Author Topic: AI Enterprise Architecture for C.O.G./command and control of all U.S. cities  (Read 60324 times)

0 Members and 1 Guest are viewing this topic.

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #80 on: July 27, 2009, 09:10:00 am »
Several people from Unisys IP addresses have visited my blog since I linked to AI's video yesterday.  I also noticed some anonymous IPs from Maryland hitting the page around the same time.

uh oh...their on to us! BRING IT ON YOU BASTARDS!!! YOU CAN'T HIDE YOUR TRUE INTENTIONS ANY LONGER!!!
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Offline zeke105

  • Member
  • *****
  • Posts: 669
  • “Liberty means responsibility."
    • Veracity Videos
Re: New must see video from the NWO brutally exposing their own agenda!
« Reply #81 on: July 27, 2009, 09:27:53 am »
Yeah notice how the guy basically says:  "We don't have a problem with terrorism, it's very minimal."  DUH, THAT'S BECAUSE THEY'VE TAKEN AWAY YOUR RIGHTS TO A LARGE EXTENT!  OF COURSE THERE WON'T BE ANYMORE TERROR WORLDWIDE ONCE EVERYONE IS IN DEATH CAMPS, PERMANENT PRISONS, OR DEAD!

Btw I uploaded the video here also, BUT IT WANT'S A DONATION TO SEE IT PAST 8 AND A HALF MINS INTO THE 32 MIN VIDEO AND WON'T SHOW THE REST, AND THE BELOW SITE IS MENTIONED HERE:  http://forum.prisonplanet.com/index.php?topic=117546.0

http://vids.rationalveracity.com/v/826,supply-chain-eugenics-total-enslavement-grid.html

Viewing videos on Veracity Videos are completely free. I will never charge for watching videos. If it only shows 8 minutes, there was probably a problem with conversion. If you ever have the problem above, you can contact me through the internal email system as Zeke or at [email protected]m, and I will promptly help to make sure the video is converted correctly.

Advertise on VeracitySane made me do it!Veracity Videos - Find the Truth
NewsX - Alternative News Resource

Offline zeke105

  • Member
  • *****
  • Posts: 669
  • “Liberty means responsibility."
    • Veracity Videos
Re: New must see video from the NWO brutally exposing their own agenda!
« Reply #82 on: July 27, 2009, 09:30:39 am »
Maybe I'll try bitcomet, trying to seed w/utorrent and it isn't doing jack, dunno why.

Daily Motion isn't viable because it has a 20 minute limit and a 150 MB filesize limit.  I didn't see any limitations on Vimeo, which I am uploading to now, but I hope I don't run into that crap with them.

Once again if anyone knows of a site that has the following characteristics for video uploads let me know:

No re-compression
At least 500 MB filesize limit
1 hour+ time duration limit (or more)
NO donations required to view full length (veracity videos)
NO proprietary software required to view full length (veoh)


Veracity Videos does not require donations as said above, and we have a max file limit of 1 GB, but that can be increased as needed.

Advertise on VeracitySane made me do it!Veracity Videos - Find the Truth
NewsX - Alternative News Resource

Offline zeke105

  • Member
  • *****
  • Posts: 669
  • “Liberty means responsibility."
    • Veracity Videos
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #83 on: July 27, 2009, 09:34:35 am »
I am downloading it now, and I will upload it to VV as soon as I have it. -Z

Advertise on VeracitySane made me do it!Veracity Videos - Find the Truth
NewsX - Alternative News Resource

EvadingGrid

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #84 on: July 27, 2009, 10:01:32 am »
EG  that looks great, I have it on wmv now!! 

Thanks Luckee . . .

Here is the link for you folks

Download Here

http://anonymous.selfip.org/

Offline zeke105

  • Member
  • *****
  • Posts: 669
  • “Liberty means responsibility."
    • Veracity Videos
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #85 on: July 27, 2009, 11:22:25 am »
Watch or download here:

http://vids.rationalveracity.com/v/831,supply-chain-eugenics-total-enslavement-grid.html

There is also .flv conversion software on the website if you follow the "tutorials" link at the bottom. The AVC software will convert to most formats (and the basic version is free).

