Feeds:
Posts
Comments

Archive for November, 2012

I Peter 4:12 (NIV) They destroy truth… that is what they do…
Dear friends, do not be surprised at the painful trial you are suffering, as though something strange were happening to you…

Israel’s War on Truth | Brainwash Update
Published on Nov 21, 2012 by breakingtheset (youtube)

Abby Martin highlights the Israeli Military’s bombing of media buildings and targeting of journalists, including the RT office in Gaza, and calls out the Israeli government to for making veiled threats to RT’s headquarters in Moscow…

Related posts…

The first thing to do…

They know they are at war with us… why don’t you???

How do deceivers engage in damage control???

The weapons of our warfare…

The right weapons… the right strategy… the right tactics…

Isaiah 59:15 (NLT) The Almighty will be glad to back you up… if you get off your derriere and fight…
Yes, truth is gone, and anyone who renounces evil is attacked. The LORD looked and was displeased to find there was no justice…

Read Full Post »

Spooky mercs…

A lot of profit to be made by moving product… and competition is unwelcome…

Pentagon Wants to Keep Running Its Afghan Drug War From Blackwater’s HQ

www.wired.com

By Spencer Ackerman    November 21, 2012 6:30 AM

The U.S. war in Afghanistan is supposed to be winding down. Its contractor-led drug war? Not so much.

Inside a compound in Kabul called Camp Integrity, the Pentagon stations a small group of officers to oversee the U.S. military’s various operations to curb the spread of Afghanistan’s cash crops of heroin and marijuana, which help line the Taliban’s pockets. Only Camp Integrity isn’t a U.S. military base at all. It’s the 10-acre Afghanistan headquarters of the private security company formerly known as Blackwater.

Those officers work for an obscure Pentagon agency called the Counter Narco-Terrorism Program Office, or CNTPO. Quietly, it’s grown into one of the biggest dispensers of cash for private security contractors in the entire U.S. government: One pile of contracts last year from CNTPO was worth more than $3 billion. And it sees a future for itself in Afghanistan over the long haul.

Earlier this month, a U.S. government solicitation sought to hire a security firm to help CNTPO “maintain a basic, operational support cell” in Kabul. Army Lt. Col. James Gregory, a Pentagon spokesman, explains that “cell” doesn’t kick in the doors of any Afghan narco-kingpins. It handles the more mundane tasks of overseeing the contracts of the Pentagon’s counter-narcotics programs, from “training and linguists, and [providing] supplies, such as vehicles and equipment.” The solicitation, however, indicates those services aren’t going anywhere: When all the options are exercised, the contract extends through September 29, 2015, over a year past the date when Afghan soldiers and cops are supposed to take over the war. And the “government preferred location” to base CNTPO? Camp Integrity.

The envisioned Pentagon counter-narco-terrorism staff is pretty small: only two to four personnel. But protecting them at Camp Integrity is serious business. The November 6 solicitation calls for a security firm that can “provide a secure armory and weapons maintenance service, including the ability to check-in and check-out weapons and ammunition,” particularly 9 mm pistols and M4 rifles; and to provide “secure armored” transportation to the CNTPO team — primarily “in and around Kabul, but could include some remote locations.”

CNTPO has a longstanding relationship with Blackwater, the infamous security firm that is now known as Academi. In 2009, it gave Blackwater a contract to train Afghan police, and company employees used that contract to requisition guns from the U.S. military for their private use. Although that contract was ultimately taken out of CNTPO’s hands, the office’s relationship with Academi/Blackwater endures. Last year, Academi told Danger Room it has a contract with CNTPO, worth an undisclosed amount, to provide “all-source intelligence analyst support and material procurement” for Afghanistan. An Academi spokeswoman, Kelley Gannon, declined to comment on Academi’s relationship with CNTPO, or whether it’ll bid on the new contract.

But its deal with Academi is just a small slice of CNTPO’s efforts. It’s got a sprawling mandate to fight drugs and terrorism. Last year, CNTPO offered security firms at least $3 billion, excluding the re-up options, for tasks as diverse as training Azerbaijani commandos and “airlift services in the trans-Sahara region of Africa.” Some of its tasks appear to have little connections to either counterterrorism or counternarcotics, like “media analysis and web-site development consultation to officials of the Government of Pakistan.”

