Total Pageviews

3/31/2012

Advanced packet analysis and the end of interpersonal violence in technologically advanced Western societies.

In Ira Levin's book "This Perfect Day" the computer was more of an economic and transportation recorder than a personality or agent program that its top level users accessed. The need for a centralized system is no longer necessary nor great concentration pf computer resources, merely the collection and storage of sufficient data.

It seems that the packet analysis systems deployed by the security forces to cover and collect digital network traffic has resulted in a tremendous advance in law enforcement capacity. Public safety has never been better and stands only to improve by leaps and bounds as digital devices expand into all levels of the public space.

The reduction of interpersonal violence from advanced digital forensics and surveillance means that perpetrators are nearly always caught with a high degree of precision, and may increasingly be expected to be intercepted through advanced "real time" intelligence. The possibility that interpersonal violence, which is the most egregious form of (possibly preventable) human suffering is on the decline has been noted by philosophers such as Steven Pinker, for example. That interpersonal violence is on the decline in western countries is perhaps increasingly attributable to this trend in lawful intercept surveillance technology, increasing penetration of mobile devices, and the almost exponential process of increasing transistor density.

Violence as a means to an end or an end in and of itself is increasingly being disclosed as an impossibility (or an irrational one-off event at worst) in technologically advanced western countries. The use of violence as a means to some end is almost always invariably contrary to the stated end desired but that is a philosophical topic to be discussed else where. The securitization of suburban and urban space and ensuing enhancement of public safety is a great achievement akin to a rocket program or nuclear power.  Just as nuclear power and rockets, surveillance and expert analysis monitoring programs require adequate safeguards in place in order to prevent this network management style from degenerating into a myriad of  dystopian possibilities. 

We must admit that the technology of Orwell's 1984 has been deployed as a means to enhance public safety without necessarily devolving into a dictatorship of repression, at least in the US. The neo-conservatives and the neo-liberal factions have steered a careful course so far. They deserve at least to some extent the benefit of the doubt from a historical perspective by, for example, inheriting and not using the cold war nuclear weapons complex.

We (US and European citizens) may encounter ( if we are not currently already experiencing ) a computer-ized analysis which examines the individual behind the IP address that their networked devices and workstations pull. These individuals are examined through an automated process such as a special forensic psychologist social monitoring "expert AI" system perhaps like IBM Watson for law enforcement.* These systems are increasingly sophisticated and nuanced in the execution of their tasks. They may also be useful for detecting the operation of foreign intelligence and espionage agents or cells operating within a give you geographical area. Not only is this network capable of sniffing out the would be violent actors, but it is also able to detect and unmask the spys. The only persons who are not subject to this regime of monitoring would be those persons who are working under the false identity of under cover domestic spy and Leo agents.

*Of course we may reserve a more narrow definition. For "expert" in the sense that the computer or server cluster is a natural language capable engine capable of limited hypothesis testing and so on.


A tour of IBM's brain chip lab - YouTube

A tour of IBM's brain chip lab - YouTube: ""

'via Blog this'

IBM, Please Release Intelligence! SyNAPSE (Part 2) - YouTube

IBM, Please Release Intelligence! SyNAPSE (Part 2) - YouTube: ""

'via Blog this'

Interview with Supreme Master Ching Hai by James Bean - YouTube

What makes this so epic is the promulgation of veganism-as-law. Veganism does make more sense, and Supreme Master TV throws that sense at you in a pleasant, but still relentless stream.

Interview with Supreme Master Ching Hai by James Bean - YouTube: ""

'via Blog this'

Not april fools dystopia article

http://www.antipope.org/charlie/blog-static/2012/03/not-an-april-fool-1.html

" The problem is this: all social networks run on the principle that if you're not paying for the product,you are the product. They operate as profitable businesses because they encourage users to channel their social interactions via their network,perform data mining on the interests that users disclose,and present the users with advertisements tailored to their interests (which are consequently much more likely to result in a successful sale).
However,to make such micro-targeted advertising practical,the social networks need to motivate their users to disclose information relevant to advertisers. There's no point marketing bacon to Jews or Muslims,so religion is relevant. There's no point marketing turkey to vegans or wheat products to coeliacs, so dietary preferences and medical conditions are relevant. If a user is a member of a subculture associated with a distinctive clothing fashion,that information is relevant to garment vendors. And so on. So Facebook,Orkut,G+ and so on all attempt to induce their users to maximize their self-disclosure and to tie their accounts to as many useful third-party information sources as possible.
You may have noticed that Facebook provides privacy controls,for those who are sufficiently worried about stranger danger to want some illusion of control. Unfortunately the vast majority of people have no idea how widely visible "show to all" really is,or that it might enable the users of apps like "Stalking Targets Around Me" to identify and track them. And it is not in Facebook's commercial interest to promote the use of privacy controls. If someone is using the privacy controls with all the settings jacked up to 11,it becomes very unlikely that long-lost friends and relatives will be able to make contact with them through Facebook. Which is a lost advertising opportunity,and therefore detrimental to the revenue stream."