Advertise on VeracitySane made me do it!Veracity Videos - Find the Truth
NewsX - Alternative News Resource

Offline ChristSavage

  • Member
  • *****
  • Posts: 972
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #86 on: July 27, 2009, 11:26:31 am »
I'll have to watch it a time or 2 more to understand it completely, but so far, it is fantastic.  Well Done AI.

Offline zeke105

  • Member
  • *****
  • Posts: 669
  • “Liberty means responsibility."
    • Veracity Videos
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #87 on: July 27, 2009, 12:24:30 pm »
The video did not convert completely. I need to check the settings on the server, but I will manually upload a full version shortly.

Advertise on VeracitySane made me do it!Veracity Videos - Find the Truth
NewsX - Alternative News Resource

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #88 on: July 27, 2009, 01:53:49 pm »
Nick Rockefeller's buddies and the plans to justify Ptech/Unysis insanity in the United States:

~~~~~~~~~~~~~~~~~~~

Military Review
May - June 2001
47 China's Electronic Strategies
http://www.au.af.mil/au/awc/awcgate/milreview/thomas.htm
by Lieutenant Colonel Timothy L. Thomas, US Army, Retired


Major General Dai Qingmin, director of the Chinese People's Liberation Army's (PLA's) Communications Department of the General Staff responsible for information warfare (IW) and information operations (IO), wrote that "new technologies are likely to find material expression in informationalized arms and equipment which will, together with information systems, sound, light, electronics, magnetism, heat and so on, turn into a carrier of strategies."1 Chinese strategies rely on electrons in unanticipated ways to fulfill stratagems such as "kill with a borrowed sword" or "exhaust the enemy at the gate and attack him at your ease."

The Chinese believe that superior strategies can help overcome technological deficiencies. A comparable equivalent to this theoretical development in military art would be a Russian virtual operational maneuver group of electron forces or a US air-land electron battle group.

Dai's article is an important benchmark in PLA military philosophy. First, he is a very credible and responsible figure. Before his present job, Dai commanded the PLA's Information Warfare Center in Wuhan. Second, he defines IW and IO with Chinese characteristics that are different from US definitions. Third, Dai broke tradition and advocated pre-emptive attack to gain the initiative and seize information superiority. This offensive emphasis contradicts China's military strategy of active defense. Finally, he noted that integrated and joint IO gives more scope and purpose to a people's war. Dai's article also indicates that China is clearly developing strategies to implement IW with Chinese characteristics. Other writers support his view with their own approaches to strategic IW.

The journal China Military Science is produced by the Academy of Military Science and approximates Joint Force Quarterly. It carries articles on a variety of current topics of interest to the PLA, to include information and psychological operations. Major General Dai Qingmin:


"Informationized arms . . . together with information systems, sound, light, electronics, magnetism, heat and so on, turn into a carrier of strategies."

The Fiscal Year 2000 report on China from the US Secretary of Defense to Congress (mandated by the National Defense Authorization Act) indicated growth in Chinese theory and capability. The report noted that since NATO air forces inadvertently bombed the Chinese Embassy in Belgrade on 7 May 1999, Chinese leaders have accelerated military modernization, pursued strategic cooperation with Russia and increased proliferation activities. In particular, China focused on fighting adversaries that had advanced information technologies and long-range precision weapons. The "active-defense" doctrine focuses on "People's War under modern conditions," which the secretary's report termed "local wars under high-tech conditions."2 Released on 16 October 2000, the Chinese Defense White Paper also emphasized China's people's war tradition, an empha-sis that surprised many Western followers of China who thought the idea had lost relevance in the information age. In fact, its importance has grown.

In September 2000, two weeks before the White Paper was released, the PLA Daily released an article on China's military telecommunications (telecom) developments. The article noted that in 1991 Chairman Jiang Zemin called for building common telecom systems for military and civilian use to meet peacetime and wartime needs.3 Only in such fashion could military telecom catch up with its civilian counterpart. One way to do this was to create reserve forces (a key component uniting civilian and military sectors in a people's war) with telecom and IW/IO missions. The paper noted, "We have built a reserve telecom force structure with a reserve telecom regiment as the backbone, with an information industrial department as the base . . . have built a reserve contingent of qualified high-tech telecom and transmission personnel with those specializing in satellite telecom, relay telecom, digital telecom, telegraph (telephone) telecom, and optical-fiber telecom as the main force . . . and have built a contingent of highly qualified personnel with computer experts, network monitoring experts, as well as radio telecom units serving as the backbone."4

