Archive for November, 2012

Mark 4:30-32 (NIV) Are you like a mustard seed???
Again he said, “What shall we say the kingdom of God is like, or what parable shall we use to describe it? It is like a mustard seed, which is the smallest seed you plant in the ground. Yet when planted, it grows and becomes the largest of all garden plants, with such big branches that the birds of the air can perch in its shade.”

history repeats itself

Reposted from…

Editors Note (Louis Beam): This essay was written by Louis Beam in 1983 and published at that time. Republished above in 1992. I do not take credit for the theories expounded upon here, Col. Amoss deserves the credit for his brilliant analysis and insightful thinking.



The concept of Leaderless Resistance was proposed by Col. Ulius Louis Amoss, who was the founder of International Service of Information Incorporated, located in Baltimore, Maryland. Col. Amoss died more than fifteen years ago, but during his life was a tireless opponent of communism, as well as a skilled Intelligence Officer. Col. Amoss first wrote of Leaderless Resistance on April 17, 1962. His theories of organization were primarily directed against the threat of eventual Communist take-over in the United States. The present writer, with the benefit of having lived many years beyond Col. Amoss, has taken his theories and expounded upon them. Col. Amoss feared the Communists. This author fears the federal government. Communism now represents a threat to no one in the United States, while federal tyranny represents a threat to everyone . The writer has joyfully lived long enough to see the dying breaths of communism, but may, unhappily, remain long enough to see the last grasps of freedom in America.

In the hope that, somehow, America can still produce the brave sons and daughters necessary to fight off ever increasing persecution and oppression, this essay is offered. Frankly, it is too close to call at this point. Those who love liberty, and believe in freedom enough to fight for it are rare today, but within the bosom of every once great nation, there remains secreted, the pearls of former greatness. They are there. I have looked into their sparking eyes; sharing a brief moment in time with them as I passed through this life. Relished their friendship, endured their pain, and they mine. We are a band of brothers, native to the soil gaining strength one from another as we have rushed head long into a battle that all the weaker, timid men, say we can not win. Perhaps…but then again, perhaps we can. It’s not over till the last freedom fighter is buried or imprisoned, or the same happens to those who would destroy their freedom.

Barring any cataclysmic events, the struggle will yet go on for years. The passage of time will make it clear to even the more slow among us that the government is the foremost threat to the life, and liberty of the folk. The government will no doubt make today’s oppressiveness look like grade school work compared to what they have planned in the future. Meanwhile, there are those of us who continue to hope that somehow the few can do what the many have not. We are cognizant that before things get better they will certainly get worse as government shows a willingness to use ever more severe police state measures against dissidents. This changing situation makes it clear that those who oppose state repression must be prepared to alter, adapt, and modify their behavior, strategy, and tactics as circumstances warrant. Failure to consider new methods and implement them as necessary will make the government’s efforts at suppression uncomplicated. When one fails to do so he not only fails himself, but his people.

It is the duty of every patriot to make the tyrant’s life miserable.

With this in mind, current methods of resistance to tyranny employed by those who love our race, culture, and heritage must pass a litmus test of soundness. Methods must be objectively measured as to their effectiveness, as well as to whether they make the government’s intention of repression more possible or more difficult. Those not working to aid our objectives must be discarded or the government benefits from our failure to do so.

As honest men who have banded together into groups or associations of a political or religious nature are falsely labeled “domestic terrorists” or “cultists” and suppressed, it will become necessary to consider other methods of organization–or as the case may very well call for: non-organization. One should keep in mind that it is not in the government’s interest to eliminate all groups. Some few must remain in order to perpetuate the smoke and mirrors vision for the masses that America is a “free democratic country” where dissent is allowed. Most organizations, however, that possess the potential for effective resistance will not be allowed to continue. Anyone who is so naive as to believe the most powerful government on earth will not crush any who pose a real threat to that power, should not be active, but rather, at home studying political history.

The question as to who is to be left alone and who is not, will be answered by how groups and individuals deal with several factors such as: avoidance of conspiracy plots, rejection of feeble minded malcontents, insistence upon quality of the participants, avoidance of all contact with the front men for the federals–the news media–and, finally, camouflage (which can be defined as the ability to blend in the public’s eye the more committed groups of resistance with mainstream “kosher” associations that are generally seen as harmless.) Primarily though, whether any organization is allowed to continue in the future will be a matter of how big a threat a group represents. Not a threat in terms of armed might or political ability, for there is none of either for the present, but rather, threat in terms of potentiality. It is potential the federals fear most. Whether that potential exists in an individual or group is incidental. The federals measure potential threat in terms of what might happen given a situation conducive to action on the part of a restive organization or individual. Accurate intelligence gathering allows them to assess the potential. Showing one’s hand before the bets are made, is a sure way to loose.

The movement for freedom is rapidly approaching the point where for many people, the option of belonging to a group will be nonexistent. For others, group membership will be a viable option for only the immediate future. Eventually, and perhaps much sooner than most believe possible, the price paid for membership will exceed any perceived benefit. But for now, some of the groups that do exist often serve a useful purpose either for the newcomer who can be indoctrinated into the ideology of the struggle, or for generating positive propaganda to reach potential freedom fighters. It is sure that, for the most part, this struggle is rapidly becoming a matter of individual action, each of its participants making a private decision in the quietness of his heart to resist: to resist by any means necessary. It is hard to know what others will do, for no man truly knows another man’s heart. It is enough to know what one himself will do. A great teacher once said “know thyself.” Few men really do, but let each of us, promise ourselves, not to go quietly to the fate our would-be masters have planned.

The concept of Leaderless Resistance is nothing less than a fundamental departure in theories of organization. The orthodox scheme of organization is diagrammatically represented by the pyramid, with the mass at the bottom and the leader at the top. This fundamental of organization is to be seen not only in armies, which are of course, the best illustration of the pyramid structure, with the mass of soldiery, the privates, at the bottom responsible to corporals who are in turn responsible to sergeants, and so on up the entire chain of command to the generals at the top. But the same structure is seen in corporations, ladies’ garden clubs and in our political system itself. This orthodox “pyramid” scheme of organization is to be seen basically in all existing political, social and religious structures in the world today from the Federal government to the Roman Catholic Church. The Constitution of the United States, in the wisdom of the Founders, tried to sublimate the essential dictatorial nature of pyramidal organization by dividing authority into three: executive, legislative and judicial. But the pyramid remains essentially untouched.

