PrisonPlanet Forum

***THE MAIN BOARDS - Welcome to the Prison Planet Educational Forum and Library*** => PhD Investigative Reports (only for the hardcore) => : Anti_Illuminati September 30, 2009, 01:52:39 AM

: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Anti_Illuminati September 30, 2009, 01:52:39 AM
1)  IT DOES NOT MATTER IF YOU DO NOT TAKE THE VACCINE, NOT TAKING IT WILL NOT MAKE YOU SAFE, YOU CAN STILL EASILY DIE IF YOU DO NOT HAVE SUFFICIENT VITAMIN D (LIKE 5X MIN THE RDA).  TAKING THE VACCINE ONLY ADDS INSULT TO INJURY (OR AN ADDITIONAL MURDER ATTEMPT TO INITIAL ATTEMPTED PREMEDITATED MURDER).  IT IS LIKE A BACKUP PLAN TO KILL YOU IF THE 1ST PLAN TO KILL, DISABLE, WEAKEN YOU FAILS.

2)  THE MILITARY IS GEARING UP BECAUSE THE FLU WILL BE FOLLOWED WITH TELEWORK (CONTINUITY OF OPERATIONS/COOP), OPERATING THE C.O.G. VIA REMOTE COMMAND CENTERS.  THIS IS GOING TO BE USHERED IN WITH MASSIVE CYBER ATTACKS TO DESTROY THE COM INFRASTRUCTURE AND CURRENT INTERNET.  THE INTERNET NOW ALREADY DOES NOT EXIST, IT IS ALL IPV6, CONVERTED VIA TRANSFORMERS AT THE BACKBONE LEVEL.  USJFCOM JUST STATED THAT THE GIG IS ALREADY FULLY OPERATIONAL ***NOW***--AND THAT IS *THE KEY* FOR THEM TO BE ABLE TO MILITARILY TAKE OVER THE ENTIRE PLANET WITH ADVANCED AI ENGINEERED COMBAT OPERATIONS THAT ARE GUARANTEED TO ACHIEVE MAXIMUM DEATH AND DESTRUCTION AND ELIMINATION OF THE ENEMIES OF THE NWO GLOBALLY.

3)  THE VACCINE IS A 2 PART VIRUS, THE VACCINE IS THE VIRUS, IT IS AN RNA RECOMBINANT WHICH WAS REVERSE ENGINEERED FROM THE SUPER FLU.  NO SH*T THAT "THE CURRENT SWINE FLU" IS "HYPED AND NOWHERE NEAR AS DEADLY AS CLAIMED".  ***DUH***, WTF IS YOUR PROBLEM PEOPLE?  WAIT UNTIL IT COMBINES WITH ***THE OTHER HALF***.

GO AND DO THE RESEARCH ON WHAT I JUST SAID, AND WHOEVER IS SPOUTING THIS F*CKING BULLSHIT ABOUT WONDERING WHY THEY ARE MASSIVELY GEARING UP FOR MARTIAL LAW OVER A VIRUS THAT ISN'T KILLING THAT MANY PEOPLE YET, SHUT YOU STUPID UNEDUCATED MOUTH AND REALIZE THAT THE CURRENT VIRUS ISN'T THE FINAL BIOWEAPON THAT THEY HAVE IN MIND THAT WILL ALLOW THEM TO LEGITIMIZE THE SWITCH-OVER TO INTERNET2 TO MAINTAIN COMMUNICATIONS FOR THE DOD AND GOVERNMENT COMPUTER SYSTEMS, AND OTHER CRITICAL INFRASTRUCTURE.  STOP BEING STUPID AND START READING PDF FILES FROM MORE THAN JUST THE CDC, START READING ABOUT TELEWORK, AND COOP AND YOU WILL GET THE WHOLE PICTURE.
: Re: Alex's guests about swine flu ARE F*CKING DUMBASSES STUPID F*CKING IDIOTS!
: Republic Renewal September 30, 2009, 01:58:03 AM
Yes sir, right away sir.

I now admit my own uneducation...
: Re: Alex's guests about swine flu ARE F*CKING DUMBASSES STUPID F*CKING IDIOTS!
: InfoArsenal September 30, 2009, 01:59:52 AM
Hi, I know I'm not a mod and I'm not trying to be a jerk, but I'm having a hard time understanding this thread with all the anger and caps.

Which guests in particular are you talking about (maybe it would help if there was some links for more info)?
: Re: Alex's guests about swine flu ARE F*CKING DUMBASSES STUPID F*CKING IDIOTS!
: Berminator September 30, 2009, 02:04:02 AM
AI is sayin that the current piggy flu is part 1 of a two part virus, the part 2 is the vaccine.
He's giving us all a shaking.
Well Done AI.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: luckee1 September 30, 2009, 02:05:00 AM
Anti_Illuminati, how do you really /i] feel?   ;)

I hear you!  It seems that there are too many people in all the media (including Alex), that are not taking seriously what you and now, thanks to you many of us know, what is truly going on and how TPTB is executing their plan.  

My question to you is, how will we know (aside from the internet going down) that the DOD is teleworking?   I know that COG is already in place and all of that has been set for quite some time already.

For you two newbies, I highly recommend you read Anti_Illuminatis other posts and read and read.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: SUPREMEMASTER September 30, 2009, 02:09:56 AM
Hi, I know I'm not a mod and I'm not trying to be a jerk, but I'm having a hard time understanding this thread with all the anger and caps.

Which guests in particular are you talking about (maybe it would help if there was some links for more info)?

1) It does not matter if you do not take the vaccine, not taking it will not make you safe, you can still easily die if you do not have sufficient vitamin d (like 5x min the RDA).  taking the vaccine only adds insult to injury (or an additional murder attempt to initial attempted premeditated murder). It is like a backup plan to kill you if the 1st plan to kill, disable, weaken you fails.

2) The military is gearing up because the flu will be followed with telework (continuity of operations/coop), operating the c.o.g. via remote command centers. This is going to be ushered in with massive cyber attacks to destroy the com infrastructure and current internet. The internet now already does not exist, it is all ipv6, converted via transformers at the backbone level.  Usjfcom just stated that the gig is already fully operational ***now***--and that is *the key* for them to be able to militarily take over the entire planet with advanced ai engineered combat operations that are guaranteed to achieve maximum death and destruction and elimination of the enemies of the nwo globally.

3) The vaccine is a 2 part virus, the vaccine is the virus, it is an rna recombinant which was reverse engineered from the super flu. No sh*t that "the current swine flu" is "hyped and nowhere near as deadly as claimed".  ***duh***, wtf is your problem people? Wait until it combines with ***the other half***.

Go and do the research on what i just said, and whoever is spouting this f*cking bullshit about wondering why they are massively gearing up for martial law over a virus that isn't killing that many people yet, shut you stupid uneducated mouth and realize that the current virus isn't the final bioweapon that they have in mind that will allow them to legitimize the switch-over to internet2 to maintain communications for the dod and government computer systems, and other critical infrastructure. Stop being stupid and start reading pdf files from more than just the cdc, start reading about telework, and coop and you will get the whole picture.

There ya' go.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: _CREATIONIST_ September 30, 2009, 02:11:54 AM
Anti_Illuminati, how do you really /i] feel?   ;)

I hear you!  It seems that there are too many people in all the media (including Alex), that are not taking seriously what you and now, thanks to you many of us know, what is truly going on and how TPTB is executing their plan.  

My question to you is, how will we know (aside from the internet going down) that the DOD is teleworking?   I know that COG is already in place and all of that has been set for quite some time already.

For you two newbies, I highly recommend you read Anti_Illuminatis other posts and read and read.

I want to so badly but I cant understand any of it. No offense but reading AI's posts in the PH.D section is like trying to read arabic if your only language is english.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Republic Renewal September 30, 2009, 02:17:36 AM
Right so laymen's terms... Theres two parts to the virus...the first part is released (the vaccine/virus) and the second part is too terrible to imagine right now...

 The NWO controls the internet and are just looking for a reason to commandeer it for their own purposes.

Dude if you still don't get it. Start over and refresh your mind. Go back to September 11, 2001 documentaries and get in touch with your inner truther.

^_^ hope that helped and if im incorrect in my analysis, please someone of 3 star rank or higher correct me.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Berminator September 30, 2009, 02:20:26 AM
Right so laymen's terms... Theres two parts to the virus...the first part is released (the vaccine/virus) and the second part is too terrible to imagine right now...

 

The first part is with us, the second arrives through a needle.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Anti_Illuminati September 30, 2009, 02:20:38 AM
Anti_Illuminati, how do you really /i] feel?   ;)

I hear you!  It seems that there are too many people in all the media (including Alex), that are not taking seriously what you and now, thanks to you many of us know, what is truly going on and how TPTB is executing their plan.  

My question to you is, how will we know (aside from the internet going down) that the DOD is teleworking?   I know that COG is already in place and all of that has been set for quite some time already.

For you two newbies, I highly recommend you read Anti_Illuminatis other posts and read and read.

Everyone can take the following for what it is worth:

Delta Force Colonel gets off secure communications link call to General in Northern Command:

Delta Force Colonel:  "They're coming, and they said they're going to deliver a Christmas present to the American People."

Delta Force Colonel:  "The virus is a 2 part virus, the vaccine is 1 part of the virus, it is an RNA recombinant."

Delta Force Colonel:  "They are preparing to round up the blue list (patriots) and put them in FEMA camps.  The military is on the red list and they will be ordered to assist in the roundup and takeover, or they will be killed."

Former Bio Weapons scientist from Ft. Detrik, M.D. (name withheld to protect family):  "The swine flu was reverse engineered from the 1918 super flu virus, and the vaccine is 1 part of the virus."
_______________________________________________________
Those are from real life personal sources relayed to me directly. They line up with Dr. Horowitz, Dr A. True Ott, and many others.

Maybe you should take a look at this as well:

http://forum.prisonplanet.com/index.php?topic=136811.msg822696#msg822696

: Re: The vaccine is partially a psyop, not taking it will not make you safe
: SUPREMEMASTER September 30, 2009, 02:21:06 AM
the first part is released (the vaccine/virus) and the second part is too terrible to imagine right now...

Is it the kind that literally tears your face off after like 10 seconds?
: Re: Alex's guests about swine flu ARE F*CKING DUMBASSES STUPID F*CKING IDIOTS!
: Republic Renewal September 30, 2009, 02:21:36 AM
The first part is with us, the second arrives through a needle.


Thanks and thats severely weak.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: aviana September 30, 2009, 02:22:26 AM
<snip>There ya' go.

I just did the same thing in Word so I could better absorb it.

Don't worry _CREATIONIST_, it's not just you.  My fluoridated mind can't keep up.  AI posts some good stuff for sure, I just can't seem to wrap my mind around it all.  I need AI for dummies.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Berminator September 30, 2009, 02:25:44 AM
AJ admitted on the show today that Steve called him 2 weeks ago to say AJ was being tracked by military.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Republic Renewal September 30, 2009, 02:28:40 AM
I just did the same thing in Word so I could better absorb it.

Don't worry _CREATIONIST_, it's not just you.  My fluoridated mind can't keep up.  AI posts some good stuff for sure, I just can't seem to wrap my mind around it all.  I need AI for dummies.

Aviana, read I felt the storm approaching -- one of my posts (kinda have to scroll down all the important ones In the General Discussion area =)
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: luckee1 September 30, 2009, 02:31:25 AM
I want to so badly but I cant understand any of it. No offense but reading AI's posts in the PH.D section is like trying to read arabic if your only language is english.

I really didn't 'get it' until I had perused his posts.  It all came together when I was downloading all his posts while listening to the corbet report interviewing Anti_Illuminati.  Then I saw the whole thing.  

He has posted and I will try to translate.  

There is a Global financial network.
There is a Global Military network.
There is a Global computer network.
There is a Pan(Global) virus

Literally every bit of information about you is stored at different servers.
Your electronics emit a signal when turned on.  Your position on the planet can be ascertained by that signal (be it a program, cell phone, computer or anything with a program board).  This signal does not depend on RFID or powerlines or IP address.  You know how some people have an aura?  the signal that is emitted when you turn it on, is the signal; it has its own signature.  Your cell phone, even if powered off can be turned on by remote authority, with out your knowledge or permission.

Continuity of Government means that in case of 'tragedy' and the Capitol Bldg went out and it took out the heads of state, the government would still continue on.  It also keeps the people in America from disbanding the Federal Government (which is in the constitution to do so) as the COG will ensure the Federal Government will survive, and most probably grow larger and stronger.  

You know all those believable SciFi movies that are scary?  The Net is a beautiful example.  Well, those things have come to pass.

Smart Grid is not your friend. Smart Grid will be able to monitor and know every detail about your life.   'They" will literally be in your bedroom.  Your TV will be able to watch you.  

A_I has done real research and shown documents (much I have already downloaded and I invite all to do the same) to prove this is real and i existence.

My version here is actually the 'nice' version.  Read his research watch the vids in his posts, you will be horrified when you find the technology in their hands.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Berminator September 30, 2009, 02:32:32 AM
AI the topic title is way hardcore are you gonna keep it untouched all night?
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: luckee1 September 30, 2009, 02:37:09 AM
Everyone can take the following for what it is worth:

Delta Force Colonel gets off secure communications link call to General in Northern Command:

Delta Force Colonel:  "They're coming, and they said they're going to deliver a Christmas present to the American People."

Delta Force Colonel:  "The virus is a 2 part virus, the vaccine is 1 part of the virus, it is an RNA recombinant."

Delta Force Colonel:  "They are preparing to round up the blue list (patriots) and put them in FEMA camps.  The military is on the red list and they will be ordered to assist in the roundup and takeover, or they will be killed."

Former Bio Weapons scientist from Ft. Detrik, M.D. (name withheld to protect family):  "The swine flu was reverse engineered from the 1918 super flu virus, and the vaccine is 1 part of the virus."
_______________________________________________________
Those are from real life personal sources relayed to me directly. They line up with Dr. Horowitz, Dr A. True Ott, and many others.

Maybe you should take a look at this as well:

http://forum.prisonplanet.com/index.php?topic=136811.msg822696#msg822696
With that thread, it makes sense of the cryptic email I got from a usually jovial dude.  

BTW, I quit my job because they went to an AI program that monitors customers viewing habits and financial records addresses etc.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: aviana September 30, 2009, 02:45:50 AM
Aviana, read I felt the storm approaching -- one of my posts (kinda have to scroll down all the important ones In the General Discussion area =)

Appreciate that - I get 'what's coming', it's the multi-faceted vaccine roll out, it's implications, and how it connects with all of the other agenda items that has my head spinning.  The more I think about the significance of this, and understand it, it makes what I stand for in my daily living - for life and family - seem so futile because it seems that I should be calling a different tune.  Trying to choose battles is hard when they are all so important. :(

Thanks for your perseverance AI.

eta - whoa - didn't recognize that thread title in the "show new replies...".  Good call.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Anti_Illuminati September 30, 2009, 02:46:54 AM
Continuity of Government means that in case of 'tragedy' and the Capitol Bldg went out and it took out the heads of state, the government would still continue on.  It also keeps the people in America from disbanding the Federal Government (which is in the constitution to do so) as the COG will ensure the Federal Government will survive, and most probably grow larger and stronger.

Exactly, very good point in bold also.  It is the next level Ordo Ab Chao operation, for the govt. to attack itself, the very heart of itself--what 9/11 failed to achieve for them, they will make sure gets executed this time.  They cannot wait to finally drive the serrated blade deep into the hearth of America and rip it's heart out and watch the light of freedom, peace, and all of its former glory burn out of its eyes into the blackness that they want.  Their architectures and systems (i.e. esp autonomous systems) will ensure that no one can ever take back the government from them.  C.O.G. is the distillation and culmination of knowledge of every facet of every dictatorship in history painstakingly analyzed with the assistance of their AI and supercomputers to engineer the perfect utopia from their point of view, and hell on Earth for everyone not part of their cabal.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: luckee1 September 30, 2009, 02:47:14 AM
AI the topic title is way hardcore are you gonna keep it untouched all night?

You just had to say something, now he changed it!

 :D
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Republic Renewal September 30, 2009, 02:50:11 AM
Well now that it has had its attention...
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Saturn September 30, 2009, 02:51:50 AM
You're helpless, you're weak, you're not safe, there's no hope, the REAL MCCOY IS JUST AROUND THE CORNER, BE SCARED BECAUSE THE SHIT'S BOUT TO HIT THE FAN FOLKS!!!11  ::) This is getting tiresome. I'll take whatever vitamins and/or silver supplements I need to take, make my money and live my life.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: _CREATIONIST_ September 30, 2009, 02:52:47 AM
I really didn't 'get it' until I had perused his posts.  It all came together when I was downloading all his posts while listening to the corbet report interviewing Anti_Illuminati.  Then I saw the whole thing.  

He has posted and I will try to translate.  

There is a Global financial network.
There is a Global Military network.
There is a Global computer network.
There is a Pan(Global) virus

Literally every bit of information about you is stored at different servers.
Your electronics emit a signal when turned on.  Your position on the planet can be ascertained by that signal (be it a program, cell phone, computer or anything with a program board).  This signal does not depend on RFID or powerlines or IP address.  You know how some people have an aura?  the signal that is emitted when you turn it on, is the signal; it has its own signature.  Your cell phone, even if powered off can be turned on by remote authority, with out your knowledge or permission.

Continuity of Government means that in case of 'tragedy' and the Capitol Bldg went out and it took out the heads of state, the government would still continue on.  It also keeps the people in America from disbanding the Federal Government (which is in the constitution to do so) as the COG will ensure the Federal Government will survive, and most probably grow larger and stronger.  

You know all those believable SciFi movies that are scary?  The Net is a beautiful example.  Well, those things have come to pass.

Smart Grid is not your friend. Smart Grid will be able to monitor and know every detail about your life.   'They" will literally be in your bedroom.  Your TV will be able to watch you.  

A_I has done real research and shown documents (much I have already downloaded and I invite all to do the same) to prove this is real and i existence.

My version here is actually the 'nice' version.  Read his research watch the vids in his posts, you will be horrified when you find the technology in their hands.

wow, thanks for the cliff notes.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: aviana September 30, 2009, 02:54:11 AM
wow, thanks for the cliff notes.

+1
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: chris killz blog September 30, 2009, 02:55:22 AM
1)  IT DOES NOT MATTER IF YOU DO NOT TAKE THE VACCINE, NOT TAKING IT WILL NOT MAKE YOU SAFE, YOU CAN STILL EASILY DIE IF YOU DO NOT HAVE SUFFICIENT VITAMIN D (LIKE 5X MIN THE RDA).  TAKING THE VACCINE ONLY ADDS INSULT TO INJURY (OR AN ADDITIONAL MURDER ATTEMPT TO INITIAL ATTEMPTED PREMEDITATED MURDER).  IT IS LIKE A BACKUP PLAN TO KILL YOU IF THE 1ST PLAN TO KILL, DISABLE, WEAKEN YOU FAILS.

2)  THE MILITARY IS GEARING UP BECAUSE THE FLU WILL BE FOLLOWED WITH TELEWORK (CONTINUITY OF OPERATIONS/COOP), OPERATING THE C.O.G. VIA REMOTE COMMAND CENTERS.  THIS IS GOING TO BE USHERED IN WITH MASSIVE CYBER ATTACKS TO DESTROY THE COM INFRASTRUCTURE AND CURRENT INTERNET.  THE INTERNET NOW ALREADY DOES NOT EXIST, IT IS ALL IPV6, CONVERTED VIA TRANSFORMERS AT THE BACKBONE LEVEL.  USJFCOM JUST STATED THAT THE GIG IS ALREADY FULLY OPERATIONAL ***NOW***--AND THAT IS *THE KEY* FOR THEM TO BE ABLE TO MILITARILY TAKE OVER THE ENTIRE PLANET WITH ADVANCED AI ENGINEERED COMBAT OPERATIONS THAT ARE GUARANTEED TO ACHIEVE MAXIMUM DEATH AND DESTRUCTION AND ELIMINATION OF THE ENEMIES OF THE NWO GLOBALLY.

3)  THE VACCINE IS A 2 PART VIRUS, THE VACCINE IS THE VIRUS, IT IS AN RNA RECOMBINANT WHICH WAS REVERSE ENGINEERED FROM THE SUPER FLU.  NO SH*T THAT "THE CURRENT SWINE FLU" IS "HYPED AND NOWHERE NEAR AS DEADLY AS CLAIMED".  ***DUH***, WTF IS YOUR PROBLEM PEOPLE?  WAIT UNTIL IT COMBINES WITH ***THE OTHER HALF***.

GO AND DO THE RESEARCH ON WHAT I JUST SAID, AND WHOEVER IS SPOUTING THIS F*CKING BULLSHIT ABOUT WONDERING WHY THEY ARE MASSIVELY GEARING UP FOR MARTIAL LAW OVER A VIRUS THAT ISN'T KILLING THAT MANY PEOPLE YET, SHUT YOU STUPID UNEDUCATED MOUTH AND REALIZE THAT THE CURRENT VIRUS ISN'T THE FINAL BIOWEAPON THAT THEY HAVE IN MIND THAT WILL ALLOW THEM TO LEGITIMIZE THE SWITCH-OVER TO INTERNET2 TO MAINTAIN COMMUNICATIONS FOR THE DOD AND GOVERNMENT COMPUTER SYSTEMS, AND OTHER CRITICAL INFRASTRUCTURE.  STOP BEING STUPID AND START READING PDF FILES FROM MORE THAN JUST THE CDC, START READING ABOUT TELEWORK, AND COOP AND YOU WILL GET THE WHOLE PICTURE.

Ok, but what's the bad news?
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: ChristSavage September 30, 2009, 02:56:04 AM
+1
+2, marking this for future cliffnotes use...
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: luckee1 September 30, 2009, 02:56:17 AM
You're helpless, you're weak, you're not safe, there's no hope, the REAL MCCOY IS JUST AROUND THE CORNER, BE SCARED BECAUSE THE SHIT'S BOUT TO HIT THE FAN FOLKS!!!11  ::) This is getting tiresome. I'll take whatever vitamins and/or silver supplements I need to take, make my money and live my life.

The real McCoy is not around the corner.  IT IS HERE ALREADY!  But do live and be advised that the flu is pretty much just a minor precursor.  Please do live and stay healthy and happy!  THAT is the worst weapon against TPTB.  Help others live too.  But you would be remiss if you didn't take precautions against what A_I has posted.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Anti_Illuminati September 30, 2009, 03:07:36 AM
I want to so badly but I cant understand any of it. No offense but reading AI's posts in the PH.D section is like trying to read arabic if your only language is english.

I just did the same thing in Word so I could better absorb it.

Don't worry _CREATIONIST_, it's not just you.  My fluoridated mind can't keep up.  AI posts some good stuff for sure, I just can't seem to wrap my mind around it all.  I need AI for dummies.

wow, thanks for the cliff notes.

You will understand more when you see this and read the following below the video link (pay particular attention to when the video gets to Minneapolis and Unisys):

http://www.vimeo.com/5770472

"If the ratio of our productivity to consumption is over 1 that’s OK, but if not, you are a “useless eater,” and perhaps need to be disposed of."

“The globalization of the world economy will also continue, with a widening between “haves” and “have-nots.”

http://www.middlepowers.org/gsi/docs/vision_2020.pdf
http://www.fas.org/spp/military/docops/usspac/lrp/toc.htm

Vicky believes that a coordinated sequence of events lead to PTECH and 9/11.  At the G-8 meeting in Houston in 1999 and at the 2000 United Nations meeting in Okinawa, Japan, there was considerable talk about bridging the “digital divide,” that is, the gap between developed and undeveloped countries.  The Plan of Action presented in Genoa was for governments and NGO’s (non-governmental organizations) to bring the internet to under—developed countries.  The partnership team to help implement this included MARKLE, headed by Zoe Baird, Anderson Consulting Company, the Chubb Corporation, and AIG.   The idea was to export our knowledge jobs (bio-tech, computer, etc.) to India.  At that time, the US economy was 65% dependent on the knowledge industry.  On Nov. 9, 2001, President Bush signed the Knowledge Trade Initiative which was a torpedo to our economy.

 
New Federalism  

Under Clinton and Gore’s “re-inventing government”  program, they implemented what has been termed ‘New Federalism’ which is essentially the privatization of government.  Congress passes framework legislation and funding; but the programs are implemented by a partnership of Foundations and Non-Governmental organizations - funded by corporations.  This leaves in place the façade of a federal government, but it is actually closer to the German model of socialism (ref. Ludwig Von Mises).

The Harvard paper written by Phillip Zelikow and Ashton Carter lays this out: “Catastrophic Terrorism, a National Policy” includes a reference to “market-based governance.”   'New Federalism is market-based 'governance.  There is a video on Newt Gingrich’s Americansolutions.org website where Elaine Kamarck, PhD. describes market-based governance in a presentation titled, “End of Government As We Know it” .  Clinton’s ‘New Federalism’ was the end of constitutional government and the beginning of the communist system of “governance by soviets” with soviet being defined as councils or committees.


The soviet system corresponds to the idea of “virtual government,” where all policies come from a central source.  The policies come from the EU and UN in Geneva (or where ever), and then are implemented by NGO’s.  But in this “virtual government,” there is no representation for people.  The most active part of the United Nations is UNESCO.  Their sustainable development groups are charged with  implementing U.N. environmental policies.  Under the heading of accountability, they have to tag and inventory everything because remote “governance” requires computerized monitoring of the performance of the soviets and the level of cooperation of the people.

The World Bank plan is to measure our productivity relative to the resources we consume.   If the ratio of our productivity to consumption is over 1 that’s OK, but if not, you are a “useless eater,” and perhaps need to be disposed of.  This idea is codified in the U.N. term, “family dependency ratio,” which refers to this kind of analysis being applied to an entire family.

These ideas are kind of implicit in what they write about their “poverty reduction strategies.”  The strategy is that under-developed countries would get development dollars if they reduce poverty.  To even get the development dollars, then, third world leaders more or less have to eliminate the poor.   The “poverty reduction” campaigns are eliminating poor people in Africa.  Indeed, much of the modern environmental movement traces back to the eugenics movement.  The definition of the environment as “everything we touch and everything that touches us” justifies the totalitarian control of everything under the heading of efficient utilization of resources.  This corresponds to the The Report from Iron Mountain, written by the Rand Corporation concerning population reduction.  It is Vicky’s belief that this report is real and that it served to provide the plan to the various players. Indeed, our government is fomenting revolution in a lot of countries.  

 
Turnkey Democracy and Revolution

The National Endowment for Democracy (NED) is a granting agency funded by the U.S. government that provides grants for organizations representing business, labor, the International Republican Institute, and National Democratic Institute.  NED provides “turn-key democracy”  through the soviet system of NGO’s.  NED has been linked to the “Color Revolutions” that are now going on all over the world.

 
Control of Resources by Supply Chain

Our transportation system and transportation systems all over the world are being redesigned to facilitate “supply chain management.”  The monopoly cartels will control all supplies through supply chain management.  For example, Dell Computers have lots of components.  Each component generates orders and each of these generates lots of smaller orders.  The idea is that if you want to stay in business, you control all aspects of the supply chain, thereby putting everyone else out of business.

Thus, we have to break up the monopolies.  It seems that Sec. of Treasury Paulson and Fed Reserve Chairman Bernanke want to set up an E-Bay style auction to handle the junk assets.  Only in this reverse auction, the government rewards the lowest bidder.  This is essentially D-Day for the capitalistic system and it gives Secretary Paulson unprecedented control over the economy and the system.  It also sets up a new market mechanism.  It is not a bail out, per se.  All these pieces of legislation have U.N. Agendas embedded in them.   If you control the supplies - you control country.

If this evil program is implemented, the UN system of “governance by soviets” will have complete control- forever.  The concept of “virtual governance” by computer system includes a national health care system.  The nationalization of medical records and outcome performance measuring provides the capability for human experimentation and potentially genetic modification- of people.  What scares Vicky, is that they could create a population of drones, like an ant colony, using genetic modification.

Essentially 9/11 was part of a Mind War experiment- to see how the population would react when you couple emotional shock with absurd explanations.

At first, all government revenues were from tariffs.  Then in 1913, tariffs were cut in half, with the remaining being paid by American citizens and business.  This has resulted in the indenture of the American people.  Now our labor is collateral to the bankers.  Americans need to awaken and snap out of their dream-sleep.

: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Saturn September 30, 2009, 03:10:27 AM
The real McCoy is not around the corner.  IT IS HERE ALREADY!  But do live and be advised that the flu is pretty much just a minor precursor.  Please do live and stay healthy and happy!  THAT is the worst weapon against TPTB.  Help others live too.  But you would be remiss if you didn't take precautions against what A_I has posted.
Yes, that's my philosophy. Sorry if that post came off like one of those cointelpro guys, but it really gets tiresome when there's a constant threat on the horizon. I will take precautions though, I definitely don't want to get caught in TPTB's dragnet.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Saturn September 30, 2009, 03:14:25 AM
So your just going to give up? Surrender?  You've grown tiresome of fighting for your own survival!?!? You would rather just take what they give you and live your money filled life?? Just a bit of news pal.. the MONEY  your making aint worth jack S%^t ok? Get that in your skull.  MONEY ISNT EVERYTHING  God just giving up ... you make me sick.
Give up? I wasn't ever 'fighting' in the first place. I am doing a lot of dodging though(Viruses, lies in the media etc). Unless you have private armies, trillions of dollars, secret organizations, the media and billions of mindless zombies on your side the idea that you can take these people head on is a foolish waste of your life. Be glad that you know what they're up to and can insulate yourself and your loved ones, instead of giving yourself ulcers and trying to control things you have zero control over.

lol all that anger. The money I'm making allows me to buy up real assets as well as get wealthier while the frustrated masses lose everything, so yeah, it's worth something.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Republic Renewal September 30, 2009, 03:17:06 AM
I'm not getting ulcers over it. And I removed that post because I misunderstood what you were saying. I apologize. Living your life can be done, I suppose, however, I won't just idle by while we are on the verge of global takeover.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Anti_Illuminati September 30, 2009, 03:25:23 AM
Unless you have private armies, trillions of dollars, secret organizations, the media and billions of mindless zombies on your side the idea that you can take these people head on is a foolish waste of your life.

Tell that to Indira Singh or Sibel Edmonds.

The former, covering something so esoteric, that there were few to even grasp what she was talking about.

Both have put themselves in the literal crosshairs of the NWO, for all of us.

Tell them that they've wasted their lives.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Republic Renewal September 30, 2009, 03:27:11 AM
Brilliant.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Saturn September 30, 2009, 03:33:23 AM
Tell that to Indira Singh or Sibel Edmonds.

The former, covering something so esoteric, that there were few to even grasp what she was talking about.

Both have put themselves in the literal crosshairs of the NWO, for all of us.

Tell them that they've wasted their lives.
Sure, if I ever meet them, I'll thank them for enlightening me then proceed to explain to them the futility of what they're doing. If you really want to beat these people, do what they've done to get to power and stay in power. You know what that is. Until then, I don't think waiting on a horde of braindead people to wake up is a very good plan. I won't ruin your thread anymore, but thanks for your warning A_I. You're one of the reasons I don't watch the news anymore.

R_R: Good luck in your fight.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Republic Renewal September 30, 2009, 03:36:20 AM
^_^ appreciated.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Bacchanea September 30, 2009, 03:50:13 AM
ISmart Grid is not your friend. Smart Grid will be able to monitor and know every detail about your life.   'They" will literally be in your bedroom.  Your TV will be able to watch you.

It is particularly interesting when you trace the evolution of a company like Microsoft's whose Natal is now in the works in order marry fun with surveilance. Microsoft's goal was to "bring a desktop into every home". That achievement was necessary in order to accustom the slaves to a digital lifestyle. The company spends millions on researching ways to enslave people in a digital lifestyle, so that being "online" becomes a new way of living for as many people as possible. This is considered a good thing: getting people used to be tracked via GPS, having their information published to the world, losing their sense of privacy. Technology is not just a cool tool - it replaces the natural order of things, a natural order that includes natural rights, God, humanity and everything else that has some semblance of truth. Technology is in the hands of evil. Unfortunately, people at MS and places like it have no clue who their true master is.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Anti_Illuminati September 30, 2009, 03:52:22 AM
Sure, if I ever meet them, I'll thank them for enlightening me then proceed to explain to them the futility of what they're doing. If you really want to beat these people, do what they've done to get to power and stay in power. You know what that is. Until then, I don't think waiting on a horde of braindead people to wake up is a very good plan. I won't ruin your thread anymore, but thanks for your warning A_I. You're one of the reasons I don't watch the news anymore.

R_R: Good luck in your fight.
I was braindead once myself.  I'm glad that someone disagreed with your assertion and took the time to wake me up.  By the way:  "waiting on a horde of braindead people" implies that no action is taken.  Hell maybe Alex should have shut down his show long ago.  I mean, after all, what's the point right?  The hell with auditing the fed too.  "Aww, just send me to the camps after I turn in my guns, because I might not get treated that badly at the FEMA camp where if I fight I will lose my life.  I can at least dodge or run from the NWO, but dammit I'm not powerful enough to fight them."



"You don't have the mental strength to defend the Republic". --Alex Jones

I have the mental strength, do you?

Even if I am killed, I still win.

It is particularly interesting when you trace the evolution of a company like Microsoft's whose Natal is now in the works in order marry fun with surveilance. Microsoft's goal was to "bring a desktop into every home". That achievement was necessary in order to accustom the slaves to a digital lifestyle. The company spends millions on researching ways to enslave people in a digital lifestyle, so that being "online" becomes a new way of living for as many people as possible. This is considered a good thing: getting people used to be tracked via GPS, having their information published to the world, losing their sense of privacy. Technology is not just a cool tool - it replaces the natural order of things, a natural order that includes natural rights, God, humanity and everything else that has some semblance of truth. Technology is in the hands of evil. Unfortunately, people at MS and places like it have no clue who their true master is.

Good post, well said.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: aviana September 30, 2009, 04:05:54 AM
Oh geez AI.  It has hit me like a brick.  Thank you for taking the time to post the extras to make the penny drop.  I spent years in IT... networking, systems architecture, project management, data management, business solutions... all of this for - wait for it - British Intelligence, aka GCHQ.  As blatantly obvious as this should have been to me, I have been blinded by the wonders of technology for so long, to not consider it as a major part of the NWO agenda.  I had gotten back to basics - sanctity of life - you probably saw my PM earlier.

Much to think about.  Hope I can sleep now. Nite folks.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: RoadRunner September 30, 2009, 04:06:37 AM
I was braindead once myself.  I'm glad that someone disagreed with your assertion and took the time to wake me up.  By the way:  "waiting on a horde of braindead people" implies that no action is taken.  Hell maybe Alex should have shut down his show long ago.  I mean, after all, what's the point right?  The hell with auditing the fed too.  "Aww, just send me to the camps after I turn in my guns, because I might not get treated that badly at the FEMA camp where if I fight I will lose my life.  I can at least dodge or run from the NWO, but dammit I'm not powerful enough to fight them."



"You don't have the mental strength to defend the Republic". --Alex Jones

I have the mental strength, do you?

Even if I am killed, I still win.

Saturn > A Sheeple that coward at the mere shadow of a wolf.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Bacchanea September 30, 2009, 04:09:40 AM
 By the way:  "waiting on a horde of braindead people" implies that no action is taken.   I mean, after all, what's the point right?  The hell with auditing the fed too.  

This is very important - what you are saying here because it shines light on the nature of our brainwashing.  If X is perceived as bad and omnipotent, we then conclude that doing anything to get rid of X is ridiculous. After all, if something is omnipotent, why bother? (BTW: This logic is similar to medieval arguments regarding the nature of our relationship to God - but I digress). So this line of thinking could ONLY occur in a society that has no conception of God or the power of human nature, because it is easy to see, once you wake up, that the omnipotence is false. The omnipotence only appears to be as such because we are force-fed lies about what is powerful and good. I am sure this sounds like a movie plot or something, but basically once you see the truth, the false melts into a puddle of water. This is why shows like Alex's are important. Not because they have all the answers, but because they shine light on the false and the unreal. If you think you are weak, you are still buying into the system.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: JTCoyoté September 30, 2009, 04:10:53 AM
Sure, if I ever meet them, I'll thank them for enlightening me then proceed to explain to them the futility of what they're doing. If you really want to beat these people, do what they've done to get to power and stay in power. You know what that is. Until then, I don't think waiting on a horde of braindead people to wake up is a very good plan. I won't ruin your thread anymore, but thanks for your warning A_I. You're one of the reasons I don't watch the news anymore.

R_R: Good luck in your fight.

Kindly don't waste your time, if you meet them... you see people who are awakening people, as these ladies are, won't believe you one bit when you tell them that their successful efforts are futility...

Just continue on in your quest to make your money, and live your life, and those of us that you see as brain-dead, will continue fighting so you can pursue your selfishness to its end...

--Oldyoti

"If ye love wealth greater than liberty, the tranquillity
of servitude greater than the animating contest for freedom,
go home and leave us in peace. We seek not your council,
nor your arms. Crouch down and lick the hand that feeds you;
and may posterity forget that ye were our country men."
-- Samuel Adams
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Belial September 30, 2009, 04:25:35 AM
A cave in the mountains really doesn't seem like such a bad idea right about now.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: phosphene September 30, 2009, 04:38:55 AM
The gov doesnt care about us. Why would they need a pandemic to "legitimize" a GiG that is already fully functional?
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Dig September 30, 2009, 05:12:11 AM
1)  IT DOES NOT MATTER IF YOU DO NOT TAKE THE VACCINE, NOT TAKING IT WILL NOT MAKE YOU SAFE, YOU CAN STILL EASILY DIE IF YOU DO NOT HAVE SUFFICIENT VITAMIN D (LIKE 5X MIN THE RDA).  TAKING THE VACCINE ONLY ADDS INSULT TO INJURY (OR AN ADDITIONAL MURDER ATTEMPT TO INITIAL ATTEMPTED PREMEDITATED MURDER).  IT IS LIKE A BACKUP PLAN TO KILL YOU IF THE 1ST PLAN TO KILL, DISABLE, WEAKEN YOU FAILS.

2)  THE MILITARY IS GEARING UP BECAUSE THE FLU WILL BE FOLLOWED WITH TELEWORK (CONTINUITY OF OPERATIONS/COOP), OPERATING THE C.O.G. VIA REMOTE COMMAND CENTERS.  THIS IS GOING TO BE USHERED IN WITH MASSIVE CYBER ATTACKS TO DESTROY THE COM INFRASTRUCTURE AND CURRENT INTERNET.  THE INTERNET NOW ALREADY DOES NOT EXIST, IT IS ALL IPV6, CONVERTED VIA TRANSFORMERS AT THE BACKBONE LEVEL.  USJFCOM JUST STATED THAT THE GIG IS ALREADY FULLY OPERATIONAL ***NOW***--AND THAT IS *THE KEY* FOR THEM TO BE ABLE TO MILITARILY TAKE OVER THE ENTIRE PLANET WITH ADVANCED AI ENGINEERED COMBAT OPERATIONS THAT ARE GUARANTEED TO ACHIEVE MAXIMUM DEATH AND DESTRUCTION AND ELIMINATION OF THE ENEMIES OF THE NWO GLOBALLY.

3)  THE VACCINE IS A 2 PART VIRUS, THE VACCINE IS THE VIRUS, IT IS AN RNA RECOMBINANT WHICH WAS REVERSE ENGINEERED FROM THE SUPER FLU.  NO SH*T THAT "THE CURRENT SWINE FLU" IS "HYPED AND NOWHERE NEAR AS DEADLY AS CLAIMED".  ***DUH***, WTF IS YOUR PROBLEM PEOPLE?  WAIT UNTIL IT COMBINES WITH ***THE OTHER HALF***.

GO AND DO THE RESEARCH ON WHAT I JUST SAID, AND WHOEVER IS SPOUTING THIS F*CKING BULLSHIT ABOUT WONDERING WHY THEY ARE MASSIVELY GEARING UP FOR MARTIAL LAW OVER A VIRUS THAT ISN'T KILLING THAT MANY PEOPLE YET, SHUT YOU STUPID UNEDUCATED MOUTH AND REALIZE THAT THE CURRENT VIRUS ISN'T THE FINAL BIOWEAPON THAT THEY HAVE IN MIND THAT WILL ALLOW THEM TO LEGITIMIZE THE SWITCH-OVER TO INTERNET2 TO MAINTAIN COMMUNICATIONS FOR THE DOD AND GOVERNMENT COMPUTER SYSTEMS, AND OTHER CRITICAL INFRASTRUCTURE.  STOP BEING STUPID AND START READING PDF FILES FROM MORE THAN JUST THE CDC, START READING ABOUT TELEWORK, AND COOP AND YOU WILL GET THE WHOLE PICTURE.

All lines up with Indira Singh and otrhers.

They have invested too much into this and are dividing this country with Vaccine/non-vaccine people.

THERE ARE OVER 5,000 POSTS IN THIS FORUM ALONE EXPOSING THAT THIS VIRUS IS MANUFACTURED!

CNN/FOX/MSNBC are not running stories about it being manufactured, they are running stories about whether to get the shot or not...WTF?

How is this even possible, the criminals are exposed, we need to continue shinning glaring lights in their f**king faces.

RAND CORPORATION IS A GENOCIDAL PSYCHOPATHIC MACHINE OF DESTRUCTION!

PTECH WANTS US ALL ENSLAVED

GENERAL ELECTRIC HAS CONTRIBUTED TO MORE GENOCIDE THAN SATAN HIMSELF!

WAKE UP! This shit is ridiculous to be arguing over the death shots, that is a known issue.  We need to expose Battelle (Toxic Skies is a good movie for the brain dead to watch about this), WHO, CDC< Fort Detrich, Merck, Novartis, and many others.  All of the information is in this forum and hundreds of others.