China's reserve forces are now being armed with IW/IO missions and have become the high-tech link in the country's people's war theory. In the past, reserve forces' planned role in a people's war was supporting PLA forces defending against foreign intervention. Today's reserve forces can do something even the PLA could not for many years—reach out and touch someone continents away with electronic and information weapons. Properly targeted electronic attacks could be as devastating to a country's economy as damage inflicted by an intercontinental missile.
Civil-military cooperation and integration are growing in China in the information age, just as it is in the United States. Chairman Jiang Zemin (third from left) has called for building common telecom systems for military and civilian needs. One way to do this is to create reserve forces—a key component uniting civilian and military sectors in a people's war—with telecom and IW/IO missions.

China's defense industrial complex lags in developing high-technology equipment; therefore, China must find "selective pockets of excellence" according to the late Chinese leader Deng Xiaoping. One of these pockets appears to be internal telecom. The Secretary of Defense's report noted that military and civilian communications networks might be linked to help China in a crisis. The September PLA Daily report indicates that a civil-military telecom system is more likely. The military communications system is carried over multiple transmission lines to make it survivable, secure, flexible, mobile and less vulnerable to exploitation, destruction or electronic attack. The command automation data network can reportedly support limited preplanned conventional attack options along China's periphery.5

The reserve forces also reportedly have their own websites and simulation centers. China now has 400 military websites, according to one report.6 On 7 January 2001 several unidentified companies agreed to form the China C-Net Strategic Alliance, a second-generation Internet-like network for China's government and industry. No start dates for construction or completion were offered. The Xinhua News Agency release noted that "the current one [Internet] has too many faults and is incapable of satisfying the needs of the Chinese government and companies as they enter the digital age. It is unknown whether foreigners will have access to the net, or if it will be compatible with the existing net."7

IW/IO Strategy in China Military Science

The journal China Military Science, which approximates Joint Force Quarterly, has provided a limited forum for IW/IO articles over the past year. However, the April 2000 issue was an exception. The journal contains three articles on IO subjects, and all three are important. One article is titled "The Current Revolution in Military Affairs and its Impact on Asia-Pacific Security," by Senior Colonel Wang Baocun. Wang is a well-respected author on IO subjects and works in the Foreign Military Studies Department of the Academy of Military Science, which publishes China Military Science. Wang's article is the only one in the issue in English and reflects a Western view of IW and the Revolution in Military Affairs. For example, Wang defines IW as "a form of combat actions which attacks the information and information systems of the enemy while protecting the information and information systems of one's own side. The contents of IW are military security, military deception, physical attack, electronic warfare, psychological warfare and net warfare, and its basic purpose is to seize and maintain information dominance."8

Wang provided a very different definition of IW when writing for the same journal in 1997. His description of IW contained the elements of Soviet/Russian military science, covering the nature, forms, levels, distinctions, features and principles of IW. Wang listed forms of IW as peacetime, crisis and wartime; the nature of IW as reflected in offensive and defensive operations; levels of IW as national, strategic, theater and tactical; and other distinctions of IW as command and control, intelligence, electronic-psychological, cyberspace, hackers, virtual, economics, strategy and precision. He listed features of IW as complexity, limited goals, short duration, less damage, larger battle space and less troop density, transparency, intense struggle for information superiority, increased integration, increased demand on command, new aspects of massing forces and the fact that effective strength may not be the main target. He stated that principles of IW include decapitation, blinding, transparency, quick response and survival.9

The two definitions Wang offered reflect two ways of viewing IW in China. The first definition is through the prism of Western theory, and the second is through the prism of Soviet/Russian military science, which was used extensively from the 1950s to the early 1990s. In recent lectures, Wang spoke of "informationalized warfare," a concept Dai used quite often in his article.10
 

