Total Pageviews

2/29/2012

HTTPS Everywhere | Electronic Frontier Foundation

HTTPS Everywhere | Electronic Frontier Foundation: "HTTPS Everywhere is a produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS.

Read More About HTTPS Everywhere »

Recent Releases
Stable releases for Firefox:
https-everywhere-2.0.1.xpi
https-everywhere-1.2.2.xpi
Development releases for Firefox:
https-everywhere-2.0development.6.xpi
https-everywhere-2.0development.5.xpi
Development releases for Chrome and Chromium!:
https-everywhere-2012.2.27.crx (beta)
https-everywhere-2012.2.9.crx (alpha)
Changelog.txt"

'via Blog this'

2/26/2012

The Abolition of Work--Bob Black

The Abolition of Work--Bob Black:


No one should ever work.

Work is the source of nearly all the misery in the world. Almost any evil you'd care to name comes from working or from living in a world designed for work. In order to stop suffering, we have to stop working.

That doesn't mean we have to stop doing things. It does mean creating a new way of life based on play; in other words, a *ludic* conviviality, commensality, and maybe even art. There is more to play than child's play, as worthy as that is. I call for a collective adventure in generalized joy and freely interdependent exuberance. Play isn't passive. Doubtless we all need a lot more time for sheer sloth and slack than we ever enjoy now, regardless of income or occupation, but once recovered from employment-induced exhaustion nearly all of us want to act. Oblomovism and Stakhanovism are two sides of the same debased coin.

The ludic life is totally incompatible with existing reality. So much the worse for "reality," the gravity hole that sucks the vitality from the little in life that still distinguishes it from mere survival. Curiously -- or maybe not -- all the old ideologies are conservative because they believe in work. Some of them, like Marxism and most brands of anarchism, believe in work all the more fiercely because they believe in so little else.

Liberals say we should end employment discrimination. I say we should end employment. Conservatives support right-to-work laws. Following Karl Marx's wayward son-in-law Paul Lafargue I support the right to be lazy. Leftists favor full employment. Like the surrealists -- except that I'm not kidding -- I favor full *un*employment. Trotskyists agitate for permanent revolution. I agitate for permanent revelry. But if all the ideologues (as they do) advocate work -- and not only because they plan to make other people do theirs -- they are strangely reluctant to say so. They will carry on endlessly about wages, hours, working conditions, exploitation, productivity, profitability. They'll gladly talk about anything but work itself. These experts who offer to do our thinking for us rarely share their conclusions about work, for all its saliency in the lives of all of us. Among themselves they quibble over the details. Unions and management agree that we ought to sell the time of our lives in exchange for survival, although they haggle over the price. Marxists think we should be bossed by bureaucrats. Libertarians think we should be bossed by businessmen. Feminists don't care which form bossing takes so long as the bosses are women. Clearly these ideology-mongers have serious differences over how to divvy up the spoils of power. Just as clearly, none of them have any objection to power as such and all of them want to keep us working.

'via Blog this'

9 Tips in Life that Lead to Happiness


9 Tips in Life that Lead to Happiness

Are you truly happy? Do you even know what it means to be happy and what it takes to achieve happiness? These are important questions for anyone who is seeking happiness to ask themselves. I live my life to maintain my own happiness while trying my best to not cause unhappiness to anyone else. If you want to be happy you need to understand that you can be happy and that you should be happy. Many people make the mistake of believing that they don’t deserve happiness and accept their unhappy state as their destiny. The truth of the matter is that happiness, like anything else in life, needs to be nurtured. The following are a few tips that I follow to create happiness in my life.
Happy
  1. Understand what it is that will make you happy. Everyone has unique requirements for attaining happiness and what makes one person happy may be very different from what makes someone else happy. Revel in your individuality and do not worry about whether or not your desires are comparable to those of your peers.
  2. Make a plan for attaining goals that you believe will make you happy. Your mood will very likely increase as your pursue your goal because you will feel better about yourself for going after something you value.
  3. Surround yourself with happy people. It is easy to begin to think negatively when you are surrounded by people who think that way. Conversely, if you are around people who are happy their emotional state will be infectious.
  4. When something goes wrong try to figure out a solution instead of wallowing in self pity. Truly happy people don’t allow set backs to affect their mood because they know that with a little thought they can turn the circumstances back to their favor.
  5. Spend a few minutes each day thinking about the things that make you happy. These few minutes will give you the opportunity to focus on the positive things in your life and will lead you to continued happiness.
  6. It’s also important to take some time each day to do something nice for yourself. Whether you treat yourself to lunch, take a long, relaxing bath or simply spend a few extra minutes on your appearance you will be subconsciously putting yourself in a better mood.
  7. Finding the humor in situations can also lead to happiness. While there are times that require you to be serious, when it is appropriate, find a way to make light of a situation that would otherwise make you unhappy.
  8. Maintaining your health is another way to achieve happiness. Being overweight or not eating nutritious foods can have a negative effect on your mood. Additionally, exercise has been known to release endorphins that give you a feeling of happiness.
  9. Finally, it is important to understand that you deserve happiness. Those who believe that they are not worthy of happiness may subconsciously sabotage their efforts to achieve happiness. If necessary, tell yourself each day that you deserve to be happy and remind yourself what steps you will take to achieve the happiness you desire.
Happiness is hard to define but most people are aware of whether they are happy or not. Many people believe that happiness is a form of luck and that some people are destined to be happy while others are destined to be unhappy. I try to incorporate the tips above into my life and have had great success in achieving happiness. The tips in this article are small but meaningful steps that you can take each day to lead you to true happiness.
Other Resources and References