I appreciate AI saying it like it is. We need to continue to reach out to whatever teams they plan on separating us into. We need to establish connections where they are trying to divide us.  Their only chance will be in dividing the public and having us fight each other.  They are less than 10,000 psychopaths and all of their mind control and trauma based programming has proven that humanity will not stand for this, unless they can keep the slaves fighting each other.  

I also recommend staying completely vigilant in exposing such glaring pilot projects for the takeover like what is going on in Harding. They will be sparking all kinds of these things to run their RAND CORPORATION TEST PROJECTS in addition to international cooperative projects.  All of these bullshit projects need to be exposed. They are doing behavioural modification research to judge the effectiveness of takeover plans, and push the population into divisions (cops v. protestors, vaccinated v. non-vaccinated, GOP v. Dem, etc.).  Screw up all of their bullshit tests through our god given rights. The fricking first amendment may have been curbed in the past 100 years, but it is still powerful enough to expose all of the psychopaths and continue shinning a light on them.  Once exposed, they scatter like cockroaches, we all have seen it.  They have been so protected for so long through deceptions and lies that they cannot handle even a shred of truth.  Just look at Jay Rockefeller going absolutely batshit crazy in front of millions of people because the world is finding out about his genocidal family.

If you do not know what I am talking about, maybe AJ can explain in the following video concerning how to expose bullshit wargames and bring it to a screeching halt live and in color:

[Sorry for the full 2 hour video, perhaps someone can extract the bullhorning of fake reporters covering fake attacks] http://video.google.com/videoplay?docid=-1551348336255792191

: Re: The vaccine is partially a psyop, not taking it will not make you safe
: InfoArsenal September 30, 2009, 06:37:28 AM
Yeah, I understand the post now.

The original had the thread title and some txt about 'f**king guests being full of shit on the Alex Jones show' or something and I was confused about who he was talking about and I guess he's referring to trolls on the board and call-ins to the show.

We've known that the vaccines were a pretext/excuse for martial law/the big clamp down since at least Gerald Celente claimed this was the beginning of the next revolutionary war--I think early last month.

Resisting the flu shot means resisting the police/military/gov so I guess it's the proper focal point.

You can't really convince people mercs are invading right now, but if you show them videos on Fox where they may make it mandatory people hopefully will arm and prepare themselves.

Just about the only thing you can do is arm/prepare yourself and keep informing on the net until they shut it down--there's not a whole lot of options.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Scootle September 30, 2009, 07:14:08 AM
So basically our only hope really is to somehow get every single person in the world to not take the vaccine, or at least a very small number. Even if just a few thousand take it alot of people are gonna die.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe September 30, 2009, 07:15:35 AM
Good thread and right on target.

But....

They could have easily pulled this off in 20 years without a hitch. Maybe 10-15.

They have sped things up for A REASON.

I know what it is. It is NEVER discussed here. NEVER allowed.

How do you pull off a thousand year conspiracy....
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Mike Philbin September 30, 2009, 07:16:08 AM
Even if just a few thousand take it alot of people are gonna die.

Well, if what I heard about VIRUS SHEDDING of the vaccinated is TRUE. Our planet don't need a few Typhoid Marys walking around factory fermenting this engineered virus.

: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Scootle September 30, 2009, 07:18:35 AM
They could have easily pulled this off in 20 years without a hitch. Maybe 10-15.

They have sped things up for A REASON.

I know what it is. It is NEVER discussed here. NEVER allowed.

How do you pull off a thousand year conspiracy....

They rushed it coz people are waking up in record numbers... if they waited they'd lose control ... thats why their skipping vital stepping stones and just going straight to full blown new world order.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: chris jones September 30, 2009, 08:35:43 AM

Hi Antilluminati.

Please know that I am not a young guy, not educated in the world of high teck, and due to some problems with A,Orange I have a bit of a problem at certain times with my memory, spelling etc. But don't count me out yet.
The reason I'm writing this is to confirm in my own mind how I have interpreted your post.

Question. Phase one, the vaccine, will not kill you but is a necessary innoculation to allow the second phase which is deadly.
In effect they are preparing for global depopulation. To mention they have profiled the masses and discerned who is not NWO, there will be blue targets and will be FEMA camped.

Ok. my puzzler, if in fact they have control of the internett, how will this effect the military. Exactly what will be the orders to the boys in the boots as far as American citizens are concerned.
My interpretation is that they have ultimate control of the internett, and one fine day can shut down private use and have a military monopoly globaly.

That they have informed the troopers if they decide to sway from orders given they will be eliminated.
A stupid question perhaps, but the military must be immmune to the killer virus? Have they been injected with a cure all. or true vacine, if not what keeps them alive to perform their mission.

You have mentioned Vitamin D as a safeguard to this virus(LIKE 5X MIN THE RDA) that one looses me, is there a laymans term for this RDA.

Can you help me out with these questions. I am not infering in any way I doubt this, as you know I put nothing past these human waste.

I have been wrong so many times in my life its disheartning, but my immediate thought is that the military under death threats or not will oppose the slaughter of the citizens. Am I off base here.

How will they spin to the masses that they have taken over the net, could it be they will state it for the good of the citizenry, NSA backed and stamped,or our present commader and chief deems it nesessary ordered.

I have been told that only dumb question is the one that is not asked. These questions may appear that way, but I admit to being in a foggy area here.

They appear to be sure of themselves in this venture. That is the one point I can not fathom. WHY.

I do know that many a sold out found their way to a dirt nap when they put the troops in harms ways knowingly and without concern, or used them for their own glory as if they were worms. What would be their orders to the troops in regards to either wack our their fellow citizens or be killed.
I am missing something here and embarassed, but if the guys I knew in boots, up to full bird colonells had recieved these orders they would turn their weaponry on those who gave the order, or stuff a grenade down their throat.

Excuse my ignorence, given the fact they have total control of the net, that they have rained death upon the masses with their pandemic, will this be their excuse for rounding up the resisters, or using the pandemic as tool to manipulate the Military with FEMA overiding all aspects of the gov as they have been given this option in time of National Emergency.

The input here has been positive as to their plan. I have a great deal of respect for truthers and heed their warning. Though in all sincerity if in fact they begin this scenario they will begin a civil war. They will be exposed, once exposed mans instinct for surival will peak, any peacefull alternative will be eliminated..











: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe September 30, 2009, 08:55:04 AM
Well - guess we will see what happens to the Military - maybe they want to kill them off first to let the Chinese and Mexican Armies in:

Military to get mandatory swine flu shots soon

By LOLITA C. BALDOR (AP) – 15 hours ago

WASHINGTON — U.S. military troops will begin getting required swine flu shots in the next week to 10 days, with active duty forces deploying to war zones and other critical areas going to the front of the vaccine line, a top military commander said Tuesday.

Air Force Gen. Gene Renuart also told The Associated Press that as many as 400 troops are ready to go to five regional headquarters around the country to assist federal health and emergency management officials if needed as the flu season heats up.

The Pentagon has bought 2.7 million vaccines, and 1.4 million of those will go to active duty military. National Guard troops on active duty are also required to receive the vaccine, as are civilian Defense Department employees who are in critical jobs.

As a result, the military is expected to provide health officials with an early assessment of the vaccine.

"Because I can compel people to get the shots, larger numbers will have the vaccine," said Renuart, commander of U.S. Northern Command. "They will, as a percentage of the population, be vaccinated more rapidly than many of us. So we may see some objective results, good or not, of the vaccinations."

Shots will be doled out on a priority basis, with troops preparing to deploy first, followed by other active duty forces, particularly any who might be needed to quickly respond to a hurricane or other emergency.

Families of military members will receive their shots through the military bases, who will be working with state officials and get their own shipments of the vaccine. Renuart said it appears there is enough of the vaccine to meet the military's needs.

Inoculating the military is a key requirement of the Pentagon's emergency plan, as a way to ensure that troops are available to protect the nation. They also will be on tap to provide help to states if problems come up as the flu season continues.

So far, Renuart said that between 15 and 20 troops have been dispatched to each of the five regional headquarters, to work with officials from the Centers for Disease Control and Prevention, the Department of Health and Human Services, the Federal Emergency Management Agency and state leaders.

But the military presence could rise to 80 in each regional office if needed, he said.

"If you see the virus begin to mutate or have a broader affect, or pockets where the vaccine isn't available or is less effective," and the local authorities need help, the military would send the additional support, Renuart said.

For the general population, the first swine flu vaccine should be in some doctors' offices as early as Oct. 5, according to U.S. health officials.

The early batches will protect 6 million to 7 million people, but over time, the government expects to have a total of 250 million doses of the new vaccine. About 10 percent of that has been promised to other countries.

Vaccine shipments will go directly to doctors, clinics and other providers designated by each state.

According to the CDC, the swine flu is widespread in 26 states now, up from 21 a week ago. While the CDC doesn't have an exact count of swine flu deaths and hospitalizations, reports suggest the infection has caused more than 600 deaths and more than 9,000 hospitalizations.

Copyright © 2009 The Associated Press. All rights reserved.

http://www.google.com/hostednews/ap/article/ALeqM5g928uDiWtcnBFT28j5UfIeUXXuMQD9B1838G2
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: mehevin September 30, 2009, 08:55:59 AM
My OH use to be like Saturn, didn't want to stand up, didn't want to talk out or let other people know, just wanted to use the information I give him to protect us.
As time goes on he seems to be changing his mind, for example, he won't take the shot and say he will even be prepared to lose his job over it, he lets friends and families know what is going on, but he still has the "there is nothing we can do, so what's the point of risking our lives over it", which frustrates me, he says its because he is a logical person, and I must admit he very rarely follows his heart over head (our relationship being one of those times that I can remember!), so I think it will just take more hard fact, and hopefully I will be able to provide those before it's to late.

 :-[


: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Satyagraha September 30, 2009, 09:14:04 AM

Ok. my puzzler, if in fact they have control of the internett, how will this effect the military. Exactly what will be the orders to the boys in the boots as far as American citizens are concerned.
My interpretation is that they have ultimate control of the internett, and one fine day can shut down private use and have a military monopoly globaly.


I also wondered about this, since they seem to be giving soldiers the first round of vaccines. One thing that strikes me is whether they see the need for as many 'boots' as they used to have... perhaps they're willing to see a population reduction in military forces because they have their 'backups' - automated killing machines etc. But not sure about that.. speculating.

You have mentioned Vitamin D as a safeguard to this virus(LIKE 5X MIN THE RDA) that one looses me, is there a laymans term for this RDA.


RDA - the government's 'recommended daily allowance'.


I have been wrong so many times in my life its disheartning, but my immediate thought is that the military under death threats or not will oppose the slaughter of the citizens. Am I off base here.

How will they spin to the masses that they have taken over the net, could it be they will state it for the good of the citizenry, NSA backed and stamped,or our present commader and chief deems it nesessary ordered.

I have been told that only dumb question is the one that is not asked. These questions may appear that way, but I admit to being in a foggy area here.


QFT: the only dumb question is the one that is not asked

Well Chris - they may have sprayed you with Agent O in Viet Nam, but they didn't do squat to lessen your spirit or your heart.

: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Dig September 30, 2009, 09:40:23 AM
So basically our only hope really is to somehow get every single person in the world to not take the vaccine, or at least a very small number. Even if just a few thousand take it alot of people are gonna die.

Keep shinning a powerful light on these pieces of shit.  AI and others have posted their names, their pictures, their own documents.  Expose them in WAC type confrontations like the one with Kissinger.

"Why are you trying to exterminate 100 million americans?" That might be a good opening line, you know to break the ice.

THEY REALLY THINK WE ARE EITHER TOO STUPID TO KNOW OR TOO SCARED TO CONFRONT THEM WITH FREE SPEECH.

They are wrong.

Just talk to everyone about this stuff, I mean it is getting to be obvious.  "Why are they forcing 8 year old girls to take poisons that kill them for the possibility of protecting them in 20 years from a highly treatable cancer?" I mean there are  over 1,000 opening questions to ask anyone.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: mr anderson September 30, 2009, 09:48:43 AM

1) It does not matter if you do not take the vaccine, not taking it will not make you safe, you can still easily die if you do not have sufficient vitamin d (like 5x min the RDA).  taking the vaccine only adds insult to injury (or an additional murder attempt to initial attempted premeditated murder). It is like a backup plan to kill you if the 1st plan to kill, disable, weaken you fails.

2) The military is gearing up because the flu will be followed with telework (continuity of operations/coop), operating the c.o.g. via remote command centers. This is going to be ushered in with massive cyber attacks to destroy the com infrastructure and current internet. The internet now already does not exist, it is all ipv6, converted via transformers at the backbone level.  Usjfcom just stated that the gig is already fully operational ***now***--and that is *the key* for them to be able to militarily take over the entire planet with advanced ai engineered combat operations that are guaranteed to achieve maximum death and destruction and elimination of the enemies of the nwo globally.

3) The vaccine is a 2 part virus, the vaccine is the virus, it is an rna recombinant which was reverse engineered from the super flu. No sh*t that "the current swine flu" is "hyped and nowhere near as deadly as claimed".  ***duh***, wtf is your problem people? Wait until it combines with ***the other half***.

Go and do the research on what i just said, and whoever is spouting this f*cking bullshit about wondering why they are massively gearing up for martial law over a virus that isn't killing that many people yet, shut you stupid uneducated mouth and realize that the current virus isn't the final bioweapon that they have in mind that will allow them to legitimize the switch-over to internet2 to maintain communications for the dod and government computer systems, and other critical infrastructure. Stop being stupid and start reading pdf files from more than just the cdc, start reading about telework, and coop and you will get the whole picture.

I understood that without reading much into it. It's more about common sense and figuring out as you said why there is such a buildup of this technological control grid for something that is less deadly than the normal flu.

And yes it's quite simple - The vaccine combines with the current strain ( ? )

So the other obvious point is: Why would the Pharmaceutical industry / Eugenicists go to so much effort creating countless hundred millions of h1n1 vaccine vials if they didn't intend on using it.

Even if you do not take it under the 'voluntary phase', the calm before the storm the powers that be know that the vaccine will be there for you in the 'mandatory phase' when they can flick the switch and have the necessary resources to deal with you.  

Not taking it may soon mean it will become impossible to freely eat, drink, sleep and work where we choose.

Information is key, defense is a last resort.

-----------------

Funeral homes prepare for possible H1N1 surge
http://www.wkyc.com/news/health/health_article.aspx?storyid=122410&catid=7

Excerpt:

CLEVELAND — As Americans await the release of the H1N1 vaccine, companies, families and individuals are doubling down their efforts to inoculate themselves against the possible pandemic.

One industry preparing for a run on product is the last industry you’ll rely on: the funeral home.

“We need to make sure we have enough embalming fluid and caskets,” said Mark Busch, of Busch funeral ho,mes. “We need to make sure cemeteries have enough grave diggers.”

The Ohio Association of Funeral Directors now meets regularly to prepare for a potential once in a generation mortality spike.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Dig September 30, 2009, 10:10:36 AM
Hi Antilluminati.

Please know that I am not a young guy, not educated in the world of high teck, and due to some problems with A,Orange I have a bit of a problem at certain times with my memory, spelling etc. But don't count me out yet.
The reason I'm writing this is to confirm in my own mind how I have interpreted your post.

Question. Phase one, the vaccine, will not kill you but is a necessary innoculation to allow the second phase which is deadly.
In effect they are preparing for global depopulation. To mention they have profiled the masses and discerned who is not NWO, there will be blue targets and will be FEMA camped.

Ok. my puzzler, if in fact they have control of the internett, how will this effect the military. Exactly what will be the orders to the boys in the boots as far as American citizens are concerned.
My interpretation is that they have ultimate control of the internett, and one fine day can shut down private use and have a military monopoly globaly.

That they have informed the troopers if they decide to sway from orders given they will be eliminated.
A stupid question perhaps, but the military must be immmune to the killer virus? Have they been injected with a cure all. or true vacine, if not what keeps them alive to perform their mission.

You have mentioned Vitamin D as a safeguard to this virus(LIKE 5X MIN THE RDA) that one looses me, is there a laymans term for this RDA.

Can you help me out with these questions. I am not infering in any way I doubt this, as you know I put nothing past these human waste.

I have been wrong so many times in my life its disheartning, but my immediate thought is that the military under death threats or not will oppose the slaughter of the citizens. Am I off base here.

How will they spin to the masses that they have taken over the net, could it be they will state it for the good of the citizenry, NSA backed and stamped,or our present commader and chief deems it nesessary ordered.

I have been told that only dumb question is the one that is not asked. These questions may appear that way, but I admit to being in a foggy area here.

They appear to be sure of themselves in this venture. That is the one point I can not fathom. WHY.

I do know that many a sold out found their way to a dirt nap when they put the troops in harms ways knowingly and without concern, or used them for their own glory as if they were worms. What would be their orders to the troops in regards to either wack our their fellow citizens or be killed.
I am missing something here and embarassed, but if the guys I knew in boots, up to full bird colonells had recieved these orders they would turn their weaponry on those who gave the order, or stuff a grenade down their throat.

Excuse my ignorence, given the fact they have total control of the net, that they have rained death upon the masses with their pandemic, will this be their excuse for rounding up the resisters, or using the pandemic as tool to manipulate the Military with FEMA overiding all aspects of the gov as they have been given this option in time of National Emergency.

The input here has been positive as to their plan. I have a great deal of respect for truthers and heed their warning. Though in all sincerity if in fact they begin this scenario they will begin a civil war. They will be exposed, once exposed mans instinct for surival will peak, any peacefull alternative will be eliminated..



You are a blessing to this forum and shine bright lights of hope and truth in very dark caverns.

The military will never do this, not the American military. People like Admiral Fallon, Ron Paul, Jesse Ventura are the heart and soul of the US military (retired or not).

That is the reason that Blackwater is still protected, same with Wackenhut, CACI, and Kroll. They are busy exterminating the American soldier in bullshit wars (genocides actually) with mandatory vaccines, depleted uranium poisoning, PTSD, suicidal tendencies, rape, etc. There is an entire room here dedicated to Kissinger and company's systematic disintegration of the American soldier as a possible defense for what things may come:

http://forum.prisonplanet.com/index.php?board=397.0
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: aviana September 30, 2009, 11:05:55 AM
I understood that without reading much into it. It's more about common sense and figuring out as you said why there is such a buildup of this technological control grid for something that is less deadly than the normal flu.

Right - that is what I couldn't get my mind around.

And yes it's quite simple - The vaccine combines with the current strain ( ? )

It makes a lot of sense when you think about why they are not testing specifically for H1N1, just flu, and then calling swine flu.  They are already mandating the vaccine in NY, the military and other areas.  Eventually, it will be rolled out everywhere, and you won't even be able to say, "But I already had that strain - I am immune", because there was no conclusive proof, per a specific test, that you actually had H1N1 (even though you did), so you'll have to get the shot anyway. iirc, they were, and are, testing for every suspected case of H5N1 (haven't checked that news in a while, so may be off base). So, what's the diff?!

So the other obvious point is: Why would the Pharmaceutical industry / Eugenicists go to so much effort creating countless hundred millions of h1n1 vaccine vials if they didn't intend on using it.

Bingo.

Even if you do not take it under the 'voluntary phase', the calm before the storm the powers that be know that the vaccine will be there for you in the 'mandatory phase' when they can flick the switch and have the necessary resources to deal with you. 

Jury's still out on that one in my mind.  Unless the military are mindless zombies, how on earth are they going to mobilize them in that fashion?  Hoping to be right, but just know that this will be proved wrong. :(
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: NWOSCUM September 30, 2009, 12:20:31 PM
Good thread and right on target.

But....

They could have easily pulled this off in 20 years without a hitch. Maybe 10-15.

They have sped things up for A REASON.

I know what it is. It is NEVER discussed here. NEVER allowed.

How do you pull off a thousand year conspiracy....

Well....why the quickening?  Please PM me if you don't want to post it here.  I want to know what your thoughts are.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe September 30, 2009, 12:56:09 PM
Google "phantom DNA"....
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: codemonkey70 September 30, 2009, 01:00:24 PM
www.youtube.com/watch?v=1H7szhBgyVA
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: NWOSCUM September 30, 2009, 01:25:13 PM
Ok, PtTurboe and thanks for the link CodedMonkey........
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe September 30, 2009, 01:28:28 PM
10-4 and good link...
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: sociostudent September 30, 2009, 01:36:52 PM
1)  IT DOES NOT MATTER IF YOU DO NOT TAKE THE VACCINE, NOT TAKING IT WILL NOT MAKE YOU SAFE, YOU CAN STILL EASILY DIE IF YOU DO NOT HAVE SUFFICIENT VITAMIN D (LIKE 5X MIN THE RDA).  TAKING THE VACCINE ONLY ADDS INSULT TO INJURY (OR AN ADDITIONAL MURDER ATTEMPT TO INITIAL ATTEMPTED PREMEDITATED MURDER).  IT IS LIKE A BACKUP PLAN TO KILL YOU IF THE 1ST PLAN TO KILL, DISABLE, WEAKEN YOU FAILS.

2)  THE MILITARY IS GEARING UP BECAUSE THE FLU WILL BE FOLLOWED WITH TELEWORK (CONTINUITY OF OPERATIONS/COOP), OPERATING THE C.O.G. VIA REMOTE COMMAND CENTERS.  THIS IS GOING TO BE USHERED IN WITH MASSIVE CYBER ATTACKS TO DESTROY THE COM INFRASTRUCTURE AND CURRENT INTERNET.  THE INTERNET NOW ALREADY DOES NOT EXIST, IT IS ALL IPV6, CONVERTED VIA TRANSFORMERS AT THE BACKBONE LEVEL.  USJFCOM JUST STATED THAT THE GIG IS ALREADY FULLY OPERATIONAL ***NOW***--AND THAT IS *THE KEY* FOR THEM TO BE ABLE TO MILITARILY TAKE OVER THE ENTIRE PLANET WITH ADVANCED AI ENGINEERED COMBAT OPERATIONS THAT ARE GUARANTEED TO ACHIEVE MAXIMUM DEATH AND DESTRUCTION AND ELIMINATION OF THE ENEMIES OF THE NWO GLOBALLY.

3)  THE VACCINE IS A 2 PART VIRUS, THE VACCINE IS THE VIRUS, IT IS AN RNA RECOMBINANT WHICH WAS REVERSE ENGINEERED FROM THE SUPER FLU.  NO SH*T THAT "THE CURRENT SWINE FLU" IS "HYPED AND NOWHERE NEAR AS DEADLY AS CLAIMED".  ***DUH***, WTF IS YOUR PROBLEM PEOPLE?  WAIT UNTIL IT COMBINES WITH ***THE OTHER HALF***.

GO AND DO THE RESEARCH ON WHAT I JUST SAID, AND WHOEVER IS SPOUTING THIS F*CKING BULLSHIT ABOUT WONDERING WHY THEY ARE MASSIVELY GEARING UP FOR MARTIAL LAW OVER A VIRUS THAT ISN'T KILLING THAT MANY PEOPLE YET, SHUT YOU STUPID UNEDUCATED MOUTH AND REALIZE THAT THE CURRENT VIRUS ISN'T THE FINAL BIOWEAPON THAT THEY HAVE IN MIND THAT WILL ALLOW THEM TO LEGITIMIZE THE SWITCH-OVER TO INTERNET2 TO MAINTAIN COMMUNICATIONS FOR THE DOD AND GOVERNMENT COMPUTER SYSTEMS, AND OTHER CRITICAL INFRASTRUCTURE.  STOP BEING STUPID AND START READING PDF FILES FROM MORE THAN JUST THE CDC, START READING ABOUT TELEWORK, AND COOP AND YOU WILL GET THE WHOLE PICTURE.

damn. This sucks. I really don't know what else to say, i don't want to make matters worse by saying anything at all.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: unbound September 30, 2009, 01:53:01 PM
If TPTB honestly think people are going to stand by and let this crap happen they are sadly mistaken. In fact, if they think the entire military force is dumb enough to enforce this, knowing that after they are done, TPTB will dispose of them, they are sadly mistaken. To assume people are going to willingly take these shots, while they have the weapons to defend themselves is naive and stupid. The house of cards is coming down, and they are scrambling to stop it. They are desperate. This entire operation stinks of desperation. You hear me NWO? You stink, and it's pathetic.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: TahoeBlue September 30, 2009, 02:11:57 PM
3)  The vaccine is a 2 part virus, The vaccine is the virus, It is an RNA recombinant which was reverse engineered  from the super flu.

With mass Eugenic's unlimited funding project a Global Binary Biological weapon is entirely possible with the many years of research and preparation behind it.

Try: Binary Weapon search : Generally referred to with "Chemical weapons"

http://www.google.com/search?hl=en&source=hp&q=binary+weapon&btnG=Google+Search&aq=f&oq=&aqi=

Now try: "binary biological weapon"

http://www.google.com/search?hl=en&q=%22binary+biological+weapon%22&btnG=Search&aq=f&oq=&aqi=

http://www.bibliotecapleyades.net/ciencia/ciencia_virus08.htm

Next Generation Bioweapons - Genetic Engineering and Biological Warfare..

...

This paper has two purposes:

The first part consolidates accounts of genetic engineering from sources close to the former Soviet Union’s BW program.

The remainder of the paper discusses near-term future capabilities of genetic engineering and biological warfare from an American perspective.

The “next generation” of biological weapons made possible through genetic engineering will be asymmetric weapons par excellence.

...
“Temple Fortune”
In the spring of 1992, a lower-level bench scientist who had worked on plague research in Pasechnik’s lab also defected to the United Kingdom.13 He has remained undercover and is referred to by code-name “Temple Fortune.”

He fully corroborated Pasechnik’s previous account, and then updated the British on Soviet BW work in the 30-month interval from Pasechnik’s departure to that of “Temple Fortune.”

President Mikhail Gorbachev had ordered the termination of biological offensive programs in 1990, and despite the fact that President Boris Yeltsen had also announced (by televised address to the Russian people and in a personal commitment to President Bush) termination of the program, research on new forms of plague had secretly continued.14

“Temple Fortune” stated that, in addition to being even more resistant to multiple antibiotics, the improved super-plague would be non-virulent in its stored form, but could be easily converted into a deadly antibiotic-resistant form when needed for weaponization.15 The genes that cause plague virulence are located on a plasmid.

What he was describing was a binary biological weapon, where benign bacterial plague cells would be mixed with virulence-enhancing plasmids immediately before loading on a weapon, and the transformation would take place in a small bioreactor on the weapon itself.16

...

The above accounts from Russians knowledgeable about their BW programs indicate active research and success in genetic engineering, chimera agents, and binary biologicals. From public record accounts, we know that the former Soviet Union (FSU) used genetic engineering techniques in their massive offensive BW program.38

...

This JASON 84 Group provides technical advice to the U.S. government and “facilitates the contributions of scientists to problems of national security and public benefit.” Their meeting concentrated on the near-term future threat of biological warfare, specifically on genetically engineered pathogens and weapons.

The JASON Group that met in 1997 grouped potential genetically engineered pathogens into six broad groups of potential futuristic threats.85

The biotechnology exists today for some of these possibilities. Indeed, some genetically engineered agents may have already been produced and stockpiled.
 

Binary Biological Weapons 86

Analogous to a binary chemical weapon, this is a two-component system consisting of innocuous parts that are mixed immediately prior to use to form the pathogen.

This process occurs frequently in nature. Many pathogenic bacteria contain multiple plasmids (small circular extrachromosomal DNA fragments) that code for virulence or other special functions. The virulence of anthrax, plague, dysentery, and other diseases is enhanced by these plasmids.

What occurs naturally in nature can be artificially conducted with basic biotechnology techniques in the laboratory. Virulent plasmids can be transferred among different kinds of bacteria and often across species barriers.

To produce a binary biological weapon, a host bacteria and a virulent plasmid could be independently isolated and produced in the required quantities. Just before the bioweapon was deployed, the two components would be mixed together. The transformation of the host organism back into a pathogen could conceivably take place after a weapon is triggered and during transport/flight.

“Temple Fortune” indicated that scientists in the FSU had mastered this technique.
...
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: luckee1 September 30, 2009, 02:15:07 PM
Chris Jones:
That they have informed the troopers if they decide to sway from orders given they will be eliminated.
A stupid question perhaps, but the military must be immmune to the killer virus? Have they been injected with a cure all. or true vacine, if not what keeps them alive to perform their mission.

They have not truly informed the troops, like they did not inform you.  Just like they didn't inform the Gulf War troops.  

Not a stupid question at all!

No the troops are not injected with a cure all.  They are injected, if they die so be it.  If they live then, ok they get deployed to another country (away from Their American people) and U.N. troops or Global armed groups are here.  Note the Hardin, MT American Police Force situation.  This does not even require those organizations to be everywhere in America.  The reason is, there are plenty of Americans (police, Obamakids, now Boy Scouts) who will aim in on their own countrymen.  You also have the added factor of the immigrants who are given citizenship here if they serve in the military.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: aviana September 30, 2009, 02:58:07 PM
www.youtube.com/watch?v=1H7szhBgyVA

"Our emotions directly effect the structure of our DNA, which directly shapes the physical world we experience every day."

Fear and love being the only two emotions that we experience, with all other emotions being a branch of those.  It makes a lot of sense.  It is exactly those two emotions that are exploited 24/7 to dictate how we live our lives and react to environmental factors.

Great vid.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: chris jones September 30, 2009, 03:01:44 PM
Hi Sane.

Remenber taking this oath: I know you do.

, (NAME), do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; and that I will obey the orders of the President of the United States and the orders of the officers appointed over me, according to regulations and the Uniform Code of Military Justice. So help me God.

Some took this oath very seriously.

Closely related for Federal officials, including the Commander and chief.

The current oath was enacted in 1884:
I do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservation or purpose of evasion; and that I will well and faithfully discharge the duties of the office on which I am about to enter: So help me God.

The problem, these are not simply words, they are the basis of our freedoms, honour and integrity as a nation and it citizenry.

Your information in regards to their abuse of the troops is staggering. I was aware of a good deal of their cruelty and inhuman sacrifice, yet this has enlightened me as to how far they gone.  

This move their making, it will be their undoing.

P.S. I was truly humbled by your begining comment, thanks S.


: Re: The vaccine is partially a psyop, not taking it will not make you safe
: thnkfstpal September 30, 2009, 07:00:46 PM
Well it's about f**kin time. Jeez I was thinking the stupid and foolish NWO would get cost first.

I mean come on the NWO soldiers are gonna really screw up their own lives too. No more baseball, no more hot chicks that will actually fall iin love with you. No more impressing people with your power and money and cars.

I mean who are they gonna impress when they go through with this.

Even their own people are gonna be bummed at the Endgame.

I'm not scared because I'm eternal and so is my family, although I do like seeing and hearing music and thw wind and the changing of seasons.

This New World Order is going to be no fun at all.

If they come to round up the patriots I guess I'll go down fighting but I'm gonna make sure I'm laughing as well.

I'm not to worried for the world, I just wish I could be around to see all the fake libs and neo cons tell us we were right all along ya know?

NWO or not we ALL win when it comes right down to it.

Also the technology was fun while it lasted and these little tech soldiers that work for them sure are smart, awesome control grid guys. Terrible job though, thanks for being dicks and ruining everyones lives.

WE WIN ANYWAY. Have fun NWO this is your last hurrah.


: Re: The vaccine is partially a psyop, not taking it will not make you safe
: centexan September 30, 2009, 07:19:15 PM
There's so much to keep up with on this forum, can someone point me to the Vitamin D info that AI talked about in the first post?  Is there another thread regarding this?  I'm wondering why 5X the minimum RDA.

Thanks.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Harconen September 30, 2009, 08:34:44 PM
U.S. Military to get mandatory swine flu shots soon


Lolita C. Baldor
Associated Press
Wed, 30 Sep 2009 15:24 EDT

http://www.google.com/hostednews/ap/article/ALeqM5g928uDiWtcnBFT28j5UfIeUXXuMQD9B1838G2


U.S. military troops will begin getting required swine flu shots in the next week to 10 days, with active duty forces deploying to war zones and other critical areas going to the front of the vaccine line, a top military commander said Tuesday.

Air Force Gen. Gene Renuart also told The Associated Press that as many as 400 troops are ready to go to five regional headquarters around the country to assist federal health and emergency management officials if needed as the flu season heats up.

The Pentagon has bought 2.7 million vaccines, and 1.4 million of those will go to active duty military. National Guard troops on active duty are also required to receive the vaccine, as are civilian Defense Department employees who are in critical jobs.

As a result, the military is expected to provide health officials with an early assessment of the vaccine.

"Because I can compel people to get the shots, larger numbers will have the vaccine," said Renuart, commander of U.S. Northern Command. "They will, as a percentage of the population, be vaccinated more rapidly than many of us. So we may see some objective results, good or not, of the vaccinations."

Shots will be doled out on a priority basis, with troops preparing to deploy first, followed by other active duty forces, particularly any who might be needed to quickly respond to a hurricane or other emergency.

Families of military members will receive their shots through the military bases, who will be working with state officials and get their own shipments of the vaccine. Renuart said it appears there is enough of the vaccine to meet the military's needs.

Inoculating the military is a key requirement of the Pentagon's emergency plan, as a way to ensure that troops are available to protect the nation. They also will be on tap to provide help to states if problems come up as the flu season continues.

So far, Renuart said that between 15 and 20 troops have been dispatched to each of the five regional headquarters, to work with officials from the Centers for Disease Control and Prevention, the Department of Health and Human Services, the Federal Emergency Management Agency and state leaders.

But the military presence could rise to 80 in each regional office if needed, he said.

"If you see the virus begin to mutate or have a broader affect, or pockets where the vaccine isn't available or is less effective," and the local authorities need help, the military would send the additional support, Renuart said.

For the general population, the first swine flu vaccine should be in some doctors' offices as early as Oct. 5, according to U.S. health officials.

The early batches will protect 6 million to 7 million people, but over time, the government expects to have a total of 250 million doses of the new vaccine. About 10 percent of that has been promised to other countries.

Vaccine shipments will go directly to doctors, clinics and other providers designated by each state.

According to the CDC, the swine flu is widespread in 26 states now, up from 21 a week ago. While the CDC doesn't have an exact count of swine flu deaths and hospitalizations, reports suggest the infection has caused more than 600 deaths and more than 9,000 hospitalizations.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Mithridates September 30, 2009, 08:45:12 PM
Question: I've been taking vitamin D3 supplements as well as vitamin C and E, is this adequate?
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: davidnay September 30, 2009, 09:16:56 PM
I know there's some real f*cked up sh*t going on in this world. I know 9/11 was an 'inside job' and we are being poisoned through our food supply, and I know the media lies about nearly everything. etc etc. That stuff is easy to see.
Now here's what I'm having trouble with- All the things you post AI I just don't get. Sane and some others don't seem to have any trouble absorbing and translating your material but for me it all seems random and over my head. I just can't connect the dots you're giving us. Don't take this the wrong way but you're either a genius or full of sh*t. Personally I'm hoping you're full of shit coz otherwise we're all f*cked.
Don't mind me. Just venting.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: luckee1 September 30, 2009, 09:36:35 PM
I know there's some real f*cked up sh*t going on in this world. I know 9/11 was an 'inside job' and we are being poisoned through our food supply, and I know the media lies about nearly everything. etc etc. That stuff is easy to see.
Now here's what I'm having trouble with- All the things you post AI I just don't get. Sane and some others don't seem to have any trouble absorbing and translating your material but for me it all seems random and over my head. I just can't connect the dots you're giving us. Don't take this the wrong way but you're either a genius or full of sh*t. Personally I'm hoping you're full of shit coz otherwise we're all f*cked.
Don't mind me. Just venting.

I have only been a member here for less than a year.  What I did was read everything he wrote (I think I missed many of them)  But even though i didn't get it, I read it anyway.  I let the back of my mind mull on it.  One day like I posted above, it all came together.  And yes we are f**ked.  But we all still can fight, we aint dead yet.  In all ways prepare for it. 
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Harconen September 30, 2009, 09:44:41 PM
I have only been a member here for less than a year.  What I did was read everything he wrote (I think I missed many of them)  But even though i didn't get it, I read it anyway.  I let the back of my mind mull on it.  One day like I posted above, it all came together.  And yes we are f**ked.  But we all still can fight, we aint dead yet.  In all ways prepare for it. 

You are not alone in this. Whole world is f**ked. This s#it is global.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: foreverfree September 30, 2009, 10:02:02 PM
Let's get back on topic, which was the virus specifically.  In a nutshell, can we break this down? 

1.  The H1N1 virus is actually 2 viruses split in half.  The first, mild, half is already spread worldwide.  It was what broke out earlier this year in Mexico.  A few died, but most just get mild flu symptoms and continue on.  The 2nd part of the virus is contained in the "vaccine" itself.  You have already been exposed to the first part and once you get part 2 from the vaccine, it combines in your body and becomes a "super virus" equatable to the 1918 flu epidemic that killed 20% of the world's population.

2.  Once this starts to take place, panic will set in and martial law will be declared.  A breakdown of society will occur, leading to the WHO to force those who refuse the vaccine into quarantines in the FEMA camps set up across the nation. 


That much, I've understood.  Is there more to expect after this?   
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: centexan September 30, 2009, 10:07:11 PM
Found a lot of info on Vitamin D & flu shots:

http://www.google.com/search?hl=en&source=hp&fkt=15250&fsdt=29453&q=vitamin+d+flu+shot&aq=3&oq=vitamin+d+flu&aqi=g8g-m1

One article says flu may possibly be seasonal because in the cold months we get less sun (primary source of Vitamin D...sunshine helps your body manufacture Vitamin D), so less sun = more flu.  Article said 20 minutes in the sun is equal to consuming 200 vitamin D fortified glasses of milk.  I was out trying to waylay feral pigs for a couple of hours today, so that was like drinking 1200 glasses of milk.  Boy am I full.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Republic Renewal September 30, 2009, 10:16:10 PM
Let's get back on topic, which was the virus specifically.  In a nutshell, can we break this down? 

1.  The H1N1 virus is actually 2 viruses split in half.  The first, mild, half is already spread worldwide.  It was what broke out earlier this year in Mexico.  A few died, but most just get mild flu symptoms and continue on.  The 2nd part of the virus is contained in the "vaccine" itself.  You have already been exposed to the first part and once you get part 2 from the vaccine, it combines in your body and becomes a "super virus" equatable to the 1918 flu epidemic that killed 20% of the world's population.

2.  Once this starts to take place, panic will set in and martial law will be declared.  A breakdown of society will occur, leading to the WHO to force those who refuse the vaccine into quarantines in the FEMA camps set up across the nation. 


That much, I've understood.  Is there more to expect after this?   


You mean besides the secret police, the FEMA camps , the foreign mercs, the failing dollar, the north american union, the global takeover and a New World Order? No not much sir.  Not much.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: foreverfree September 30, 2009, 10:32:28 PM
500 Victory Road,, Marina Bay,, Quincy, Massachusetts (MA), 02171,  is PTECH's headquarters.  may or maynot be useful.


I meant specifically, what is expected?  A massive attack designed to disrupt the internet completely?  Since this truth movement relies almost completely on internet communication, this will be a death blow to any resistance outside of a military coup. 
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Belial September 30, 2009, 10:37:53 PM
I've got a mrs and kids. How can I save them? I've started storing food and fuel but I really feel like I should be more prepared.

If push comes to shove I can head to the outback and avoid people altogether.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Mithridates September 30, 2009, 10:52:41 PM
You got to wonder, if they want to use our military against us, why are they vaccinating our soldiers first?
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: kidA September 30, 2009, 11:24:09 PM
Well - guess we will see what happens to the Military - maybe they want to kill them off first to let the Chinese and Mexican Armies in:

Military to get mandatory swine flu shots soon

.....

I posted that article on another MB I visit and I got this response:

"I'm actually the guy that makes this happen.  Remember I do work in Navy medicine.  I'm actually waking up early tomorrow because I'm administering the vaccine to all my marines in the morning.  This is seriously no big deal.  I have been getting mandatory flu shots for years.  Since before I joined the military.  All health care workers, military, and elderly are usually mando for the flu shots.  It has nothing to do with h1n1.  Its the same as the annual flu shots we have all been getting for decades."

This guys has a "DON'T TREAD ON ME" flag in his sig. He's a Ron Paul supporter and pretty awesome. So I trust what he says...

and then I said:

"I just remember you saying you weren't gonna take the h1n1 shot."

so then he said:

"and I wont.  I dont take the mando anthrax shots either.  To be honest, I might not even take this flu shot.  Its the Nasal mist.  I like the shot better.  The Nasal mist is a live virus and can legit get you sick.  The shot is dead and only gets you sick in your head

But thats a power I have because I'm medical and I can just write down whatever I want in my record.  Of course me being me, if any of my marines had any real reasons to not want these shots other than being scarred of needles, I would do the same for them.  I'm telling you guys, not all of us in the military - government are bad"
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: thnkfstpal October 01, 2009, 12:46:57 AM
AI seems pretty convinced we're all gonna die and this is the big one.

Anyway I haven't fully read any of his posts but I still understand them.

Basically there is a tech shadow government just like the fed reserve is the financial shadow government, and boy is this tech bad bad bad. Track, trace no wires needed, frame you, input shit on your cell, computer etc no wires needed. Kill you with remote drones, space satelites etc. Northcom remote access to all digital content including all of your financial records, your hobbies, interests, you physical location, no wires needed.

That about sums it up.

Oh and he has inside info from northcom that basically the NWO is ready to kill us all and throw the ones who slip by the death in to FEMA camps.

