Wednesday, May 31, 2017

WHILE TRUMP WAS IN RIYADH DANCING AND SELLING ARMS, THIS WAS HAPPENING ...         ~ hehe "while" the "dumps~terd" was swirl~in ta the old~ees but good~ees the rest of the world's E~lites  r busy build~in shit ...mean while back at the rapid~leee fall~in 5th world country ( that's U.S.  folks)        "r" so~called E~lites   "r"    rob~in ,murder~in,steal~in,bomb~in,blast~in U.S.    them....   fuck~in  EVERY~BODY (on /off planet)             but fuck hey ole A~merry~can's      we's    still got the fuck~in best "fantasy" players/leagues    in the ....world   ummm hum yup yea !  ...Image result for kooky fantasy players pic

Normally I do not use or go to this source, but in this case I make an exception, since it highlights the fundamental problem with the US Empire's foreign policy: it is ossified, and completely backward looking. Indeed, by tying it to a regressive and backward looking country like Suadi Arabia, Mr. Trump may have committed a strategic error that will affect Americans, Saudis, and for that matter, Arabs elsewhere, for generations to come. My thoughts about the implications of his trip, and the ambiguous long term rationale behind it, were expressed, albeit somewhat clumsily, in last Thursday's News and Views from the Nefarium.
This piece, however, which was shared by Mr. H.B., highlights the problem: while Mr. Trump was dancing with a few backward Saudi tribesmen, Mr. Xi was hosting a large gathering of nations in Beijing to expand the economic cooperation of the BRICSA bloc, and to work out details of building out China's New Silk Road project:
Remembering that a) the Trilateral Commission set out in 1973 to create a “New International Economic Order” and b) its members essentially adopted and invested in China to become a Technocracy, it is not coincidental that the U.S. is finally being taken off the world stage as the primary economic power, and China is taking over. I have said for decades that this is an economic coup and not a political coup. Just about everyone has missed this 800 pound gorilla in the living room.
Note, the following:
Even countries that are cool on the Chinese initiative, including India and Japan, sent representatives to the summit that carried a bit more clout than the pathetic representation of the United States, Matt Pottinger, a little-known special assistant to Trump and the senior director for East Asia of National Security Council. In fact, the only reason Trump sent anyone to represent the United States at the Beijing gathering was because of a special request made by President Xi during his recent meeting with Trump at the president’s private Mar-a-Lago Club resort in Palm Beach, Florida.
South Korea, which saw relations with China sour over America’s placement of Terminal High Altitude Area Defense (THAAD) missile system in South Korea, sent a delegation to Beijing after a phone call between South Korea’s new liberal president, Moon Jae-in, and President Xi. Moon responded to the phone call by sending a delegation led by his Democratic Party’s veteran legislator to Beijing.
Even North Korea, which rankled South Korea, Japan, and the United States by firing a ballistic missile into waters near Russia, sent a delegation to the Beijing meeting headed by Kim Yong Jae, the North’s Minister of External Economic Relations. The Trump administration, which sent a virtual unknown to Beijing, complained loudly about North Korea’s representation at the Silk Road summit. But Washington’s complaint was conveyed by someone as unknown as Mr. Pottinger, Anna Richey-Allen, a low-level spokesperson for the U.S. State Department’s East Asia Bureau. The reason why the United States is being spoken for by middle-grade bureaucrats is that the nation that still believes it is the world’s only remaining «superpower» is now governed by an administration rife with top-level vacancies, inter-agency squabbling, and amateur league players.
Yes, that's right: Japan, India, North and South Korea, all sent high level delegations.
So did eastern Europe:
These EU member state leaders included Italian Prime Minister Paolo Gentiloni, Spanish Prime Minister Mariano Rajoy, Polish Prime Minister Beata Szydlo, Greek Prime Minister Alexis Tsipras, Czech President Milos Zeman, and Hungarian Prime Minister Viktor Orban. Moreover, had British Prime Minister Theresa May not been in the middle of a general election campaign, she would have been in Beijing. Nevertheless, she sent British Chancellor of the Exchequer Philip Hammond in her place.
As did the following institutions and other countries:
The United Nations Secretary General, Antonio Guterres, was there, along with the President of the World Bank Jim Yong Kim and International Monetary Fund Managing Director Christine Lagarde. Also present in Beijing were the presidents of Turkey, Philippines, Argentina, Chile, Indonesia, Kyrgyzstan, Belarus, Kazakhstan, Switzerland, Kenya, Uzbekistan, and Laos, as well as the prime ministers of Vietnam, Pakistan, Sri Lanka, Serbia, Malaysia, Mongolia, Fiji, Ethiopia, Cambodia, and Myanmar.
Ministerial delegations from Afghanistan, Australia, Azerbaijan, Bangladesh, Brazil, Egypt, Finland, Iran, Kuwait, Lebanon, Maldives, Romania, Nepal, New Zealand, Saudi Arabia, Singapore, South Sudan, Sudan, Syria, Tanzania, Thailand, Tunisia, Uganda, and the United Arab Emirates were at the Beijing summit. Japan was represented by the senior adviser to Prime Minister Shinzo Abe and Secretary General of the Liberal Democratic Party, Toshihiro Nikai. France, which was experiencing a change of presidents, sent former Prime Minister Jean-Pierre Raffarin.
The Silk Road initiative has projects planned in all the nations whose governments were represented in Beijing, except for the United States and Israel. In addition to the nations represented by their government heads of state and ministers, Silk Road agreements were signed between China and Palestine, Georgia, Armenia, Bosnia and Herzegovina, Montenegro, Albania, Tajikistan, Brunei, Croatia, and East Timor.
But, hey, according to former House Speaker Newt Gangrene...er... Gingrich, the USA can herald the new foreign policy triumph of Mr. Trump selling one hundred billion plus dollars to the (out)house of Saud as a major foreign policy shift and breakthrough.
Have we really lost our collective minds to this degree? Granted the regime of China leaves much much to be desired, as do the regimes of many of the countries represented in Beijing. But they are agreed, it seems - even the Japanese and North and South Koreans, heck, even the Saudis smelled the coffee and sent a delegation - on one thing, and that's getting something done that will benefit everyone, like building railroads and highways and so on.
While the USSA is selling arms, and the means to manufacture them.
I don't think for a moment that Mr. Xi is so naive to believe that all of these countries get along with each other, or don't have competing interests.Nor do I think Mr. Xi is so naive as to believe that a conference this large, with this many in attendance, will really accomplish anything, much less bring everyone together in a group hug and kumbaya moment. We've all been to those "required meetings". They do nothing but waste time, solve or settle little, and accomplish even less. But they do do one thing, and that is they simply get people talking about and thinking about certain things, and then, when enough of a critical mass of thought congeals, about doing and accomplishing them. That, it seems, is part of his - and China's - cultural and economic strategy: simply generate excitement about accomplishing something and getting it done. Already in the past few months we've seen the first freight train from China arrive in London, and return to China. Turn the clock back just ten years, and this would have been unthinkable. Now translate that into highways running from, say, Beijing to Berlin(dwarfing the Kaiser's old Berlin-to-Baghdad railway), and you get the idea.
Meanwhile, we're concerned about the peanuts of a mere one hundred billion of arms sales to the Saudis.
And that's the point: Mr. Xi is offering the world a vision. We may not like Mr. Xi. We may not even like (I certainly don't) Communism in any form, even the modern "benign" Chinese form(benign if one compares it to Mao, or Stalin). But Mr. Xi is offering a vision nonetheless. (Heck, being a [much out of practice] organist, I find it very interesting that China seems to be on a pipe-organ-building spree and the Chinese appear to be enjoying what, for them, is an [increasingly less] rare instrument. Translation: China is also trying to become a bridge or unifying culture.)
Now compare that to what the USSA is offering (which is what, exactly? Drones? Surveillance? Tanks? Bombs? bad refrigerators? shoddy computer software operating systems? pay for play bottomlessly corrupt politicians? pedophilia?) and you get the idea. We're fast becoming as irrelevant and unwanted as the Yugo, the latest in Serbo-Croatian technology.