Google Personal Growth Series: Mindsight: The New Science of - YouTube

Google Personal Growth Series: Mindsight: The New Science of - YouTube: ""

'via Blog this'

Motorola Atrix 2.3.6 Rooting procedure

I would be remiss if I did not post a sourced tutorial on rooting the excellent handset known as Motorola Atrix for the most recent software update (2.3.6).

Here is the link.

2/25/2012

BuggedPlanet - Surveillance Industry & Country's Actings [28C3] - YouTube

BuggedPlanet - Surveillance Industry & Country's Actings [28C3] - YouTube: ""

'via Blog this'

TRACY R. TWYMAN blog



7 Reasons Why We Need a Global Default



Last month the IMF released a series of policy papers recommending austerity measures for all Western countries, including the USA. The recommendations were reviewed by Howard Schneider at The Washington Post and summarized with the headline “For nations living the good life, the party’s over, IMF says.” The papers predictably called for things like the depression of wages, increasing taxes, and pushing back the retirement age. They also called upon the Western nations to devalue their currencies, including the US dollar. The IMF papers frankly implied that we all have been enjoying a standard of living that we didn’t deserve, thus the “party” headline. These sentiments were echoed by New York Times columnist Thomas Friedman, who denounced us all for eating through our post-World War II economic abundance “like hungry locusts”, and believing that the “tooth fairy” would somehow keep it all coming.

Friedman is not the only figure in the mainstream media and politics that has been pimping the idea of austerity measures to Americans, and implying that, through our laziness and greed, we have all brought this financial crisis on ourselves. Despite the fact that Americans are now working longer hours than any time in the last 40 years, with greatly increased productivity and ever-decreasing inflation-adjusted wages, and a steadily-declining standard of living, going without health care and forestalling retirement at unprecedented rates, people like Glenn Beck frequently state that we’re going to have to “tighten our belts” to save our children’s future prosperity. This has become the Republican co-opted version of the Tea Party’s new message of fiscal responsibility. In their world-view, it’s “conservative” to go along with austerity measures imposed by a privately-owned international corporate government entity, to accept higher taxes and the theft of your pensions and entitlements so that your government can make higher interest payments on an unpayable debt to banks.

But in fact, adopting these measures will condemn our children to a life of complete serfdom. The new taxes are never going to go away, the retirement age will never be lowered back down, and the pension money is never coming back. It will just be lost forever into the black hole that is the global banking system. The banks don’t need any more of our money. They make our money. What they need is more control over their slaves. The belt that is being tightened around us right now is one of bondage to corporate overlords through a debt that can never be paid.

What really needs to happen is that every country, every corporation, and every man and woman on Earth need to default on their debts to the banks. We need a global default. You know it, and I know it. But in case there’s anyone out there who doesn’t know it, allow me to give you the 7 main reasons why we must have a global default.

1. All debts were based on loans extended by private banks with money created out of nothing by fractional reserve lending, which is fraud.