"On Information Warfare Strategies," by Major General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui at the Communications and Command Institute, appeared in the same April 2000 issue. The authors define IW stratagems as "schemes and methods devised and used by commanders and commanding bodies to seize and maintain information supremacy on the basis of using clever methods to prevail at a relatively small cost in information warfare."11 Chinese leaders believe that stratagems to technological inferiority can be achieved by combining human qualitative thinking with computer-assisted quantitative calculations. The authors suggest devising stratagems that are based on cognition and technology (information acquisition and processing).

Senior Colonel Wang Baocun of the PLA's Academy of Military Sciences lecturing at the US Army Command and General Staff College in January 2001 on "Informationalized War," a concept that Major General Dai also addresses.
Asians and Occidentals view combining stratagems with technology differently. The authors note that, "Traditionally, Oriental people emphasize stratagems and Occidental people emphasize technology . . . Occidental soldiers would seek technological means when encountering a difficulty, while Oriental soldiers would seek to use stratagems to make up for technological deficiencies without changing the technological conditions. Oriental soldiers' traditional way of thinking is not conducive to technological development, but can still serve as an effective way of seeking survival in a situation of danger."12 IW stratagems can:

Direct commanders' thinking and force them to make errors by attacking cognitive and belief systems.

Generate heavy psychological pressure by using intimidation to signal inevitable victory concentrating forces and coordinating information networks.

Intimidate by demonstrating capabilities.

Adopt active and effective measures to generate surprise, and use decisive technical equipment and IW means.

Develop and hide IW "killer weapons."

Hide reality by creating a fictitious reality.

Apply deceptive schemes simultaneously or consecutively.

Use all IW means to maintain supremacy.

Mislead the enemy by pretending to follow his wishes.

Release viruses to contaminate information flows.

Control time elements by conducting information "inducement," deception," "concealment" and "containment."13

These strategies are designed to force cognitive errors in the enemy and create a multidimensional threat with which the enemy must contend.

Dai on Information Operation
Strategies and a People's War

A third article in the April 2000 issue is Dai's "Innovating and Developing Views on Information Operations." Dai defines an information operation as "a series of operations with an information environment as the basic battlefield condition, with military information and an information system as the direct operational target, and with electronic warfare and a computer network war as the principal form."14 Since these operations are trials of strength focusing on knowledge and strategies, Dai recommends a "focus on strategies."

Scientific and technological developments have given strategies a new playing field. A strategy may carry different contents under different technological conditions, allowing room for traditional strategies, and new ones mapped out by new technological means. Options include new information-confrontation strategies, adding strategic wings to technology or applying strategies in light of technology.15 If technology finds expression in arms and equipment, then information systems and even electrons can be strategy carriers. A good strategy can "serve as a type of invisible fighting capacity; may make up inadequate material conditions to a certain extent; may narrow a technological or equipment gap between an army and its enemy; and may make up for a shortage of information, fighting forces or poor information operational means."16 Some of these strategies include:

Jamming or sabotaging an enemy's information or information system.

Sabotaging an enemy's overall information operational structure.

Weakening an enemy's information fighting capacity.

Dispersing enemy forces, arms and fires while concentrating its own forces, arms and fire.

Confusing or diverting an enemy and creating an excellent combat opportunity for itself.

Diverting an enemy's reconnaissance attempt and making sufficient preparations for itself.

Giving an enemy a false impression and launching a surprise information attack on him at the same time.

Blinding or deafening an enemy with false impressions.

Confusing an enemy or disrupting his thinking.

Making an enemy believe that what is true is false and what is false is true.

Causing an enemy to make a wrong judgment or take wrong action.17

Dai also emphasizes that future operations must be integrated. One such concept will be integrating military and civilian information fighting forces. Dai believes that information systems offer more modes for people to take part in IO and serve as a major aux-iliary information fighting force in a future information war.18 Integrating civilian and military specialists will breathe new life into Mao Zedong's theory of people's war. Chinese IW specialist General Wang Pufeng first noted this condition in 1995.19

Ideas for uniting a people's war with IW are finding fertile ground in China's 1.5-million reserve force. Several IW reserve forces have already been formed in the cities of Datong, Xiamen, Shanghai, Echeng and Xian. Each is developing its own specialty as well. For example, Shanghai reserve forces focus on wireless telecom networks and double-encryption passwords.

