71 thoughts on “Articles That Fit No Current Thread”

  1. What are your thoughts on it?

    I feel extreme anger and wish unlimited suffering upon the perpetrators of this atrocity.

    I’m wondering if the recent suffering in England has been Karmic backlash for the terrible things that they’ve said.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  2. http://wallstreetonparade.com/2017/07/financial-system-of-u-s-rests-on-health-of-just-five-mega-banks/

    Financial System of U.S. Rests on Health of Just Five Mega Banks

    We are in Syria because they have a bank that is not associated, one of the few in this world, with the BANKSTERS in Britain and Germany. Our taxpayer dollars are going to fight for the banksters who is very interested in enslaving us.


    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  3. Do you think there was more to the issue than just murder,… if there was really a murder?

    There was definitely a murder. Guede broke in through the window, cut Meredith’s throat when he confronted her, then raped her as the blood was gushing from her neck.

    We can tell that the rape occurred at this time because the blood spatter on her clothes shows that she was still clothed when her throat was cut, and the blood spatter on her bare chest shows that she was still spraying blood at the moment she was undressed and raped.

    Then Guede took her phones so that she couldn’t summon aid for herself, locked her in her room (which required a key to unlock from either side), took all her rent money, and went out dancing at a nightclub (spending her money) while she slowly drowned in her own blood on the floor of her room.

    There was definitely more to this than just a murder, at least after the fact.

    On his way to the nightclub, Guede threw the phones into a dark ravine, where they landed in the yard of someone’s home. Shortly thereafter, that homeowner received a phone call telling her she had a bomb in her toilet. She called the police, who ignored her toilet when they came and instead searched her yard where the phones landed, not finding them because it was dark.

    “Someone” had to have had the resources to very quickly determine there was a house at the bottom of that ravine, figure out their phone number and deliver a bomb threat, and exert control over the local police to have them try to retrieve the phones. That “someone” has never been identified.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  4. Is there one iota of suspicion that the murder was ritualized?
    How did you you become so familiar with this case? I would love to read up on it, tho I am not a crime fan by any means.

    We live in a strange world these days. Ah hell, this world has always been strange.

    German banks pose a threat that politicians want to hide, economist says
    Shipping loans and too many bank branches are the biggest issues
    Other concerns surround lack of digitalization and low interest rates

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  5. Is there one iota of suspicion that the murder was ritualized?

    That depends. The Italians started off accusing Amanda of killing Meredith in some sort of black magic ceremony. They backed off the witchcraft accusations though when they realized that they’d probably end up at war with the US if they followed through with them. (They are still trying to go after Galileo though, and they frequently prosecute modern Italian scientists.)

    There is no actual evidence of anything ritualized in this case though.

    How did you you become so familiar with this case? I would love to read up on it, tho I am not a crime fan by any means.

    A reporter named Frank Sfarzo used to post on the internet everything that happened in the trials until the Italians closed him down.

    Today probably the best place to get evidence is here:

    On the left of the page there is a column of links to various facets of the case.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  6. This was in Defense News.
    With the witch hunt going on, may sure you are not caught in the middle and protect yourself with this. It does indeed create a shadow of doubt.
    The original link that no longer exists.

    The page you requested could not be found.
    Take me to the home page


    Cyber’s Next Chapter: Penetrating Sealed Networks
    Dec. 16, 2012 – 12:47PM |


    Filed Under

    World News

    Not long ago, if your computer network was cut off from the Internet, devoid of wireless routers and hunkered behind locked doors, you were safe.

    But not anymore.

    Several U.S. industry and military labs are improving the deciphering of the 1s and 0s that traverse these carefully guarded networks, and finding ways to inject data and infect systems with destructive viruses — “jumping the gap” into an ironclad network.

    The progress in adding information to a network begins a new chapter in cyberwarfare, and the U.S. Army is looking to test the scientists’ handiwork. This new chapter also shows how longstanding research on the physical science of electromagnetic fields and radio frequencies is coming into play in the realm of cyberwarfare, an area typically focused on software.

    The Army’s Intelligence and Information Warfare Directorate (I2WD) hosted a classified planning day Nov. 28. Sixty entities attended to discuss what can be done in the realm of electronic warfare and cyber, according to a source familiar with the program.

    The roughly half-dozen objectives of the Tactical Electromagnetic Cyber Warfare Demonstrator program are classified, but the source said the program is designed to demonstrate ready-made boxes that can perform a variety of tasks, including inserting and extracting data from sealed, wired networks.