I am not sure if this is IT though, I kinda think he's jumpin the gun on that prediction.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Dig October 01, 2009, 07:19:01 AM
Well - guess we will see what happens to the Military - maybe they want to kill them off first to let the Chinese and Mexican Armies in:


they ultimately wnt a clone wars against the last remaining decent american soldiers.  i doubt tey are anywhere near ready, but that is their fantastical wet dream.  reading these sick f**ks is like delving into the mind of a complete lunatic. they are absent of any humanity whatsoever.  in the meatime, chinese will not comply on a large scale, but surrounding cultures may. as far as mexican paramility, that is already going on.

iraq is a test of total domination and occupation for 100 years with a team of foreign occupiers.  These tests have been going on for thousands of years and have always failed.  But they keep doing them.

This is what the NWO feels is a happy, healthy community:

(http://www.blackfive.net/photos/uncategorized/2009/01/29/basra_buddies_hires_090120n9286m095.jpg)(http://teapottantrums.typepad.com/photos/uncategorized/soldiers_see_saw.jpg)(http://teapottantrums.typepad.com/photos/uncategorized/soldier_forces_child_to_work.jpg)(http://img176.imageshack.us/img176/9018/zcu8.jpg)(http://www.theage.com.au/ffximage/2007/06/20/knIRAQI_KID_wideweb__470x341,0.jpg)(http://www.oksenate.gov/news/press_releases/press_releases_2009/pr20090520e2.jpg)(http://bloximages.chicago2.vip.townnews.com/billingsgazette.com/content/tncms/assets/editorial/3/b1/aa0/3b1aa073-de13-595c-9562-2ec38d24fe06.image.jpg)(http://media.commercialappeal.com/mca/content/img/photos/2009/06/19/010_Iraq_US_Troops_t600.JPG)

If these images both of the occupiers and the occupied do not piss you off, then you are not paying attention. Our brothers and sisters are forced to act like robocops in a foreign land and the children are conditioned to accept the idea that they are imprisoned from cradle to grave.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Dig October 01, 2009, 09:50:25 AM
Those fluff pictures above for the public relations companies like Renden, Lincoln, and Omnicom reveal the disired portrayal of soldiers ad children livng in a happy peaceful society while we all know the truth concerning war, soldiers, and children.

Both the soldier and the child are affected beyond belief, including the families of the fallen. One million of those fluff pictures will never make up for the truth about these abominations created by the masters of war:

(http://sfcmac.files.wordpress.com/2009/03/us-soldier-cradles-child-victim-of-terrorists.jpg)
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Satyagraha October 01, 2009, 11:06:50 AM
Both the soldier and the child are affected beyond belief, including the families of the fallen. One million of those fluff pictures will never make up for the truth about these abominations created by the masters of war:

(http://sfcmac.files.wordpress.com/2009/03/us-soldier-cradles-child-victim-of-terrorists.jpg)

QFT. The pictures carried home in the minds of these soldiers are lasting, indelible. The images seen by the public; sanitized for your protection; don't begin to show the real truth of what happens when the masters want a war.

I have an uncle who did three tours as a helicopter pilot in Viet Nam. Came home to fly rescue in the Honolulu F.D., but he was not the same person who left from Ft. Rucker training for Viet Nam. He came home without any physical wounds... but the images that must have been burned into his mind were visible only to himself. I think all of the men and women we send to war come home wounded. The wounds you can't see are perhaps more devastating than the ones you can.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Mike Philbin October 01, 2009, 11:40:46 AM
I could NEVER join a corporate FOR PROFIT army  - can money REALLY be the only reason these young lads (and lasses) sign up? Have they lost all perspective on what it means to be alive on this planet?

Surely, they know it's not right to invade other countries and kill innocents.  The above images stink of Stockholm Syndrome.

It reeks off them.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe October 01, 2009, 01:20:34 PM
You got to wonder, if they want to use our military against us, why are they vaccinating our soldiers first?

To kill them.

Then they let the Chinese troops in via Mexico and the 2 seaports they have in CA....
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Dig October 01, 2009, 01:48:59 PM
To kill them.

Then they let the Chinese troops in via Mexico and the 2 seaports they have in CA....

I really think the Chinese troops thing is disinfo, but intenational troops definitely.  Perhaps some Mongolian/Japanese/German/British/Roman/Ottoman hybrid clone (all imperialists).

Shit who knows but either way, the Mexican ports and the mass transit planned roadways cannot be a good thing.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: lazarus October 01, 2009, 01:56:23 PM
A couple of points to add here to AI's point that avoiding the vaccine will not help. (this may have been discussed elsewhere)

I having been wondering about the push for multiple vaccines in a short period. We saw this with the proposed 3 H1N1 injections for the 2009 swine flu. Now we are seeing the push for taking the seasonal flu vaccine with the 2009 swine flu soon to follow. (this is what is happening at our hospital) Why? If we read that this is more sinister than just big pharma trying to make more money, then we may be dealing with the an attempt to have several circulating hemagluttinins (http://en.wikipedia.org/wiki/Hemagglutinin_(influenza)#cite_note-2) in us. These H parts of these HnNn type of viruses are the binding outside proteins of the viruses that allow affinity to humans. They are the "fragments" of the viruses in the vaccines.

BTW the the recent infowars article showing the insert with H1N1

http://www.infowars.com/evidence-of-thimerosal-h1n1-virus-in-seasonal-vaccination/ (http://www.infowars.com/evidence-of-thimerosal-h1n1-virus-in-seasonal-vaccination/)

is not unusual since the seasonal flu that we have had for years is H1N1, so it makes sense that the insert should have this. So is the Mexico swine flu of 2009. Also the Spanish flu of 1918. This is a good article summarizing these

http://users.rcn.com/jkimball.ma.ultranet/BiologyPages/I/Influenza.html (http://users.rcn.com/jkimball.ma.ultranet/BiologyPages/I/Influenza.html)

The differences are in mostly in the virulence (danger to humans) of the various types.

Anyway back to the why several vaccines. We may be seeing an attempt to have the population incubate these viruses for deadly mutations. This seems sloppy. Maybe predetermined mixes are known to combine into more deadly forms over time.  CO-INFECTION seems to be the means to increase virulence and is discussed in this peer reviewed article.

http://www.jstage.jst.go.jp/article/bpb/28/3/399/_pdf (http://www.jstage.jst.go.jp/article/bpb/28/3/399/_pdf)

In other words they may be using the population to soup up a deadly strain. So with this theory yes it will not matter if you got the vaccines. You will be at risk from those that did. Isolation and nutrition will be your only protection.

One last point. I have reviewed several inserts for the seasonal flu vaccine now and they really do vary on their contents. My hospital is offering a thiomerisol free shot for example. So I have decided to defend my not taking the vaccine by pointing out what is common to all the inserts I have read so far:

There have never been controlled trials proofing the efficacy of influenza vaccines.
Even in for those that are antibody titer positive (from infection or vaccination), the protection from influenza is less than 50%.

: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe October 01, 2009, 02:04:17 PM

Chinese Got Long Beach Deal!

By Staff Investigative Journalists

    LONG BEACH DESK - The Long Beach Naval Station was tentatively placed on the Military Base Closure-List by president George Bush in 1991. President Bill Clinton, closed the naval base last in 1993. That resulted in the loss to Long Beach, California of 17,500 military and civilian jobs. The economic impact of the of loss was $52.5 million and drove the California economy into the tank. It has never recovered.

    Between 1995-1996, during the heat of the Clinton-Gore Campaign fund raising activity, the Clinton administration actively intervened to make sure a Communist Chinese cargo container shipping interest got a too-good deal on a Long Beach, California, shipping terminal.

    The Secretary of the Navy has formally turned the base over to the City of Long Beach. But, the Port of Long Beach has signed a letter of intent to lease the property to the China Ocean Shipping Co., a steamship line run by the Communist Chinese government.

    The Navy base property is about to be leased to a Communist China-owned shipping company under an agreement that was only made possible by the intervention of the White House.

     Forced by a court order, Port of Long Beach officials have now set March 12, 1997 for a new public hearing on plans to bulldoze the Naval Station and lease the property to the Comunist Chinese shipping company.

    After a hearing before the court, a judge ruled last week that the deal had been rushed and proper procedures had not been in place.

    Clinton was so eager to push the deal through that he met twice with Long Beach officials and once at a White House meeting in 1995 that included his then-chief of staff and the Pentagon's No. 2 official and others.

    The deal finally approved by the Secretary of the Navy turns over control of the Long Beach Naval Station, with a value of at least $65 million, free of charge to the City of Long Beach. The city has agreed to lease it to the China Ocean Shipping Co. of the People's Republic of China.

    The Chinese deal apparently went forward without a national security review by wither the CIA or National Security Council. The White House apparently avoided normal and routine government channels in pushing the deal through in 1995. '... there seemed to be no reason to check with the National Security Council on the decision ...' White House spokesman Lanny Davis said.

    However, the China Ocean Shipping Co. of the People's Republic of China has been actively involved in several recent controversies in addition to a Russian AK-47 gun-smuggling episode on the streets of Oakland, California. In another shocking incident in December, one of the company's ships plowed into a crowded boardwalk in New Orleans, injuring 116 people.

    Then, in 1992, the shipping company was fined $400,000 in a violation of U.S. shipping law in connection with is practices involving bribery of government officials in order to avoid paying U.S. tariffs on its imports at United States ports of entry.

    There is still more. Six of the company's ships were detained by the Navy and Coast Guard for violating international safety regulations just in the last year. The Coast Guard said, that is has placed the China Ocean Shipping Co. of the People's Republic of China on a target list of shippers to monitor and search.

    Last summer China admitted that the China Ocean Shipping Co. was shipping 640 tons of raw waste from the United States to China when it suddenly decided to dump it into the open sea.

    In 1993 U.S. Navy shadowed a China Ocean Shipping Co. ship passing in the Persian Gulf after U.S. intelligence warned it was suspected of carrying chemical weapons materials.

    CIA director Robert Gates has said ' ... any time you turn over an American port facility to a foreign-owned company, especially one with significant [Communist Chinese] government connection, then at least it ought to be vetted through national security agencies.'

    A Navy Department career official said that no intelligence review was sought because the China Ocean Shipping Company's was not considered a security threat, by the Clinton White House.

    The Chinese will lease the Long Beach Naval Station base for a 10 year term at a fee of $14.5 million per year. The Chinese will have the option to expand the perimeter of the operation onto another 150 acres of old Navy shipyards that will be developed at the City of Long Beach taxpayer's expense.

    Officials at the Chinese shipping interest's headquarters in New Jersey and in Beijing refused to comment or respond to questions about president Clinton's involvement.

http://www.freerepublic.com/focus/f-news/1590822/posts
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe October 01, 2009, 02:07:02 PM
My fiance is 1/4 Chinese. She knows a lot of Chinese.

She says they are the most racist people on Earth and would have no problem shooting us like dogs.

We are literally collateral...
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe October 01, 2009, 02:21:47 PM
http://www.prisonplanet.com/ron-paul-warns-of-violence-from-pending-dollar-crisis-says-israel-strike-on-iran-the-trigger.html

Scary times ahead? Perhaps, if you take credence in what Rep. Ron Paul, R-Texas, says.

Paul, who had a strong grassroots following during the 2008 presidential election, explained on Glenn Beck’s Sept. 30 radio program that perilous times lie ahead due to the Federal Reserve’s loose monetary policy. Host Glenn Beck asked how an Israeli strike against Iran might trigger problems with the American financial system.

“What happens when Israel strikes Iran or Iran has the earth rays and we know that they now have a nuclear weapon, what happens to our financial system at that point?” Beck asked.

The libertarian Paul maintained China would become the world’s financial heavyweight and they were already making preparations to be the world’s top dog.

“I think the Chinese take over,” Paul said. “If there’s a real panic and oil shoots up to a couple of hundred bucks, the Chinese will dump their dollars. Chinese are maneuvering for this. The more we threaten Iran, the stronger the Chinese influence gets because they’re using the dollars that they have earned from us and saved, they have a trillion, and they are starting to buy up assets in Iran and build plants and get involved in their energy. So the whole thing is backfiring on us. We’re getting ready to put tougher sanctions on the Iranians and that will make things that much worse. It won’t help the dissidents in Iran. It’s going to cost us a lot of money, and there will be a bombing and that will be a big, big event. I think it will crash the dollar is what I think it would do.”

(ARTICLE CONTINUES BELOW)

Ron Paul Warns of Violence from Pending Dollar Crisis; Says Israel Strike on Iran the Trigger 270809banner

And what does the country look like after the dollar crashes?  Not good the Texas congressman said.

“We think it was bad with the financial crisis,” Paul said. “When you have a dollar crisis, the whole thing quits functioning. The checks bounce and literally the federal government’s checks bounce if you have – if inflation goes up.”

But the situation deteriorates even more Paul – with states leaving the union.

“I think we’re going to have a de facto 10th Amendment, secession,” Paul said “People are just going to ignore the federal government because they won’t – and there’s, you know, a total loss of credibility.”

Beck alluded to media charges and warnings from others that there would be violence and contended the right is being set up to take the fall for it.

“Congressman Paul, the media and even [Rep.] Patrick Kennedy said this, we heard this from two people, Muammar Gaddafi and I believe the other one was Ahmadinejad that both spoke last week and they – we’re hearing it all the time that there’s going to be violence here in America, that people are targeting,” Beck said. “Basically everyone is going to blame this on the right, any kind of violence.”

There would be violence, but not before a dollar crisis happens as some Democratic politicians and media personalities have warned, but afterward Paul said.

“I think that there will be violence,” he explained. “I hope we don’t have to go through, you know, a very violent period of time, but that’s what happens too often when the government runs out of money and runs out of wealth, the people argue over, you know, a shrinking pie and, of course, the people who have to produce are sick and tired of producing.”
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Anti_Illuminati October 01, 2009, 03:21:07 PM
From criminal Ptech client, Gartner:

http://blogs.gartner.com/business-continuity/2009/08/06/advisory-15-interesting-anecdotes-from-the-ct-infragard-pandemic-preparedness-workshop/

Advisory #15: Interesting Anecdotes from the CT InfraGard Pandemic Preparedness Workshop

August 6th, 2009 ·
I attended a pandemic preparedness planning workshop this week sponsored by my CT InfraGard branch. The attendees have been covering this beat for awhile, so the information exchange was at a fairly detailed level regarding what organizations are planning and struggling with in their efforts. I thought I’d share some of the information with you.

1.      We started the workshop by viewing the video “Business Not As Usual: Preparing for Pandemic Flu” from Seattle-King county.  Use it internally to educate your workforce (and senior executives) on the value of being prepared. You can request a free copy (you must pay for shipping) from NACCHO.

2.      Most of the workforce absences are expected to be a result of school closures.

3.      You must have a pandemic management process (or infrastructure) in place to handle the event as it occurs because plans are a necessary thing, but they don’t often reflect the reality of the specific situation. Policies decided upon on Monday may not apply to the facts of Tuesday’s situation.

4.      Some firms are talking to public health officials about hosting vaccine programs in their work facilities, or at least trying to secure the vaccine for their critical workers, e.g. electricity generation operators. However, some are concerned about the legal liability issues if they haven’t engaged in this type of public health activity in the past.

5.      On the point of electricity generation operators – If these folks get the flu, and the generation facility is on the small side, they could shut it down because they don’t have enough staff to operate.  That shutdown means blackouts – or “rotating feeder outages”.  We could see more power outages as a result of H1N1 – a connection that most folks aren’t making, but for pandemic planning would be covered under the traditional BCM plan.

6.      Organizations are struggling with human resource policies regarding how to compensate workers if they do have the flu, especially if the worker has already used their allotted personal time off days or sick days. Some are offering extended time off options, but not everyone.

7.      Work-at-home solutions are at a high risk of failure if the work-at-home population in any given area reaches anywhere close to the 40% absentee rate. Internet bandwidth supply is not adequate to meet the demand. (Gartner is publishing a research note on this topic specifically.)

8.      Similar to the results of my June/2009 survey, many firms are not including IT vendors or IT service providers in their efforts. See my note: A Perilous Practice: Not Planning for IT and Data Center Operations Support During a Pandemic, G00169949. (You may have to be a Gartner client to view it.)

9.      Most firms expect to implement workforce travel restrictions once a pandemic strikes.

10. Most firms are trying to balance their protective mask usage policy between protecting the workforce and not offending customers. The firms who have direct and frequent contact with the public (for example retail operations) request that workers wear a mask when escorting a sick person out of the building only. Those firms that don’t have direct public contact public allow their workers to wear masks based upon their personal comfort level.

11. Those firms that have public congregation areas plan to close off those areas once a pandemic strikes. For example, bank branch lobbies will be closed and only the drive-up window will be open.

12. Firms with workers who must make home visits have equipped those workers with protective gear such as masks, sanitizer fluid for the hands and steering wheels of their cars/trucks, disposable gloves and so forth.

13. You can’t build your preparedness plans using workers’ personal information that has been gathered through the normal social networking in the work environment.

14. Some firms are concerned about law suits as a result of family members getting the flu from the firm’s employee.

15. You can’t expect to get resources from your local neighbors, partners and so forth because everyone will be in the same situation when the pandemic strikes.

16. Your plans and handling process must include actions that will assist you to return to normal operations once the pandemic is over.

17. You must include cultural differences in your plan activities. For example, blood transfusions may be refused if they are not from a person with the same national origin as the intended recipient.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe October 01, 2009, 03:31:01 PM
So the swine flu creates blackouts and shorts out the Net.

Very convenient...
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Overcast October 01, 2009, 03:32:49 PM
Tell that to Indira Singh or Sibel Edmonds.

The former, covering something so esoteric, that there were few to even grasp what she was talking about.

Both have put themselves in the literal crosshairs of the NWO, for all of us.

Tell them that they've wasted their lives.

If everyone stands up and simply says NO to slavery - then they will have to kill us all.

And then the bankers, and whoever else - can grow their own f**kin' food.

Who needs who?

Slavery - really - in this case will only apply to the willing.

I must say... the below words and others - but these in particular have influenced me to the point of no return. I have faith in God and the disposition of my soul after death. That gives me a lot of resolve.

For posterity and those who have never seen it, I will post the whole speech. It's much more than they told you in school.

Read it and realize the parallels are too striking to be 'coincidence' - this is just the same foul, evil beast that has sought to control humanity since humanity existed. Perhaps there are also 'secular' answers/reasons for all of this - but the evidence - to me, is to compelling; that it's more than just 'tyrants'.

March 23, 1775
By Patrick Henry


No man thinks more highly than I do of the patriotism, as well as abilities, of the very worthy gentlemen who have just addressed the house. But different men often see the same subject in different lights; and, therefore, I hope it will not be thought disrespectful to those gentlemen if, entertaining as I do opinions of a character very opposite to theirs, I shall speak forth my sentiments freely and without reserve. This is no time for ceremony. The question before the house is one of awful moment to this country. For my own part, I consider it as nothing less than a question of freedom or slavery; and in proportion to the magnitude of the subject ought to be the freedom of the debate. It is only in this way that we can hope to arrive at the truth, and fulfill the great responsibility which we hold to God and our country. Should I keep back my opinions at such a time, through fear of giving offense, I should consider myself as guilty of treason towards my country, and of an act of disloyalty toward the Majesty of Heaven, which I revere above all earthly kings.

Mr. President, it is natural to man to indulge in the illusions of hope. We are apt to shut our eyes against a painful truth, and listen to the song of that siren till she transforms us into beasts. Is this the part of wise men, engaged in a great and arduous struggle for liberty? Are we disposed to be of the numbers of those who, having eyes, see not, and, having ears, hear not, the things which so nearly concern their temporal salvation? For my part, whatever anguish of spirit it may cost, I am willing to know the whole truth, to know the worst, and to provide for it.

I have but one lamp by which my feet are guided, and that is the lamp of experience. I know of no way of judging of the future but by the past. And judging by the past, I wish to know what there has been in the conduct of the British ministry for the last ten years to justify those hopes with which gentlemen have been pleased to solace themselves and the House. Is it that insidious smile with which our petition has been lately received?

Trust it not, sir; it will prove a snare to your feet. Suffer not yourselves to be betrayed with a kiss. Ask yourselves how this gracious reception of our petition comports with those warlike preparations which cover our waters and darken our land. Are fleets and armies necessary to a work of love and reconciliation? Have we shown ourselves so unwilling to be reconciled that force must be called in to win back our love? Let us not deceive ourselves, sir. These are the implements of war and subjugation; the last arguments to which kings resort. I ask gentlemen, sir, what means this martial array, if its purpose be not to force us to submission? Can gentlemen assign any other possible motive for it? Has Great Britain any enemy, in this quarter of the world, to call for all this accumulation of navies and armies? No, sir, she has none. They are meant for us: they can be meant for no other. They are sent over to bind and rivet upon us those chains which the British ministry have been so long forging. And what have we to oppose to them? Shall we try argument? Sir, we have been trying that for the last ten years. Have we anything new to offer upon the subject? Nothing. We have held the subject up in every light of which it is capable; but it has been all in vain. Shall we resort to entreaty and humble supplication? What terms shall we find which have not been already exhausted? Let us not, I beseech you, sir, deceive ourselves. Sir, we have done everything that could be done to avert the storm which is now coming on. We have petitioned; we have remonstrated; we have supplicated; we have prostrated ourselves before the throne, and have implored its interposition to arrest the tyrannical hands of the ministry and Parliament. Our petitions have been slighted; our remonstrances have produced additional violence and insult; our supplications have been disregarded; and we have been spurned, with contempt, from the foot of the throne! In vain, after these things, may we indulge the fond hope of peace and reconciliation.

There is no longer any room for hope. If we wish to be free--if we mean to preserve inviolate those inestimable privileges for which we have been so long contending--if we mean not basely to abandon the noble struggle in which we have been so long engaged, and which we have pledged ourselves never to abandon until the glorious object of our contest shall be obtained--we must fight! I repeat it, sir, we must fight! An appeal to arms and to the God of hosts is all that is left us! They tell us, sir, that we are weak; unable to cope with so formidable an adversary. But when shall we be stronger? Will it be the next week, or the next year? Will it be when we are totally disarmed, and when a British guard shall be stationed in every house? Shall we gather strength but irresolution and inaction? Shall we acquire the means of effectual resistance by lying supinely on our backs and hugging the delusive phantom of hope, until our enemies shall have bound us hand and foot? Sir, we are not weak if we make a proper use of those means which the God of nature hath placed in our power. The millions of people, armed in the holy cause of liberty, and in such a country as that which we possess, are invincible by any force which our enemy can send against us. Besides, sir, we shall not fight our battles alone. There is a just God who presides over the destinies of nations, and who will raise up friends to fight our battles for us. The battle, sir, is not to the strong alone; it is to the vigilant, the active, the brave. Besides, sir, we have no election. If we were base enough to desire it, it is now too late to retire from the contest. There is no retreat but in submission and slavery! Our chains are forged! Their clanking may be heard on the plains of Boston! The war is inevitable--and let it come! I repeat it, sir, let it come.

It is in vain, sir, to extentuate the matter. Gentlemen may cry, Peace, Peace--but there is no peace. The war is actually begun! The next gale that sweeps from the north will bring to our ears the clash of resounding arms! Our brethren are already in the field! Why stand we here idle? What is it that gentlemen wish? What would they have? Is life so dear, or peace so sweet, as to be purchased at the price of chains and slavery? Forbid it, Almighty God! I know not what course others may take; but as for me, give me liberty or give me death!

*****************************************************
You hear many of the same comments - many of the same issues... as discussed before.

And again: "I know of no way of judging of the future but by the past."

If we make a stand for liberty - liberty we shall have - but it must be with us United - they know this - they are trying to divide us.

I must agree with Mr. Henry - totally.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: sociostudent October 01, 2009, 04:50:24 PM
If everyone stands up and simply says NO to slavery - then they will have to kill us all.

And then the bankers, and whoever else - can grow their own f**kin' food.

Who needs who?

Slavery - really - in this case will only apply to the willing.

I must say... the below words and others - but these in particular have influenced me to the point of no return. I have faith in God and the disposition of my soul after death. That gives me a lot of resolve.

For posterity and those who have never seen it, I will post the whole speech. It's much more than they told you in school.

Read it and realize the parallels are too striking to be 'coincidence' - this is just the same foul, evil beast that has sought to control humanity since humanity existed. Perhaps there are also 'secular' answers/reasons for all of this - but the evidence - to me, is to compelling; that it's more than just 'tyrants'.

March 23, 1775
By Patrick Henry


No man thinks more highly than I do of the patriotism, as well as abilities, of the very worthy gentlemen who have just addressed the house. But different men often see the same subject in different lights; and, therefore, I hope it will not be thought disrespectful to those gentlemen if, entertaining as I do opinions of a character very opposite to theirs, I shall speak forth my sentiments freely and without reserve. This is no time for ceremony. The question before the house is one of awful moment to this country. For my own part, I consider it as nothing less than a question of freedom or slavery; and in proportion to the magnitude of the subject ought to be the freedom of the debate. It is only in this way that we can hope to arrive at the truth, and fulfill the great responsibility which we hold to God and our country. Should I keep back my opinions at such a time, through fear of giving offense, I should consider myself as guilty of treason towards my country, and of an act of disloyalty toward the Majesty of Heaven, which I revere above all earthly kings.

Mr. President, it is natural to man to indulge in the illusions of hope. We are apt to shut our eyes against a painful truth, and listen to the song of that siren till she transforms us into beasts. Is this the part of wise men, engaged in a great and arduous struggle for liberty? Are we disposed to be of the numbers of those who, having eyes, see not, and, having ears, hear not, the things which so nearly concern their temporal salvation? For my part, whatever anguish of spirit it may cost, I am willing to know the whole truth, to know the worst, and to provide for it.

I have but one lamp by which my feet are guided, and that is the lamp of experience. I know of no way of judging of the future but by the past. And judging by the past, I wish to know what there has been in the conduct of the British ministry for the last ten years to justify those hopes with which gentlemen have been pleased to solace themselves and the House. Is it that insidious smile with which our petition has been lately received?

Trust it not, sir; it will prove a snare to your feet. Suffer not yourselves to be betrayed with a kiss. Ask yourselves how this gracious reception of our petition comports with those warlike preparations which cover our waters and darken our land. Are fleets and armies necessary to a work of love and reconciliation? Have we shown ourselves so unwilling to be reconciled that force must be called in to win back our love? Let us not deceive ourselves, sir. These are the implements of war and subjugation; the last arguments to which kings resort. I ask gentlemen, sir, what means this martial array, if its purpose be not to force us to submission? Can gentlemen assign any other possible motive for it? Has Great Britain any enemy, in this quarter of the world, to call for all this accumulation of navies and armies? No, sir, she has none. They are meant for us: they can be meant for no other. They are sent over to bind and rivet upon us those chains which the British ministry have been so long forging. And what have we to oppose to them? Shall we try argument? Sir, we have been trying that for the last ten years. Have we anything new to offer upon the subject? Nothing. We have held the subject up in every light of which it is capable; but it has been all in vain. Shall we resort to entreaty and humble supplication? What terms shall we find which have not been already exhausted? Let us not, I beseech you, sir, deceive ourselves. Sir, we have done everything that could be done to avert the storm which is now coming on. We have petitioned; we have remonstrated; we have supplicated; we have prostrated ourselves before the throne, and have implored its interposition to arrest the tyrannical hands of the ministry and Parliament. Our petitions have been slighted; our remonstrances have produced additional violence and insult; our supplications have been disregarded; and we have been spurned, with contempt, from the foot of the throne! In vain, after these things, may we indulge the fond hope of peace and reconciliation.

There is no longer any room for hope. If we wish to be free--if we mean to preserve inviolate those inestimable privileges for which we have been so long contending--if we mean not basely to abandon the noble struggle in which we have been so long engaged, and which we have pledged ourselves never to abandon until the glorious object of our contest shall be obtained--we must fight! I repeat it, sir, we must fight! An appeal to arms and to the God of hosts is all that is left us! They tell us, sir, that we are weak; unable to cope with so formidable an adversary. But when shall we be stronger? Will it be the next week, or the next year? Will it be when we are totally disarmed, and when a British guard shall be stationed in every house? Shall we gather strength but irresolution and inaction? Shall we acquire the means of effectual resistance by lying supinely on our backs and hugging the delusive phantom of hope, until our enemies shall have bound us hand and foot? Sir, we are not weak if we make a proper use of those means which the God of nature hath placed in our power. The millions of people, armed in the holy cause of liberty, and in such a country as that which we possess, are invincible by any force which our enemy can send against us. Besides, sir, we shall not fight our battles alone. There is a just God who presides over the destinies of nations, and who will raise up friends to fight our battles for us. The battle, sir, is not to the strong alone; it is to the vigilant, the active, the brave. Besides, sir, we have no election. If we were base enough to desire it, it is now too late to retire from the contest. There is no retreat but in submission and slavery! Our chains are forged! Their clanking may be heard on the plains of Boston! The war is inevitable--and let it come! I repeat it, sir, let it come.

It is in vain, sir, to extentuate the matter. Gentlemen may cry, Peace, Peace--but there is no peace. The war is actually begun! The next gale that sweeps from the north will bring to our ears the clash of resounding arms! Our brethren are already in the field! Why stand we here idle? What is it that gentlemen wish? What would they have? Is life so dear, or peace so sweet, as to be purchased at the price of chains and slavery? Forbid it, Almighty God! I know not what course others may take; but as for me, give me liberty or give me death!

*****************************************************
You hear many of the same comments - many of the same issues... as discussed before.

And again: "I know of no way of judging of the future but by the past."

If we make a stand for liberty - liberty we shall have - but it must be with us United - they know this - they are trying to divide us.

I must agree with Mr. Henry - totally.

+1
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Dig October 01, 2009, 06:52:05 PM
My fiance is 1/4 Chinese. She knows a lot of Chinese.

She says they are the most racist people on Earth and would have no problem shooting us like dogs.

We are literally collateral...

self hating chinese!

Historically speaking, they are not imperialistic and never have been. But they sure as hell do not want another Nanking, I can tell you that.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Dig October 01, 2009, 06:53:08 PM
From criminal Ptech client, Gartner:

http://blogs.gartner.com/business-continuity/2009/08/06/advisory-15-interesting-anecdotes-from-the-ct-infragard-pandemic-preparedness-workshop/

Advisory #15: Interesting Anecdotes from the CT InfraGard Pandemic Preparedness Workshop

August 6th, 2009 ·
I attended a pandemic preparedness planning workshop this week sponsored by my CT InfraGard branch. The attendees have been covering this beat for awhile, so the information exchange was at a fairly detailed level regarding what organizations are planning and struggling with in their efforts. I thought I’d share some of the information with you.

1.      We started the workshop by viewing the video “Business Not As Usual: Preparing for Pandemic Flu” from Seattle-King county.  Use it internally to educate your workforce (and senior executives) on the value of being prepared. You can request a free copy (you must pay for shipping) from NACCHO.

2.      Most of the workforce absences are expected to be a result of school closures.

3.      You must have a pandemic management process (or infrastructure) in place to handle the event as it occurs because plans are a necessary thing, but they don’t often reflect the reality of the specific situation. Policies decided upon on Monday may not apply to the facts of Tuesday’s situation.

4.      Some firms are talking to public health officials about hosting vaccine programs in their work facilities, or at least trying to secure the vaccine for their critical workers, e.g. electricity generation operators. However, some are concerned about the legal liability issues if they haven’t engaged in this type of public health activity in the past.

5.      On the point of electricity generation operators – If these folks get the flu, and the generation facility is on the small side, they could shut it down because they don’t have enough staff to operate.  That shutdown means blackouts – or “rotating feeder outages”.  We could see more power outages as a result of H1N1 – a connection that most folks aren’t making, but for pandemic planning would be covered under the traditional BCM plan.

6.      Organizations are struggling with human resource policies regarding how to compensate workers if they do have the flu, especially if the worker has already used their allotted personal time off days or sick days. Some are offering extended time off options, but not everyone.

7.      Work-at-home solutions are at a high risk of failure if the work-at-home population in any given area reaches anywhere close to the 40% absentee rate. Internet bandwidth supply is not adequate to meet the demand. (Gartner is publishing a research note on this topic specifically.)

8.      Similar to the results of my June/2009 survey, many firms are not including IT vendors or IT service providers in their efforts. See my note: A Perilous Practice: Not Planning for IT and Data Center Operations Support During a Pandemic, G00169949. (You may have to be a Gartner client to view it.)

9.      Most firms expect to implement workforce travel restrictions once a pandemic strikes.

10. Most firms are trying to balance their protective mask usage policy between protecting the workforce and not offending customers. The firms who have direct and frequent contact with the public (for example retail operations) request that workers wear a mask when escorting a sick person out of the building only. Those firms that don’t have direct public contact public allow their workers to wear masks based upon their personal comfort level.

11. Those firms that have public congregation areas plan to close off those areas once a pandemic strikes. For example, bank branch lobbies will be closed and only the drive-up window will be open.

12. Firms with workers who must make home visits have equipped those workers with protective gear such as masks, sanitizer fluid for the hands and steering wheels of their cars/trucks, disposable gloves and so forth.

13. You can’t build your preparedness plans using workers’ personal information that has been gathered through the normal social networking in the work environment.

14. Some firms are concerned about law suits as a result of family members getting the flu from the firm’s employee.

15. You can’t expect to get resources from your local neighbors, partners and so forth because everyone will be in the same situation when the pandemic strikes.

16. Your plans and handling process must include actions that will assist you to return to normal operations once the pandemic is over.

17. You must include cultural differences in your plan activities. For example, blood transfusions may be refused if they are not from a person with the same national origin as the intended recipient.

There are hundreds of posts about Infragard on this forum.  If they do not show up with a simple search, I will post some links for everyone. Very disturbing indeed.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: One Revelator October 01, 2009, 10:07:37 PM
@Centexan—Go here for more info on vitamin D and other supplements:

Russell Blaylock, MD - What To Do If Force Vaccinated
http://forum.prisonplanet.com/index.php?topic=126782.0

@foreverfree—This is one scenario that AI referred to:

In their own words they wanna shut down all “non-critical systems”.  Whatever they consider non-critical in terms of running, in terms of existing in the United States, they’ll shut down.  And they’re gonna implement teleworking.  All this long-distance learning, like e-learning, teleworking, e-government, e-governance.  And that ties into the flu because they can use that to say that now our critical infrastructure cannot be manned.  Like say, for example, we can’t have people working at the Pentagon because there’s all this bioweapon stuff everywhere.  Well, they won’t say that.  They’ll say that everything’s contaminated and our government’s breaking down.  We’ve been decapitated in light of something like NSPD-51 like the terminology they use.  And the only way that we can save the United States is that we have to implement a secure internet to manage this crisis so that we’ll have secure systems.  They can say that during the flu pandemic that there’s all this cyber attack stuff happening that exacerbating, this is the key, that could be exacerbating the problem of the flu, interfering with emergency response.  They could say that there’s hackers that are attacking police station networks, that are attacking infraguard or any type of first responders.  And the people that are actually in the government will actually believe this crap and think that the American people are really the enemy. That the American people, because they’ll think that they’re retaliating against the financial catastrophe that’s happening and so forth, against the government.  They’ll actually perceive that we’re really the enemy when the new world order is actually carrying out al this stuff for the express purpose of being able to finally destroy the internet as we know it and replace it with their internet so that we can’t talk to each other.
http://forum.prisonplanet.com/index.php?&topic=129377.msg794496#msg794496

The problem is that this is one plan/scenario of many that is under constant revision.  To top it off, imagine that the plan is being constantly formulated/updated by a computer program. Why do “think tank” organizations get paid so much?  This is the “enterprise architecture” that AI  and Indira Singh refers to. To go a step further, what if this software was embedded in all federal and banking computers giving it the ability to cause malfunctions as well as resolve them?   BTW, I think AI mentioned that Ptech is no longer the only company involved with this type of software.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Anti_Illuminati October 01, 2009, 10:14:21 PM
@Centexan—Go here for more info on vitamin D and other supplements:

Russell Blaylock, MD - What To Do If Force Vaccinated
http://forum.prisonplanet.com/index.php?topic=126782.0

@foreverfree—This is one scenario that AI referred to:
http://forum.prisonplanet.com/index.php?&topic=129377.msg794496#msg794496

The problem is that this is one plan/scenario of many that is under constant revision.  To top it off, imagine that the plan is being constantly formulated/updated by a computer program. Why do “think tank” organizations get paid so much?  This is the “enterprise architecture” that AI  and Indira Singh refers to. To go a step further, what if this software was embedded in all federal and banking computers giving it the ability to cause malfunctions as well as resolve them?   BTW, I think AI mentioned that Ptech is no longer the only company involved with this type of software.

It is in all federal and all banking computers, they began doing this 20+ years ago.  

It's irrelevant because you will be dead, so there's no purpose for it.  people are failing to realize that you will die even if you don;t take the vaccines unless you are taking all of the necessary remedies to make yourself naturally immune to it (immune to the airborne virus--the killer virus will be AIRBORN).  The only real purpose of the vaccine is to spread the virus, and to be able to blame those that didn't take it for spreading it (when it will be the other way around) thus solidifying the "terrorist" threat in the minds of the sheep.  "You son of a bitch, you didn't take the vaccine and therefore you caused my entire family to die of H1N1--solider throw him/her in the camps!."  Folks the objective in one respect is to get the American people to fight with each other--to get people to not only accept camps, but desire to have others put in them by fraudulently making others believe that they were responsible for the pandemic (again which fulfills the bs psyops of "unless everyone has the vaccine, everyone is at risk").

To requote part of your post:

The problem is that this is one plan/scenario of many that is under constant revision.  To top it off, imagine that the plan is being constantly formulated/updated by a computer program. Why do “think tank” organizations get paid so much?

This is a very good point, totally accurate, and something that disinfo artists use to try to discredit what they allege as "failed predictions".  People like that have no interest in finding out the facts and are likely govt. ops or just irreparably braindamage fools.  I can link to you videos at GMU where they talk about artificial intelligence and advanced mathematics used towards the end of predicting human behavior and even where they mention that when their enemies (us) realize what they are doing, that their AI system then must take that as well into account of its calculations and execution.  It is for real.  Do a search for "Bayesian Networks".
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: One Revelator October 01, 2009, 10:38:55 PM
This explains why businesses, government, and the population were sold on computer technology.  I remember the sales pitch/lie of “paperless environment”.  If we were still using mechanical cash registers, adding machines, typewriters, and doing math in our heads, we wouldn’t have this problem. 

In 2001: A Space Odyssey, they managed to shut down HAL.  I wonder if it’s possible to do that today.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Vox October 01, 2009, 11:18:25 PM
I could NEVER join a corporate FOR PROFIT army  - can money REALLY be the only reason these young lads (and lasses) sign up? Have they lost all perspective on what it means to be alive on this planet?

Surely, they know it's not right to invade other countries and kill innocents.  The above images stink of Stockholm Syndrome.

It reeks off them.

I think you'd be surprised at just how many people sign up to, literally, "kill people legally."
A cousin of mine who I've since disowned made just that claim. As did several of his friends.

People are sick and violent. The military is quite attractive to these types.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Overcast October 02, 2009, 02:17:29 AM
I think you'd be surprised at just how many people sign up to, literally, "kill people legally."
A cousin of mine who I've since disowned made just that claim. As did several of his friends.

People are sick and violent. The military is quite attractive to these types.

They can't get enough and find a job in an organization like... Blackwater, or XE or WTF ever.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: jeremiahshine October 02, 2009, 04:57:45 AM
I really didn't 'get it' until I had perused his posts.  It all came together when I was downloading all his posts while listening to the corbet report interviewing Anti_Illuminati.  Then I saw the whole thing.  

He has posted and I will try to translate.  

There is a Global financial network.
There is a Global Military network.
There is a Global computer network.
There is a Pan(Global) virus

Literally every bit of information about you is stored at different servers.
Your electronics emit a signal when turned on.  Your position on the planet can be ascertained by that signal (be it a program, cell phone, computer or anything with a program board).  This signal does not depend on RFID or powerlines or IP address.  You know how some people have an aura?  the signal that is emitted when you turn it on, is the signal; it has its own signature.  Your cell phone, even if powered off can be turned on by remote authority, with out your knowledge or permission.

Continuity of Government means that in case of 'tragedy' and the Capitol Bldg went out and it took out the heads of state, the government would still continue on.  It also keeps the people in America from disbanding the Federal Government (which is in the constitution to do so) as the COG will ensure the Federal Government will survive, and most probably grow larger and stronger.  

You know all those believable SciFi movies that are scary?  The Net is a beautiful example.  Well, those things have come to pass.

Smart Grid is not your friend. Smart Grid will be able to monitor and know every detail about your life.   'They" will literally be in your bedroom.  Your TV will be able to watch you.  

A_I has done real research and shown documents (much I have already downloaded and I invite all to do the same) to prove this is real and i existence.

My version here is actually the 'nice' version.  Read his research watch the vids in his posts, you will be horrified when you find the technology in their hands.


Is this true? CoG is basically a PRIME DIRECTIVE of our system, even when the People don't want the Continuance?
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: Mike Philbin October 02, 2009, 05:03:50 AM
In 2001: A Space Odyssey, they managed to shut down HAL.  I wonder if it’s possible to do that today.

HAL was manually disassembled by a trusted father figure.

I think the way the corporate control grid is set up non-locally, you'd have to 'sing each installed clone of the programme a lovely lullaby' to leave it where it is but disarmed, in slumber.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: phosphene October 02, 2009, 06:10:41 AM
In 2001: A Space Odyssey, they managed to shut down HAL.  I wonder if it’s possible to do that today.

