is this not the same I was telling all the time?
Create a civil war by a false flag attack that will cause a separation between the people.
The police can’t handle it therefore the military will step in AND THOSE FREAKS do have the technology of DARPA…and DARPA is working together with Japan, Google, IBM and DOW Chemical!
We are not going to fight against humans but the robotica of Lockheed…the life-nauts of Japan!
WWIV will be fought with stick and stones!
WAKE THE FUCK UP!
What is the most deathly weapon to 10.000 ton of steal that’s being operated by a 1 gram chip?
THINK…and use their knowledge to defeat them!
DHS Insider: Obama’s cyber warriors & preparing for collapse
6 February 2013; The following information was provided to me by my DHS contact on two different occasions. Information from my first contact was previously published in two parts (here and here). I was asked to withhold the final portion of the information that was provided to me at that time until after the inauguration. The following resumes where part II left off. At the request of this source and for the sake of continuity, the following combines the information withheld and the information from our most recent contact on 4 February 2013.
DH: Do I have your permission to record this conversation?
RB: Please do.
DH: We’ve spoken at different times since the information you gave me was published. You have since given me additional information on top of the information you asked me to withhold until after the inauguration. First, what was the reason for asking me to wait to publish the remainder of our discussion until after the inauguration?RB: Please do.
RB: This bunch, top level DHS brass, is clamping down on leaks. One way they are finding leakers is to put out false information specific to certain individuals. They can trace the information directly to the leaker due to the nature and specificity of the information. It was part self-preservation, part vetting one of my closest and most important contacts. It was a test to assure that I am not being used for disinformation purposes or being targeted as a leaker. It was something I felt I had to do, and I’m glad I did. I feel more comfortable now about my sources.
DH: So, if I understand you correctly, your sources “passed” whatever test you were performing?
DH: And you still have access to information, I mean, whistleblower type information?
RB: I know what you mean, so I guess that’s one way to put it. Okay.
DH: For continuity and to refresh your memory, I’m going to play the remainder of our recorded interview from our contact last month.
[At this point, we listened to the dialogue previously recorded. After the recording concluded, this DHS source suggested that we combine new information with the previously recorded information to avoid unnecessary repetition. It was agreed and the recorder was turned back on with his consent].
DH: Just to be clear, let me hit this again. The main reason you asked me to wait to publish your previous statements had more to do with you, your sources and well, your own self preservation than the content of our discussion.
RB: I guess you could say that. But the information is still valid and becomes even more important when combined with the latest information I have for you.
DH: Okay, we can get on with it, then.
RB: First of all, two days after the inauguration, at exactly 7:00 a.m. on January 23, something called “the Cyber-Warriors for Obama Project” was activated. I heard about this the week after the election, but only saw a hardcopy draft in late December. From what I was told, I believe this is a project that is being paid for through funds from Obama’s political corporation, the 501(c)4 Organizing for Obama, I believe it’s called. I can’t be sure, but that’s what I was told.
At that time, I was shown a white, three-ring binder with Obama’s circular campaign logoimprinted on the outside of the binder with the name “Cyber-Warriors for Obama” printed in blue across the top. Inside were the names and e-mail addresses of 3,575 “cyber assets,” or “warriors,” listed in alphabetical order under about a dozen or so “team leaders.” From a separate sheet I was shown, most of these “assets” are being paid just over minimum wage, but as I understand it, they work from home and have no overhead. I believe there are about two dozen supervisors who make substantially more.
Now I only had the binder for a minute, and could not take it from the room I was in, so this is strictly from memory.
It was tabbed, and one section with the word “targets” had a list of religious web sites, web sites I recognized as Christian. Another section was a listing of conservative Internet sites. There was another tab with the label “problem sites” that seemed quite extensive. I looked at that section, and it was broken down further into “birther” sites, “pro-gun” sites, “anti-abortion” sites, just to name a few.