Tuesday, May 30, 2017


The Cursed Devil’s Pool of Australia

Are there evil places in this world, ones that have an insidious yearning to pull in victims to their doom? Can there be some sort of energy that permeates a place to make it a cursed place inhospitable to outsiders? There are locations upon this planet of ours that ask these questions, imploring us to ponder such things with the web of strangeness and death they weave. One such locale is a rather famous tourist location, which under the veneer of its natural beauty and intoxicating natural splendor holds tales of ancient evil and modern horror.
Out along the Bruce Highway, 60km south of Cairns, in northern Queensland, Australia, three streams rush down from atop Mt. Bartle Frere, meander through untouched rainforest wilderness, and converge among some large boulders near a nondescript town called Babinda. What has come to be known as the Babinda Boulders are well-known for the inviting, crystal clear waters of the streams and the idyllic, picturesque natural beauty to be found all around, which have served to attract droves of tourists to the spot every year. However, what many of the photographers, campers, and hikers at this peaceful spot, as well as the swimmers wading through calmer portions of the pool might not be aware of is that the site goes by another, far more ominous nickname of “The Devil’s Pool,” and has been feared by the Aborigines of the area for centuries, perhaps with good reason, as this is a place long steeped with death, foreboding, and a dark reputation.
Babinda Boulders, Australia. Photo by Lincoln Cooper.
The native people of the area have long shunned the deceptively quiet pool, and one Aboriginal legend is particularly tragic. According to the dark tale, there was once a young, beautiful woman from the Yidinji tribe named Oolana, and this maiden married a respected tribal elder named Waroonoo. When she met a handsome younger man from another tribe she set forth into a torrid affair, running off away into the wilderness with her newfound lover. Unfortunately for her, Oolana’s husband was a powerful man within her tribe, and he sent out search parties to hunt the pair down to put an end to their adulterous tryst. When they were finally surrounded and separated at the Babinda Boulders, Oolana is then said to have thrown herself into the water and drowned rather than face a bleak life without her true love. According to the Aboriginal tales, she has never really left, and still prowls these waters, looking to lure young men to a watery grave.
This legend has become notable in light of the fact that over the years a large number of young men have mysteriously met their deaths here, and since 1959 at least 17 people, and more still in old newspaper clippings, have drowned here under decidedly strange circumstances. In many cases the victims are said to be forcefully pulled and held under as if by unseen hands. The site is said to be particularly aggressive towards men and those that disrespect the pool in any way. In one story a young man visiting the area took a kick at one of the signs there, after which he slipped, fell into a deep pool, and drowned. Other mysterious deaths here are not as clear, such as that of 24-year-old Peter McGann, who in 1979 was climbing up a boulder, jumped a small gap, and slipped to go tumbling into the water below, after which he simply vanished without a trace. It would take teams of divers over 5 weeks to finally find his body lodged down in the murk at the bottom of the pool. One rescue worker who helped in the search, police diver Peter Tibbs, explained the scene thus:
I’ve been called on four times to try and find bodies down there but one of the most interesting of the cases was a young fella called, Patrick McGann.We thought we knew he was in there, but we couldn’t get to the body because the water is so cold, it’s so deep and it flows so fast. And so eight or ten times we went down and we eventually cut the logs out of the place underwater and on the last day after we’d almost given up, we cut the last log that was in the chute and the body floated freely. And that was five weeks and five days from the time he’d gone missing, so it wasn’t a pretty sight, but it was a great relief to get the body out and satisfy the family.
The Devil’s Pool
There was also the case of a young couple that was swept away by a freak flash flood at the site as they were taking in the view, with the woman surviving but the man never heard from again. Perhaps the most recent and dramatic account of a mysterious death at the Devil’s Pool is that of 23-year-old Tasmanian naval seaman James Bennett, who had been out for a day exploring the area with some friends in 2010. The group had jumped over a safety railing to sit in a natural tub of churning water known locally as the “Washing Machine.” According to one of James’ friends, he had been swimming in a calm area nearby when he was suddenly and violently yanked backwards, as if by “an invisible hand,” which seemed to be dragging him back towards a section of churning white water at the back of the pool. James then allegedly reached up to grab a branch, which snapped, after which his head went under water and he just struggled there suspended helplessly in the water for no apparent reason, with just the tips of his fingers protruding from the surface as he struggled to come up for air.
He would remain like this while his friends tried to reach out to him and offer their extended legs, before sinking down into the depths to his fate. It would not be until 3 days later that the body of James Bennett would be found floating about in a calmer section of the stream, and a plaque would be erected in the aftermath, eerily reading “He came for a visit and stayed forever.” Most of the area is now closed off, although the inviting locale constantly draws visitors in.
Such tragic incidents are so plentiful that the area has had numerous railings and warning signs set up over the years to denote the places that are safe for swimming. Why so many have suddenly drowned in the mostly calm pools here depends largely on who you ask. Officials will tell you that it is all due to fast running water, freak flash floods, or untamed currents stirred up by the natural lay of the stream and the boulders dotting it. This could in turn pull people under and pin them against the rocks or wedge them under sunken logs, drowning them in a fashion that could quite possibly be witnesses s some sort of mysterious, unseen force. The high oxygenation of the water here also does swimmers no favors, and all of this is said to make the conditions in the off-limits areas difficult for even the most experienced swimmers to navigate. Indeed, even the divers that have entered the pool to look for bodies have been met with harrowing water conditions at times, despite typically being solidly tethered to the land by rope. One local official said of the dangers of the pool thus:
They call it the Washing Machine where he went in because it goes around and around. It’s all bubbles so there is no buoyancy. It’s dangerous water. It sucks you under. You always see people swimming in the dangerous holes. You don’t know when a flood could come down from up top.