Remember the kid who was going to be forced to endure chemotherapy earlier this year? He and his mom fled to mexico, then returned a few weeks later. This massive computerized GiG control grid, CPS, FBI, GPS, RFID, Credit cards, Cell phone towers, and Mexican/US police, all working in unison, could not track down 1 little farm lady and her dying kid from minnesota. Computers and robots r dumb. They are our slaves.

http://www.thedailybeast.com/cheat-sheet/item/child-cancer-patient-returns-home/caught/
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: aviana October 02, 2009, 08:17:51 AM
So the military would take the vaccine via the mist, and other segments of the population have the injection?  Regardless of delivery system, it could be that whatever the military are given is different to what everyone else is given.  It should be obvious to anyone in charge that the ranks are trodden down and not likely to be very cooperative in any type of societal controls.  So they would need a different type of injection, right?!  Pure speculation, but we can't discount anything.

As for the Chinese military - I've mentioned this before - the bible clearly talks about a 200 million strong army from the East that will be instrumental in the end time plan.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: PTTurboe October 02, 2009, 08:59:34 AM
self hating chinese!

Historically speaking, they are not imperialistic and never have been. But they sure as hell do not want another Nanking, I can tell you that.

What?

I took 5 classes in college about Asia and they had empires for 3,000 years....
: Re: *ALERT* NWO is going to decapitate Internet w/2 phase RNA recomb Flu
: Anti_Illuminati October 02, 2009, 11:45:29 AM
ALERT! THIS IS WHAT I SAW COMING BACK IN MARCH, NO ONE GOES INTO THIS MUCH PREPARATION IF THEY AREN'T PLANNING ON CARRYING THIS OUT!

http://www.federalnewsradio.com/docs/Telework_Week.pdf
(http://i574.photobucket.com/albums/ss186/Nunkadunka/Telework_Week.jpg?t=1254496497)
(http://i574.photobucket.com/albums/ss186/Nunkadunka/Telework_Weekb.jpg?t=1254496516)

http://www.federalnewsradio.com/?nid=35&sid=1762540

DHS uses week-long COOP, telework exercise to prepare for pandemic

September 14, 2009 - 4:15pm

By Jason Miller
Executive Editor
FederalNewsRadio

The Homeland Security Department wants to make sure it can continue operating if the H1N1 virus-or any other disaster for that matter--strikes a large part of its workforce.
DHS will test its continuity of operations and telework plans for one week, starting Sept. 21.


Elaine Duke, DHS undersecretary for management, sent a memo to agency officials Sept. 10 asking them to review their COOP plans and telework agreements, and have as many employees telework at least one day that week as possible.

"Being able to telework is part of our preparedness planning for contingencies such as the current H1N1 pandemic," Duke writes. "This telework week is an opportunity to test COOP procedures as well as the capability of our information technology infrastructure."

DHS's exercise is part of the federal effort to ready its employees in case the pandemic hits.

The Office of Personnel Management told lawmakers in a May hearing of the House Oversight and Government Reform Subcommittee on the Federal Workforce, Postal Service and the District of Columbia that agencies shouldn't rely on impromptu teleworking in case of an outbreak.

And a recent survey of 307 federal workers by the Telework Exchange found that 58 percent of respondents say their agency provided pandemic guidance as of May 2009. But the survey also found only 33 percent of the respondents say their COOP plans include planning for a flu outbreak.

The Government Accountability Office told Congress in July that federal preparation is uneven. Auditors surveyed the 24 largest agencies and found that some have plans, while others still are in their early stages.

"The Department of Treasury's Financial Management Service, which has production staff involved in disbursing federal payments such as Social Security checks, had pandemic plans for its four regional centers and had stockpiled personal protective equipment," the report states. "By contrast, the Federal Aviation Administration's air traffic control management facilities, where air traffic controllers work, had not yet developed facility pandemic plans or incorporated pandemic plans into their all-hazards contingency plans."

INSERT:  Why the f*ck do you care?  Ptech was used to make that all autonomous.

DHS's Duke says the department's test also will help managers ensure telework agreements among mission crucial employees are in place and work.

OPM found in its 2008 survey of agencies that only 7.6 percent of all eligible employees actually telework at least one day a week.
_____________________________________________________________
http://www.federalnewsradio.com/?sid=1698308&nid=35

WFED's Max Cacas
Agencies bracing for possible return of swine flu this fall.

http://media.bonnint.net/wtop/15/1562/156236.mp3

By Max Cacas
FederalNewsRadio


Health officials both here in the U.S. and around the world are now suggesting that the H1N1 flu virus could make a return to this country later this Fall.

A Senate Committee yesterday asked the question: Is the Federal Government ready if the swine flu makes people sick later this year?

The question of federal government preparedness for a possible return of the H1N1 flu concerns Senator Daniel Akaka (D.-Hawaii) greatly. Akaka is chairman of the Senate Homeland Security and Governmental Affairs committee's Oversight subcommittee:

    Last week, the WHO raised the pandemic alert level to phase six, a full-blown global pandemic. Fortunately, so far, the virus has been relatively mild, but influenza viruses mutate rapidly, and H1N1 poses a significant threat. The Centers for Disease Control and Prevention estimates that up to 40 percent of employees may be absent from work during a severe pandemic. In addition to those who are ill, employees may stay home to care for sick family members or due to fear of infection. An influenza pandemic threatens the operation of Federal agencies because essential workers could be absent for weeks, or even months, at a time.

Chairman Akaka's concerns were not put to rest by the report of Bernice Steinhardt with the Government Accountability Office, which, at the request of the chairman, launched a study into government-wide preparation for a flu pandemic prior to the late-winter the outbreak of H1N1.

She says a GAO investigation paints a mixed picture at best of federal preparations for the flu, especially to keep feds safe and healthy during an outbreak.

    Agency progress in pandemic planning is uneven. Although all of the 24 CFO Act agencies reported being engaged in planning for pandemic influenza to some degree, several agencies reported that they were still developing their pandemic plans and their measures to protect their workforce.

Steinhardt says GAO's study also queried agencies on preparations for large groups of workers to keep working from home through teleworking.

    Although many of the agencies' pandemic influenza plans rely on social distancing strategies, primarily telework, to carry out the functions of the federal government in the event of a pandemic outbreak, only one agency, NSF stated that it tested its IT infrastructure to a great extent. The agency reported assessing its telework system formally several times each year and each day through various means. On the other hand, five agencies reported testing their IT systems to little or no extent.

Steinhardt also recommended that the White House Homeland Security Council be tasked with monitoring agency compliance and progress on preparation for a possible flu pandemic.

Elaine Duke, undersecretary of Homeland Security for management, agreed with chairman Akaka that the HSC could play a role in coordinating responses by agencies tasked with providing the key guidance to agencies and staff in the event of an outbreak.

Nancy Kichak with the Office of Personnel Management told the panel that OPM is redoubling its efforts to convince agencies to develop more robust telework policies, this time, to insure a degree of "continuity of operations" in the event government workers are forced to remain at home because of the spread of the H1N1 virus.

    OPM Director John Berry recently announced a new initiative that we hope will help agencies ramp up their telework readiness. This initiative is driven not only by Director Berry's belief in the value of work/life programs generally, but more specifically in the importance of telework as a tool for emergency planning. With implementation of this new initiative, OPM believes we will see not only an improvement in the consistency and quality of telework policies and programs in Executive agencies, but a resulting increase in telework participation Governmentwide, as well.

~~~~~~~~
INSERT:  FOR TELEWORK TO BE USEABLE BY MANY DOD EMPLOYEES, THE INTERNET WILL HAVE TO BE TURNED OVER TO FULL IPV6 SO THAT THEIR DOD CERTIFIED ROUTERS WILL ACCESS CLASSIFIED MATERIAL FROM HOME.  THIS WILL BE THE STEALTH ATTACK THEY PULL TO KILL THE INTERNET AMONGST THE MASS CHAOS AND DEATH, NO ONE WILL GIVE A FLYING F*CK BECAUSE THERE WILL BE MILLIONS DEAD ALL OVER THE U.S.  THIS IS UNDENIABLE PROOF OF WHAT I HAD CONCLUDED 8 MONTHS AGO.  THE NWO IS MOVING TO KILL FREE SPEECH RAPIDLY.

This strategy of the NWO pertaining to "overwhelmed communications infrastructure" was previously illustrated by Unisys in the video that I compiled from multiple video clips from their own site when the NWO false flag attacked the Minneapolis bridge in 2007.  The spokeswoman for the IT company said that when the bridge collapsed, their networks were being flooded with traffic (suggesting that it was all from emergency response/panicking citizen related communication).  Unisys or some other NWO company or agency could have easily carried out that as well, but that is unknown whether or not the traffic was "legit".

The point is is that Unisys was magically right there and willingly offered nonstop support FOR FREE to this company, and convinced them to allow Unisys to take over THE ENTIRE IT INFRASTRUCTURE OF THAT COMPANY, AND USE PTECH TO BUILD AN ARCHITECTURE FOR THE ENTIRE CITY OF MINNEAPOLIS, TYING EVERYTHING TOGETHER, BRAGGING EVEN HOW THEY OUTFITTED THE POLICE WITH C4ISR/GLOBAL INFORMATION GRID/FUSION CENTER INTEGRATION (THEY DIDN'T USE THOSE TERMS BUT THAT'S WHAT IT IS).

~~~~~~~~~~~~~
Representatives from two federal employee labor unions testified that some of their members, particularly those from the Transportation Security Administration and U.S. Customs and Border Patrol, were given conflicting guidance from their bosses on the use of protective face masks in the early stages of the recent outbreak.
___________________________________________________________
http://www.gao.gov/new.items/d09909t.pdf
(http://i574.photobucket.com/albums/ss186/Nunkadunka/d09909tA.jpg?t=1254498019)
(http://i574.photobucket.com/albums/ss186/Nunkadunka/d09909tB.jpg?t=1254498020)
(http://i574.photobucket.com/albums/ss186/Nunkadunka/d09909tC.jpg?t=1254498026)

"We also have two pandemic-related reviews underway on the following topics:  (1) the status of implementing the National Strategy for Pandemic Influenza Implementation Plan (National Pandemic Implementation Plan); and (2) the effect of a pandemic on the telecommunications capacity needed to sustain critical financial market activities."
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Outer Haven October 02, 2009, 11:58:06 AM
Maybe you should call into the Show today, AI?
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: mr anderson October 02, 2009, 12:15:19 PM
Maybe you should call into the Show today, AI?

Try the Corbett Report again AI  :)

We can't rely on one outlet and a 2 minute phone call. This needs some space  :P
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Outer Haven October 02, 2009, 12:19:45 PM
But maybe Alex should be aware of this? Also, through Alex, it would receive the greatest attention, wouldn't it?
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Anti_Illuminati October 02, 2009, 12:59:13 PM
But maybe Alex should be aware of this? Also, through Alex, it would receive the greatest attention, wouldn't it?

There is no reason that he should not make himself aware of this.  He can't say that his plate is too full to learn about it either because of everything else going on.  This is a huge part of the picture.  The only way I will call it at minimum is to use the GCN guest line (even if not a scheduled guest) but the phone gatekeeper at GCN basically told me to shove it up my ass as far as ever using that phone number again (I've used it 2 or 3 times in the past) "because it needed to be kept open for guests."  If I'm only going to be allowed to talk for 20 seconds or so, I'll be damned to hell if I will wait 3+ hours on hold for that.  Similar/related info was submitted to Kurt Nimmo along time ago and not a damned thing was done about it.  Lavosslayer has written numerous articles, and only one has ever made it to the prisonplanet website front page, when ALL of the articles were damned important.  Far as Corbett report, Josh and I may be on sometime this month when we hear of an opening.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 02, 2009, 01:30:56 PM
There is no reason that he should not make himself aware of this.  He can't say that his plate is too full to learn about it either because of everything else going on.  This is a huge part of the picture.  The only way I will call it at minimum is to use the GCN guest line (even if not a scheduled guest) but the phone gatekeeper at GCN basically told me to shove it up my ass as far as ever using that phone number again (I've used it 2 or 3 times in the past) "because it needed to be kept open for guests."  If I'm only going to be allowed to talk for 20 seconds or so, I'll be damned to hell if I will wait 3+ hours on hold for that.  Similar/related info was submitted to Kurt Nimmo along time ago and not a damned thing was done about it.  Lavosslayer has written numerous articles, and only one has ever made it to the prisonplanet website front page, when ALL of the articles were damned important.  Far as Corbett report, Josh and I may be on sometime this month when we hear of an opening.

I hope James can get you on Corbett Report soon - I don't see anything else happening that could possibly be a higher priority.  On Corbett you guys get the uninterrupted time you need to step through the whole thing, which is incredibly important. I hope Alex will listen to Corbett Report.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: One Revelator October 02, 2009, 01:40:00 PM
Funny how the solution always points to MORE reliance on computer technology.  How many times has government “lost” personal details on a majority of its population due to a “stolen” laptop?  Not exactly a sterling track record.  Why do I get the feeling that all of their mission critical systems have been in place and connected to each other via secure means for a long time now. 

Here’s an idea.  Governments pony up and run secure land lines to each government and banking employee’s residence since they’re so “mission essential”.  Why not?  They have the funds.  They pretty much own all the telecoms.  Or is that in place already? 

I find it impossible to believe that nobody factored in EMP into this solution.  All I have seen for the past 6 months or so is hype over a pandemic that hasn’t happened yet.  All because the end solution of militarizing the Internet and the population has been elaborately reverse-planned into a problem.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Mike Philbin October 02, 2009, 03:51:23 PM
what?

they've already done their COOP working week?

then we're right in the middle of the ENDGAME.

: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: luckee1 October 02, 2009, 04:17:06 PM
what?

they've already done their COOP working week?

then we're right in the middle of the ENDGAME.

Right.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Mike Philbin October 02, 2009, 04:21:04 PM
Also,

I'm sure this NWO is a global thing but I wonder have the UK also done their COOP week? I don't really have the connections to investigate. Anyone know of colleagues in UK who've also done their COOP week?

If not, then it's a TAKE DOWN ONLY U.S.A. ISSUE.  I guess we'll all feel the sharp end of that tyranny before this is over, if not now then later.

:(

f**k.
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: OldSchool October 02, 2009, 09:28:52 PM
The first part is with us, the second arrives through a needle.

It wouldn't be the first time they tried that. Binary recombination seems to be their stealth tactic. A couple years ago they pulled FluMist from the shelves as they claim to have found binary components of the bird flu in it.

It also sounds like they're putting the finishing touches on SkyNet (from Terminator)
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Nomadinexile October 02, 2009, 11:55:31 PM
<---Not a coward.  Little crazy though.   8)       Yeah AI, this stuff is amazing.  Another sleepless night on the way I think.  Dang.  If only my brain was a super cloud networking computer.  My Hard drive is almost full. 
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Republic Renewal October 03, 2009, 02:00:46 AM
Do a favor, delete that message and reserve your credibility.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: jeremiahshine October 03, 2009, 02:10:03 AM
What is a super cloud computer?
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 03, 2009, 11:07:28 AM
What is a super cloud computer?

Here's a couple of youtube videos that will explain:

http://www.youtube.com/watch?v=XdBd14rjcs0&feature=related

http://www.youtube.com/watch?v=6PNuQHUiV3Q

Then watch this, about Total Information Awareness, a Dod program, which will thrive when we're all on a cloud...
http://www.youtube.com/watch?v=uZ-LObTOV7s

Then watch this, about the Global Information Grid/Network (warning: propaganda):

http://www.youtube.com/watch?v=YrcqA_cqRD8
http://www.youtube.com/watch?v=9Ylcpyqz4fk&feature=related

Then read about TEMPEST... stickied in General.



: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: luckee1 October 03, 2009, 12:12:13 PM
you tube is down for maintenance on a Saturday afternoon???
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 03, 2009, 12:33:54 PM
you tube is down for maintenance on a Saturday afternoon???

Hmmm. Very strange time to clean house. Must be a lot of videos to clean up - you know, those truthers, birthers, holocaust questioners, supporters of Ron Paul, audit-the-fed'ers, and other people asking questions who need to be censored.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: ekimdrachir October 03, 2009, 01:00:48 PM
I have to create a current events newsletter tomorrow and include this, and all essential information ppl need to know regarding this topic. Please help by reccomending anything else you all think should be included, and I will post it here when I finish
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Nomadinexile October 03, 2009, 01:37:56 PM
Oh, come on, they wouldn't do that would they?    ::)           http://www.bloomberg.com/apps/news?pid=20601087&sid=aKjE7i7K0q3I
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Republic Renewal October 03, 2009, 11:54:03 PM
I have to create a current events newsletter tomorrow and include this, and all essential information ppl need to know regarding this topic. Please help by reccomending anything else you all think should be included, and I will post it here when I finish

Sir, check to see if anyones account was deleted and for what reason if listed. This may give us a leg up on what "cleaning" they are doing, and if its just truthers they are targeting.
: Re: CSIS J. Lewis: "Internet should be able to be shutdown like planes on 911"
: Anti_Illuminati October 04, 2009, 01:50:01 AM
http://thehill.com/component/content/article/545-technology/56947-obamas-power-over-internet-central-to-cybersecurity-debate

Obama’s power over Internet is central factor in cybersecurity debate
By Kim Hart - 09/01/09 12:00 PM ET

Legislation that would give the president authority to shut down at-risk Internet networks would strengthen the country’s cyber infrastructure in an emergency, according to some security experts.

But industry and consumer groups argue the government shouldn’t meddle with private networks.

How and when President Barack Obama could intervene in public and private information systems has become the central point of contention in the new draft of the Cybersecurity Act of 2009.

Senate staffers have circulated the draft with industry groups, civil liberties advocates and security experts. The bill was first introduced four months ago by Senate Commerce Committee Chairman Jay Rockefeller (D-W.Va.), and ranking member Olympia Snow (R-Maine).

The debate over the legislation comes as the Obama administration struggles to coordinate a national approach to cybersecurity.

Obama pledged to create a cybersecurity czar in the White House. But that post remains empty after Melissa Hathaway, acting senior director of cybersecurity and a front-runner for the job, resigned last month. Industry groups argue the government should fix its own security systems before adding mandates to the private sector.

Rockefeller’s original bill gave the president the power to limit Internet traffic to critical networks — in both the public and private sectors — for national security reasons or in the case of an emergency. Industry groups raised alarm about that level of government interference, and the new draft dropped the specific language, instead allowing the president to direct a “national response” to the cyber threat.

That language is "an improvement" over the initial bill, but is too ambiguous, said Greg Nojeim, senior counsel for the Center for Democracy and Technology.

“What does national response mean?” he said. “The scope of (the president’s) power to direct private-sector critical infrastructure information system operators is left undefined and is problematic for that reason.”

Others say the president should be able to take such action. James Lewis, senior fellow for the Center for Strategic and International Studies, which last year issued a set of cybersecurity recommendations to Congress, likened the provision to President George W. Bush’s call to shut down airlines after the attacks of Sept. 11, 2001.

“It seems foolish not to have the same authority for cyberspace,” he said.
“It’s not that the president will wake up in a bad mood one day and implode Yahoo. This would apply only to severe national emergencies. … This is a great opportunity to blast us into a new level of discussion about cybersecurity.”


A Senate staffer with knowledge of the bill said the draft was circulated to stakeholders, including network operators and consumer advocates, in order to get more feedback on the provisions.

Senate Commerce Committee spokeswoman Jena Longo said in a statement that “the bill will not empower a ‘government shut down or takeover of the Internet.’ … The purpose of this language is to clarify how the president directs the public-private response to a crisis, secure our economy and safeguard our financial networks, protect the American people, their privacy and civil liberties, and coordinate the government’s response.”

She added that the president “has always had the Constitutional authority, and duty, to protect the American people and direct the national response to any emergency that threatens the security and safety of the United States.”

The bill would also require cybersecurity professionals and critical infrastructure operators to go through a more rigorous certification process to be developed by the Commerce Department. Opponents of the provision say the security industry has already developed its own certification requirements and shouldn’t have to jump through other government hoops.

Alan Paller, director of research for the Sans Institute, which provides computer security training, said most of the government contractors and employees hired to secure federal networks do not have enough skills for the job.

“You have to set a high bar and create a demand for these credentials,” he said. “The security technology is useless without people who know how to use it.”

The original version of the bill also called for a “clearinghouse” for private and public cybersecurity threats, allowing the Commerce Department to seize data vulnerable to attacks even if it contains personal information about citizens.

Privacy advocates bristled at that idea. The new draft drops the reference to the Commerce Department having the power override privacy statutes to get access to information, but it still allows the government to require the sharing of potentially sensitive data.

“Companies are concerned they would provide information to the government about vulnerabilities that could be useful to competitors if disclosed,” Nojeim said. “The bill’s scope isn’t clear.”

Industry groups are also closely watching a number of other cybersecurity bills.

Sen. Tom Carper (D-Del.), a member of the Homeland Security and Governmental Affairs Committee and chairman of the subcommittee that handles government information, aims to update the Federal Information Security Management Act, a 7-year-old law requiring agencies to conduct annual reviews of their information system security efforts.

His bill, the Information and Communications Enhancement Act, introduced in April, would require agencies to have “an annual independent information security effectiveness evaluation.”

Security experts have been pushing for more robust FISMA standards for at least two years.

“Right now you can get a good FISMA rating and not be secure at all,” Lewis said. “We need to move from a paper test to performance-based metrics.”

Sen. Joe Lieberman (I-Conn.), chairman of the Senate Homeland Security and Governmental Affairs Committee, introduced a bill in April directing the Department of Homeland Security to work with other intelligence agencies to create a plan to protect critical electric infrastructure from cyber attacks. A companion bill has been introduced in the House by Rep. Bennie Thompson (D-Miss.), chairman of the House Homeland Security Committee.

Nojeim said the CDT largely supports the other cybersecurity bills. “It’s about strengthening FISMA and getting the government’s own house in order, which is a prerequisite to any discussion about what the government should require of the private sector.”
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: phosphene October 04, 2009, 02:23:13 AM
http://www.freshpatents.com/-dt20090219ptan20090047353.php?type=description

http://targetfreedom.typepad.com/targetfreedom/2009/08/refuse-and-resist-mandatory-flu-vaccines.html
H1N1 Vaccine Patent Filed Before the Virus Was Spread!

Kistner Pharm filed the patent of H1N1 vaccine on 28 AUG 2007 before the virus was spread!

This is the US Patent office document:
Go to Page 7 #0056 and see for yourself!
http://www.theoneclickgroup.co.uk/documents/vaccines/Baxter%20Vaccine%20Patent%20Application.pdf
How could the vaccine come before the virus?
Don’t believe me, look it up for yourself!
Repost and email everywhere!
Patent Evidence That The ‘Swine Flu’ Pandemic Is Man-Made
http://nbgazette.com/index.php?entry=entry090802-133304
 
: Re: The vaccine is partially a psyop, not taking it will not make you safe
: freeflying October 04, 2009, 04:00:42 AM
You got to wonder, if they want to use our military against us, why are they vaccinating our soldiers first?

Doubt it will be our military. They will die just like us and then they will bring in the Russians or Chinese troops.
: Re: CSIS J. Lewis: "Internet should be able to be shutdown like planes on 911"
: Dig October 04, 2009, 04:54:46 AM
“What does national response mean?” he said. “The scope of (the president’s) power to direct private-sector critical infrastructure information system operators is left undefined and is problematic for that reason.” Others say the president should be able to take such action. James Lewis, senior fellow for the Center for Strategic and International Studies, which last year issued a set of cybersecurity recommendations to Congress, likened the provision to President George W. Bush’s call to shut down airlines after the attacks of Sept. 11, 2001. “It seems foolish not to have the same authority for cyberspace,” he said.

And just like 9/11, the terrorists get flown around the world with prvate jets. After any cyber attack, the government funded terrorists will be the only ones allowed to use cyberspace.  THIS IS A SET UP, A CON, A SWINDLE!

“It’s not that the president will wake up in a bad mood one day and implode Yahoo. This would apply only to severe national emergencies. … This is a great opportunity to blast us into a new level of discussion about cybersecurity.” A Senate staffer with knowledge of the bill said the draft was circulated to stakeholders, including network operators and consumer advocates, in order to get more feedback on the provisions. Senate Commerce Committee spokeswoman Jena Longo said in a statement that “the bill will not empower a ‘government shut down or takeover of the Internet.’ … The purpose of this language is to clarify how the president directs the public-private response to a crisis, secure our economy and safeguard our financial networks, protect the American people, their privacy and civil liberties, and coordinate the government’s response.” She added that the president “has always had the Constitutional authority, and duty, to protect the American people and direct the national response to any emergency that threatens the security and safety of the United States.”

LIE LIE LIE!!!!!!!!!!!!!!  Please point out in the constitution where it says that one man has the power to shut down the flow of all communication to 305 million people unilaterally.  WTF are these psychotic pieces of f**king dog shit talking about.  This is like this lying victim of insanity saying "The president always has had the constitutional authority to rape your daughter, cut off her head, and feed it to Dick Cheney if he felt it was a super cool thing." I mean where the hell do they come up with this stuff?

The bill would also require cybersecurity professionals and critical infrastructure operators to go through a more rigorous certification process to be developed by the Commerce Department. Opponents of the provision say the security industry has already developed its own certification requirements and shouldn’t have to jump through other government hoops. Alan Paller, director of research for the Sans Institute, which provides computer security training, said most of the government contractors and employees hired to secure federal networks do not have enough skills for the job. “You have to set a high bar and create a demand for these credentials,” he said. “The security technology is useless without people who know how to use it.”

This is the creation of a class system on the internet. They use words like "High bar" and "credentials" but we know what they mean...just like animal farm, some animals are more equal than others.  DICK CHENEY BECAME VP DUE TO "HIGH BARS" AND "CREDENTIALS. DONALD RUMSFELD BECAME SECRETARY OF DEFENSE BECAUSE OF "HIGH BARS" AND "CREDENTIALS". The positions they had allowed unconstitutional powers because of the idea that some people are credential-ed to be more morally just than others.  All men are created equal, the founding fathers knew this well and that is why there is inherent in the constitution separate but equal branches of government with checks and balances and oversight.

Here are more facts for these assholes writing this shit...

The president is not the commander in chief of anything except his dick. There is no such thing as a secretary of defense. It is a completely manufactured position. There is no such thing as a department of defense in the constitution, it is also a completely made up department. During war times there was a department of war and a secretary of war.  Conditioning and predictive programming allowed us to create and view as essential these completely autonomous and tyrannically powerful systems of perpetual warfare that include unconstiutional "war powers". I mean the whole thing is so utterly ridiculous people need to wake up to it.

The original version of the bill also called for a “clearinghouse” for private and public cybersecurity threats, allowing the Commerce Department to seize data vulnerable to attacks even if it contains personal information about citizens. Privacy advocates bristled at that idea. The new draft drops the reference to the Commerce Department having the power override privacy statutes to get access to information, but it still allows the government to require the sharing of potentially sensitive data. “Companies are concerned they would provide information to the government about vulnerabilities that could be useful to competitors if disclosed,” Nojeim said. “The bill’s scope isn’t clear.” Industry groups are also closely watching a number of other cybersecurity bills.

Gee, duh, der...who is head of the Senate on Commerce?

: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: luckee1 October 04, 2009, 10:15:27 PM
A_I, does not the S733 go into effect 1 year after the signing of the act?  We are looking at April of 2010?  No?

So Barky for all intents and purposes should not be able to pull it yet?

I am not trying to sound naive, but legally he can't have that control yet?  

From open congress:

  OpenCongress -

  U.S. Congress - Text of S.773 as Introduced in Senate Cybersecurity
  Act of 2009 </>

  S.773 </bill/111-s773/show> - Cybersecurity Act of 2009

A bill to ensure the continued free flow of commerce within the United
States and with its global trading partners through secure cyber
communications, to provide for the continued development and
exploitation of the Internet and intranet communications for such
purposes, to provide for the development of a cadre of information
technology specialists to improve and maintain effective cybersecurity
defenses against disruption, and for other purposes.

111th CONGRESS

1st SessionComments

S. 773Comments
17
To ensure the continued free flow of commerce within the United States
and with its global trading partners through secure cyber
communications, to provide for the continued development and
exploitation of the Internet and intranet communications for such
purposes, to provide for the development of a cadre of information
technology specialists to improve and maintain effective cyber security
defenses against disruption, and for other purposes.

IN THE SENATE OF THE UNITED STATES

      April 1, 2009
Mr. ROCKEFELLER (for himself, Ms. SNOWE, and Mr. NELSON of Florida)
introduced the following bill; which was read twice and referred to the
Committee on Commerce, Science, and Transportation
------------------------------------------------------------------------
A BILL
1
To ensure the continued free flow of commerce within the United States
and with its global trading partners through secure cyber
communications, to provide for the continued development and
exploitation of the Internet and intranet communications for such
purposes, to provide for the development of a cadre of information
technology specialists to improve and maintain effective cybersecurity
defenses against disruption, and for other purposes

      /Be it enacted by the Senate and House of Representatives of the
      United States of America in Congress assembled,

      SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

      (a) SHORT TITLE- This Act may be cited as the ‘Cybersecurity Act
      of 2009’.

      (b) TABLE OF CONTENTS- The table of contents for this Act is as
      follows:

            Sec. 1. Short title; table of contents.

            Sec. 2. Findings.

            Sec. 3. Cybersecurity Advisory Panel.

            Sec. 4. Real-time cybersecurity dashboard.

            Sec. 5. State and regional cybersecurity enhancement
            program.

            Sec. 6. NIST standards development and compliance.

            Sec. 7. Licensing and certification of cybersecurity
            professionals.

            Sec. 8. Review of NTIA domain name contracts.

            Sec. 9. Secure domain name addressing system.

            Sec. 10. Promoting cybersecurity awareness.

            Sec. 11. Federal cybersecurity research and
            development.

            Sec. 12. Federal Cyber Scholarship-for-Service
            program.

            Sec. 13. Cybersecurity competition and challenge.

            Sec. 14. Public-private clearinghouse.

            Sec. 15. Cybersecurity risk management report.

            Sec. 16. Legal framework review and report.

            Sec. 17. Authentication and civil liberties report.

            Sec. 18. Cybersecurity responsibilities and
            authorities.

            Sec. 19. Quadrennial cyber review.

            Sec. 20. Joint intelligence threat assessment.

            Sec. 21. International norms and cybersecurity deterrence
            measures.

            Sec. 22. Federal Secure Products and Services Acquisitions
            Board.

            Sec. 23. Definitions

      SEC. 2. FINDINGS.

      1
      The Congress finds the following:
            17
            (1) America’s failure to protect cyberspace is one of the
            most urgent national security problems facing the
            country.

            7
            (2) Since intellectual property is now often stored in
            digital form, industrial espionage that exploits weak
            cybersecurity dilutes our investment in innovation while
            subsidizing the research and development efforts of foreign
            competitors. In the new global competition, where economic
            strength and technological leadership are vital components
            of national power, failing to secure cyberspace puts us at a
            disadvantage.

            7
            (3) According to the 2009 Annual Threat Assessment, ‘a
            successful cyber attack against a major financial service
            provider could severely impact the national economy, while
            cyber attacks against physical infrastructure computer
            systems such as those that control power grids or oil
            refineries have the potential to disrupt services for hours
            or weeks’ and that ‘Nation states and criminals target our
            government and private sector information networks to gain
            competitive advantage in the commercial sector.’.

            1 <#>
            (4) The Director of National Intelligence testified before
            the Congress on February 19, 2009, that ‘a growing array of
            state and non-state adversaries are increasingly
            targeting-for exploitation and potentially disruption or
            destruction-our information infrastructure, including the
            Internet, telecommunications networks, computer systems, and
            embedded processors and controllers in critical industries’
            and these trends are likely to continue.Comments <#>Close
            Comments <#>Permalink <?version=is&nid=t0:is:44>

            6 <#>
            (5) John Brennan, the Assistant to the President for
            Homeland Security and Counterterrorism wrote on March 2,
            2009, that ‘our nation’s security and economic prosperity
            depend on the security, stability, and integrity of
            communications and information infrastructure that are
            largely privately-owned and globally-operated.’.

            6 <#>
            (6) Paul Kurtz, a Partner and chief operating officer of
            Good Harbor Consulting as well as a senior advisor to the
            Obama Transition Team for cybersecurity, recently stated
            that the United States is unprepared to respond to a
            ‘cyber-Katrina’ and that ‘a massive cyber disruption could
            have a cascading, long-term impact without adequate
            co-ordination between government and the private
            sector.’.

            3 <#>
            (7) The Cyber Strategic Inquiry 2008, sponsored by Business
            Executives for National Security and executed by Booz Allen
            Hamilton, recommended to ‘establish a single voice for
            cybersecurity within government’ concluding that the ‘unique
            nature of cybersecurity requires a new leadership
            paradigm.’

            4 <#>
            (8) Alan Paller, the Director of Research at the SANS
            Institute, testified before the Congress that ‘the fight
            against cybercrime resembles an arms race where each time
            the defenders build a new wall, the attackers create new
            tools to scale the wall. What is particularly important in
            this analogy is that, unlike conventional warfare where
            deployment takes time and money and is quite visible, in the
            cyber world, when the attackers find a new weapon, they can
            attack millions of computers, and successfully infect
            hundreds of thousands, in a few hours or days, and remain
            completely hidden.’.

            1 <#>
            (9) According to the February 2003 National Strategy to
            Secure Cyberspace, ‘our nation’s critical infrastructures
            are composed of public and private institutions in the
            sectors of agriculture, food, water, public health,
            emergency services, government, defense industrial base,
            information and telecommunications, energy, transportation,
            banking finance, chemicals and hazardous materials, and
            postal and shipping. Cyberspace is their nervous system--the
            control system of our country’ and that ‘the cornerstone of
            America’s cyberspace security strategy is and will remain a
            public-private partnership.’.

            3 <#>
            (10) According to the National Journal, Mike McConnell, the
            former Director of National Intelligence, told President
            Bush in May 2007 that if the 9/11 attackers had chosen
            computers instead of airplanes as their weapons and had
            waged a massive assault on a U.S. bank, the economic
            consequences would have been ‘an order of magnitude greater’
            than those cased by the physical attack on the World Trade
            Center. Mike McConnell has subsequently referred to
            cybersecurity as the ‘soft underbelly of this
            country.’.

            (11) The Center for Strategic and International Studies
            report on Cybersecurity for the 44th Presidency concluded
            that (A) cybersecurity is now a major national security
            problem for the United States, (B) decisions and actions
            must respect privacy and civil liberties, and (C) only a
            comprehensive national security strategy that embraces both
            the domestic and international aspects of cybersecurity will
            make us more secure. The report continued stating that the
            United States faces ‘a long-term challenge in cyberspace
            from foreign intelligence agencies and militaries,
            criminals, and others, and that losing this struggle will
            wreak serious damage on the economic health and national
            security of the United States.’.

            (12) James Lewis, Director and Senior Fellow, Technology and
            Public Policy Program, Center for Strategic and
            International Studies, testified on behalf of the Center for
            Strategic and International Studies that ‘the United States
            is not organized and lacks a coherent national strategy for
            addressing’ cybersecurity.

            10 <#>
            (13) President Obama said in a speech at Purdue University
            on July 16, 2008, that ‘every American depends--directly or
            indirectly--on our system of information networks. They are
            increasingly the backbone of our economy and our
            infrastructure; our national security and our personal
            well-being. But it’s no secret that terrorists could use our
            computer networks to deal us a crippling blow. We know that
            cyber-espionage and common crime is already on the rise. And
            yet while countries like China have been quick to recognize
            this change, for the last eight years we have been dragging
            our feet.’ Moreover, President Obama stated that ‘we need to
            build the capacity to identify, isolate, and respond to any
            cyber-attack.’.

            4 <#>
            (14) The President’s Information Technology Advisory
            Committee reported in 2005 that software is a major
            vulnerability and that ‘software development methods that
            have been the norm fail to provide the high-quality,
            reliable, and secure software that the IT infrastructure
            requires. . . . Today, as with cancer, vulnerable software
            can be invaded and modified to cause damage to previously
            healthy software, and infected software can replicate itself
            and be carried across networks to cause damage in other
            systems.’.

      SEC. 3. CYBERSECURITY ADVISORY PANEL.

      (a) IN GENERAL- The President shall establish or designate a
      Cybersecurity Advisory Panel.

      1 <#>
      (b) QUALIFICATIONS- The President--

            4 <#>
            (1) shall appoint as members of the panel representatives of
            industry, academic, non-profit organizations, interest
            groups and advocacy organizations, and State and local
            governments who are qualified to provide advice and
            information on cybersecurity research, development,
            demonstrations, education, technology transfer, commercial
            application, or societal and civil liberty concerns;
            and

            7 <#>
            (2) may seek and give consideration to recommendations from
            the Congress, industry, the cybersecurity community, the
            defense community, State and local governments, and other
            appropriate organizations.

      (c) DUTIES- The panel shall advise the President on matters
      relating to the national cybersecurity program and strategy and
      shall assess--

            1 <#>
            (1) trends and developments in cybersecurity science
            research and development;
            (2) progress made in implementing the strategy;
            (3) the need to revise the strategy;
            (4) the balance among the components of the national
            strategy, including funding for program components;
            (5) whether the strategy, priorities, and goals are helping
            to maintain United States leadership and defense in
            cybersecurity;
            (6) the management, coordination, implementation, and
            activities of the strategy; and
            (7) whether societal and civil liberty concerns are
            adequately addressed.

      4 <#>
      (d) REPORTS- The panel shall report, not less frequently than once
      every 2 years, to the President on its assessments under
      subsection (c) and its recommendations for ways to improve the
      strategy.

      7 <#>
      (e) TRAVEL EXPENSES OF NON-FEDERAL MEMBERS- Non-Federal members of
      the panel, while attending meetings of the panel or while
      otherwise serving at the request of the head of the panel while
      away from their homes or regular places of business, may be
      allowed travel expenses, including per diem in lieu of
      subsistence, as authorized by section 5703 of title 5, United
      States Code, for individuals in the government serving without
      pay. Nothing in this subsection shall be construed to prohibit
      members of the panel who are officers or employees of the United
      States from being allowed travel expenses, including per diem in
      lieu of subsistence, in accordance with law.

      3 <#>
      (f) EXEMPTION FROM FACA SUNSET- Section 14 of the Federal Advisory
      Committee Act (5 U.S.C. App.) shall not apply to the Advisory
      Panel.

      SEC. 4. REAL-TIME CYBERSECURITY DASHBOARD.
      2 <#>
      The Secretary of Commerce shall--
            10 <#>
            (1) in consultation with the Office of Management and
            Budget, develop a plan within 90 days after the date of
            enactment of this Act to implement a system to provide
            dynamic, comprehensive, real-time cybersecurity status and
            vulnerability information of all Federal Government
            information systems and networks managed by the Department
            of Commerce; and

            1 <#>
            (2) implement the plan within 1 year after the date of
            enactment of this Act.Comments <#>

      SEC. 5. STATE AND REGIONAL CYBERSECURITY ENHANCEMENT PROGRAM.

      6 <#>
      (a) CREATION AND SUPPORT OF CYBERSECURITY CENTERS- The Secretary
      of Commerce shall provide assistance for the creation and support
      of Regional Cybersecurity Centers for the promotion and
      implementation of cybersecurity standards. Each Center shall be
      affiliated with a United States-based nonprofit institution or
      organization, or consortium thereof, that applies for and is
      awarded financial assistance under this section.

      6 <#>
      (b) PURPOSE- The purpose of the Centers is to enhance the
      cybersecurity of small and medium sized businesses in United
      States through--

            5 <#>
            (1) the transfer of cybersecurity standards, processes,
            technology, and techniques developed at the National
            Institute of Standards and Technology to Centers and,
            through them, to small- and medium-sized companies
            throughout the United States;

            2 <#>
            (2) the participation of individuals from industry,
            universities, State governments, other Federal agencies,
            and, when appropriate, the Institute in cooperative
            technology transfer activities;

            4 <#>
            (3) efforts to make new cybersecurity technology, standards,
            and processes usable by United States-based small- and
            medium-sized companies;

            4 <#>
            (4) the active dissemination of scientific, engineering,
            technical, and management information about cybersecurity to
            industrial firms, including small- and medium-sized
            companies; and

            1 <#>
            (5) the utilization, when appropriate, of the expertise and
            capability that exists in Federal laboratories other than
            the Institute.

      1 <#>
      (c) ACTIVITIES- The Centers shall--

            (1) disseminate cybersecurity technologies, standard, and
            processes based on research by the Institute for the purpose
            of demonstrations and technology transfer;
            (2) actively transfer and disseminate cybersecurity
            strategies, best practices, standards, and technologies to
            protect against and mitigate the risk of cyber attacks to a
            wide range of companies and enterprises, particularly small-
            and medium-sized businesses; and
            (3) make loans, on a selective, short-term basis, of items
            of advanced cybersecurity countermeasures to small
            businesses with less than 100 employees.

      2 <#>
      (c) Duration and Amount of Support; Program Descriptions;
      Applications; Merit Review; Evaluations of Assistance-

            (1) FINANCIAL SUPPORT- The Secretary may provide financial
            support, not to exceed 50 percent of its annual operating
            and maintenance costs, to any Center for a period not to
            exceed 6 years (except as provided in paragraph
            (5)(D)).

            (2) PROGRAM DESCRIPTION- Within 90 days after the date of
            enactment of this Act, the Secretary shall publish in the
            Federal Register a draft description of a program for
            establishing Centers and, after a 30-day comment period,
            shall publish a final description of the program. The
            description shall include--

                  (A) a description of the program;
                  (B) procedures to be followed by applicants;
                  (C) criteria for determining qualified
                  applicants;
                  (D) criteria, including those described in paragraph
                  (4), for choosing recipients of financial assistance
                  under this section from among the qualified
                  applicants; and

                  1 <#>
                  (E) maximum support levels expected to be available to
                  Centers under the program in the fourth through sixth
                  years of assistance under this section.