There was also a section of the usual news sites, like CNN, ABC, you know. Numerous e-mail addresses were conspicuous under each news organization, which also included Fox… [unintelligible]. I figured you were going to ask.
The first page of the binder had bullet points labeled “objectives” and instructions for the cyber-assets. There was also a very detailed non-disclosure agreement with the word “DRAFT” typed in big, light grey letters across the body of the two-page agreement. The agreement and the instructions were typed on white paper with a warning, printed in red on each page, that the document was not to be copied or disseminated.
DH: Where did you see this? I mean, was it at DHS?
RB: Yes, and that’s as much as I can say on the location.
DH: What’s the magic behind the number 3,575?
RB: I asked the person showing me [the binder] that question. Supposedly, it has to do with their budget, or the project funding.
DH: Go on.
RB: The instructions seemed very specific. Infiltrate web forums, collect screen names, avatars, and posters’ tag lines, and attempt to resolve these to their actual identities. I read one paragraph that listed circumstances when the “asset” was only to monitor but do not disrupt without authorization. There was another section titled “Divert, Disrupt and Destroy,” listing “how to’s” in certain cases.
There was also a section on maintaining a social media presence, and another on the most effective use of Twitter.
Lastly, there was a “reference section,” which included statistics, specific language to use to marginalize different posters, and effective methods to discredit people while maintaining a sense of legitimacy.
It was surreal, to say the least.
Oh, one more thing that’s important. As I said, these “kids,” or young people I believe, are known collectively as “Cyber-Warriors for Obama.” The subheading was “And the truth shall set you free.” Truth? Really? They were hired on their hacking abilities, or more precisely on their abilities to make postings through proxy servers and effectively use alternate identities and multiple e-mail addresses. Their purpose is to spread disinformation, not truth.
There were also motivational statements on various pages, including one that referred to Obama as the “Pharaoh of the Internet,” which I thought was an odd characterization.
But what’s important is that suddenly, through the use of Internet aliases, multiple e-mail addresses, and screen names, a project that employs 3,575 people will have the appearance and effectiveness of maybe 10,000 or more different people.
I saw this valuable information circulating Face Book!!!!
Do you know how to determine if a mirror is 2-way or not? A policewoman who travels all over the US and gives seminars and techniques for businesswomen passed this on.
When we visit toilets, bathrooms, hotel rooms, changing rooms, etc., how many of you know for sure that the seemingly ordinary mirror hanging on the wall is a real mirror, or actually a 2-way mirror (i.e., they can see you, but you can’t see them)? There have been many cases of people installing 2-way mirrors in female changing rooms . It is very difficult to positively identify the surface by looking at it.
So, how do we determine with any amount of certainty what type of mirror we are looking at?
TWO WAY GLASS IMAGE MIRROR IMAGE
Just conduct this simple test: Place the tip of your fingernail against the reflective surface and if there is a GAP between your fingernail and the image of the nail, then it is GENUINE mirror. However, if your fingernail DIRECTLY TOUCHES the image of your nail, then BEWARE! IT IS A 2-WAY MIRROR!
“No Space, Leave the Place” So remember, every time you see a mirror, do the “fingernail test.” It doesn’t cost you anything.
REMEMBER. No Space, Leave the Place:
Ladies: Share this with your girlfriends, sisters, daughters, etc.
Men: Share this with your wives, daughters, daughters-in-law, mothers, girlfriends and/or friends.[Top]
Organic Farms and Back Yard Gardens will become illegal[Top]
Nevada is supposedly one of those states with a smart meter ‘opt out’ policy. On the ground, however, the reality is a little different.
Mona Orkoulas lives in the mountains outside Las Vegas, Nevada, where she works in real estate. Like many Americans she has been impacted by the downturn in the economy and is struggling to make ends meet. Mona was born in the US and raised by an Egyptian/ Greek family. She has always paid her bills on time, and makes protecting her health a priority. For years Mona worked on humanitarian projects in the Middle East: drilling wells, and providing drinkable water and renewable power to remote villages. So she is familiar with the need for safe, reliable public services. Now, it turns out that she may need some humanitarian assistance herself — not in the developing world but right outside Las Vegas, Nevada, USA.
The story starts when Nevada Energy (NVE) installed a ‘smart’ meter on Mona’s bedroom wall in January without permission, or even so much as a few days’ notice.
Mona reports that she does not have any prior history of medical issues. Shortly after NV Energy installed the smart meter, she started noticing an increase in her heart rate first thing in the morning and an elevated blood pressure. She felt fatigued, and started having headaches. A low grinding sound had started when the meter was installed and this made it difficult for Mona to sleep, or even be in her own home during the day. She tried different things to get rid of the symptoms, but nothing worked. Finally it dawned on her: the only thing which had changed in her life was the meter. When she started researching the issue, she realized she was not alone. Others were experiencing the same annoying humming grinding sound, the same adverse health impacts — and linking it to recent smart meter installations. She has amassed a whole binder of studies about the negative effects of EMF’s on health.
A letter from Mona’s doctor to NV Energy reads:
Neurological and cardiological findings may be associated with pulsed EMF… EEG, ECG, MRI and sleep study changes may be associated in some hypersensitive individuals to pulsed EMF. If multiple Smart meters are in use in her area, the possibility of constructive and destructive interference between the various EMF signals is a distinct possibility whose effects may be potentially more dangerous. I recommend that this patient be allowed to have NVE reinstall an analog meter at her house.
Obama Considering Executive-Branch Action on Cybersecurity
President Barack Obama is considering executive-branch action on U.S. cybersecurity after Congress failed to pass legislation to protect national security assets, a White House aide said.
“If the Congress is not going to act on something like this, then the president wants to make sure that we’re doing everything possible,” John Brennan, Obama’s counterterrorism adviser, said today at an event at the Council on Foreign Relations in Washington.
Senate Republicans last week blocked a bill backed by Obama that would have set up voluntary cybersecurity standards for operators of infrastructure such as power grids and water- treatment plants that are considered essential to national security.
Republicans, the U.S. Chamber of Commerce and other business groups said the voluntary standards would be a back door to government regulation of companies. The bill was sponsored by Senators Joe Lieberman, a Connecticut independent, and Susan Collins, a Maine Republican.
Brennan said opponents misrepresented the bill, which he said called for minimum performance standards. He didn’t specify what the White House is planning, or if it would take the form of an executive order.
The program, to be managed by the Department of Homeland Security, would establish cybersecurity standards that companies could voluntarily adopt to better protect banks, telecommunication networks and the U.S. power grid from electronic attacks, the officials, who have seen the draft, said on condition of anonymity because the document hasn’t been made public.
Businesses Beware: Heavy-Handed Tactics Planned for Cyber security
Businesses need to be on the alert. After the Senate’s Cybersecurity Act of 2012 failed to garner enough votes for passage, the Obama Administration and key members of Congress are now thinking about using executive action to impose cybersecurity mandates on critical infrastructure companies. Most telling is the 2012 Democratic National Platform that was released on September 4. A section devoted to cybersecurity on page 60 notes President Obama’s support for comprehensive cybersecurity legislation, but it also states that, “going forward, the President will continue to take executive actionto strengthen and update our cyber defenses.” (emphasis added)
This echoes Richard Clarke’s comments in a recent Huffington Post blog, urging the President to use his executive powers to bypass Congress and push out an Executive Order that requires government information sharing about threats, creates voluntary standards for critical infrastructure industries, beefs-up oversight of cybersecurity by regulatory agencies, and uses federal procurement as a means of forcing companies to have better security. The Hill reported yesterday that the White House is already circulating a draft Executive Order on cybersecurity among relevant federal agencies.[Top]