However, others point to the fact that not all of these deaths were the result of actually swimming, with some suddenly slipping and falling into the water for no reason, and almost all of them were male, 16 out of 17 of the official count, to be exact. This is said to be telling evidence that perhaps the Aboriginal legends about the pool are perhaps true, at least to some degree, and only adding to this mystique are the varied reports of a disembodied woman’s voice calling out into the night and even pictures that claim to be of ghostly eyes, faces, and other unexplained images lurking under the water here. A picture taken of the site by the father of one of the victims was described thus:
When the father came down, the police took him out and showed him where he went down. And he took the photo of that. And he came back and they showed him where they had him tied up there. And when he went over to Innisfail the next morning to get them developed, that’s what they found. That photo, he’s even got the cigarette in his mouth.
Here we have an old myth intertwined with modern ghost stories and strange deaths, making it hard to really pick apart what could be real and what is all pure lore. Whether one believes the straight legends of a dead village woman or not, it is hard not to wonder whether this might just be one of those places that seems to be infused with some sort of negative, malicious energy. Is this all the result of natural phenomena, a ghost, or something else? It remains unknown, but something to think about if you are ever looking to take a dip at this mysterious place.

NEPHILIM ...Oops

OWNING YOUR DNA…     ~ hehe me "wonders" what Our Living Creator ..."thinks"  of "some~1 else "  "owning"  Our ...DNA ?   Um OH YEA there IS no such thing as ...God       ...till Satan starts snap~in at yer ass ...  humm ?  than "we" find ...faith  Lol  ...cImage result for pic of  mixing dna patents

Regular readers of my books and of this site know that I have maintained there is a connection between the ideas of ancient interplanetary wars, ETs, UFOs, human and animal sacrifice, missing money (in the trillions of dollars), and the idea of a tribute or tithe. The way I see it, these things are linked, and part of a very ancient "agenda" or "policy", if you will. If these memes and ideas don't seem immediately or intuitively related, then consider how some of them - UFOs and abortion, viewed as a sacrifice - for example, merge in the dubious "character" of Hillary Clinton, who like her husband, has an interest in the former and defends the latter. Then add to this mix something that I pointed out at the Secret Space Program conference in Bastrop, Texas in 2015: the proliferation of quick genome sequencing technologies, now taken to the point of allowing sequencing in the field to a certain degree, without having to send samples to labs and wait for the results.
As I pointed out then, the FBI has demonstrated a (understandable) interest in the technology. At Bastrop, I speculated that this interest might stem from a suspicion that our "extraterrestrial cousins", if they exist at all, might be here and walking among us, and that the only way to distinguish them from humans would be genetically. In that context, I also pointed out - specifically - the rise of companies that do sequencing for a fee, and then based on comparisons with known haplogroups, tell you "where you're from", like Ancestry.com.
But during that conference I also raised the issue of patenting of DNA chimeras - literal DNA ownership - that is taking place, a subject I raised in even greater detail in my book Genes, Giants, Monsters and Men. Under current US patent law, which is similar in its standards to most nations' patent law, an object or technique is patentable if it arose from the hand of man(i.e., not the hand of God or natural evolutionary processes), and if it is reproducible by the hand of man by following a precise technique. Under these standards, genetic chimeras - organisms that have been created by genetic engineering and that do not occur naturally - have already been patented.
Yes, that's right: corporations now own certain genetically engineered life forms.
The problem, as I pointed out in Bastrop, and in the book, was that if one takes certain ancient texts literally, such as Genesis 6, or various Mesopotamian texts, then mankind himself arises precisely from such a process of genetic engineering as the "sons of God" mix it up with "the daughters of men" with the result - depending on which version one reads - that one has a race of "giants" or modern homo sapiens sapiens. That, in turn, poses the question, who, under these patent law standards, owns us? (And as I pointed out in Genes, Giants, Monsters, and Men, how would they demonstrate standing, and what court would have jurisdiction to hear it? And  what about the "course of performance", since the owner(s) hasn't/haven't pressed a claim for a while... or has/have he/they?)
Now, consider all this context as you contemplate this article which was noticed by a few people this past week:
The title of the article might be somewhat misleading, as the actual main text states this:
The family history website Ancestry.com is selling a new DNA testing service called AncestryDNA. But the DNA and genetic data that Ancestry.com collects may be used against “you or a genetic relative.” According to its privacy policies, Ancestry.com takes ownership of your DNA forever. Your ownership of your DNA, on the other hand, is limited in years.
It seems obvious that customers agree to this arrangement, since all of them must “click here to agree” to these terms. But, how many people really read those contacts before clicking to agree? And how many relatives of Ancestry.com customers are also reading?
There are three significant provisions in the AncestryDNA Privacy Policy and Terms of Service to consider on behalf of yourself and your genetic relatives: (1) the perpetual, royalty-free, world-wide license to use your DNA; (2) the warning that DNA information may be used against “you or a genetic relative”; (3) your waiver of legal rights.
The point about number (1) here is that you still own your DNA, but Ancestry.com gets to use it - and sell or rent it - to anyone it pleases, without having to pay you(or your estate) any royalty for doing so. And this implies, under number (3), that it is in cahoots as the DNA database of first resort for the government. Now, before I go on, is it just me, or does anyone else get the firm whiff of Mormonism in the background? Consider the following:
The Ancestry.com DNA testing service promises to analyze approximately 700,000 genetic markers. According to Ancestry.com, the service, “combines advanced DNA science with the world’s largest online family history resource to predict your genetic ethnicity and help you find new family connections.” The results of an AncestryDNA analysis include information about “ethnicity across 26 regions/ethnicities and identifies potential relatives through DNA matching to others who have taken the AncestryDNA test.”
Oh, gee, lookee lookee what Wikipedia says (Ancestry.com):
Ancestry.com LLC is a privately held Internet company based in Lehi, Utah, United States. The largest for-profit genealogy company in the world, it operates a network of genealogical and historical record websites focused on the United States and nine foreign countries
Now consider point number  (3), which puts that ownership thing even more abruptly:
Specifically, by submitting DNA to AncestryDNA, you agree to “grant AncestryDNA and the Ancestry Group Companies a perpetual, royalty-free, world-wide, transferable license to use your DNA, and any DNA you submit for any person from whom you obtained legal authorization as described in this Agreement, and to use, host, sublicense and distribute the resulting analysis to the extent and in the form or context we deem appropriate on or through any media or medium and with any technology or devices now known or hereafter developed or discovered.”
In other words, your DNA becomes perpetual property, and so, presumably, therefore, would anyone cloned from it. In other words, viewed a certain way, the whole operation could be putting together a kind of "ark" of DNA samples, to be "resurrected" via cloning after some catastrophe, in which one's clone becomes chattel property of a corporation. And, incidentally, one could conceivable use DNA samples to "resurrect" - Russian Cosmism style - one's ancestors, who would also be property.
Consider also the insurance nightmare genetic information poses:
For example, a young woman named Theresa Morelli applied for individual disability insurance, consented to release of her medical records through the Medical Information Bureau (a credit reporting agency for medical history), and was approved for coverage. One month later, Morelli’s coverage was cancelled and premiums refunded when the insurer learned her father had Huntington’s disease, a genetic illness.
Startlingly, the Medical Information Bureau (MIB) used Morelli’s broad consent to query her father’s physician, a doctor with whom she had no prior patient relationship. More importantly, the applicant herself wasn’t diagnosed with Huntington’s carrier status, but she suffered exclusion on the basis of a genetic predisposition in her family.
Hovering behind all such abuses, and even ownership claims, is, I suspect, a much older, and far deeper agenda, and the last time I looked, our lives did not come with power of attorney to assign them to someone else. Indeed, if one takes those old texts at their word, there's only One Claimant with legal title, and He didn't sign it over under a power of attorney... all other claimants, including Ancestry.com, are false, and have no standing, and the courts to which they appeal have no jurisdiction in the matter.                                 https://gizadeathstar.com/2017/05/owning-your-dna/

