20110731
NYC Dept. of Buildings: No Records for Pre-9/11 WTC Elevator Rebuild, One of the “Largest, Most Sophisticated” Ever
20110729
From BAE to Iran-Contra, 9/11 & Beyond
"Money makes the world go ‘round. Whose money spins your planet? In recent decades, Saudi Arabia emerged as a skillful puppeteer, pulling the strings of its expanding influence. Dare to see the big picture, out of the context of pseudo-political loyalties, free of the intoxicating opiate of the mainstream media. Look behind the mask of false pretenses to see the awful truth: riches seeking ever more money, celebrity looking for more notoriety, propaganda masquerading as the truth and the deprivation of liberties posturing as the savior in the “war on terror”.
To uncover who is truly in control, all you have to do is follow the money. Since the mid-eighties, British and American politicians have been operating under suspicion of being compromised by al-Yamamah, the $80 billion Anglo-Saudi black operations slush fund. It is the product of the 20-year oil-for-arms barter deal, wherein BAE Systems (formerlyBritish Aerospace), Britain’s largest defense contractor, reportedly paid bribes to sell combat fighter planes, helicopters, tanks and ammunitions to Saudi Arabia. In return for the arms, the Saudi’s agreed to supply hundreds of thousands of barrels of oil a day to the British. It was the largest arms deal in UK history that was arranged in a way that circumvented any potential objections by the U.S. Congress. BAE (the world’s second largest defense company) was said to have paid millions into accounts controlled by Saudi Prince Bandar bin Sultan, a highly influential former ambassador to Washington, DC. Prince Bandar’s close ties to the Bush family prompted the nickname “Bandar Bush”. Bandar’s children reportedly attended school with Cheney’s grandchildren. The power Bandar wielded was extraordinary. For decades he was a close friend to five U.S. Presidents and numerous CIA directors, as well as heads of state and monarchs of other countries. In the Bush years, Bandar became virtually part of the administration, able to enter the White House unannounced. Ever a master manipulator, Bandar skillfully controlled the mainstream media, with the Washington Post being his paper of choice when it came to royal leaks..." http://www.boilingfrogspost.com/2011/07/26/brushfire-with-julia-the-saudi-sta...Handling of Drake Leak Case was “Unconscionable,” Court Said
How did 'the Zetas' drug cartel obtain weapons for criminal activity?
"Since Barack Obama took office in 2009, the commonly-accepted mantra of the Administration, and many within the major news organizations, is that the violence associated with Mexican drug cartels is fueled by guns that came from the United States due to its 'lax gun control laws.' Indeed, the dangerous 'Zetas' drug cartel obtained weapons in the United States for their criminal activity both in Mexico and throughout the American Southwest.
However, the manner in which the Zetas obtained those weapons directly contradicts the official Administration stance on the consequences of lax gun control laws. The Zetas obtained their weapons through a little-publicized program implemented by the U.S. State Department called 'U.S. Direct Commercial Sales.' The program was intended to regulate the sale of U.S. firearms to other countries, and a direct commercial sale of a firearm requires an export license. However, as it has been demonstrated repeatedly with the Project Gunwalker Scandal at the ATF, honorable intentions often go terribly awry, particularly when widespread corruption infects a multiplicity of government agencies..." http://www.examiner.com/conservative-in-national/how-did-the-zetas-drug-carte...9/11 Eyewitness WPIX Producer - We All Thought We Were In The Center Of The Bomb
...No, the bomb was in the subway...
