Wednesday, August 28, 2013

Pentagon/China Satellite Deals, the Smell of Espionage


Pentagon Using China Satellite for U.S.-Africa Command

ScreenHunter_2069 Aug. 28 00.24

By Tony Capaccio – 2013-04-30T16:46:22Z


Editor’s note:  These were forwarded to me minutes ago.  These date back several months but, combined with new intelligence reports we simply aren’t allowed to print, create a mosaic presenting China as a serious threat to world security.
Note I said “world security.”
More than a few things are very wrong and what you read below, by Tony Capaccio, should frighten you as it does us.
A U.S. lawmaker is questioning the Pentagon’s decision to use a Chinese commercial satellite to provide communications for its Africa Command.
Use of China’s Apstar-7 satellite was leased because it provided “unique bandwidth and geographic requirements” for “wider geographic coverage” requested in May 2012 by the U.S. Africa Command, according to Lieutenant Colonel Monica Matoush, a Pentagon spokeswoman.
Apstar-7 is operated by APT Satellite Holdings Ltd. (1045) The state-owned China Aerospace Science & Technology Corp. holds 61 percent of Hong Kong-based APT, according to data compiled by Bloomberg. The Pentagon contract was disclosed without details at an April 25 House Armed Services Committee hearing during questioning from Representative Mike Rogers of Alabama, chairman of the panel that oversees space programs.
The contract “exposes our military to the risk that China may seek to turn off our ’eyes and ears’ at the time of their choosing,” Rogers, a Republican, said yesterday in an e-mailed statement. “It sends a terrible message to our industrial base at a time when it is under extreme stress” from the automatic budget cuts known as sequestration.
The Defense Information Systems Agency and the Africa Command “made an informed risk assessment of operational security considerations and implemented appropriate transmission and communications security and information assurance measures,” Matoush, of the Pentagon, said in an e-mailed statement. She said the security of “all signals to and through the Apstar-7 satellite are fully protected with additional transmission security.”

U.S. Company


The satellite’s services were leased under a one-year, $10.6 million contract through the government solutions unit of a U.S. company, Harris CapRock Communications. The Fairfax, Virginia-based unit is one of 18 companies under an established contract the Defense Information Systems Agency uses for specialized commercial satellite services.
While the Apstar-7 lease expires May 14, the agency has the option to extend it for as long as three more years.
Rogers said he was “deeply concerned a low-level DoD agency was able to enter into a contract with a Chinese company to use a Chinese satellite launched by a Chinese missile, seemingly with no input from the political appointees in DoD.”
Representative John Garamendi, a California Democrat, said the Chinese satellite lease confirms his suspicion that there’s a lack of coordination among the Pentagon offices that oversee intelligence, surveillance and reconnaissance
systems, his spokesman, Matthew Kravitz, said yesterday in an e-mailed statement.

Urgent Need


Douglas Loverro, the Pentagon’s top space policy official, told the House panel last week that the Apstar-7 lease was the only one available to support an urgent “operational need, but we also recognize that we need to have a good process in place to assure this” type of decision “is vetted across the department.”
“We recognize that there is concern across the community on the usage of Chinese satellites to support our warfighter, and yet” officials recognize commanders “need support and sometimes we must go” to “the only place that we can get” the service, he said.
Steve Hildreth, a military space policy expert with the nonpartisan Congressional Research Service, said in an e-mail that U.S. officials have told him “a very high percentage of U.S. military communications use commercial satellites on a regular and sustained basis.”
“The U.S. military does not have major concerns with this arrangement,” he said.

Commercial Market


Frank Slazer, vice president for space of the Aerospace Industries Association, said the Pentagon uses commercial satellite providers for the bulk of its non-classified telecommunications requirements, “especially in areas where we do not have a big military presence like Africa.”
The lease “underscores the limitations” of not investing enough U.S. money in non-classified military satellite programs and “depending only on the commercial market for national security telecom requirements,” said Slazer, whose Arlington, Virginia-based trade group lobbies for the defense industry.
The U.S.-China Economic and Security Review Commission said in its 2012 annual report said China is “the most threatening actor in cyberspace” as its intelligence agencies and hackers use increasingly sophisticated techniques to gain access to U.S. military computers and defense contractors.
Chinese hackers are moving into “increasingly advanced types of operations or operations against specialized targets,” such as sensors and apertures on deployed U.S. military platforms, according to the report.

Pakistan adopts Chinese GPS satellite system

Updated 2013-05-18 15:02:06
BEIJING: Pakistan is set to become the fifth Asian country to use China’s domestic satellite navigation system which was launched as a rival to the US global positioning system, a report said Saturday.
The Beidou, or Compass, system started providing services to civilians in the region in December and is expected to provide global coverage by 2020. It also has military applications.
Thailand, China, Laos and Brunei already use the Chinese system, which currently consists of 16 operational satellites, with 30 more due to join the system, according to English-language China Daily.
Huang Lei, international business director of BDStar Navigation, which promotes Beidou, told the newspaper the company would build a network of stations in Pakistan to enhance the location accuracy of Beidou.
He said building the network would cost tens of millions of dollars.
American website Defensenews.com reported early May that Pakistani military experts were in favour of using the Chinese system, even though the availability of the signal could not be guaranteed in case of conflict.
But according to one of them, Pakistan cannot place its trust in the United States.
“Pakistan’s armed forces cannot rely on US GPS because of its questionable availability during a conflict that has overtones of nuclear escalation,” former Pakistan Air Force pilot Kaiser Tufail told the site.
Chinese Premier Li Keqiang travels next week to Pakistan, a long time ally, after a visit to India.