    Being able to jump the gap provides all kinds of opportunities, since an operator doesn’t need to compromise the physical security of a facility to reach networks not connected to the Internet. Proximity remains an issue, experts said, but if a vehicle can be brought within range of a network, both insertion and eavesdropping are possible.

    The Army program is designed specifically to test capabilities for air and ground platforms, according to an invitation to an information day on the program released by I2WD. The invitation does not provide details on the specific targets for the program, instead including several buzzwords and encouraging attendance.

    The program, which will consist of a series of demonstrations roughly every three months for the next two years, will test a variety of electronic warfare (EW) capabilities, said Moses Mingle, branch chief of the EW systems ground branch at I2WD.

    “It’s not a system, it’s a demonstration platform,” Mingle said. “Basically, we’re vetting systems concepts, tactical EW cyber scenarios that could be deployed in the future.”

    Asked if one of the objectives is to demonstrate a system that could jump the gap and access systems remotely, Mingle declined to go into detail, citing classification issues, but said, “That’s a part of it, but not all of it.”

    The source said the other objectives were more typical fare, including counter-improvised explosive device efforts. But the convergence of cyber capabilities and EW in the form of a box that provides easy access to a sealed network is likely the most sensitive aspect, given the questions surrounding the legality of certain cyber attacks and continued secrecy in the area, the source said.
    Detecting Signals

    Concerns about outsiders eavesdropping aren’t new, as various intelligence agencies became increasingly worried in the 1980s with what are called compromising emanations, the electromagnetic field distortions that give away electronic activity. The study of the emanations was code-named TEMPEST, and led to a variety of efforts to shield systems. Researchers found that keystrokes could be detected from signals sent from keyboards to computer units, as well as information on a monitor.

    And while the detection of these disturbances has become increasingly sophisticated, with systems able to pick out signals from greater distances with greater clarity, advances in the insertion of data using radio frequencies are gaining special attention.

    The ability to add data still has limitations, mainly proximity and bandwidth, experts said. At current levels, complex data can take extended periods to insert.

    Experts declined to provide full specifics on data transfer rates and range, citing the classified status of the capabilities and national security issues. But the possibilities are being explored as the U.S. military increasingly recognizes the potential of cyber weapons in operations.

    The actual technology that allows for the insertion of data isn’t novel, said retired Air Force Maj. Gen. Dale Meyerrose, former associate director of national intelligence.

    “This is old technology,” he said. “The technology itself isn’t new, but the application of the technology is new, and the software running the technology on some of these devices is new.”

    Meyerrose, who runs the Meyerrose Group, said connecting to closed networks using radio frequencies is about five years old, but some of the complications of cyber, including legal authority, have slowed progress.

    “This could be used to drop a Trojan into a system,” he said. “Like everything else in cyber, there are not a lot of legal parameters. Like everything else in cyber, our legal system is about 20 years behind.”

    The recognition that electronic warfare methods can be critical for future cyber application is clearly making its way up the leadership chain. Senior Pentagon officials are increasingly emphasizing the need for the U.S. to control the electromagnetic spectrum in the future, without going into specifics.

    At a recent event at the Naval Surface Warfare Center’s Crane Division in Crane, Ind., Adm. Jon Greenert, chief of naval operations, made the case.

    “We have to understand better the electromagnetic spectrum,” he said. “Cyber, our radar and communication, everything. If you control the electromagnetic spectrum, you control the fight.


    Editor’s note: Staff writer Aram Roston contributed to this report.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  7. Boy can I call ’em!
    I get this president. I honestly get him.
    Reminding you that I have called for a Sessions humiliation for some time now. Unless of course it is one of those false leaks that I would issue out of the Oval Office, just to mislead the nasty mainstream media. OR this is mainstream media making things up again with no real leak, just hooch in the living room at an inpromptu party of MS reporters and/or editors.


    Jul 24, 9:34 PM EDT

    AP sources: Trump speaks to advisers about firing Sessions

    Associated Press
    Speaking of high, I am addicted!!

    Got a new app and cannot put it down without some consternation, and a specific eagerness to return to it: Hempire.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  8. I have never seen “An Inconvenient Truth.” I wanted to see it. However I have vowed never to buy a brainwash. I would have to see it free. So far, a free “An Inconvenient Truth” has never come to me free. The vow still stands for the sequel.

    And of course, the cause of this post:

    “The Bureau­ of Meteorology (BoM) initially claimed the adjustments were part of its quality control procedures. But bureau chief executive Andrew Johnson later told Environment Minister Josh­ Frydenberg that investigations had found a number of cold-weather stations were not “fit for purpose” and would be replaced.”