2. The banks will not be losing anything, since they never had any money to begin with. They will only be losing the hope of ever collecting on the fraudulent debts they’ve created, which is all they ever lost in the first place. Think about it: the entire “credit crisis” that started in 2008 was a bunch of bankers having a hissy fit because they were unable to get people to pay off the fraudulent debts they created, even though any reasonable person, looking at the underlying debts, would have concluded from the very beginning that they were never going to be paid. It would be like if I ran up a bunch of debts on credit, with the expectation that I was going to be able to pay it back by winning the lottery. And when I didn’t win, I went crying to the government, demanding they pay me the lottery winnings I was expecting so that I can pay my bills. In this scenario, I didn’t anything. I just had an unrealistic expectation that I would win.
3. As Ellen Brown explains in my recent interview with her, countries do not need banks in order to create money. Therefore it is possible to create a solution wherein governments do not need to borrow from them in the future, and therefore we would then not need to worry about what they consider our government’s credit rating to be. Indeed, what does a “credit rating” mean coming from a banking cartel that has had to borrow trillions from taxpayers over the last 2 years just to stay in business?

4.The countries and banks that are bailing out other countries and banks are themselves bankrupt and in need of a bailout. In other words, the people of every nation on Earth, and indeed almost all corporations on Earth, would actually benefit immediately from a global default, even factoring in the lost revenue they would suffer because of their debtors defaulting on them. The end result would still be a net gain for almost everyone.

5. It is not possible to “tighten your belt” around a $700 trillion hole in the global credit markets caused by toxic derivatives that were created and sold through fraud. There is not enough wealth on Earth to pay for it all, nor will we ever be able to pay for it with the slave labor of our descendants, because compound interest will always make the debt larger.

6. We can cancel out most personal and corporate debts as well, since most of them were created in the same fraudulent manner as the sovereign debt. Since everyone’s now in debt and nobody has good credit, it’s only reasonable to level out the playing field by hitting the reset button, hopefully for the last and only time, to allow us all to begin building good credit again, and ideally, relying much less on credit at all in the future.

7. We can start almost from scratch right now to create national systems of finance and international trade mechanisms that are fair, functional, and sustainable, built on 21st century understandings of economics, built to function within 21st-century nation states. Ideally, this “system” would be much less “systematic” than the present one, much less centralized, and thus with much less risk of systematic failure.

There are a lot of different ideas about how to reform the system. We have explored some of them on this website and on our podcast already. We will continue to explore more ideas in the coming weeks. These ideas come from people with different economic philosophies and political persuasions, but the things they all agree on are that the current system is built on fraud, is responsible for creating many of our societal problems, and is doomed to catastrophic failure. So the idea here is, if the system is going to collapse, why let human civilization go down with it? Why not let the system of make-believe money and crushing debt collapse into its own footprint, while we create a parallel system that will prosper and carry on long after the former system is a dusty memory? There’s no need to allow real wealth, real assets, and real human labor to be tied any longer to the fate of fictional debt instruments.

Rockwell Collins EW-SIGINT solutions - YouTube

Rockwell Collins EW-SIGINT solutions - YouTube: ""

'via Blog this'

2/24/2012

EFF Files Suit to Block Threats Aimed at Lawyer Ratings Site EFF Files Suit to Block Threats Aimed at Lawyer Ratings Site EFF Files Suit to Block Threats Aimed at Lawyer Ratings Site

EFF Files Suit to Block Threats Aimed at Lawyer Ratings Site

Federal Law and First Amendment Protect Criticism of Attorneys and Law Firms
San Francisco - The Electronic Frontier Foundation (EFF) has filed suit in federal court to block threats aimed at LawyerRatingz.com, a website that allows Internet users to write comments and rate attorneys.
A Florida law firm – the Law Offices of Adrian Philip Thomas, P.A. – claims to have lost business based upon negative ratings and reviews posted on LawyerRatingz.com, which included complaints about Mr. Thomas, his billing rates, and his proposed contingency fees. The firm repeatedly threatened legal action against LawyerRatingz.com unless all comments – positive or negative – were removed from the site. LawyerRatingz.com, represented by EFF, filed suit Wednesday against Thomas and his firm, asking for a judicial ruling that LawyerRatingz.com is not legally responsible for material posted by third parties as well as an end to the baseless legal threats.
"Mr. Thomas's claims are meritless and run afoul of bedrock legal principles protecting website operators," said EFF Senior Staff Attorney Matt Zimmerman. "Section 230 of the Communications Decency Act categorically protects providers of 'interactive computer services' from suits such as this one seeking to make them responsible for the speech of their users. Without such protections, valuable sites like LawyerRatingz.com – or Facebook or Yelp or individual blogs that rely upon user comments – simply could not exist."
This is the latest example of legal threats issued to website operators that imply heightened reputational rights on behalf of professionals, such as doctors and lawyers, and demanding that critical reviews be removed. In a 2011 case, a California dentist sued review site Yelp, seeking to hold it responsible for critical reviews posted by a former patient. The case was ultimately dismissed and the dentist was forced to pay the reviewer's and Yelp's attorneys' fees. A website developed by Santa Clara and Berkeley law schools, DoctoredReviews.com, documents efforts by doctors to prohibit critical reviews of their care. In the declaratory relief suit filed Wednesday, LawyerRatingz.com argues that complaints about third party posts have to be taken up with reviewers themselves.
"CDA 230 plainly provides legal protection against these kinds of threats, but small website operators are nonetheless coerced by meritless demands that would ordinarily be too expensive to litigate," Zimmerman said. "Given the critical role played by intermediaries such as LawyerRatingz.com in providing platforms for Internet users to express their views, it is important to give force to those protections and encourage website operators to fight against baseless claims like these."
Contact:
Matt Zimmerman
   Senior Staff Attorney
   Electronic Frontier Foundation
   mattz@eff.org