Pentagon Trains To Combat Preppers! An Infowars Special Video Report

Tuesday, August 27, 2013 6:07

Why is our own Pentagon, whom Americans pay the bills for and are the bosses of, now training to combat ‘preppers’ as shared in this Infowars video report? I would think that these people have their hands full preparing for war in Syria, with little time to worry about what Americans are doing to prepare themselves for the economic collapse. What is this move by our government REALLY telling us? Links below video.            


Published on Aug 27, 2013

DoD Training Manual: ‘Extremist’ Founding Fathers ‘Would Not Be Welcome In Today’s Military’
http://www.infowars.com/dod-training-… Pentagon Prepping For ‘Large Scale Economic Breakdown’
http://www.prisonplanet.com/pentagon-…




MTV VMAs 2013: It Was About Miley Cyrus Taking the Fall

Aug 27th, 2013 | http://vigilantcitizen.com/musicbusiness/mtv-vmas-2013/

leadvma2013
The 2013 edition of the VMAs was not about music. It wasn’t even about the symbolism I’ve described in past years. It was basically MTV saying: “There is nothing to celebrate in pop music this year, here’s an awkward, cringe-worthy display of everything that is wrong in the entertainment industry”.
I’ve written extensive articles about past VMA awards because they were filled with occult symbolism and messages. This year, not so much. It was about promoting major artists and their newest albums. But mostly, it was about providing a “shocking” moment that would get mass media talking for days. Miley Cyrus provided it.

Miley Cyrus: The Industry Slave Chosen to Take the Fall

Miley Cyrus’ display at the VMAs was qualified by many as “trashy” and “embarrassing”. It was indeed a strange sight to see. It was as if she was doing it on purpose to embarrass herself. Well, here’s a moment of clarity: It WAS done on purpose and, moreseo, it was ALL staged. People commenting on Miley Cyrus appear to forget one, massive detail: There is an enormous marketing machine behind Miley Cyrus and there always was.
Miley's image has been heavily marketed by Disney since the days of Hannah Montana - a girl who (appropriately enough) had a stage alter persona. Hannah Montana products often had butterflies on them, maybe a slick reminder of how she was a Disney programming slave.
Miley’s image has been heavily marketed by Disney since the days she took on the role of Hannah Montana – a girl who (appropriately enough) had a stage alter persona, with a different wig. Hannah Montana products often had butterflies on them, a slick reminder of how she was a Disney programming slave.
Until 2013, Miley was signed with Hollywood Records, a record label that was founded by Michael Eisner, the CEO of Disney. Hollywood Records also owns other child stars such as Demi Lovato, Selena Gomez and the Jonas Brothers. Every artist in the record label’s stable has a carefully crafted image to be marketed to its target public. Miley is now working with Britney Spears’ ex-manager Larry Rudolph and signed with RCA records – one of the biggest music labels in the world that owns the likes of Justin Timberlake, Britney Spears and Ke$ha.
As a product of Mickey Mouse programming, Miley underwent a classic “good girl gone bad” treatment. Once a good, wholesome daddy’s girl, Miley has turned into a bratty, sex freak who keeps sticking out her tongue and twerking for no reason. While most people are probably tsking at Miley, they do not realize that this whole thing coincided with the release of her new album – and that it was all ordered by her handlers. In other words, she was selected and programmed to be this year’s main example of a “good girl gone bad”, a process the occult elite wants the public to constantly witness. They want the masses to see innocence and wholesomeness turn into sleaze and trash. They want pop culture and the youth in general follow the same process. While alchemy is about turning stone into gold, the masses are made to witness the opposite process.
Miley’s VMA performance is about a child star who was beloved by millions of young people showing what the industry has done to her. It is about shattering the innocence of her fans by having them witness her metamorphosis into one giant sex-obsessed caricature. I’m using the word caricature because it is safe to say that Miley was not 100% herself during the VMA’s. Her oversexualized demeanor was characteristic of a Beta programming slave who had the switch turned “on”.  It was, however, not only about being overtly sexual. It was also (and mostly) about being annoying and embarrassing herself – as if it was a sick, humiliating ritual. Dressed and styled to look like a bratty child, jumping around with giant teddy bears, Miley’s performance was all about getting a negative reaction from the public while continuing the ongoing agenda of sexualizing everything that is related to childhood.
Things got even stranger when Robin Thicke came out to perform Blurred Lines. As its name somewhat stipulates, that song blurs the line between being a flirty and all-out creepy. Its video has a strange handler-slave vibe, where Robin, Pharell and T.I. are all sharply dressed while the women dancing around them are completely naked … and being sung lines such as “You’re an animal”.
While Blurred Lines appears to simply be a "fun and sexy video", the fact that the singers are fully dressed while the models are completely naked denotes a strong relationship of dominance. Forcing slaves to be naked while the masters are dressed is a classic psychological ploy to make them feel powerless, vulnerable and inferior.
While “Blurred Lines” appears to be nothing more than a “fun and sexy video”, the fact that the singers are fully dressed while the models are completely naked denotes a strong relationship of dominance. Forcing slaves to be naked while the masters are dressed is a classic psychological ploy to make slaves feel powerless, vulnerable and inferior.
It is therefore not a coincidence that Miley sang this particular song during the VMAs. Her whole act goes with the spirit of the song and, like in the video, there’s a handler/slave relationship going on in during the performance.
From beginning to end, Miley did acted extra raunchy - like a Beta slave - while Robin sings wearing a dualistic black-and-white patterned suit,
During “Blurred Lines” Miley acted like a true Beta programming slave – while Robin acted like a handler. His strange suit featured a dualistic pattern that is used during the programming actual MK slaves. There was also something strange about seeing 20-year-old girl (dressed to look younger) rubbing herself on this 36-year-old (married) man.
As Miley was going crazy on stage, shots of the audience revealed how it was not amused. Facial expressions were ranging from shock, to despair to “WTF”. One could almost feel the hate emanating from the room – and the entire nation – while she was performing. And that is what “they” (Miley’s handlers) were gunning for. Miley was primed and set up to take that fall. Miley was even ridiculed during the intro of her own performance. The MTV awards needed its trademark “shock” moment and the industry needed its “sacrificial lamb” to keep its sick, occult, MK-Ultra system going.
The one-eyed pedo-bear shirt she had on told her entire story.
Bear with one eye closed letting everyone know whose behind this staged disaster.
The one-eyed, wasted pedo-bear basically told the world who was behind this staged “false flag event”.
While the “controversy” around Miley might help her sell more records for a while, the ongoing public humiliation that is forced on her by her handlers will most likely lead to some kind of meltdown in the future. In an article published in 2011, Miley’s father Billy Ray Cyrus stated that her handlers (that’s the word he used) cut him out of the loop and told him to “mind his business”. Like other industry slaves, Miley has no contact with her family. In the interview, Billy Ray added that “Satan was attacking his family” that he was afraid to see her go down the same tragic path as Anna Nicole Smith (a Beta Kitten slave) and Michael Jackson (killed by the industry).
This performance and the public backlash that followed is proof of the tight control the industry has on its slaves. I am pretty sure that, deep down inside, Miley knew that this is all ridiculous and embarrassing. But there’s nothing she can do about it.

