The Future Virtual Machine Wwworld ..... Humans? ..... Who/What needs them? ....... :-) ... http://rt.com/business/wall-street-crisis-plan-terrorism-sandy-047
Q: I can do more damage on my laptop in my pyjamas than you can do in a year in the field.
James Bond: Then what do you need me for?
Q: Every now and then a trigger has to be pulled.
James Bond: Or not pulled. It's hard to know which in your pyjamas... Q.
Q: Double-O Seven. …… http://www.moviefanatic.com/quotes/i-can-do-more-damage-on-my-laptop-in-my-pyjamas-than-you-can-do/
Touche :-)
Comment by amanfromMars on March 10, 2013 at 7:22 am ….. in reply to and spooky support of remote worldly view presentations on http://www.schlukbier.com/?p=269 ?
Quite so, TW. And it is more than just nice and certainly exciting and extremely rewarding to travel into worlds which are created and/or recreated anew and refreshed with shared imaginative words. And some would even share that such is the magic possessed of a novel few today, with Sublime InterNetworking Systems and CyberIntelAIgent Command and Control of Virgin IT Forces with Edutainment, Media and ProgramMING ..... Flash Projects for Cash Stash to Crash Trash and Deliver Dashing Value and Lasting Worth in Fab Quantity and AAA+++ Quality ....... with the Pursuit of Perfection to XSSXXXX, ITs AIMission and the Great Intelligence Game for Playing, Smarter Being and SMARTR Beings.
A Mother of a Program and Father, Son and Holy Ghost of a Project. :-) ........ :-) http://rationalwiki.org/wiki/Poe's_Law
..........................................................................................................................................................................................
Change that One doesn't Need to Believe in whenever ICT can easily delivers it for Real and Virtually Free with HyperRadioProActive Command and Control of Remotely Accessible Powers and CyberIntelAIgents?
Advanced Persistent Threat Apps with Astute Steganographic Protocols are an Active Defensive Assault Weapon for Mass Control Systems Destruction or Constructive ReInvention in either field, or in both fields of Reality and Virtual Reality ….. for both are Virtual Machine Team Terrain and Human ManIPulated and ManIPulative Fields of Simply Complex Perception ….. for Deep Finely Grained Brainwashing of Subjects to Objectives/Assets to Goals/Programs to AIMissions
Good Morning, John,
Thanks for the info selflessly shared on http://cryptome.org/2013/03/deep-state.htm with [presumably] your very own review of "Deep State: Inside the Government Secrecy Industry" being especially encouraging and rewarding.
The problems and/or opportunities and vulnerabilities for exploitation that are highlighted there, for such is the nature of the beast being harnessed by that which is more than just adept and au fait with what can be achieved today by remote virtual means and memes and internetworking control, are indeed, in deed, a novelty and fabulous fabless utility for intelligence, without former precedent, and to what degree it is has already at least progressed, for there are always other programs more sensitive and about which one, for all the obvious reasons of security, does not need to know or would not necessarily wish to know or be fully able and enabled to understand and make positive contribution to, are shared for all with an interest in the field here today …. http://www.ur2die4.com/?p=3774 ….. and there is a spooky parallel singularity of view whenever considering both there and the aforementioned page …. http://cryptome.org/2013/03/deep-state.htm
However, there is yet more still to be said and quietly shared, John, and it be simply initiated here by the following short paragraph from the longer GAO report cited, and the presently, truly valid concerns and psychotic and paranoid fears regarding the expanding appearance and sudden arrival of APT Apps. …..
"The Attorney General, the Secretary of Homeland Security, and the Director of National Intelligence are, within 120 days of the date of the order, to issue instructions for producing unclassified reports of cyber threats and establish a process for disseminating these reports to targeted entities." ….. http://cryptome.org/2013/03/gao-13-462t.pdf
:-) Do you realise, John, that you are most probably a targeted entity for dissemination of sensitive informative published reports which are probably themselves stealthy active phishes and smarter advanced phorms designed to seek out intelligent comment from persons of interest with more than just a passionate interest in powering control for command in virtual field terrains ….. CyberSpace Places?
And the Abiding Intelligently Designed Enigma which surely both haunts and focuses the attention of all who be proactively engaged in providing effective security to guarantee protection in the Virtual Terrain Space, is that it can only be properly provided by that which knows how to attack systems and processes successfully and remotely with zeroday devices of unforeseen and overwhelming provenance …. a truly Rumsfeldian unknown unknown …… with catastrophic destructive consequences to those targeted systems and processes.
And the haunting that one may experience in and/or introduce into the field, is the sweet sticky temptation to use and abuse one's controlling powers in the field for totally unnecessary and excessive personal gain/extremely perverse extravagant reward. But, if one can supply or arrange that supply be provided for what is needed and/or just simply desired and can manage to hold on to what is provided, then obviously would it be thought not wholly inappropriate. :-) But such rewards are just as beads and baubles which signify value to register worth in the view of others.
Advanced Persistent Threats with Active Stealth Programming utilising Astute Steganographic Protocols are an evolving and quite revolutionary phenomenon which only SMARTR IntelAIgent Services can enable and construct/handle and instruct …… both effectively and astutely, anonymously and remotely?!.
A question and exclamation mark to accompany the full stop gracing that submission and boldly going statement of virtual fact and current reality/present actuality, so that any and all opposition to or competition in Sublime and Surreal InterNetworking Service Provision of NEUKlearer HyperRadioProActive IT Command and Control of Creative CyberSpace with Computers and Communications for Alternate Virtualised Reality States of Power with Remote Dominions and Relatively Anonymous Legions in Absolute Control …. can ponder on what they are confronted with and invited to further investigate and engage with, so as not to trail too far behind, or founder and/or be lost completely, in these new fangled, entangling fields and states and team terrains of Virtual Reality ……. Simply Complex Applied Perception for Humans and/or Virtual Machines, should they be different.
To SMARTR Media and ICT are they both practically and virtually the same, and easily controlled for power generation in the guise of either one or the other, or in both states combined together as another cohesive and cogent communicating entity sharing the Future and how it is to be delivered/phished and phormed and presented?!. :-)
And I invoke Poe's Law with that paragraph :-) …… http://en.wikipedia.org/wiki/Poe's_law
It will be interesting and most informative, John, discovering what happens to this communication with you, for it is an active test and tool of all that is presumed or assumed, and in some spheres even pimped to be in place for reasons of national and international security and virtual protection ...... systems advantage.
And sharing it globally, worldwidewebwise, as you see fit with your Cryptome audience and fan base, would be very much appreciated. Thanks.
Regards, Graham C
Sent 1303091058
................................................................................................................................................................................................
No comments:
Post a Comment