2/23/2012

UK Sentinel study reveals GPS jammer use UK Sentinel study reveals GPS jammer use UK Sentinel study reveals GPS jammer use UK Sentinel study reveals GPS jammer use UK program to track GPS jamming


The Sentinel project, which has been running since January 2011, was designed to measure GPS jamming on UK roads. The project, run by GPS-tracking company Chronos Technology, picked up the illegal jamming incidents via four GPS sensors in trials lasting from two to six months per location.
GPS jammers
The government-funded Sentinel project has uncovered more than a hundred incidents of GPS jammer use in the UK since January 2011. Image credit: Tom Espiner




"The idea behind Sentinel is to detect and locate interference," Chronos Technology's divisional manager Andy Proctor told ZDNet UK on Wednesday. "Until you physically get a jammer in your hands you can't claim 100 percent it's a jammer, because you don't know what's been causing the interference."
The Sentinel field trials of GPS jamming involved sensors in different locations. One sensor placed in a city next to some docks and a two-lane link motorway found 67 incidents of vehicles using GPS jamming over a six-month period, according to Chronos Technology's managing director Charles Curry.
"These events were real and corroborated," Curry told ZDNet UK at the GNSS Vulnerability: Present Dangers, Future Threats 2012 conference.
GPS jammers work by broadcasting a strong local signal on the same frequency as GPS, effectively drowning the weak GPS signal broadcast by satellites. People illegally jam GPS for a number of reasons, Curry told the audience at the conference at the National Physical Laboratory. These include evasion of company-vehicle or covert tracking, and stealing high-value vehicles.
In prior trials, a white van driver using GPS jamming had been apprehended by police, said Curry. The man, who was not brought to trial, was using jamming to evade company GPS tracking. ZDNet UK understands the man was apprehended as part of trials of GAARDIAN, a preceding technology to Sentinel. GAARDIAN trials ran from 2008 to 2011.

Sentinel project

Sentinel now has 20 sensors deployed in different parts of the country, Curry told the conference. The £1.5m Sentinel project is funded by the ICT Knowledge Transfer Network, and its partners includeACPOOrdnance Survey, the National Physical Laboratory, the General Lighthouses Authority (GLA), the University of Bath, and Thatcham Security. Sensors tend to be deployed in premises owned by these organisations.

Tracking the shadow government by the numbers...

Shadow government statistics.

2/21/2012

Securitization, Dual State and US-European Geopolitical Divide or The Use of Terrorism to Construct World Order


Securitization, Dual State and US-European Geopolitical Divide or The Use of Terrorism to Construct World Order
In any state, certain areas are ‘securitized’ and by definition removed from the democratic political process. In an emergency situation – in short of war or terrorist attacks – the security sphere ‘invades’ the sphere of democratic politics. An autocratic security force or ‘security state’ appears to act in parallel to the regular democratic state, and this duality or ‘dual state’ was described by Hans Morgenthau already in 1955. After September 11, terrorism has become an instrument to ‘securitize’ what used to be public and tilt the ‘dual state’-balance in favour of the ‘security state’. The US ‘security state’ with its intelligence hegemony enters the scene as global protector that defines the world order in terms of a Pax Americana. Terrorism is used to construct a new world order. This development has been followed by mutual transatlantic accusations between European critiques and US neo-conservatives. According to the critiques, the Strategy of Tension, as we know it from Cold War Europe, has received a global dimension. During the Cold War, the US ‘dual security structure’ – with its specifically tasked units masquerading as ‘enemy forces’ – was developed by the US ‘security state’ in order to keep the political strength and the readiness and capability of the Western defences. Now, this structure has seemingly been made into a self-propelled mechanism that is able to transform the world order into a Pax Americana.