Lady Gaga

There wasn’t much more to the VMAs this year. I can imagine MTV execs telling Justin Timberlake’s people:
- What song will Justin perform?
- His latest single.
- That’s not enough. We’ve got a lot of dead time to fill here.
- How many songs do you want him to sing?
- ALL OF THEM.
- Huh?
- Make him sing EVERY DAMN SINGLE he ever recorded. Bring back goddamn NSYNC if you have to. We’ve got a whole of free time to fill here.
- Um, OK.
But seriously, other than Miley Cyrus, Lady Gaga also got a little attention. Her new single Applause is basically a continuation of her “Fame Monster” theme where she’s a performer that desperately seeks attention and fame. Gaga is ready to do anything to get it, even if that means doing the elite’s bidding and throwing around its symbols.
Gaga began her performance with her head stuck in a white square - maybe a way of saying that she's a "blank canvas" that is ready to be painted in any way possible to get applause.
Gaga began her performance with her head inside a white square – as if saying that she’s a “blank canvas”. She is ready to be painted in any way possible to get applause.
We quickly see who “paints” Gaga.
During her first verse, Gaga wears the wig she had during her first album. She does the one-eye thing to make sure you know that her blank canvas was filled by the Illuminati Agenda.
During her first verse, Gaga wears the wig she had in the videos from her first album such as Paparazzi (read the article about it here). She does the one-eye thing to make sure you know that her blank canvas was filled by the Illuminati Agenda.
During the second verse, she wears the wig she had in the video Telephone - a song about MK programming and killing civilians...rememver?
During the second verse, she wears the wig she had in the video “Telephone” – the video was about  MK programming and killing civilians … remember? She does the one-eye thing again so you know that was also part of the Illuminati Agenda.
In the last part of the show, Gaga unveils her last "persona" - an embodiment of the goddess Venus as depicted in "The Birth of Venus" by Botticelli..
In the last part of her performance, Gaga unveils her last “persona” – an embodiment of the goddess Venus as depicted in “The Birth of Venus” by Botticelli.
Why did choose to embody Venus? The association between the planet Venus and lust goes back thousand of years - from the times of Babylonian goddess Ishtar, goddess of sex and lust.
Why did Gaga embody Venus? The association between the planet Venus and lust goes back thousands of years – since the times of Ishtar, the Babylonian goddess of sex and lust who was associated with Venus.
Gaga spent the rest of the VMAs as Venus, basically sitting there in a thong, letting people know that she is now Venus, goddess of sex. There is also a second, occult level to the importance of Venus in occult mysteries.
“As the morning star, Venus is visible before sunrise, and as the evening star it shines forth immediately after sunset. Because of these qualities, a number of names have been given to it by the ancients. Being visible in the sky at sunset, it was called vesper, and as it arose before the sun, it was called the false light, the star of the morning, or Lucifer, which means the light-bearer. Because of this relation to the sun, the planet was also referred to as Venus, Astarte, Aphrodite, Isis, and The Mother of the Gods.”
- Manly P. Hall, The Secret Teachings of All Ages
The “Mother Monster” is apparently now the “Mother Goddess”. Gaga’s performance was, in short, a tribute to her past personas, and the “birth” of a new one – one that fits with the mythology and symbolism of the occult elite.

In Conclusion

While mass media backlash against Miley Cyrus is solely directed at Miley Cyrus, the big picture is completely being missed (or ignored). If “observers” and “critics” took their faces out of her bony behind and took a step back, they would maybe see what is truly happening: Miley Cyrus is, more than ever, owned and controlled by an enormous machine. Her image, her music and her performance is fully determined by her handlers. For some sick reason, she was chosen this year to embarrass herself and to traumatize all of the young people who grew up watching her. Miley was offered as a “sacrifice” to the public while adding to the complete breakdown of popular culture. Her performance was choreographed and staged to be as annoying and distasteful as possible. From the bratty hair, to the unflattering outfit, to the constant sticking out of the tongue, to the obsession with “twerking” without having the physical attributes to pull it off … it was all planned to piss the world off.
While the masses are laughing and pointing at Miley Cyrus, those who handle her are laughing and pointing at the masses … because they’re falling right into this sick humiliation process. While I am not looking to add to the Miley Cyrus noise, someone needs to say it: She’s a puppet and we need to look at those who are pulling the strings. We also need to look at what they are doing to people such as Miley Cyrus and, more importantly, to our youth in general. This is not about a single girl who lost her way, it is about a system making the world lose its way.