Kremlin Secret Files: Magic pills for Soviet leaders - YouTube

Kremlin Secret Files: Magic pills for Soviet leaders - YouTube: ""

'via Blog this'

Speeding up?

Colossus the forbin- project: 1970
Minority report: 2002

What year at the rate of movie technology user interface assumptions will minority report seem dated and agonizingly slow user interface?

3/30/2012

Is it a real Ak? Or is it airsoft?

FBI — Wanted by the FBI: The AK-47 Bandit

Interesting piece pf tradecraft: " Prior to the bank robbery, a threat was called into the 911 dispatch center from a pay phone in the general vicinity of the bank by a male caller. Investigators believe the suspect employed a diversionary tactic in an attempt to delay officers responding to the bank robbery. The suspect was seen leaving the scene in a vehicle described as a late-model, dark gray, four-door Nissan Maxima with chrome trim and tinted windows."

Sword of Gideon

Watch "Меч Гедеона / Sword of Gideon (1986)" on YouTube

Classic of tradecraft, spy genre, general mid east conflict and added bonus dubbed in Russian.

Interesting look at Black September Modus Operandi

Fake friends

http://fakefriends.me/

3/27/2012

Orlly? "Conspiracy charges dropped against Hutaree militia"



Why are there only ~32 news sources reporting this story? Why isn't it being carried on the networks that originally "broke" the "story?" Why is the Detroit Free Press, for example, reporting it ? 
"A federal judge dismissed the most serious charges Tuesday against seven members of a Michigan militia who were rounded up as homegrown extremists accused of plotting war against the U.S., saying their expressed hatred of law enforcement didn't amount to conspiracy against the government.
The judge had a lot of guts," defense attorney William Swor said. "It would have been very easy to say, 'The heck with it,' and hand it off to the jury. But the fact is she looked at the evidence, and she looked at it very carefully."
Another attorney, Richard Helfrick, said: "It's a good day for the First and Second amendments."
The trial, which began Feb. 13, will resume Thursday with only a few gun charges remaining against militia leader David Stone and son Joshua Stone, both from Lenawee County, Mich. They have been in custody without bond for two years."

Video showing Iphone and Android handsets security cracking


Slashdot is reporting this interesting video from this site. The wikileaks spy files (not related to the intelligence files) has been eye-opening reading. I wonder if vast document dumps like the spy files are any way to convince the public that they should cease cooperating with the fascist secret police apparatus and start making life harder (by becoming knowledgeable, for example, about COMSEC and OPSEC for starters). I think America is still asleep, and they don't want to wake up to the reality that we are rapidly moving into a dark technologically-empowered dystopia. We already live in a techno-empowered dystopia, but it seems if the present is any guide then the future is only going to get worse.

So what to file this post under? Tradecraft series? Showing the necessity of encrypting phones and sensitive documents? I would argue that, if nothing else, it is important to carry a lot of "white noise" on your handset and your laptops. Documents can easily be gotten from scribd which cover a variety of counter-terrorism topics which also happen to look, from a cursory glance, like terrorism related topics. One of the many down-sides to this police-state false-flag counter-terrorism propaganda used as a justification for the encroaching dystopian techno-dictatorship is that it produces a lot of documents and materials which are, for all interested parties, manuals on terrorism and terror operations.

These documents should be contained on everyone's phone in the highly unlikely event you are detained and your computers seized. The more citizens (read:"suspects") throw false positives the harder the system has to work. One goal of the concerned citizen is to nudge our system of state-sponsored unlawful domestic surveillance and suppression of political dissent into it's own paranoid world of delusions and unreality. When one thinks on the subject it becomes obvious that without too much effort it is very easy to "muddy the waters."

On the other hand, most persons (sheeple) think that since they "have nothing to hide" they have nothing to fear and therefore no reason to resist what is still very much an opaque and esoteric government surveillance apparatus. Many persons are already wary of researching any topic via the internet that might even remotely "put them on a list." The irony is that they are already on a list if they are connecting to the internet, and that "list" creation is largely a result of sophisticated packet switching interception equipment installed parallel to the service providers lines, transmission towers, etc. Many persons, who are bystanders still unmolested by the heavy hand of the Orwellian state, wish to remain at least for all outward appearances as bystanders. Unfortunately, as wikileaks spy files shows us, we are all subject to regimes of automated interception, inspection, and surveillance.