Bush explains slow reaction to September 11 attacks
Masonic media agents
• 2 Alternative media reporters
• 2.1 Alex Jones
• 2.2 Greg Palast
• 2.3 Noam Chomsky
• 2.4 G. Edward Griffin
• 2.5 Aaron Russo
• 2.6 Amy Goodman
• 2.7 Jeff Rense
• 2.8 Bill Deagle
• 2.9 Devvy Kidd
• 2.10 Alan Watt
• 2.11 Jim Tucker
• 2.12 Daniel Estulin
• 2.13 Leo Lyon Zagami
• 2.14 Benjamin Fulford
• 2.15 Ted Gunderson
• 2.16 Ray McGovern
• 2.17 David Ray Griffin
• 2.18 Webster Tarpley
• 2.19 Paul Craig Roberts
• 2.20 John F. McManus
• 2.21 Michael Parenti
• 2.22 Alex Ansery
• 2.23 Judith Miller
• 2.24 Barrie Zwicker
• 2.25 Stew Webb
• 2.26 Tom Henneghan
• 2.27 David Shayler
• 2.28 Annie Machon
• 2.29 Rod Barton
• 2.30 Eric Hufschmid
• 2.31 Daryl Bradford Smith
• 2.32 Michael Collins Piper
• 2.33 Henry Makow
• 2.34 Luca Scantamburlo
• 2.35 Patrick Fitzgerald
• 2.36 John Loftus
• 2.37 Texe Marrs
• 2.38 Jim Marrs
• 2.39 Hal Turner
• 2.40 Jesse Ventura
• 2.41 Robert Steven Duncan
• 2.42 Cindy Sheehan
• 2.43 Ognir
• 2.44 Doubt cases
• 2.44.1 Ian Crane
• 2.44.2 David Emory
• 2.44.3 John Perkins
• 2.44.4 Steve Lendman
• 3 New Age reporters
• 3.1 Daniel Winter
• 3.2 Jordan Maxwell
• 3.3 David Icke
• 3.4 Michael Tsarion
• 3.5 David Wilcock
• 3.6 Nassim Haramein
• 3.7 Steven M. Greer
• 3.8 Zecharia Sitchin
• 3.9 Richard Hoagland
• 3.10 Leonard George Horowitz
• 3.11 Stewart Swerdlow
• 3.12 Eckhart Tolle
• 3.13 Doubt cases
• 3.13.1 Thomas E. Bearden
• 3.13.2 Drunvalo Melchizedek
• 3.13.3 Jacques Vallée
• 3.13.4 Neil Kramer
• 4 Mainstream media reporters
• 4.1 Tim Russert
• 4.2 John McLaughlin
• 4.3 Tony Snow
• 5 Artists
• 5.1 Tom Cruise
• 5.2 John Travolta
• 5.3 Will smith
• 5.4 Quentin Tarantino
• 5.5 Dan Brown
• 5.6 Michael Moore
• 5.7 Oliver Stone
• 5.8 Mel Gibson
• 5.9 George lucas
• 5.10 Martin Sheen
• 5.11 Charlie Sheen
• 5.12 Emilio Estevez
• 5.13 Bono Paul David Hewson
• 5.14 Madonna Louise Ciccone
• 5.15 Beatles
• 5.16 Jimmy Page
• 6 To research / unfiled..."
http://wikicompany.org/wiki/911:Masonic_media_agents#Henry_Makow
20110726
URGENT!! Sentinels of Liberty!
Alternative Title: Captain America Recruits Scavenging Americans To Fight The Unholy Japs.
Anders Behring-Breivik Facebook Page
20110724
Anonymous & Lulz Security Statement
• • We recently stumbled across the following article with amazement and a certain amount of amusement:
• • http://www.npr.org/2011/07/20/138555799/fbi-arrests-alleged-anonymous-hackers
• • The statements made by deputy assistant FBI director Steve Chabinsky in this
• article clearly seem to be directed at Anonymous and Lulz Security, and we are
• happy to provide you with a response.
• • You state:..." http://pastebin.com/RA15ix7S
Live Memory Forensic Analysis
"As memory forensics has become better understood and more widely accomplished, tools have proliferated. More importantly, the capabilities of the tools have greatly improved. Traditionally, memory analysis has been the sole domain of Windows internals experts, but recent tools now make analysis feasible for the rank and file forensic examiner. Better interfaces, documentation, and built-in detection heuristics have greatly leveled the playing field. We are also seeing novel ways to attack the problem. One of the more interesting developments I have been following lately is the advent oflive memory analysis.