This scheme of organization, the pyramid, is however, not only useless, but extremely dangerous for the participants when it is utilized in a resistance movement against state tyranny. Especially is this so in technologically advanced societies where electronic surveillance can often penetrate the structure revealing its chain of command. Experience has revealed over and over again that anti-state, political organizations utilizing this method of command and control are easy prey for government infiltration, entrapment, and destruction of the personnel involved. This has been seen repeatedly in the United States where pro-government infiltrators or agent provocateurs weasel their way into patriotic groups and destroy them from within.

In the pyramid type of organization, an infiltrator can destroy anything which is beneath his level of infiltration and often those above him as well. If the traitor has infiltrated at the top, then the entire organization from the top down is compromised and may be traduced at will.

An alternative to the pyramid type of organization is the cell system. In the past, many political groups (both right and left) have used the cell system to further their objectives. Two examples will suffice. During the American Revolution “committees of correspondence” were formed throughout the Thirteen colonies.

Their purpose was to subvert the government and thereby aid the cause of independence. The “Sons of Liberty”, who made a name for themselves dumping government taxed tea into the harbor at Boston, were the action arm of the committees of correspondence. Each committee was a secret cell that operated totally independently of the other cells. Information on the government was passed from committee to committee, from colony to colony, and then acted upon on a local basis. Yet even in these bygone days of poor communication, of weeks to months for a letter to be delivered, the committees without any central direction whatsoever, were remarkable similar in tactics employed to resist government tyranny. It was, as the first American patriots knew, totally unnecessary for anyone to give an order for anything. Information was made available to each committee, and each committee acted as it saw fit. A recent example of the cell system taken from the left wing of politics are the Communists. The Communist, in order to get around the obvious problems involved in pyramidal organization, developed to an art the cell system. They had numerous independent cells which operated completely isolated from one another and particularly with no knowledge of each other, but were orchestrated together by a central headquarters. For instance, during World War II, in Washington, it is known that there were at least six secret Communist cells operating at high levels in the United States government (plus all the open Communists who were protected and promoted by President Roosevelt), however, only one of the cells was rooted out and destroyed. How many more actually were operating no one can say for sure.

The Communist cells which operated in the U.S until late 1991 under Soviet control could have at their command a leader, who held a social position which appeared to be very lowly. He could be, for example, a busboy in a restaurant, but in reality a colonel or a general in the Soviet Secret Service, the KGB. Under him could be a number of cells and a person active in one cell would almost never have knowledge of individuals who are active in another cell. The value of this is that while any one cell can be infiltrated, exposed or destroyed, such action will have no effect on the other cells; in fact, the members of the other cells will be supporting that cell which is under attack and ordinarily would lend very strong support to it in many ways. This is at least part of the reason, no doubt, that whenever in the past Communists were attacked in this country, support for them sprang up in many unexpected places.

The efficient and effective operation of a cell system after the Communist model, is of course, dependent upon central direction, which means impressive organization, funding from the top, and outside support, all of which the Communists had. Obviously, American patriots have none of these things at the top or anywhere else, and so an effective cell organization based upon the Soviet system of operation is impossible.

Two things become clear from the above discussion. First, that the pyramid type of organization can be penetrated quite easily and it thus is not a sound method of organization in situations where the government has the resources and desire to penetrate the structure; which is the situation in this country. Secondly, that the normal qualifications for the cell structure based upon the Red model does not exist in the U.S. for patriots. This understood, the question arises “What method is left for those resisting state tyranny?” The answer comes from Col. Amoss who proposed the “Phantom Cell” mode of organization. Which he described as Leaderless Resistance. A system of organization that is based upon the cell organization, but does not have any central control or direction, that is in fact almost identical to the methods used by the Committees of Correspondence during the American Revolution. Utilizing the Leaderless Resistance concept, all individuals and groups operate independently of each other, and never report to a central headquarters or single leader for direction or instruction, as would those who belong to a typical pyramid organization.

At first glance, such a type of organization seems unrealistic, primarily because there appears to be no organization. The natural question thus arises as to how are the “Phantom cells” and individuals to cooperate with each other when there is no intercommunication or central direction? The answer to this question is that participants in a program of Leaderless Resistance through phantom cell or individual action must know exactly what they are doing, and how to do it. It becomes the responsibility of the individual to acquire the necessary skills and information as to what is to be done. This is by no means as impractical as it appears, because it is certainly true that in any movement, all persons involved have the same general outlook, are acquainted with the same philosophy, and generally react to given situations in similar ways. The pervious history of the committees of correspondence during the American Revolution show this to be true.

Since the entire purpose of Leaderless Resistance is to defeat state tyranny (at least insofar as this essay is concerned), all members of phantom cells or individuals will tend to react to objective events in the same way through usual tactics of resistance. Organs of information distribution such as newspapers, leaflets, computers, etc., which are widely available to all, keep each person informed of events, allowing for a planned response that will take many variations. No one need issue an order to anyone. Those idealist truly committed to the cause of freedom will act when they feel the time is ripe, or will take their cue from others who precede them. While it is true that much could be said against this type of structure as a method of resistance, it must be kept in mind that Leaderless Resistance is a child of necessity. The alternatives to it have been show to be unworkable or impractical. Leaderless Resistance has worked before in the American Revolution, and if the truly committed put it to use for themselves, it will work now.

It goes almost without saying that Leaderless Resistance leads to very small or even one man cells of resistance. Those who join organizations to play “let’s pretend” or who are “groupies” will quickly be weeded out. While for those who are serious about their opposition to federal despotism, this is exactly what is desired.

From the point of view of tyrants and would be potentates in the federal bureaucracy and police agencies, nothing is more desirable than that those who oppose them be UNIFIED in their command structure, and that every person who opposes them belong to a pyramid type group. Such groups and organizations are an easy kill. Especially in light of the fact that the Justice (sic) Department promised in 1987 that there would never be another group that opposed them that they did not have at least one informer in. These federal “friends of government” are intelligence agents. They gather information that can be used at the whim of a federal D.A. to prosecute. The line of battle has been drawn. Patriots are required therefore, to make a conscious decision to either aid the government in its illegal spying, by continuing with old methods of organization and resistance, or to make the enemie’s job more difficult by implementing effective countermeasures.