All that points to an enduring role for the military going after drugs and drug money in Afghanistan. It’s certainly an enduring problem: On Tuesday, the United Nations found that Afghan poppy cultivation rose nearly 20 percent over the past two years, especially in the southwestern Helmand province. Just last week, the U.S. military took the unusual step of classifying Mullah Naim Barich, the top Taliban operative in Helmand, as a “significant foreign narcotics trafficker or kingpin,’” allowing the U.S. to target companies that do business with him.

But the U.S. mission in Afghanistan isn’t supposed to be about going after drugs anymore. It wasn’t one of the residual missions that Gen. Joseph Dunford, President Obama’s nominee to run the Afghanistan war, described to the Senate last week. But since the Pentagon gives its counter-drug/counter-terrorism operations such a broad mission, a residual force in Afghanistan might find itself going after Barich and his illicit colleagues for years to come, all supported from Academi’s Kabul compound.

Related posts…

What is done in the dark…

War without rules… hired guns…

Medical mercs…

Psalm 92:6-9 (ESV)
The stupid man cannot know; the fool cannot understand this: that though the wicked sprout like grass and all evildoers flourish, they are doomed to destruction forever; but you, O Lord, are on high forever. For behold, your enemies, O Lord, for behold, your enemies shall perish; all evildoers shall be scattered…
+++
Psalm 37:12-13 (NIV)
The wicked plot against the righteous and gnash their teeth at them; but the Lord laughs at the wicked, for he knows their day is coming…

Read Full Post »

Privacy parasites…

Intel’s new processor… The Intel Core vPro
A privacy parasite’s dream come true…

New Intel based PC’s PERMANENTLY hackable

Reposted from…
www.jimstonefreelance.com

So you think no one can access your data because your computer is turned off. Heck it’s more than turned off, you even took the main hard drive out, and only the backup disk is inside. There is no operating system installed at all. So you KNOW you are safe.

Frank from across the street is an alternative operating systems hobbyist, and he has tons of computers. He has Free BSD on a couple, his own compilation of Linux on another, a Mac for the wife, and even has Solaris on yet another. Frank knows systems security, so he cannot be hacked . . . . . . . or so he thinks.

The government does not like Frank much, because they LOVE to look at everything. Privacy is a crime don’t you know, and it looks like Frank’s luck with privacy is about to run out.

The new Intel Core vPro processors contain a new remote access feature which allows 100 percent remote acess to a PC 100 percent of the time, even if the computer is TURNED OFF. Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself. As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.

This is being touted as something that makes IT administration easy. It is being advertised as something that will allow IT professionals the ability to remotely troubleshoot a PC no matter what is wrong with it. It allows IT professionals to view the contents of hard drives, check the memory, or hunt for problems on a machine without actually being in front of it. And to that, I call B.S, outside of snooping it’s only real world applications would involve accessing a recovery partiton and restoring the computer to out of box state, installing software outside the knowledge of the main operating system, and secretly placing or deleting files.

But the intelligence agencies LOVE THIS. Because Frank is going on vacation soon and they know it. They have listened to all of his calls. They KNOW frank is a terrorist, because they have never been able to access anything Frank has done with a PC, and who would hide their use, other than a criminal? Frank keeps his computers up to date, and THREE of them now have Core vPro processors in them, and when Frank is gone, they are going to get their chance to access ALL of his files because the main backup hard disk went into the newest machine.

Real world use for Core vPro processors will involve the following:
Accessing any PC ANYWHERE, no matter what operating system is installed, even if it is physically disconnected from the internet. You see, Core vPro processors work in conjunction with Intel’s new Anti Theft 3.0, which put 3g connectivity into every Intel CPU after the Sandy Bridge version of the I3/5/7 processors. Users do not get to know about that 3g connection, but it IS there. Frank was not stupid so he unplugged his router. Unfortunately for Frank, that won’t work, because anti theft 3.0 always has that 3g connection on also, even if the computer is turned off. Sorry frank, you were good with operating systems, but did not know EVERYTHING about hardware. And now the real reason for your finicky security habits will be known to the NSA – you found a way to route photons to any place in the world without any sort of cable. You revolutionized communications. You were going public when you returned from your vacation, but thanks to your new Core vPro processors, a major communications firm is going to go public with your invention BEFORE you get home, and your research will be deleted and replaced with “criminal activity” so you will be arrested when you get back and unable to speak about the theft of your invention. Fascism is GREAT.