"As the video shows, a Micro Systemation application the firm calls XRY can quickly crack an iOS or Android phone’s passcode, dump its data to a PC, decrypt it, and display information like the user’s GPS location, files, call logs, contacts, messages, even a log of its keystrokes.
Mike Dickinson, the firm’s marketing director and the voice in the videos, says that the company sells products capable of accessing passcode-protected iOS and Android devices in over 60 countries. It supplies 98% of the U.K.’s police departments, for instance, as well as many American police departments and the FBI. Its largest single customer is the U.S. military.  ”When people aren’t wearing uniforms, looking at mobile phones to identify people is quite helpful,” Dickinson says by way of explanation.
With smartphone adoption rocketing around the world, Dickinson says Micro Systemation’s “business is booming.” The small company has grown close to 25% in revenue year-over-year, earned $18 million in revenue in 2010 up from $12 million the year before, and doubled its employees since 2009.
“It’s a massive boom industry, the growth in evidence from mobile phones,” says Dickinson. “After twenty years or so, people understand they shouldn’t do naughty things on their personal computers, but they still don’t understand that about phones. From an evidential point of view, it’s of tremendous value.”
“If they’ve done something wrong,” he adds.
XRY works much like the jailbreak hacks that allow users to remove the installation restrictions on their devices, Dickinson says, though he wouldn’t say much about the exact security vulnerability that XRY exploits to gain access to the iPhone. He claims that the company doesn’t use backdoor vulnerabilities in the devices created by the manufacturer, but rather seeks out security flaws in the phone’s software just as jailbreakers do, one reason why half the company’s 75 employees are devoted to research and development. “Every week a new phone comes out with a different operating sytems and we have to reverse engineer them,” he says. “We’re constantly chasing the market.”
After bypassing the iPhone’s security restrictions to run its code on the phone, the tool “brute forces” the phone’s password, guessing every possible combination of numbers to find the correct code, as Dickinson describes it. In the video above, the process takes seconds. (Although admittedly, the phone’s example passcode is “0000″, about the most easily-guessed password possible.)"

3/26/2012

German Revolution of 1918–1919 - Wikipedia, the free encyclopedia

German Revolution of 1918–1919 - Wikipedia, the free encyclopedia: "The revolutionaries, inspired by communist ideas, failed to hand power to soviets as the Bolsheviks had in Russia, because the Social Democratic Party of Germany (SPD) leadership refused to work with those who supported the Bolsheviks. Furthermore, fearing an all-out civil war in Germany between the communists and the reactionary conservatives, the SPD did not plan to completely strip the old imperial elites of their power and instead sought to integrate them into the new social democratic system. In this endeavour, SPD leftists sought an alliance with the Supreme Command. The army and Freikorps (nationalist militias) quelled the Spartacist uprising by force. The political fragmentation among the left-wing was a significant factor in the failure of the left to seize power.

The revolution ended officially on 11 August 1919, when the Weimar Constitution was adopted."

'via Blog this'

Ludwig Mies cont...


"Significance and meaning

Mies pursued an ambitious lifelong mission to create a new architectural language that could be used to represent the new era of technology and production. He saw a need for an architecture expressive of and in harmony with his epoch, just as Gothic architecture was for an era of spiritualism. He applied a disciplined design process using rational thought to achieve his spiritual goals. He believed that the configuration and arrangement of every architectural element must contribute to a unified expression.
The self-educated Mies painstakingly studied the great philosophers and thinkers, past and present, to enhance his own understanding of the character and essential qualities of the technological times he lived in. More than perhaps any other practising pioneer of modernism, Mies mined the writings of philosophers and thinkers for ideas that were relevant to his architectural mission. Mies' architecture was created at a high level of abstraction, and his own generalized descriptions of his principles intentionally leave much room for interpretation. Yet his buildings also seem very direct and simple when viewed in person.
Every aspect of his architecture, from overall concept to the smallest detail, supports his effort to express the modern age. The depth of meaning conveyed by his work, beyond its aesthetic qualities, has drawn many contemporary philosophers and theoretical thinkers to continue to further explore and speculate about his architecture."

Ludwig Mies van der Rohe - Wikipedia, the free encyclopedia

Ludwig Mies van der Rohe - Wikipedia, the free encyclopedia: "The design theories of Adolf Loos found resonance with Mies, particularly the ideas of eradication of the superficial and unnecessary, replacing elaborate applied ornament with the straightforward display of materials and forms. Loos had famously declared, in the tongue-in-cheek humor of the day, that "ornament is a crime". Mies also admired his ideas about the nobility that could be found in the anonymity of modern life."

'via Blog this'

3/24/2012

Crowder Argues Gun Rights With Leftist! - YouTube

RT's failure to understand the American franchise is evidence. But then again RT is an attempt by the RussFed to demoralize and neutralize America. Now this antagonism is understandable given the US's antagonism during the cold war and even to this day. That said RT want's the US disarmed so we will be more vulnerable to UN intervention if/when that day comes. Crowder does a decent job defending the franchise. Worth watching.