Monday, May 29, 2017

Wikileaks Emails Ties The Podesta Brothers To The Doctor Who Oversaw Seth Rich Before He Died

Posted by Conspiracy Cafe on May 29, 2017 


Hidden Americans

MAY 24, 2017 BY RAY STARMANN

Seth Rich died after he was shot multiple times on the 2100 block of Flagler Place NW which is three blocks east of Howard University Hospital and six minutes away from MedStar Washington Hospital Center. The Washington D.C. police report says Seth Rich survived the initial shootings and died later at the hospital.


There have been no reports on which hospital he was taken to, but common sense indicates it would have had to been Medstar Washington Hospital Center.

Howard University Hospital is closer and has an emergency room, but not for trauma surgery so Seth Rich had to have been taken to MedStar Washington Hospital Center.

The lead director of the Gold Surgery team at MedStar Washington Hospital Center is Jack Sava, MD.

Jack Sava is in a relationship with Lisa Kountoupes. Multiple Wikileaks emails show Kountoupes and Sava connections with the Podesta brothers.

How or why exactly did Rich pass away at the hospital?

Kountoupes and Sava are on the guest list in this Podesta emailhttps://www.wikileaks.org/podesta-emails/emailid/14833#searchresult. Check out the Excel spreadsheet (download).




More connections from i-love_america:

The attachment of this email shows Lisa Koutoupes co-hosting at the fundraiser with the Podesta bros. https://wikileaks.org/podesta-emails/emailid/26634.

Lisa Kountoupes happens to be “Named to the Hill’s Top Lobbyists 2016: Hired Guns Source on Koutoupes named top lobbyist—http://kdindc.com

Guess what?? She also lobbied for the Clintons!!!

More info on Kountoupes work in DC. SHE WORKED FOR DEPT OF ENERGY http://www.zoominfo.com/p/Lisa-Kountoupes/1558739629

She has URANIUM ONE CONNECTIONS!!!! Here is their Uranium One L2-Disclosure form https://soprweb.senate.gov/index.cfm?event=getFilingDetails&filingID=E1BF4232-5036-458A-9392-E6C7CD97E388&filingTypeID=51

https://nei.org/CorporateSite/media/filefolder/Conferences/NFSF/PartsList.pdf

Here is lobbying record http://www.opensecrets.org/lobby/firmsum.php?id=D000035177&year=2012

“Kountoupes Consulting has been hired by Uranium One Inc. to lobby on “issues related to uranium mining and the uranium market.” http://thehill.com/business-a-lobbying/lobbying-contracts/197357-bottom-line-.

ALSO SHE IS A CLINTON ADMIN VET!!!!! Source here!!!!!! http://thehill.com/business-a-lobbying/top-lobbyists/302777-top-lobbyists-2016-hired-guns.

MASSIVE AMOUNT OF INFO ON THE LOBBYING FIRM http://lobbying-firms.insidegov.com/l/39300/Kountoupes-Denham-LLC.

Lisa Kountoupes visited Obama White House 29 times. last visit is May 31st, for appointment with Jaime Kreager made on May 26th at 6:53PM https://archive.is/XpHaZ.

John Podesta was there the 26th https://archive.is/FdtD7.

*Last leaked email was May 25th**

Is it just a coincidence that Seth Rich survived the shooting, but mysteriously died at the hospital where a Podesta/DNC ally is in charge of the trauma surgery unit?

http://usdefensewatch.com/2017/05/breaking-wikileaks-emails-ties-the-podesta-brothers-to-the-doctor-who-oversaw-seth-rich-before-he-died/

Seth Rich Plot Thickens: "DC Insider" Speaks Of "Complete Panic" At Highest Levels Of DNC

Posted by Conspiracy Cafe on May 29, 2017 at  http://www.conspiracy-cafe.com/apps/blog/show/44560698-seth-rich-plot-thickens-dc-insider-speaks-of-complete-panic-at-highest-levels-of-dnc-


by Tyler Durden May 22, 2017 8:21 PM

Last week, Fox News dropped a bombshell report officially confirming, via anonymous FBI sources, what many had suspected for quite some time, that murdered DNC staffer Seth Rich was the WikiLeaks source for leaks which proved that the DNC was intentionally undermining the campaign of Bernie Sanders. In addition to exposing the corruption of the DNC, the leaks cost Debbie Wasserman Shcultz her job as Chairwoman.

Of course, if it's true that WikiLeaks' emails came from a DNC insider it would end the "Russian hacking" narrative that has been perpetuated by Democrats and the mainstream media for the past several months. Moreover, it would corroborate the one confirmation that Julian Assange has offered regarding his source, namely that it was "not a state actor."

Meanwhile, the plot thickened a little more over the weekend when Kim Dotcom confirmed via Twitter that he was working with Seth Rich to get leaked emails to WikiLeaks.

Kim Dotcom ✔@KimDotcom

I knew Seth Rich. I know he was the @Wikileaks source. I was involved. https://twitter.com/seanhannity/status/865823567384072194

1:46 PM - 20 May 2017


14,84814,848 Retweets

19,22819,228 likes

Which was followed up by the following posts on 4Chan’s /pol/ subgroup that high-ranking current and former Democratic Party officials are terrified of the Seth Rich murder investigation.

“Anons, I work in D.C.

I know for certain that the Seth Rich case has scared the shit out of certain high ranking current and former Democratic Party officials.

This is the reason why they have backed away from impeachment talk. They know the smoking gun is out there, and they’re terrified you will find it, because when you do it will bring the entire DNC, along with a couple of very big name politicians.

It appears that certain DNC thugs were not thorough enough when it came time to cover their tracks. Podesta saying he wanted to “make an example of the leaker” is a huge smoking gun.”

The post went on to claim that a "smoking gun in this case is out of the hands of the conspirators" which has resulted in near "open panic" in DC circles.

“The behavior is near open panic. To even mention this name in D.C. Circles [sic] will bring you under automatic scrutiny. To even admit that you have knowledge of this story puts you in immediate danger.