I credit the free Mandiant Memoryze tool with popularizing the idea of performing live memory analysis, and I believe it is a revolutionary change. The idea itself could be as controversial as creating a memory image was just a few years ago. Do you remember the naysayers questioning how our forensic analysis could possibly be valid if we were to run our imaging applications on the live system? Shouldn't we still be pulling the plug? What would they say if we now told them we were going to play "Find the Hacker" on that same live system? Luckily it turns out that the system impact of doing a live analysis versus (or in addition to) taking a memory image is minimal. And the benefits are great: • Inclusion of the system pagefile, providing a more complete picture of memory• Digital signature checks of process and driver executables
• More accurate heuristics matching
• Faster triage capability Keep in mind that live analysis occurs by accessing physical memory, and notrelying upon API calls, open handles, or debuggers. Thus it is just as effective at defeating advanced malware and rootkits as analyzing a standard memory image. Convinced yet? If so, here is how to perform a live memory analysis with the new free tool, Redline..." http://computer-forensics.sans.org/blog/2011/07/21/live-mem-forensic-analysis
From: Doug Feith, Subject: President's Speech on Iraq ((tags, Donald Rumsfeld, Douglas Feith, Iraq, politics))
DOJ casts serious doubt on its own claims about the anthrax attack
FBIS Compilation of UBL Statements (1994-2004)
Amdocs
"It turns out that Israel has had a potential wiretap on every phone in America for years, along with the ability to monitor and record who any person is calling, anywhere in America; information of great value even if one does not listen to the calls themselves. Amdocs, Inc. the company which sub contracts billing and directory services for phone companies around the world, including 90 percent of American phone companies, is owned by Israeli interests. Yet another company, Comverse Infosys, is suspected of having built a "back door" into the equipment permanently installed into the phone system that allows instant eavesdropping by law enforcement agencies on any phone in America. This includes yours..."
http://whatreallyhappened.com/WRHARTICLES/blackmail.htmlhttp://www.amdocs.com/About/Pages/Customer-List.aspx
"Amdocs Limited (NYSE: DOX) is a provider of software and services for billing, customer relationship management (CRM),operations support systems (OSS). Its traditional clients aretelecommunications "Tier-1" and "Tier-2" providers such as AT&T,BT Group, Sprint, T-Mobile, Vodafone, Bell Canada, Telus, Rogers Communications, Telekom Austria, Cellcom, Comcast, DirecTV,Elisa Oyj and O2-Ireland. The company also offers outsourcedcustomer service and data center operations. Headquartered inChesterfield, Missouri, Amdocs has more than 20,000 employees and serves customers in more than fifty countries (the Registered office of the company is in the Island of Guernsey). [4].."
http://en.wikipedia.org/wiki/Amdocs20110721
Goldman Sachs Shorted Greek Debt After It Arranged Those Shady Swaps
Goldman Sachs arranged swaps that effectively allowed Greece to borrow 1 billion Euros without adding to its official public debt. While it arranged the swaps, Goldman also sought to buy insurance on Greek debt and engage in other trades to protect itself against the risk of a default on those swaps. Eventually, Goldman sold the swaps to the national bank of Greece.
Despite its role in creating swaps that may have allowed the Greek government to mask its growing debts, Goldman has no net exposure to a default on Greek debt, a person familiar with the matter says.
Goldman is “flat” when it comes to Greece, the person said. Which is to say, its long and short exposure to a potential Greek default are in balance.
In light of this combination of arranging structured financing while shorting the customer's debt, Goldman may find itself in a familiarly uncomfortable public light. Goldman has come under a barrage of criticism for structuring mortgage backed securities while its traders shorted that market. As a result of those short trades, Goldman lost far less money than its rivals when the US housing market imploded.
Something similar is at work here and the criticism will likely follow along the same track. Goldman was uniquely well-positioned to understand that Greek debt service obligations were higher than they would have appeared just by looking at its official debt levels, making Greece a riskier credit. This knowledge may have allowed Goldman to acquire credit protection on the trades on the cheap.
To our eyes, this entire line of criticism is off-base. Take mortgages. While some media accounts claim that Goldman made billions by shorting the housing market, the truth is that Goldman actually lost money during the worst of the mortgage meltdown. The billions it made on short trades were out-weighed by the billions lost on the long trades.
Similarly, Goldman may have sought to protect itself against heavy losses from Greece because it was uniquely exposed to those losses. The terms of the swap meant that Goldman essentially made an upfront payment to Greece in exchange for a revenue stream later. If Greece defaulted on its obligation to keep that revenue stream flowing, Goldman stood to lose money. In such circumstances, Goldman’s short-trades against Greek debt may be nothing more than prudent precaution. It is quite common for banks to take out credit protection--that is, buy short trades--against assets such as loan and swap obligations due to them.
Goldman first put the swap in place in 2001. It immediately sought to hedge its risk to the Greek obligations by making side deals with other parties. In 2005, the entire swap was sold to the National Bank of Greece. But last year, Goldman was back talking to the Greek government about a similar deal that would delay debt obligations.