Crowder Argues Gun Rights With Leftist! - YouTube: ""

'via Blog this'

3/23/2012

Moving Towards Full Spectrum Dominance


Although semanticists say that ‘the map is not the territory’, within this digitized age the territory is increasingly becoming the map and the separation between the physical and the digitized rendition is blurring. In this context, to ‘know the map’ gives priority to intervene upon the physical.

In recent years many of us have been scrambling to get ‘on the Net’ and thus be ‘mapped’; within a few years we may find that living ‘off the Net’ will no longer be an option.

It is my argument that the future direction of present technological emergence is one that seeks to go beyond networks; rather it is towards ubiquitous technologies that offer a complete immersive (or rather ‘sub-mersive’) experience of a digitized environment.

With networks there is always the possibility of moving into the grey and illusive areas in-between.

These are the areas where the networks do not, or cannot, cover; neglected zones of poverty and risk, and insecure zones of warlord regions, and smuggling zones. With immersive technological mapping there may one day be no ‘spaces in-between’; the distinction between ‘in’ and ‘out’ dissolved; boundaries melted away under the digital gaze.

In this article I argue that the US military-industrial complex is attempting to gain full dominance over the complete information spectrum, including dominating the electro-magnetic spectrum and the Internet, in order to gain full total coverage for purposes ofcontainment and control.

Source: 

Location Cache - Android Apps on Google Play

Location Cache - Android Apps on Google Play: "Description
Where was your device?
ROOT REQUIRED
DOES NOT WORK ON ICS Android 4.0
You probably heard that the iPhone caches the devices location.
The same happens on Android.
This app allows you to look at the data on your device in an easy way.
You can see directly on a map what positions have been cached.
If it doesn't find any informations you most likely turned of "Use wireless networks" under "Location & Security" settings.
Features
- view list
- view on map
- export gpx file
- delete cache (can not be undone)
- delete and block (use wireless for location keeps working but no data will be cached on the disk)
Premissions
- INTERNET needed for the map (no internet = no map)
- WRITE EXTERNAL MEDIA (SD) needed for GPX export to the SDCard

- Use the red buttons on your own risk!
- Source code is on github (website link below)
- The screenshots are blurred for privacy reasons!
- If you have Force Closes please report them directly via Mail with logcat output.
- Force closes on the map are due to broken Google Maps Libraries on your device. Update your ROM/Gapps!"

'via Blog this'

3/22/2012

Electronic Frontier Foundation | Defending your rights in the digital world

Electronic Frontier Foundation | Defending your rights in the digital world: "Surveillance Shocker: Sprint Received 8 MILLION Law Enforcement Requests for GPS Location Data in the Past Year
Cell TrackingLocational Privacy
This October, Chris Soghoian — computer security researcher, oft-times journalist, and current technical consultant for the FTC's privacy protection office — attended a closed-door conference called "ISS World". ISS World — the "ISS" is for "Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering" — is where law enforcement and intelligence agencies consult with telco representatives and surveillance equipment manufacturers about the state of electronic surveillance technology and practice. Armed with a tape recorder, Soghoian went to the conference looking for information about the scope of the government's surveillance practices in the US."

'via Blog this'

3/17/2012

John Bolton Dodges Question; Insults Anti-War Veteran - YouTube

John Bolton Dodges Question; Insults Anti-War Veteran - YouTube: ""

'via Blog this'

Pink Slime. Jamie Oliver Food Revolution. - YouTube

Pink Slime. Jamie Oliver Food Revolution. - YouTube: ""

'via Blog this'

Activists Occupy AIPAC with message to Congress: No War On Iran - YouTube

AIPAC is a domestic enemy of the constitution. All politicians who are on the AIPAC roll call are traitors and should be executed for treason. No more war for oil.

Activists Occupy AIPAC with message to Congress: No War On Iran - YouTube: ""

'via Blog this'

Jason Russell: "Don't Touch that Dust"


Headline reads :Kony 2012 campaigner Jason Russell detained for public rampage

Not really a rampage, but they refuse to call the devil by his name (PCP). Abc news reports Jason was seen "in his underwear" but TMZ uploaded a video of Mr. Russel naked , slapping his hands on the pavement then rearing up in a defiant posture . B/C he is a (slactivist) media darling the media suddenly comes to his defense, the UK press has not been as kind as the American press, however. Persons who post using their facebook login are blaming "acid" but the real culprit is obvious: Phencyclidine.

"San Diego police dispatcher transcripts show neighbors began calling around 11:30 a.m. Thursday to report that a man was running around in his underwear in the city's Pacific Beach neighborhood.
"(Subject) is at the corner, banging his hands on the ground, screaming, incoherent," the transcript continues. "People are trying to calm him down, he's been stopping traffic."
Police Lt. Andra Brown said a 33-year-old man was detained and taken to a hospital for medical evaluation. He was never arrested, and no charges are planned."