In Xian, the People's Armed Forces Department reportedly is working with several strategies that resemble Dai's idea of turning light, sound and electronics into strategy carriers. IW Fenduis (divisions) acted as opposing forces for a military district exercise in Jilin Province (Shenyang Military Region). Ten IO methods, which could also be considered as electronic strategies, follow:

Planting information mines.

Conducting information reconnaissance.

Changing network data.

Releasing information bombs.

Dumping information garbage.

Disseminating propaganda.

Applying information deception.

Releasing clone information.

Organizing information defense.

Establishing network spy stations.20

Whether these strategies are used in external reconnaissance of foreign operating systems today is unknown.

A third, significant way the information age has affected China's attitude toward warfare is that China's 36 stratagems may find new meaning and application. Some 300 years ago an unknown scholar decided to collect and record China's stratagems. The Thirty-Six Stratagems: The Secret Art of War emphasizes deception as a military art that can achieve military objectives.21 In the information age, which is characterized by anonymous attacks and uncertainty, the stratagem just might be revitalized as a tactic. It should be easier to deceive or inflict perception-management injuries (guidance injuries in Chinese) as a result. The information age is developing into the anonymous persuaders' age.

Some argue that in today's high-tech world, these ancient stratagems no longer apply. However, a look at just the first five stratagems shows otherwise. Strategy one is "fool the emperor to cross the sea."22 Lowering an enemy's guard must be an open act, hiding true intentions under the guise of everyday activities. An IW application would be using regular e-mail services or Internet business links to mask insertions of malicious code or viruses. Strategy two is "besiege Wei to rescue Zhao": when the enemy is too strong to attack directly, attack something he holds dear. Today's IW implication is that if you cannot hit someone with nuclear weapons because of catastrophic effects on your own country, then attack the servers and nets responsible for Western financial, power, political and other systems' stability with electrons. Strategy three is "kill with a borrowed sword": when you do not have the means to attack the enemy directly, attack using another's strength. The IW application is simple—send viruses or malicious codes through a cutout or another country.

Strategy four is "await the exhausted enemy at your ease": choosing the time and place for battle is an advantage. Encourage the enemy to expend his energy in futile quests while you conserve your strength. When he is exhausted and confused, attack with energy and purpose. The IW application here is to use the people's war theory to send out multiple attacks while saving the significant attack until all the West's computer emergency response teams (CERTs) are engaged. Finally, strategy five is "loot a burning house": when a country is beset by internal conflicts, it will be unable to deal with an outside threat. The IW application is to put hackers inside the West under the guise of a student or business and attack from the inside. While chaos reigns, steal from information resources.

Integration also implies networking. In the August 2000 newspaper article "PRC Army Pays Attention to the Role of Network Warfare," a people's war received as much attention as networking. The author stated that Jiefangjun Bao [the Chinese armed forces newspaper] maintains that it is necessary to formulate rules and regulations regarding mobilization and preparation for "modern People's War," as well as information gathering and processing; online offensives and defense; and network technology research and exchanges, to provide norms for preparing and building a "network People's War."23

Attaining information superiority (Dai uses the term 32 times and the concept "information control" 11 times in his article) is crucial to using these strategies in a people's war and requires several steps. First, Dai notes that professional forces (perhaps the PLA) would obtain, transmit and process war information, and jam or sabotage enemy information or information systems. Nonprofessional forces (perhaps the reserves) protect specific targets and injure the enemy's effective fighting strength. Second, electronic warfare means (designed to sabotage information gathering and transmission) and network warfare means (designed to sabotage information processing and use) must be integrated. Third, "soft and hard" are to be used for forces and offensive and defensive operations.24 The offensive includes electronic, network and other units to destroy enemy electronic systems; and the defense consists of telecom, technical reconnaissance, radar and other units. Fourth, integrated, joint, all-dimensional operations must cover ground, sea, air and space.25