ATIX

ATIX: "What is RISS ATIX?
RISS recognizes the need for information exchange to extend beyond law enforcement. To fulfill this need, in 2002, RISS launched the Automated Trusted Information Exchange (ATIX) to expand communication and information sharing to public safety and private sector officials. RISS ATIX is a communications system that allows authorized users to share terrorism and homeland security information in a secure, real-time environment. These RISS ATIX™ participants include executives and officials from governmental and nongovernmental entities. Participants are designated into specific communities based on their role regarding the prevention, response, mitigation, and recovery efforts related to disasters or other public safety or law enforcement efforts. These RISS ATIX "communities" are those governmental and nongovernmental organizations involved in prevention and response efforts regarding disasters, terrorism, and other public safety matters. RISS ATIX communities include entities such as local, county, state, and tribal levels of emergency management, law enforcement, private security, environmental protection, banking and finance, and hospitality industries. New communities are added to RISS ATIX as the service expands to encompass more entities involved in local and national security.
"

'via Blog this'

Retirement of FB profile (sock puppet)

Have deleted my fb profile (sock puppet). The idea that I had a soap box was counter productive in the end, and largely a waste of my time and probably also those select persons who I also spewed invective. I think I'm going to take a break and when I return develop a nicer agent-ontology that is just focused on making people feel better and working through their problems instead of faux rebellion and arm chair slacktivism. In the meantime I need to find meaningful work, preferrably in the IT field as that is where my marketable talents lie.

There is something about interacting with other people on fb that gets my hackles up and as a result I often end of saythings I don't mean and regret later. So from here on out, I'm really going to focus on maintaining a consistent standard and ethic, to wit: to only use the internet soap box to make people feel better.

For a while now I have been focused on developing propreitary agent ontologies for social networking cites. Unfortunately, I haven't gotten  much mileage out of the concept and am having to discard the enterprise in favor of more conventional venues of employment, revenue income i.e. working somewhere in the IT sector, hopefully not too bad a position, anything but desktop support. So wish me luck!

Terror comes to Suburbia

This is a fascinating video, not so much for it's content as it's implications as they relate to the popular mind. OPSGEAR is a company that targets "tactical training" products to a civilian and law enforcement audience. I suspect their bread and butter customers are the suburban "tactical" minded middle class American male (who is increasingly unaffiliated with military or law enforcement). What is interesting about these sorts of companies and their unique training products is the fact that they are duel use, that is this training can serve both terror and counter terrorism operations.

Perhaps no greater practical joke can be orchestrated than blowing a door off it's hinges, shooting standing persons with 12 gauge baton rounds, hog tying and placing of zip tie restraints, and being secreted away a la extraordinary rendition style. Who are these men with guns? Who are the men in the room and why must one be taken away in so secure manner?

Terrorism and the war on terror in suburbia is nothing new. Suburban life in the US is stultifying for the youth who seek, through acts of mild terror, adventure as a means to escape the terror of perpetual and unremitting boredom. What is new is the influx of law enforcement style weapons and tactics into the suburban mind. For the "training up" of our suburban youth in this matter we have the internet to thank.

Doubtless we will evolve as a society in the US to one which tolerates the near daily use of drone strikes on US citizens inside US territory. The causalities will be light compared to casualties suffered by civilian populations in previous wars, like WWII for example. The end goal, which is to terrorize the population, remains the same. The only difference is that the US government, under the auspices of defeating terrorism by "targeted killing", is in reality organizing a type of technological terror on the body politic.

Watch "OPSGEAR® Commercial "Get your own Bala" RAID" on YouTube

2/20/2012

U.S. Army Intelligence: Subversion and Espionage Directed Against the Army (SAEDA) | Public Intelligence

U.S. Army Intelligence: Subversion and Espionage Directed Against the Army (SAEDA) | Public Intelligence: "U.S. Army Intelligence: Subversion and Espionage Directed Against the Army (SAEDA)
April 7, 2010 in U.S. Army

SAVANNAH FIELD OFFICE 308th MI BATTALION
902d MI GROUP
17 pages
For Official Use Only
March 23, 2010


THE ARMY’S SAEDA PROGRAM

REGULATORY GUIDANCE

1. Directed by Army Regulation 381-12, titled Subversion and Espionage Directed Against the Army (SAEDA)”

2. Directs “all members of the Army, Military and Civilian, be knowledgeable of their reporting responsibilities under this regulation… This has been mandated by the President of the United States in National Security Decision Directive 197”

3.Requires that all Army Personnel Receive a Current SAEDA Briefing at least on an Annual Basis

4.ALARACT 322-2009

"