"A brief statement by the group in the wake of Russell's detention said that being at the centre of a massive media storm may have taken its toll. "Jason Russell was unfortunately hospitalised suffering from exhaustion, dehydration and malnutrition. He is now receiving medical care and is focused on getting better," said Invisible Children's chief executive Ben Keesey in the statement.

"The past two weeks have taken a severe emotional toll on all of us and that toll manifested itself in an unfortunate incident yesterday. Jason's passion and bis work have done so much to help so many and we are are devastated to see him dealing with this personal health issue."

TMZ video doesn't lie: Russel is seen naked, running and cursing on-coming traffic, and slamming fists into pavement with no pain response. Neither acid nor alcohol, typically only one thing can do that and it sure isn't the MO of exhaustion just the opposite in fact...

So many lies, so much obfuscation. This kind of raises my opinion of the lout, pardon my french, if only b/c he's a lot braver than I am. But otherwise I think he's just despicable b/c he's cheerleading for American Military intervention in sub-saharan africa. I mean, he's not volunteering to join some rebel outfit and carry a rifle but wants Obama to send in the specops teams to eradicate Kony (titular head of Lord's Resistance Army).

The public doesn't want to admit (and the media won't allow them to admit) that they've been taken in by someone who they would otherwise consider a druggie, an irresponsible gen-xr who is out for his own. These middle class boomers making posts even go so far as to suggest that someone slipped him an acid mickey, as if! They would never allow that as an affirmative defense/benefit of the doubt for anyone else but since he has risen so fast to viral prominence in the public spotlight suddenly he is afforded the most philistine exemptions. So what's the tox screen say? We may have to wait until someone like TMZ or smoking-gun media get a hold of it through leaks or FOI.

't
So... more soon.

Peace,


3/14/2012

Brammo Engage Launch - 6 speed electric motorcycle - YouTube

Brammo Engage Launch - 6 speed electric motorcycle - YouTube: ""

'via Blog this'

World's first manned flight with an electric multicopter - YouTube

World's first manned flight with an electric multicopter - YouTube: ""

'via Blog this'

Tails - Privacy for anyone anywhere

Tails is a live CD or live USB that aims at preserving your privacy and anonymity.
It helps you to:
  • use the Internet anonymously almost anywhere you go and on any computer:
    all connections to the Internet are forced to go through the Tor network;
  • leave no trace on the computer you're using unless you ask it explicitly;
  • use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging.

news

Tails 0.10.2 is out
Posted Mon 05 Mar 2012 01:23:45 AM CET
New SSL certificate for tails.boum.org
Posted Sun 26 Feb 2012 04:09:21 PM CET
See News for more.
 

security

Numerous security holes in Tails 0.10.1
Posted Thu 01 Mar 2012 12:00:00 AM CET
Numerous security holes in Tails 0.10
Posted Fri 27 Jan 2012 12:00:00 AM CET
See Security for more.

3/13/2012

Luftwaffe: Strategy for Defeat 1933-1945

Great reading!

Fascinating look at the Luftwaffe during WWII. Lots of interesting insights into the Luftwaffe. What might have been? Great reading for HOI Arsenal fans, and military history buffs in general.


Check it out on Scribd.

The Laws apply to you and me, not the political aristocracy...

"Instead of getting his guns back under a sweet plea deal and retaining his job as sheriff," he observed, "Mirkarimi ought to remain disarmed, and lose his job. Otherwise, from this date forward, San Francisco prosecutors need to apply the 'Mirkarimi standard' to every domestic violence case that hits their desk. "

Many US citizens do not realize that unconstitutional anti-gun laws like the Lautenberg Amendment are applied selectively, that is to say such laws only apply to the hoi polloi. The political aristocracy and their goons are free to break the laws and evade the laws with no consequence. Of course, as one commentator pointed out the above, Mirkarimi should be denied access to firearms according to the law, but then that would imply that the law should apply equally to all persons without exception and the political aristocracy and wealthy elites will absolutely not allow that!