If a system has the ram chips pulled, a Core vPro processor will read the hard disk anyway because it has all the ram it needs embedded in the vPro core.

If you encrypted your hard drive, a Core vPro processor will read it anyway, because it snagged your encryption key

If your system has been taken apart, and has no video card, ram, floppy, or hard drive, your Core vPro processor nailed you, because you left a flash drive plugged in. Or a CD in the CD drive. And what about that web cam?

The bottom line? The Core vPro processor is the end of any pretend privacy. If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web AT ALL, think again. There is now more than just a ghost in the machine.

The Zionist, Globalist, Banker scamming war mongering cabal has a history of using the marketing of security as a means to remove ALL security and nail you. If you believe Intel’s cheerful hype about these processors making things more secure than ever, think again, because any processor which allows a machine to be accessed even when it’s turned off equates to an information tyrant’s dream come true Please engage your brain while watching this, the security pitch is unadulterated B.S. These processors in fact represent an ABSOLUTE BREACH of security no matter HOW they are marketed. From the techinical viewpoint of someone who worked for an intelligence agency, I call B.S. on Intel, avoid these processors like the plague!

Page from Intel that tends to corroborate the information above…

www.intel.com

Excerpt…

Remote troubleshooting and recovery
Diagnose. Providing out-of-band management capabilities, including Keyboard-Video-Mouse (KVM) Remote Control,3 Intel AMT allows IT to remotely remediate and recover systems after OS failures. Out-of-band alerting and event logging also help to reduce downtime.

Out-of-band system access
Discover. With built-in manageability, Intel® AMT allows IT to discover assets EVEN WHILE PLATFORMS ARE POWERED OFF.¹ Plus, remote consoles don’t rely on local software agents, helping to avoid accidental data loss.

Related posts…

The best contingency plan…

The first thing to do…

In case anyone is in doubt… we are at war

The weapons of our warfare…

Psalm 37:32 (NASB)
The wicked spies upon the righteous and seeks to kill him…
+++
John 10:10 (ESV)
The thief comes only to steal and kill and destroy. I came that they may have life and have it abundantly…

Read Full Post »

The ridiculous religion of science…

Counterfeit science that is… “science falsely so called”

Added: Nov-21-2011 By: dado_X (liveleak)

I Timothy 6:20 (KJV)
O Timothy, keep that which is committed to thy trust, avoiding profane and vain babblings, and oppositions of science falsely so called…

Related posts…

Scientists???

Well educated fools…

Facts are stubborn things…

Lies do matter…

Books on origins and race…

“The Origin of Race and Civilization”

“ANTHOLOGY  OF  RACIAL  ISSUES”

By Charles A. Weisman

John 1:3 (NIV)
Through him all things were made; without him nothing was made that has been made…

Read Full Post »

The best names among the pseudo conservatives are heavily promoting it…

The choice is yours… but THINK before you sign…

Related posts…

Sheep are helpless without their Shepherd…

Sleight of hand…

Old news about Ron Paul…

The dialectic method of forcing change…

The rumors, the facts, the problem, and the ignored solution…

The Judas Goat… so named for the obvious reason…

Read Full Post »

But about government ordered assassination in Benghazi…


Petraeus, Allen, Gaouette, Ham: The Benghazi Story The Media Isn’t Telling You
Published on Nov 16, 2012 by Ben Swann (youtube)

Isaiah 59:15 (ESV)
Truth is lacking, and he who departs from evil makes himself a prey. The LORD saw it, and it displeased him that there was no justice…

Related posts…

AIPAC tolerates no divided loyalties…

Demolish their strongholds… in the name of Jesus Christ

How do deceivers engage in damage control???

Read Full Post »

And become like lambs lead to the slaughter… by the Judas goats…

Secession: Obama Says Bring It
Published on Nov 14, 2012 by tmotofga (youtube)

Micah 4:9-10 (NIV) Who is your King???
Why do you now cry aloud— have you no King? Has your Counselor perished, that pain seizes you like that of a woman in labor? Writhe in agony, O Daughter of Zion, like a woman in labor, for now you must leave the city to camp in the open field. You will go to Babylon; there you will be rescued. There the Lord will redeem you out of the hand of your enemies…

Related post…

Which kingdom do you belong to??? Who is your king???

Read Full Post »

« Newer Posts - Older Posts »