If there was no smoke there would be no fire. I have never, in my 20 years of working in D.C. Seen [sic] such a panicked reaction from anyone.

I have strong reason to believe that the smoking gun in this case is out o [sic] the hands of the conspirators, and will be discovered by anon. I know for certain that Podesta is deeply concerned. He’s been receiving anonymous calls and emails from people saying they know the truth. Same with Hillary.”

And here is the original tweet:






/pol/ News Forever @polNewsForever

An Anon working in DC says that he's seeing people in a panic like never before about #SethRich.

They know their about to be exposed.

9:19 AM - 21 May 2017


3,8003,800 Retweets

4,5774,577 likes

Meanwhile, Kim Dotcom has promised more information will be released on his interaction with Seth Rich by tomorrow.

Kim Dotcom ✔@KimDotcom

I'm meeting my legal team on Monday. I will issue a statement about #SethRich on Tuesday. Please be patient. This needs to be done properly.

1:57 PM - 20 May 2017


12,16412,164 Retweets

19,76719,767 likes

This raises several questions. First, if Kim Dotcom knew that Seth Rich was, in fact, the WikiLeaks source, why is he just now coming forward with such information? Second, while Seth Rich may explain the DNC leaks we still don't know who is responsible for the "Podesta Files" which we're certain will continue to be attributed to "Russian hackers."

Which leads to the most improtant queistion of all: is this all just another fake news diversion, or is there more to the Seth Rich murder?

http://www.zerohedge.com/news/2017-05-22/seth-rich-plot-thickens-dc-insider-confirms-complete-panic-highest-levels-dnc


Deeply Bizarre and Cursed, Mysterious Sites on the Internet

It is amazing just how strange the Internet is, how much of a life of its own it has taken on. This is a vast wasteland of digital territory largely unwatched, a wilderness unto itself.  And just as any wilderness there are bound to appear certain odd tales and stories of the unexplained. Sifting through all of the vast stores of knowledge deposited here, there are certainly dark corners of the web that remain mysterious and steeped in creepy lore. I have written much on this topic here at Mysterious Universe recently, including here, and here, and here, but there is no end to the amount of bizarreness floating about out there in cyberspace. From haunted sites, to cursed cyberspaces, to just plain weirdness, the Internet has become a powerful venue for the paranormal and the unexplained.
One site that in recent years has accrued quite a dark reputation as a haunted place is one that is claimed to be inhabited by the ghost of a little girl named “Repleh Snatas.” According to the lore, she was born sometime in the 18th century and with her own birth she was already quite creepy, having been brought into the world after several alleged miscarriages, which had prompted the mother to supposedly darkly say of these lost children, “They had to die for her to live.” “Repleh” apparently was born with a very unusual birthmark on her face that was seen as the mark of the devil by others around her, and led to her ruthless bullying, to the point that she only ever went out to play at midnight, when most of the world around her was asleep and lost to their dreams or nightmares. Her father purportedly fully believed that his daughter was tainted by Satan, and kept her locked away in her room during the day, where he subjected her to hideous torture and abuse before finally going insane and flat-out murdering her, after which the mother, who had deeply loved her, committed suicide not long after. Both were then supposedly unceremoniously buried out in the remote woods by the father, who by this time was totally consumed by madness.

So far so creepy, but how does this gruesome story translate to the Internet age? Well, the story goes that a lightning storm knocked down a telephone pole situated over the graves, and shortly after that an unusual website began to appear online, always at midnight, which is the only time it can apparently be accessed. If one is to try to access the site at any other time, there will supposedly appear a simple box for you to type in your e-mail address and an audio message from a little girl asking you to come back at midnight “to play.” If you are brave enough to take her up on the invitation the site will be open and shows various strange images and numerous pictures of a little girl with a birthmark on her face, all bathed in flickering candlelight and overlaid with spooky noises.
There is some sort of mini game to play, comprised of following clues to click on pictures in order to move to the next level, but the main attraction is a box in which you are instructed to write the name of someone who has wronged you. After writing a name in the box, Repleh is then supposed to exact gruesome revenge on this person, and in return will haunt the dreams of the one who has typed in the name and drive them inexorably insane. Considering the horror movie vibe and the fact that “Repleh Snatas” is actually “Satan’s Helper” spelled backwards, this seem like it must certainly be just just a scary Internet urban legend and that the site is just a creepy hoax, yet there are plenty of people on various forums claiming that it is all real. You can check out the site here and decide for yourself. If you dare.

Also supposedly haunted and only accessible at midnight is a website called “blindmaiden.com,” which immediately boasts right there on the front page that it gives users the opportunity to experience what it calls “ultimate horror.” There are some rules to follow in order to get on the site, according to the lore. It is supposed to be totally inaccessible until midnight, on the night of a new moon, and on top of this one must have all of the lights of the house turned off. Once properly accessed, the site allegedly shows a series of twisted, grotesque imagery of children with horrific injuries such as missing eyes or limbs, and these pictures begin to fly by so fast as to almost blur together, followed by the appearance of two clickable icons labelled “Accept” and “Decline,” which are accompanied by a message which says:
This website will take you to a whole new level of horror.
A horror that will use all five of your senses.
You must be very careful not to click on anything
by accident. You will be faced with a real experience
of absolute horror.
Click the accept button to engage
actively in the experience.
If you are not already quite creeped out enough to exit the site altogether, and you actually click on one of these mysterious options several things can happen. Supposedly if you click on “Decline,” you will be simply given full access to a library of stomach-churning, gory images similar to the ones which greeted you upon first accessing the site. If you are feeling braver and press “Accept,” a shadowy figure supposedly appears and begins walking towards you, passing right through the monitor and into your room, after which you can see yourself on the screen with your back to yourself and the figure looming over you. Then there is a tap on your back, and turning around will show you “The Blind Maiden,” who will then kill you horrifically, take your eyes, and add pictures of your mutilated body to the archived library of images on the site. Again, this is almost certainly an urban legend, but it is often discussed on paranormal forums, with many people saying it is quite real.