 CCRKBA Says San Francisco Sheriff's Plea Deal Smacks of Hypocrisy By Citizens Committee for the Right to Keep and Bear Arms Posted: 5:22pm on Mar 12, 2012; Modified: 5:27pm on Mar 12, 2012 BELLEVUE, WASH., MARCH 12, 2012 — BELLEVUE, Wash., March 12, 2012 /PRNewswire-USNewswire/ -- The plea deal announced this morning that allows anti-gun San Francisco Sheriff Ross Mirkarimi keep his guns in what began as a domestic violence case "smacks of hypocrisy at the highest order," the Citizens Committee for the Right to Keep and Bear Arms said today. Mirkarimi pleaded guilty in San Francisco court this morning to what the San Francisco Chronicle described as "a misdemeanor charge of false imprisonment in connection with an incident in which he allegedly inflicted a bruise on his wife." "As a member of the San Francisco Board of Supervisors, Ross Mirkarimi supported all manner of gun control schemes," said CCRKBA Chairman Alan Gottlieb. "He had to surrender his guns when the charges were originally filed, and if similar charges had been filed against some gun rights activist or an average gun owner, you can bet Mirkarimi would be looking to pillory that person, and strip away their gun rights permanently." Under federal law, domestic violence convictions can cost people their Second Amendment rights permanently. As part of the plea deal, prosecutors reportedly dropped the domestic violence charge and two other misdemeanor counts. "Why should Mirkarimi enjoy a double standard," Gottlieb questioned. "Based on reports of what he allegedly did, any private citizen who did the same thing might be facing jail time. You can bet San Francisco prosecutors would not be cutting a deal that would allow that person to get his firearms back. "Instead of getting his guns back under a sweet plea deal and retaining his job as sheriff," he observed, "Mirkarimi ought to remain disarmed, and lose his job. Otherwise, from this date forward, San Francisco prosecutors need to apply the 'Mirkarimi standard' to every domestic violence case that hits their desk. "Mirkarimi's reputation as a double-standard elitist is now solidified," Gottlieb said. "For a person who has advocated gun control for everyone else, he should be ashamed. Ross Mirkarimi can now be known as the High Sheriff of Low Behavior." With more than 650,000 members and supporters nationwide, the Citizens Committee for the Right to Keep and Bear Arms (www.ccrkba.org) is one of the nation's premier gun rights organizations. As a non-profit organization, the Citizens Committee is dedicated to preserving firearms freedoms through active lobbying of elected officials and facilitating grass-roots organization of gun rights activists in local communities throughout the United States. SOURCE Citizens Committee for the Right to Keep and Bear Arms Read more here: http://www.bradenton.com/2012/03/12/3934448/ccrkba-says-san-francisco-sheriffs.html#storylink=cpy

3/12/2012

Shit the FBI Says - YouTube

Shit the FBI Says - YouTube: ""

'via Blog this'

Incredible Sound! from the IDFnewsdesk "6 Rockets From Gaza Strike Ashdod - YouTube"

Is this a run up to war with Iran and possibly the third world war?

The Sound of Terror: 6 Rockets From Gaza Strike Ashdod - YouTube: ""

'via Blog this' Destroyed Grad walk around (location unknown)? Grad Rockets on Press Convoy?

Remind me never to live in Wisconsin


"Fascist Pre-Crime runs afoul state's inability to take rights away prior citizen felony-conviction. Impedes march of Nazi rule in America!"

AKA

Milwaukee police call for concealed-carry changes

Habitual criminals would be targeted

Milwaukee police are asking state legislators and gun rights activists to back three proposals police say would repair Wisconsin's concealed-carry law - among them: barring people with three misdemeanor convictions in five years from obtaining a concealed-carry permit.
The purpose of the changes would be to prevent repeat criminals from carrying guns, and stiffen penalties for those who do.
But one of Wisconsin's most prominent gun rights organizations says the proposals are too broad and could make it more difficult for law-abiding people to exercise their constitutional right to defend themselves with guns.
Police say they see three main problems with the existing law, which took effect in November and made Wisconsin the 49th state to allow concealed carry:
First, straw purchases - buying a firearm for someone who is prohibited from possessing a firearm - are a misdemeanor on a state level, not a felony as they are on a federal level.
Second, the requirements for a gun permit ignore the reality of plea bargains. Many habitual criminals legally qualify for, and could obtain, a concealed-carry permit because they were never convicted of a felony for which they were charged.
"Many of our career criminals don't have a felony conviction," explained Joel Plant, chief of staff with the Milwaukee Police Department. "They've been arrested for felonies, they've been charged with felonies, but because of necessity of the criminal justice process - and this is not a disparaging comment on the prosecution process or the judicial process - but because of necessity in our system, a lot of those felonies, many of those felonies, most of those felonies, are pled down to misdemeanor convictions."
Habitual criminals, Plant said, can carry a concealed gun with impunity from a potential of a felony charge unless they fire their guns.
Nik Clark of Wisconsin Carry, a gun rights group, said the problem seems to lie with the criminal justice system rather than the law.
"If he's got a problem, he needs to go talk to the (district attorney) and say, 'Why are you plea-bargaining these down to a misdemeanor that should otherwise be felonies?' That's a problem the DA needs to address," Clark said. "If these are serious offenses, they shouldn't be plea-bargained out. If you're not going to utilize the laws that exist, don't come asking for new laws that have the potential to infringe on the rights of law-abiding (people)."
Milwaukee Police Chief Ed Flynn said that because there is not enough court or jail space for every bad guy caught by police, plea bargains are necessary in urban jurisdictions.
The third problem, police say, is that regardless of how many times people carry concealed without a permit - illegally - the offense never rises above a misdemeanor.
"The sanctions they face are not significant," Flynn said. "No matter how many times they are caught with that gun, the charge is a misdemeanor. It's a misdemeanor for the first offense, it's a misdemeanor for a 10th offense. That's why I say they're more afraid to get caught without their gun than with their gun."
Police would like to change the permitting requirements and prohibit what the statute already defines as "habitual offenders" from getting a permit. A habitual offender is someone convicted of three misdemeanors in five years.
But Clark said the change is "exceptionally broad." He said police should specify which misdemeanors they would like to be considered when issuing gun permits.
"There's a whole bunch of things that are misdemeanors," Clark said. "Some of them I don't think are things that should preclude people from having the right to self-defense. There's a protester in Madison. He's protesting Governor Walker and he gets a ticket for obstruction. That's a misdemeanor. Let's say someone is very active politically and they want to go protest but when they do so three times - you know, politically active season here in Milwaukee and in Madison - and three times someone gets a disorderly conduct or a disturbing the peace, or any of those misdemeanors."
Clark said that, if the changes police request are enacted, law-abiding carriers could unknowingly or accidentally lose their right to carry.
"There's no other constitutional right where you're so close and have to dot every i and cross every t, where you're that close to ensnaring yourself unknowingly with a crime as the right to carry," Clark said. "The way (Flynn) describes these laws, it's just more of taking felonies and backing them right up to your constitutional rights.
"If they're not a felon and they want to turn that into a felony, it's turning Wisconsin into a police state instead of a state where people's rights are respected."
As far as making straw purchases a felony on a state level, Clark said that he doubts it would keep criminals from obtaining guns, but that his organization "wouldn't have any objections" because it's already a federal felony.
Flynn said that because the legislative session is coming to a busy end and it's an election year, he's not optimistic any changes could be made to the law this year. He added that when he makes statements about the concealed-carry law in public, police tend to get lots of "emails from people who only know how to type in capital letters and using exclamation points," but that once the dust settles he hopes to educate people on the importance of making the three changes.
"They have zero impact on the angry email writers," he said. "But they can have a direct impact on our crime rate if they are enacted."