            3 <#>
            (3) APPLICATIONS; SUPPORT COMMITMENT- Any nonprofit
            institution, or consortia of nonprofit institutions, may
            submit to the Secretary an application for financial support
            under this section, in accordance with the procedures
            established by the Secretary. In order to receive assistance
            under this section, an applicant shall provide adequate
            assurances that it will contribute 50 percent or more of the
            proposed Center’s annual operating and maintenance costs for
            the first 3 years and an increasing share for each of the
            next 3 years.

            (4) AWARD CRITERIA- Awards shall be made on a competitive,
            merit-based review. In making a decision whether to approve
            an application and provide financial support under this
            section, the Secretary shall consider, at a
            minimum--

                  (A) the merits of the application, particularly those
                  portions of the application regarding technology
                  transfer, training and education, and adaptation of
                  cybersecurity technologies to the needs of particular
                  industrial sectors;
                  (B) the quality of service to be provided;
                  (C) geographical diversity and extent of service area;
                  and
                  (D) the percentage of funding and amount of in-kind
                  commitment from other sources.

            (5) Third year evaluation-

                  (A) IN GENERAL- Each Center which receives financial
                  assistance under this section shall be evaluated
                  during its third year of operation by an evaluation
                  panel appointed by the Secretary.
            
                  (B) EVALUATION PANEL- Each evaluation panel shall be
                  composed of private experts, none of whom shall be
                  connected with the involved Center, and Federal
                  officials. An official of the Institute shall chair
                  the panel. Each evaluation panel shall measure the
                  Center’s performance against the objectives specified
                  in this section.
                
                  (C) POSITIVE EVALUATION REQUIRED FOR CONTINUED
                  FUNDING- The Secretary may not provide funding for the
                  fourth through the sixth years of a Center’s operation
                  unless the evaluation by the evaluation panel is
                  positive. If the evaluation is positive, the Secretary
                  may provide continued funding through the sixth year
                  at declining levels.

                  (D) FUNDING AFTER SIXTH YEAR- After the sixth year,
                  the Secretary may provide additional financial support
                  to a Center if it has received a positive evaluation
                  through an independent review, under procedures
                  established by the Institute. An additional
                  independent review shall be required at least every 2
                  years after the sixth year of operation. Funding
                  received for a fiscal year under this section after
                  the sixth year of operation may not exceed one third
                  of the annual operating and maintenance costs of the
                  Center.

            (6) PATENT RIGHTS TO INVENTIONS- The provisions of chapter
            18 of title 35, United States Code, shall (to the extent not
            inconsistent with this section) apply to the promotion of
            technology from research by Centers under this section
            except for contracts for such specific technology extension
            or transfer services as may be specified by statute or by
            the President, or the President’s designee.

      (d) ACCEPTANCE OF FUNDS FROM OTHER FEDERAL DEPARTMENTS AND
      AGENCIES- In addition to such sums as may be authorized and
      appropriated to the Secretary and President, or the President’s
      designee, to operate the Centers program, the Secretary and the
      President, or the President’s designee, also may accept funds from
      other Federal departments and agencies for the purpose of
      providing Federal funds to support Centers. Any Center which is
      supported with funds which originally came from other Federal
      departments and agencies shall be selected and operated according
      to the provisions of this section.

      SEC. 6. NIST STANDARDS DEVELOPMENT AND COMPLIANCE.

      (a) IN GENERAL- Within 1 year after the date of enactment of this
      Act, the National Institute of Standards and Technology shall
      establish measurable and auditable cybersecurity standards for all
      Federal Government, government contractor, or grantee critical
      infrastructure information systems and networks in the following
      areas:

            (1) CYBERSECURITY METRICS RESEARCH- The Director of the
            National Institute of Standards and Technology shall
            establish a research program to develop cybersecurity
            metrics and benchmarks that can assess the economic impact
            of cybersecurity. These metrics should measure risk
            reduction and the cost of defense. The research shall
            include the development automated tools to assess
            vulnerability and compliance.

            (2) SECURITY CONTROLS- The Institute shall establish
            standards for continuously measuring the effectiveness of a
            prioritized set of security controls that are known to block
            or mitigate known attacks.


            (3) SOFTWARE SECURITY- The Institute shall establish
            standards for measuring the software security using a
            prioritized list of software weaknesses known to lead to
            exploited and exploitable vulnerabilities. The Institute
            will also establish a separate set of such standards for
            measuring security in embedded software such as that found
            in industrial control systems.

           (4) SOFTWARE CONFIGURATION SPECIFICATION LANGUAGE- The
            Institute shall, establish standard computer-readable
            language for completely specifying the configuration of
            software on computer systems widely used in the Federal
            Government, by government contractors and grantees, and in
            private sector owned critical infrastructure information
            systems and networks.

            (5) STANDARD SOFTWARE CONFIGURATION- The Institute shall
            establish standard configurations consisting of security
            settings for operating system software and software
            utilities widely used in the Federal Government, by
            government contractors and grantees, and in private sector
            owned critical infrastructure information systems and
            networks.

            (6) VULNERABILITY SPECIFICATION LANGUAGE- The Institute
            shall establish standard computer-readable language for
            specifying vulnerabilities in software to enable software
            vendors to communicate vulnerability data to software users
            in real time.

            (7) National compliance standards for all software-

                  (A) PROTOCOL- The Institute shall establish a standard
                  testing and accreditation protocol for software built
                  by or for the Federal Government, its contractors, and
                  grantees, and private sector owned critical
                  infrastructure information systems and networks. to
                  ensure that it--
                        (i) meets the software security standards of
                        paragraph (2); and

                        (ii) does not require or cause any changes to be
                        made in the standard configurations described in
                        paragraph (4).

                  (B) COMPLIANCE- The Institute shall develop a process
                  or procedure to verify that--
                        (i) software development organizations comply
                        with the protocol established under subparagraph
                        (A) during the software development process;
                        and

                        (ii) testing results showing evidence of
                        adequate testing and defect reduction are
                        provided to the Federal Government prior to
                        deployment of software.

      (b) CRITERIA FOR STANDARDS- Notwithstanding any other provision of
      law (including any Executive Order), rule, regulation, or
      guideline, in establishing standards under this section, the
      Institute shall disregard the designation of an information system
      or network as a national security system or on the basis of
      presence of classified or confidential information, and shall
      establish standards based on risk profiles.

      (c) INTERNATIONAL STANDARDS- The Director, through the Institute
      and in coordination with appropriate Federal agencies, shall be
      responsible for United States representation in all international
      standards development related to cybersecurity, and shall develop
      and implement a strategy to optimize the United States position
      with respect to international cybersecurity standards.

      (d) COMPLIANCE ENFORCEMENT- The Director shall--

            (1) enforce compliance with the standards developed by the
            Institute under this section by software manufacturers,
            distributors, and vendors; and

            (2) shall require each Federal agency, and each operator of
            an information system or network designated by the President
            as a critical infrastructure information system or network,
            periodically to demonstrate compliance with the standards
            established under this section.

      (e) FCC NATIONAL BROADBAND PLAN- In developing the national
      broadband plan pursuant to section 6001(k) of the American
      Recovery and Reinvestment Act of 2009, the Federal Communications
      Commission shall report on the most effective and efficient means
      to ensure the cybersecurity of commercial broadband networks,
      including consideration of consumer education and outreach
      programs.

      SEC. 7. LICENSING AND CERTIFICATION OF CYBERSECURITY PROFESSIONALS.

      (a) IN GENERAL- Within 1 year after the date of enactment of this
      Act, the Secretary of Commerce shall develop or coordinate and
      integrate a national licensing, certification, and periodic
      recertification program for cybersecurity professionals.  

      (b) MANDATORY LICENSING- Beginning 3 years after the date of
      enactment of this Act, it shall be unlawful for any individual to
      engage in business in the United States, or to be employed in the
      United States, as a provider of cybersecurity services to any
      Federal agency or an information system or network designated by
      the President, or the President’s designee, as a critical
      infrastructure information system or network, who is not licensed
      and certified under the program.

      SEC. 8. REVIEW OF NTIA DOMAIN NAME CONTRACTS.

      (a) IN GENERAL- No action by the Assistant Secretary of Commerce
      for Communications and Information after the date of enactment of
      this Act with respect to the renewal or modification of a contract
      related to the operation of the Internet Assigned Numbers
      Authority, shall be final until the Advisory Panel--

            (1) has reviewed the action;

            (2) considered the commercial and national security
            implications of the action; and

            (3) approved the action.

      (b) APPROVAL PROCEDURE- If the Advisory Panel does not approve
      such an action, it shall immediately notify the Assistant
      Secretary in writing of the disapproval and the reasons therefor.
      The Advisory Panel may provide recommendations to the Assistant
      Secretary in the notice for any modifications the it deems
      necessary to secure approval of the action.

      SEC. 9. SECURE DOMAIN NAME ADDRESSING SYSTEM.

      (a) IN GENERAL- Within 3 years after the date of enactment of this
      Act, the Assistant Secretary of Commerce for Communications and
      Information shall develop a strategy to implement a secure domain
      name addressing system. The Assistant Secretary shall publish
      notice of the system requirements in the Federal Register together
      with an implementation schedule for Federal agencies and
      information systems or networks designated by the President, or
      the President’s designee, as critical infrastructure information
      systems or networks.

      (b) COMPLIANCE REQUIRED- The President shall ensure that each
      Federal agency and each such system or network implements the
      secure domain name addressing system in accordance with the
      schedule published by the Assistant Secretary.

      SEC. 10. PROMOTING CYBERSECURITY AWARENESS.

      The Secretary of Commerce shall develop and implement a national
      cybersecurity awareness campaign that-


            (1) is designed to heighten public awareness of
            cybersecurity issues and concerns;

            (2) communicates the Federal Government’s role in securing
            the Internet and protecting privacy and civil liberties with
            respect to Internet-related activities; and

            (3) utilizes public and private sector means of providing
            information to the public, including public service
            announcements.

      SEC. 11. FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT.

      (a) FUNDAMENTAL CYBERSECURITY RESEARCH- The Director of the
      National Science Foundation shall give priority to computer and
      information science and engineering research to ensure substantial
      support is provided to meet the following challenges in
      cybersecurity:

            (1) How to design and build complex software-intensive
            systems that are secure and reliable when first
            deployed.

            (2) How to test and verify that software, whether developed
            locally or obtained from a third party, is free of
            significant known security flaws.
            (3) How to test and verify that software obtained from a
            third party correctly implements stated functionality, and
            only that functionality.

            (4) How to guarantee the privacy of an individual’s
            identity, information, or lawful transactions when stored in
            distributed systems or transmitted over networks.
            (5) How to build new protocols to enable the Internet to
            have robust security as one of its key capabilities.

            (6) How to determine the origin of a message transmitted
            over the Internet.

            (7) How to support privacy in conjunction with improved
            security.

            (8) How to address the growing problem of insider
            threat.Comments

      (b) SECURE CODING RESEARCH- The Director shall support research
      that evaluates selected secure coding education and improvement
      programs. The Director shall also support research on new methods
      of integrating secure coding improvement into the core curriculum
      of computer science programs and of other programs where graduates
      have a substantial probability of developing software after
      graduation.

      (c) ASSESSMENT OF SECURE CODING EDUCATION IN COLLEGES AND
      UNIVERSITIES- Within one year after the date of enactment of this
      Act, the Director shall submit to the Senate Committee on
      Commerce, Science, and Transportation and the House of
      Representatives Committee on Science and Technology a report on
      the state of secure coding education in America’s colleges and
      universities for each school that received National Science
      Foundation funding in excess of $1,000,000 during fiscal year
      2008. The report shall include--

            (1) the number of students who earned undergraduate degrees
            in computer science or in each other program where graduates
            have a substantial probability of being engaged in software
            design or development after graduation;

            (2) the percentage of those students who completed
            substantive secure coding education or improvement programs
            during their undergraduate experience; and

             (3) descriptions of the length and content of the education
            and improvement programs, and a measure of the effectiveness
            of those programs in enabling the students to master secure
            coding and design.

      (d) CYBERSECURITY MODELING AND TESTBEDS- The Director shall
      establish a program to award grants to institutions of higher
      education to establish cybersecurity testbeds capable of realistic
      modeling of real-time cyber attacks and defenses. The purpose of
      this program is to support the rapid development of new
      cybersecurity defenses, techniques, and processes by improving
      understanding and assessing the latest technologies in a
      real-world environment. The testbeds shall be sufficiently large
      in order to model the scale and complexity of real world networks
      and environments.

      (e) NSF COMPUTER AND NETWORK SECURITY RESEARCH GRANT AREAS-
      Section 4(a)(1) of the Cybersecurity Research and Development Act
      (15 U.S.C. 7403(a)(1)) is amended--

            (1) by striking ‘and’ after the semicolon in subparagraph
            (H);
            (2) by striking ‘property.’ in subparagraph (I) and
            inserting ‘property;’; and
            (3) by adding at the end the following:
                ‘(J) secure fundamental protocols that are at the heart
                of inter-network communications and data
                exchange;
                ‘(K) secure software engineering and software assurance,
                including--
                      ‘(i) programming languages and systems that
                      include fundamental security features;
                    
                     ‘(ii) portable or reusable code that remains
                      secure when deployed in various
                      environments;

                      ‘(iii) verification and validation technologies to
                      ensure that requirements and specifications have
                      been implemented; and

                      ‘(iv) models for comparison and metrics to assure
                      that required standards have been met;

                ‘(L) holistic system security that--

                      ‘(i) addresses the building of secure systems from
                      trusted and untrusted components;

                      ‘(ii) proactively reduces vulnerabilities;

                      ‘(iii) addresses insider threats; and

                      ‘(iv) supports privacy in conjunction with
                      improved security;

                ‘(M) monitoring and detection; and

                ‘(N) mitigation and rapid recovery methods.’.

      (f) NSF COMPUTER AND NETWORK SECURITY GRANTS- Section 4(a)(3) of
      the Cybersecurity Research and Development Act (15 U.S.C.
      7403(a)(3)) is amended--

            (1) by striking ‘and’ in subparagraph (D);

            (2) by striking ‘2007’ in subparagraph (E) and inserting
            ‘2007;’; and

            (3) by adding at the end of the following:

                      ‘(F) $150,000,000 for fiscal year 2010;
                      ‘(G) $155,000,000 for fiscal year 2011;
                      ‘(H) $160,000,000 for fiscal year 2012;
                      ‘(I) $165,000,000 for fiscal year 2013;
                      and
                      ‘(J) $170,000,000 for fiscal year 2014.’.

      (g) COMPUTER AND NETWORK SECURITY CENTERS- Section 4(b)(7) of such
      Act (15 U.S.C. 7403(b)(7)) is amended--

            (1) by striking ‘and’ in subparagraph (D);
            (2) by striking ‘2007’ in subparagraph (E) and inserting
            ‘2007;’; and
            (3) by adding at the end of the following:
                      ‘(F) $50,000,000 for fiscal year 2010;
                    
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: luckee1 October 04, 2009, 10:24:35 PM
      SEC. 18. CYBERSECURITY RESPONSIBILITIES AND AUTHORITY.

      The President--

            (1) within 1 year after the date of enactment of this Act,
            shall develop and implement a comprehensive national
            cybersecurity strategy, which shall include--

                  (A) a long-term vision of the Nation’s cybersecurity
                  future; and
           
                  (B) a plan that encompasses all aspects of national
                  security, including the participation of the private
                  sector,
including critical infrastructure operators
                  and managers;

            (2) may declare a cybersecurity emergency and order the
            limitation or shutdown of Internet traffic to and from any
            compromised Federal Government or United States critical
            infrastructure information system or network;

           (3) shall designate an agency to be responsible for
            coordinating the response and restoration of any Federal
            Government or United States critical infrastructure
            information system or network affected by a cybersecurity
            emergency declaration under paragraph (2);
            (4) shall, through the appropriate department or agency,
            review equipment that would be needed after a cybersecurity
            attack and develop a strategy for the acquisition, storage,
            and periodic replacement of such equipment;
            (5) shall direct the periodic mapping of Federal Government
            and United States critical infrastructure information
            systems or networks, and shall develop metrics to measure
            the effectiveness of the mapping process;
            (6) may order the disconnection of any Federal Government or
            United States critical infrastructure information systems or
            networks in the interest of national security;

            (7) shall, through the Office of Science and Technology
            Policy, direct an annual review of all Federal cyber
            technology research and development investments;
            (8) may delegate original classification authority to the
            appropriate Federal official for the purposes of improving
            the Nation’s cybersecurity posture;
            (9) shall, through the appropriate department or agency,
            promulgate rules for Federal professional responsibilities
            regarding cybersecurity, and shall provide to the Congress
            an annual report on Federal agency compliance with those
            rules;
            (10) shall withhold additional compensation, direct
            corrective action for Federal personnel, or terminate a
            Federal contract in violation of Federal rules
, and shall
            report any such action to the Congress in an unclassified
            format within 48 hours after taking any such action;
            and
            (11) shall notify the Congress within 48 hours after
            providing a cyber-related certification of legality to a
            United States person.

      SEC. 19. QUADRENNIAL CYBER REVIEW.

      (a) IN GENERAL- Beginning with 2013 and in every fourth year
      thereafter, the President, or the President’s designee, shall
      complete a review of the cyber posture of the United States,
      including an unclassified summary of roles, missions,
      accomplishments, plans, and programs. The review shall include a
      comprehensive examination of the cyber strategy, force structure,
      modernization plans, infrastructure, budget plan, the Nation’s
      ability to recover from a cyberemergency, and other elements of
      the cyber program and policies with a view toward determining and
      expressing the cyber strategy of the United States and
      establishing a revised cyber program for the next 4 years.

      (b) INVOLVEMENT OF CYBERSECURITY ADVISORY PANEL-

            (1) The President, or the President’s designee, shall
            apprise the Cybersecurity Advisory Panel established or
            designated under section 3, on an ongoing basis, of the work
            undertaken in the conduct of the review.

            (2) Not later than 1 year before the completion date for the
            review, the Chairman of the Advisory Panel shall submit to
            the President, or the President’s designee, the Panel’s
            assessment of work undertaken in the conduct of the review
            as of that date and shall include in the assessment the
            recommendations of the Panel for improvements to the review,
            including recommendations for additional matters to be
            covered in the review.

      (c) ASSESSMENT OF REVIEW- Upon completion of the review, the
      Chairman of the Advisory Panel, on behalf of the Panel, shall
      prepare and submit to the President, or the President’s designee,
      an assessment of the review in time for the inclusion of the
      assessment in its entirety in the report under subsection
      (d).

      (d) REPORT- Not later than September 30, 2013, and every 4 years
      thereafter, the President, or the President’s designee, shall
      submit to the relevant congressional Committees a comprehensive
      report on the review. The report shall include--

            (1) the results of the review, including a comprehensive
            discussion of the cyber strategy of the United States and
            the collaboration between the public and private sectors
            best suited to implement that strategy;
            (2) the threats examined for purposes of the review and the
            scenarios developed in the examination of such
            threats;
            (3) the assumptions used in the review, including
            assumptions relating to the cooperation of other countries
            and levels of acceptable risk; and
            (4) the Advisory Panel’s assessment.

      SEC. 20. JOINT INTELLIGENCE THREAT ASSESSMENT.

      The Director of National Intelligence and the Secretary of
      Commerce shall submit to the Congress an annual assessment of, and
      report on, cybersecurity threats to and vulnerabilities of
      critical national information, communication, and data network
      infrastructure.

      SEC. 21. INTERNATIONAL NORMS AND CYBERSECURITY DETERRANCE MEASURES.

      The President shall--

            (1) work with representatives of foreign
            governments-
-

                  (A) to develop norms, organizations, and other
                  cooperative activities for international engagement to
                  improve cybersecurity; and
                  (B) to encourage international cooperation in
                  improving cybersecurity on a global basis; and

            (2) provide an annual report to the Congress on the progress
            of international initiatives undertaken pursuant to
            subparagraph (A).

      SEC. 22. FEDERAL SECURE PRODUCTS AND SERVICES ACQUISITIONS BOARD.

      (a) ESTABLISHMENT- There is established a Secure Products and
      Services Acquisitions Board. The Board shall be responsible for
      cybersecurity review and approval of high value products and
      services acquisition and, in coordination with the National
      Institute of Standards and Technology, for the establishment of
      appropriate standards for the validation of software to be
      acquired by the Federal Government. The Director of the National
      Institute of Standards and Technology shall develop the review
      process and provide guidance to the Board. In reviewing software
      under this subsection, the Board may consider independent secure
      software validation and verification as key factor for
      approval.

      (b) ACQUISITION STANDARDS- The Director, in cooperation with the
      Office of Management and Budget and other appropriate Federal
      agencies, shall ensure that the Board approval is included as a
      prerequisite to the acquisition of any product or
      service--

            (1) subject to review by the Board; and
            (2) subject to Federal acquisition standards.

      (c) ACQUISITION COMPLIANCE- After the publication of the standards
      developed under subsection (a), any proposal submitted in response
      to a request for proposals issued by a Federal agency shall
      demonstrate compliance with any such applicable standard in order
      to ensure that cybersecurity products and services are designed to
      be an integral part of the overall acquisition.

      SEC. 23. DEFINITIONS.

      In this Act:

            (1) ADVISORY PANEL- The term ‘Advisory Panel’ means the
            Cybersecurity Advisory Panel established or designated under
            section 3.

            (2) CYBER- The term ‘cyber’ means--

                  (A) any process, program, or protocol relating to the
                  use of the Internet or an intranet, automatic data
                  processing or transmission, or telecommunication via
                  the Internet or an intranet; and
                  (B) any matter relating to, or involving the use of,
                  computers or computer networks.

            (3) FEDERAL GOVERNMENT AND UNITED STATES CRITICAL
            INFRASTRUCTURE INFORMATION SYSTEMS AND NETWORKS- The term
            ‘Federal Government and United States critical
            infrastructure information systems and networks’
            includes--

                  (A) Federal Government information systems and
                  networks; and
                  (B) State, local, and nongovernmental information
                  systems and networks in the United States designated
                  by the President as critical infrastructure
                  information systems and networks.

            (4) INTERNET- The term ‘Internet’ has the meaning given that
            term by section 4(4) of the High-Performance Computing Act
            of 1991 (15 U.S.C. 5503(4)).

            (5) NETWORK- The term ‘network’ has the meaning given that
            term by section 4(5) of such Act (15 U.S.C.
            5503(5)).
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: jeremiahshine October 04, 2009, 10:53:36 PM
To protect "intellectual properties that are vulnerable to espionage"...Will they regulate door locks next?  "We need to step in and control security at your home now.  Your door locks may be ineffectual against stopping a burglary.  Thus, we will put cameras and security lights in your foyers, hallways, and garages.  Not only will this protect your stuff, but it will let us see what you're doing 24/7 should we decide to peak in."
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Anti_Illuminati October 05, 2009, 12:21:06 AM
A few excerpts of the bill that I will highlight.  The entire bill is totally tyrannical as hell and incredibly unconstitutional and hellbent fascist.

(4) SOFTWARE CONFIGURATION SPECIFICATION LANGUAGE- The
            Institute shall, establish standard computer-readable
            language for completely specifying the configuration of
            software on computer systems widely used in the Federal
            Government, by government contractors and grantees, and in
            private sector owned critical infrastructure information
            systems and networks.

THIS GIVES THE NWO FULL CONTROL OVER ANY PRIVATE COMPANY (AND YOUR PERSONAL PC IN YOUR HOME) TO FORCE BACKDOORS INTO THEIR SYSTEMS, WHERE PREVIOUSLY THERE MAY HAVE BEEN NONE THAT WERE EXPLOITABLE BY THE GOVT.  THIS WILL ELIMINATE ANY ESCAPE FROM GOVT. INTRUSION, AND BACKDOOR ACCESS INTO ANY SYSTEM, AND MAKE USE OF ANY FREEDOM PROMOTING OPERATING SYSTEMS ILLEGAL.

AN EXAMPLE OF HOW THEY CAN DESIGNATE ALL HOME COMPUTERS AS "CRITICAL INFRASTRUCTURE" IS PROPAGANDIZE ON MSM THAT A BUNCH OF BOTNETS OR PERSONAL COMPUTERS WERE RESPONSIBLE FOR DISRUPTING GOVERNMENT SYSTEMS, OR SHUTTING DOWN A BANK (THAT ANGLE HAS ALREADY BEEN PSYOP'D TO THE PUBLIC BECAUSE IT FITS IN AS A CONVENIENT TRUMP CARD DUE TO THE MANUFACTURED ECONOMIC CRISIS).

(7) National compliance standards for all software-

                  (A) PROTOCOL- The Institute shall establish a standard
                  testing and accreditation protocol for software built
                  by or for the Federal Government, its contractors, and
                  grantees, and private sector owned critical
                  infrastructure information systems and networks. to
                  ensure that it--

                        (i) meets the software security standards of
                        paragraph (2); and

                        (ii) does not require or cause any changes to be
                        made in the standard configurations described in
                        paragraph (4).

THIS MAY VERY WELL MAKE IT UNPROFITABLE FOR ANYONE OTHER THAN NWO FUNDED SOFTWARE COMPANIES FROM MAKING SOFTWARE.  ANOTHER WAY OF CREATING A MONOPOLY/CORNERING THE MARKET BY MAKING IT TOO EXPENSIVE FOR SMALL COMPANIES TO COMPLY WITH SUCH TYRANNICAL BULLSHIT.

(b) CRITERIA FOR STANDARDS- Notwithstanding any other provision of
      law (including any Executive Order), rule, regulation, or
      guideline, in establishing standards under this section, the
      Institute shall disregard the designation of an information system
      or network as a national security system or on the basis of
      presence of classified or confidential information, and shall
      establish standards based on risk profiles.

THIS MEANS THAT EVERY SINGLE COMPUTER AND THE ENTIRE INTERNET IS CONSIDERED AS BEING DIRECTLY PART OF THE DOD, EVERYTHING IS THE PROPERTY OF THE GOVERNMENT, AND YOU HAVE ZERO RIGHTS, AND ZERO FREEDOM WITH RESPECT TO THE USE OF YOUR OWN PC IN YOUR HOME.

(2) shall require each Federal agency, and each operator of
            an information system or network designated by the President
            as a critical infrastructure information system or network,
            periodically to demonstrate compliance with the standards
            established under this section.

THIS ALLOWS THE GOVERNMENT TO FORCE THEMSELVES DIRECTLY INTO YOUR HOME TO INSPECT YOUR COMPUTER TO MAKE SURE THAT YOU ARE COMPLYING WITH THE NWO'S BULLSHIT ENSLAVEMENT DIRECTIVES.  IT IS LIKE APPLYING MAXIMUM LEVEL SEX OFFENDER REGISTRATION MONITORING TO THE VERY USE OF ANY COMPUTER IN YOUR OWN HOME.  BILDERBERG/CSIS/CFR/NCOIC WILL ORDER THE PRESIDENT TO DECLARE *EVERYTHING* AS "CRITICAL INFRASTRUCTURE".

THERE WILL NOT BE ANY COMPUTER, NETWORK, OR INTERNET CONNECTED DEVICE THAT WILL BE EXEMPT FROM BEING DESIGNATED AS SUCH.  THEIR VERBIAGE IN THIS REGARD IS A COMPLETE PYSOP, SUGGESTING THAT "DON'T WORRY, YOUR COMPUTER OR NETWORK MIGHT NOT BE DESIGNATED AS SUCH, AND YOU MIGHT NOT HAVE TO WORRY ABOUT IT."  --BULLSHIT, IT *WILL* BE FORCED ON EVERYONE.


e) FCC NATIONAL BROADBAND PLAN- In developing the national
      broadband plan pursuant to section 6001(k) of the American
      Recovery and Reinvestment Act of 2009, the Federal Communications
      Commission shall report on the most effective and efficient means
      to ensure the cybersecurity of commercial broadband networks, including consideration of consumer education and outreach
      programs.

THIS MEANS FULL IMPLEMENTATION OF IPV6, FULL IMPLEMENTATION OF RBAC ENSLAVEMENT ON A PER PERSON BASIS/BIOMETRIC LOGON AUTHENTICATED INTO A GLOBAL ENTERPRISE ARCHITECTURE WHERE YOU WILL HAVE ZERO FREEDOM AND YOU MIGHT AS WELL NOT USE THE INTERNET PERIOD BECAUSE IT WILL BE COMPLETELY USELESS.

SEC. 10. PROMOTING CYBERSECURITY AWARENESS.

      The Secretary of Commerce shall develop and implement a national
      cybersecurity awareness campaign that-


            (1) is designed to heighten public awareness of
            cybersecurity issues and concerns;

            (2) communicates the Federal Government’s role in securing
            the Internet and protecting privacy and civil liberties with
            respect to Internet-related activities; and

            (3) utilizes public and private sector means of providing
            information to the public, including public service
            announcements.

THIS IS ABOUT USING FULL SPECTRUM PSYOPS TO ONCE AGAIN PULL THE PUBLIC INTO THE ILLEGITIMATE NATIONAL SECURITY STATE PARADIGM--APPLYING THE SAME BULLSHIT ABOUT "GOING GREEN" (COMMUNISM) TO THE INTERNET.  THE GOVT. IS GOING TO TRY TO FORCE YOU TO BE CONCERNED ABOUT WHAT THEY WANT YOU TO BE CONCERNED ABOUT AS IF ANYTHING THEY TELL YOU IS EVEN REMOTELY A REAL THREAT.

SEC. 11. FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT.

      (a) FUNDAMENTAL CYBERSECURITY RESEARCH


(5) How to build new protocols to enable the Internet to
            have robust security as one of its key capabilities.

THIS IS IPV6, TOTAL ENSLAVEMENT.  IPV6 WILL RUN THE CASHLESS MONETARY SYSTEM, IT WILL ENABLE THE UNITED NATIONS TO DELINEATE "RIGHTS" TO YOU OR REVOKE THEM AT WILL, DYNAMICALLY IN REAL TIME, DEPENDING ON "HOW GOOD OF A SLAVE" YOU ARE IN THE GLOBAL CORPORATIST FEUDALIST PRISON PLANET.  IPV6 WILL ENABLE TOTAL COHERENCY FOR GLOBAL AUTONOMOUS ROBOTIC AI SYSTEMS, SURVEILLANCE/WEAPONS GRIDS, AREA DENIAL, ANTI-ACCESS (I.E. BLOCKING YOU FROM TRAVEL).

SEC. 23. DEFINITIONS.

      In this Act:

            (1) ADVISORY PANEL- The term ‘Advisory Panel’ means the
            Cybersecurity Advisory Panel established or designated under
            section 3.

            (2) CYBER- The term ‘cyber’ means--

                  (A) any process, program, or protocol relating to the
                  use of the Internet or an intranet, automatic data
                  processing or transmission, or telecommunication via
                  the Internet or an intranet; and
                  (B) any matter relating to, or involving the use of,
                  computers or computer networks.

THIS MEANS THAT SIMPLY USING A COMPUTER FOR ANYTHING WHATSOEVER, OR EVEN OWNING A COMPUTER, WHETHER YOU EVEN USE IT OR NOT, AND WHETHER ARE ON THE INTERNET OR NOT, STILL FULLY PUT YOU UNDER SUBJECTION OF THE TOTAL TYRANNY OF THIS BILL, FORCED INTO THE UNCONSTIUTIONAL, HIGH TREASON, AND PSYOP OF "NATIONAL SECURITY", AND (IN THEIR CONTEXT) "CYBERSECURITY".  "CYBERSECURITY" AS USED IN THIS BILL MEANS:  "WE f**kING OWN ALL DIGITAL DATA AND ALL COMPUTER TECHNOLOGY AND WE CAN COME IN YOUR HOUSE AND INSPECT YOUR SHIT, AND FINE YOU, TAKE YOU TO PRISON, OR SHOOT YOU DEAD FOR FAILING TO COMPLY WITH US.

(3) FEDERAL GOVERNMENT AND UNITED STATES CRITICAL
            INFRASTRUCTURE INFORMATION SYSTEMS AND NETWORKS- The term
            ‘Federal Government and United States critical
            infrastructure information systems and networks’
            includes--

                  (A) Federal Government information systems and
                  networks; and
                  (B) State, local, and nongovernmental information
                  systems and networks in the United States designated
                  by the President as critical infrastructure
                  information systems and networks.

ONCE AGAIN, *EVERYTHING* THAT FACILITATES FREEDOM IN ANY WAY, SHAPE, OR FORM--WILL BE DESIGNATED AS "CRITICAL INFRASTRUCTURE", SO THAT THEY CAN REMOVE THAT FREEDOM FROM YOU.  THIS IS BEING IMPLEMENTED REGARDLESS OF THE EXISTENCE OF THIS BILL, REGARDLESS IF IT HAS NOT OR DOES NOT PASS.  THE BILL MEANS NOTHING BECAUSE THE CONTENTS OF IT, AND WORSE, WILL BE IMPLEMENTED BY FIAT BY THE CSIS/NCOIC.  IF THEY PULL THIS OFF, EVERYONE WILL DIE OR BE TOTALLY ENSLAVED FOR THE REST OF YOUR LIFE.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: SUPREMEMASTER October 05, 2009, 04:10:59 AM
Anti_Illuminati, how do you really feel?   ;)

I hear you!  It seems that there are too many people in all the media (including Alex), that are not taking seriously what you and now, thanks to you many of us know, what is truly going on and how TPTB is executing their plan.  

My question to you is, how will we know (aside from the internet going down) that the DOD is teleworking?   I know that COG is already in place and all of that has been set for quite some time already.

For you two newbies, I highly recommend you read Anti_Illuminatis other posts and read and read.

Everyone can take the following for what it is worth:

Delta Force Colonel gets off secure communications link call to General in Northern Command:

Delta Force Colonel:  "They're coming, and they said they're going to deliver a Christmas present to the American People."

Delta Force Colonel:  "The virus is a 2 part virus, the vaccine is 1 part of the virus, it is an RNA recombinant."

Delta Force Colonel:  "They are preparing to round up the blue list (patriots) and put them in FEMA camps.  The military is on the red list and they will be ordered to assist in the roundup and takeover, or they will be killed."

Former Bio Weapons scientist from Ft. Detrik, M.D. (name withheld to protect family):  "The swine flu was reverse engineered from the 1918 super flu virus, and the vaccine is 1 part of the virus."

Those are from real life personal sources relayed to me directly. They line up with Dr. Horowitz, Dr A. True Ott, and many others.

Maybe you should take a look at this as well:

http://forum.prisonplanet.com/index.php?topic=136811.msg822696#msg822696

With that thread, it makes sense of the cryptic email I got from a usually jovial dude.  

BTW, I quit my job because they went to an AI program that monitors customers viewing habits and financial records addresses etc.

If you don't mind me asking, the second, third, and forth lines of red text were an actual conversation?
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Anti_Illuminati October 05, 2009, 11:44:57 AM
Everyone can take the following for what it is worth:

Delta Force Colonel gets off secure communications link call to General in Northern Command:

Delta Force Colonel:  "They're coming, and they said they're going to deliver a Christmas present to the American People."

Delta Force Colonel:  "The virus is a 2 part virus, the vaccine is 1 part of the virus, it is an RNA recombinant."

Delta Force Colonel:  "They are preparing to round up the blue list (patriots) and put them in FEMA camps.  The military is on the red list and they will be ordered to assist in the roundup and takeover, or they will be killed."

Former Bio Weapons scientist from Ft. Detrik, M.D. (name withheld to protect family):  "The swine flu was reverse engineered from the 1918 super flu virus, and the vaccine is 1 part of the virus."

Those are from real life personal sources relayed to me directly. They line up with Dr. Horowitz, Dr A. True Ott, and many others.

Maybe you should take a look at this as well:

http://forum.prisonplanet.com/index.php?topic=136811.msg822696#msg822696


With that thread, it makes sense of the cryptic email I got from a usually jovial dude.  

BTW, I quit my job because they went to an AI program that monitors customers viewing habits and financial records addresses etc.


If you don't mind me asking, the second, third, and forth lines of red text were an actual conversation?

Yes, it was an actual conversation.
_________________________________________________________
(http://graphics8.nytimes.com/images/2008/04/09/timestopics/rockefeller_190.jpg)(http://msnbcmedia1.msn.com/j/msnbc/Components/Photo_StoryLevel/080129/080129-gene-renuart-hmed-6p.standard.jpg)
"These people are waking up too fast, they've already exposed our cyber false flag terror intentions with official documents, and exposed them on the air to millions already, DAMMIT!"
(http://www.advancedtrantech.com/images/clients/logos/saic_logo.gif)(http://www.advancedtrantech.com/images/clients/logos/bah_logo.gif)(http://www.advancedtrantech.com/images/clients/logos/DISA_logo.PNG)

http://armyconference.org/ACAS2003CD/ACAS2003/CioppaThomas/Cioppa1.pdf

(http://i574.photobucket.com/albums/ss186/Nunkadunka/Cioppa1.jpg?t=1254726978)
(http://i574.photobucket.com/albums/ss186/Nunkadunka/Cioppa1a.jpg?t=1254755841)
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Outer Haven October 05, 2009, 01:57:18 PM
Yes, it was an actual conversation.
WHAT IN THE CRAP?!
How do you know it's real???
http://armyconference.org/ACAS2003CD/ACAS2003/CioppaThomas/Cioppa1.pdf
What the hell is that?! Al-Qaeda wants to poison our water!!! NOOOOOOOO!!!
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: luckee1 October 06, 2009, 12:33:37 AM
O.H.  When ever the U.S. Gov claims Bin Laden or Sadam has done or will do  anything, it means our country has already implemented it on our country.  The best paid hackers out there are employed by uncle sam.  Water poisoning has been going on for a long time.

themarla has been posting tons of water tampering evidence just for her area, Fresno.
http://forum.prisonplanet.com/index.php?topic=117072.msg723960#msg723960

: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 06, 2009, 01:30:53 PM

http://armyconference.org/ACAS2003CD/ACAS2003/CioppaThomas/Cioppa1.pdf

(http://i574.photobucket.com/albums/ss186/Nunkadunka/Cioppa1.jpg?t=1254726978)

This pdf file has what seems to be the complete roadmap for how to take over the infrastructure (delivered as if to the 'terrorists' out there.. but in fact is probably the blueprint for the next false flag... Some slides that I thought were particularly revealing...


Page 12: Where WE THE PEOPLE are vulnerable to False Flags...
(http://i612.photobucket.com/albums/tt201/Pilikia_photos/Infrastructures.png)

Page 17: The Government agencies running infrastructure: (Or, "Why PTech was needed to ensure a successful outcome in the face of many potential observable situations - the sofware AI works better than the brain. See: 911 False Flag.)

(http://i612.photobucket.com/albums/tt201/Pilikia_photos/KeyFunctions.png)

Page 19:
(http://i612.photobucket.com/albums/tt201/Pilikia_photos/Tasklist.png)

Page 21:
(http://i612.photobucket.com/albums/tt201/Pilikia_photos/MAP.png)

Page 25: PROBLEM...(Be AFRAID)....
(http://i612.photobucket.com/albums/tt201/Pilikia_photos/Attacks-1995.png)

Page 30
:
(http://i612.photobucket.com/albums/tt201/Pilikia_photos/Two-forms-attack.png)

Page 66:

(http://i612.photobucket.com/albums/tt201/Pilikia_photos/fascistwetdream.png)

              ANY
(http://i612.photobucket.com/albums/tt201/Pilikia_photos/anyquestions.png)







: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Dig October 06, 2009, 02:09:46 PM
Woweeee, shared situational awareness before 9/11/2001:

Look at how much it has to do with AVIATION!!!!!!!!!!!!

The entire Bibliography is like a must read for any super elite wishing to pull of a 9/11 like attack. Amazing most of the referenced material was all written before 9/11 but had very important 9/11 type information.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Situation awareness
http://en.wikipedia.org/wiki/Situation_awareness

Situation awareness, or SA, is the perception of environmental elements within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future. It is also a field of study concerned with perception of the environment critical to decision-makers in complex, dynamic areas from aviation, air traffic control, power plant operations, military command and control — to more ordinary but nevertheless complex tasks such as driving an automobile or motorcycle.

Situation awareness (SA) involves being aware of what is happening around you to understand how information, events, and your own actions will impact your goals and objectives, both now and in the near future. Lacking SA or having inadequate SA has been identified as one of the primary factors in accidents attributed to human error (e.g., Hartel, Smith, & Prince, 1991; Merket, Bergondy, & Cuevas-Mesa, 1997; Nullmeyer, Stella, Montijo, & Harden, 2005). Thus, SA is especially important in work domains where the information flow can be quite high and poor decisions may lead to serious consequences (e.g., piloting an airplane, functioning as a soldier, or treating critically ill or injured patients).