Now there will, no doubt, be mentally handicapped people out there who, while standing at a podium with an American flag draped in the background, and a lone eagle soaring in the sky above, will state emphatically in their best sounding red, white, and blue voice, “So what if the government is spying? We are not violating any laws.” Such crippled thinking by any serious person is the best example that there is a need for special education classes. The person making such a statement is totally out of contact with political reality in this country, and unfit for leadership of any thing more than a dog sleigh in the Alaskan wilderness. The old “Born on the fourth of July” mentality that has influenced so much of the American patriot’s thinking in the past will not save him from the government in the future. “Reeducation” for non-thinkers of this type will take place in the federal prison system where there are no flags or eagles, but abundance of men who were “not violating any law.”

Most groups who “unify” their disparate associates into a single structure have short political lives. Therefore, those movement leaders constantly calling for unity of organization rather than the desirable unity of purpose, usually fall into one of three categories.

They may not be sound political tacticians, but rather, just committed men who feel unity would help their cause, while not realizing that the government would greatly benefit from such efforts. The Federal objective, to imprison or destroy all who oppose them, is made easier in pyramid organizations. Or perhaps, they do not fully understand the struggle they are involved in and that the government they oppose has declared a state of war against those fighting for faith, folk, freedom and constitutional liberty. Those in power will use any means to rid themselves of opposition. The third class calling for unity and let us hope this is the minority of the three, are men more desirous of the supposed power that a large organization would bestow, than of actually achieving their stated purpose.

Conversely, the last thing Federal snoops would have, if they had any choice in the matter, is a thousand different small phantom cells opposing them. It is easy to see why. Such a situation is an intelligence nightmare for a government intent upon knowing everything they possibly can about those who oppose them. The Federals, able to amass overwhelming strength of numbers, manpower, resources, intelligence gathering, and capability at any given time, need only a focal point to direct their anger. A single penetration of a pyramid type of organization can lead to the destruction of the whole. Whereas, Leaderless Resistance presents no single opportunity for the Federals to destroy a significant portion of the Resistance.

With the announcement by the Department of Justice (sic) that 300 FBI agents formerly assigned to watching Soviet spies in the US (domestic counter intelligence) are now to be used to “combat crime”, the federal government is preparing the way for a major assault upon those persons opposed to their policies. Many anti-government groups dedicated to the preservation of the America of our forefathers can expect shortly to feel the brunt of a new federal assault upon liberty.

It is clear, therefore, that it is time to rethink traditional strategy and tactics when it comes to opposing a modern police state. America is quickly moving into a long dark night of police state tyranny, where the rights now accepted by most as being inalienable will disappear. Let the coming night be filled with a thousand points of resistance. Like the fog which forms when conditions are right and disappears when they are not, so must the resistance to tyranny be.

“If every person has the right to defend–even by force–his person, his liberty, and his property, then it follows that a group of men have the right to organize and support a common force to protect these rights constantly.” —The Law. Frederick Bastiat Paris, 1850.

Related posts…

The first thing to do…

The right weapons… the right strategy… the right tactics…

Ancient evidence of a “wicked seed”

Joshua 23:10 (NLT)
Each one of you will put to flight a thousand of the enemy, for the LORD your God fights for you, just as he has promised…

Read Full Post »

Infighting among anti-Christs…

Revelation 22:14-15 (NIV) Which group of dogs will be top dog???
“Blessed are those who wash their robes, that they may have the right to the tree of life and may go through the gates into the city. OUTSIDE ARE THE DOGS, those who practice magic arts, the sexually immoral, the murderers, the idolaters and everyone who loves and practices falsehood…

Mormons Baptize Anne Frank (Cenk Goes Off)
Uploaded on Feb 22, 2012 by TheYoungTurks (youtube)

“The lady doth protest too much, methinks.” – William Shakespeare (Hamlet)

Is the jew anti-Christ worried that the mormon anti-Christ is somehow stealing some dark power from them??? Infighting in satan’s kingdom???
Mark 3:26 (NIV) Jesus hinted at the possibility…
And if satan opposes himself and is divided, he cannot stand; his end has come…

Related posts…

One anti-christian group bowing to the wishes of another anti-christian group (anti-gospel = anti-christian)

One group of liars pointing their finger at another group of liars…

It is elegant when two anti-Christs fight among themselves…

Infighting amongst the false gods…

All under one hat, no doubt…

The most efficient thieves in the world…

Read Full Post »

Condemning property… threats of $2000 per day fine if they do not repair to code or demolish their property within 15 days… LAND GRAB (developers with deep pockets waiting in the wings???)
How else could the local government’s action be interpreted???

Seaside Heights Gives Victims 15 Day Notice on Demolitions; Threatens Fines


Toms River News

Sunday, November 18th, 2012 | Posted by Toms River, NJ

Seaside Heights–This weekend, Vice President Joe Biden visited Seaside Heights, a Jersey Shore community hit hard, not only by Hurricane Sandy.    After the storm hit, many borough residents found their cars missing and had to deal with price gouging from the the town’s only authorized towing service, APK Towing of Toms River.

This weekend, Joe Biden visited this oceanfront community in Ocean County, but local residents, some who saw their homes for the first time, were also greeted by demolition notices.

Dated November 13th, one noticed by a resident who wishes to remain anonymous, stated “Your structure has possible structural of footing failures.”

It went on to say the structure would be demolished by November 30, 2012, just 17 days from the notice.   The order allowed the residents to request a hearing, but also threatened by fines of up to $2,000 per week if they did not comply with the order and fix their homes before the 30th.

To date, homeowners have been allowed to hire contractors for damage assessments, quotes, winterizations and insurance inspections, but no plans have yet been made for any reconstruction, leaving homeowners in a difficult position with very little time to decide what to do before their homes are demolished by the township.

Deuteronomy 27:25 (NIV)
“Cursed is the man who accepts a bribe to kill an innocent person.” Then all the people shall say, “Amen!”
Exodus 20:15 (NIV)
You shall not steal…
Proverbs 12:10 (KJV)
A righteous man regardeth the life of his beast: but the tender mercies of the wicked are cruel…

Read Full Post »

Civilizations linked to those of mesoamerica, where hundreds of human sacrifices took place on a regular schedule…
Genesis 6:4 (YLT)
The fallen ones were in the earth in those days, and even afterwards when sons of God come in unto daughters of men, and they have borne to them — they are the heroes, who, from of old, are the men of name…
Stone Builders, Mound Builders and the Giants of Ancient America | Jim Vieira at TEDxShelburneFalls
Published on Nov 20, 2012 by TEDxTalks (youtube)

Modern evidence of a “wicked seed”

Defense Against the Psychopath (Full length Version)
Uploaded by Stefan Verstappen on Dec 14, 2010 (youtube)

Biblical evidence of a “wicked seed”

Counterfeit Humans – Jesus Parable of The Wheat and The Tares
Uploaded by gorilla199 on Feb 14, 2008 (youtube)

Editor’s note…

There are many who recognize that there are people who are born evil… There are groups within Christianity that have long recognized this. And Christianity has been targeted with the same “divide and conquer” countermeasure against these groups and the rest of Christianity to get them off point. The most common schism has been arguing over how these critters got here. This ploy is from satan to prevent the obvious conclusion that dedicated Christians must come to…


At some point afterwards we may have the luxury of knowing all the details of how “they” got here. Right now it is much more important to realize that one, they are among us, and two we need to fire our weapons at them continuously and with no lull in the battle…

Some important tactical points…

Physical warfare against these creatures is worse than ineffective. It is counterproductive and actually results in casualties on our side.