TASER: THE 21ST CENTURY PHARAOH'S WHIP

Posted by George Freund on August 27, 2013

-
All through history leaders have sought means to control their people. You just can't allow people to think and act freely or they might think they have rights and rebel against the established authority. Workers need a good whippin' every now and then. It would be politically incorrect to use the old cat o' nine tails on a visible minority today.
-
But wait. There's technology. We can set our Tasers on stun and zap 'em when they get uppity. Excellent Smithers. That will learn 'em. Seniors, the handicapped, children have all been zapped by the police evil scum that they are turning out to be. Freedom means cowering in fear while the man in the black shirt flaunts his power.
-
Former OPP Commissioner Fantino was very wise to make friends with Homeland Security nominee removed Kerik. He was on the Board of Taser. He was a New York City Police Commissioner who worked for the Saudis in the 80's. But aren't the Saudis being sued by the victims of 9-11? ZAP! No questions doer of the funky chicken. Didn't Kerik take his girlfriend into a rendezvous over the WTC site for the dictation of a life time? ZAP! One more question and we are authorized to use deadly force you terrorist piece of scum. No one questions Pharoah. Not then not now ZAP! ZAP!
-

-
The above was a piece from George's Time Capsule. It is still relevant today. In following the New World Order agenda the people of the Earth are being relegated to slave status. That will become more abundately clear when it has been determined it is time to reduce the herd of useless eaters. Since the agenda involves never letting a good crisis go to waste, the Ontario government of Kathleen Wynne has decided to implement a new taser policy to allow all officers to be armed with tasers following the shooting death of a young Toronto man and the charging of the officer involved with murder.
-
The vassals of the New World Order masquerading as representative government have used this crisis to get that old pharaoh's whip back in the hands of the agents of the state. The beauty of it is, like I always allege, they prefer if you beg them for it. After the shooting was all the rage on the internet, protesters demanded action. I don't think that's what they had in mind.
-

-
This is Frank Lasser, 82 of Kamloops, B.C. He was tasered in his hospital bed while recovering from bypass surgery by THREE COUNT 'EM THREE RCMP OFFICERS
-
Now Ontario is prepared to round up the useless eaters for the train ride to paradise without getting too close to the vermin. Afterall, there is a great track record with taser deaths. Seventeen people have died in taser assaults by police in Canada since their introduction in 2001. Certainly it is the state's primary duty and function to cull the herd of the unwanted or undesirable. In the United States 544 have perished at the hands of Pharaoh's 21st century whip. You can't imagine how hard the rod gets when law enforcement carries this much power. It is a phenomenal torture weapon too. Bernhard Kerik was always having to pop a femme all the time because of it even in Saudi.
-
This is a BIG MISTAKE! Those in the know understand the rationale. Our police have been seduced to serve Satan while our leaders help themselves to the treasury. Will Kathleen Wynne return the over $500 million lost in the hydro scam by a levy assessed to the Liberal Party? I doubt it. She'll sleep well knowing those who resist the New World Order will squirm in the street if not the hospital bed.

Naked Juice class action settlement announced: Here's how to claim $45 from PepsiCo even without proof of purchase

Naked Juice class action settlement announced: Here's how to claim $45 from PepsiCo even without proof of purchase

Beware: Ex Military Soldier's Survival Plan Is "To Hit Preppers"

Beware: Ex Military Soldier's Survival Plan Is "To Hit Preppers"

America’s Battle Cry: Lines and Lies

America’s Battle Cry: Lines and Lies

Canada: On Missing Aboriginal Women

Canada: On Missing Aboriginal Women

Obama: Back to the Racist Future

Obama: Back to the Racist Future

Scientists Control One Person’s Body With Another Person’s Brain


Source: Gizmodo

Sit down for this one. Researchers at the University of Washington have figured out how to send commands from one person’s brain to control a different person’s muscle movement. In technical terms, it’s the world’s first noninvasive human-to-human brain interface. How’d they do it? Vulcan mind meld? Nope, just the regular ol’ internet. What in the hell?
Here’s how it went down: In one building, computational neuroscientist Rajesh Rao sat wearing an electroencephalography cap, which measures the brain’s electrical activity. Dr. Rao watched a simple computer game, firing a cannon at a target. At the right moment, Dr. Rao imagined moving his right hand to hit the “fire” button, being sure not to actually move his hand.
Across campus, Dr. Rao’s colleague, Professor Andrea Stocco, wore a cap holding a transcranial magnetic stimulation coil, which sits on the scalp and stimulates muscle control regions of the brain with a magnetic impulse. He wore noise-blocking earplugs and faced away from the video screen. Signals sent from Dr. Rao’s cap traveled through the internet and trigger Dr. Stocco’s cap. The result? Dr. Stocco’s finger hit the “fire” button on Dr. Rao’s command.
As sci-fi bizarro as this sounds, the whole setup basically used off-the-shelf components. The electroencephalogram cap that picked up the brain activity, and the transcranial coil that transmitted it, have been deployed in scientific experiments for years, and the internet’s not exactly a recent innovation either. But while researchers have performed brain-to-brain communication between rats and from a human to a rat, the University of Washington team claims this is the first human-to-human brain interface.
Source: Gizmodo