In some ways, this latest “scandal” must feel like déjà vu for Goldman Sachs. The Greek swap transactions were first reported in risk magazine as far back as 2003. Der Spiegel picked them up recently, the New York Times revisited the story on Sunday, and today Bloomberg has a hold of it.
20110719
December 4, 2001: Stratcom Report Says US Backed Some Forerunners of Al-Qaeda
"The United States Strategic Command (Stratcom) produces a document mentioning that the US backed some of al-Qaeda’s forerunners. The document, an after-action report for Stratcom’s Global Guardian exercise in 2001, contains summaries about terrorist groups from around the world. Its section on al-Qaeda states: “The group was originally brought together from elements of various insurgent military groups which have fought continuously in the Middle East since the 1980s. Some of these groups had US backing in the past.” Al-Qaeda was formed in 1988 (seeAugust 11-20, 1988) by Arabs who had fought for the US-sponsored mujaheddin in the Soviet-Afghan war (see 1985-1986 and 1986-1992). [US STRATEGIC COMMAND, 12/4/2011]"
http://www.historycommons.org/context.jsp?item=a120401StratcomAlQaeda#a120401...http://www.scribd.com/doc/54400368/FOIA-11-023-Response-Pgs-260-290
20110718
Campaigners seek arrest of former CIA legal chief over Pakistan drone attacks
"July 15, 2011
Campaigners against US drone strikes in Pakistan are calling for the CIA's former legal chief to be arrested and charged with murder for approving attacks that killed hundreds of people. Amid growing concern around the world over the use of drones, lawyers and relatives of some of those killed are seeking an international arrest warrant for John Rizzo, until recently acting general counsel for the American intelligence agency. Opponents of drones say the unmanned aircraft are responsible for the deaths of up to 2,500 Pakistanis in 260 attacks since 2004. US officials say the vast majority of those killed are "militants". Earlier this week 48 people were killed in two strikes on tribal regions of Pakistan. The American definition of "militant" has been disputed by relatives and campaigners. The attempt to seek an international arrest warrant for Rizzo is being led by the British human rights lawyer Clive Stafford Smith of the campaign group Reprieve, and lawyers in Pakistan. The lawyers are also building cases against other individuals, including drone operators interviewed or photographed during organised press facilities. A first information report, the first step in seeking a prosecution of Rizzo in Pakistan, will be formally lodged early next week at a police station in the capital, Islamabad, on behalf of relatives of two people killed in drone strikes in 2009. The report will also allege Rizzo should be charged with conspiracy to murder a large number of Pakistani citizens. Now retired, Rizzo, 63, is being pursued after admitting in an interview with the magazine Newsweek that since 2004 he had approved one drone attack order a month on targets in Pakistan, even though the US is not at war with the country. Rizzo, who was by his own admission "up to my eyeballs" in approving CIA use of "enhanced interrogation techniques", said in the interview that the CIA operated "a hit list". He also asked: "How many law professors have signed off on a death warrant?..." http://www.uruknet.de/?s1=1&p=79613&s2=16http://web.archive.org/web/20090805100519/https://www.cia.gov/about-cia/leade...
20110717
2011 CWE/SANS Top 25 Most Dangerous Software Errors
Welcome to Post-Legal America
My answer is this: they are irrelevant. Think of them as twentieth-century questions that don't begin to come to grips with twenty-first century American realities. In fact, think of them, and the very idea of a nation based on the rule of law, as a reflection of nostalgia for, or sentimentality about, a long-lost republic. At least in terms of what used to be called “foreign policy,” and more recently “national security,” the United States is now a post-legal society. (And you could certainly include in this mix the too-big-to-jail financial and corporate elite.) It’s easy enough to explain what I mean. If, in a country theoretically organized under the rule of law, wrongdoers are never brought to justice and nobody is held accountable for possibly serious crimes, then you don’t have to be a constitutional law professor to know that its citizens actually exist in a post-legal state. If so, “Is it legal?” is the wrong question to be asking, even if we have yet to discover the right one..." http://www.tomdispatch.com/post/175398/tomgram%3A_engelhardt%2C_welcome_to_po...