This is the advice that one of the greatest warriors of all time in both physical and spiritual warfare has left us in his last words before he died…

II Samuel 23:6-7 (NIV) The last words of King David…
But evil men are all to be cast aside like thorns, which are NOT GATHERED WITH THE HAND. Whoever touches thorns uses a TOOL OF IRON or the SHAFT OF A SPEAR; they are burned up where they lie.”

King David advised a tactic against them that did not involve actually smashing their face with the butt of your rifle (however much he likely would have enjoyed doing something just like that). How did David use a “tool of iron” and the “shaft of a spear” to touch these “thorns”???

David placed the curse of the Almighty on them. Throughout the psalms he gave us examples of imprecatory prayers, which is invoking the curse, the judgment, and the rage of God Almighty against them. It is the only way to destroy them, and it is the only tactic that they have no countermeasure for; they have no answer for the power of the Holy Spirit.

There are those that are under a curse, and the only way to deal with them is the way the Word says to deal with them. There is even a promised punishment for the saints if we do not follow the formula…

Genesis 4:13-15 (NIV)
Cain said to the Lord, “My punishment is more than I can bear. Today you are driving me from the land, and I will be hidden from your presence; I will be a restless wanderer on the earth, and whoever finds me will kill me.” But the Lord said to him, “Not so; if anyone kills Cain, HE WILL SUFFER VENGEANCE seven times over.”

The point is this. These are not garden variety enemies. If physical warfare worked against them, one would think that thousands of years of trying that tactic would have been effective. It has not been effective. God is the One Who engaged the prototype who was a murderer by nature, and He has made it clear that they are His to deal with.

One cannot reason with them, because they have no conscience.

One cannot accuse them, because they have an uncanny ability to shift the blame back on the accuser, even if he is telling the truth, and they accuse you of the very evil that they are engaged in.

One CAN put a bullet in their head, BUT, if you take that tack, you or your people will pay dearly for it. They will strike you and holler as if you struck them, and get nearly all onlookers to believe it.

How we overcome…

Revelation 12:11 (NIV)
They overcame him by the blood of the Lamb and by the word of their testimony; they did not love their lives so much as to shrink from death…

“By the blood of the Lamb”… That is how you sign up to join Christ’s army. It is why proper Christian baptism and ongoing repentance is emphasized so much here (not the prevalent lie of merely believing on Jesus and praying the sinner’s prayer). Without it you have lost the fight before you have even begun, and no matter what you do, you lose…

“The word of their testimony”… Prayer that invokes “the weapons of our warfare” that are “not of the flesh” “but have divine power to destroy strongholds.” (II Corinthians 10:4)

“They did not love their lives so much as to shrink from death”… It will take faith and courage, because the enemy will strike back and almost none of the church will support you. When you fight side by side with the Lord, don’t expect to get much help from anyone…

Psalm 94:7 (NIV) David understood first hand…
Unless the LORD had given me help, I would soon have dwelt in the silence of death…

Is it worth it???

Psalm 58:10 (NASB)
The righteous will rejoice when he sees the vengeance; he will wash his feet in the blood of the wicked…

I think so… I hope some of you do as well, but if not… that’s okay, too.

Deuteronomy 20:8 (KJV) And don’t let the door hit you in the butt on the way out…
And the officers shall speak further unto the people, and they shall say, what man is there that is fearful and fainthearted? Let him go and return unto his house, lest his brethren’s heart faint as well as his heart…

Related posts…

Made to be taken and destroyed…

The first thing to do…

The right weapons… the right strategy… the right tactics…

Church of Christ tract on Baptism…

How to become a Christian

There is a way to death…

There is a Remnant there that you know nothing about…

Isaiah 14:20-21 (Septuagint)
As a mantle stained with blood cannot be clean: for the same cause neither canst thou be clean. Because thou hast destroyed this land of Mine, and hast slain this My people; thou shalt not be of long continuance. WICKED SEED, prepare thy sons for slaughter, for the sins of their fathers; that they may not rise and possess the land, and fill the world with wars…

Read Full Post »

Very large numbers…

$86.8 trillion, or 550% of GDP

Why $16 Trillion Only Hints at the True U.S. Debt


By Chris Cox and Bill Archer    26 Nov 2012

The Wall Street Journal

A decade and a half ago, both of us served on President Clinton’s Bipartisan Commission on Entitlement and Tax Reform, the forerunner to President Obama’s recent National Commission on Fiscal Responsibility and Reform. In 1994 we predicted that, unless something was done to control runaway entitlement spending, Medicare and Social Security would eventually go bankrupt or confront severe benefit cuts.

Eighteen years later, nothing has been done. Why? The usual reason is that entitlement reform is the third rail of American politics. That explanation presupposes voter demand for entitlements at any cost, even if it means bankrupting the nation.

A better explanation is that the full extent of the problem has remained hidden from policy makers and the public because of less than transparent government financial statements. How else could responsible officials claim that Medicare and Social Security have the resources they need to fulfill their commitments for years to come?

As Washington wrestles with the roughly $600 billion “fiscal cliff” and the 2013 budget, the far greater fiscal challenge of the U.S. government’s unfunded pension and health-care liabilitBuies remains offstage. The truly important figures would appear on the federal balance sheet—if the government prepared an accurate one.

But it hasn’t. For years, the government has gotten by without having to produce the kind of financial statements that are required of most significant for-profit and nonprofit enterprises. The U.S. Treasury “balance sheet” does list liabilities such as Treasury debt issued to the public, federal employee pensions, and post-retirement health benefits. But it does not include the unfunded liabilities of Medicare, Social Security and other outsized and very real obligations.