Sit down for this one. Researchers at the University of Washington have figured out how to send commands from one person’s brain to control a different person’s muscle movement. In technical terms, it’s the world’s first noninvasive human-to-human brain interface. How’d they do it? Vulcan mind meld? Nope, just the regular ol’ internet. What in the hell?
Here’s how it went down: In one building, computational neuroscientist Rajesh Rao sat wearing an electroencephalography cap, which measures the brain’s electrical activity. Dr. Rao watched a simple computer game, firing a cannon at a target. At the right moment, Dr. Rao imagined moving his right hand to hit the “fire” button, being sure not to actually move his hand.
Across campus, Dr. Rao’s colleague, Professor Andrea Stocco, wore a cap holding a transcranial magnetic stimulation coil, which sits on the scalp and stimulates muscle control regions of the brain with a magnetic impulse. He wore noise-blocking earplugs and faced away from the video screen. Signals sent from Dr. Rao’s cap traveled through the internet and trigger Dr. Stocco’s cap. The result? Dr. Stocco’s finger hit the “fire” button on Dr. Rao’s command.
As sci-fi bizarro as this sounds, the whole setup basically used off-the-shelf components. The electroencephalogram cap that picked up the brain activity, and the transcranial coil that transmitted it, have been deployed in scientific experiments for years, and the internet’s not exactly a recent innovation either. But while researchers have performed brain-to-brain communication between rats and from a human to a rat, the University of Washington team claims this is the first human-to-human brain interface.

It’s Amazing How One Common Denominator in the Middle East Wars is Ignored – the Only nations left there with their Own Central Banks are Syria and Iran.

Before It’s News
It is common knowledge that the entire western world is as near as dammit to total bankruptcy, with only two other political entities still operating with their own central banks (and in the black) the US State of North Dakota and South Africa.
It’s also common knowledge that “only a war” can get us out of the current global debt trap…  
An internal, publicly-owned central bank issues the nation’s currency, sets the repo and interest rates and monitors the money supply needed to drive the economy, which is the ease of access of product from manufacturers to consumers using ‘money’ as a medium of exchange.
Both the nation’s businesses and government borrow from the central bank, and any interest incurred is returned to the national fiscus and spent on service delivery and the business of government, which is the well being of its citizens.
A central bank can also issue asset-backed scrip to raise emergency funds or sell long-term investment funds as Treasury Bonds.
One of the largest financial ‘trading assets’ is the mortgage bond.
A mortgage is a long-term financial commitment and the 20 or 30 year debt incurred can be sold at a discount to investors willing to wait that time for their money to yield returns as mortgages are paid off.
Meantime, the mortgage lender has new cash in hand (although much less that the total 20 or 30 year mortgage yield) for further lending into or investing in the economy.
If on the other hand, a nation’s money supply is ‘fiat’ or paper currency borrowed at interest from a foreign bank and further, that paper is not backed by gold or other ‘hard’ assets, a part of the nation’s GDP is spent ‘servicing’ the debt incurred over the interest and not on service delivery or infrastructure maintenance.
What has happened in the world is a repetition of several other debt-based economic collapses over the centuries, all the result of many fraudulent financial practices like securitizing ‘troubled assets’ by pooling them with Triple-A Mortgage securities, but particularly by interest rates called usury.
Once anyone, including a nation, has fallen into the ‘debt trap’ a ‘modern’ false economy kicks in – borrowing more money to pay off the interest – called Keynesian economics, which only ‘works’ up to the point where the consumer base stops growing.
You can’t get more money from for the same products from the same number of people unless you raise your prices, in which case the consumer will turn to his employer for higher wages and the ‘push-pull’ inflationary cycle starts.
There are many other factors involved if an economy strays from the basic rule of income “more must come in than goes out”, but the most common is fraud that government turns a blind eye to like the sub-prime fraud that the Bush Administration actively supported to the point of ‘politically assassinating’ the governor of New York, Elliott Spitzer, for attempting to rally the nation’s other governors to legislate against the practice.
Once that ‘borrowing to pay interest’ mistake is made, the “Debt-to-GDP Ratio” must increase until all GDP revenue is being used to service debt and basic infrastructure collapses…
Or we have a war.
This is literally the deadliest economic flaw of all – to deliberately waste huge mineral and human ‘assets’ only to destroy them as quickly as possible in order to build or hire more of them, employing more people and thus generating a ‘recovery’ – because the money to fight a war has to be borrowed and a nation drops further into debt.
By the end of a major war and for a few decades after, the populations on both sides have been stripped of their savings and property and are offered credit with which to ‘rebuild’… starting the ‘Boom-Bust-cycle’ all over again along with the new debt incurred by the war – America is still paying war debts from the beginning of the last century.
The only respite in the current situation is that the world is now aware of the system’s total inadequacies and will hopefully write a true history of these events, pass it to the next generation and thus prevent another wave of robbery, depression, destruction and ‘recovery’ only to repeat it again.
Tom Dennen
http://beforeitsnews.com/war-and-conflict/2013/08/its-amazing-how-one-common-denominator-in-the-middle-east-wars-is-ignored-the-only-nations-left-there-with-their-own-central-banks-are-syria-and-iran-2447912.html

America’s private prison companies have expanded across the globe

MassPrivatel
International growth trends in prison privatization study
As the growth of the U.S. prison population has stalled, American private prison companies have expanded their reach across the globe, operating prisons and detention centers in at least 11 countries, according to a new report by The Sentencing Project, a non-profit advocacy group.   
The United States continues to house the highest total number of inmates in private prisons, but other — primarily English-speaking — nations use private prisons for a greater percentage of their inmates.
Nearly one in five Australian inmates are housed in private prisons, according to the report. In Scotland, private prisons account for 17 percent of inmates and in England and Wales, 14 percent, according to The Sentencing Project.
“As in the United States, immigrant detention has been a particular target of privatization in the United Kingdom, which has 73 percent of its immigrant detainees held privately,” the study notes.
“And Australia, which has a wholly private immigrant detention system.”
The study highlights The Geo Group, America’s second largest private prison company, for its international growth. About 14 percent of The Geo Group’s revenue in 2012 came from international services.
http://sentencingproject.org/doc/publications/inc_International%20Growth%20Trends%20in%20Prison%20Privatization.pdf
http://massprivatei.blogspot.com/2013/08/americas-private-prison-companies-have.html

Did Disney World’s biometrics program identify a suspected murderer in its park?