Just as bizarre as these sites is an apparently haunted, cursed, or at the very least very bizarre game that lurks buried in the darkest corners of what is called the “deep web,” a realm of the Internet which lurks below the surface of what usual browsers and search engines typically have access to. It is often likened to the deep abysses of the ocean in comparison to the sunlit upper reaches of the surface, where most if the Internet traffic we are familiar with is located. The dark, abyssal recesses of the deep web cannot be accessed by any traditional means, requiring special passwords or tools to do so, and this mysterious realm hidden from the rest of the net has become known as a repository for a wide range of bizarreness and shady dealings, sort of the sinister underbelly of the web often seen as harboring all of the worst that the Internet has to offer.
Here in this morass of sinister weirdness buried deep down in the blackest reaches of the web is supposedly a curious game called “Sad Satan,” which can apparently only be downloaded and played by accessing a top secret site in the deep web. The game was allegedly uncovered by a YouTuber named Jamie, who runs a channel called “Obscure Horror Corner,” while digging around in the abyss of the deep web after receiving a tip from a viewer about a weird, obscure game they had found down there. After following some links and accessing a deep web through the use of a special tool called the Tor network, Jamie claimed to have found the game in question and played through it.
The game is in a first person format and supposedly starts with an oppressively dark hallway, which the player walks through as footsteps echo about, towards a faint, flickering light in the distance. The player walks and walks, and not much seems to happen at all, making it seem that this is the extent of the game, but the monotony changes as the sounds of what sound like gasping begin to accompany the drone of footsteps. As the player slowly draws closer to the light, the sounds become more ominous, with panting, grumbling, and murmuring voices whispering something incomprehensible, and the gasping sounds becoming louder and more distorted and twisted, all of which gets more intense until the voices are eventually a crescendo of growling and snarling. Throughout all of this the only thing the player can do is trudge on, with no other choice or option to take. The hallway changes as well, morphing into what appears to be like a road, and also seems to become more decrepit and unstable. The walls morph as well, becoming blurry and indistinct, as a voice somberly chants some unknown phrase over and over again. If the player continues on through this madness they will eventually be treated to a strange image that flashes up on the screen for a few second and looks like this:

After that startling image, the hallway continues and the player continues walking, but now movement is sluggish and things become blurry, and the sounds become garbled and indistinct, almost as if the character on screen is drugged. Upon the ground there appears a trail of blood, and if the player follows this to its source they will apparently be greeted with a brief, flashing image of Jimmy Savile and Margaret Thatcher, thrown up on the screen for a fraction of a second and disappearing so quickly that blink and you’ll miss it. Indeed the game apparently has many instances of showing flashing subliminal-style grotesque images of things such as bloody injuries or child pornography, which only are shown for a spit-second, barely enough to even register. Continuing on will merely take the player through other versions of the same hallways, the only other scenery the occasional fleeting forms of what appear to be shadowy children in the murk, until reaching a dead end and that’s that. That’s the whole game, simply walking down various transforming hallways, and it all lasts a total of 11 minutes.
The game has apparently been played by others and is supposedly incredibly unsettling and creepy to play, with claims that among the sounds that can be heard are actual breathing noises in the ears of the actual players in their own room. There are also claims of dizziness, faintness, and panic attacks caused by playing it, curious since not really much happens in the game itself other than its strange ambiance. The game is also claimed to not always run, causes computers to slow down dramatically, and will sometimes entirely crash systems. Other versions of the game seem to have stealthy aggressors that track the player down, with complaints that these attacks will sometimes cause not only damage to the video game character in game, but negative health effects of the actual player. The original game downloaded by Jamie from “Obscure Horror Corner” was reported to have been erased when he found a disturbing file attached to it that would send up messages written in some sort of unintelligible gibberish every time he played the game, and spooked him so much that he deleted the whole thing, although he claims to have made a video of a walkthrough of the game. He would say of these mysterious messages:
They were genuinely gibberish text. It didn’t seem to be in any language, just symbols and numbers really. I did notice 666 a few times, which fits I guess, considering the title of the game.
Corridor in the alleged “Sad Satan” game
With no known working copy of the game remaining and its location on the deep web apparently mysteriously and spontaneously vanishing, it is hard to know what we are dealing with here, or indeed if the actual game really ever existed at all. It has been speculated to have been everything from an abandoned attempt to make a video game, to a hoax, to an actual cursed or demon possessed game, but no one knows as there don’t seem to be any playable versions currently available. One popular theory is that the administrator of “Obscure Horror Corner” fabricated the whole thing to simply attract more viewers and subscribers. It is all at the very least very mysterious, and with the whole enigmatic origin story of the game appearing in the mysterious deep web it is not surprising that strange rumors would be drawn about it, and it has become highly discussed on various message boards and forums, with new versions occasionally supposedly released. The walk-through of the alleged original game can be found online, and there is a great, more in-depth article by Patricia Hernandez at Kotaku on the alleged game with more screenshots here.
A lot of the creepier tales of cursed Internet sites have to do with those that feature strange images or videos, which I have actually covered here at Mysterious Universe recently, but of which there are many. One is actually a Twitter account mentioned quite a bit recently, called “Cursed Images,” which in 2016 began suddenly anonymously posting a variety of twisted images to Twitter without any comment or explanation except to say “all these images are cursed.” Far from chasing the people away, Cursed Images has managed to gain hundreds of thousands of followers of those with a curiosity for the macabre. The images presented run the gamut from more or less innocuous to the truly disturbing, with one article in The New Yorker called “The Creepiest Pictures on the Internet,” by Jia Tolentino, giving a pretty good run down of what to expect, saying:
An outstretched foot with lit cigarettes tucked between each toe was “cursed image 5927.” A man sitting on a pink couch with two enormous poodles, all three of them wearing birthday hats, was “cursed image 67.” Around three hundred photos have followed since then, and the cursed images have become increasingly unnerving: a gun pointed at a stuffed Barney (7447); lurid purple dish soap dripping over a waffle, like syrup (99); a woman playing the violin while doctors perform surgery on the back of her head (672); a child in a snowsuit with its head stuck in the barrel of a cannon (9972); an upturned beach pail over a faceless body, its head streaming with sand that falls like hair (827263). Among the most recent images are a man in a suit walking down a green path into the darkness, lit by a spotty flash (568); a person in a homemade-looking cat costume pushing another homemade cat in a wheelchair (27443); a series of dolls and shoes nailed to a tree trunk (372); and a crowd of people on aquamarine bleacher seating, crammed perfectly above a diagonal line of shade (340). In Cursed Image 37828, Queen Beatrix of the Netherlands visits Corpus, a walk-through exhibition on the human body.
One of the many cursed images
And on and on its goes, thousands upon thousands of these pictures, all plucked from various sources and totally anonymous, without any sort of captions to put them into context. One thing common to all of them is that no matter how innocent some may seem, they always manage to provoke some primal sense of unease, discomfort, and even downright revulsion, even if it is not always immediately apparent as to why they should do this. They uncannily pluck at some strings of fear within us, and have quite a disorienting and jarring effect, which is probably what keeps droves of people coming back for more. There have been whispers that the poster of these images is a malevolent presence, and that some of them may be a code of some sort or even actually cursed, and the one behind the account has been theorized to be everything from a prankster to the Devil himself. It is hard to tell since no one really knows who the administrator is, although the mysterious individual has spoken out before, once telling The New Yorker magazine through e-mail:
Some people have stated I’m a bot. Others think I’m a creep with too much time on their hands. But it’s just like the lack of context for the images. Whoever you think I am, that’s what I am.
Joining the ranks of places on the Internet with fear-inducing imagery is one allegedly called “Normal Porn for Normal People.” The site was apparently originally found not through a search engine or link, but rather through an anonymous e-mail that said, “Hi there, found this site is very nice thought u might like normalpornfornormalpeople.com pass it on, for the good of mankind.” The original recipient of this mail allowed curiosity to come to the fore, and clicked on the link, where he was met with what he described as a not particularly exciting webpage, describing it thus:
It was a very average, very generic looking site. It gave the impression that the creators just BARELY gave a shit about making it look professional. The author seemed to have a very tenuous grasp on English, and on the front page was a long, boring, and incoherent rant that I don’t remember or have saved.
Alleged screenshot of “Normal Porn for Normal People” homepage
The main tagline of the site was purportedly “Normal Porn for Normal People, A Website Dedicated To The Eradication of Abnormal Sexuality,” and it was all very odd indeed. Scrolling through the page showed that it had no apparent links, so it was difficult to ascertain just how one was meant to access all of this “normal porn.” As the user was about to leave the page, it was realized that every single word was in actuality a long series of hyperlinks, and pushing on these brought up a blank white page containing a long list of links. Clicking on the various links would bring the user to different pages with completely different urls, and the original poster of this account would explain what he encountered through doing so thus:
I was just about to say “Fuck this” when I clicked on the third link, and a video download came up. It was called “peanut.avi”. It was a thirty-minute video of a man, a woman and a dog in a kitchen. The woman would make a peanut butter sandwich, and the man would set it down for the dog to eat. This was all that happened, for thirty minutes. It was obvious that the cameraman had to stop filming and wait until the dog was ready to eat again, and the dog seemed rather sick by the end of it. I know what you’re thinking: “What the hell does that have to do with porn?” I have no clue. I’ve seen a little over two dozen videos from this site, and the majority had no sexual activity at all. After watching peanut.avi, I went on a certain image board I frequent to play online show and tell, like I always do with weird shit like this. But someone had already made a thread about it, some guy who had received the same chain letter I did. The image board thread got lots of people with nothing better to do to dig through the site, and that’s how I saw other videos.
Most of those two dozen videos were very uneventful, and consisted of people talking to the cameraman in a room with nothing in it but a desk and a few chairs. I mean literally nothing on the walls, or in terms of furniture. The whole room had a very cold, sterile feel to it. The conversations were just idle banter about previous jobs or embarrassing childhood moments. I kept expecting some kind of discussion about what the people were filming or what the site was about, but of course, nothing. You would never know these videos had anything to do with porn if you saw it out of context. However, the other videos that actually did feature content which I suppose could be called “sexual” is where things got weird.”
Some of these other videos were allegedly every bit as weird, deeply odd, and unsettling as “peanut.avi.” One video supposedly shows a repairman fixing a washing machine and then proceeding to copiously lick the top of the machine for a full 7 minutes. Another shows an obese mime awkwardly performing his routine before breaking down into sobbing after breaking several of his props due to his massive weight. In one called “dianna.avi,” a woman talks about playing the violin as within a mirror in the background can be seen a man in a chicken suit feverishly masturbating. Another shows an elderly woman making out with a mannequin, another sensitively called “stumps.avi” shows a man with no legs enthusiastically trying to breakdance, with someone off camera ruthlessly egging him on even when he begs to be allowed to rest, while another still shows this same man walking around on his hands while wearing a mask as the woman from “dianna.avi” masturbates on a bed and an animal of some sort, possibly a chimpanzee, scurries by in the hallway in the background.