As a result, fiscal policy discussions generally focus on current-year budget deficits, the accumulated national debt, and the relationships between these two items and gross domestic product. We most often hear about the alarming $15.96 trillion national debt (more than 100% of GDP), and the 2012 budget deficit of $1.1 trillion (6.97% of GDP). As dangerous as those numbers are, they do not begin to tell the story of the federal government’s true liabilities.

The actual liabilities of the federal government—including Social Security, Medicare, and federal employees’ future retirement benefits—already exceed $86.8 trillion, or 550% of GDP. For the year ending Dec. 31, 2011, the annual accrued expense of Medicare and Social Security was $7 trillion. Nothing like that figure is used in calculating the deficit. In reality, the reported budget deficit is less than one-fifth of the more accurate figure.

Why haven’t Americans heard about the titanic $86.8 trillion liability from these programs? One reason: The actual figures do not appear in black and white on any balance sheet. But it is possible to discover them. Included in the annual Medicare Trustees’ report are separate actuarial estimates of the unfunded liability for Medicare Part A (the hospital portion), Part B (medical insurance) and Part D (prescription drug coverage).

As of the most recent Trustees’ report in April, the net present value of the unfunded liability of Medicare was $42.8 trillion. The comparable balance sheet liability for Social Security is $20.5 trillion.

Were American policy makers to have the benefit of transparent financial statements prepared the way public companies must report their pension liabilities, they would see clearly the magnitude of the future borrowing that these liabilities imply. Borrowing on this scale could eclipse the capacity of global capital markets—and bankrupt not only the programs themselves but the entire federal government.

These real-world impacts will be felt when currently unfunded liabilities need to be paid. In theory, the Medicare and Social Security trust funds have at least some money to pay a portion of the bills that are coming due. In actuality, the cupboard is bare: 100% of the payroll taxes for these programs were spent in the same year they were collected.

In exchange for the payroll taxes that aren’t paid out in benefits to current retirees in any given year, the trust funds got nonmarketable Treasury debt. Now, as the baby boomers’ promised benefits swamp the payroll-tax collections from today’s workers, the government has to swap the trust funds’ nonmarketable securities for marketable Treasury debt. The Treasury will then have to sell not only this debt, but far more, in order to pay the benefits as they come due.

When combined with funding the general cash deficits, these multitrillion-dollar Treasury operations will dominate the capital markets in the years ahead, particularly given China’s de-emphasis of new investment in U.S. Treasurys in favor of increasing foreign direct investment, and Japan’s and Europe’s own sovereign-debt challenges.

When the accrued expenses of the government’s entitlement programs are counted, it becomes clear that to collect enough tax revenue just to avoid going deeper into debt would require over $8 trillion in tax collections annually. That is the total of the average annual accrued liabilities of just the two largest entitlement programs, plus the annual cash deficit.

Nothing like that $8 trillion amount is available for the IRS to target. According to the most recent tax data, all individuals filing tax returns in America and earning more than $66,193 per year have a total adjusted gross income of $5.1 trillion. In 2006, when corporate taxable income peaked before the recession, all corporations in the U.S. had total income for tax purposes of $1.6 trillion. That comes to $6.7 trillion available to tax from these individuals and corporations under existing tax laws.

In short, if the government confiscated the entire adjusted gross income of these American taxpayers, plus all of the corporate taxable income in the year before the recession, it wouldn’t be nearly enough to fund the over $8 trillion per year in the growth of U.S. liabilities. Some public officials and pundits claim we can dig our way out through tax increases on upper-income earners, or even all taxpayers. In reality, that would amount to bailing out the Pacific Ocean with a teaspoon. Only by addressing these unsustainable spending commitments can the nation’s debt and deficit problems be solved.

Neither the public nor policy makers will be able to fully understand and deal with these issues unless the government publishes financial statements that present the government’s largest financial liabilities in accordance with well-established norms in the private sector. When the new Congress convenes in January, making the numbers clear—and establishing policies that finally address them before it is too late—should be a top order of business.

Mr. Cox, a former chairman of the House Republican Policy Committee and the Securities and Exchange Commission, is president of Bingham Consulting LLC. Mr. Archer, a former chairman of the House Ways & Means Committee, is a senior policy adviser at PricewaterhouseCoopers LLP.

Related posts…

Those the Bible refers to as “The Wicked”…

The problem is the debt… not the ceiling

All under one hat, no doubt…

Obadiah 1:6 (NLT)
Every nook and cranny of Edom will be searched and looted. Every treasure will be found and taken…

Read Full Post »

Asleep for now, but what if???

The $$$TRILLIONS$$$ in wasted and stolen resources cannot be noticed too closely… after all, it is foretold that one day the goyim will wake up, and distractions will no longer be effective…
Isaiah 52:1-3 (NIV)
Awake, awake, O Zion, clothe yourself with strength. Put on your garments of splendor, O Jerusalem, the holy city. The uncircumcised and defiled will not enter you again. Shake off your dust; rise up, sit enthroned, O Jerusalem. Free yourself from the chains on your neck, O captive Daughter of Zion. For this is what the Lord says: “You were sold for nothing, and without money you will be redeemed.”

Do boomers threaten young workers’ jobs?


By Alicia Munnell    November 13, 2012, 5:38 PM

As life expectancy increases and the retirement income system contracts, households face an enormous challenge in ensuring a secure retirement.  Working longer is the best way to increase retirement incomes.  But some suggest that more work by older persons reduces the job opportunities for younger persons.

This contention, known as the “lump of labor” theory, is widely accepted in many European countries and has provided an economic rationale for early retirement programs.  However, economists in the United States generally reject this theory, arguing that the labor market is dynamic and the economy can adapt to labor force changes.  Nevertheless, “crowding out” has received increased media attention in the wake of the Great Recession and, if generally accepted, could impede the trend towards working longer.

My colleague April Wu and I just completed an investigation of whether any empirical support exists for the lump-of-labor theory.  The existing literature on the relationship between the labor force participation of younger and older individuals is relatively small.  A series of studies published in 2010 examined whether employment of older individuals crowds out employment of younger individuals in 12 countries, including the United States.  Based on individual country and cross-country analyses, none of these international studies finds evidence that increasing the labor force participation of older persons reduces the job opportunities of younger persons.

Skeptics could argue that the international studies did not fully investigate the issue.  The authors were constrained to methods and data that could be applied to all 12 countries for ease of comparison.  Further, they measured the impact of older workers’ labor force participation only on employment of younger workers, ignoring any potential impact on hours worked or wages.  Moreover, the period they examined was before the Great Recession and, whatever the likelihood of crowding out in a growing economy, the dynamics might be very different in a stagnant one.