The CIA's Secret Sites in Somalia
"Nestled in a back corner of Mogadishu’s Aden Adde International Airport is a sprawling walled compound run by the Central Intelligence Agency. Set on the coast of the Indian Ocean, the facility looks like a small gated community, with more than a dozen buildings behind large protective walls and secured by guard towers at each of its four corners. Adjacent to the compound are eight large metal hangars, and the CIA has its own aircraft at the airport. The site, which airport officials and Somali intelligence sources say was completed four months ago, is guarded by Somali soldiers, but the Americans control access. At the facility, the CIA runs a counterterrorism training program for Somali intelligence agents and operatives aimed at building an indigenous strike force capable of snatch operations and targeted “combat” operations against members of Al Shabab, an Islamic militant group with close ties to Al Qaeda..."
http://www.thenation.com/article/161936/cias-secret-sites-somalia?page=full20110716
20110715
20110714
20110713
Nothing Too Threatening to Publish
10 July 2011
Nothing Too Threatening to Publish
Cryptome responds to an inquiry:
Have a seat, here is a follow-up to the oft-asked question, "is there any threatening information Cryptome would not publish," and Cryptome's answer, "no, there is nothing we would not publish," may be understood that nothing truly threatening to persons, institutions and nations will be sent to Cryptome. Nor to the media, nor any other public interest outlet, Wikileaks and the rest. Claims of receiving this kind of material are bogus or based on stupidity and ignorance, all too often lying to conceal being deceived.
The reason is simple, such information is too valuable to give away for free, patriotic rationales notwithstanding (patriots are all too often misinformed due to the myopia patriotism fosters).
This kind of information is worth much more on the black market, under the negotiating table, in drop boxes, to spies, to nations, to extorionists, to blackmailers, and the full range of cheaters for profit.
Fake threatening material is amply distributed, some given away freely to promote a source, there is perhaps more of that than the genuine material, especially from those who ignorantly believe the fake material is genuine -- the insiders conceit.
Redactions of so-called threatening material is similarly bogus, a technique for exaggerating the importance of the material and more importantly, to enhance value of the redactor.
In the case of national threats, it should be understood that such threats are never conveniently assembled as tranferrable packages. Only fools think that. Instead national protections are diversely distributed in order to prevent their theft or corruption, and are booby-trapped with markers and tracers that can track the entire path of meddling, access and transfer.
That is why it takes sophisticated, prolonged analysis to constitute diverse sources of information into a credible account and weed out the false and misleading -- again in particular the false and misleading believed by a source to be genuine who is most likely being exploited as an unwitting dupe.
It is no accident, for example, that Daniel Ellsberg withheld material from the New York Times in the Pentagon Papers affair -- withholding is enhancement of value. And no accident that the Times and Ellsberg cannot give up touting their role as instances of higher responsiblity. Disclosure of tiny selections from a vast official literature on the war like this requires commensurate exaggeration of significance by editorial masquerade.
Masquerade, entertainment, is what brings in the profits , never the undoctored material which is nearly always tedious and demanding and incomplete. A blazingly effective disclosure is always bogus, and for that it is to be enjoyed and celebrated as fictional output like intelligence briefs and investigative journalism exposes.
To be sure, it can be argued that all "information," a fabricated neologism, a kissing cousin to vanity-driven "intelligence," and as bogus as "news" or "gospel" or "disclosures."
Not to overlook that official secrets are the greatest threat to democracy no matter who is coerced or duped into protecting them by being seduced with insider privileges.
In opposition to secrets and their complicit dramatic disclosure, democracy requires patient trial and error, study and understanding of how to make it work against those who desire to asymmetrically dominate its openness whether by government, commerce, education or belief distortion of what is publicly known of authoritative deception.
To level the playing field of information exaggeration, it would be fair to ask Cryptome and its kissing cousins whether they would sell truly threatening information underhandedly rather than publish free samples to build a market for the rest. The answer will always be a lie wrapped in indignation. Followed by a confidential come hither note like this.
As we see in the forever breaking and threatening news world of porcine spies and pig kissing "public interest" barbecuers.
If nothing else, disbelieve Cryptome. Think for yourself.
Afghan president's half-brother shot dead
"Kabul, Afghanistan (CNN) -- The half-brother of Afghan President Hamid Karzai was shot dead at his home in Kandahar on Tuesday, authorities said.