The cream of the crop as far as really weird, creepy stuff goes is supposedly a video which shows a woman tied down to a mattress in a room, with tape over her mouth. A man dressed in dark clothes opens the door to the room to let in a chimpanzee that appears to has been shaved and malnourished, possibly the same one seen fleetingly in another of the videos. There are supposedly scars and cuts on its body suggesting that it has been quite badly beaten and abused. When the mistreated chimp enters the room, the black-suited figure closes the door and the chimpanzee proceeds to go into a rage and begin mauling and mutilating the helpless woman on the bed in a scene of senseless gore. The assault is claimed to go on for 7 minutes in the video, after which the woman dies and the chimp eats her flesh for another 4 before the video cuts out. This particular video apparently caused an uproar, with this initial poster saying:
The thread exploded with activity after this video was uncovered, and people discussed it long into the night. When I came back to the image board the next day I found that the thread was deleted. I tried to start another one, and they banned me. I tried e-mailing the guy who sent me the chain letter with the site’s url, sent him five messages and never got a response. I have tried to discuss this website on various places, and I got banned frequently.
It is hard to say if any of these videos really ever existed, and the only evidence of the site at all are some screenshots purportedly taken of it, but some of the clips are said to still be lurking out on the Internet on various torrents. The videos are said to be absolutely hypnotic, pulling the viewer in even as they instill revulsion, and it is also said that copies or uploads of these torrents will eventually mysterious delete themselves on their own. As of now it is unclear who ran this site, where the videos came from, what they mean, or indeed if it ever even existed in any form at all, and it has become another piece of spooky internet lore.
Are these just the result of creepy stories passing about the Internet like wildfire? Although this seems like the creation of urban legends via the power of the worldwide web, is there any reality behind any of this? There are indeed some sick and twisted corners of the Internet, and at times it feels almost like a lawless wasteland full of all sorts of trash and nefarious dealings, but is there anything truly haunted or cursed here, or is this just more examples of the grotesqueries of mankind hidden down in this new digital domain? Time may tell, but for now it appears that the Internet has more than its fair share of creepy, even terrifying stories to go around.

INXS ♥ Beautiful girl ♥ ~lyrics~ lucidmoment311 lucidmoment311

The Doors - Moonlight Drive [LYRICS] https://www.youtube.com/watch?v=-DLvEseTZbo

The Doors - Riders On The Storm (ORIGINAL!) - driving with Jim JimJohnRayRobby JimJohnRayRobby

SEEING THROUGH WALLS… IT’S SIMPLE…

In case you missed this development and story in your perusal of the internet and the latest technological scams being dreamed up to rob you of your privacy, I enclose it here for today's high-octane speculation, as Mr. B.H. and many others saw this and sent it along in this week's emails:
And, lest you missed it, here's the first few paragraphs that pretty much say it all:
Wi-Fi can pass through walls. This fact is easy to take for granted, yet it's the reason we can surf the web using a wireless router located in another room.
However, not all of that microwave radiation makes it to or from our phones, tablets, and laptops. Routers scatter and bounce their signal off objects, illuminating our homes and offices like invisible light bulbs.
Now, German scientists have found a way to exploit this property to take holograms, or 3D photographs, of objects inside of a room - from outside of the room.
"It can basically scan a room with someone's Wi-Fi transmission," Philipp Holl, a 23-year-old undergraduate physics student at the Technical University of Munich, told Business Insider.
Holl initially built the device as part of his bachelor thesis with the help of his academic supervisor, Friedemann Reinhard. Later on the two submitted a study about their technique to the journal Physical Review Letters, which published their paper in early May.
Holl says the technology is only in prototype stage at this point, and has limited resolution, but is excited about its promise.
"If there's a cup of coffee on a table, you may see something is there, but you couldn't see the shape," Holl says. "But you could make out the shape of a person, or a dog on a couch. Really any object that's more than 4 centimetres in size."
Notably, the current state of resolution, as implied by the last paragraph, isn't too great, but, as noted in the prior paragraph, "the technology is only in prototype stage at this point".
As we all know, this is the beginning, and resolution will increase, and the ability to photograph, or even "film" inside a house using WiFi will come along in know time. And please note, "Wi-Fi can pass through walls... it's the reason we can surf the web using a wireless router located in another room."
Yes, thank you very much, I know that. It's one reason I don't use WiFi in my home. Granted, yes, they have the technology to send signals through the electrical wiring in your home, and to ride those wires to see what you're doing - at least on your computer - anyway, but I see no reason to add to their capability.