3/11/2012

POLICE STATE AMERICA: "American Jihadist Terrorism: Combating a Complex Threat"



"In the post-9/11 environment, the public has expected law enforcement to adopt a proactive
posture in order to disrupt terrorist plots before an attack occurs. Investigative leads about
terrorist plots in the homeland may originate from foreign intelligence sources. But, for the most
part, information about homegrown plots is available only through domestic intelligence
activities. In order to proactively gather intelligence, law enforcement has adopted a preventive
policing approach that focuses not just on crime that has occurred, but on the possibility that a
crime may be committed in the future.
In this context, a major challenge for law enforcement is gauging how quickly and at what point
individuals move from radicalized beliefs to violence so that a terrorist plot can be detected and
disrupted. At the federal level, the Department of Justice (DOJ) and the Federal Bureau of
Investigation (FBI) have implemented a forward-leaning approach with a revision to the Attorney
General’s Guidelines for Domestic FBI Operations.2 The revision, meant to streamline the FBI’s
investigations and make them more proactive, has at its heart a new investigative tool,
assessments. These allow for the investigation of individuals or groups without factual
predication. The new guidelines have, however, generated some controversy among civil
libertarians.
Also critical among the proactive approaches employed by law enforcement is the monitoring of
Internet and social networking sites. The USA PATRIOT Act (P.L. 107-56) authorizes the FBI to
use National Security Letters to obtain a range of information including data pertaining to e-mail
and Internet use. It appears that U.S. law enforcement has effectively exploited the Internet—
which radicalizing individuals can mine for information and violent jihadists use while plotting—
in its pursuit of terrorists. A review of criminal complaints and indictments in terrorism cases
reveals that the FBI has exploited the Internet and/or e-mail communications to build cases
against defendants in at least 22 of the post-9/11 cases studied in this report. Although much is
said about terrorist use of the Internet for recruitment, training, and communications, these cases
suggest that terrorists and aspiring terrorists will not find the Internet to be a uniformly
permissive environment."

Eli Pariser: Beware online "filter bubbles" - YouTube

Eli Pariser: Beware online "filter bubbles" - YouTube: ""

'via Blog this'

Double barrel 1911 (1080p)

AF2001-A1 "Second Century" - Double barrel pistol - YouTube: ""

'via Blog this'

3/08/2012

Corey Goldberg: 6 Command Line Tools for Linux Performance Monitoring

Corey Goldberg: 6 Command Line Tools for Linux Performance Monitoring: "6 Command Line Tools for Linux Performance Monitoring
So you need to monitor a Linux system for performance metrics... CPU, Memory, Network, Disk, etc.