Ahmed Wali Karzai, the Kandahar provincial council chief, was killed during a gathering, said provincial governor Tooryalai Wesa. He did not know a motive. While the governor initially said a friend killed Karzai, his spokesman later clarified that the death was at the hands of a guard..." http://www.cnn.com/2011/WORLD/asiapcf/07/12/afghanistan.karzai.brother/index.... "In October 2009 the New York Times reported that Ahmed Wali Karzai received payments from the CIA for "a variety of services", including the recruitment of the Kandahar Strike Force, an Afghan paramilitary force run by the CIA in the Kandahar region. It also stated that he was paid for allowing the CIA and U.S. special forces to rent the former residence of Taliban supreme leader Mullah Omar.[16] However, Karzai has denied taking any payment from the CIA.[17..." http://en.wikipedia.org/wiki/Ahmed_Wali_KarzaiThe dangers of the internet: Invisible sieve
"The Filter Bubble: What the Internet is Hiding From You.By Eli Pariser. Penguin Press; 294 pages; $25.95. Viking; £12.99.Buy from Amazon.com, Amazon.co.uk
ELI PARISER is worried. Why? Call a friend in another city or a foreign country, and ask them to Google something at the same time as you. The results will be different, because Google takes your location, your past searches and many other factors into account when you type in a query. In other words, it personalises the results. As Larry Page, the chief executive of Google, once put it, “the ultimate search engine would understand exactly what you mean, and give back exactly what you want.” Eric Schmidt, executive chairman of Google, muses that someday it might be possible for people to ask Google which college they should apply for, or which book to read next. This is only one example of internet personalisation. Mr Pariser, an internet activist best known as a leading light at MoveOn.org, a progressive online campaign group, sees this as a dangerous development. Netflix, Amazon and Pandora can predict with astonishing accuracy whether you will enjoy a particular film, book or album, and make appropriate recommendations. Facebook shows you updates from the friends you interact with the most, filtering out people with whom you have less in common. “My sense of unease crystallised when I noticed that my conservative friends had disappeared from my Facebook page,” Mr Pariser writes. The result is a “filter bubble”, which he defines as “a unique universe of information for each of us”, meaning that we are less likely to encounter information online that challenges our existing views or sparks serendipitous connections. “A world constructed from the familiar is a world in which there’s nothing to learn,” Mr Pariser declares. He calls this “invisible autopropaganda, indoctrinating us with our own ideas..” http://www.economist.com/node/18894910http://www.thefilterbubble.com/
9/11 Concocted Caveman Conspiracy Theory - Judith Miller
Al Qaeda has "...literally thousands of well-educated people..."
AQ's Size
20110712
7/7 Inquests Blog
20110711
Ghostfunk
Ghostfunk - download – alternate download – sample information
Released in July 2011, Ghostfunk pairs one of my favorite hip-hop artists, Wu-Tang member Ghostface Killah, with vintage African funk, high-life, and psychedelic rock music. Artwork by Joe Dichiara.
Index of enablers for the successful 9/11 hijackings
20110710
20110709
Symptoms of Facism
"Dr. Lawrence Britt has examined the fascist regimes of Hitler (Germany), Mussolini (Italy), Franco (Spain), Suharto (Indonesia) and several Latin American regimes. Britt found 14 defining characteristics common to each:
• Powerful and Continuing Nationalism - Fascist regimes tend to make constant use of patriotic mottos, slogans, symbols, songs, and other paraphernalia. Flags are seen everywhere, as are flag symbols on clothing and in public displays. • Disdain for the Recognition of Human Rights - Because of fear of enemies and the need for security, the people in fascist regimes are persuaded that human rights can be ignored in certain cases because of “need.” The people tend to look the other way or even approve of torture, summary executions, assassinations, long incarcerations of prisoners, etc. • Identification of Enemies/Scapegoats as a Unifying Cause - The people are rallied into a unifying patriotic frenzy over the need to eliminate a perceived common threat or foe: racial , ethnic or religious minorities; liberals; communists; socialists, terrorists, etc. • Supremacy of the Military - Even when there are widespread domestic problems, the military is given a disproportionate amount of government funding, and the domestic agenda is neglected. Soldiers and military service are glamorized. • Rampant Sexism - The governments of fascist nations tend to be almost exclusively male-dominated. Under fascist regimes, traditional gender roles are made more rigid. Divorce, abortion and homosexuality are suppressed and the state is represented as the ultimate guardian of the family institution. • Controlled Mass Media - Sometimes the media is directly controlled by the government, but in other cases, the media is indirectly controlled by government regulation, or sympathetic media spokespeople (Like Bill O'Reilly) and executives. Censorship, especially in war time, is very common.