Having complete, accurate and up-to-the-minute SA is essential where technological and situational complexity on the human decision-maker are a concern. SA has been recognized as a critical, yet often elusive, foundation for successful decision-making across a broad range of complex and dynamic systems, including aviation and air traffic control (e.g., Nullmeyer, Stella, Montijo, & Harden 2005), emergency response and military command and control operations (e.g., Blandford & Wong 2004; Gorman, Cooke, & Winner 2006), and offshore oil and nuclear power plant management (e.g., Flin & O’Connor, 2001).
[edit]
Etymology

Although numerous definitions of SA have been proposed, Endsley’s definition (1995b), "the perception of elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future," is firmly established and widely accepted. While some definitions are specific to the environment from which they were adapted, Endsley’s definition is applicable across multiple task domains. Several other definitions of SA have been suggested, generally restating the same themes:
“accessibility of a comprehensive and coherent situation representation which is continuously being updated in accordance with the results of recurrent situation assessments” (Sarter & Woods, 1991)
"the combining of new information with existing knowledge in working memory and the development of a composite picture of the situation along with projections of future status and subsequent decisions as to appropriate courses of action to take" (Fracker, 1991b)
"the continuous extraction of environmental information along with integration of this information with previous knowledge to form a coherent mental picture, and the end use of that mental picture in directing further perception and anticipating future need" (Dominguez, Vidulich, Vogel, & McMillan, 1994)
"adaptive, externally-directed consciousness that has as its products knowledge about a dynamic task environment and directed action within that environment” (Smith & Hancock, 1995)
"the ability to maintain a constant, clear mental picture of relevant information and the tactical situation including friendly and threat situations as well as terrain" (Dostal, 2007)
SA is simply “knowing what is going on so you can figure out what to do” (Adam, 1993)
“what you need to know not to be surprised” (Jeannot, Kelly, & Thompson, 2003)
The term SA "is a shorthand description for "keeping track of what is going on around you in a complex, dynamic environment" (Moray, 2005, p. 4)
The "aim of efficient SA is to keep the operator tightly coupled to the dynamics of the environment" (Moray, 2005, p. 4)
[edit]
History

Although the term itself is fairly recent, the concept has roots in the history of military theory—it is recognizable in Sun Tzu's Art of War, for instance. The term itself, can be traced also to World War I, where it was recognized as a crucial component for crews in military aircraft (Press, 1986).

Before being widely adopted by human factors scientists in the 1990s, the term was first used by United States Air Force (USAF) fighter aircrew returning from war in Korea and Vietnam (see Watts, 2004). They identified having good SA as the decisive factor in air-to-air combat engagements—the "ace factor" (Spick, 1988). Survival in a dogfight was typically a matter of observing the opponent's current move and anticipating his next move a fraction of a second before he could observe and anticipate one's own. USAF pilots also came to equate SA with the "observe" and "orient" phases of the famous observe-orient-decide-act loop (OODA Loop) or Boyd cycle, as described by the USAF fighter ace and war theorist Col. John Boyd. In combat, the winning strategy is to "get inside" your opponent’s OODA loop, not just by making your own decisions quicker, but also by having better SA than the opponent, and even changing the situation in ways that the opponent cannot monitor or even comprehend. Losing one's own SA, in contrast, equates to being "out of the loop."

Clearly, SA has far reaching application as it is needed for individuals and teams to function effectively in their environment. Thus, we are beginning to see SA going beyond the field of aviation and work being conducted in a wide variety of domains. Currently, the study of SA is now being examined in such diverse areas as air traffic control, nuclear power plant operation, vehicle operation and anesthesiology (Endsley, 1995b; Gaba, Howard & Small, 1995; Collier & Follesf, 1995; Bolstad, 2000, Sollenberger & Stein, 1995).
[edit]
Related concepts

Several cognitive processes related to situation awareness are briefly described in this section. The matrix shown below attempts to illustrate the relationship among some of these concepts [1]. Note that situation awareness and situation assessment are more commonly discussed in complex domains such as aviation and military operations and relate more to achieving immediate tactical objectives. Sensemaking and achieving understanding are more commonly found in industry and the organizational psychology literature and often relate to achieving long-term strategic objectives.   Phase
Process   Outcome
Objective   Tactical (short-term)   situation assessment   situation awareness
Strategic (long-term)   sensemaking   understanding

[edit]
Situational understanding

Situation awareness is sometimes confused with the term “situational understanding.” In the context of military command and control applications, situational understanding refers to the "product of applying analysis and judgment to the unit's situational awareness to determine the relationships of the factors present and form logical conclusions concerning threats to the force or mission accomplishment, opportunities for mission accomplishment, and gaps in information" (Dostal, 2007). Situational understanding is the same as Level 2 SA in the Endsley model — the comprehension of the meaning of the information as integrated with each other and in terms of the individual’s goals. It is the “so what” of the data that is perceived.
[edit]
Situation assessment

Endsley (1995b, p. 36) argues that “it is important to distinguish the term situation awareness, as a state of knowledge, from the processes used to achieve that state. These processes, which may vary widely among individuals and contexts, will be referred to as situation assessment or the process of achieving, acquiring, or maintaining SA.” Thus, in brief, situation awareness is viewed as "a state of knowledge," and situation assessment as "the processes” used to achieve that knowledge. Note that SA is not only produced by the processes of situation assessment, it also drives those same processes in a recurrent fashion. For example, one’s current awareness can determine what one pays attention to next and how one interprets the information perceived (Endsley, 2000).
[edit]
Mental models

Accurate mental models are one of the prerequisites for achieving SA (Endsley & Jones, 1997; Sarter & Woods, 1991). A mental model can be described as a set of well-defined, highly-organized yet dynamic knowledge structures developed over time from experience (Glaser, 1989; Kozlowski, 1998). The volume of available data inherent in complex operational environments can overwhelm the capability of novice decision makers to attend, process, and integrate this information efficiently, resulting in information overload and negatively impacting their SA (Endsley, 1997). In contrast, experienced decision makers assess and interpret the current situation (Level 1 and 2 SA) and select an appropriate action based on conceptual patterns stored in their long-term memory as ‘mental models’ (Serfaty, MacMillan, Entin, & Entin, 1997). Cues in the environment activate these mental models, which in turn guide their decision making process.
[edit]
Sensemaking

Klein, Moon, and Hoffman (2006) distinguish between situation awareness and sensemaking as follows:

“...situation awareness is about the knowledge state that’s achieved—either knowledge of current data elements, or inferences drawn from these data, or predictions that can be made using these inferences (Endsley, 1995b). In contrast, sensemaking is about the process of achieving these kinds of outcomes, the strategies, and the barriers encountered.” (p. 71)

In brief, sensemaking is viewed more as “a motivated, continuous effort to understand connections (which can be among people, places, and events) in order to anticipate their trajectories and act effectively” (Klein et al., 2006, p. 71) rather than the state of knowledge underlying situation awareness. Endsley (2004) points out that as an effortful process, sensemaking is actually considering a subset of the processes used to maintain situation awareness. In the vast majority of the cases, SA is instantaneous and effortless, proceeding from pattern recognition of key factors in the environment – “The speed of operations in activities such as sports, driving, flying and air traffic control practically prohibits such conscious deliberation in the majority of cases, but rather reserves it for the exceptions.” Endsley (2004) also points out that sensemaking is backward focused, forming reasons for past events, while situation awareness is typically forward looking, projecting what is likely to happen in order to inform effective decision processes.
[edit]
Theoretical model of situation awareness

The most common theoretical framework of SA is provided by Dr. Mica Endsley (1995b). Endsley’s model illustrates three stages or steps of SA formation: perception, comprehension, and projection.

Perception (Level 1 SA): The first step in achieving SA is to perceive the status, attributes, and dynamics of relevant elements in the environment. Thus, Level 1 SA, the most basic level of SA, involves the processes of monitoring, cue detection, and simple recognition, which lead to an awareness of multiple situational elements (objects, events, people, systems, environmental factors) and their current states (locations, conditions, modes, actions).

Comprehension (Level 2 SA): The next step in SA formation involves a synthesis of disjointed Level 1 SA elements through the processes of pattern recognition, interpretation, and evaluation. Level 2 SA requires integrating this information to understand how it will impact upon the individual’s goals and objectives. This includes developing a comprehensive picture of the world, or of that portion of the world of concern to the individual.

Projection (Level 3 SA): The third and highest level of SA involves the ability to project the future actions of the elements in the environment. Level 3 SA is achieved through knowledge of the status and dynamics of the elements and comprehension of the situation (Levels 1 and 2 SA), and then extrapolating this information forward in time to determine how it will affect future states of the operational environment.

Endsley’s model of SA (see Figure 1 below) also illustrates several variables that can influence the development and maintenance of SA, including individual, task, and environmental factors. For example, individuals vary in their ability to acquire SA; thus, simply providing the same system and training will not ensure similar SA across different individuals. Endsley’s model shows how SA “provides the primary basis for subsequent decision making and performance in the operation of complex, dynamic systems” (Endsley, 1995a, p. 65). Although alone it cannot guarantee successful decision making, SA does support the necessary input processes (e.g., cue recognition, situation assessment, prediction) upon which good decisions are based (Artman, 2000).

SA also involves both a temporal and a spatial component. Time is an important concept in SA, as SA is a dynamic construct, changing at a tempo dictated by the actions of individuals, task characteristics, and the surrounding environment. As new inputs enter the system, the individual incorporates them into this mental representation, making changes as necessary in plans and actions in order to achieve the desired goals. SA also involves spatial knowledge about the activities and events occurring in a specific location of interest to the individual. Thus, the concept of SA includes perception, comprehension, and projection of situational information, as well as temporal and spatial components.



Figure 1. Endsley's model of situation awareness (adapted from Endsley, 1995b).

In summary, the model consists of several key factors:
Perception, comprehension, and projection as three levels of SA,
The role of goals and goal directed processing in directing attention and interpreting the significance of perceived information,
The role of information salience in “grabbing” attention in a data-driven fashion, and the importance of alternating goal-driven and data-driven processing,
The role of expectations (fed by the current model of the situation and by long-term memory stores) in directing attention and interpreting information,
The heavy demands on limited working memory restricting SA for novices and for those in novel situations, but the tremendous advantages of mental models and pattern matching to prototypical schema that largely circumvent these limits,
The use of mental models for providing a means for integrating different bits of information and comprehending its meaning (relevant to goals) and for allowing people to make useful projections of likely future events and states,
Pattern matching to schema - prototypical states of the mental model – that provides rapid retrieval of comprehension and projection relevant to the recognized situation and in many cases single-step retrieval of appropriate actions for the situation.

For a more complete description of the model, see Endsley (1995b) and Endsley (2004). See also Endsley (2000) for a review of other models of SA.
[edit]
Situation awareness in team operations

In many systems and organizations, people work not just as individuals, but as members of a team. Thus, it is necessary to consider the SA of not just individual team members, but also the SA of the team as a whole. To begin to understand what is needed for SA within teams, it is first necessary to clearly define what constitutes a team. A team is not just any group of individuals; rather teams have a few defining characteristics. As defined by Salas et al. (1992), a team is:

"a distinguishable set of two or more people who interact dynamically, interdependently and adaptively toward a common and valued goal/objective/mission, who have each been assigned specific roles or functions to perform, and who have a limited life span of membership."
[edit]
Team SA

Team SA is defined as “the degree to which every team member possesses the SA required for his or her responsibilities” (Endsley, 1995b, p. 39; see also Endsley, 1989). The success or failure of a team depends on the success or failure of each of its team members. If any one of the team members has poor SA, it can lead to a critical error in performance that can undermine the success of the entire team. By this definition, each team member needs to have a high level of SA on those factors that are relevant for his or her job. It is not sufficient for one member of the team to be aware of critical information if the team member who needs that information is not aware.

In a team, each member has a subgoal pertinent to his/her specific role that feeds into the overall team goal. Associated with each member's subgoal are a set of SA elements about which he/she is concerned. Team SA, therefore, can be represented as shown in Figure 2. As the members of a team are essentially interdependent in meeting the overall team goal, some overlap between each member’s subgoal and their SA requirements will be present. It is this subset of information that constitutes much of team coordination. That coordination may occur as a verbal exchange, a duplication of displayed information, or by some other means.



Figure 2. Team SA can be determined by examining the goals and SA requirements of all team members (adapted from Endsley & Jones, 1997, 2001).
[edit]
Shared SA

Shared situation awareness can be defined as "the degree to which team members possess the same SA on shared SA requirements" (Endsley & Jones, 1997, p. 47; 2001, p. 48). As implied by this definition, there are information requirements that are relevant to multiple team members. A major part of teamwork involves the area where these SA requirements overlap — the shared SA requirements that exist as a function of the essential interdependency of the team members. In a poorly functioning team, two or more members may have different assessments on these shared SA requirements and thus behave in an uncoordinated or even counter-productive fashion. Yet in a smoothly functioning team, each team member shares a common understanding of what is happening on those SA elements that are common — shared SA. Thus, shared SA refers to the overlap between the SA requirements of the team members, as presented in Figure 3. As depicted by the clear areas of the figure, not all information needs to be shared. Clearly, each team member is aware of much that is not pertinent to the others on the team. Sharing every detail of each person's job would only create a great deal of “noise” to sort through to get needed information. It is only that information which is relevant to the SA requirements of each team member that is needed.



Figure 3. Shared SA Requirements (adapted from Endsley & Jones, 1997; 2001).
[edit]
Team SA model

The situation awareness of the team as a whole, therefore, is dependent upon both (1) a high level of SA among individual team members for the aspects of the situation necessary for their job; and (2) a high level of shared SA between team members, providing an accurate common operating picture of those aspects of the situation common to the needs of each member (Endsley & Jones, 2001). Endsley and Jones (1997; 2001) describe a model of team situation awareness as a means of conceptualizing how teams develop high levels of shared SA across members (see Figure 4). Each of these four factors — requirements, devices, mechanisms and processes — act to help build team and shared SA.



Figure 4. Model of team situation awareness (adapted from Endsley & Jones, 2001).

1. Team SA Requirements - the degree to which the team members know which information needs to be shared, including their higher level assessments and projections (which are usually not otherwise available to fellow team members), and information on team members' task status and current capabilities.

2. Team SA Devices - the devices available for sharing this information, which can include direct communication (both verbal and non-verbal), shared displays (e.g., visual or audio displays, or tactile devices), or a shared environment. As non-verbal communication, such as gestures and display of local artifacts, and a shared environment are usually not available in distributed teams, this places far more emphasis on verbal communication and communication technologies for creating shared information displays.

3. Team SA Mechanisms - the degree to which team members possess mechanisms, such as shared mental models, which support their ability to interpret information in the same way and make accurate projections regarding each other's actions. The possession of shared mental models can greatly facilitate communication and coordination in team settings.

4. Team SA Processes - the degree to which team members engage in effective processes for sharing SA information which may include a group norm of questioning assumptions, checking each other for conflicting information or perceptions, setting up coordination and prioritization of tasks, and establishing contingency planning among others.
[edit]
Measurement of situation awareness

While the SA construct has been widely researched, the multivariate nature of SA poses a considerable challenge to its quantification and measurement (for a detailed discussion on SA measurement, see Endsley & Garland, 2000; Fracker, 1991a; 1991b). In general, techniques vary in terms of direct measurement of SA (e.g., objective real-time probes or subjective questionnaires assessing perceived SA) or methods that infer SA based on operator behavior or performance. Direct measures are typically considered to be ‘product-oriented’ in that these techniques assess an SA outcome; inferred measures are considered to be ‘process-oriented,’ focusing on the underlying processes or mechanisms required to achieve SA (Graham & Matthews, 2000). These SA measurement approaches are further described next.
[edit]
Objective measures of SA

Objective measures directly assess SA by comparing an individual’s perceptions of the situation or environment to some ‘ground truth’ reality. Specifically, objective measures collect data from the individual on his or her perceptions of the situation and compare them to what is actually happening to score the accuracy of their SA at a given moment in time. Thus, this type of assessment provides a direct measure of SA and does not require operators or observers to make judgments about situational knowledge on the basis of incomplete information. Objective measures can be gathered in one of three ways: real-time as the task is completed (e.g., "real-time probes" presented as open questions embedded as verbal communications during the task – Jones & Endsley, 2000), during an interruption in task performance (e.g., Situation Awareness Global Assessment Technique (SAGAT) – Endsley, 1995a , or the WOMBAT Situational Awareness and Stress Tolerance Test mostly used in aviation since the late 1980s), or post-test following completion of the task.
[edit]
Subjective measures of SA

Subjective measures directly assess SA by asking individuals to rate their own or the observed SA of individuals on an anchored scale (e.g., Participant Situation Awareness Questionnaire (PSAQ) – Strater, Endsley, Pleban, & Matthews, 2001; the Situation Awareness Rating Technique (SART) – Taylor, 1989). Subjective measures of SA are attractive in that they are relatively straightforward and easy to administer. However, several limitations should be noted. Individuals making subjective assessments of their own SA are often unaware of information they do not know (the "unknown unknowns"). Subjective measures also tend to be global in nature, and, as such, do not fully exploit the multivariate nature of SA to provide the detailed diagnostics available with objective measures. Nevertheless, self-ratings may be useful in that they can provide an assessment of operators’ degree of confidence in their SA and their own performance. Measuring how SA is perceived by the operator may provide information as important as the operator's actual SA, since errors in perceived SA quality (over-confidence or under-confidence in SA) may have just as harmful an effect on an individual's or team's decision-making as errors in their actual SA (Endsley, 1998).

Subjective estimates of an individual’s SA may also be made by experienced observers (e.g., peers, commanders, or trained external experts). These observer ratings may be somewhat superior to self-ratings of SA because more information about the true state of the environment is usually available to the observer than to the operator, who may be focused on performing the task (i.e., trained observers may have more complete knowledge of the situation). However, observers have only limited knowledge about the operator’s concept of the situation and cannot have complete insight into the mental state of the individual being evaluated. Thus, observers are forced to rely more on operators’ observable actions and verbalizations in order to infer their level of SA. In this case, such actions and verbalizations are best assessed using performance and behavioral measures of SA, as described next.
[edit]
Performance and behavioral measures of SA

Performance measures ‘infer’ SA from the end result (i.e., task performance outcomes), based on the assumption that better performance indicates better SA. Common performance metrics include quantity of output or productivity level, time to perform the task or respond to an event, and the accuracy of the response or, conversely, the number of errors committed. The main advantage of performance measures is that these can be collected objectively and without disrupting task performance. However, although evidence exists to suggest a positive relation between SA and performance, this connection is probabilistic and not always direct and unequivocal (Endsley, 1995b). In other words, good SA does not always lead to good performance and poor SA does not always lead to poor performance (Endsley, 1990). Thus, performance measures should be used in conjunction with others measures of SA that directly assess this construct.

Behavioral measures also ‘infer’ SA from the actions that individuals choose to take, based on the assumption that good actions will follow from good SA and vice-versa. Behavioral measures rely primarily on observer ratings, and are, thus, somewhat subjective in nature. To address this limitation, observers can be asked to evaluate the degree to which individuals are carrying out actions and exhibiting behaviors that would be expected to promote the achievement of higher levels of SA (see, for example, the Situation Awareness Behaviorally Anchored Rating Scale (SABARS) – Matthews, Pleban, Endsley, & Strater, 2000; Strater et al., 2001). This approach removes some of the subjectivity associated with making judgments about an individual’s internal state of knowledge by allowing them to make judgments about SA indicators that are more readily observable.
[edit]
Process indices of SA

Process indices examine how individuals process information in their environment, such as by analyzing communication patterns between team members or using eye tracking devices. Team communication (particularly verbal communication) supports the knowledge building and information processing that leads to SA construction (Endsley & Jones, 1997). Thus, since SA may be distributed via communication, computational linguistics and machine learning techniques can be combined with natural language analytical techniques (e.g., Latent Semantic Analysis) to create models that draw on the verbal expressions of the team to predict SA and task performance (Bolstad, Cuevas, Gonzalez, & Schneider, 2005; Bolstad, Foltz, Franzke, Cuevas, Rosenstein, & Costello, 2007). Although evidence exists to support the utility of communication analysis for predicting team SA (Foltz, Bolstad, Cuevas, Franzke, Rosenstein, & Costello, in press), time constraints and technological limitations (e.g., cost and availability of speech recording systems and speech-to-text translation software) may make this approach less practical and viable in time-pressured, fast paced operations.

Psycho-physiological measures also serve as process indices of operator SA by providing an assessment of the relationship between human performance and a corrected change in the operator’s physiology (e.g., French, Clark, Pomeroy, Seymour, & Clarke, 2007). In other words, cognitive activity is associated with changes in the operator’s physiological states. For example, the operator’s overall functional state (as assessed using psycho-physiological measures, such as electroencephalographic (EEG) data, eyeblinks, and cardiac activity) may provide an indication as to whether the operator is sleep fatigued at one end of the continuum, or mentally overloaded at the other end (Wilson, 2000). Other psycho-physiological measures, such as event related potentials (ERP), event related desynchronization (ERD), transient heart rate (HR), and electrodermal activity (EDA), may be useful for evaluating an operator’s perception of critical environmental cues, that is, to determine if the operator has detected and perceived a task-relevant stimulus (Wilson, 2000). In addition, it is also possible to use psycho-physiological measures to monitor operators’ environmental expectancies, that is, their physiological responses to upcoming events, as a measure of their current level of SA (Wilson, 2000).
[edit]
Multi-faceted approach to SA measurement

The multivariate nature of SA significantly complicates its quantification and measurement, as it is conceivable that a metric may only tap into one aspect of the operator’s SA. Further, studies have shown that different types of SA measures do not always correlate strongly with each other (cf. Durso, Truitt, Hackworth, Crutchfield, Nikolic, Moertl, Ohrt, & Manning, 1995; Endsley, Selcon, Hardiman, & Croft, 1998; Vidulich, 2000). Accordingly, rather than rely on a single approach or metric, valid and reliable measurement of SA should utilize a battery of distinct yet related measures that complement each other (e.g., Harwood, Barnett, & Wickens, 1988). Such a multi-faced approach to SA measurement capitalizes on the strengths of each measure while minimizing the limitations inherent in each.
[edit]
Digital Situation Awareness

The current paradigm for Cyber Security is based on protection. Protection depends on identifying vulnerabilities and applying countermeasures to neutralize their effects. These are complex human based activities whose results are uncertain and not capable of according 100% assurance. While used with some effect for components, applications, and stand-alone systems, the paradigm of protection is insufficient for assuring systems of systems, such as, the nation’s critical infrastructure and DOD’s Global Information Grid. For systems of systems, the paradigm for Cyber Security must be based on resiliency. Resiliency is the ability to anticipate, avoid, withstand, minimize, and recover from the effects of adversity whether manmade or natural under all circumstances of use. The essential capabilities in composing, fielding, and operating resilient systems of systems are coordinated recovery time objectives, operation sensing and monitoring, digital situation awareness, distributed supervisory control, interoperability, and reconstitution of data and information.

The challenge lies in anticipating and avoiding the effects of adversity, and this depends on highly refined situation awareness. So it is in the area of operation sensing and monitoring that a game-changing innovation can be found. What is needed is to obtain digital situation awareness so as to anticipate cascade triggers in the critical infrastructure and deploy effective distributed supervisor control protocols that can avoid these triggers. Digital situation awareness can be derived from traffic flow and volume. The method envisioned to anticipate and avoid cascade triggers in the critical infrastructure is based on traffic flow and volume and is specified as follows: 1. Identify industry sectors of interest to cyber security resiliency 2. Identify each enterprise and organization in each industry sector of interest 3. Identify each computer system of interest in each enterprise and organization 4. Identify each I/O port on each machine of interest 5. Record traffic flow and volume on every port for every second of every day for up to twelve months 6. Using recorded traffic flow and volume, determine expected normal operation based on derived upper and lower control limits for varying time intervals 7. Using traffic flow and volume scenarios, derive operating protocols, such as, shutdown, switch to backup, and switch to a designated alternate mode, for use by intelligent middlemen charged with distributed supervisory control of critical infrastructure operations
[edit]
See also
Single pilot resource management
Air safety
Brownout (aviation)
Decision-making
Spatial disorientation
Situated cognition
Korean Air Lines Flight 007: ICAO reason for flight deviation
[edit]
References
^ S. M. Fiore, personal communication, November 6, 2007
FDSE's COP Page [1]
Adam, E. C. (1993). Fighter cockpits of the future. Proceedings of 12th IEEE/AIAA Digital Avionics Systems Conference (DASC), 318-323.
Artman, H. (2000). Team situation assessment and information distribution. Ergonomics, 43(8), 1111-1128.
Atherton, G., Situational Awareness: The Difference Between Life and Death for Corrections Officers, Corrections Connection Network News
Blandford, A. & Wong, W. (2004). Situation awareness in emergency medical dispatch. International Journal of Human–Computer Studies, 61, 421–452.
Bolstad, C. A. (2000). Age-related factors affecting the perception of essential information during risky driving situations. Paper presented at the Human Performance Situation Awareness and Automation: User-Centered Design for the New Millennium Conference, Savannah, GA.
Bolstad, C. A., Cuevas H. M., Gonzalez, C., & Schneider, M. (2005). Modeling shared situation awareness. Proceedings of the 14th Conference on Behavior Representation in Modeling and Simulation (BRIMS). Los Angeles, CA.
Bolstad, C. A., Foltz, P., Franzke, M., Cuevas, H. M., Rosenstein, M., & Costello, A. M. (2007). Predicting situation awareness from team communications. Proceedings of the 51st Annual Meeting of the Human Factors and Ergonomics Society. Santa Monica, CA: HFES.
Collier, S. G. & Follesf, K. (1995). SACRI: A measure of situation awareness for nuclear power plant control rooms. Proceedings of an International Conference: Experimental Analysis and Measurement of Situation Awareness (pp. 115–122). Daytona Beach, FL.
Dominguez, C., Vidulich, M., Vogel, E. & McMillan, G. (1994). Situation awareness: Papers and annotated bibliography. Armstrong Laboratory, Human System Center, ref. AL/CF-TR-1994-0085.
Dostal, B. C. (2007). Enhancing situational understanding through the employment of unmanned aerial vehicles. Army Transformation Taking Shape ...Interim Brigade Combat Team Newsletter, No. 01-18. Retrieved November 7, 2007, from http://www.globalsecurity.org/military/library/report/call/call_01-18_ch6.htm
Durso, F. T., Truitt, T. R., Hackworth, C. A., Crutchfield, J. M., Nikolic, D., Moertl, P. M., Ohrt, D., & Manning, C. A. (1995). Expertise and chess: A pilot study comparing situation awareness methodologies. In D.J. Garland & M.R. Endsley (Eds.), Experimental analysis and measurement of situation awareness (pp. 295–303). Daytona Beach, FL: Embry-Riddle Aeronautical University Press.
Endsley, M. R. (1988). Situation awareness global assessment technique (SAGAT). Proceedings of the National Aerospace and Electronics Conference (NAECON), 789-795. New York: IEEE.
Endsley, M. R. (1989). Final report: Situation awareness in an advanced strategic mission (No. NOR DOC 89-32). Hawthorne, CA: Northrop Corporation.
Endsley, M. R. (1990). Predictive utility of an objective measure of situation awareness. Proceedings of the Human Factors Society 34th Annual Meeting (pp. 41–45). Santa Monica, CA: Human Factors Society.
Endsley, M. R. (1995a). Measurement of situation awareness in dynamic systems. Human Factors, 37(1), 65-84.
Endsley, M. R. (1995b). Toward a theory of situation awareness in dynamic systems. Human Factors 37(1), 32-64.
Endsley, M. R. (1997). The role of situation awareness in naturalistic decision making. In Zsambok, C. E. & G. Klein (Eds.), Naturalistic decision making (pp. 269–283). Mahwah, NJ: LEA.
Endsley, M. R. (1998). A comparative analysis of SAGAT and SART for evaluations of situation awareness. In Proceedings of the Human Factors and Ergonomics Society 42nd Annual Meeting (pp. 82–86). Santa Monica, CA: The Human Factors and Ergonomics Society.
Endsley, M. R. (2000). Theoretical underpinnings of situation awareness: A critical review. In M. R. Endsley & D. J. Garland (Eds.), Situation awareness analysis and measurement. Mahwah, NJ: LEA.
Endsley, M. R. (2004). Situation awareness: Progress and directions. In S. Banbury & S. Tremblay (Eds.), A cognitive approach to situation awareness: Theory, measurement and application (pp. 317–341). Aldershot, UK: Ashgate Publishing.
Endsley, M. R. & Garland, D. J. (Eds.) (2000). Situation awareness analysis and measurement. Mahwah, NJ: Lawrence Erlbaum Associates.
Endsley, M. R. & Jones, W. M. (1997). Situation awareness, information dominance, and information warfare (No. AL/CF-TR-1997-0156). Wright-Patterson AFB, OH: United States Air Force Armstrong Laboratory.
Endsley, M. R., & Jones, W. M. (2001). A model of inter- and intrateam situation awareness: Implications for design, training and measurement. In M. McNeese, E. Salas & M. Endsley (Eds.), New trends in cooperative activities: Understanding system dynamics in complex environments. Santa Monica, CA: Human Factors and Ergonomics Society.
Endsley, M. R., Selcon, S. J., Hardiman, T. D., & Croft, D. G. (1998). A comparative evaluation of SAGAT and SART for evaluations of situation awareness. Proceedings of the Human Factors and Ergonomics Society Annual Meeting (pp. 82–86). Santa Monica, CA: Human Factors and Ergonomics Society. http://www.satechnologies.com/Papers/pdf/HFES98-SAGATvSART.pdf
Flin, R. & O’Connor, P. (2001). Applying crew resource management in offshore oil platforms. In E. Salas, C.A. Bowers, & E. Edens (Eds.), Improving teamwork in organization: Applications of resource management training (pp. 217–233). Hillsdale, NJ: Erlbaum.
Foltz, P. W., Bolstad, C. A., Cuevas, H. M., Franzke, M., Rosenstein, M., & Costello, A. M. (in press). Measuring situation awareness through automated communication analysis. To appear in M. Letsky, N. Warner, S. M. Fiore, & C. Smith (Eds.), Macrocognition in teams. Aldershot, England: Ashgate.
Fracker, M. L. (1991a). Measures of situation awareness: An experimental evaluation (Report No. AL-TR-1991-0127). Wright-Patterson Air Force Base, OH: Armstrong Laboratories.
Fracker, M. L. (1991b). Measures of situation awareness: Review and future directions (Report No. AL-TR-1991-0128). Wright-Patterson Air Force Base, OH: Armstrong Laboratories.
French, H.T., Clark, E., Pomeroy, D. Seymour, M. , & Clarke, C.R. (2007). Psycho-physiological Measures of Situation Awareness. In M. Cook, J. Noyes & Y. Masakowski (eds.), Decision Making in Complex Environments. London: Ashgate. ISBN 0 7546 4950 4.
Gaba, D. M., Howard, S. K., & Small, S. D. (1995). Situation awareness in anesthesiology. Human Factors, 37, 20-31.
Glaser, R. (1989). Expertise and learning: How do we think about instructional processes now that we have discovered knowledge structures? In D. Klahr & K. Kotovsky (Eds.), Complex information processing: The impact of Herbert A. Simon (pp. 269–282). Hillsdale, NJ: LEA.
Gorman, J. C. Cooke, N. J., & Winner, J. L. (2006). Measuring team situation awareness in decentralized command and control environments. Ergonomics, 49 (12-13), 1312–1325.
Graham, S. E. & Matthews, M. D. (2000). Modeling and measuring situation awareness. In J.H. Hiller & R. L. Wampler (Eds.), Workshop on assessing and measuring training performance effectiveness (Tech. Rep. 1116) (pp. 14–24). Alexandria, VA: U.S. Army Research Institute for the Behavioral and Social Sciences.
Hartel, C. E. J., Smith, K., & Prince, C. (1991, April). Defining aircrew coordination: Searching mishaps for meaning. Paper presented at the 6th International Symposium on Aviation Psychology, Columbus, OH.
Harwood, K., Barnett, B., & Wickens, C.D. (1988). Situational awareness: A conceptual and methodological framework. In F.E. McIntire (Ed.), Proceedings of the 11th Biennial Psychology in the Department of Defense Symposium (pp. 23–27). Colorado Springs, CO: U.S. Air Force Academy.
Jeannot, E., Kelly, C. & Thompson, D. (2003). The development of situation awareness measures in ATM systems. Brussels: Eurocontrol.
Jones, D. G. & Endsley, M. R. (2000). Examining the validity of real-time probes as a metric of situation awareness. Proceedings of the 14th Triennial Congress of the International Ergonomics Association and the 44th Annual Meeting of the Human Factors and Ergonomics Society. Santa Monica, CA: Human Factors and Ergonomics Society. http://www.satechnologies.com/Papers/pdf/HFES2000-probes.pdf
Klein, G., Moon, B, & Hoffman, R. R. (2006). Making sense of sensemaking 1: Alternative perspectives. IEEE Intelligent Systems, 21 (4), 70-73.
Kozlowski, S. W. J. (1998). Training and developing adaptive teams: Theory, principles, and research. In J. A. Cannon-Bowers, & E. Salas, (Eds.), Making decisions under stress: Implications for individual and team training (pp. 115–153). Washington, DC: American Psychological Association.
Matthews, M. D., Pleban, R. J., Endsley, M. R., & Strater, L. G. (2000). Measures of infantry situation awareness for a virtual MOUT environment. Proceedings of the Human Performance, Situation Awareness and Automation: User-Centered Design for the New Millennium. Savannah, GA: SA Technologies, Inc.
Merket, D. C., Bergondy, M., & Cuevas-Mesa, H. (1997, March). Making sense out of teamwork errors in complex environments. Paper presented at the 18th Annual Industrial/Organizational-Organizational Behavior Graduate Student Conference, Roanoke, VA.
Moray, N. (2004). Ou sont les neiges d'antan? ("Where are the snows of yesteryear?"). In D. A. Vincenzi, M. Mouloua & P. A. Hancock (Eds), Human performance, situation awareness and automation: Current research and trends (pp. 1–31). Mahwah: LEA.
Nullmeyer, R. T., Stella, D., Montijo, G. A., & Harden, S. W. (2005). Human factors in Air Force flight mishaps: Implications for change. Proceedings of the 27th Annual Interservice/Industry Training, Simulation, and Education Conference (paper no. 2260). Arlington, VA: National Training Systems Association.
Press, M. (1986). Situation awareness: Let's get serious about the clue-bird. Unpublished manuscript.
Salas, E., Dickinson, T. L., Converse, S., & Tannenbaum, S. I. (1992). Toward an understanding of team performance and training. In R. W. Swezey & E. Salas (Eds.), Teams: their training and performance (pp. 3–29). Norwood, NJ: Ablex.
Sarter, N. B. & Woods, D. D. (1991). Situation awareness: A critical but ill-defined phenomenon. International Journal of Aviation Psychology, 1, 45-57.
Serfaty, D., MacMillan, J., Entin, E. E., & Entin, E. B. (1997). The decision-making expertise of battle commanders. In C. E. Zsambok & G. Klein (Eds.), Naturalistic decision making (pp. 233–246). Mahwah, NJ: LEA.
Smith, K., & Hancock, P. A., (1995). Situation awareness is adaptive, externally directed consciousness. Human Factors, 37 (1), 137-148.
Sollenberger, R. L., & Stein, E. S. (1995). A simulation study of air traffic controllers’ situation awareness. Proceedings of an International Conference: Experimental Analysis and Measurement of Situation Awareness (pp. 211–217). Daytona Beach, FL.
Spick, M. (1988). The Ace Factor: Air Combat and the Role of Situational Awareness. Annapolis, MD: Naval Institute Press.
Strater, L. D., Endsley, M. R., Pleban, R. J., & Matthews, M. D. (2001). Measures of platoon leader situation awareness in virtual decision making exercises (No. Research Report 1770). Alexandria, VA: Army Research Institute.
Taylor, R. M. (1989). Situational awareness rating technique (SART): The development of a tool for aircrew systems design. Proceedings of the AGARD AMP Symposium on Situational Awareness in Aerospace Operations, CP478. Seuilly-sur Seine: NATO AGARD.
Vidulich, M. A. (2000). Testing the sensitivity of situation awareness metrics in interface evaluations. In M. R. Endsley & D. J. Garland, (Eds.), Situation awareness analysis and measurement (pp. 227–246). Mahwah, NJ: Lawrence Erlbaum Associates.
Watts, B. D. (2004). "Situation awareness" in air-to-air combat and friction. Chapter 9 in Clausewitzian Friction and Future War, McNair Paper no. 68 (revised edition; originally published in 1996 as McNair Paper no. 52). Institute of National Strategic Studies, National Defense University
Wilson, G. F. (2000). Strategies for psychophysiological assessment of situation awareness. In M. R. Endsley & D. J. Garland, (Eds.), Situation awareness analysis and measurement (pp. 175–188). Mahwah, NJ: Lawrence Erlbaum Associates.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Nomadinexile October 06, 2009, 02:19:26 PM
CNN.com Live broadcast of CDC press conference:  Their *statements" in RED.  These are not quotes.  I was listening to this and alex at the same time, typing and doing stuff in between..   I will not be able to provide link as it was broadcast live, though there is probably footage out there of boring press conference.  

We have confidence that by mid-october, we will have enough vaccine to meet demand.

we wish it were available for everyone, but the technology isn't quit here yet (reference to coming years)

On "Anticipated Schedule"  running start mid-late october

We need more people to get Pnuemonia vaccine

ON VACCINE RESISTANCE:    Most polls find most people want to get vaccinated after being asked about only 40% wanting it according to study.  

It's a great idea to get vaccinated, we haven't seen a flu like this in 50 years.



: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 07, 2009, 12:34:32 AM
Significant Cyber Events since 2006
By James Andrew Lewis
Jun 12, 2009
http://csis.org/publication/23-cyber-events-2006

A list of significant cyber events since 2006.
This list is a work in progress that we update as new incidents come to light.  If you have suggestions for additions, send them to techpolicy@csis.org.  Significance is in the eye of the beholder, but we focus on successful attacks on government agencies, defense and high tech programs, or economic crimes with losses of more than a million-dollars.

Significant Cyber Incidents Since 2006
http://csis.org/files/publication/090717_cyber_events_since_2006.pdf

This list is a work in progress that we update as new incidents come to light. If you have
suggestions for additions, send them to techpolicy@csis.org. Significance is in the eye of the
beholder, but we focus on successful attacks on government agencies, defense and high tech
programs, or economic crimes with losses of more than a million dollars.

1. May 2006: The Department of State’s networks were hacked and unknown foreign intruders
downloaded terabytes of information. If Chinese or Russian spies backed a truck up to the
State Department, smashed the glass doors, tied up the guards and spend the night carting off
file cabinets it would be an act of war, but when it happens in cyberspace, we barely notice.

2. August 2006: A senior Air Force Officer states publicly that “China has downloaded 10 to
20 terabytes of data from the NIPRNet [the unclassified military network].”

3. September 2006: Israel disrupts Syrian Air defense networks (with some collateral damage
to its own domestic networks) during the bombing of an alleged Syrian nuclear facility

4. December 2006: NASA was forced to block email with attachments before shuttle launches
out of fear they would be hacked, and Business Week Reported that the plans for the latest
U.S. space launch vehicles were obtained by unknown foreign intruders.

5. April 2007:   The Department of Commerce had to take the Bureau of Industrial Security ‘s
networks offline for several months. This Commerce Bureau reviews high tech exports and
its networks were hacked by unknown foreign intruders.

6. May 2007: “The National Defense University had to take its email systems offline because
of hacks by unknown foreign intruders that let spyware on the system.”

7. May 2007:   Estonian government networks are harassed by a denial of service attack by
unknown foreign intruders, most likely at the behest of the Russian government. Some
government online services are temporarily disrupted and online banking is halted. These
were more like cyber riots than crippling attacks, and the Estonians responded very well, but
they created a wave of fear in countries like the U.S. that depend heavily on cyberspace.

8. June 2007:   The Secretary of Defense’s unclassified email was hacked by unknown foreign
intruders.

9. August 2007:   The British Security Service, the French Prime Minister’s Office and the
Office of German Chancellor Angela Merkel all complained to China about intrusion on their
government networks. Merkel even raised the matter with China’s President.

10. September 2007:   Contractors at DHS and DOD had their networks hacked, as backdoors
into agency systems.

11. 2007:   British authorities report that hackers, believed to have come from China’s People’s
Liberation Army, penetrate the network of the Foreign Office and other key departments.
Jonathan Evans, the head of Britain’s Security Service (MI5), also warns business and
legal firms of the rise in the online threat from Chinese state organizations.

12. January 2008: A CIA official said the agency knew of four incidents overseas where
hackers were able to disrupt, or threaten to disrupt, the power supply for four foreign cities.

13. March 2008: South Korean Officials claimed that China had attempted to hack into Korean
Embassy and Korea military networks.

14. March 2008: US officials report that American, European and Japanese companies are
experiencing significant losses of intellectual property and business information to criminal
and to industrial espionage in cyberspace, but details cannot be provided in an unclassified
setting.

15. June 2008: The networks of several Congressional offices were hacked by unknown foreign
intruders. Some incident involved offices with an interest in human rights in Tibet.

16. Summer 2008: The databases of both Republican and Democratic presidential campaigns
were hacked in the summer of 2008 and downloaded by unknown foreign intruders.

17. August 2008: Computer networks in Georgia are hacked by unknown foreign intruders, most
likely at the behest of the Russian government. There is little or no disruption of service but
much press attention is given to annoying graffiti on Georgian government websites.

18. November 2008:   Classified networks at DOD and CENTCOM were hacked by unknown
foreign intruders. Even worse, it took several days to dislodge the intruders and resecure the
networks.

19. December 2008: Even tiny CSIS was hacked in December by unknown foreign intruders.
They probably assumed that some CSIS staff would go into the new administration and may
have though it might be interesting to read their emails beforehand.

20. 2008: Britain’s MPs were warned about e-mails apparently sent by the European Parliament,
amid fears that they could be used by Chinese hackers to implant viruses. Chinese hackers
were also thought to be responsible for shutting down the House of Commons computer
system in 2006.

21. January 2009: Hackers attacked Israel’s internet infrastructure during the January 2009
military offensive in the Gaza Strip that briefly paralyzed government sites. The attack,
which focused on government Websites, was executed by at least 5000,000 computers.
Israeli officials believe carried out by a criminal organization from the former Soviet Union,
and paid for by Hamas or Hezbollah.