Our study uses data from the nation’s largest annual labor market survey, the Current Population Survey, and exploits the variation across states in labor force activity of both the old and young for the period 1977-2011.  The sample, which consists of state averages for individuals aged 20 to 64 in the survey year, is divided into three age groups: 20-24 (the “young”), 25-54 (the “prime-aged”), and 55-64 (the “old”).  The variables of interest include labor force participation, employment and unemployment, hours worked, and wage rates.

The basic equation is estimated separately with three different dependent variables to capture various measures of youth labor force activity: the unemployment rate, the employment rate, and the number of hours worked per week.  If crowding out were occurring, an increase in the employment of older persons would increase youth unemployment, decrease employment, and reduce hours worked.  However, the coefficients all show the opposite effects.

The question is: How robust are these results?  Would slicing and dicing the data in different ways produce different answers?  We found that the patterns are consistent for both men and women and for groups with different levels of education.  We found that the results held when we controlled for differences among states.  And we found that the effects of older worker employment on other segments of the labor market during the Great Recession do not differ from those during typical business cycles.  In short, we beat the horse to death.

Convincing employers and policymakers that the lump-of-labor theory does not hold is extremely important, given the state of the U.S. retirement system and the need for people to work longer in order to have a secure retirement.  Employers already have reservations about older workers, so adding the false argument that retaining older workers hurts younger ones could impede the ability of older workers to remain in the labor force.  Therefore, we need to put the lump-of-labor theory to rest.  The theory may sound plausible, but the data do not support it.

Related posts…

Figures don’t lie but liars do figure…

The diaectic method of forcing change…

Why it is bad to have white trash in business suits running your country…

Prophecy in Obadiah…

The “worst of the heathen” (Ezekiel 7:24)

All under one hat, no doubt…

Wake up and pay attention!!!

The Rudyard Kipling poem that the version “When the Saxon Begins to Hate” is based upon…


Rudyard Kipling
The Beginnings
“Mary Postgate”– A Diversity of Creatures

It was not part of their blood,
It came to them very late
With long arrears to make  good,
When the English began to hate.

They were not easily moved,
They were  icy-willing  to  wait
Till  every  count  should  be  proved,
Ere  the  English  began  to  hate.

Their voices  were  even  and  low,
Their  eyes  were  level  and  straight.
There was neither sign nor show,
When  the  English  began  to  hate.

It was not preached to  the  crowd,
It was not taught by the State.
No man spoke it aloud,
When  the English began to hate.

It  was  not  suddenly  bred,
It  will  not  swiftly abate,
Through  the  chill  years  ahead,
When Time  shall  count from  the date
That the English  began  to  hate.

Read Full Post »

Comic relief for The Almighty…

God laughs as He watches their crude attempts to be omniscient…

Psalm 2:1-4 (NIV)
Why do the nations conspire and the peoples plot in vain? The kings of the earth take their stand and the rulers gather together against the Lord and against his Anointed One. “Let us break their chains,” they say, “and throw off their fetters.” The One enthroned in heaven laughs; the Lord scoffs at them…

Now Big Brother is REALLY watching you
Frightening system to predict what people will do


By Steve Elwart    20 Nov 2012

In a government-sponsored research project eerily reminiscent of the 2002 film “Minority Report,” the Army’s Defense Advanced Research Projects Agency (DARPA) has partnered with Carnegie-Mellon University to create “an artificial intelligence (AI) system that can watch and predict what a person will likely do in the future.”

In “Minority Report,” a specialized “PreCrime” unit, part of the Washington, D.C. police department, arrests criminals based on the precognition of three psychics. In the near future, DARPA hopes that rather than using psychics, computers will be able to identify and order individuals detained based on their “anomalous behavior.”

Tapping into live surveillance video feeds and using specially programmed software, a new computer system dubbed “Mind’s Eye” will filter surveillance footage to support human operators, and automatically alert them whenever suspicious behavior is recognized.

According to the research coming from Carnegie-Mellon, the security camera system can monitor a scene in real time and sound an alarm if the program determines that illicit activity is indicated. The program would be sophisticated enough to determine if, for example, a person was setting down a bag in an airport because he is sitting next to it or that person has left the bag all together.

The researchers noted that humans are extremely skilled at choosing important pieces of information out of a mass of visual data and making decisions based on both the recorded information and acquired background knowledge. The DARPA project strives to mimic human behavior in picking out important pieces of information from a sea of visual data and make predictions on how people will behave based on their actions under uncertain conditions.

Darpa wants to deploy this software initially in airports and bus stations, and if the pilot program is successful, the software could be installed at every red light, street corner, and public place in America. It could also capture feeds from video conferencing systems, video emails, and other forms of streaming media.

According to Forbes, Carnegie Mellon is just one of 15 research teams that are participating in the program to develop smart video software. The final version of the program is scheduled to be deployed in 2015.

Mark Geertsen, a spokesman for DARPA, said in a statement that the goal of the project is “to invent new approaches to the identification of people, places, things and activities from still or moving defense and open-source imagery.”

The first part of the project involves a program called PetaVision. This initiative is a cooperative effort between Los Alamos National Laboratory (LANL) and Portland State University with the support of the National Science Foundation. The goal of this initiative is to “Achieve human-level performance in a ‘synthetic visual cognition’ system,” in other words, create a computer program that will duplicate a human’s ability to see and recognize objects, specifically faces. It would incorporate advanced artificial intelligence to identify people and objects in a video feed by looking at their shape, color, texture as well as how they move.

To do this type of advanced computing, the program is being developed on an IBM “roadrunner” supercomputer running one quadrillion (a million billion) mathematical operations every second.

While the initial software is being programmed by humans, the program has the ability to learn as it is being programmed.

According to the Los Alamos National Laboratory, the goal of the project is to recreate the visual functions of the human brain. They already have plans of implementing the second phase of the project which would be to develop a program that would mimic the function of the entire brain.

The second part of the project is another program called Videovor. While little is known about this program, what little information that is available seems to indicate that the program will be used to “summarize” data taken from video cameras.

The most time consuming part of surveillance analysis is looking at the accumulated video intelligence and determining its value. Videovor captures the video feed, analyzes it, and presents a summary of the useful information and events found in the feed.

All this would be done in real time, eliminating the need to wait for results.

The third part of the project is the development of a “geospatial oriented structure extraction” program, designed to automatically render a crude “wireframe” representation of the important events in the video from several angles, eventually eliminating the need for a human to condense hours of video into a few minutes of pertinent information.