• Obsession with National Security - Fear is used as amotivational tool by the government over the masses. • Religion and Government are Intertwined - Governments in fascist nations tend to use the most common religion in the nation as a tool to manipulate public opinion. Religious rhetoric and terminology is common from government leaders, even when the major tenets of the religion are diametrically opposed to the government’s policies or actions. • Corporate Power is Protected - The industrial and business aristocracy of a fascist nation often are the ones who put the government leaders into power, creating a mutually beneficial business/government relationship and power elite. • Limiting and surpressing organizing powers- Because the organizing power of labor is the only real threat to a fascist government, labor unions are either eliminated entirely, or are severely suppressed. • Disdain for Intellectuals and the Arts - Fascist nations tend topromote and tolerate open hostility to higher education, and academia. It is not uncommon for professors and other academics to be censored or even arrested. Free expression in the arts and letters is openly attacked. • Obsession with Crime and Punishment - Under fascist regimes, the police are given almost limitless power to enforce laws. The people are often willing to overlook police abuses and even forego civil liberties in the name of patriotism. There is often a national police force with virtually unlimited power in fascist nations. • Rampant Cronyism and Corruption - Fascist regimes almost always are governed by groups of friends and associates who appoint each other to government positions and use governmental power and authority to protect their friends from accountability. It is not uncommon in fascist regimes for national resources and even treasures to be appropriated or even outright stolen by government leaders. • Fraudulent Elections - Sometimes elections in fascist nations area complete sham. Other times elections are manipulated by smear campaigns against or even assassination of opposition candidates, use of legislation to control voting numbers or political district boundaries, and manipulation of the media. Fascist nations also typically use their judiciaries to manipulate or control elections."
Top court lets stand Saudi immunity in 9/11 case
"(Reuters) - The U.S. Supreme Court on Monday let stand a ruling that Saudi Arabia, four of its princes and other Saudi entities cannot be held liable for the September 11, 2001, hijacked plane attacks in the United States.
The justices refused to review the ruling by a U.S. appeals court in New York that the Saudi defendants were protected by sovereign immunity in the lawsuit brought by victims of the attacks and their families. The appeals court had upheld a lower court's dismissal of the lawsuit claiming Saudi Arabia, four princes, a Saudi charity and a Saudi banker provided material support to al Qaeda before the September 11 attacks..." http://www.reuters.com/article/2009/06/29/us-sept11-saudi-lawsuit-idUSTRE55S3...Lest we forget Elena Kagans involvement and subsequent nomination to the Supreme Court:
"NEW YORK – President Obama's nominee for the Supreme Court, Elena Kagan, helped shield Saudi Arabia from lawsuits filed by families of 9/11 victims seeking to target countries and leaders who helped finance al-Qaida. "I'm very concerned about her views on executive power and her views with respect to the separation of power," Stephen A. Cozen, the lead attorney in the case for 9/11 victims, told WND..." http://www.wnd.com/?pageId=152949
20110708
RFC 6274 on Security Assessment of the Internet Protocol Version 4
Hash: SHA1 Folks, The IETF has just published RFC 6274, entitled "Security Assessment of
the Internet Protocol Version 4". It contains a large amount of
information on how to improve the security of IPv4 implementations and
IPv4 deployments. This document is the result of quite a few years of work, as part of a
project I carried out on behalf of the UK CPNI (http://www.cpni.gov.uk),
and is the product of pursuing the CPNI's technical report on IPv4
security (http://www.gont.com.ar/papers/InternetProtocol.pdf) at the IETF. The RFC is available at: http://www.rfc-editor.org/rfc/rfc6274.txt Once again, I'd like to thank CPNI for their continued support. Best regards,,
Fernando
- -------- Original Message --------
Subject: RFC 6274 on Security Assessment of the Internet Protocol Version 4
Date: Tue, 5 Jul 2011 09:45:51 -0700 (PDT)
From: rfc-editor@rfc-editor.org
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
CC: opsec@ietf.org, rfc-editor@rfc-editor.org
A new Request for Comments is now available in online RFC libraries.