22. February 2009: FAA computer systems were hacked and, as the FAA’s increasing use of
modern IP-bases’ networks increase, so does the risk of the intentional disruption of
commercial air traffic.

23. February 2009:   French combat aircraft planes were grounded after military databases were
infected with the Microsoft “conficker” virus.

24. March 2009: The German government warned that hackers were offering a freeware version
of the new Microsoft operating system that installs Trojans.”

25. March 2009: Canadian researchers find a computer espionage system that they attributed to
China implanted on the government networks of 103 countries.

26. March 2009: Reports in the press say that the plans for Marine Corps 1, the new presidential
helicopter, were found on a file-sharing network in Iran.

27. April 2009: Wall Street Journal articles have laid out the vulnerability of the U.S. power grid
to cyber attack – a vulnerability the U.S. is busily increasing – and the intrusions into F-35
databases by unknown foreign intruders.

28. May 2009: In May 2009, Merrick Bank, a leading issuer of credit cards, claimed it lost $16
million after hackers compromised as many as 40 million credit card accounts.

29. May 2009: The Homeland Security Information Network (HSIN) was hacked by unknown
intruders. The hackers gained access to the data by getting into the HSIN account of a federal
employee or contractor. The bulk of the data obtained was federal, but some state
information was also accessed.
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 07, 2009, 12:41:52 AM
Twenty Important Controls for Effective Cyber Defense
and FISMA ComplianceConsensus Audit Guidelines

Draft for comment
By John Gilligan, Ed Skoudis
Aug 10, 2009
http://csis.org/publication/twenty-important-controls-effective-cyber-defense-and-fisma-compliance

Securing the United States against cyber attacks has become one of the nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must vigorously defend against external attacks. Furthermore, for those external attacks that are successful, defenses must be capable of thwarting, detecting, and responding to follow-on attacks on internal networks as attackers spread inside a compromised network.

A central tenet of the U.S. Comprehensive National Cybersecurity Initiative (CNCI) is that "offense must inform defense." In other words, knowledge of actual attacks that have compromised systems provides the essential foundation on which to construct effective defenses. The Senate Homeland Security and Government Affairs Committee moved to make this same tenet central to the Federal Information Security Management Act in drafting FISMA 2008.

Details here: http://csis.org/publication/twenty-important-controls-effective-cyber-defense-and-fisma-compliance

: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 07, 2009, 12:47:37 AM
U.S. Cyber Challenge: Can We Catch Up?
http://csis.org/event/us-cyber-challenge-can-we-catch

Date: Monday, Jul 27, 2009
Location:
Room 1539
Longworth House Office Building
US Capitol
 
CSIS is hosting a luncheon called “U.S. Cyber Challenge – Can we catch up?”.  This luncheon is part of a larger initiative called the U.S. Cyber Challenge - a program designed to encourage young people to develop the aptitude and skills to become the core of a strong cybersecurity community moving forward. 

Speakers:

■ Richard Schaeffer, Director, Information Assurance, National Security Agency
■ Steven D. Shirley, Executive Director, Cyber Crime Center (DC3), Department of Defense
■ S. Sanford Schlitt, Vice Chairman of the Board for Aerospace Education
■ Greg White, Professor of Computer Science at the University of Texas at San Antonio, Director of the Center for Infrastructure Assurance and Security
■ Peter Fonash, Acting Director of the National Cybersecurity Dvision (NCSD), U.S. Department of Homeland Security

 Please send your RSVP to techpolicy@csis.org with your name, title, and affiliation.

For more information on the U.S. Cyber Challenge, please visit www.csis.org/uscc or www.sans.org/uscc
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 07, 2009, 12:57:07 AM
Commission on Cybersecurity for the 44th Presidency
Part of the: Technology and Public Policy
http://csis.org/program/commission-cybersecurity-44th-presidency

The CSIS Cybersecurity Commission was formed to provide advice to the 44th president on the creation and maintenance of a comprehensive cybersecurity strategy......The CSIS Cybersecurity Commission provided findings and recommendations to secure cyberspace in the 44th Presidency, and to help guide policy-making.  It called for immediate action.  The new administration has cybersecurity high on its agenda and it is making a serious effort to take what has already been done and improve our national cyber posture. But there is much to be done.  Building cybersecurity will be a long-term effort.

Commission members produced a detailed report, "Securing Cyberspace for the 44th Presidency," released on Capitol Hill on December 8, 2008. 

Commission Activity, Phase II
(http://i612.photobucket.com/albums/tt201/Pilikia_photos/1-chart.png)

Commission Activity, Phase I

(http://i612.photobucket.com/albums/tt201/Pilikia_photos/2-chart.png)
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 07, 2009, 01:01:38 AM
Twenty Important Controls for Effective Cyber Defense
and FISMA ComplianceConsensus Audit Guidelines

Draft for comment
By John Gilligan, Ed Skoudis
Aug 10, 2009
http://csis.org/publication/twenty-important-controls-effective-cyber-defense-and-fisma-compliance

Securing the United States against cyber attacks has become one of the nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must vigorously defend against external attacks. Furthermore, for those external attacks that are successful, defenses must be capable of thwarting, detecting, and responding to follow-on attacks on internal networks as attackers spread inside a compromised network.

A central tenet of the U.S. Comprehensive National Cybersecurity Initiative (CNCI) is that "offense must inform defense." In other words, knowledge of actual attacks that have compromised systems provides the essential foundation on which to construct effective defenses. The Senate Homeland Security and Government Affairs Committee moved to make this same tenet central to the Federal Information Security Management Act in drafting FISMA 2008.

Details here: http://csis.org/publication/twenty-important-controls-effective-cyber-defense-and-fisma-compliance


PDF file on this subject is here: http://csis.org/files/publication/Twenty_Critical_Controls_for_Effective_Cyber_Defense_CAG.pdf
: Re: NWO is going to decapitate IT infrastructure with 2 phase RNA recomb Flu
: Satyagraha October 07, 2009, 07:24:32 PM
http://csis.org/files/publication/Twenty_Critical_Controls_for_Effective_Cyber_Defense_CAG.pdf
Some excerpts from the PDF file referenced above...
Twenty Important Controls for Effective Cyber Defense

Document Contributors

What makes this document effective is that it reflects knowledge of actual attacks and defines
controls that would have stopped those attacks from being successful.
To construct the
document, the following types of people have provided first-hand knowledge and input
regarding how computer and network attacks are being carried out and the defensive
techniques that are most important in thwarting attacks:

1. Blue team members inside the Department of Defense who are often called in when
military commanders find their systems have been compromised and who perform
initial incident response services on impacted systems

2. Blue team members who provide services for non-DoD government agencies who
identify prior intrusions while conducting vulnerability assessment activities

3. US-CERT and other non-military incident response employees and consultants who are
called upon by civilian agencies and companies to identify the most likely method by
which systems and networks were compromised

4. Military investigators who fight cyber crime

5. The FBI and other police organizations that investigate cyber crime

6. Cybersecurity experts at US Department of Energy laboratories and federally funded
research and development centers

7. DoD and private forensics experts who analyze computers that have been infected

8. Red team members in DoD tasked with finding ways of circumventing military cyber
defenses during their exercises

9. Civilian penetration testers who test civilian government and commercial systems to
determine how they can be penetrated with the goal of better understanding risk and
implementing better defenses

10. Federal CIOs and CISOs who have intimate knowledge of cyber attacks

11. The Government Accountability Office (GAO)

Additionally, input from over 100 other collaborators has been incorporated into the current
version of the document.

The Twenty Critical Controls

These 20 critical security controls were agreed upon by knowledgeable individuals from the
groups listed above. The list includes 15 controls that can be validated at least in part in an
automated manner and five that must be validated manually. It is important to note that the
20 control categories are not presented in order of priority. The process of gathering these
specific controls and subcontrols focused on identifying the highest priority defenses
and
represent a subset of controls found in other audit guidelines and documents. Each of the 20
categories is important and offers high-priority techniques for thwarting real-world attacks.

Critical Controls Subject to Automated Collection, Measurement, and Validation:

 1. Inventory of Authorized and Unauthorized Devices
 2. Inventory of Authorized and Unauthorized Software
 3. Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
 4. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
 5. Boundary Defense
 6. Maintenance, Monitoring, and Analysis of Security Audit Logs
 7. Application Software Security
 8. Controlled Use of Administrative Privileges
 9. Controlled Access Based on Need to Know
10. Continuous Vulnerability Assessment and Remediation
11. Account Monitoring and Control
12. Malware Defenses
13. Limitation and Control of Network Ports, Protocols, and Services
14. Wireless Device Control
15. Data Loss Prevention

Additional Critical Controls (not directly supported by automated measurement and validation):

16. Secure Network Engineering
17. Penetration Tests and Red Team Exercises
18. Incident Response Capability
19. Data Recovery Capability
20. Security Skills Assessment and Appropriate Training to Fill Gaps

In the pages that follow, each of these controls is described more fully. Descriptions include
how attackers currently exploit the lack of the control, detailed subcontrols that describe what
an organization needs to do in each area and requirements for measuring these activities, and
suggestions regarding how standardized measurements can be applied. As pilot
implementations are completed and agencies gain experience with automation, it is expected
that the document will be expanded into a detailed audit guide that agency CIOs can use to
ensure they are doing the right things for effective cyber defense and that IGs can use to verify
the CIOs’ tests.

Insider Threats vs. Outsider Threats

A quick review of the critical controls may lead some readers to think that they are heavily
focused on outsider threats and may, therefore, not fully deal with insider attacks. In reality,
the insider threat is well covered in these controls in two ways. First, specific controls such as
maintenance of security audit logs, control of administrative privileges, controlled access based
on need to know, data loss prevention, and effective incident response all directly address the
key ways that insider threats can be mitigated. Second, the insider and outsider threats
sometimes merge as outsiders penetrate security perimeters and effectively become “insiders.”
All of the controls that limit unauthorized access within the organization work to mitigate both
insider and outsider threats. It is important to note that these controls are meant to deal with
multiple kinds of computer attackers, including but not limited to malicious internal employees
and contractors, independent individual external actors, organized crime groups, terrorists, and
nation state actors, as well as mixes of these different threats. While these controls are
designed to provide protection against each of these threats, very sophisticated, well-funded
actors such as nation states may sometimes employ attack techniques that require extreme
defenses that go beyond the scope of this document.

These controls are not limited to blocking only the initial compromise of systems, but also
address detecting already-compromised machines, and preventing or disrupting attacker’s
actions. The defenses identified through these controls deal with decreasing the initial attack
surface by hardening security, identifying already-compromised machines to address long-term
threats inside an organization’s network, controlling super-user privileges on systems, and
disrupting attackers’ command-and-control of implanted malicious code
.

(http://i612.photobucket.com/albums/tt201/Pilikia_photos/computer-attckr.png)
Figure 1 illustrates the scope of different kinds of attacker activities
that these controls are designed to help thwart.


The rings of Figure 1 represent the actions computer attackers often take against target
machines.

These actions include initially compromising a machine to establish a foothold by
exploiting one or more vulnerabilities.

Attackers can then maintain long-term access on a system, often by creating accounts,
subverting existing accounts, or altering the software on the machine to include backdoors and rootkits.

(Promis/PTech perhaps?)

Attackers with access to machines can also cause damage, which could include stealing, altering,
or destroying information; impairing the system’s functionality to jeopardize its business effectiveness
or mission; or using it as a jumpoff point for compromise of other systems in the environment.

Where these rings overlap, attackers have even more ability to compromise sensitive information
or cause damage. The various defensive strategies located outside of each set of rings in the figure
are covered throughout the controls described in this document.

Defenses in any of the rings help to limit the abilities of attackers, but improved defenses are required
across all three rings and their intersections. It is important to note that the Twenty Critical Controls
for Effective Cyber Defense are designed to help improve defenses across each of these rings, rather
than to merely prevent initial compromise.

: Re: Pentagon document admits Northcom will Cyberattack U.S. Infrastructure
: Anti_Illuminati October 08, 2009, 02:32:02 PM
1,000+ page document
Universal Joint Task List (UJTL) PDF for Download (http://www.js.pentagon.mil/doctrine/training/ujtl_tasks.pdf)
http://www.js.pentagon.mil/doctrine/training.htm
(http://i574.photobucket.com/albums/ss186/Nunkadunka/ujtl_tasksa.jpg?t=1255026050)
(http://i574.photobucket.com/albums/ss186/Nunkadunka/ujtl_tasksb.jpg?t=1255026052)
(http://i574.photobucket.com/albums/ss186/Nunkadunka/ujtl_tasksc.jpg?t=1255026053)
: Re: Pentagon document admits Northcom will Cyberattack U.S. Infrastructure
: luckee1 October 08, 2009, 03:53:31 PM
Thanks for the Reading assignment, A_I  ;)!  1167 pages!  Holy crap!


Is this true? CoG is basically a PRIME DIRECTIVE of our system, even when the People don't want the Continuance?

Yes, you can Wiki, COG or Continuity of Government.

That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Anti_Illuminati October 10, 2009, 04:40:21 PM
Excerpt from above:
(http://i.l.cnn.net/cnn/2007/images/12/07/t1home.rockefeller.gi.jpg)
(4) SOFTWARE CONFIGURATION SPECIFICATION LANGUAGE- The
            Institute shall, establish standard computer-readable
            language for completely specifying the configuration of
            software on computer systems widely used in the Federal
            Government, by government contractors and grantees, and in
            private sector owned critical infrastructure information
            systems and networks.

THIS GIVES THE NWO FULL CONTROL OVER ANY PRIVATE COMPANY (AND YOUR PERSONAL PC IN YOUR HOME) TO FORCE BACKDOORS INTO THEIR SYSTEMS, WHERE PREVIOUSLY THERE MAY HAVE BEEN NONE THAT WERE EXPLOITABLE BY THE GOVT.  THIS WILL ELIMINATE ANY ESCAPE FROM GOVT. INTRUSION, AND BACKDOOR ACCESS INTO ANY SYSTEM, AND MAKE USE OF ANY FREEDOM PROMOTING OPERATING SYSTEMS ILLEGAL.

AN EXAMPLE OF HOW THEY CAN DESIGNATE ALL HOME COMPUTERS AS "CRITICAL INFRASTRUCTURE" IS PROPAGANDIZE ON MSM THAT A BUNCH OF BOTNETS OR PERSONAL COMPUTERS WERE RESPONSIBLE FOR DISRUPTING GOVERNMENT SYSTEMS, OR SHUTTING DOWN A BANK (THAT ANGLE HAS ALREADY BEEN PSYOP'D TO THE PUBLIC BECAUSE IT FITS IN AS A CONVENIENT TRUMP CARD DUE TO THE MANUFACTURED ECONOMIC CRISIS).

http://www.computerworld.com/s/article/107156/OMG_pushes_standards_for_verifying_software_security?taxonomyId=017&source=x06

OMG pushes standards for verifying software security
Framework would be an aid to vendors, government buyers


Framework would be an aid to vendors, government buyers
By Jaikumar Vijayan
December 16, 2005 12:00 PM ET

Computerworld -  A report released early this month by a task force within the Object Management Group outlines the standards needed to develop a consistent process for verifying the security of software sold to government agencies.

The task force, which is composed of representatives from private-sector companies and government agencies, is part of a broader effort to ensure that software products used by the government meet consistent and defined security standards.

"What the OMG is hoping to achieve in putting together these standards. is to have a formal way of measuring if software is trustworthy," said Djenana Campara, co-chairman of the Architecture-Driven Modernization Task Force within the OMG.

The standards will give vendors and software purchasers a consistent way to evaluate a system's design robustness, reliability, process integrity and configuration controls, said Campara, who is also CTO of Klocwork Inc., a Burlington, Mass.-based vendor of vulnerability analysis software.

Such a framework is crucial to allowing software suppliers and buyers to represent their claims and requirements along with a way to verify them, said Joe Jarzombek, director of software assurance at the National Cyber Security Division of the U.S. Department of Homeland Security.

"When vendors make claims about the safety, security and dependability of products, what is the standard by which they are making those claims and what are the minimum levels of evidence" that are needed? he asked. "The reason to have a standard is it tells you, Here's how you can make a claim, here are the attributes we are looking for, and here are the things you need to include when making a claim," he said.

Having a process for enabling security verification is becoming important because of the increasing complexity of software systems, their growing interconnectedness and the globalization, of software developers, Campara said.

Government systems that are used for national security purposes already need to go through a Common Criteria Certification process to determine whether they meet security requirements. OMG's framework -- which still has to go through a long approval process -- will give another option to agencies that are not mandated to use the Common Criteria process, Jarzombek said.

In addition, a systems and software assurance standard that's being finalized by the International Standards Organization (ISO/IEC 15026) will also give government agencies a standard they can use for assessing software security sometime next year, he said. The ISO standard is focused on the management of risk and assurance of safety, security and dependability of systems and software, he added.

____________________________________________________________
http://www.thefreelibrary.com/Ptech+submits+metalmodel+as+proposed+OOAD+standard+--+Leading...-a019100984

BOSTON--(BUSINESS WIRE)--Feb. 7, 1997--Ptech, a leader in enterprise-wide business process modeling and code generation tools, announced today that it recently submitted a proposed standard for object-oriented analysis and design. The document responds to the
Object Analysis and Design RFP-1 of the Object Management Group in Framingham, Mass.

Ptech develops the software solution FrameWork, an object-oriented business process modeling and application development tool that lets business and technology professionals use a single graphical interface to capture business goals and design processes to support them. FrameWork 5.0 for Microsoft Windows NT and 95 facilitates conceptualizing, modeling and implementing processes and information for maximum competitive advantage. The Ptech Abstract Code Generator (ACG) lets customers generate up to 90 percent of application code directly from the models.

"Ptech is submitting a response to the OMG request for proposals as a result of customer feedback highlighting a void in the marketplace," explained James Cerrato, vice president of technology deployment. "We are convinced that our approach will enrich the emerging OMG standard. Since most approaches in the marketplace focus on systems development, they often result in applications that do not reflect actual business needs. The Ptech approach, in contrast, is actually driven by business strategy."

"Ptech has always advocated a fully open approach, providing customers with all the underlying metamodels that define the Ptech methodology and cover the full life cycle from enterprise modeling through application implementation," added Oussama Ziade, chairman and CEO. "The Ptech metamodel is based on seventeen years of practical experience with customers and notable industry experts. Since the metamodel is easy to extend, users have continually expanded and refined it so that it reflects a degree of maturity, formality and integration unique in the marketplace. We are excited about submitting this Ptech metamodel to support the OMG in their standardization effort for object analysis and design."

The Ptech submission is one of a handful offered by industry leaders for consideration. It consists of an overview of the Ptech method, a description of the models supported and a glossary of terms. The body of the document addresses these topics:

-- Structural models

-- Architectural models

-- Behavioral models

-- Distributed processing models

-- Usage models

-- Annotation models

The revised submission in April will also address the relationship between metamodel constructs defined in this submission and specifications in the Business Object Facility, the Meta Object Facility, the CORBA Interface
Repository and CORBA Services.

For details about Ptech or FrameWork, call 617/577-7100 or visit www.ptechinc.com . -0- Founded in 1994, Ptech Inc. is a privately held software company located in Boston, Massachusetts.

Ptech and the Ptech logo are trademarks of Ptech Inc.

CONTACT: Ptech

Janet Fink, 617/577-7100 x360

fink@ptechinc.com
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Republic Renewal October 11, 2009, 12:35:20 AM
Wow full backdoor acccess into our systems... they are just waiting for a reason.. HOW DO WE KNOW THEY HAVEN"T COME UP WITH ONE? I'm thinking false flag attacks on government and major installation websites and servers.
" We are gonna have to initiate the internet takeover to protect the American People"
BS TAKE OVER!! The world will have no way to connect with eachother if they are being monitored at all times..

Start hacking training people ...
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Mithridates October 11, 2009, 10:05:46 PM
Haven't they already been hyping Chinese/Russian hackers takin over the internets?
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Republic Renewal October 12, 2009, 01:04:28 AM
http://www.defencetalk.com/chinese-russian-hackers-probing-us-power-grid-report-17662/

"It appears their aim is not to disrupt the systems now, but to ensure that if these states were ever in a position where they have their backs against the wall that they have another option to atomic weapons or whatever."
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Satyagraha October 12, 2009, 07:13:54 AM
AI's interview on the Corbett Report is available - see this thread:
http://forum.prisonplanet.com/index.php?topic=139649.0


: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: trailhound October 13, 2009, 10:00:11 PM
http://www.daily.pk/new-evidence-that-the-%E2%80%98swine-flu%E2%80%99-pandemic-is-man-made-7780/

New Evidence: That The ‘Swine Flu’ Pandemic Is Man-Made
Written by Satinder Singh World Aug 1, 2009

Murder suspects are either convicted or acquitted at trial based on the prosecution’s presentation of EVIDENCE which usually hinges on MOTIVE, OPPORTUNITY, and TIME-LINES combined with physical documents. To gather such hard evidence, detectives and/or federal agents often spend months following leads and interviewing witnesses. In the trial phase, re-creating the sequence of events is essential. I submit this paper will provide more than enough hard evidence to at least result in a series of criminal indictments of charges of MASS MURDER, and CONSPIRACY TO COMMIT WORLD GENOCIDE against Novartis Pharmaceutical principals and agents and others.

PRIMARY MOTIVE

The Primary Motive behind this alleged criminal activity is also the primary cause of most murders in the world today, and that motivation is simply: BIG MONEY. Billions of Dollars of windfall profits from government contracts worldwide, as a matter of fact.
I will provide evidence that will show that Novartis Pharmaceuticals of Basel, Switzerland has conspired with corrupt “scientists” at the U.S. Army Institute of Pathology ­ Ft. Detrick, Maryland, to create a “novel” strain of weaponized “influenza” virus by means of “reverse engineering” the deadly 1918 killer strain ­ which strain was maliciously and surreptitiously released upon the world in March and April of 2009 for the primary purpose of creating a panic-stricken world-wide demand for Novartis vaccine material.

The evidence will also clearly show that the Novartis vaccine material is in reality designed to facilitate the further mutation of the pandemic into more lethal waves of increasingly virulent and deadly disease, rather than to curtail and limit the existing outbreak. The evidence will show that Novartis is willingly being used, (and extremely well-paid) to facilitate the edicts of the global elite’s Club of Rome; which edicts clearly call for a massive and sudden depopulation of certain segments of the earth’s human population.

PRIMARY EVIDENCE

To realize such windfall profits on an engineered, global flu pandemic, detailed covert planning must take place of course.
Patents protecting the proprietary flu vaccine must be applied for and secured before the pandemic virus is released in order to minimize the competition and maximize the profit potentials. In a biological attack of this nature, timing is extremely critical.
Indeed, the evidence is clear ­ Novartis applied for just such a patent on Nov. 4, 2005, and the U.S. Patent Office accepted this application and granted US 20090047353A1 for a “Split Influenza Vaccine with Adjuvants” on February 19, 2009. (See bottom of page).

With this patent now secured, the conspirators were now free to create the demand for their “novel” split influenza vaccine by releasing a “novel” split-influenza (combining multiple viruses) pandemic virus from a weapons lab test-tube into unsuspecting human hosts. http://www.washingtonpost.com/wp-dyn/content/article/2009/06/17/AR2009061703271.html

The so-called “Swine Flu” grabbing headlines today is actually a recombinant, or “split-influenza” virus consisting of A-strain Bird-Flu (H5N1), Swine Flu (H1N1) and multiple strains of human flu (H3N2). Likewise, the 1918 Killer Flu that killed untold millions of people was a recombinant or “split-influenza” virus composed of Bird flu, Swine Flu, and multiple strains of human flu.

CRIMINAL TIMELINE

The criminal timeline begins in 1997, when Dr. Jeffrey Taubenberger assembled a team of geneticists and microbiologists to analyze the genome structure, and then to REPRODUCE (i.e. reverse engineer) what is arguably one of the most deadly viral structures the world has ever been cursed with ­ the 1918 killer flu virus. According to numerous published stories and reports, Taubenberger and his team utilized super-computers to map the complex RNA and DNA structures of the killer virus, then utilized human plasmids to successfully re-create the 1918 killer. Taubenberger completed his work in early 2005, then immediately left the employ of the U.S. Army at Ft. Detrick to take a much more lucrative position with the National Institutes of Health. His new focus was to create a VACCINE against the very same 1918 killer flu that he and his team had, just months earlier, successfully “reverse engineered” and created.

This researcher is very confident that a focused criminal investigation would likely reveal prima facia evidence that Taubenberger was in reality working for Novartis while employed with the N.I.H. ­ and was quite likely the primary author of Novartis’ Nov. 6, 2005 “provisional” patent application. On page 2, paragraph 32 of the patent publication we read, quote: “The influenza virus [that the 'invention vaccine' is designed to protect against] may be a reassortant strain, and may have been obtained by reverse genetics techniques. Reverse genetics techniques allow influenza viruses with desired genome segments to be prepared in vitro using plasmids.” The remnant of the paragraph then goes into very specific detail as to the actual mechanics of how the pandemic virus was actually created by Taubenberger’s Ft. Detrick team. At the very least, the author of the patent application had to have studied Taubenberger’s various published reports on his work at Detrick, for the wording and science is virtually verbatim.

Furthermore, this paragraph is even more damning by the words “may have been obtained”. Who “obtained” this virus and for what reason was it “obtained”? Keep in mind the CDC and HHS would have Americans believe that the pandemic viral outbreak is totally a “natural” occurrence ­ if so then how could Novartis have such an incredible advance knowledge to the point of developing a vaccine with such absolutely PERFECT TIMING???

WHO EXACTLY IS “NOVARTIS”??

Novartis International AG is simply the world’s largest, multi-national pharmaceutical company with over $53 Billion USD revenue generated in 2008. It’s headquarters is located in Basel, Switzerland, home of the vaunted “Swiss Guards” who provide all security measures for the Vatican and the Club of Rome. The company logo symbolizes the “eternal flame” of the Illuminati “enlightened ones”. Dig into Novartis International AG’s long history, and one finds that it began as a component of the infamous I.G. Farben combine, which in turn was primarily responsible for the rise of Adolph Hitler and the German/Austrian Third Reich.

Dig a bit deeper and you find that Novartis also wholly owns a company called Sandoz ­ which was the inventor of LSD and other strong hallucinogenic “truth” drugs, and was the supplier of LSD to the CIA allowing them to scale new heights with their covert “MK ULTRA” mind control experiments. Documents released to U.S. Congressional investigators in 1977 show that Sandoz Labs had arranged for certain Nazi scientists to gain new identities in Allen Dulles’ CIA at the conclusion of WWII. This was accomplished under a secret extraction program called “Operation Paper Clip”.

The address listed on the Novartis Patent applications is a P.O. Box in Emeryville, California. Up until the summer of 2005, this Emeryville California address belonged to Chiron Inc. ­ the world’s second-largest INFLUENZA VACCINE MANUFACTURER. Chiron was doing very well, with reported sales of $357 million in fiscal 2002. Chiron’s sales nearly doubled, peaking at a whopping $678 million in 2003 ­ and it was mostly due to the marketing and sale of FLU VACCINE CONTRACTS to the federal government. Novartis, which owned much of Chiron’s stock, was very pleased, until disaster struck in 2004 — the entire year’s stock of flu vaccine was found to be contaminated and was condemned.

Stock values plummeted on the news. With the stock at a historic low, Novartis quickly purchased the remainder of Chiron’s stock and began immediately to work on the massive “novel pandemic flu” vaccine that they somehow knew would soon have worldwide demand ­ especially if they controlled the exclusive patent they could effectively “corner the pandemic flu vaccine market”!!

OTHER CRIMINAL ACTIVITIES

I would submit that killing tens of thousands of innocent humans via the systemic creation of a “pandemic” in order to make billions of dollars is vile enough, but there is also evidence that there is an even more heinous hidden agenda at work here, and it is spelled GENOCIDE.

It is no mystery that Adolph Hitler advocated the elevation of a Nordic “Master Race” that would rule the world in a “New Order of the Ages” called the “Third Reich”. Sadly, not all of the EUGENIC/GENOCIDAL National Socialists were executed at Nuremburg.
In reality, the elite financiers that actually dictated the agenda to Hitler, merely went underground, willing to bide their time until their godless agenda to liquidate BILLIONS of people could be successfully implemented.

The evidence that the Novartis-controlled “Pandemic Vaccine” may well be a tool of mass genocide, is actually quite overwhelming.
At this point, some readers may scoff and ask: “Why would any company want to kill off their customers?” The answer is that these “customers” control large blocks of assets and equity. As Kissinger’s “NSSM-200″ report outlines, the “spoils” of genocide include controlling large tracts of land and mineral assets. This is secondary, of course, to their warped dream of creating a Utopian World Order with only 500 million “worthy” humans allowed to share in it.

WHAT’S THE EVIDENCE?

While George H.W. Bush was busy saving the world from the evil dictator Saddam Hussein in 1991, pursuant to his U.N. speech to create a “new world order” an agenda for an “Initiative for Eco-92 Earth Charter” elitist meeting happened to fall into honest, Christian hands. This agenda basically reiterated the genocide outlined in Henry Kissinger’s infamous NSSM-200 report of 1974, and called for “the immediate reduction of world population.” The entire report can be downloaded at:

My extensive research shows that by 1992, the massive death rate of AIDS had simply not materialized to the Elite’s satisfaction, and a more efficient mass killer had to be engineered in order to fulfill the edicts cut into the “Georgia Guidestones”.

Evidence shows that like the 2009 “Novel” Flu Virus the HIV virus was also engineered and manufactured in the labs of Ft. Detrick.

In 1969, during a House Appropriations Committee hearing, the Defense Department’s Biological Warfare (BW) division at Ft. Detrick requested funds to develop, through complex gene-splicing (i.e. genetic engineering) a “novel” new disease that would both be resistant to, and break down a victim’s immune system. The Congressional Record reads:

“Within the next 5 to 10 years it would probably be possible to make a new infective micro-organism which could differ in certain important respects from any known disease-causing organisms. Most important of these is that it might be refractory to the immunological and therapeutic processes upon which we depend to maintain our relative freedom from infectious diseases.”

The funds for this “Dr. Strangelove” project were somehow approved. AIDS “magically” appeared within the requested time frame, and of course, just happens to exhibit the exact characteristics specified by the Ft. Detrick scientists.

Three years later, in 1972, the fledgling World Health Organization (WHO) published a very similar proposal to the one submitted to the U.S. House Appropriations Committee in 1969. The WHO proposed that: “An attempt should be made to ascertain whether viruses can in fact exert selective effects on immune function, e.g., by …affecting T cell function as opposed to B cell function. The possibility should also be looked into that the immune response to the virus itself may be impaired if the infecting virus damages more or less selectively the immune cells responding to the viral antigens.” (Bulletin of the W.H.O., vol. 47, p 257- 274.) This is a “textbook” clinical description of the function of the HIV/AIDS virus.

The W.H.O. shortly thereafter begins a massive “smallpox vaccination” program in Africa in 1975. Within two years, millions of smallpox vaccines are provided by Novartis et. al, under U.N.I.C.E.F. funding. A decade later, it is determined by independent journalists in the U.K. that the incidence of AIDS infections’ MAPPED AND GRAPHED EPICENTERS in Africa coincided exactly with the locations of the W.H.O. smallpox vaccination program centers in the mid-1970’s (Source, The London Times, May 11, 1987). Some 14,000 Haitians then on UN ‘humanitarian missions’ to Central Africa were also vaccinated in this campaign, and soon contracted HIV. Personnel actually conducting the vaccinations of the Haitians maintain they had been completely unaware that the vaccine was anything other than a routine shot.

In 1987, Dr. Hilleman, head of all vaccine production of Merck Pharmaceuticals stunned the world with his public admissions that the mass vaccination campaigns of the 1950s and ’60s likely caused thousands of cancer deaths each year. This was due to the presence of a cancer-causing virus that contaminated the first polio vaccine, according to Dr. Hilleman. Known as SV40, the virus originated from dead monkeys whose kidney cells were used to culture the first Salk vaccines. Doctors estimate that the virus was injected into tens of millions during the vaccination campaigns, including several million in Canada, before being detected and screened out in 1963. Those born between 1941 and 1961 are thought to be most at risk of having been infected with SV40, and are estimated to have a 300% greater chance of developing cancer. According to Hilleman MERCK KNEW THE VACCINES WERE INFECTED WITH SV40, but distributed them anyway. See http://www.youtube.com/watch?v=edikv0zbAlU

Furthermore, research doctors in New Orleans reported in 1963 that a percentage of the Salk polio vaccines were found to have attenuated, (live) viruses, which actually CAUSED tens of thousands of polio cases during the 1950’s.

Following the successful liberation of Kuwait in Operation Desert Storm, hundreds of thousands of victorious American troops are suddenly stricken with a wide variety of auto-immune disorders that doctors named the Gulf War Syndrome, (GWS). After a decade of medical investigation, the culprit is finally determined to be an ingredient in the anthrax vaccinations mandatorily given to the troops. This offending “adjuvant” is a synthetic material known as squalene ­ aka, oil-in-water adjuvant. Writer and Gulf War correspondent Gary Matsumoto documents this entire, tragic saga in his seminal book, “Vaccine-A”. See www.vaccine-a.com.

Understanding these historical facts is very important for this reason: Those that ignore history are doomed to repeat it. This is doubly true when it comes to blindly accepting a “novel” mass vaccination for a weaponized, “reverse engineered” virus.

The historical record is very clear ­ attenuated, live viruses in vaccines SPREAD the disease very effectively. When combined with SQUALENE ADJUVANT ­ the virus becomes many times more potent and lethal. When given to CHILDREN IN SCHOOLS, millions of “typhoid Matts and Marys” will be spreading the disease exponentially.

Chillingly, the Novartis patent for the “novel pandemic flu” declares that “African green monkey kidney cells” will be used for the “viral growth substrate” ­ i.e. the carrier medium.
(Page 3, paragraph 0037) We also see that “oil-in-water” squalene-based adjuvants will also be included (page 8 ­ 0098) but most incredible of all, because this is a “recombinant” and “novel” split vaccine, it is deemed necessary to include fragments of attenuated viruses (i.e. live pathogens) in the vaccine medium.

On July 13, 2009, the W.H.O. sanctioned this lunacy by declaring: “In view of the anticipated limited vaccine availability at global level and the potential need to protect against “drifted” strains of virus, it is recommended that promoting production and use of vaccines such as those that are formulated with oil-in-water adjuvants and live attenuated influenza vaccines is important.”

In conclusion and summation, it should be evident that the “2009 Swine Flu” could just as easily be called the “Bird Flu” ­ because it is as much H5N1 (bird flu) as H1N1 (pig flu.) Novartis knew this in 2005 when it received hundreds of millions of dollars from Mike Leavitt’s HHS to develop and patent the “bird flu” vaccine. I publicly charge that Novartis had advance knowledge of this “combination” because they had been in consultation with Jeffrey Taubenberger for years.

It is further evident that Novartis’ patent provides for “influenza vaccine kits” to be provided to other pharmaceutical manufacturers as well. These “kits” are the basic raw ingredients needed for the other companies to build their own vaccines under their own label.

In 2005, this “jobbing” of separate ingredients by multiple companies would never have been allowed because of the legal liability issues involved. However, in 2009, all liabilities for death and disability from faulty or contaminated vaccines have been stripped away. Any wrongful death or disability lawsuits against Novartis or any other company will today be summarily dismissed.
Novartis today has carte blanche blanket immunity for their actions ­ and any large pharmaceutical company who so desires, can join them at the feeding troughs just by paying millions for their “kits”.

If this isn’t the pinnacle of criminality, then I don’t know what is.

Novartis, if this “novel split vaccine” is so wonderful and safe, why do you require such blanket protection from litigation?
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: luckee1 October 14, 2009, 12:55:52 AM
lostdog2323, nice find.
: Bill Frist calls h1n1 nasal vaccine "modified"
: phosphene October 14, 2009, 06:35:01 AM
Bill Maher says "no" to the flu vaccine. Author Bill Frist, while trying defend against Maher's use of the phrase "live virus", mentions that the difference between the inject-able vaccine and the nasal vaccine is that the nasal virus "has been modified"

http://www.wimp.com/billvaccines/ @ 4:30
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: carlee October 14, 2009, 07:07:35 AM
Eligibility for swine flu mist expands

Children up to 18 years of age are now eligible to receive the H1N1 swine flu vaccine.

This is an increase in age from last week’s priority recommendation that children ages 2 to 10 get the vaccine. Ventura County Public Health Officer Dr. Bob Levin made the decision to increase the age limit as soon as he got an idea of how many county residents would be asking for the vaccine.

“When we didn’t have lines out the door, we decided to increase the age limit,” Levin said.The Centers for Disease Control gave county health officers the leeway to increase the age limit if enough vaccine was available. Levin said he plans to expand the groups eligible to receive the vaccine as soon as possible.

Children 2 to 18 will get the vaccine in the form of a nasal spray called FluMist. The county received its first shipment of 115,500 doses of this live attenuated influenza vaccine last week.

Public Health officials expect the injectable form of the vaccine to arrive this week or next. That vaccine will contain components from dead H1N1 viruses.

Another group that will be given priority for getting the vaccine are healthy, nonpregnant household members ages 2 to 49 who have contact with a child under 6 months of age.

As sufficient supplies of injectable and nasal mist H1N1 vaccine arrive, groups permitted to receive the vaccine will widen to include those from 6 months to 24 years of age; pregnant women; members of any household with a child under 6 months of age; healthcare workers; emergency medical personnel; and those with high-risk medical conditions up to age 65. All other groups are considered at very low risk.

You can get FluMist at Ventura County Health Care Agency Public Health Clinics or call your physician.

For more information, call 211 or 981-5390, or click on http://www.vchca.org/ph
: Re: Bill Frist calls h1n1 nasal vaccine "modified"
: Satyagraha October 14, 2009, 02:26:22 PM
Bill Maher says "no" to the flu vaccine. Author Bill Frist, while trying defend against Maher's use of the phrase "live virus", mentions that the difference between the inject-able vaccine and the nasal vaccine is that the nasal virus "has been modified"

http://www.wimp.com/billvaccines/ @ 4:30


Bill Frist - A member of the board of GE's Health Care group "Healthymagination":

http://www.healthymagination.com/board.html
(http://i612.photobucket.com/albums/tt201/Pilikia_photos/GE_Med_Sellouts.png)
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Satyagraha October 14, 2009, 02:34:28 PM
US homeland security to police the Net
http://news.zdnet.co.uk/internet/0,1000000097,2126311,00.htm
Declan McCullagh, CNET News.com  CNet
Published: 21 Nov 2002 12:55 GMT

A massive new bureaucracy will play a major role in securing software, hardware and the Net

The overwhelming vote by the Senate on Tuesday approving a Homeland Security Department has cleared the way for massive reorganisation of the federal government that will have a dramatic impact on computer and network security in the US.

The bill -- which sets the stage for the largest federal reorganisation since the Defence Department was formed in 1947 -- does more than reshuffle government agencies. It gives the government a major role in securing operating systems, hardware and the Internet, including allowing for more police surveillance of the Net; punishing malicious computer hackers with up to life in prison; establishing a national clearinghouse for computer and network security work; and spending at least half a billion dollars a year for homeland security research.

President Bush is expected to sign the bill by the end of the month. "The United States Congress has taken a historic and bold step forward to protect the American people by passing legislation to create the Department of Homeland Security," Bush said after the vote. "This landmark legislation, the most extensive reorganisation of the federal government since the 1940s, will help our nation meet the emerging threats of terrorism in the 21st century."

Attorney General John Ashcroft heralded the Senate's 90-9 vote for the massive new bureaucracy, which combines about 170,000 employees from 22 existing agencies, as beginning "a new era of cooperation and coordination in the nation's homeland defence."

Earlier on Tuesday, the Senate voted 52-47, largely along party lines, to reject Democratic amendments to the bill.

The final bill prohibits the Justice Department's proposed citizen-informant program called TIPS (Terrorist Information and Prevention System) and rejects "the development of a national identification system or card." But privacy advocates and civil libertarians remain worried about the negative consequences of such a sweeping reorganisation of law enforcement functions with little oversight.

In a statement calling for more supervision of law enforcement practices, the Centre for Democracy and Technology said the plan "raises serious concerns about the privacy of Americans" by granting the government "substantial -- and potentially invasive -- authorities to compile, analyse and mine the personal information of millions of Americans".

Technology companies, on the other hand, praised the plan, which promises to be a cash cow for businesses that develop security products.

AeA, a trade group representing technology companies, in particular applauded a provision that would require the government to focus on small businesses.

"Some of the most cutting-edge technologies are being developed in smaller firms, but we are frequently lost in the shadow of the big guys," Michele Wong, chief executive officer of Synergex and an AeA board member, said in a statement.

Meanwhile, Microsoft is one of many large technology companies looking to further expand its government contracts into the homeland security arena. The company has named a new internal federal director of homeland security to work with the government on information technology issues.

After the federal reorganisation is complete, the new department will mash together five agencies that currently divvy up responsibility for "critical infrastructure protection." Those are the FBI's National Infrastructure Protection Centre, the Defence Department's National Communications System, the Commerce Department's Critical Infrastructure Assurance Office, an Energy Department analysis centre, and the Federal Computer Incident Response Centre.


Policing the Net

A last-minute addition to the bill last week, before the House approved it by a 299-121 vote, is the 16-page Cyber Security Enhancement Act. It stiffens prison terms for hackers, expands the ability of police to conduct Internet or telephone eavesdropping without first obtaining a court order, and grants Internet providers more latitude to disclose information about subscribers to police.

Another addition, which was opposed by open-government activists and journalist groups, says that information businesses give the department that's related to "critical infrastructure" will not be subject to the Freedom of Information Act. That could include details on virus research, security holes in applications, or operating system vulnerabilities.

Included in the bill is a Homeland Security Advanced Research Projects Agency (HSARPA), modelled after the Defence Advanced Research Projects Agency, which will receive at least $500m (£323m) a year to fund the development of new technologies. According to the bill, HSARPA will "promote revolutionary changes in technologies that would promote homeland security, advance the development (of technologies), and accelerate the prototyping and deployment of technologies that would address homeland vulnerabilities".

The final version of the mammoth, 484-page bill also does the following:

* Establishes an office that is designed to become "the national focal point for work on law enforcement technology". Categories include computer forensics, tools for investigating computer crime, firearms that recognise their owner, and DNA identification technologies. The office also is charged with funding the development of tools to help state and local law enforcement agencies thwart computer crime.

* Creates a Directorate for Information Analysis and Infrastructure Protection that is charged with analysing vulnerabilities in systems including the Internet, telephone networks, and other critical infrastructures.

* Orders the creation of "a comprehensive national plan for securing the key resources and critical infrastructure of the United States" including information technology, financial networks and satellites.

* Requires all federal agencies, including the CIA, the Defence Department, and National Security Agency, to provide the new department with any "information concerning the vulnerability of the infrastructure of the United States."

* Punishes any department employee with one year in prison for disclosing details that are "not customarily in the public domain" about critical infrastructures.

* Creates a privacy representative and a civil liberties officer to ensure that the department follows reasonable "privacy protections relating to the use, collection and disclosure of personal information."

* Orders the department to provide technical assistance and confidential warnings of potential vulnerabilities to companies that operate "critical information systems."

* Allows the department to create a national corps of volunteers to "assist local communities to respond and recover from attacks on information systems and communications networks."

* Creates a Homeland Security Institute to perform systems analysis, risk analysis, and simulation and modelling to determine the vulnerabilities of critical infrastructures, including the Internet.

The nine senators who voted against the bill were Democrats Robert Byrd of West Virginia, Paul Sarbanes of Maryland, Daniel Akaka and Daniel Inouye of Hawaii, Edward Kennedy of Massachusetts, Russ Feingold of Wisconsin, Fritz Hollings of South Carolina, and Carl Levin of Michigan. Democratic-leaning independent James Jeffords of Vermont also opposed the bill.

News.com's Lisa Bowman contributed to this report.
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Satyagraha October 14, 2009, 02:37:37 PM
Department of Homeland Security (DHS)
http://www.fairness.com/resources/relation?relation_id=6808

* Homepage: http://www.dhs.gov/
Self Description

    May 2004: The agencies slated to become part of the Department of Homeland Security will be housed in one of four major directorates: Border and Transportation Security, Emergency Preparedness and Response, Science and Technology, and Information Analysis and Infrastructure Protection.

    The Border and Transportation Security directorate will bring the major border security and transportation operations under one roof, including:

        * The U.S. Customs Service (Treasury)
        * The Immigration and Naturalization Service (part) (Justice)
        * The Federal Protective Service
        * The Transportation Security Administration (Transportation)
        * Federal Law Enforcement Training Center (Treasury)
        * Animal and Plant Health Inspection Service (part)(Agriculture)
        * Office for Domestic Preparedness (Justice)

    The Emergency Preparedness and Response directorate will oversee domestic disaster preparedness training and coordinate government disaster response. It will bring together:

        * The Federal Emergency Management Agency (FEMA)
        * Strategic National Stockpile and the National Disaster Medical System (HHS)
        * Nuclear Incident Response Team (Energy)
        * Domestic Emergency Support Teams (Justice)
        * National Domestic Preparedness Office (FBI)

    The Science and Technology directorate will seek to utilize all scientific and technological advantages when securing the homeland. The following assets will be part of this effort:

        * CBRN Countermeasures Programs (Energy)
        * Environmental Measurements Laboratory (Energy)
        * National BW Defense Analysis Center (Defense)
        * Plum Island Animal Disease Center (Agriculture)

    The Information Analysis and Infrastructure Protection directorate will analyze intelligence and information from other agencies (including the CIA, FBI, DIA and NSA) involving threats to homeland security and evaluate vulnerabilities in the nation's infrastructure. It will bring together:

        * Critical Infrastructure Assurance Office (Commerce)
        * Federal Computer Incident Response Center (GSA)
        * National Communications System (Defense)
        * National Infrastructure Protection Center (FBI)
        * Energy Security and Assurance Program (Energy)

    The Secret Service and the Coast Guard will also be located in the Department of Homeland Security, remaining intact and reporting directly to the Secretary. In addition, the INS adjudications and benefits programs will report directly to the Deputy Secretary as the U.S. Citizenship and Immigration Services.
    http://www.dhs.gov/dhspublic/display?theme=13&content=3345

: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Satyagraha October 14, 2009, 02:39:39 PM
DHS concludes public phase of quadrennial review
http://www.federalnewsradio.com/?nid=35&sid=1782275
October 12, 2009 - 4:19am

The Department of Homeland Security has wrapped up the third and final phase of its public comment period on its agency-wide Quadrennial Homeland Security Review.

DHS officials say that more than 20,000 people participated in the first-ever web-based discussion on the department's performance when it comes to its core mission of homeland security.

Officials will now boil down all the responses from the open comment period into the final report to Congress being prepared by DHS secretary Janet Napolitano. The report must be delivered to Capitol Hill by December 31st of this year.

: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Satyagraha October 14, 2009, 02:48:09 PM
http://www.federalnewsradio.com/?nid=35&sid=1783816
Analysis: Does Congress understand cybersecurity, technology use?

October 12, 2009 - 1:10pm

By Max Cacas
Reporter
FederalNewsRadio

Under the U.S. Constitution, Congress provides both oversight and funding for the activities of federal government agencies. But how well do Capitol Hill lawmakers do when it comes to really understanding the federal agencies they oversee?

Recently, we covered the opening of a local museum's exhibit on cybersecurity, and a panel on technology in government, and asked the question, "How well does Congress understand the challenges involved in that area?"

At the opening of the International Spy Museum's gallery on cybersecurity entitled "Weapons of Mass Disruption", Jim Lewis from the Center for Strategic and International Studies, and a co-author of a report on cybersecurity submitted to President Obama at the start of his presidency, cites what he calls 'the conversion experience':

    You can talk to congressmen before the classified briefing, and it's like, 'why are you bothering me with this stuff?' When you talk to them after the classified briefing, what they say is, 'Is it safe to do online banking?' But it also helps if you're a member of Congress, and say, you meet with some Tibetan human rights activists, and someone gets on your office network, and harvests your files. So what I hear from people on the Hill is a lot of interest. There's currently 18 bills pending on cybersecurity, that's amazing. Second, it's bipartisan, it's non-partisan, both parties agree we have a real problem, and we have to do something about it. So when you see Senator Rockefeller, Senator Snowe, Senator Lieberman, Senator Collins, you see a real bipartisan effort, and that's encouraging.

That said, Lewis also thinks that we're unlikely to see any action on those cybersecurity bills this year because, as he told the Spy Museum audience, "there are other things on the agenda that will eat it up, but in 2010, we'll see some progress on the Hill."

Also speaking at the Spy Museum opening, Mike McConnell, the former Director of National Intelligence, believes members of Congress understanding of cybersecurity issues is improving.

    The question is, do they understand? Broadly, not yet, but increasingly, members are getting the briefings and so on, so we're on a positive trend.

McConnell goes on to say, however, that it's the tradition of Congress (and the government) to be mostly reactive, and almost never proactive to issues like cybersecurity. He cites the creation of the Federal Reserve System in 1913, as a reaction to the banking crisis then, and the creation of Social Security as a reaction to the Great Depression.

When it comes to cybersecurity, McConnell believes that Congress and the government must move beyond the impulse for top secret plans to combat cyberthreats, as happened during the most recent Bush administration, and having an open and public discussion about our vulnerability, "even if it means revealing some of our thinking on what some of us might do in an attack scenario."

At the recent Excellence in Government conference on the use of technology and the government, Vivek Kundra, Office of Management and Budget's Federal Chief Information Officer, was recently asked to comment on the challenge of engaging Congress on matters related to technology, given the legislative branch's oversight responsibility, and 'power of the purse':

    We're working very closely with the Congress. If you look at what we did with the IT dashboard when we launched it, we worked closely with the Hill, we worked closely with the Government Accountability Office, and the IG community. But part of the problem we have is how to optimize the spending within the federal government. Horizontally, the greatest challenge we have is to deliver on these platforms around procurement systems. The challenge comes in terms of the specific bureaus and showing enduring value to moving to a platform-centric environment rather than a vertical environment.

Kundra says until now, the challenge with the Hill has been moving past the old notions of "data centers and infrastructure."

Aneesh Chopra, the President's Chief Technology Officer, adds in answer to the same question, that all the key legislation now proposed by the White House, including health care reform, energy, higher education, all have provisions for transparency and efficiency using new technologies, as he puts it "as a core component of the legislation."

David McClure, associate administrator with the Office of Citizen Services at General Services Administration, calls the area of congressional oversight a "thorny area", citing the fact that the Congress is composed of 535 individuals who are running for re-election almost from the day they are elected to office.

    The secret is results, both short term and long term, we've got to perform, we've got to deliver, but we've also got to stay on course.

McClure concluded by saying even when agency heads are leaving office at the end of a Presidential* term, it's their job to make sure that any project they initiate with Congress's help must be "moving toward a good target." *Reinforcing the fact that there is no left/right - there is only one force making these plans... the NWO fascist corporate bankster bastards via their revolving door puppets.


: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Satyagraha October 16, 2009, 11:11:00 AM
PayChoice Suffers Another Data Breach
http://voices.washingtonpost.com/securityfix/2009/10/paychoice_suffers_another_data.html?wprss=securityfix

Payroll services provider PayChoice took its Web-based service offline for the second time in a month on Wednesday in response to yet another data breach caused by hackers.

Moorestown, N.J. based PayChoice, provides direct payroll processing services and licenses its online employee payroll management product to at least 240 other payroll processing firms, serving 125,000 organizations. On Thursday morning, the company sent a notice to its customers saying it had once again closed onlineemployer.com - the portal for PayChoice's online payroll service -- this time after some clients began noticing bogus employees being added to their payroll.

"After investigation, we determined that valid user credentials for an Online Employer user were used in an unauthorized manner to add these fictitious employees in an attempt to have payments made to fraudulent bank accounts," the company said in an e-mail alert to their clients sent Thursday.

This week's attack appears to be the second stage of a sophisticated cyber assault launched last month against PayChoice customers. In that attack, hackers broke into the company's servers and stole customer user names and passwords. The attackers then included that information in e-mails to PayChoice's customers warning them that they needed to download a Web browser plug-in in order to maintain uninterrupted access to onlineemployer.com. The supposed plug-in offered in that e-mail was instead malicious software designed to steal the victim's user names and passwords.

The statement sent to customers Thursday said that in this week's attack the thieves appear to have stolen login IDs and passwords by exploiting a weakness in the Web site component that allows customers to change their onlineemployer.com password. PayChoice also said it has disabled the change password capability on the site until it can eliminate the vulnerability, and that it had modified all login IDs to prevent access to the site using potentially compromised credentials.

In response to questions, the company sent an e-mailed statement, attributed to PayChoice chief executive Robert Digby.

"On Thursday, PayChoice deployed additional security measures to protect client data after the company identified a key mechanism used by online attackers. PayChoice's Online Employer site was briefly taken off line after the company discovered a security breach that occurred on October 14. PayChoice reopened the site with limited functions as it continues to tighten the security based on forensic findings from Wednesday's attack," Digby wrote. "PayChoice has communicated directly with its clients with precautionary recommendations and will update them as more information is available."

Steve Friedl, a blogger and security expert who writes the Unixwiz blog and is also a consultant for Evolution Payroll - a PayChoice competitor - said the timing of this latest attack was notable: Friedl said most of the payroll industry leaders -- including PayChoice -- are busy exhibiting and attending talks at a major industry conference in Park City, Utah this week.

"The timing is impeccable," Friedl said. "Paychoice and many of their licensees are at a major payroll conference in Utah, so it's a ripe time to slip something by a short-staffed operation."

By Brian Krebs  |  October 15, 2009; 8:40 PM ET

: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: phosphene October 16, 2009, 06:17:11 PM
the Teredo protocol remotely and automatically forwards ports on old routers. Supposedly for ipv6 purposes. Can't turn it off either. Scary stuff.

Teredo tunneling
http://en.wikipedia.org/wiki/Teredo_tunneling


Teredo is a tunneling protocol designed to grant IPv6 connectivity to nodes that are located behind IPv6-unaware NAT devices. It defines a way of encapsulating IPv6 packets within IPv4 UDP datagrams that can be routed through NAT devices and on the IPv4 internet.
Contents
[hide]

    * 1 Purpose
    * 2 Overview
          o 2.1 Teredo node types
          o 2.2 Teredo IPv6 addressing
          o 2.3 Teredo servers
          o 2.4 Teredo relays
    * 3 Limitations
    * 4 Alternatives to Teredo
    * 5 Security considerations
          o 5.1 Exposure
          o 5.2 Firewalling
          o 5.3 Blocking
    * 6 Implementations
    * 7 Choice of the name Teredo
    * 8 References
    * 9 External links

[edit] Purpose

6to4, the most common IPv6 over IPv4 tunneling protocol, requires the tunnel endpoint to have a public IPv4 address. However, many hosts are currently attached to the IPv4 Internet through one or several NAT devices, usually because of IPv4 address shortage. In such a situation, the only available public IPv4 address is assigned to the NAT device, and the 6to4 tunnel endpoint needs to be implemented on the NAT device itself. Many NAT devices currently deployed, however, cannot be upgraded to implement 6to4, for technical or economic reasons.

Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind NATs can be used as Teredo tunnel endpoints even when they don't have a dedicated public IPv4 address. In effect, a host implementing Teredo can gain IPv6 connectivity with no cooperation from the local network environment.

Teredo is intended to be a temporary measure: in the long term, all IPv6 hosts should use native IPv6 connectivity. The Teredo protocol includes provisions for a sunset procedure: Teredo implementation should provide a way to stop using Teredo connectivity when IPv6 has matured and connectivity becomes available using a less brittle mechanism.
[edit] Overview

    For a complete explanation, see Teredo Overview in External links.

The Teredo protocol performs several functions:

   1. Diagnoses UDP over IPv4 (UDPv4) connectivity and discovers the kind of NAT present (using a simplified replacement to the STUN protocol);
   2. assigns a globally-routable unique IPv6 address to each host using it;
   3. encapsulates IPv6 packets inside UDPv4 datagrams for transmission over an IPv4 network (this includes NAT traversal);
   4. routes traffic between Teredo hosts and native (or otherwise non-Teredo) IPv6 hosts.

[edit] Teredo node types

Teredo defines several different kinds of node:

    * A Teredo client is a host which has IPv4 connectivity to the internet from behind a NAT and uses the Teredo tunneling protocol to access the IPv6 Internet. Teredo clients are assigned an IPv6 address that starts with the Teredo prefix (2001:0000::/32).

    * A Teredo server is a well-known host which is used for initial configuration of a Teredo tunnel. A Teredo server never forwards any traffic for the client (apart from IPv6 pings), and has therefore very modest bandwidth requirements (a few hundred bits per second per client at most)[citation needed], which allows a single server to support large numbers of clients. Additionally, a Teredo server can be implemented in a fully stateless manner, thus using the same amount of memory regardless of how many clients it supports.

    * A Teredo relay serves as the remote end of a Teredo tunnel. A Teredo relay must forward all of the data on behalf of the Teredo clients it serves, with the exception of direct Teredo client to Teredo client exchanges. Therefore, a relay requires a lot of bandwidth and can only support a limited number of simultaneous clients. Each Teredo relay serves a range of IPv6 hosts (e.g. a single campus/company, an ISP or a whole operator network, or even the whole IPv6 Internet); it forwards traffic between any Teredo clients and any host within said range.

    * A Teredo host-specific relay is a Teredo relay whose range of service is limited to the very host it runs on. As such, it has no particular bandwidth or routing requirements. A computer with a host-specific relay will use Teredo to communicate with Teredo clients, but it will stick to its main IPv6 connectivity provider to reach the rest of the IPv6 Internet.

[edit] Teredo IPv6 addressing

Each Teredo client is assigned a public IPv6 address which is constructed as follows (the higher order bit is numbered 0):

    * Bits 0 to 31 are set to the Teredo prefix (normally 2001:0000::/32).
    * Bits 32 to 63 embed the primary IPv4 address of the Teredo server that is used.
    * Bits 64 to 79 can be used to define some flags. Currently only the higher order bit is used; it is set to 1 if the Teredo client is located behind a cone NAT, 0 otherwise. For Microsoft's Windows Vista and Windows Server 2008 implementations, more bits are used. In those implementations, the format for these 16 bits is "CRAAAAUG AAAAAAAA", where "C" remains the "Cone" flag, and the 12 "A" bits are randomly chosen by the Teredo client to introduce additional protection for the Teredo node against IPv6-based scanning attacks.
    * Bits 80 to 95 contains the obfuscated UDP port number. This is the port number that is mapped by the NAT to the Teredo client with all bits inverted.
    * Bits 96 to 127 contains the obfuscated IPv4 address. This is the public IPv4 address of the NAT with all bits inverted.

As an example, 2001:0000:4136:e378:8000:63bf:3fff:fdd2 refers to a Teredo client:

    * using Teredo server at address 65.54.227.120 (4136e378 in hexadecimal),
    * located behind a cone NAT (bit 64 is set),
    * using UDP mapped port 40000 on its NAT (in hexadecimal 63bf xor ffff equals 9c40, or decimal number 40000),
    * whose NAT has public IPv4 address 192.0.2.45 (3ffffdd2 xor ffffffff equals c000022d, which is to say 192.0.2.45).

[edit] Teredo servers

    For a list of existing Teredo servers, see the list in External links.

Teredo servers are used by Teredo clients to autodetect the kind of NAT behind which they are located (if any), through a simplified STUN-like qualification procedure. Teredo clients also maintain a binding on their NAT toward their Teredo server, by sending a UDP packet at regular time intervals. That ensures that the server can always contact any of its clients, which is required for hole punching to work properly.

If a Teredo relay (or another Teredo client) has to send an IPv6 packet to a Teredo client, it will first send a Teredo bubble packet to the client's Teredo server, whose IP address can be inferred from the Teredo IPv6 address of the Teredo client. The server can then forward the bubble to the client, so the Teredo client software knows that hole punching must be done toward the Teredo relay.

Teredo servers can also transmit ICMPv6 packet from Teredo clients toward the IPv6 Internet. In practice, when a Teredo client wants to contact a native IPv6 node, it must find out where the corresponding Teredo relay is (i.e. which public IPv4 and UDP port number to send encapsulated IPv6 packets to). To do that, the client crafts an ICMPv6 Echo Request (ping) toward the IPv6 node, and sends it through its configured Teredo server. The Teredo server decapsulates the ping onto the IPv6 Internet, so that the ping should eventually reach the IPv6 node. The IPv6 node should then reply with an ICMPv6 Echo Reply, as mandated by RFC 2460. This reply packet will be routed to the closest Teredo relay, which will finally try to contact the Teredo client.

Maintaining a Teredo server requires little bandwidth because they are not involved into the actual transmission and reception of IPv6 packets. Also, it does not involve any access to the Internet routing protocols. The only requirements for a Teredo server are:

    * the ability to emit ICMPv6 packets with a source address belonging to the Teredo prefix,
    * two distinct public IPv4 addresses (although not written down in the official specification, Microsoft Windows clients expect both addresses to be consecutive); the second IPv4 address is needed for the purpose of NAT detection.

Public teredo servers:

    * teredo.remlab.net / teredo-debian.remlab.net (France)
    * teredo.autotrans.consulintel.com (Spain)
    * teredo.ipv6.microsoft.com (USA, Redmond) (default for WindowsXP/2003/Vista/2008 OS)
    * teredo.ngix.ne.kr (South Korea)

[edit] Teredo relays

A Teredo relay potentially requires a lot of network bandwidth. Also, it must export (advertise) a route toward the Teredo IPv6 prefix (2001:0::/32) to other IPv6 hosts. That way, the Teredo relay will receive traffic from the IPv6 hosts addressed to any Teredo client, and forward it over UDP/IPv4. Symmetrically, it will receive packets from Teredo clients addressed to native IPv6 hosts over UDP/IPv4 and inject those into the native IPv6 network.

In practice, network administrators can set up a private Teredo relay for their company or campus; this will provide a short path between their IPv6 network and any Teredo client. However setting up a Teredo relay on a scale beyond that of a single network requires the ability to export BGP IPv6 routes to the other autonomous systems (AS's).

Unlike 6to4, where the two halves of a connection can use different relays, traffic between a native IPv6 and a Teredo host will use the same Teredo relay, namely the one that is closest to the native IPv6 host network-wise. The Teredo host cannot localize a relay by itself (since it cannot send IPv6 packets by itself); if it needs to initiate a connection to a native-v6 host, it will send the first packet through the Teredo server, which sends a packet to the native-v6 host using the client's Teredo IPv6 address. The native-v6 host then responds as usual to the client's Teredo IPv6 address, which will eventually cause the packet to find a Teredo relay, which will initiate a connection to the client (possibly using the Teredo server for NAT piercing). The relay is then used for communication between the two hosts for as long as is needed. This design means that neither the Teredo server nor client needs to know the IPv4 address of any Teredo relays; a suitable one is automatically found by means of the global IPv6 routing table, since all Teredo relays advertise the network 2001:0::/32.

    For near-realtime information on Teredo and BGP, see the External links.

On March 30, 2006, Italian ISP ITGate was the first AS to start advertising a route toward 2001::/32 on the IPv6 Internet, so that RFC 4380-compliant Teredo implementations would be fully usable. As of 16 February 2007, it is not functional.

In Q1 2009, IPv6 backbone Hurricane Electric enabled 14 Teredo relays[1] in an anycast implementation and advertising 2001::/32 globally. The relays were located in: Seattle, Fremont, Los Angeles, Chicago, Dallas, Toronto, New York, Ashburn, Miami, London, Paris, Amsterdam, Frankfurt and Hong Kong.

It is expected that large network operators will be maintaining Teredo relays. As with 6to4, it remains however unclear how well the Teredo service will scale up if a large proportion of Internet hosts start using IPv6 through Teredo in addition to IPv4.

While Microsoft has been operating a set of Teredo servers ever since the first Teredo pseudo-tunnel for Windows XP was released, it has never provided a Teredo relay service for the IPv6 Internet as a whole.
[edit] Limitations

Teredo is not compatible with all NAT devices. Using the terminology of RFC 3489, full cone, restricted and port-restricted NAT devices are supported, while symmetric NATs are not. National Chiao Tung University proposed SymTeredo which enhanced the original Teredo protocol to support symmetric NATs, and the Microsoft and Miredo implementations implement certain unspecified non-standard extensions to improve support for symmetric NATs. However, connectivity between a Teredo client behind a symmetric NAT, and a Teredo client behind a port-restricted or symmetric NAT remains seemingly impossible.[citation needed]

Indeed, Teredo assumes that when two clients exchange encapsulated IPv6 packets, the mapped/external UDP port numbers used will be the same as those that were used to contact the Teredo server (and building the Teredo IPv6 address). Without this assumption, it would not be possible to establish a direct communication between the two clients, and a costly relay would have to be used to perform triangle routing. A Teredo implementation tries to detect the type of NAT at startup, and will refuse to operate if the NAT appears to be symmetric. (This limitation can sometimes be worked around by manually configuring a port forwarding rule on the NAT box, which requires administrative access to the device).

Teredo can only provide a single IPv6 address per tunnel endpoint. As such, it is not possible to use a single Teredo tunnel to connect multiple hosts, contrary to 6to4 and some point-to-point IPv6 tunnels.

The bandwidth available to all Teredo clients toward the IPv6 Internet is limited by the availability of Teredo relays (which are no different in that respect from 6to4 relays).
[edit] Alternatives to Teredo
Main article: IPv6#Transition mechanisms

6to4 requires a public IPv4 address, but provides a large 48-bit IPv6 prefix for each tunnel endpoint, and has a lower encapsulation overhead.

Point-to-point tunnels (Network_topology#Point-to-point) can be more reliable and are more accountable than Teredo, and typically provides permanent IPv6 addresses that do not depend on the IPv4 address of the tunnel endpoint. Some point-to-point tunnel brokers additionally support UDP encapsulation to traverse NATs (for instance, the AYIYA protocol can do this). On the other hand, point-to-point tunnels normally require registration. Automated tools (for instance AICCU) exist to make it easy to use Point-to-Point tunnels.
[edit] Security considerations
[edit] Exposure

Teredo increases the attack surface by assigning globally routable IPv6 addresses to network hosts behind NAT devices, which are otherwise mostly unreachable from the Internet. By doing so, Teredo potentially exposes any IPv6-enabled application with an open port to the outside. It also exposes the IPv6 stack and the Teredo tunneling software to attacks should they have any remotely exploitable vulnerability.

The Microsoft IPv6 stack has a "protection level" socket option. This allows applications to specify whether they are willing to handle traffic coming from the Teredo tunnel, from anywhere except Teredo (the default), or only from the local Intranet.

[edit] Firewalling

For a Teredo (pseudo-)tunnel to operate properly, outgoing UDP packets must not be filtered. Moreover, replies to these packets (i.e. "solicited traffic") must also not be filtered. This corresponds to the typical setup of a NAT and its stateful firewall functionality.
[edit] Blocking

Teredo tunneling software will detect a fatal error and stop if outgoing IPv4 UDP traffic is blocked.
[edit] Implementations

Several implementations of Teredo are currently available:

    * Windows XP SP2 includes a client and host-specific relay (also in the Advanced Networking Pack for Service Pack 1).
    * Windows Server 2003 has a relay and server provided under the Microsoft Beta program.
    * Windows Vista and Windows 7 have built-in support for Teredo with an unspecified extension for symmetric NAT traversal.
    * Miredo is a client, relay and server for Linux, *BSD and Mac OS X,
    * ng_teredo is a relay and server based on netgraph for FreeBSD from the LIP6 University and 6WIND.
    * NICI-Teredo is a relay for the Linux kernel and a userland Teredo server, developed at the National Chiao Tung University.


[edit] Choice of the name Teredo

The initial nickname of the Teredo tunneling protocol was shipworm. The idea was that the protocol would pierce holes through NAT devices, much like the shipworms bore tunnels through wood. Shipworms are responsible for the loss of very many wooden hulls, but Christian Huitema in the original draft noted that "the animal only survives in relatively clean and unpolluted water; its recent comeback in several Northern American harbors is a testimony to their newly retrieved cleanliness. Similarly, by piercing holes through NAT, the service would contribute to a newly retrieved transparency of the Internet."

Christian Huitema quickly changed the name to Teredo to avoid confusion with computer worms[2]. Teredo navalis is the Latin name of one of the best known species of shipworm.
[edit] References

   1. ^ Levy, Martin (2009-05-28). "Hurricane Electric's experience in deploying Teredo and 6to4 relays". LACNIC-XII/FLIP6 2009 Conference, Panama City, Panama. http://www.lacnic.net/documentos/lacnicxii/presentaciones/flip6/08_Martin_Levy.pdf.
   2. ^ Huitema, Christian (2001-12-19). "(ngtrans) Renaming Shipworm as Teredo?". IETF ngtrans wg mailing list. http://www.atm.tut.fi/list-archive/ngtrans/msg00776.html.

    * C. Huitema. Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs). RFC 4380, February 2006.

[edit] External links

    * Teredo Overview on Microsoft TechNet
    * Teredo relays: list of Teredo relays on BGPmon.net
    * Current anycast Teredo BGP routes
    * TEREDO-MNT: list of operators advertising the Teredo prefix via BGP
    * List of Teredo servers maintained by SixXS

Retrieved from "http://en.wikipedia.org/wiki/Teredo_tunneling"
Categories: IPv6 | Tunneling protocols
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: EvadingGrid October 16, 2009, 06:25:12 PM
Yea you can tunnel IPv6

You might also find it educational to actually try to get yourself a proper IPv6 connection.
At least go through the motions.

You'll be surprised what you find.




: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Republic Renewal October 18, 2009, 01:23:35 AM
Agree strongly with the name, so I will assume that your using a library computer, self generated home electricity, well-pumped water , and a self-installed heater all paid for by cash? Can I ask what you do for a living? Is your water pure and non-toxinated?

Don't get me wrong, you could be living with a friend like me. There is nothing in my name (except that my paycheck stubs come here, although i would prefer an under the table job. The only true (liveable) way to stay off the grid is either A become homeless  or B live with someone else whose name is on everything while you pay cash paid to you from under the table work. THIS IS ALL ASSUMING THAT WE AREN"T BEING WATCHED AT THIS MOMENT FROM SATELLITES! AS I AM SURE THEY WILL FIND YOU IF THEY NEED TO! PERHAPS TRACKING YOUR SOCIAL?
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: trailhound October 18, 2009, 12:39:49 PM
Agree strongly with the name, so I will assume that your using a library computer, self generated home electricity, well-pumped water , and a self-installed heater all paid for by cash? Can I ask what you do for a living? Is your water pure and non-toxinated?

Don't get me wrong, you could be living with a friend like me. There is nothing in my name (except that my paycheck stubs come here, although i would prefer an under the table job. The only true (liveable) way to stay off the grid is either A become homeless  or B live with someone else whose name is on everything while you pay cash paid to you from under the table work. THIS IS ALL ASSUMING THAT WE AREN"T BEING WATCHED AT THIS MOMENT FROM SATELLITES! AS I AM SURE THEY WILL FIND YOU IF THEY NEED TO! PERHAPS TRACKING YOUR SOCIAL?

(http://t0.gstatic.com/images?q=tbn:iz5c5vagZShFUM:http://www.purplemoon.com/Stickers/uncle-sam-motorcycle.jpg)

Alex interviews Rob Savoye on the Rainbow family
http://www.youtube.com/watch?v=p2DOPCVgHY4

Gomorrah...
http://www.youtube.com/watch?v=f1HYXRYSDic&feature=related
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Republic Renewal October 21, 2009, 11:52:47 PM
(http://t0.gstatic.com/images?q=tbn:iz5c5vagZShFUM:http://www.purplemoon.com/Stickers/uncle-sam-motorcycle.jpg)

Alex interviews Rob Savoye on the Rainbow family
http://www.youtube.com/watch?v=p2DOPCVgHY4

Gomorrah...
http://www.youtube.com/watch?v=f1HYXRYSDic&feature=related

So you live with hippies? I'm confused.
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Satyagraha October 28, 2009, 08:34:19 AM
The Flu will keep people at home sick.
Offices will ask workers to telecommute.
Telecommuters will "clog" the internet.
Internet services will be pared down to accommodate 'important' connections.
Internet switchover to new filtered, controlled internet will occur without complaints from anyone.

The end of the internet as we know it (place for truth) will be ushered in as people thank the government for protecting them.

This article from the CIA/Washington Post should ring alarm bells... this is what they're going to use to end all that pesky truth on the internet:

==================================================================

Flu-wary telecommuters may clog Web networks, GAO says
http://www.washingtonpost.com/wp-dyn/content/article/2009/10/27/AR2009102703743.html?hpid=topnews
By Cecilia Kang
Wednesday, October 28, 2009

As the spread of the H1N1 flu keeps more Americans away from work and school, a federal report warns that all those people logging on to the Web from home could overwhelm Internet networks.

The Government Accountability Office reported earlier this week that if the flu reaches a pandemic, a surge in telecommuting and children accessing video files and games at home could bog down local networks.

And if that were to happen, it is not clear whether the federal government is prepared to deal with the problem, the GAO said.

The Department of Homeland Security is in charge of communications networks during times of national emergency. But it doesn't have a strategy to deal with overloaded Internet networks -- an essential resource to keep the economy humming, and residents informed and connected during a pandemic, the GAO said. Furthermore, the DHS hasn't coordinated with agencies such as the Federal Communications Commission to create guidelines for how telecom, cable and satellite providers can minimize congestion.

Such confusion "would increase the risk that the federal government will not be able to respond rapidly or effectively if a pandemic quickly emerges," the GAO reported.

Network operators such as Comcast, AT&T, Cox and Verizon are limited in their options. They could add bandwidth capacity and lay down private lines for essential workers, but that is expensive and would take too long. Shutting down certain Web sites or prioritizing traffic could run into technical and regulatory hurdles, the report said.

An Internet service provider could decide to slow all connections in a certain neighborhood, but then that network operator would be violating contracts with customers, according to the report.

"Private Internet providers have limited ability to prioritize traffic or take other actions that could assist critical tele-workers. Some actions, such as reducing customers' transmission speeds or blocking popular Web sites, could negatively impact e-commerce and require government authorization," the GAO report said.

House Energy and Commerce Committee members commissioned the report, asking the GAO to specifically look at how financial markets would deal with such a scenario.

In its response to the GAO, the DHS said it didn't know which agency had clear or specific authority to allow telecom, cable and satellite companies to block or slow traffic to cope with congestion. The FCC can grant exceptions to its Internet access rules that would allow prioritization of certain traffic in instances where public safety is in jeopardy.

: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: ekimdrachir October 28, 2009, 02:28:57 PM
Saved
: OMG!! CYBER TERROR!! BE AFRAID! ... File-sharing software ban sought in House
: Satyagraha November 18, 2009, 06:45:51 AM
Those guys at Washington Post just don't STOP!!! They continue to spew bullshit stories...
They HATE the free internet... and I think they've got compromising photos of legislators...  ::)


(http://i612.photobucket.com/albums/tt201/Pilikia_photos/propaganda.png)

File-sharing software ban sought in House
http://www.washingtonpost.com/wp-dyn/content/article/2009/11/17/AR2009111703841_pf.html
By Paul Kane
Wednesday, November 18, 2009

Weeks after an embarrassing security breach revealed details of dozens of ethics investigations, a House committee chairman introduced legislation Tuesday that would forbid federal employees to use popular file-sharing technology that was involved in the leak.

Rep. Edolphus Towns (D-N.Y.), who chairs the House Oversight and Government Reform Committee, aims to outlaw federal workers from using networks such as LimeWire, through which network members can share computer and music files.

The Washington Post reported last month on the inner workings of the House Ethics Committee and the Office of Congressional Ethics. The information came from a committee document that a junior staffer had exposed on her home computer, which was using peer-to-peer technology. A non-congressional source with no connection to the committee accessed the document and gave a copy to The Post.

"We can no longer ignore the threat to sensitive government information that insecure peer-to-peer networks pose," Towns said in a statement. "Voluntary self-regulations have failed, so now is the time for Congress to act."

Other peer-to-peer security breaches in the last year have involved documents about the president's helicopter,
financial information belonging to Supreme Court Justice Stephen G. Breyer,
and the location of a Secret Service safe house for the first family.
: Re: CSIS J. Lewis: "Internet should be able to be shutdown like planes on 911"
: Anti_Illuminati January 25, 2010, 02:15:18 PM
http://thehill.com/component/content/article/545-technology/56947-obamas-power-over-internet-central-to-cybersecurity-debate

...Others say the president should be able to take such action. James Lewis, senior fellow for the Center for Strategic and International Studies, which last year issued a set of cybersecurity recommendations to Congress, likened the provision to President George W. Bush’s call to shut down airlines after the attacks of Sept. 11, 2001.

“It seems foolish not to have the same authority for cyberspace,” he said.
“It’s not that the president will wake up in a bad mood one day and implode Yahoo. This would apply only to severe national emergencies. … This is a great opportunity to blast us into a new level of discussion about cybersecurity.”

Excerpt from:  http://www.sovasec.com/

"James Lewis of the Center for Strategic and International Studies compared the provisions to President Bush’s decision to shut down airlines after the 9/11 attacks.

Next time you read a story that says ‘the government can’t shut down the internet because 90% of the infrastructure is privately owned’, I want you to think for a moment; did the government own the airlines?  Remember, once these systems are designated as critical infrastructure, regardless of their ownership, they will be required to comply with federal standards which put them indirectly under government control. Depending on who is attached to these networks, the systems will fall under control of either Homeland Security or the NSA.  Both competent agencies with the publics best interests at heart.

Obama Administration Seeks “Emergency Control” of the Internet (http://dissidentvoice.org/2009/08/obama-administration-seeks-emergency-control-of-the-internet/)

    Drafted by Senators Jay Rockefeller (D-WV) and Olympia Snowe (R-ME), “best friends forever” of the National Security Agency (NSA) and the telecommunications industry, they were key enablers of Bush-era warrantless wiretapping and privacy-killing data mining programs that continue apace under Obama.


Once the ‘emergency’ is declared, and the networks are commandeered, privacy’s already dead zombie corpse is beheaded and killed with fire, so not even the illusion of privacy would remain.

The initial question remains. Can America Take Over The Internet?

My initial reactionary response to this absurd question is “of course not”.  Though after some discussion it seems to be that with enough pressure from the United States, most international corporations, telecommunications providers, and ISP’s are likely to cave and accept the forced compliance standards.  After all if America gets the DNSSEC root, then the DHS will be able to shut down pretty much whatever they want on an international scale, not to mention that the IANA was a US Department of Defense contract which ICANN was created to handle after the death of John Postal

New Agreement Means Greater Independence in Managing the Internet’s System of Unique Identifiers (http://www.icann.org/en/announcements/announcement-29sep06.htm)

    “The United States Department of Commerce has clearly signaled that multi-stakeholder management of the Internet’s system of unique identifiers is the way ahead and ICANN is the obvious organization to take that responsibility,”- ICANN will no longer have its work prescribed for it. How it works and what it works on is up to ICANN and its community to devise;- ICANN is not required to report every 6 months as it has been under the MOU. It will now provide an annual report that will be targeted to the whole Internet community; – There is no requirement to report regularly to the DOC. The DOC will simply meet with senior ICANN staff from time to time. “The ICANN model of multi-stakeholder consultation is working and this agreement endorses it.

No requirement to report to the Department of Commerce, they can just come over for drinks every once in a while to see how things are going.   “Multi-stakeholder consultation”, makes me wonder where the ICANN is getting its funding.  Strangely enough, the federal funding for ICANN seems to be incompletely listed. (http://www.fedspending.org/fpds/fpds.php?company_name=INTERNET+CORPORATION+FOR+ASSIGNED+NAMES+AND+NUMBERS&sortby=r&detail=0&datype=T&reptype=r&database=fpds&fiscal_year=&submit=GO)

ICANN Funding (http://www.icann.org/en/comments-mail/icann-current/msg00717.html)

    "It is unclear from the above paragraph whether ICANN inherits IANA’s self-proclaimed mandate of ‘Preserving the central coordinating functions of the global Internet for the public good.’ However, it would appear that it is in a good position to assert end-users should be willing to pay. If they are not, then the internet should be allowed to fall apart. Certainly the regulatory authorities who have largely stepped aside to allow this experiment to happen ‘would like to see an economically rational and practical charging system – a contribution per name registered for example.’ Therefore ICANN devises a funding scheme that not only takes account of internediary functions, but goes directly to the beneficiaries of the connectivity ICANN preserves and asks them for a contribution appropriate to the value of their benefit. ICANN provides security and stability. What is the price of that stabilty and security? What further can ICANN do to provide these services? It is in terms of the above argument that, apart from registry contributions, well-wisher contributions (disallowed as political contirbutions long-term?), we devised a quadripartite funding plan which can draw income from the end-user services ICANN provides. However it is not suggested that ICANN, in its not-for-profit guise, should operate these income streams directly -this would hazard the not-for-profit status of ICANN and threaten its mandate-, but that it be an agreed beneficiary on a cost-recovery basis, whilst any other pooled income accrues to internediaries pro rata."

So now, I believe, the question should be: “Can the World Take The Internet From the USA?”
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: Outer Haven April 03, 2015, 01:12:37 AM
Is IPv6 already in place?
: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: EvadingGrid April 13, 2015, 06:34:30 AM
Is IPv6 already in place?

That is an interesting question.

The number of people able to use IPv6 is increasing all the time as ISP slowly but steadily implement it. Over time, ISP's will provide more and more services via IPv6 but this is still some way off, with only a few manufacturers producing fully IPv6 compatible DSL routers for instance.

Here is an example from the Verizon FAQ
I just picked them as a really big Amercian ISP, but its pretty much the same across the developed world


What are Verizon’s plans for deploying IPv6?
While IPv6 is needed to accommodate the growth in Internet usage, many existing servers and other Internet devices will not be speaking IPv6 for a while – the IPv4 format will still be in use for some time to come.

To best serve our customers during this time, Verizon is rolling out IPv6 address space in a "dual stack" mode – where IPv4 and IPv6 addresses are both loaded. The company will maintain IPv4 for those servers continuing to use that standard, and IPv6 for servers using this latest standard. The dual stack approach applies to both existing and new Verizon customers. Verizon is implementing these dual stack upgrades in its broadband network to support both FiOS and HSI Internet customers. The upgrades will start in 2013 and the first phase will include Verizon FiOS customers who have a dynamic IP address. Unless there is a need to enter an IP address directly, these changes will generally be transparent our customers.

: Re: Pentagon/Northcom to stage domestic Cyber attacks/w/1918 flu to usher in IPv6
: TahoeBlue April 19, 2015, 05:11:35 PM
Is IPv6 already in place?

ipv6 Tier 1

http://www.ntt.net/english/service/ipv6.html

NTT Com operates the world's largest tier 1 IPv6 backbone, spanning Asia, Europe, North America and Australia. Our global backbone has been fully upgraded to run dual stack both IPv4 and IPv6.