MassPrivatel
Florida - The man suspected of shooting and killing a Manchester man at a downtown nightclub this month was arrested while on a Disney vacation in Florida, police said. 
Mike Cruz, 23, whose last known address was in East Hartford, was seen poolside in Orlando, Fla. Friday and later taken into custody by U.S. federal marshals and members of a fugitive task force. The task force works with the Hartford police Major Crimes Division.  
He is being held in Florida with bail set at $2 million on a charge of fugitive from justice and is awaiting extradition to Connecticut, Lt. Brian Foley said in a press release. When Cruz arrives, he will be arrested on a warrant charging him with murder, first-degree reckless endangerment and criminal possession of a pistol/revolver, police said.
On Aug. 4, a disturbance began inside Up Or On The Rocks, 50 Union Place. The fight continued outside after the club closed.
Brian Simpe of Manchester was shot and killed during the altercation, police said.
http://www.orlandosentinel.com/news/crime/hc-hartford-murder-arrest-0827-20130827,0,547235.story

Admittedly this story doesn’t come out and say Disney World used its biometrics program to identify a patron and notify authorities, that would open them up to a huge lawsuit. 
The following examples show how closely Disney World works with Big Brother, I’ll let the reader decide.
Walt Disney World is using a biometric RFID gate system:
Walt Disney World is in the midst of introducing a new gate system at the park which uses cards with RFID chips and fingerprint biometrics.
According to a report in the Examiner, the theme park was previously using this RFID technology, but it was only available to those staying at the park.
In the 1990s, the park introduced fingerprint geometry scanners to verify ticket holders, though they have since been upgraded with fingerprint scanners.
In a 2006 Associated Press report from The Boston Globe, at the time the fingerprint scanners were first introduced, a spokesperson for the theme park said that scanned information is stored separately and that after 30 days, or a fully-utilized ticket, unique data is purged from the system.
A spokesperson at Walt Disney World has confirmed to BiometricUpdate.com that the new system is being put in place, and will replace the existing turnstile system and the paper passes previously used by passholders.
Under the new system, passholders can exchange their paper ticket for a new plastic card with an RFID chip inside.
The chip is intended to make entering the park or boarding rides a simpler process, and this new card will also contain passholders’ biometric data, pre-registered in the system.  When reaching a gate, passholders tap their card and then place their finger on the scanner to verify identity.
The spokesperson from Walt Disney World was also adamant to say that fingerprints are not stored in the database, rather a unique numerical sequence derived from passholders’ original fingerprint scan is stored and used for verification.
This morning, Jason Hodge, VP at Securlinx, posted his thoughts on the purpose of the system and believes it has to do with pass-sharing and the bottom line.
“It’s my impression that Disney does this mostly for the purposes of making sure that discounted longer-term passes aren’t shared among different individuals. It’s not hard, however, envisioning that this might point the way toward future security applications.”
A recent Biometric Research Note suggests that fingerprint technology is the most established and widespread form of biometrics, and will dominate the residential and commercial security product marketplace. The Biometric Research Group projects that fingerprint technology will represent US$3 billion of revenue within the residential and commercial security product marketplace by 2017.
http://www.biometricupdate.com/201303/walt-disney-world-introduces-biometric-verification-for-passholders 
Disney biometrics and the Department of Defense:
The Department of Defense (DOD) has been interested in Disney Amusement Parks for decades. Known as Operation Mickey Mouse, the DOD has been studying Disney’s use of technology and coercion techniques. The DOD has also been working in conjunction with Disney to collect information on Beta testing operations that the popular theme park uses on their customers. Best of all, who would ever suspect Disney of being a front for the US government?
Through the Freedom of Information Act, the Disney Corporation hands over to the DOD all data on their customers. The DOD has an overabundance of information on the general public going back decades thanks to their relationship with Disney. After the DOD analyses and profiles their data from Disney, it is ready to be used to the US government for whatever purposes they deem fit.
Within the Disney walls and on their cruise ships, a separate digital monetary system is used.
Customers trade their paper money for a digital card or voucher to purchases goods and services. On the cruise ship alone, the value of the digital Mickey money is determined prior to boarding. The card can be used at the ship, as well as at designated ports of call where the ship docks. As a programming technique, this digital money as replacing paper dollars conditions customers to think this idea is superior to carrying cash. This is reminiscent of the push of debit cards by banks in the 90’s.
The small cities Disney has created through their compound, although seemingly harmless, can harness quite a bit of private information on unsuspecting customers. All movements of patrons are tracked and traced through a myriad of cameras strategically placed throughout the theme parks.
Facial recognition technology is a part of Disney’s new cruise liners. Moving Art lines the walls of the ship to entertain the passengers. This pictures move in response to the passenger’s facial movements, ensuring that the same sequence will not play twice. Although this may entertain, the passenger’s facial movements are being recorded by the computers within the pictures at all times.
Disney’s private island, Castaway Cay, uses an array of photographs taken of the passengers, with or without their permission or prior knowledge. When a passenger wants to purchase one of these photographs, they use an encoded voucher (digital Mickey money). The facial recognition software works much like Facebook’s new photo tag application. Then the passenger can choose to have an album created through the use of this technology. Photos, regardless of whether or not they are sold to passengers, are entered into a data base for future use. Because the photographs are legally property of Disney, they can be used at the corporation’s discretion.
http://www.occupycorporatism.com/disney-biometrics-and-the-department-of-defense/  
Disney theme parks became the first to use biometrics at their ticket entrances.
According to Janel Pisorchik, Director of Business Operations at Accesso (a Florida based electronic ticketing and eCommerce solutions company):
Disney was the first theme park to introduce Biometrics to the entrance process. The initial type of technology used was hand geometry. This was an effective deterrent to help decrease the number of tickets from being resold. However, from an operational perspective, explaining the enrollment & verification process to the guests entering the parks was a little challenging.
Walt Disney World, bills itself as one of the happiest and most magical places anywhere, also may be one of the most closely watched and secure. The most popular tourist attraction in the United States is beginning to scan visitors’ fingerprint information.
For years, Disney has recorded onto tickets the geometry and shape of visitors’ fingers to prevent ticket fraud or resale, as an alternative to time-consuming photo identification checks.
All of the geometry readers at Disney’s four Orlando theme parks will be replaced with machines that scan fingerprint information, according to industry experts familiar with the technology. The four parks attract tens of millions of visitors each year.
“It’s essentially a technology upgrade,” said Kim Prunty, spokeswoman for Walt Disney World. The new scanner, like the old finger geometry scanner, “takes an image, identifies a series of points, measures the distance between those points, and turns it into a numerical value.”
She added, “To call it a fingerprint is a little bit of a stretch.”
“The lack of transparency has always been a problem,” said Lillie Coney, associate director of the Electronic Privacy Information Center. She said Disney’s use of the technology “fails a proportionality test” by requiring too much personal information for access to roller coasters.
“What they’re doing is taking a technology that was used to control access to high-level security venues and they’re applying it to controlling access to a theme park,” Coney said.
George Crossley, president of the Central Florida ACLU, said, “It’s impossible for them to convince me that all they are getting is the fact that that person is the ticket-holder.” 
http://www.cbc.ca/news/technology/story/2006/09/05/tech-disney.html
http://newsinitiative.org/story/2006/08/14/walt_disney_world_the_governments 
http://boingboing.net/2008/03/15/fingertip-biometrics.html 
What’s on the horizon you ask? How about Iris recogniton:

For decades, researchers seeking biometric identifiers other than fingerprints believed that irises were a strong biometric because their one-of-a-kind texture meets the stability and uniqueness requirements for biometrics. Recent research, for example, has questioned that belief, finding that the recognition of the subjects’ irises became increasingly difficult, consistent with an aging effect. Other researchers, however, found no evidence of a widespread aging effect. A computer model used to study large populations estimates that iris recognition of average people will typically be useable for decades after the initial enrollment.
A new report by biometric researchers at the National Institute of Standards and Technology(NIST) uses data from thousands of frequent travelers enrolled in an iris recognition program to determine that no consistent change occurs in the distinguishing texture of their irises for at least a decade. 
These findings inform identity program administrators on how often iris images need to be recaptured to maintain accuracy.
A NIST release reports that for decades, researchers seeking biometric identifiers other than fingerprints believed that irises were a strong biometric because their one-of-a-kind texture meets the stability and uniqueness requirements for biometrics. Recent research, however, has questioned that belief. A study by S. Fenker and K. W. Bowyer of 217 subjects over a 3-year period found that the recognition of the subjects’ irises became increasingly difficult, consistent with an aging effect.
To learn more, NIST biometric researchers used several methods to evaluate iris stability.
Researchers first examined anonymous data from millions of transactions from NEXUS, a joint Canadian and American program used by frequent travelers to move quickly across the Canadian border. As part of NEXUS, members’ irises are enrolled into the system with an iris camera and their irises are scanned and matched to system files when they travel across the border. NIST researchers also examined a larger, but less well-controlled set of anonymous statistics collected over a six-year period.
In both large-population studies, NIST researchers found no evidence of a widespread aging effect, said Biometric Testing Project Leader Patrick Grother. A NIST computer model estimates that iris recognition of average people will typically be useable for decades after the initial enrollment.
“In our iris aging study we used a mixed effects regression model, for its ability to capture population-wide aging and individual-specific aging, and to estimate the aging rate over decades,” said Grother. “We hope these methods will be applicable to other biometric aging studies such as face aging because of their ability to represent variation across individuals who appear in a biometric system irregularly.”
NIST researchers then reanalyzed the images from the earlier studies of 217 subjects that evaluated the population-wide aspect. Those studies reported an increase in false rejection rates over time — that is, the original, enrolled images taken in the first year of the study did not match those taken later. While the rejection numbers were high, the results did not necessarily demonstrate that the iris texture itself was changing.
study by M. Fairhurst and M. Erbilek identified pupil dilation as the primary cause behind the false rejection rates. This prompted the NIST team to consider the issue. NIST researchers showed that dilation in the original pool of subjects increased in the second year of the test and decreased the next, but was not able to determine why. When they accounted for the dilation effect, researchers did not observe a change in the texture or aging effect. Some iris cameras normalize dilation by using shielding or by varying the illumination.
The release notes that NIST established the Iris Exchange (IREX) program in 2008 to give quantitative support to iris recognition standardization, development and deployment. Sponsors for this research include the Criminal Justice Information Systems Division of the Federal Bureau of Investigation, the Office of Biometric Identity Management in the Department of Homeland Security (DHS), and theDHS Science and Technology Directorate.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913900
http://massprivatei.blogspot.com/2013/08/did-disney-worlds-biometrics-program.html