This automated approach to video surveillance could one day replace using humans to monitor cameras. With Mind’s Eye installed, the computer system would be cheaper to maintain than human operators and would never need a lunch break or a day off. The computer could monitor every camera in a city around the clock, 365 days per year.

Also, current surveillance systems can only report what has happened in the past, it cannot forecast future behavior. Today, investigators can only see how a car was stolen or person mugged after the fact. This new software is being designed to prevent crimes before they happen.

Buried in the footnotes of the Carnegie-Mellon paper was a reference to P. W. Singer’s book, “Wired for War: The Robotics Revolution and Conflict in the 21st Century.” It is an interesting glimpse into the direction the research team may be taking. The book examines the revolution that is taking place on the battlefield and how it is changing not only how wars are fought, but also the politics, economics, laws, and ethics that surround war itself.

The book talks about the explosion of unmanned systems on the battlefield. It notes that the number of unmanned systems on the ground in Iraq during the Second Gulf War had gone from zero to 12,000 in just five years. The book also notes that these new computer systems will soon make human fighter pilots obsolete. Robotic scouts the size of house flies do reconnaissance work now conducted by Special Forces units and military pilots fly combat missions from their cubicles outside Las Vegas.

However, critics suggest just as there are inherent dangers associated with turning over wars to machines, so too are there dangers associated with turning over national security and the criminal justice system to mechanical watchdogs.

The Mind’s Eye AI system holds a very real danger to individual civil liberties. Critics say relinquishing surveillance and law enforcement to a machine leaves a society open to a future where all activities will be monitored and recorded, in the name of public safety. That surveillance would not be limited to just public venues. As the courts have increasingly limited an individual’s “expectation of privacy,” automated monitoring of human behavior can take on increasingly invasive proportions.

As with so many other government programs, the scope of the Mind’s Eye project can be vastly expanded into areas far outside of its original intent.

Deployment of this project could be a major threat to an individual’s privacy rights and turn a Hollywood script into reality.

Steve Elwart, P.E., Ph.D., is the executive research analyst with the Koinonia Institute and a subject matter expert for the Department of Homeland Security. He can be contacted at steve.elwart@studycenter.com.

Related posts…

The best contingency plan…

Fear mongering is a satanic tool…

There is another law enforcement agency that is surveilling…

The watchers are paranoid… and dangerous

The skill and the will to pull the trigger…

Read Full Post »

I Peter 4:12 (NIV) They destroy truth… that is what they do…
Dear friends, do not be surprised at the painful trial you are suffering, as though something strange were happening to you…

Israel’s War on Truth | Brainwash Update
Published on Nov 21, 2012 by breakingtheset (youtube)

Abby Martin highlights the Israeli Military’s bombing of media buildings and targeting of journalists, including the RT office in Gaza, and calls out the Israeli government to for making veiled threats to RT’s headquarters in Moscow…

Related posts…

The first thing to do…

They know they are at war with us… why don’t you???

How do deceivers engage in damage control???

The weapons of our warfare…

The right weapons… the right strategy… the right tactics…

Isaiah 59:15 (NLT) The Almighty will be glad to back you up… if you get off your derriere and fight…
Yes, truth is gone, and anyone who renounces evil is attacked. The LORD looked and was displeased to find there was no justice…

Read Full Post »

Spooky mercs…

A lot of profit to be made by moving product… and competition is unwelcome…

Pentagon Wants to Keep Running Its Afghan Drug War From Blackwater’s HQ


By Spencer Ackerman    November 21, 2012 6:30 AM

The U.S. war in Afghanistan is supposed to be winding down. Its contractor-led drug war? Not so much.

Inside a compound in Kabul called Camp Integrity, the Pentagon stations a small group of officers to oversee the U.S. military’s various operations to curb the spread of Afghanistan’s cash crops of heroin and marijuana, which help line the Taliban’s pockets. Only Camp Integrity isn’t a U.S. military base at all. It’s the 10-acre Afghanistan headquarters of the private security company formerly known as Blackwater.

Those officers work for an obscure Pentagon agency called the Counter Narco-Terrorism Program Office, or CNTPO. Quietly, it’s grown into one of the biggest dispensers of cash for private security contractors in the entire U.S. government: One pile of contracts last year from CNTPO was worth more than $3 billion. And it sees a future for itself in Afghanistan over the long haul.

Earlier this month, a U.S. government solicitation sought to hire a security firm to help CNTPO “maintain a basic, operational support cell” in Kabul. Army Lt. Col. James Gregory, a Pentagon spokesman, explains that “cell” doesn’t kick in the doors of any Afghan narco-kingpins. It handles the more mundane tasks of overseeing the contracts of the Pentagon’s counter-narcotics programs, from “training and linguists, and [providing] supplies, such as vehicles and equipment.” The solicitation, however, indicates those services aren’t going anywhere: When all the options are exercised, the contract extends through September 29, 2015, over a year past the date when Afghan soldiers and cops are supposed to take over the war. And the “government preferred location” to base CNTPO? Camp Integrity.

The envisioned Pentagon counter-narco-terrorism staff is pretty small: only two to four personnel. But protecting them at Camp Integrity is serious business. The November 6 solicitation calls for a security firm that can “provide a secure armory and weapons maintenance service, including the ability to check-in and check-out weapons and ammunition,” particularly 9 mm pistols and M4 rifles; and to provide “secure armored” transportation to the CNTPO team — primarily “in and around Kabul, but could include some remote locations.”

CNTPO has a longstanding relationship with Blackwater, the infamous security firm that is now known as Academi. In 2009, it gave Blackwater a contract to train Afghan police, and company employees used that contract to requisition guns from the U.S. military for their private use. Although that contract was ultimately taken out of CNTPO’s hands, the office’s relationship with Academi/Blackwater endures. Last year, Academi told Danger Room it has a contract with CNTPO, worth an undisclosed amount, to provide “all-source intelligence analyst support and material procurement” for Afghanistan. An Academi spokeswoman, Kelley Gannon, declined to comment on Academi’s relationship with CNTPO, or whether it’ll bid on the new contract.

But its deal with Academi is just a small slice of CNTPO’s efforts. It’s got a sprawling mandate to fight drugs and terrorism. Last year, CNTPO offered security firms at least $3 billion, excluding the re-up options, for tasks as diverse as training Azerbaijani commandos and “airlift services in the trans-Sahara region of Africa.” Some of its tasks appear to have little connections to either counterterrorism or counternarcotics, like “media analysis and web-site development consultation to officials of the Government of Pakistan.”