'via Blog this'

(U//FOUO) U.S. Army Military Intelligence Reference Guide | Public Intelligence

(U//FOUO) U.S. Army Military Intelligence Reference Guide | Public Intelligence: "Military Intelligence Publication 2-0.1 Intelligence Reference Guide
416 pages
For Official Use Only
June 2010
97.5 MB
"

'via Blog this'

EFF FBI CIPAV


What is CIPAV and How Does It Work?
The documents discuss technology that, when installed on a target's computer, allows the FBI to collect the following information:
  • IP Address
  • Media Access Control (MAC) address
  • "Browser environment variables"
  • Open communication ports
  • List of the programs running
  • Operating system type, version, and serial number
  • Browser type and version
  • Language encoding
  • The URL that the target computer was previously connected to
  • Registered computer name
  • Registered company name
  • Currently logged in user name
  • Other information that would assist with "identifying computer users, computer software installed, [and] computer hardware installed"3
It's not clear from the documents how the FBI deploys the spyware, though Wired has reported that, in the Washington state case, the FBI may have sent a URL via MySpace's internal messaging, pointing to code that would install the spyware by exploiting a vulnerability in the user's browser. Although the documents discuss some problems with installing the tool in some cases, other documents note that the agency's Crypto Unit only needs 24-48 hours to prepare deployment.4 And once the tool is deployed, "it stay[s] persistent on the compromised computer and . . . every time the computer connects to the Internet, [FBI] will capture the information associated with the PRTT [Pen Register/Trap & Trace Order].5

Interestingly, a commentator on Schneier blog had this to say about possibly defeating said trojan:

@ Dirk Praet,
"The real question here however is to which extent governments and their TLA's have agreements with anti-virus and anti-malware vendors to not detect their spyware."
That is a significant consideration, but AVetc software from the major vendors is not going to be the Feebies only concern.
For instance I will assume that as others have noted the spy ware has occasionaly to do an ET and "phone home", the question is how?
The simplest and most visable is if it sends a packet or two of to an 'unknown to the user' IP address that is the Feebies gateway. If the user has IP based whitlist software (which is appearing on homebrew routers) then it's going to throw an exception at the Feebies gateway IP address. Likewise if the user sets the machine up in a "honeypot" style environment.
More covertly it modifies the users browser and hides in their facebook traffic. This would be harder to spot but not impossible. Hardest would be using the timing between packets etc which could be either logged at the ISP or if sufficiently low bandwidth by the end service provider.
Now this makes me think that the Feebies (who supposadly don't currently have ISP cooperation to the level required) would have to either be at some mid point or getting co-operation from the service provider such as facebook the user had this malware downloaded from.
So it's not just the AV vendors you need to be considering but the likes of facebook etc. as well...
Posted by: Clive Robinson at May 12, 2011 1:34 PM

Radio monitoring and surveillance ...

Watch "Rhode & Schwarz Radio Monitoring" on YouTube

Interesting case study with Greece.

2/19/2012

Concealed Carriers [OFFICIAL TRAILER] - YouTube

Concealed Carriers [OFFICIAL TRAILER] - YouTube: ""

'via Blog this'

Why don't all Police have to wear cameras?

Burnsville Police's Camera Tech Captures Tense Incident « CBS Minnesota.wmv - YouTube: ""

'via Blog this'

Hood Life Volume 3 Full Movie - YouTube

Hood Life Volume 3 Full Movie - YouTube: ""

'via Blog this'

ISPConfig – Hosting Control Panel

ISPConfig – Hosting Control Panel: "ISPConfig 3.0.4. released
ISPConfig 3.0.4 is available for download. This release is a major update and introduces new functions like:
Virtual server management module
Full support for Nginx webserver
Mailman mailinglist management
IPv6 support
FAQ section in Help module
Website folder protection
Assign IP addresses to clients
SNI support for Apache/nginx SSL certificate
New remote-API documentation and example scripts for all functions
Added support for key based SSH logins"

'via Blog this'

Install Ubuntu LAMP Server 10.04 LTS with SSH - YouTube

Install Ubuntu LAMP Server 10.04 LTS with SSH - YouTube: ""

'via Blog this'

Modular datacenter concept - container datacenter model - YouTube

Modular datacenter concept - container datacenter model - YouTube: ""

'via Blog this'

Oceanspace Container Data Center - Huawei Symantec - YouTube

Oceanspace Container Data Center - Huawei Symantec - YouTube: ""

'via Blog this'

2/17/2012

Plain Words

Plain Words:

'Plain Words' was found at the site of a series of bombings against capitalist targets in 1919, including billionaire John D. Rockefeller and Attorney General Alexander Palmer. The primes suspects were Galleanists, followers of insurrectionary anarchist Luigi Galleani (1861-1831), founder and editor of the newspaper 'Cronaca Sovversiva.' Published for over 15-years almost entirely in Italian, the magazine made a strong case for "propaganda by the deed," that is: revolutionary violence as opposed to simply propaganda by the word. The Galleanists tried to put the ideas into practice; for example, a Chicago chef added arsenic to the soup for 200 at a banquet to honor Archbishop Mundelein (no one died - he added too much poison and it was all vomited back up). The June 1919 bombings did kill three - one of the bombers, a woman walking by, and a night watchman; in contrast, from 1914 to 1918, tens of millions were maimed or killed in the capitalists' first World War.

'via Blog this'

Inside The Anarchist's Tool Chest DVD Trailer - YouTube

Inside The Anarchist's Tool Chest DVD Trailer - YouTube: ""

'via Blog this'

The Beaglebone - Unboxing, Introduction Tutorial and First Example - YouTube

The Beaglebone - Unboxing, Introduction Tutorial and First Example - YouTube: ""

'via Blog this'

Brandenburg v. Ohio (1969) - YouTube

Brandenburg v. Ohio (1969) - YouTube: ""

'via Blog this'

2/15/2012

No Treason: The Constitution of No Authority | by Lysander Spooner - YouTube

No Treason: The Constitution of No Authority | by Lysander Spooner - YouTube: "
"


Lysander Spooner (1808-1887) is the American individualist anarchist and legal theorist known mainly for setting up a commercial post office in competition with the government and thereby being shut down. But he was also the author of some of the most radical political and economic writings of the 19th century, and continues to have a huge influence on libertarian thinkers today. He was a dedicated opponent of slavery in all its forms — even advocating guerrilla war to stop it — but also a dedicated opponent of the federal invasion of the South and its postwar reconstruction.

Read 'No Treason: The Constitution of No Authority' online: http://oll.libertyfund.org/?option=com_staticxt&staticfile=show.php%3Ftit...

Links to more writings by Lysander Spooner:

Let's Abolish Government
http://mises.org/resources/3450

Vices Are Not Crimes: A Vindication Of Moral Liberty
http://www.lysanderspooner.org/VicesAreNotCrimes.htm

The Unconstitutionality of Slavery
http://oll.libertyfund.org/index.php?option=com_staticxt&staticfile=show....

The Collected Works of Lysander Spooner
http://oll.libertyfund.org/index.php?option=com_staticxt&staticfile=show....

The Brilliant But Confused Radicalism of George Orwell | by Jeff Riggenbach - YouTube

The Brilliant But Confused Radicalism of George Orwell | by Jeff Riggenbach - YouTube: ""

'via Blog this'

FBI — N-DEx: Welcome to the Future

FBI — N-DEx: Welcome to the Future:
"That’s now changing, thanks to the Law Enforcement National Data Exchange, or N-DEx.

N-DEx is what you might expect: a national information-sharing system available through a secure Internet site for law enforcement and criminal justice agencies. N-DEx allows agencies to search and analyze data using some powerful automated capabilities, helping to connect the dots between people, places, and events.

Given its experience with such systems, our Criminal Justice Information Services Division in West Virginia was asked by the Department of Justice to develop and maintain N-DEx in close consultation with our law enforcement partners.

Following a successful prototype, we launched the first phase of N-DEx last month to a controlled number of agencies. Right now, the system includes several basic but vital capabilities, including searching and correlating incident/case report information and arrest data to help resolve entities (determining a person’s true identity despite different aliases, addresses, etc.). N-DEx will also create link analysis charts to assist in criminal investigations and identify potential terrorist activity.

Once fully operational and fully deployed in 2010, N-DEx will include a full range of capabilities, including:

Nationwide searches from a single access point;
Searches by “modus operandi” and for clothing, tattoos, associates, cars, etc.—linking individuals, places, and things;
Notifications of similar investigations and suspects;
Identification of criminal activity hotspots and crime trends;
Threat level assessments of individuals and addresses; and
Visualization and mapping features."
'via Blog this'

The Man Who Was Thursday - Wikipedia, the free encyclopedia

The Man Who Was Thursday - Wikipedia, the free encyclopedia: "In Edwardian era London, Gabriel Syme is recruited at Scotland Yard to a secret anti-anarchist police corps. Lucian Gregory, an anarchistic poet, lives in the suburb of Saffron Park. Syme meets him at a party and they debate the meaning of poetry. Gregory argues that revolt is the basis of poetry. Syme demurs, insisting that the essence of poetry is not revolution, but rather law. He antagonizes Gregory by asserting that the most poetical of human creations is the timetable for the London Underground. He suggests that Gregory isn't really serious about his anarchism. This so irritates Gregory that he takes Syme to an underground anarchist meeting place, revealing that his public endorsement of anarchy is a ruse to make him seem harmless, when in fact he is an influential member of the local chapter of the European anarchist council."