Which brings me to my high octane speculation of the day: of course, one aspect of this is that we're just now being told about it, and that the technology has probably been around for a while. We know the format of how all this works when "they" want to tell us about something they're already doing. (1) Find a young college kid with some engineering skills and some smarts; (2) suggest a "thesis topic" to him; (3) publish his thesis, and voila the idea is out of the bag. But that's not my high octane speculation.
The setup they are using requires a scanning antenna, a "reference" antenna, and a WiFi emitting antenna. Now stop and ask where they're going to get all of those into your house, and think:
  1. Smart meters
  2. Smart appliances
  3. cellphones,
  4. ipads
  5. computers
  6. television
  7. (and for those of use still old fashioned) radios
But even that isn't my high octane speculation. What each intrusion like this will ultimately do is spawn a major industry of countermeasures: housing contractors will inevitably start offering homes with the latest electronic counter-measure siding and roofing, security companies will increasingly offer "privacy" security services and products, and ultimately, yes, more and more people will simply go completely off the grid, make their own electricity, listen to the radio the old fashioned way (by tuning into a broadcast), send physical letters or use shortwave, and read physical books and not the internet. And there will be a whole new kind of profiling emerge (and I strongly suspect it already has), a profile that runs from "national security state compliant household" to "completely off the grid and largely unmonitorable" and therefore "highly suspect." Indeed, the "countermeasure" industry is already just starting up, but I suspect, as the police state expands and as more and more layers of technology are added, that the countermeasure industry will be one of the major growth industries of the future, with the real financial jackpot going to whomever can come up with the "scanner blaster", that fries anyone's equipment that is trying to scan your household without your permission.
In the meantime, before you go to bed tonight, better join the tin-foil hat crowd and wrap or cover up that WiFi antenna - and any smart appliances - with a loose tent-like covering of foil. Think of the idea as a kind of "tea-caddy" with an inner layer of tinfoil, with a decorative outer covering. Before long, they'll be selling "Decorative Faraday Cages for Any Appliance" on amazon.                        https://gizadeathstar.com/2017/05/seeing-walls-simple/

Saturday, May 27, 2017

CASHLESSNESS, CYBER-SECURITY, AI, AND INSANITY

Finally someone is saying it: the idea of a cashless society is nuts. No, not just nuts, it's insane. Of course, the plutocrats and technocrats that constitute "Mr. Globaloney," the "elite" of the west, will continue pushing the idea, but that only raises the issue of their sanity, not the wisdom or practicality of their ideas.  We all know, of course, why Mr. Globaloney wants such a thing and the "selling points" used to advance it: it will cut down on crime, terrorism, everyone will be tracked and hence crime will not pay and the world will be a bright and sunny place of peace, happiness, and brotherhood being run by transnational corporations and peace-loving pro-humanity international banksters like the late David Rockefailure.  The only thing it will mean is that the criminals will continue to hide their criminal activity, the banksters will continue to profit from it, and everyone else will be reduced to serfdom.
But there's a fly in Mr. Globaloney's ointment, and it's hinted at in this short article shared by Mr. V.T. and it raises issues I've raised before. But today, I want to throw something else into the high octane mix. In any case, here's the article:
Note carefully what Mr. Armstrong states, for it is a crucial point:
Let’s get something straight here. At the core of those responsible is really the NSA and Microsoft itself. The attack exploited a Windows networking protocol to spread within networks, and while Microsoft released a patch nearly two months ago, it’s become very clear that patch didn’t reach all users particularly because institutions often do not install patches fearing that proprietary software may not function.
If behind the curtain we have government demanding back-doors into iPhones and computer so they can listen to everything everywhere, well guess what – so can everyone else. Patches will work for individual users, but not major institutions. Trying to upgrade their operations is a real effort. They are slow to act and thus vulnerable.
In other words: (1) software is constantly having to be upgraded because (2) hackers and state and/or corporate and/or organizationally-sponsored cyber-warfare specialists are constantly probing various governments and institutions, which institutions are (3) slow to upgrade with patches lest their whole system go down.
The bottom line: no cyber-system of information exchange, including those of financial clearing, is safe. Indeed, a few years ago I blogged about cyber attacks on financial clearing houses and banks, where accounts were drained in milliseconds. The idea is not, of course, new, being the subject of movies and television series episodes (like Person of Interest), and of very real world stories. Recall, for a moment, that even the Federal Reserve has been hacked. Then there's Sony... on and on we could go.  The bottom line is that in any proposed cashless society, everyone is exposed to a risk that they otherwise would not be exposed to, including Mr. Globaloney. As I've indicated in discussions with Catherine Austin Fitts and others, and as I have suggested in some of my books, one may be absolutely certain that Mr. Globaloney keeps hard copy records of his holdings - the stock certificates, the bonds, the liens, the mortgages, deeds, and so on, and yes, probably a pile of money - somewhere, and probably uses such hard copy as the actual basis of his dealings in my hypothesized "hidden system of finance."
Now it's time to add that "other factor" which has not been, in my opinion, adequately discussed in this connection: Artificial Intelligence (AI). Most thinkers speculating on the possible advent of AI hypothesize that it could, conceivably, not only render humanity obsolete, but that it would actively pursue its demise. Imagine, for a moment, allowing a cashless system of payments to evolve in a world where AI - according to some - lurks right around the corner, on top of cyber-systems demonstrably insecure to human hackers. At that juncture, the bad scenarios multiply like rabbits: such an AI might conceivably "throw in" with this or that human cyber-warfare group; it might, conversely, attempt to "plug the holes" in an ill-thought effort to "protect" humanity with the result that, with "all holes plugged" and "secure", nothing can get done. Or, in the ultimate exhibition of nastiness, it might simply expropriate all that "cyberwealth" of the cashless society and leave everyone penniless.
And who's to say that, in the process, it might not forge arrest warrants and issue bulletins for the immediate arrest of Mr. Globaloney and his cohorts to be held as potential terrorist threats (or dealt with summarily by ordering drone strikes on their known haunts)?
In short, Mr. Globaloney, you might want to rethink that whole cashlessness idea, for it might, coupled with looming AI, be an instrument not so much of law, order, and peace, but of the ultimate and irrecoverable chaos, and your own very permanent impoverishment.                                                      https://gizadeathstar.com/2017/05/cashlessness-cyber-security-ai-insanity/