22 Reasons Why Starting World War 3 In The Middle East Is A Really Bad Idea

22 Reasons Why Starting World War 3 In The Middle East Is A Really Bad Idea

NSA Paid Tech Giants for Spying

Daniel G. J.
by
August 27th, 2013
Updated 08/27/2013
Giant and very profitable technology companies that were involved in unconstitutional surveillance operations were heavily reimbursed by the National Security Agency for doing so.
nsa-spying-paymentCompanies that might have received money from the program include Google Inc., which reported a free cash flow of $3.09 billion on June 30, 2013 (which means Google made $3.05 billion in the quarter that ended on June 30). Helping to increase that number, the law NSArequires the agency to reimburse companies like Google for expenses incurred from surveillance efforts.
Financing that gives them a strong incentive to violate the privacy of their users. When asked by The Guardian, both Microsoft and Yahoo admitted that they participated in the program. Google declined to comment, but documents uncovered by The Guardian indicate that the Wall Street darling is cooperating in spite of its management’s claims.

Corporate Cover Up

The reimbursement appears to be related to an NSA program that monitored over 56,000 internet communications over an undetermined period. The program ended because of a ruling from the Foreign Intelligence Surveillance, or FISA court, which certifies such surveillance efforts. Memos published in The Guardian indicate that Yahoo and Google were cooperating with the NSA in the program.
This could be very damaging because it could expose Yahoo and Google to lawsuits over surveillance. If these companies violated the constitutional rights of U.S. citizens, they might liable for damages in civil court. That could be the real reason why companies like Google have refused to discuss the surveillance efforts. They might be afraid that major lawsuits are coming their way if their true role is exposed.

Does Silicon Valley Believe in the Constitution?

It looks like Silicon Valley’s commitment to freedom isn’t as great as we thought. Instead, the fast buck and big profits seem to be more important than the rights of Americans. A serious investigation of this effort needs to be made, and now, particularly since it looks like some of the wealthiest companies on the planet are profiting from it.
We don’t know how much money these companies made from this effort, but if they took a single cent, it was wrong and they deserve to suffer the consequences. Nobody should be profiting from the violation of rights.
It is time for the tech companies involved in this to come clean and turn all the documents on the issue over to the press. The exposure of these shenanigans would put an end to them once and for all.

3D Printing “DRM” Aims to Stop Next-Gen Pirates

During the years to come 3D printing is expected to cause a small revolution, as people will be able to download and print pretty much everything imaginable. These opportunities also introduce new challenges and a new form of piracy will soon become mainstream. A start-up from California aims to neutralize this threat through a unique form of DRM, accompanied by 3D marks that allow manufacturers to bust the next generation of pirates.
downloadcarA decade ago people were truly amazed to find out that they could download entire movies using BitTorrent. At the time there were no official video download stores and YouTube wasn’t around either.
In the coming years another revolution is destined to unfold, that of 3D printing. While the 3D printer opens up a lot of possibilities to the public it also poses a major threat to dozens of industries.
Downloading a car is a serious possibility, and leeching the latest cover for your smartphone will soon be reality. The manufacturers, however, are not going to provide these copies for free, and that’s where the trouble starts.
To address the concerns of companies who plan to offer products as 3D designs, a new startup from California has developed a DRM-type system to make it harder to copy these files. Instead of allowing customers to download the designs, Authentise will be streamed to the 3D printer, allowing objects to be printed only once.
The technology goes live at SendShapes next month and more services are expected to appear in the future.
“We’re already talking to a number of people about using the technology to enable buying of designs online, with an iTunes-like functionality,” Authentise CEO Andre Wegner told Technology Review.
While the technology may be effective, it wont be perfect. History has taught us that there will always be cracks, circumvention tools, and people who want to share unauthorized copies.
The Pirate Bay has already prepared itself for these 3D pirates when it added a Physibles section last year. However, Pirate Bay founder Tobias Andersson told us earlier this month that he’s not certain whether the site can cope with the pressure this will bring along.
“The coming copy fights will be on a totally other level. I’m talking about the 3D printing revolution. In a few years, millions of blueprints of tools, car parts, clothing and weapons will be up for download. If there is a safe platform.”
“The Pirate Bay in its current form can withstand the pressure from quite harmless industries like the movie and music industries. But when car, oil, and weapons industries and all the countries that depend on them start to feel threatened, we can’t depend on a few people to sacrifice themselves.”
Whether it will be through The Pirate Bay or its eventual successor, one thing is for certain. 3D designs will be copied, both with and without the authorization of their makers.
Authentise is also prepared for this eventuality as the company has a marking technology that will print unique identifiers into each copy. These hallmarks can lead straight back to the person who initially bought the design, allowing sellers to pin down the leak.
“Instead of hoping to stop the creation of a digitally manufactured objects, each object printed will include one or multiple identifiers that enable investigators to trace any party along the value chain; the designer, the printer, and any intermediary,” writes the company in its forensics paper.
“Inserted hallmarks are designed to identify both the digitally manufactured object and any object produced by it. This opportunity turns traditional forensics on its head. The bullet casing might act as a fingerprint leading investigators directly to the person who printed the object.”
And so a new cat and mouse game is about to begin, and history will repeat itself once again.

3d PRINTED FOOD, AND NASA

3d PRINTED FOOD, AND NASA

Congress Asks Eric Holder To Explain Why NSA Supplies DEA Info Which It Then Launders To Go After Americans