RFC 6274 Title: Security Assessment of the Internet
Protocol Version 4
Author: F. Gont
Status: Informational
Stream: IETF
Date: July 2011
Mailbox: fernando@gont.com.ar
Pages: 75
Characters: 179909
Updates/Obsoletes/SeeAlso: None I-D Tag: draft-ietf-opsec-ip-security-07.txt URL: http://www.rfc-editor.org/rfc/rfc6274.txt This document contains a security assessment of the IETF
specifications of the Internet Protocol version 4 and of a number of
mechanisms and policies in use by popular IPv4 implementations. It
is based on the results of a project carried out by the UK's Centre
for the Protection of National Infrastructure (CPNI). This document
is not an Internet Standards Track specification; it is published for
informational purposes. This document is a product of the Operational Security Capabilities for
IP Network Infrastructure Working Group of the IETF.
INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited. This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
http://www.ietf.org/mailman/listinfo/ietf-announce
http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html. Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org. Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.
The RFC Editor Team
Association Management Solutions, LLC
_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJOE3ZXAAoJEJbuqe/Qdv/xvQsIAK8/yiXLsxyxvAiBkozRUtXM
zb3MvsQ+ena37bFhc0yT6JoMRUBr5RQgj3PKkWSSqD/TsasqFaYY5SuA4WBCZXsX
zUpfY5MStUvcp4Im2+XMmuWg2vh7QSdcJkE1uusQf+WhSKiC3qoUr++5urAME3O3
1683VCPP+gUuosvq7nadRzxq5vfY9zncHuSH+tCdxK8QAWk1wUelLIaJp0tnxLLb
1UrDGSBr24Fske9KXxZ54ImmQaRDYxxTl81uQ5IF95mXHEIawtAiQo0/m+FiEaLm
icuh+sc8HGuz2DIQZ5jCxwmDKm13J5iuyGcFzuhF0bh9xsozGKddvbzYSye1WIU=
=lJaK
-----END PGP SIGNATURE-----
9/11: What Was Israel's Role?
"Some American terrorist investigators fear certain suspects in the Sept. 11 attacks may have managed to stay ahead of them, by knowing who and when investigators are calling on the telephone."
"Evidence linking these Israelis to 9/11 is classified. I cannot tell you about evidence that has been gathered, it's classified information..."
20110707
20110705
Wiki: Mohammad Mosaddegh
"Mohammad Mosaddegh or Mosaddeq (Persian: محمد مصدّق,IPA: [mohæmˈmæd(-e) mosædˈdeɣ] (
This is a message from the MailScanner E-Mail Virus Protection Service
----------------------------------------------------------------------
The original e-mail attachment "13px-Speaker_Icon.svg.png"
is on the list of unacceptable attachments for this site and has been
replaced by this warning message.
Act 2000, we were unable to keep a copy of the original attachment. At Tue Jul 5 23:19:04 2011 the virus scanner said:
Attempt to hide real filename extension (13px-Speaker_Icon.svg.png)
listen)*), also Mossadegh, Mossadeq, Mosadeck, or Musaddiq (16 June 1882 – 5 March 1967), was the democratically elected[1][2][3] Prime Minister of Iranfrom 1951 to 1953 when he was overthrown in a coup d'étatorchestrated by the United States Central Intelligence Agency.
From an aristocratic background, Mosaddegh was an author, administrator, lawyer, prominent parliamentarian, and politician. During his time as prime minister, a wide range of progressive social reforms were carried out. Unemployment compensation was introduced, factory owners were ordered to pay benefits to sick and injured workers, and peasants were freed from forced labor in their landlords' estates. Twenty percent of the money landlords received in rent was placed in a fund to pay for development projects such as public baths, rural housing, and pest control.[4] He is most famous as the architect of the nationalization of the Iranian oil industry, which had been under British control since 1913 through the Anglo-Iranian Oil Company (AIOC) (later British Petroleum or BP). The Anglo-Iranian Oil Co. was controlled by the British government.[5] Mosaddegh was removed from power in acoup on 19 August 1953, organised and carried out by the United States CIA at the request of the British MI6 which chose Iranian General Fazlollah Zahedi to succeed Mosaddegh.[6] While the coup is commonly referred to as Operation Ajax[7] after its CIA cryptonym, in Iran it is referred to as the 28 Mordad 1332 coup, after its date on the Iranian calendar.[8] Mosaddegh was imprisoned for three years, then put under house arrest until his death..." http://en.wikipedia.org/wiki/Mosaddeq