All that points to an enduring role for the military going after drugs and drug money in Afghanistan. It’s certainly an enduring problem: On Tuesday, the United Nations found that Afghan poppy cultivation rose nearly 20 percent over the past two years, especially in the southwestern Helmand province. Just last week, the U.S. military took the unusual step of classifying Mullah Naim Barich, the top Taliban operative in Helmand, as a “significant foreign narcotics trafficker or kingpin,’” allowing the U.S. to target companies that do business with him.

But the U.S. mission in Afghanistan isn’t supposed to be about going after drugs anymore. It wasn’t one of the residual missions that Gen. Joseph Dunford, President Obama’s nominee to run the Afghanistan war, described to the Senate last week. But since the Pentagon gives its counter-drug/counter-terrorism operations such a broad mission, a residual force in Afghanistan might find itself going after Barich and his illicit colleagues for years to come, all supported from Academi’s Kabul compound.

Related posts…

What is done in the dark…

War without rules… hired guns…

Medical mercs…

Psalm 92:6-9 (ESV)
The stupid man cannot know; the fool cannot understand this: that though the wicked sprout like grass and all evildoers flourish, they are doomed to destruction forever; but you, O Lord, are on high forever. For behold, your enemies, O Lord, for behold, your enemies shall perish; all evildoers shall be scattered…
Psalm 37:12-13 (NIV)
The wicked plot against the righteous and gnash their teeth at them; but the Lord laughs at the wicked, for he knows their day is coming…

Read Full Post »

Privacy parasites…

Intel’s new processor… The Intel Core vPro
A privacy parasite’s dream come true…

New Intel based PC’s PERMANENTLY hackable

Reposted from…

So you think no one can access your data because your computer is turned off. Heck it’s more than turned off, you even took the main hard drive out, and only the backup disk is inside. There is no operating system installed at all. So you KNOW you are safe.

Frank from across the street is an alternative operating systems hobbyist, and he has tons of computers. He has Free BSD on a couple, his own compilation of Linux on another, a Mac for the wife, and even has Solaris on yet another. Frank knows systems security, so he cannot be hacked . . . . . . . or so he thinks.

The government does not like Frank much, because they LOVE to look at everything. Privacy is a crime don’t you know, and it looks like Frank’s luck with privacy is about to run out.

The new Intel Core vPro processors contain a new remote access feature which allows 100 percent remote acess to a PC 100 percent of the time, even if the computer is TURNED OFF. Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself. As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.

This is being touted as something that makes IT administration easy. It is being advertised as something that will allow IT professionals the ability to remotely troubleshoot a PC no matter what is wrong with it. It allows IT professionals to view the contents of hard drives, check the memory, or hunt for problems on a machine without actually being in front of it. And to that, I call B.S, outside of snooping it’s only real world applications would involve accessing a recovery partiton and restoring the computer to out of box state, installing software outside the knowledge of the main operating system, and secretly placing or deleting files.

But the intelligence agencies LOVE THIS. Because Frank is going on vacation soon and they know it. They have listened to all of his calls. They KNOW frank is a terrorist, because they have never been able to access anything Frank has done with a PC, and who would hide their use, other than a criminal? Frank keeps his computers up to date, and THREE of them now have Core vPro processors in them, and when Frank is gone, they are going to get their chance to access ALL of his files because the main backup hard disk went into the newest machine.

Real world use for Core vPro processors will involve the following:
Accessing any PC ANYWHERE, no matter what operating system is installed, even if it is physically disconnected from the internet. You see, Core vPro processors work in conjunction with Intel’s new Anti Theft 3.0, which put 3g connectivity into every Intel CPU after the Sandy Bridge version of the I3/5/7 processors. Users do not get to know about that 3g connection, but it IS there. Frank was not stupid so he unplugged his router. Unfortunately for Frank, that won’t work, because anti theft 3.0 always has that 3g connection on also, even if the computer is turned off. Sorry frank, you were good with operating systems, but did not know EVERYTHING about hardware. And now the real reason for your finicky security habits will be known to the NSA – you found a way to route photons to any place in the world without any sort of cable. You revolutionized communications. You were going public when you returned from your vacation, but thanks to your new Core vPro processors, a major communications firm is going to go public with your invention BEFORE you get home, and your research will be deleted and replaced with “criminal activity” so you will be arrested when you get back and unable to speak about the theft of your invention. Fascism is GREAT.

If a system has the ram chips pulled, a Core vPro processor will read the hard disk anyway because it has all the ram it needs embedded in the vPro core.

If you encrypted your hard drive, a Core vPro processor will read it anyway, because it snagged your encryption key

If your system has been taken apart, and has no video card, ram, floppy, or hard drive, your Core vPro processor nailed you, because you left a flash drive plugged in. Or a CD in the CD drive. And what about that web cam?

The bottom line? The Core vPro processor is the end of any pretend privacy. If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web AT ALL, think again. There is now more than just a ghost in the machine.

The Zionist, Globalist, Banker scamming war mongering cabal has a history of using the marketing of security as a means to remove ALL security and nail you. If you believe Intel’s cheerful hype about these processors making things more secure than ever, think again, because any processor which allows a machine to be accessed even when it’s turned off equates to an information tyrant’s dream come true Please engage your brain while watching this, the security pitch is unadulterated B.S. These processors in fact represent an ABSOLUTE BREACH of security no matter HOW they are marketed. From the techinical viewpoint of someone who worked for an intelligence agency, I call B.S. on Intel, avoid these processors like the plague!

Page from Intel that tends to corroborate the information above…



Remote troubleshooting and recovery
Diagnose. Providing out-of-band management capabilities, including Keyboard-Video-Mouse (KVM) Remote Control,3 Intel AMT allows IT to remotely remediate and recover systems after OS failures. Out-of-band alerting and event logging also help to reduce downtime.

Out-of-band system access
Discover. With built-in manageability, Intel® AMT allows IT to discover assets EVEN WHILE PLATFORMS ARE POWERED OFF.¹ Plus, remote consoles don’t rely on local software agents, helping to avoid accidental data loss.

Related posts…

The best contingency plan…

The first thing to do…

In case anyone is in doubt… we are at war

The weapons of our warfare…

Psalm 37:32 (NASB)
The wicked spies upon the righteous and seeks to kill him…
John 10:10 (ESV)
The thief comes only to steal and kill and destroy. I came that they may have life and have it abundantly…

Read Full Post »

Older Posts »