Here are 6 of my favorite command line tools for monitoring a Linux system from the command line.

htop

http://htop.sourceforge.net/
dstat

http://dag.wieers.com/home-made/dstat/
bmon

http://freshmeat.net/projects/bmon/
iftop

http://www.ex-parrot.com/pdw/iftop/
ifstat

http://gael.roualland.free.fr/ifstat/
sysstat
this is a package of utilites including iostat, mpstat, sar, and others.

http://pagesperso-orange.fr/sebastien.godard/
These tools are all available from package managers (apt-get, yum, etc) on most Linux systems. They are also available on most other *nix platforms.

Posted by Corey Goldberg at 12:06 PM"

'via Blog this'

3/06/2012

nonviolent communication is...


nonviolent communication is... |

Nonviolent Communication (NVC) is sometimes referred to as compassionate communication. Its purpose is to:

  1. create human connections that empower compassionate giving and receiving
  2. create governmental and corporate structures that support compassionate giving and receiving.
NVC involves both communication skills that foster compassionate relating and consciousness of the interdependence of our well being and using power with others to work together to meet the needs of all concerned.
This approach to communication emphasizes compassion as the motivation for action rather than fear, guilt, shame, blame, coercion, threat or justification for punishment. In other words, it is about getting what you want for reasons you will not regret later. NVC is NOT about getting people to do what we want. It is about creating a quality of connection that gets everyone’s needs met through compassionate giving.
The process of NVC encourages us to focus on what we and others are observing separate from our interpretations and judgments, to connect our thoughts and feelings to underlying human needs/values (e.g. protection, support, love), and to be clear about what we would like towards meeting those needs. These skills give the ability to translate from a language of criticism, blame, and demand into a language of human needs -- a language of life that consciously connects us to the universal qualities “alive in us” that sustain and enrich our well being, and focuses our attention on what actions we could take to manifest these qualities.
Nonviolent Communication skills will assist you in dealing with major blocks to communication such as demands, diagnoses and blaming. In CNVC trainings you will learn to express yourself honestly without attacking. This will help minimize the likelihood of facing defensive reactions in others. The skills will help you make clear requests. They will help you receive critical and hostile messages without taking them personally, giving in, or losing self-esteem. These skills are useful with family, friends, students, subordinates, supervisors, co-workers and clients, as well as with your own internal dialogues.

Nonviolent Communication Skills

NVC offers practical, concrete skills for manifesting the purpose of creating connections of compassionate giving and receiving based in a consciousness of interdependence and power with others. These skills include:
  1. Differentiating observation from evaluation, being able to carefully observe what is happening free of evaluation, and to specify behaviors and conditions that are affecting us;
  2. Differentiating feeling from thinking, being able to identify and express internal feeling states in a way that does not imply judgment, criticism, or blame/punishment;
  3. Connecting with the universal human needs/values (e.g. sustenance, trust, understanding) in us that are being met or not met in relation to what is happening and how we are feeling; and
  4. Requesting what we would like in a way that clearly and specifically states what we do want (rather than what we don’t want), and that is truly a request and not a demand (i.e. attempting to motivate, however subtly, out of fear, guilt, shame, obligation, etc. rather than out of willingness and compassionate giving).
These skills emphasize personal responsibility for our actions and the choices we make when we respond to others, as well as how to contribute to relationships based in cooperation and collaboration.
With NVC we learn to hear our own deeper needs and those of others, and to identify and clearly articulate what “is alive in us”. When we focus on clarifying what is being observed, felt, needed, and wanted, rather than on diagnosing and judging, we discover the depth of our own compassion. Through its emphasis on deep listening—to ourselves as well as others—NVC fosters respect, attentiveness and empathy, and engenders a mutual desire to give from the heart. The form is simple, yet powerfully transformative.
Founded on consciousness, language, communication skills, and use of power that enable us to remain human, even under trying conditions, Nonviolent Communication contains nothing new: all that has been integrated into NVC has been known for centuries. The intent is to remind us about what we already know—about how we humans were meant to relate to one another—and to assist us in living in a way that concretely manifests this knowledge.
The use of NVC does not require that the persons with whom we are communicating be literate in NVC or even motivated to relate to us compassionately. If we stay with the principles of NVC, with the sole intention to give and receive compassionately, and do everything we can to let others know this is our only motive, they will join us in the process and eventually we will be able to respond compassionately to one another. While this may not happen quickly, it is our experience that compassion inevitably blossoms when we stay true to the principles and process of Nonviolent Communication.
NVC is a clear and effective model for communicating in a way that is cooperative conscious, and compassionate.

adapted from: 
Nonviolent Communication: A Language of Life
by Marshall B. Rosenberg, Ph.D.
Published by PuddleDancer Press, available from CNVC
See also: 
The Spiritual Basis of Nonviolent Communication
 English or Las Bases Espirituales de la Comunicación No Violentaespañol