruction can deliver it with a purge of old orders/contrary regimes, is never provided to replace the mayhem which ensues with removal of Working Command and Control Infrastructures ….. and that is the real master plan, to weaken and conquer and steal a foreign land and its wealth and potential?

Follow the money and discover what is making a killing to discover who is responsible for killings and mayhem. Was Hobbes an early day fascist and/or royalist troll and establishment shill?
…………………………………………………………………………………………………………………………………………..

amanfromMars says: October 12, 2012 at 2:17 am    ….. commenting on a case with a dearth of information that is http://southernpsychologies.wordpress.com/2012/10/06/protesting-ian-parkers-suspension/
Ian Parker can’t make an official statement ……. desmondpainter says: October 8, 2012 at 5:06 am
Of course he can make an official statement if he so chooses to be a standard for free thinking man. One ponders on the dilemma which has him choose to be otherwise whenever sharing ones’ voice and greater views is so ridiculously easy …… just like as is being done here, and as Ian could so easily also do on any number of freely available supportive platforms.

Whenever academe and research uncover fundamental power shifts in the nature of reality and man’s understanding of the greater and absolute unilateral control which can be applied and exercised with that understanding, is it always going to attract the attention of services and wannabe agents of national security and secretive power brokerage.

And that is as much as one would need to know about such matters unless one needs to know more ….. and that will provided to one if it be deemed necessary/highly desirable.
…………………………………………………………………………………………………………………………………………..

amanfromMars, In a nutshell, a Shell IDEntity into SMART CHAOS with NIRobotIC Quantum Remote Virtualised Controls …. shooting the breeze on http://www.wired.com/dangerroom/2012/10/panetta-cyber/
Recently, the military and the White House have cracked open the once-deadbolted door of secrecy on U.S. offensive cyber operations. In August, the U.S. Air Force announced its interest in finding new methods to “destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the adversaries [sic] ability to use the cyberspace domain for his advantage.” The week before, a former top American commander in Afghanistan bragged to a technology conference about his troops’ ability to hack militant communications. The day before that, the Pentagon’s leading research division announced a new, $110 million program to help warplanners assemble and launch online strikes in a hurry and make cyber attacks a more routine part of U.S. military operations.
And anyone with the necessary smarts to be an active and leading player in the field under discussion here, will be both encouraged and delighted to know of the efficacy of their methodology should their systems/communications/means and memes of information and intelligence exchange be attacked/disrupted/changed from the norm as was previously available, and would be available to others undisrupted/changed/attacked.

One imagines then that such are persons of especial interest and high value and best bought and brought into the compromised and vulnerable system which would feel itself attacked and in need of protection from active and leading players in the field under discussion here, so that obviously necessary vital changes can be made to secure and harden a compromised and vulnerable system with their proven efficient novel alternative approach/irregular and unconventional and when necessary and/or desirable, disruptive methodology.

To ignore an obvious problem and vulnerability which can be ruthlessly exploited and its solution which may be in the control of others, simply guarantees that the problem grows ever bigger and more obvious to an increasing number of viewers and many of them may not be at all interested in saving and changing a current predominant power system but rather more occupied and determined to completely destroying it and replace it with one of their own, or another one belonging to an invisible supporting proxy/business angel/venture capitalist partner/smarter nation state/non-state actor/global control headquarters/internetional business machine or whatever. Certainly there are no shortage of possible thin clients or fat wallets, with none of them being able to be excluded from suspicion of having a likely interest in the field and therefore would fully warrant inclusion in, as time flies by and should decision paralysis set in, an increasingly long suspect list.
…………………………………………………………………………………………………………………………………………..

No comments: