WingMakers Forum
Visit SUMBOLA - The Social Reading Platform
Publishers, Authors, Readers, and Talent wanted.


All times are UTC - 5 hours




Post new topic Reply to topic  [ 316 posts ]  Go to page Previous  1, 2, 3, 4, 5, 6, 7 ... 13  Next
Author Message
 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Tue Feb 28, 2012 12:44 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Quote:
I understood that the significance of what we were doing was greater than WikiLeaks as an institution and greater than our personal lives. In November, I told our people, perhaps to their surprise, that what we were doing was more significant than the life of any one of us. To that degree, the battles that we've had, the severity of the battles that we've had, is not something I have found to be difficult to deal with. Their severity is a reflection of the quality and importance of our work...


Julian Assange, Rolling Stone Interview, Jan.23, 2012

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Tue Feb 28, 2012 5:51 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Why we should all learn to hack

Image

Owning a computer once went hand in hand with understanding exactly how it worked. That may have changed but Tom Chatfield says it's time to reclaim the past.

There is an old joke amongst computer programmers: “There are only 10 types of people in the world: those who understand binary, and those who don't.”

Not funny to everyone, but it makes a neat point. We now live in a world divided between those who understand the inner workings of our computer-centric society and those who don’t. This is not something that happened overnight, but it is something that has profound consequences for our future.

Rewind to computing’s earliest decades and being a "hacker" was a term of praise rather than disgrace. It meant you were someone who could literally hack code down to size and get it to do new things – or stop it from doing old things wrong. You were someone who could see through the system and, perhaps, engineer something better, bolder and smarter.

In the early 1970s, Steve Jobs and his co-founder at Apple, Steve Wozniak, worked out how to “hack” the American phone system by using high-pitched tones, so that they could make prank calls to people such as the Pope (he was asleep at the time). It was a mild kind of mischief by modern standards – and a sign of a time in which the once-impenetrable realms of mainframe computers and institutional communications systems were beginning to be opened up by brilliant amateurs.

As you might expect, the phone system has become considerably harder to hack since the 1970s, and the divide between those who use computers and those who program them has also widened as the software and machines have become more complex. Having started out as outposts of do-it-yourself home computing, companies like Apple have become pioneers of seamless user experience, creating apps and interfaces that don’t even demand anything as technical as the use of a keyboard or mouse, let alone insights into the inner workings of the technology involved.

Year of code

This relentless drive towards technology that blends seamlessly into our lives leaves us in an increasingly bifurcated world. Information technology is a trillion-dollar global industry, with legions of skilled workers creating its products. Outside of their ranks, however, the average user’s ability to understand and adapt the tools they are using has steadily declined. It is a situation that is unlikely to change overnight – but there are movements aimed at bridging this gap.

In the coming weeks, a UK foundation will launch the Raspberry Pi – a £16 “computer” aimed largely at schoolchildren. Unlike your tablet or laptop, however, this computer is not a glossy, finished piece of kit, and deliberately so. The credit card-sized, bare bones circuit board is more akin to the early DIY machines that the likes of Jobs and Wozniak created and played with in the earliest days of computing. It demands to be tinkered with or “hacked” – and that is the whole point. It encourages people to better understand the hardware at their fingertips.

Across the Atlantic, meanwhile, a young organisation called Code Academy has made the increasing of people’s understanding of the code that runs on their machines into its mission. With over half a million users registering just during its first month of operation in 2011, Code Academy is a rapidly-expanding service aimed at imparting the basics of coding to anyone wishing to learn, free of charge. Its initial focus is the web language JavaScript, and it is inviting users to make 2012 their “code year” by sending out emailed prompts to complete one interactive coding lesson every Monday.

In professional terms, it’s easy to see why knowing how to put together a program is a valuable skill: more and more jobs require some technical know-how, and the most skilled students have glittering prospects ahead of them. But with only a fraction of those signing up for free lessons ever likely to reach even a semi-professional level of skill, are movements like Code Academy able to offer more than good intentions?

The answer, I believe, is a resounding yes. Because learning about coding doesn’t just mean being able to make or fix a particular program; it also means learning how to think about the world in a certain way – as a series of problems ripe for reasoned, systematic solution. And while expertise and fluency may be hard-won commodities, simply learning to think like someone coding a solution to a problem can mean realising how the reasoned, systematic approaches someone else took might not be perfect – or, perhaps, neither reasonable nor systematic at all.

'No magical safeguards'

Like Neo’s moment of revelation in the first Matrix movie, learning to picture the code behind the digital services you are using means realising that what you are looking at is not an immutable part of the universe; it is simply a conditional, contingent something cooked up by other human coders. And this is the divide that matters more than any other between coding insiders and outsiders: realising that the system you are using is only a system; that it can be changed and criticised; and that, even if you do not personally have the skills to rip it apart and report on the results, someone else probably does and already has done.

This last point – the ability to benefit from others’ expertise, and to know how to begin searching it out – is an especially important one. From cynical corporations to shadowy spam-mailers, there are plenty of people who would like nothing more than a digital citizenship ill-equipped to ask what lies beneath the surface. Thinking differently does not demand coding mastery. It simply requires recognition that even the most elegant digital service has its limitations and encoded human biases – and that it is possible for more troubling cargoes to be encoded, too.

In 2010, for example, an FBI investigation revealed that one suburban Philadelphia school district had included malicious software on laptops given out to pupils that allowed the computers to be used for covert surveillance via their cameras and network connections. The software in question would have been undetectable to all but the most devotedly expert of investigators. Since the case emerged, however, the widespread documentation and discussion it provoked has left those alert to such possibilities far better prepared to defend against them in future.

Code Academy and its ilk have no magical safeguards to offer or instant paths to understanding. For many people, though, signing up will be a first step towards asking a better class of question about their online world – and searching a little longer and harder for better answers within it.

And in case you are still wondering – 10 is the binary for two.


http://www.bbc.com/future/story/2012020 ... rn-to-hack

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Tue Feb 28, 2012 6:00 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
LEARN TO CODE

Codecademy is the easiest way to learn how to code. It's interactive, fun, and you can do it with your friends.

http://www.codecademy.com/#!/exercises/4

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Wed Feb 29, 2012 4:16 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Cute cats, memes and understanding the internet

Image

Why is the internet so obsessed with pictures of cats and is there more to them than meets the eye?

Oh hai. Welcom 2 dis weekz colum all bout teh peculiar fenomenon ov memez an teh internetz fascianashun wif kats.”

That sentence probably puts you in one of two camps: someone who thinks the BBC’s standards have reached an all time low, or an aficionado of one of the most virally pervasive of all internet memes, the lolcat.

For the uninitiated, lolcats are the near-numberless offspring of a venerable class of object: the “image macro”, in which text is superimposed on to a photograph. Born in the mid-2000s, “laugh-out-loud-cats” – as nobody would ever dream of spelling them out – pair cute animal images with comically-misspelt captions.

This may seem distinctly limited grounds for amusement. But type “lolcat” into Google and you’ll turn up not only six-million-plus pictures, but initiatives ranging from scholarly studies to the frankly bewildering “lolcat bible translation project”, which is steadily converting the entire holy book into “lolspeak” (Genesis 1:1 – “Oh hai. In teh beginnin Ceiling Cat maded teh skiez An da Urfs...”)

Meme machine

Lolcats are the pinnacle of what are known as internet memes, the online equivalent of an idea coined by biologist Richard Dawkins in his 1976 book, The Selfish Gene, to describe the quasi-organic spread of some ideas through society. Little did Dawkins know that, within a few decades, his word would also have come to describe a uniquely contemporary class of object – a benign virus of the digital age, mutating and spreading via all those it persuades to laugh out loud along its path.

There are tens of thousands of memes online, embodying near-unimaginable quantities of ingenious timewasting. From dancing babies to flying felines shaped like pop tarts, they sweep from satire (the gap between politicians releasing campaign posters and the net adapting them into parodies is now numbered in minutes rather than hours) to pop-cultural gags with more layers than a set of Russian dolls (read the 3,000-word Wikipedia article on “Rickrolling” for an example of how a meme can eat itself several times over within the space of five years).

There’s much argument over the first digital meme – although one leading contender is the emoticon for a smiley face, :), seen in use as early as 1982 on early internet discussion forums. Almost everyone agrees, though, that the most potent memes involve some combination of appealing animals and punning text.

Animal magic

Why animals? A 2007 Yale study of “category-specific attention for animals” highlighted humans’ disproportionate tendency to pay more attention to our fellow creatures than any other kind of object. The trend, though, is larger even than evolutionary hardwiring. It is one of the paradoxes of a vast, global structure like the internet that its expansion puts as much of an emphasis on human divisions as it does on communication. The 21st Century net is bursting with different nations, languages, cultural references, concerns and sources of amusement. But aside from a handful of celebrities, human beings themselves are simply too particular for universal export, being bound as they are to a particular time, place, and culture.

Animals are the opposite – and domestic animals like cats and dogs especially so. Liberated from language and nationality, they are blank canvases for us to doodle upon at whim. Type “cats” into YouTube and you will see that the top ten results (out of 1.4 million) have been viewed over 200 million times between them. Type “dogs”, and the figure is closer to 350 million.

Animal photos have even spawned their own political theory, thanks in part to digital thinker and MIT Center for Civic Media director Ethan Zuckerman. Zuckerman’s argument – sometimes dubbed the cute cats theory of political activism – is that the tools and techniques developed for sharing adorable images are also extremely effective vehicles for disseminating revolutionary political content.

It is, after all, encoded into the very nature of memes that they are both popular and populist; easy to create, copy and disseminate; and very difficult to filter out or shut down. One question this begs is how far the global infrastructure of meme dissemination helped fuel, for example, the Arab spring, which owed much of its early spread both within and beyond Tunisia to the sharing of protest videos on curated websites outside of the country. Swapping cat photos does not bring down governments, but the sites, habits and systems fostered by meme-sharing do present severe challenges to those wishing to regulate the global information tide.

Pass it on

If this sounds grandiose, it is worth pausing to consider the net’s unique credentials when it comes to mixing banality and brilliance. In internet terms, memes are quite literally better than sex, let alone politics: more popular, more universal, and more widely accepted. We are living in a digital world that attaches deep value to the capacity to share, and to laugh together at almost anything.

Witness the response in January 2012 to the Kremlin’s attempt to smear an opposition leader, Alexei Navalny, by publishing a badly-photoshopped picture of him cosying up to a controversial oligarch. The reaction – more effective than any bland denial – was to release online a succession of images showing Navalny in the company of Hitler, Stalin, Napoleon, a cartoon alien, and, most unlikely of all, Vladimir Putin himself.

It is a cheering thought – and one that should remind us what kind of a mirror we are holding up to ourselves in the technologies of the 21st Century. Laughter alone doesn’t topple odious regimes and canny dictators have long understood the usefulness of both bread and circuses. Yet memes, at their best, represent much more than a collective exercise in foolishness or denial.

Like the capacity of human society itself to act, in Dawkins’s terms, as a kind of gene pool for thoughts and belief, we are today the conscious agents of our own delight and distraction in a way never previously possible. And with this comes a new sense of what it means to be part of a truly global human collective, celebrating and rethinking its own nature every day – comic cats, dancing babies, and photoshopped Putins included.

All in all, it is not a fuchur I’m unhappy 2 b part ov.

http://www.bbc.com/future/story/2012022 ... -schemes/1

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Wed Feb 29, 2012 9:19 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Wednesday, February 29, 2012

Virginia declares “emperor has no clothes”: NDAA nullified

Image

Carl Herman
Activist Post

Virginia's Senate voted today (39-1) to nullify NDAA 2012 provisions to seize American citizens at the dictate of the federal executive branch. They joined the House's 96-4 vote.

Do an Internet news search for this story (like this); you won't find any corporate media coverage. This is what Secretary of Defense Rumsfeld meant with Information Operations Road Map (specifically with endnote 76 in an article on the also non-covered Martin Luther King civil trial that found the US government guilty of assassinating Dr. King), and what CIA-disclosed Operation Mockingbird was meant to achieve: no corporate media opposition.

Again, here's NDAA:

"The US Constitution refutes the so-called “National Defense Authorization Act” provisions for US military to seize people in America (here, here, here). The 5th and 6th Amendments of the US Constitution promise that if the government is to seize you, they dang sure have to demonstrate you’ve committed a crime (my comments). Note that these promises apply to all persons, not just citizens:

No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a grand jury (that means a jury of one’s peers, not the dictatorship of “the leader” – “fuehrer” in German)… nor shall any person… be deprived of life, liberty, or property, without due process of law;…

In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury…, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the assistance of counsel for his defense.

The Oath to the US Constitution is first and primary for the US military to defend America and our freedoms. By definition, America’s freedoms are in our Constitution. The respect Americans and the world have for US military is in proportion to upholding the freedoms in the US Constitution.

US military are trained to refuse unlawful orders. The Uniform Code of Military Justice (UCMJ) Article 92 makes US military duty clear to obey lawful orders. The primary source for lawful orders is the US Constitution. A nation’s constitution are its central and defining laws.

Any order that interferes with constitutional law is by definition an unlawful order that must be refused. Using the US military to seize Americans is such an obvious breach of the US Constitution that it evokes the legal term, ab initio: void and without legal effect from the beginning."

HB 1160 passed by Virginia’s legislative branch by a combined vote of 135-5:

Unlawful detention of United States citizens. Prevents any agency, political subdivision, employee, or member of the military of Virginia from assisting an agency of the armed forces of the United States in the conduct of the investigation, prosecution, or detention of a United States citizen in violation of the United States Constitution, Constitution of Virginia, or any Virginia law or regulation.

Tenth Amendment Center’s article excerpt:

While the bill doesn’t directly block federal agents from carrying out their new NDAA powers, this is part and parcel of a larger NDAA nullification campaign around the country. Currently 7 local governments have passed resolutions ranging from a denouncement of the federal act in three Colorado counties to requiring noncompliance with it in places like Fairfax, CA and Northampton, MA. And, 7 states are currently considering legislation like Virginia’s – all based off the model legislation provided by the Tenth Amendment Center, the Liberty Preservation Act.

THREE STEPS, MAYBE JUST TWO?

Here at the Tenth Amendment Center, we define nullification as “any act or set of acts which has as its end result a particular law being rendered null, void, or unenforceable in a specific area.” With that definition in mind, we see nullification of the new “kidnapping powers” of the NDAA as a multi-step process.

1. Education - awareness. This is where local and state resolutions come into play. When something is passed, even non-binding, it gets press coverage about the idea that the local and state people have a role to play in this.

2. Non-compliance – as just passed by the Virginia House and Senate, and being considered in various other states and local communities. The message? Your unconstitutional federal act is not welcome here!

Gandhi, Rosa Parks and others didn’t take it beyond there. We recognize that in almost every situation, the federal government relies on states being silent or even fully complicit. Information sharing, logistics, and even national guard troops carrying out orders are activities that could be asked of state and local governments. Could the feds still kidnap at that point if the state refuses compliance? Sure, “legally” nothing has changed. But if 10-15 states and a hundred or so counties and cities are making clear they will not comply and that they consider the act unconstitutional, it’s going to be much tougher for them, if not politically impossible, than if everybody just complied and waited for the courts or another election to “save” them.

3. Resistance and physical interposition – Some, of course, believe that the feds can never be stopped without a physical resistance. But this may not be required if enough states and localities take noncompliance seriously in #2 above. But, we also see the value in running the full spectrum of options from the simplest to the strongest in various parts of the country. In Washington State, the bill there is full non-compliance. Matt Shea and Jason Overstreet, the primary sponsors, feel they can get that moving forward, and hope to follow up with criminal penalties in a future bill. Then, potentially another to require arrest of fed agents for kidnapping could be considered. In Missouri, they’re tracking along the same lines.

In Tennessee, though, the bill being considered right now refers to indefinite detention as a “kidnapping” charge and requires the local sheriffs to stop them. (info here)

Carl Herman is a National Board Certified Teacher in economics, government, and history with a passion for research, education, and lobbying for improved public policy. See more articles by Carl Herman Here. Contact him at Carl_Herman@post.harvard.edu

http://www.activistpost.com/2012/02/vir ... as-no.html

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Wed Feb 29, 2012 9:29 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
9/11 Foreknowledge Caught on Computers that Measure Global Mind

Rady Ananda
Activist Post


Image


Fascinating research into a “global mind” picked up startling data in the days and hours before the 9/11 attacks, indicating widespread foreknowledge.

The Global Consciousness Project (GCP) uses electromagnetically-shielded computers located throughout the world that generate random numbers. In its 13-year history, these computers show statistically significant deviations during global events that affect humans.

What GCP found on 9/11 shows foreknowledge for nearly 16 hours before the first plane struck. This data lends support to the proposition that several hundred people around the world had time-specific information about the attacks.

“Roger Nelson has spent the past 30 years looking for evidence of a global mind,” says Morgan Freeman, host of the Science TV series, Through the Wormhole. [1] Nelson is an experimental psychologist and founder of GCP.

Whether called the “noosphere,” some “morphic field” or “information field,” the global mind is real, believes Nelson, along with many other scientists. Though much weaker than the obvious five, experiments indicate that the “sixth sense” is part of a global communication network that can be indirectly measured.


While the US military has long been involved in psi research, GCP tries to objectively measure interconnected consciousness through scientific means, and freely releases that information to the public. [2]

Located throughout the world, some 80 stand-alone computers randomly generate ones or zeros for GCP. [3] These random number event generators (REGs) stop working sometimes.

'The project builds on excellent experiments conducted over the past 35 years at a number of laboratories, demonstrating that human consciousness interacts with random event generators, apparently ‘causing’ them to produce non-random patterns,' GCP says. [4]

An EGG (ElectroGaiaGraph) studies a REG’s ability (or inability) to generate random data and calculates the range of deviation from randomness. The following graph [5] shows the cumulative deviation for all the REGs in the GCP network from 9/10 thru 9/12:

Image


The teal “pseudo data” is automatically generated random data to compare to the red actual data. The black and white boxes on the zero line represent the following events:

8:46 am WTC1 hit
9:02 am WTC2 hit
9:37 am Pentagon hit
9:59 am WTC2 collapses
10:28 am WTC1 collapse

At the time, 37 EGGs produced data for the network. [6] Notice the bump that starts at about 20 hours GMT on Sept. 10 (4 pm Eastern Daylight Time). That’s when several of the REG computers stopped producing random numbers. Increasing randomness returns (the declining side of the hump) until about 32 hours, or 4:00 am EDT on Sept. 11.

Then, starting at about 4:30 am – over four hours before the first strike on 9/11 – the REGs seriously stopped producing random numbers, creating the spike we see before the North Tower (World Trade Center 1) was hit at 36:46 (8:46 am EDT).

In 2011, GCP founder Roger Nelson told Through the Wormhole that the anomaly is “highly significant,” adding further:

This is an aberration in the random line… We don’t have an explanation for that.

However, GCP clarified that “a conservative reading suggests that measure is just marginally significant.” [6]

In a 2009 speech, Nelson reported that the GCP found the same precognition before large land-based earthquakes (but not for ocean-based ones). [7] Animals are known to perceive quakes before humans do, and GCP acknowledges that the network “could equally well pick up on the consciousness of animals other than humans. For now we take it to mean that the system detects some sort of global consciousness structure.” [8]

The GCP network became operational in August 1998. Since then, “the overall statistics for the project indicate odds of about 1-in-20 million that the correlation of our data with global events is merely a chance fluctuation,” reports Nelson. [9]

In a paper discussing the 9/11 anomaly, Nelson admits:

We do not have solid grounds to claim that the statistics and graphs demonstrate the existence of a global consciousness. On the other hand, we do have strong evidence of anomalous structure in what should be random data, and clear correspondence of these unexplained departures from expectation with well-defined events that are of special importance to people. [10]

But, since computers are electronic devices, couldn’t the high stress on the power grid or high use of cell phones have altered REG outputs?

Such influences would center on New York and Washington, of course, while the eggs are distributed around the world. Their average distance from New York is more than 4000 miles (6400 km), and the anomalous effects are broadly distributed across the network.

Also, the research-grade instruments are physically shielded from electromagnetism and include “a logic stage that literally excludes first-order biasing from electromagnetic or other physical causes.”

But then, relating to the anomalous spikes that precede the towers being hit, he adds:

If ordinary waking consciousness were the source, it would seem it could only be attributable to a small number of people: the terrorists who knew what was coming. Alternatively, the hypothesized ‘global consciousness’ that later would be intensely aware might have had a premonitory cognition or feeling at an unconscious level that was registered in the data from the EGG network.

Because he believes only “a small number of people” were involved, Nelson repeats the suggestion in Through the Wormhole that global consciousness had an unconscious “premonition” about 9/11.
Hold onto that thought while we look in more detail at what Nelson describes is being measured:

The best bets are quantum mechanical entanglemant [sic] (operating in a quasi-macroscopic realm) and ‘active information’ a conceptual structure in David Bohm’s physics. [11]

David Bohm (1917-1992) distinguished himself from classical quantum physicists with the notion that our universe is guided not only by matter and energy, but also by a “nonlocal active information” field – the idea that on a quantum level, information acts on raw energy to give it form. [12]

“Quantum entanglement is a state in which quantum particles can alter one another’s properties instantaneously and at a distance, in a way which would not be possible if they were large scale objects obeying the laws of classical as opposed to quantum physics,” explains Quantum Mind, a 2011 book collecting the thoughts of various theorists. [13]

Erwin Schrödinger coined the term in 1935, saying:

I would not call [entanglement] one but rather the characteristic trait of quantum mechanics, the one that enforces its entire departure from classical lines of thought. [14]

Quantum Mind explains further:

The quantum mind or quantum consciousness hypothesis proposes that classical mechanics cannot fully explain consciousness, and suggests that quantum mechanical phenomena, such as quantum entanglement and superposition, may play an important part in the brain’s function, and could form the basis of an explanation of consciousness. [15]

Returning to Nelson:

My own ‘model’ is that consciousness or mind is the source or seat of a nonlocal, active information field (this is not a standard, well defined physical construct). Such fields interact, usually with random phase relationship and no detectable product. When some or many consciousness (information) fields are driven in common, or for whatever reason become coherent and resonant, they interact in phase, and create a new, highly structured information field… that becomes the source of the effects we measure. [11]

It’s even possible that the low 34% occupancy rate for all four planes [16] reportedly involved in the attack indicates that some people picked up on that information field and avoided buying seats on those planes.

Image


But it wasn’t just a dozen terrorists and their cohorts hiding in Afghan caves who created this structured field. A vast amount of evidence shows that hundreds of people spread all over the world had foreknowledge, comporting with GCP’s anomalous effects being “broadly distributed across the network.”

Rather than premonition, it’s more likely that GCP captured the “highly structured information field” created by foreknowledge among financial, military and political figures, along with the global intelligence community.

Minimum $20 Billion Surge in Insider Trading

In Crossing the Rubicon, Michael Ruppert thoroughly chronicled mainstream news reports of informed trading, making his case against the intelligence community. [17] Developments since that 2004 book make it worth revisiting some insider trading highlights, especially now in light of GCP data.

In the 90 days preceding the attacks, 38 different stocks [18] that later fell in value saw massive put options – a financial instrument that allows speculators to bet the stocks will go down, which they can then sell for the original higher price during the contract period (usually four months).

That trading “was not localized,” says Ruppert. “It was, in fact, a worldwide event.” In addition to the US and other nations, 9/11-related insider trading was flagged in Belgium, Cyprus, France, Germany, Italy, Japan, Luxembourg, Monte Carlo, the Netherlands, and Switzerland, reports 9/11 whistleblower Kevin Ryan. [19]

An increased trade volume of $15 billion for just two airlines (United and American) and the insurance industry is on top of spiked trading in other sectors, including Treasury bills, where one 5-year bond was purchased for $5 billion.

Over $100 million in credit card transactions moved through computers housed at the towers in the minutes before and during the WTC attack, said Convar, the company hired to retrieve data from damaged computer hard drives recovered from the scene. [20]

A whistleblower told Ruppert that “about five minutes before the attack, the entire Deutsche Bank computer system had been taken over by something external that no one in the office recognized and every file was downloaded at lightning speed to an unknown location.” [21]

Many of the companies involved in high-volume trading before 9/11 include the same criminal institutions responsible for the global financial collapse a few years later: Bank of America, Citibank, Merrill Lynch, Lehman Bros., Morgan Stanley, Mellon Financial, and Goldman Sachs. [22]

Just as no one was criminally charged for the Wall Street orchestrated derivatives bubble and falsified documents [23] leading to millions of foreclosures and global financial collapse, none of the investigations into 9/11-related insider trading resulted in a single indictment.

“Indeed,” said Ruppert, “no one could hope to get away with it unless they controlled all the enforcement mechanisms…”

Despite regulatory corruption, three academic studies statistically link insider trades to 9/11. [24]

In 2011, the Multinational Finance Journal published the results of an international collaboration looking at 9/11-related trading in S&P 500’s index options. Those results led researchers “to reject the null hypothesis that there was no abnormal trading in these contracts prior to the September 11 attacks.” The analysts also identified three different trading strategies used to profit from 9/11 foreknowledge.

In 2010, Swiss researchers analyzed each put option contract on 14 companies traded on the Chicago Board Options Exchange from 1996–2006, and on Swiss Re and Munich Re traded on EUREX from January 1999 to January 2008. “Informed option trades on Swiss Re and Munich Re—the world’s two largest reinsurers—are detected in the days leading up to the terrorist attacks on September 11th.” They also found unusually high trading at Bank of America, Citigroup, J.P. Morgan, Merrill Lynch, American Airlines, United Airlines, Boeing and to a lesser extent Delta Air Lines and KLM Royal Dutch Airlines.

Univ. of Illinois finance professor Allen Poteshman led the pack with his 2006 publication in the Journal of Business, which looked at American Airlines, United Airlines, Standard & Poor’s airline index, and the S&P 500 market index. His study “concludes that there is evidence of unusual option market activity in the days leading up to September 11 that is consistent with investors trading on advance knowledge of the attacks.”

Last September, Dr Hugh McDermott, researcher and senior lecturer in law enforcement at Charles Sturt University’s Australian Graduate School of Policing, characterized the 9/11 Commission Report’s finding of “no evidence that anyone with advance knowledge of the terrorist attacks profited through securities transactions” as “implausible,” saying it overlooked important facts. [25]

McDermott noted that the International Organisation of Securities Commissions (IOSCO) stated that the financial maneuvers in the days prior to 9/11 constituted “the most important crime of insider trading ever committed.”

In his 2002 international bestseller, 11 Septembre 2001: L’Effroyable Imposture, Thierry Meyssan reports that IOSCO, as coordinator for international investigations into 9/11 insider trading, made that statement at an Oct. 15, 2001 “video conference where the national authorities presented their interim reports.” [26]

Not a single indictment followed IOSCO’s pronouncement.

Ruppert warns that 9/11 insider trading leads “right to the heart of the US intelligence community,” by showing the revolving door and financial connections between Wall Street and the CIA, and further implicates the global intelligence network.

Russian, French, and German intelligence agencies all sent warnings to the US that al Qaeda intended to hit the towers with planes the week of Sept. 9, 2011, detailed Ruppert with credible sources.
In Extreme Prejudice, CIA whistleblower Susan Lindauer reported that US intelligence knew of the pending attack at least as early as April 2001. In August, her handler warned her not to travel to Manhattan because an attack was imminent. [27]
Israeli Mossad agents tracked alleged hijacker, Mohammed Atta, to Hollywood, Florida, informing the CIA of his activities. The CIA deported the agents and left Atta alone, reported Der Spiegel in 2002. [28]

Along with the Bush Administration, the CIA, FBI and other US intelligence agencies all denied foreknowledge.

Andreas von Bülow scoffed at this denial in a 2002 interview with Tagesspiegel. He knows of what he speaks, having served on the Cabinet of Chancellor Helmut Schmidt, as State Secretary in the Defense Ministry, and for 25 years as a parliamentarian with oversight of Germany’s Secret Service. The trail left by the terrorists in planning the entire operation was as big as the “tracks of a stampeding herd of elephants,” he said, adding:

In the week before the attack, the amount of sales in securities trading in American Airlines, United Airlines, and insurance companies increased 1,200%. It was about $15 billion. Some people must have known something. Who? [29]

Ruppert reasons:

The trades could only have been made by people high enough in the US, Israeli, and European intelligence communities (including Russia) … There is no other explanation that encompasses all of the known data, and takes notice of the incredible veil of secrecy that has fallen over the issue. Evidently, almost all of the foreign intelligence services that had penetrated al Qaeda ultimately realized that the US government was going to facilitate the attacks. That knowledge migrated to certain investors who promptly capitalized on it. [30]

If GCP’s computers do capture a coalescing of human consciousness, so that the information field becomes highly structured and measurable, this broad and deep spread of financial activity helps explain the anomalous pre-strike spikes that GCP measured “broadly across the network.”

Advance Warnings

Though the anomalous spikes are distributed across the network, the EGGs in the eastern US showed the highest deviation from random, seen below as the thin red line. [31]

Image

From about 5:15 to 6:10 am, we see a nearly vertical spike in anomalous data, highlighted by the blue vertical lines I added to GCP’s graph. It’s reasonable to speculate that this is the time frame when the conspirators and the forewarned began making final preparations.
We see another spike in GCP data in the 7 o’clock hour, indicated by the added gold verticals. This might be the Odigo warning making its way from Israel to the US intelligence community.
In the minutes just before the first plane hit, when over $100 million in credit card transactions rushed through computers housed in the towers, when Deutsche Bank’s computer system was electronically seized and its files downloaded “at lightning speed,” we see a third spike (purple vertical).

GCP’s network captured these behaviors by tracking and recording changes to the “active information field” it has measured every second of every day for the past 13 years.

In Nelson’s parlance, vast foreknowledge, which is “the source of the effects” GCP measured, caused the “information field” to “become coherent and resonant” which then began to “interact in phase” thus creating “a new, highly structured information field.”

Roger Nelson may not know it, but the Global Consciousness Project’s nifty network likely recorded the extent of 9/11 foreknowledge.

“It’s huge – what is happening,” said Sofia Smallstorm a few years ago at a screening of her excellent film, 9/11 Mysteries. [51] “We can only really guess at the nature of, one could say, the minds or the consciousness at the very top.”

Whatever that nature, they apparently did not know that their foreknowledge was having a psychokinetic effect on computers all over the world, which was being recorded.

Just as the academic studies statistically showing 9/11-related insider trading do not constitute legal proof, GCP’s data showing widely spread foreknowledge also constitutes only circumstantial evidence. But, added to all the evidence the public has gathered, these additional pieces both contribute to the more reasonable theory that hundreds of people had advance knowledge of the horrific events about to unfold on September 11, 2001.

© Rady Ananda 2012.

http://www.activistpost.com/2012/02/911 ... uters.html

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Wed Feb 29, 2012 10:20 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
The Killswitch : They can remotely modify your Window 8

Image


Last year,a Finnish software developer, was cruising Google’s Android Market for smartphone apps last year when he noticed something strange. Dozens of best-selling applications suddenly listed the same wrong publisher. Google uses a little known kill switch, to forcibly removing the malicious code from more than 250,000 infected Android smartphones. It’s a powerful way to stop threats that spread quickly, but it’s also a privacy and security land mine.

With the rollout of the Windows 8 operating system expected later this year, millions of desktop and laptop PCs will get kill switches for the first time. Microsoft has confirmed that they have remote kill switch installed in to Windows 8 apps. using this access, they can disable and even remove an app entirely from a user’s device. This piece of information was released along with other details of the upcoming Windows Store for Windows 8.

Anyone worried about Microsoft having complete access to your computer can rest easy for now. The company has stated that they can only “kill” programs downloaded from its new Microsoft App Store. This is what the company has to say about it in official terms: -“In cases where your security is at risk, or where we’re required to do so for legal reasons, you may not be able to run apps or access content that you previously acquired or purchased a license for,”.

Any software loaded from a flash drive, DVD, or directly from the Web will remain outside Microsoft’s control. Still, the kill switch is a tool that could help Microsoft prevent mass malware infections. “For most users, the ability to remotely remove apps is a good thing,” says Charlie Miller, a researcher with the security company Accuvant.

Hiroshi Lockheimer, Google’s vice president of Android engineering, says the search company reserves the use of the kill switch for “really egregious, really obvious cases” of harmful content. Microsoft’s Biggs says the company has used the functionality in its smartphones only for “technical issues and content issues.” Apple declined to comment. Amazon did not respond to several messages.

Nonetheless, a “kill switch” for curators of online applications marketplace is common as companies try to protect users of the platforms they develop from malware or hacking attempts implemented through applications.Microsoft’s upcoming Windows 8 operating system is expected to be launched by the middle of next year.

http://thehackernews.com/2012/03/killsw ... odify.html

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 6:00 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Verisign seizes .com domain registered via foreign Registrar on behalf of US Authorities.

Written by Mark Jeftovic on February 29, 2012 — 42 Comments

Yesterday Forbes broke the news that Canadian Calvin Ayre and partners who operate the Bodog online gambling empire have been indicted in the U.S., and in a blog post Calvin Ayre confirmed that their bodog.com domain had been seized by homeland security. As reported in Forbes (hat tip to The Domains for the cite),

According to the six-page indictment filed by Rosenstein, Ayre worked with Philip, Ferguson and Maloney to supervise an illegal gambling business from June 2005 to January 2012 in violation of Maryland law. The indictment focuses on the movement of funds from accounts outside the U.S., in Switzerland, England, Malta, and Canada, and the hiring of media resellers and advertisers to promote Internet gambling.

“Sports betting is illegal in Maryland, and federal law prohibits bookmakers from flouting that law simply because they are located outside the country,” Rosenstein said in a statement. “Many of the harms that underlie gambling prohibitions are exacerbated when the enterprises operate over the Internet without regulation.”

That is a truly scary quote but we'll emphasize that: "The indictment focuses on the movement of funds outside the U.S." and that you can't just "flout US law" by not being in the US. What also needs to be understood is that the domain bodog.com was registered to via a non-US Registrar, namely Vancouver's domainclip.

So Here's Where It Get's Scary…


Image

No Bodog.com for you!We all know that with some US-based Registrars (*cough* Godaddy *cough*), all it takes is a badge out of a box of crackerjacks and you have the authority to fax in a takedown request which has a good shot at being honoured. We also know that some non-US registrars, it takes a lot more "due process-iness" to get a domain taken down.

But now, none of that matters, because in this case the State of Maryland simply issued a federal warrant was issued in the State of Maryland[1] to .com operator Verisign, (who is headquartered in California) who then duly updated the rootzone for .com with two new NS records for bodog.com which now redirect the domain to the takedown page.

This is exactly the scenario we were worried about when Verisign originally tabled their very troubling takedown proposal. Said proposal was quickly retracted, but here we have the same situation playing out anyway. Granted, this was an actual court order, to Verisign – not a "request" from a governmental or "quasi-governmental" agency as originally proposed.

But at the end of the day what has happened is that US law (in fact, Maryland state law) as been imposed on a .com domain operating outside the USA, which is the subtext we were very worried about when we commented on SOPA. Even though SOPA is currently in limbo, the reality that US law can now be asserted over all domains registered under .com, .net, org, .biz and maybe .info (Afilias is headquartered in Ireland by operates out of the US).

This is no longer a doom-and-gloom theory by some guy in a tin foil hat. It just happened.

The ramifications of this are no less than chilling and every single organization branded or operating under .com, .net, .org, .biz etc needs to ask themselves about their vulnerability to the whims of US federal and state lawmakers (not exactly known their cluefulness nor even-handedness, especially with regard to matters of the internet).
The larger picture: root monopolies and the need to replace ICANN

The .com root will never be opened to a truly competitive bidding process. Verisign has pretty well ensconced themselves into the .com and .net roots indefinitely with built-in price hikes baked into the cake. I recall a conversation I once had with Tucows CEO Elliot Noss, back when they still owned Liberty RMS (which ran the .info registry and later sold to Afilias) – he lamented that if the .com registry bidding process were truly competitive, you would see a registry operator in there doing it for about $2 per domain. At the time the wholesale cost of a .com domain was $6 and is now $7.85 after their latest annual increase which is hard-coded into their contract.

I mention this because a truly competitive bidding process for the registry operator job would bring out both cost competition and stewardship competition: players who would table proposals on just how they would respect the rights of all their stakeholders, not to mention operators who may operate outside the United States.

Where the fsck is ICANN in all of this?

They are nowhere. They are collecting their fees, pushing their agenda of as many possible new-top-level domains and despite the fact that SOPA, ACTA, PIPA et aim directly at the interests of their core stakeholders, for whom they are supposed to be advocates and stewards. ICANN is conspicuous in their absence from the debate, save for a smug and trite abdication of involvement (i.e. "ICANN Doesn't Take Down Websites") – translation: "This isn't our problem".

And therein lies the issue. ICANN needs to make this their problem, because it very much is. If ICANN isn't going to stand up, and vigorously campaign for global stakeholder representation in these matters, than they are not only abdicating any responsibility in the ongoing and escalating crackdown on internet freedom, they are also abdicating their right to govern and oversee it.

They need to be visible, they need to be loud and they need to come down on the right side of these issues or they need to be replaced.

Of course, the replacement of ICANN will never happen. At least not by a non-US entity, which means we are once again headed to the unthinkable place that only crackpots and conspiracy theorists think possible: a fractured internet with competing roots. On the bright side, life will go on, and companies like mine will probably become exceedingly wealthy charging every internet user in the world fees to gain and project visibility across all the myriad internet roots that will someday exist because governments will refuse to approach it co-operatively. The only thing that will remain to be seen is whether we'll be deemed "criminals" for doing so.


http://blog2.easydns.org/2012/02/29/ver ... thorities/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 6:04 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Anonymous continues campaign against Monsanto

Jeb BooneMarch 1, 2012 13:16

In an attack on Monsanto, the multinational agricultural biotech corporation, Anonymous released a lengthy list of emails and contact information taken from servers belonging to the Bivings Group, Monsanto’s public relations firm.

Anonymous targeted the company for its decision to file lawsuits against organic dairy farmers because the farmers labeled their products as free of growth hormones, a product Monsanto used to manufacture.

The attack was announced by the Twitter account YourAnonNews, “HACKED: Monsanto pwnt once more by #Anonymous - Old DB lifted and leaked.” The tweet also linked to the database that was published on pastehtml.com, which contained a statement as to the reason for the hack.

“Your continued attack on the worlds food supply, as well as the health of those who eat it, has earned you our full attention. Your crimes against humanity are too many to name on one page, you have put over 9000 small-time farmers out of business by using your enourmous legal team to bury them with your malicious patent lawsuits. You have continually introduced harmful, even deadly products into our food supply without warning, without care, all for your own profit,” read the statement.

Anonymous also pledged to continue cyber-attacks against Monsanto by releasing personal information, forcing down websites through Distributed Denial of Service (DDoS) attacks, and attacks on email servers.

This attack is the third in an ongoing campaign against Monsanto that has included a July 2011 hack where personal information belonging to 2,500 employees was posted. In December 2011, Anonymous again targeted the Bivings Group, taking down their website.

http://www.globalpost.com/dispatches/gl ... ry-farmers

(There's a fairly large sampling of this on the Wikileak thread by Anti-Sec

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Last edited by Shayalana on Thu Mar 01, 2012 6:21 pm, edited 2 times in total.

Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 6:15 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Privacy betrayed: Twitter sells multi-billion tweet archive

Published: 29 February, 2012, 18:08

Image

Twitter has sold billions of archived tweets believed to have vanished forever. A privacy row has erupted as hundreds of companies queue up to purchase users’ personal information from the new database.

­Every time you use social networks you become mere product – it’s an idea we will all have to get used to. So, should we give up worldly goods and hide in a Tibetan monastery till the end of our days, or start putting up a fight to protect our privacy? In the latest in a long series of scandals over social networks that profit from our private data, the UK-based DataSift firm has announced that is has bought every tweet posted since January 2010. The business intelligence and data-mining platform will be the first company to offer the archive for sale.

DataSift’s Historics is a cloud-computing social data platform that enables businesses to extract insights and trends that relate to brands, news, public opinion and … actually anything you could ever need… from Twitter's public tweets. Now entrepreneurs will have access to billions of tweets, which literally means they will purchase every Twitter user along with all his secrets, GPS-location included. Thought the law protected you from thieves? No, on the contrary – it actually helps thieves to abuse you and steal your personal data. DataSift now brings to the table what it calls “an invaluable information source” with 250 billion tweets posted in 2010 alone. Historics is available today as a limited release to existing customers and is scheduled to be generally available in April 2012.

­Do you agree your tweet is priceless?

The idea that months- or years-old tweets are of no value is a false one. DataSift says almost 1,000 companies have joined a waiting list to access the service. No complicated surveys needed – the firms now have the feedback at their fingertips.

­Twitter turned out to be craftier than most users suspected.

“You thought that tweets you posted months ago had vanished, or were simply hidden away so deeply and awkwardly on the Twitter website that they would be too difficult to uncover? Think again,” Graham Cluley from security firm Sophos says, as quoted by The Daily Mail web edition.

It turns out that Twitter had archived every tweet and will now be rewarded for its ingenuity. Datasift, for instance, will charge companies up to £10,000 a month to analyze tweets posted each day for anything said about their products and services.

­Outrage over privacy

The question is whether an estimated 300 million Twitter users should be classified as victims whose personal data has been sacrificed on the altar of global marketing. It has been reported that private accounts and tweets that have been deleted will not be indexed by the site. Nevertheless, privacy campaigners are alarmed.

The Daily Mail website quotes Justin Basini of the data privacy company Allow as saying: “Marketers will stop at nothing to get hold of your data. This move shows all those throwaway tweets have suddenly become a rich new revenue stream for Twitter… It has taken a stream of consciousness, analyzed it, bottled it and sold it for a profit. And the worst thing is, you never knew it was going to happen.”

DataSift claims it is planning to tap into another goldmine of information – Facebook – in just a few weeks. The latest data from comScore, an Internet marketing research company, says the average Facebook user spends around 6-7 hours a day using the social network. Now that the relatively laconic Twitter has turned dangerous, just imagine how much riskier it is to post something for six hours a day.

http://rt.com/news/twitter-sells-tweet-archive-529/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 6:55 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Anonymous hackers claim they were infiltrated

Activists claim that it wasn't technical prowess but police infiltration that yielded 25 arrests

By FRANK BAJAK

LIMA, Peru — People identifying themselves as activists in the Anonymous hacker movement said Wednesday it wasn't technical prowess but police infiltration that yielded 25 arrests in a sweep in Europe and South America.

In conversations in an online chat room where Spanish-speaking activists in the Americas and Spain regularly gather, they said nearly all of those arrested had been active on a single website used by the group.

Among those detained were a Spaniard known by the online nickname "Pacotron" or "Thunder," according to Spanish police and a communique issued by Anonymous Iberoamerica, which said he lives in Malaga.

The statement by the loosely organized collective's Spanish-language branch identified another of those arrested as a Spaniard known as "Troy" who it said owned computer servers in "such distant places as Slovakia and Romania."

Interpol, which announced the arrests Tuesday, did not say how it encountered the 25 suspects, who it says were involved in cyberattacks originating from Argentina, Chile, Colombia and Spain that targeted sites including Colombia's defense ministry and presidency and Chile's Endesa electricity company and national library.

Activists encountered in the chat room said some of those arrested belonged to a group of hackers called Sector404 while others were unsophisticated activists who took part in denial-of-service attacks, which overwhelm websites with data requests.

"The GREAT majority of those implicated were people inhabiting the servers of anonworld.info, something that disconcerts us," said the activist "Skao," who identified herself as a law student.
Advertise | AdChoices

In the communique released on its blog, Anonymous Iberoamerica said the 25 were snared not through "inteligence work or informatics strategy" but rather through "the use of spies and informants within the movement."

The activists said many of those arrested had been careless, leaving digital tracks.

A spokeswoman for Chile's chief prosecutor, Marlis Pfeiffer, told The Associated Press on Wednesday that authorities had released the five people arrested there in the sweep, two of whom were 17-year-olds. Anonymous Iberoamerica said three of them were computer science students, one a programmer and one a Colombian.

Pfeiffer said investigators were examining computers confiscated from the five to determine if criminal charges will be filed but were encountering difficulties, presumably encrypted data.

An Argentine police official said Wednesday that 10 adults were still being detained. The official said he had no further information and spoke on condition he not be further identified. Anonymous Iberoamerica said those arrested in Argentina included Colombians and that many were minors.

The arrests followed an investigation begun in mid-February and also led to the seizure of 250 items of IT equipment in 15 cities, according to Interpol, the international police agency that announced them.

Anonymous activists deface websites, carrying out denial-of-service attacks and publish data obtained in computer break-ins.

They are engaged in a number of political causes, including opposition to the global clampdown on file-sharing sites and defense of the secret-spilling site WikiLeaks. The Vatican has also been a target.

In Brazil, Anonymous hacktivists attacked nine banks last month.

Elsewhere in Latin America, they have targed government agencies and ministries they claim are corrupt.

"We hope you understand and reveal that we are not hackers on steroids. We are activists and what happens in the world matters to us," said Skao.

Authorities in Europe, North America and elsewhere have made dozens of arrests of Anonymous activists. In response, the group has increasingly attacked law enforcement, military and intelligence-linked targets.

Anonymous has no real membership structure. Hackers, activists, and supporters can claim allegiance to its freewheeling principles at their convenience, so it's unclear what impact the arrests will have.

Associated Press writer Raphael Satter in London contributed to this report.


http://www.msnbc.msn.com/id/46588406/ns ... 1AL5GzSOJM

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 7:17 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Image

I don't buy any of this stuff, not even one item. WOOT!

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 7:22 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Quote:
Image Ronald Ernest Paul ‏ @RonPaulsVoice
I'm an imperfect messenger, but the message is perfect #RonPaul #OWS #TeaParty #Anonymous
5:15 PM - 1 Mar 12 via Paulinator · Details


Even Ron Paul checks out #Anonymous. :wink:

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 11:12 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
This is a ploy and they are already monitoring people and making ready to censor ever so vigorously.

FBI director: Cyber-threats will become top worry

http://hosted2.ap.org/APDEFAULT/495d344 ... 3cc0b534e3

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 11:18 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Image

http://www.thispaddedcell.com/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 01, 2012 11:26 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Republicans introduce softer cyber security bill

By Diane Bartz

WASHINGTON | Thu Mar 1, 2012 7:41pm EST

(Reuters) - Eight top Republicans introduced a cybersecurity bill on Thursday aimed at stopping an overarching, bipartisan measure proposed earlier this month in order to better protect critical infrastructure.

The measure, introduced by the top Republicans on eight committees, would require federal contractors to inform the government about cyber threats and make it easier for government regulators and corporations to communicate about threats.

"We believe that ensuring our nation's cybersecurity is critical. We have a bill that would do plenty to meet current challenges," said Senator John McCain in introducing the bill.

McCain, a critic of a measure supported by Senate Majority Leader Harry Reid, argued that the Republican-backed legislation was better because it included very little new regulation.

The Arizona Republican has also been critical of proposals to have the Department of Homeland Security take a leading role in pushing better cyber security practices on sometimes reluctant industries.

Senator Saxby Chambliss, a co-sponsor of the McCain measure, agreed, saying: "More government is seldom a solution to any problem."

The Senate is also considering a rival bill Reid has said will be brought quickly to the Senate floor.

That bill is aimed at requiring upgrades in security for critical national infrastructure, which some cyber experts argue is needed to prevent a catastrophic attack on the nation's water supply, electric grid, financial networks and transportation infrastructure.

The McCain bill does not include this requirement.

The Reid-backed bill's sponsors include Senators John Rockefeller and Dianne Feinstein, both Democrats; Susan Collins, a Republican, and Joseph Lieberman, an independent.

There has been widespread and growing concern about incursions into U.S. networks by hackers looking to steal everything from state secrets to credit card numbers.

Victims have included defense contractors like Lockheed Martin Corp, web search leader Google Inc, Citigroup bank and exchange operator Nasdaq OMX.

Politicians have not been immune. In 2008, hackers targeted both President Barack Obama and McCain's presidential campaigns.

Reid and the four lawmakers who proposed the broader bill said they viewed the McCain legislation positively.

Reid said in a statement that the McCain measure highlighted areas of agreement. Both measures discuss the need for better information sharing mechanisms. "I look forward to a debate on the Senate floor that will ensure this bill and other proposals get a fair hearing, and which will allow thorough consideration of amendments to improve the legislation," Reid said.

The White House is eager to see cybersecurity legislation, but Howard Schmidt, the White House cybersecurity policy coordinator, said that the federal government could do more even without legislation. As one example, the Department of Energy could push harder to prompt electric utilities to ward off hacking intrusions.

The U.S. House of Representatives is considering legislation that overlaps with the Senate measures on some points.

For example, the House's Permanent Select Committee on Intelligence approved a bill in December that would expand a pilot Pentagon program for sharing classified and sensitive threat information with defense contractors and their Internet service providers.

USTelecom, a broadband association, said it supported the McCain measure because it would effectively protect against cybersecurity threats, especially by improving information-sharing.

"We can support the bill introduced today because it pursues those objectives without creating new bureaucracies or regulatory mandates that would erode, rather than enhance, the ability of network providers to provide nimble and effective responses to cyber threats," said USTelecom President Walter McCormick.

(Reporting By Diane Bartz and Joseph Menn; Editing by Todd Eastham and Paul Simao)


http://www.reuters.com/article/2012/03/ ... 4Z20120302

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Fri Mar 02, 2012 2:11 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Tim Berners-Lee Takes the Stand to Keep the Web Free

Image
World Wide Web inventor Tim Berners-Lee addresses the media during the International
World Wide Web conference in Hyderabad, India, Thursday, March 31, 2011.
Photo: Mahesh Kumar A/AP


The inventor of the World Wide Web, Tim Berners-Lee, testified in a courtroom Tuesday for the first time in his life. The web pioneer flew down from Boston, near where he teaches at MIT, to an eastern Texas federal court to speak to a jury of two men and six women about the early days of the web.

His trip is part of an effort by a group of internet companies and retailers trying to defeat two patents — patents that a patent-licensing company called Eolas and the University of California are saying entitle them to royalty payments from just about anyone running a website with “interactive” features, like rotating pictures or streaming video.

(For background on the case and patents, see our story “Patent Troll Claims Ownership of Interactive Web — And Might Win“)

The defendants, including Google, Amazon, and Yahoo, are hoping that Berners-Lee’s testimony—combined with that of other web pioneers like Netscape co-founder Eric Bina, Viola browser inventor Pei-Yuan Wei, and Dave Raggett (who invented the HTML “embed” tag) — will convince the jury that the inventions of Eolas and its founder, Michael Doyle, aren’t worth much. The stakes couldn’t be higher — if Berners-Lee and the defendants don’t succeed, Eolas and Doyle could insist on a payout from almost every modern website.

Berners-Lee, a slight 56-year-old man, spoke quickly and quietly; at one point, Judge Leonard Davis asked him to speak up. “We have a language situation with your accent that makes it doubly
difficult,” he told the scientist. Berners-Lee shifted position and looked about the room as he spoke, and seemed uncomfortable at times.

Jennifer Doan, a Texarkana lawyer representing Yahoo and Amazon, led the questioning.

“Mr. Berners-Lee, why are you here?” asked Doan.

“I am here because I want to help get some clarity over what was obvious, and what was the feeling of computing [in the early 1990s]…. The tools I had in my knapsack, so to speak,” he said.

After describing how Berners-Lee worked at CERN in Switzerland back in the 1980s, Doan moved on to the web. When Berners-Lee invented the web, did he apply for a patent on it, Doan asked.

“No,” said Berners-Lee.

“Why not?” asked Doan.

“The internet was already around. I was taking hypertext, and it was around a long time too. I was taking stuff we knew how to do…. All I was doing was putting together bits that had been around for years in a particular combination to meet the needs that I have.”

Doan: “And who owns the web?”

Berners-Lee: “We do.”

Doan: “The web we all own, is it ‘interactive’?”

“It is pretty interactive, yeah,” said Berners-Lee, smiling.

Then Doan moved on to the heart of Berners-Lee’s testimony: to establish the importance of the Viola browser, created by Pei Wei, who was at that time a computer science student at UC Berkeley. The Viola browser is a key piece of “prior art” that the defendant companies hope will invalidate the UC/Eolas patent.

Berners-Lee described Viola as “an important part of the development of the web.”

The jury was shown an e-mail from Pei Wei to Berners-Lee dated December 1991 — almost two years before Doyle’s invention — which read in part: “One thing I’d like to do soon, if I have time, is to teach the parser about Viola object descriptions and basically embed Viola objects (GUIs and programmability) into HTML files.”

more...

http://www.wired.com/threatlevel/2012/0 ... ee-patent/

and...

Patent Troll Claims Ownership of Interactive Web – And Might Win

Image
The mother of all patent troll trials unfolds in Texas where Google, Amazon and Adobe
are fighting a patent claiming ownership over online video, image rotation and search auto-complete.
We explain and start a series.


http://www.wired.com/threatlevel/2012/0 ... oll-trial/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sat Mar 03, 2012 6:00 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Billionaire’s Bogus Legal Tactics Against Bloggers Threaten Free Speech

Recently, Salon’s Glenn Greenwald reported that Idaho billionaire and CEO of Melaleuca, Inc., Frank VanderSloot, has been engaged in a systematic campaign to silence journalists and bloggers from publishing stories about his political views and business practices. VanderSloot and Melaleuca have targeted national news organizations and small town bloggers alike by issuing bogus legal threats alleging defamation and copyright infringement in an attempt to keep legitimate newsworthy information from being released to the public.

This aggressive tactic not only chills otherwise protected free speech, but in many states, also risks triggering liability under “anti-SLAPP” statutes. Anti-SLAPP laws prevent strategic defamation lawsuits—frequently filed by plaintiffs with deep pockets—that have little to no chance of winning, yet are aimed at pressuring the target into settling for fear of expensive litigation.

Last month, after VanderSloot became a finance co-chair on leading Republican presidential candidate Mitt Romney’s election campaign, Melaleuca’s attorneys sent threatening letters to Mother Jones and Forbes, forcing them to temporarily take down articles exploring VanderSloot’s public position on gay rights and Melaleuca’s business practices. It turns out that this practice is nothing new for Vandersloot: he targeted local political blogs in Idaho with similar tactics for years on a local level.

At the beginning of February, a blogger for The Idaho Agenda was forced to take down a post after receiving a defamation suit threat from Melaleuca’s in house counsel. The author indicated that he took it down because he feared the expensive litigation battle but insisted that “the facts included in the post are a matter of public record found elsewhere, including the internet, periodicals and newspapers.”

Back in 2007, Melaleuca pressured the politics blog 43rdStateBlues to take down a critical post written by a pseudonymous blogger “TomPaine.” Another blogger on 43rdStateBlues, “d2”, posted the lawyer’s letter explaining to readers why the original was taken down. Incredibly, Melaleuca’s lawyers then obtained a retroactive copyright certificate on the threat letter and demanded the hosting provider take down the post as well. Even after they complied with the letter, Melaleuca sued TomPaine for copyright infringement then subpoenaed TomPaine’s and d2’s identities.

You can read more of the details of these cases and Glenn Greenwald’s analysis of how all of these posts were perfectly protected speech here.

Now, VanderSloot is at it again. He and his company's lawyers have targeted local Idaho independent journalist Jody May-Chang over posts that are four years old. Melaleuca’s lawyers have challenged a series of articles written by May-Chang, most notably this one, in which she describes VanderSloot’s funding of the billboard campaign and opines that he is “anti-gay.” Melaleuca first sent a letter to Mae-Chang in 2007, asking not only to correct the post but to take down the stock photograph of VanderSloot that was on his personal website (a common practice among journalists). The photo was taken down but the posts stayed up at a new URL. After re-discovering the post last month, they sent another letter to May-Chang repeated their demands from 2007, but Mae-Chang has held her ground and kept the post up despite the threat of costly litigation.

Unfortunately, VanderSloot’s strategy is not new and demonstrates the speech-chilling effect options available to those with ready access to aggressive lawyers. Another billionaire, Washington Redskins owner Dan Snyder, attempted to use this tactic against the alt-weekly Washington City Paper last year by suing the publication for libel over a well-sourced article making fun of his business practices. Luckily, Washington City Paper decided to fight the suit and Snyder dropped it after being confronted with potential liability under DC’s new anti-SLAPP statute.

While Idaho does not have an anti-SLAPP law to protect May-Chang, after Greenwald’s report two weeks ago, other news organizations have finally felt free to report on this series of incidents and the inevitable Streisand Effect has taken hold. Rachel Maddow aired a five minute segment on the controversy on her MSNBC show. And Techdirt’s Mike Masnick said this situation shows the need for a strong federal anti-SLAAP statute. Thankfully, while VanderSloot issued a lengthy response the allegations, he or his company’s lawyers have not issued any new legal threats since Greenwald published his investigation.

But as National Journal’s Chris Frates suggests, given that VanderSloot is a co-chair on a leading presidential campaign, Mitt Romney should have to answer to questions about his official surrogate's attempts to circumvent the First Amendment. Frates writes:

" And near as I can tell, Romney has yet to answer questions regarding his supporter's tactics. Did he know of VanderSloot's reported pattern of threatening journalists critical of his interests? Does Romney agree with that response? And does Romney stand by VanderSloot? I put those, and other, questions to a campaign spokeswoman but did not get a response."

And while we’re at it, Mitt Romney—along with President Obama—should be asked their position on a federal anti-SLAAP statute. This type of harassment has no place in a country that prides itself on honest public discourse and the free speech rights guaranteed under the First Amendment.

The Public Participation Project, a non-profit organization dedicated to passing federal anti-SLAPP regulation, has highlighted this case as well, and encourages those concerned to petition their congress member to support such legislation by going here.

https://www.eff.org/deeplinks/2012/03/b ... ree-speech

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 04, 2012 12:15 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Sat Apr 30, 2005 8:11 pm
Posts: 20383
Location: High Plains of the Front Range of the Rocky Mts in Colorado USA
"Anonymous" is a government agency.

http://www.youtube.com/watch?v=abe_rC7vDGo

_________________
"...to know this information and then remain passive—a pure observer—is a programmed response, and that is not an answer to how do I best serve truth? It is a denial of truth.” 5th Interview


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 04, 2012 12:27 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Sat Apr 30, 2005 8:11 pm
Posts: 20383
Location: High Plains of the Front Range of the Rocky Mts in Colorado USA
Proof That ''Anonymous'' Is CIA, Government Operations, Cyber Terrorist's And Not Activist's
http://www.youtube.com/watch?v=gsPHCgyx ... re=related

_________________
"...to know this information and then remain passive—a pure observer—is a programmed response, and that is not an answer to how do I best serve truth? It is a denial of truth.” 5th Interview


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 04, 2012 12:32 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Sat Apr 30, 2005 8:11 pm
Posts: 20383
Location: High Plains of the Front Range of the Rocky Mts in Colorado USA
Anonymous is CIA, wikileaks CIA,Repeat fake revolution=Order Ob chao, illuminati Obama backlashcard

http://www.youtube.com/watch?v=62xkZfvSiKM&feature=related

_________________
"...to know this information and then remain passive—a pure observer—is a programmed response, and that is not an answer to how do I best serve truth? It is a denial of truth.” 5th Interview


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 04, 2012 1:07 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Sat Apr 30, 2005 8:11 pm
Posts: 20383
Location: High Plains of the Front Range of the Rocky Mts in Colorado USA
Anonymous is CIA, wikileaks CIA,Repeat fake revolution=Order Ob chao, illuminati Obama backlashcard

http://www.youtube.com/watch?v=62xkZfvSiKM&feature=related

_________________
"...to know this information and then remain passive—a pure observer—is a programmed response, and that is not an answer to how do I best serve truth? It is a denial of truth.” 5th Interview


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 04, 2012 9:34 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
United States vs. Manning & Assange

http://www.youtube.com/watch?v=ctKqJ-WJs64

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 04, 2012 9:37 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
STARDUSTER with people working to keep the internet open and free and that are skilled enough to do it for the tremendous risk they take, I Salute them! Without such defence we eventually wouldn't have this forum to complain about them on. I love the truth and those who defend it against the odds. Starduster you act the role of a self serving coward too afraid of your CIA friends accusing you of not towing the line. You live in a retired CIA employee community high in the Colorado mountians where the US gov has one of their main hacking facilities, and which your deceased dad's retirement money made possible for you and whatever else, depending upon what story you use. Both your parents were CIA so what does all of this say about you and your actions on this forum? A lot, and the reason you have been on this forum is not because you sincerely believe the WMM, let alone practice any heart virtues which you really are not interested in, your behavior attests to that, but, it's so that you can undermine , devalue, and whatever other deviousness you can think of so that people doubt the materials and themselves. What makes your role here so onbvious is that there is no heart in what you post and that is obviously felt by those who know their own heart. And even Solaris has little to none to do with you any more because he sees right through you as well.

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 04, 2012 9:54 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18442
Location: QUANTUSUM
Ron Paul on Julian Assange (WikiLeaks)

http://www.youtube.com/watch?v=Gjap6ELy ... creen&NR=1

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 316 posts ]  Go to page Previous  1, 2, 3, 4, 5, 6, 7 ... 13  Next

All times are UTC - 5 hours


Who is online

Users browsing this forum: Google [Bot] and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
cron
Copyright © 2005-2012 WingMakers.co.uk