'via Blog this'

Espionage Act of 1917 Espionage Act of 1917 Espionage Act of 1917


Contrary to the Espionage Act of 1917, Promotion of insubordination in the military is constitutional when that insubordination has, as it's end goal, the cessation of orders which are un-constitutional.



War at home

Eventually, the rest of the world doesn't want the US intervention, so the only war we can fight is the one at home...against the domestic population.



2/14/2012

DEMO 2011: NeuroSky brain wave monitor game - YouTube

DEMO 2011: NeuroSky brain wave monitor game - YouTube: ""

'via Blog this'

EAA / Tanfoglio Witness-P (Silent Review) - YouTube

EAA / Tanfoglio Witness-P (Silent Review) - YouTube: ""

'via Blog this'

"Bury a gun in your back yard program" - YouTube

"Bury a gun in your back yard program" - YouTube: ""

'via Blog this'

Carl Ransom Rogers


from the great wikipedia

His theory (as of 1951) was based on 19 propositions:[12]
  1. All individuals (organisms) exist in a continually changing world of experience (phenomenal field) of which they are the center.
  2. The organism reacts to the field as it is experienced and perceived. This perceptual field is "reality" for the individual.
  3. The organism reacts as an organized whole to this phenomenal field.
  4. A portion of the total perceptual field gradually becomes differentiated as the self.
  5. As a result of interaction with the environment, and particularly as a result of evaluational interaction with others, the structure of the self is formed - an organized, fluid but consistent conceptual pattern of perceptions of characteristics and relationships of the "I" or the "me", together with values attached to these concepts.
  6. The organism has one basic tendency and striving - to actualize, maintain and enhance the experiencing organism.
  7. The best vantage point for understanding behavior is from the internal frame of reference of the individual.
  8. Behavior is basically the goal-directed attempt of the organism to satisfy its needs as experienced, in the field as perceived.
  9. Emotion accompanies, and in general facilitates, such goal directed behavior, the kind of emotion being related to the perceived significance of the behavior for the maintenance and enhancement of the organism.
  10. The values attached to experiences, and the values that are a part of the self-structure, in some instances, are values experienced directly by the organism, and in some instances are values introjected or taken over from others, but perceived in distorted fashion, as if they had been experienced directly.
  11. As experiences occur in the life of the individual, they are either, a) symbolized, perceived and organized into some relation to the self, b) ignored because there is no perceived relationship to the self structure, c) denied symbolization or given distorted symbolization because the experience is inconsistent with the structure of the self.
  12. Most of the ways of behaving that are adopted by the organism are those that are consistent with the concept of self.
  13. In some instances, behavior may be brought about by organic experiences and needs which have not been symbolized. Such behavior may be inconsistent with the structure of the self but in such instances the behavior is not "owned" by the individual.
  14. Psychological adjustment exists when the concept of the self is such that all the sensory and visceral experiences of the organism are, or may be, assimilated on a symbolic level into a consistent relationship with the concept of self.
  15. Psychological maladjustment exists when the organism denies awareness of significant sensory and visceral experiences, which consequently are not symbolized and organized into the gestalt of the self structure. When this situation exists, there is a basic or potential psychological tension.
  16. Any experience which is inconsistent with the organization of the structure of the self may be perceived as a threat, and the more of these perceptions there are, the more rigidly the self structure is organized to maintain itself.
  17. Under certain conditions, involving primarily complete absence of threat to the self structure, experiences which are inconsistent with it may be perceived and examined, and the structure of self revised to assimilate and include such experiences.
  18. When the individual perceives and accepts into one consistent and integrated system all his sensory and visceral experiences, then he is necessarily more understanding of others and is more accepting of others as separate individuals.
  19. As the individual perceives and accepts into his self structure more of his organic experiences, he finds that he is replacing his present value system - based extensively on introjections which have been distortedly symbolized - with a continuing organismic valuing process.
Additionally, Rogers is known for practicing "unconditional positive regard," which is defined as accepting a person "without negative judgment of .... [a person's] basic worth."[13]