    I have suspected this happening in this country as well. So I attached a mercury thermometer to the house, to test the digital read-outs on weather apps and so on. So far, the most it has been off routinely is a couple of degrees. But one day, I found on app that read 106, while the other app read 116. I kept an eye on it and it never changed.

    Still in Earp country. Trying to clear a house out of valuables before the Oklahoma thieves ravaging this area can. That house was hit once. Stole lots of valuable stuff, … an arc welder, my motorcycle, a hydrostat mower and trailer, and so much more, damn them! It is suspected that the thieves start fires here that span for miles while they divert attention from their thieving. Our house is being electronically surveilled by the police, because it was obvious that the thieves planned to return for more. Should call them tomorrow to find out what they found so far. Heard they saw a car and followed up on it. BTW, mother is an antique-a-holic.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  9. I just got to see the shotgun that my great uncle used in in a real life gunfight about a hundred years ago.

    It’s sort of a family heirloom, but I’ve never seen it before.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  10. As long as the Palestinians remain perpetually aggressive towards the Israelis, the Israeli voters are likely keep Netanyahu in power to protect them.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  11. I hope PnH is doing OK in Texas. If I remember right she is out of the zone that is being attacked by the hurricane, and she certainly knows enough to get her family out of danger ahead of time in any case. But still thinking of her and her family.

    VN:R_U [1.9.22_1171]
    Rating: +1 (from 1 vote)
  12. I second that motion. Oh PNH, give us some indication that you are ok.
    I lost control of my yahoo account that has your email address. So really, give us a sign you are ok.
    If you need help, let us all know.

    jo, are you in the heat wave? You doing ok?

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  13. I’m not sure how often she checks in here anymore. And she might be at some sort of shelter without internet access at the moment.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  14. http://www.zerohedge.com/news/2017-08-31/new-evidence-reveals-comey-drafted-statement-exonerating-hillary-key-witness-intervi

    New Evidence Reveals Comey Exonerated Hillary Before Key Witness Interviews
    Tyler Durden’s picture
    by Tyler Durden
    Sep 1, 2017 3:16 AM


    The Real ‘Fake News’ Crisis
    August 31, 2017

    The secret of Donald Trump’s political success rests largely on his experience with the fake reality of “reality TV” via “The Celebrity Apprentice” – and how fake drama has spilled into political “news,” as JP Sottile explains.

    By JP Sottile



    US Military Battles Syrian Rebels Armed by CIA
    Rebels Shot at US Troops Operating Near Manbij
    Jason Ditz Posted on August 29, 2017Categories NewsTags CIA, Pentagon, Syria, Trump, Turkey


    Is Hillary Running the FBI? “Lack of Public Interest in Emails Justifies Withholding Documents” Says FBI

    (am not a big fan of Mish. He is just way too RELIGIOUS for me (caps for empasis only, the gawd dammed Jeeeesuuuuus Freak.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  15. Think about it a bit. Is this democracy?

    Study: Doping Western Cultures With Oxytocin Will Cure Hatred Of Refugees

    snip from link
    “Meanwhile, the BBC is reporting that Lithium added to tap water may cut dementia by up to 17 percent.

    “By this time the soma had begun to work. Eyes shone, cheeks were flushed, the inner light of universal benevolence broke out on every face in happy, friendly smiles.” -Aldous Huxley, Brave New World”

    This non-consented mass=doping is why I don’t even drink the tap water. We do reverse osmosis. No government has the right to do this if democracy is in place.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  16. Jo, you might find this interesting. I get the second hour. But the first hour covers some of it. Then Bosley can be found on youtube, I assume. In the back of my mind, I always consider that intelligence agencies try to guide perceptions in all sorts of alternative manners. So I take in what is said, and store the concepts. But belief is withheld until I can add to it from varied sources. Bosley was involved in military intelligence, which causes me to hold reservations.


    My prediciton of a Trump win came along with a prediction that our election machines were hacked by three different groups. I maintain that impression.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)
  17. https://www.spymuseum.org/multimedia/spycast/episode/deep-black-an-interview-with-sean-mcfate/

    SPY Historian Vince Houghton sat down with Sean McFate, a former paratrooper, private military contractor, and now author, novelist, and expert in foreign policy and national security strategy. Drs. Houghton and McFate discuss military and intelligence privatization, and McFate’s new book, Deep Black.

    VN:R_U [1.9.22_1171]
    Rating: 0 (from 0 votes)

Leave a Reply