Dai remarks that to contend for information superiority requires viewing IO as an "active offensive." This viewpoint appears strongly to contradict the viewpoint expressed in China's subsequent White Paper that stressed China's adherence to an active defense posture. However, Dai notes that for defense to be positive, it must be an "active offensive defense," while a negative information defense will be passive. This word game appears designed to keep the "information active offense" in line with the White Paper.26 In this sense, Dai recommends the Kosovo model of the Serbs, who actively responded, over the Gulf War model of the Iraqis, who passively waited for the coalition's next step.

Other Information Strategies

A 1996 article notes that information technology is the core and foundation of the military revolution. Information and knowledge have changed the previous practice of measuring military strength, which was calculated by counting the number of armored divisions, air force wings and aircraft carrier battle groups. Invisible forces must be considered in calculating the correlation of forces today. These include:

Computing capabilities, to include capacity.

Communications capacity/volume.

System reliability.

Ability of reconnaissance systems.27

Each element could affect the information strategy employed by or against adversaries. These strategies also possess global reach, speed-of-light transmission and comprehensive integration.

In addition, knowledge and psychological factors must be evaluated as components of the correlation of forces. Knowledge war entails calculating significant changes to people, weaponry and military systems. The impact of a knowledge differential was obvious between US soldiers in the Gulf and Iraq. The high-tech coalition weaponry would have been practically useless to Iraqi soldiers, many of whom were illiterate. Future war, characterized by chessboard-type competition and high-tech knowledge embedded into weapon circuitry, will be "directed by master's degree holders, commanded by university students and conducted by experts." In addition, turning knowledge into weapons will occur more quickly. Networking competence, automation and real-time systems for early warning, reconnaissance, control and guidance, and attack will improve, enabling weapons to identify, differentiate and analyze targets automatically. Military systems will replace quantity and scale with quality and effectiveness.28 Knowledge war also includes developing superior strategies based on superior knowledge.

The primary conclusion from a review of Chinese IW stratagems is that strategy, the military art and science of conducting campaigns on a broad scale, has undergone a transformation. Concentrations of forces will be replaced by striking efficacy with information and energy, and lines between front and rear will blur. Operations will switch from firepower to detecting, concealing, searching and avoiding, making long-range combat replace hand-to-hand fighting. A core issue will be the fight for network supremacy, which will be necessary to win in strategy and battle simultaneously.

In a revolutionary development, clouds of electrons will be able to disable and destroy countries (usually via economic destruction but also via
information-psychological attacks) where once large armies were required. Electrons and information technologies are the new formations of 21st-century armed forces in China and other countries. Electrons in combat require focus on operational effectiveness instead of concentrating military strength. Building systems for soft destruction (signal deception or interference) will become as important as firepower, according to some Chinese analysts. The West should look to the East to explain these stratagems. As the Chinese note, they allow more time for strategic thinking than their Occidental counterparts.

A few new areas of emphasis support these strategies. They include the new criteria for figuring correlation of forces and the new emphasis on cognitive factors, especially psychological. For China, the information revolution has also breathed new life into an old yet timely Chinese strategy—people's war. The country can unite around this concept with its reserve forces and anyone with a laptop computer. For Western audiences, it is time to study these changes closely, and to adapt some into our way of conducting IW.


1.Qingmin Dai, "Innovating and Developing Views on Information Operations," Beijing Zhongguo Junshi Kexue, 20 August 2000, 72-77. Translated and downloaded from Foreign Broadcast Information Service (FBIS), 9 November 2000, <http://sun3.lib/uci.edu/~slca/microform/resources/f-g/f_049.htm>.

2.The Report to Congress Pursuant to the FY2000 National Defense Authorization Act, <www.defenselink.mil/news/Jun2000/china06222000.htm>.

3.Zhang Fuyou, "With Joint Efforts Made by Army and People, Military Telecommunications Makes Leap Forward," Beijing Jiefangjun Bao, September 2000, 9. Translated and downloaded from FBIS, <http://sun3.lib/uci.edu/~slca/microform/resources/f-g/f_049.htm>.

4.Ibid.

5.The Report to Congress.

6.Wei Kaqing, "On the Sudden Emergence of Military Websites," Beijing Zhongguo Guofang Bao, 6 November 2000, 4. Translated and downloaded from FBIS, 14 December 2000, http://sun3.lib/uci.edu/~slca/microform/resources/f-g/f_049.htm>.

7.Beijing, The Associated Press, 8 January 2001.

8.Wang Baocun, "The Current Revolution in Military Affairs and its Impact on Asia-Pacific Security," China Military Science, April 2000, 139.

9.Baocun, "A Preliminary Analysis of IW," Beijing Zhongguo Junshi Kexue, 20 November 1997, 102-11. Translated and downloaded from FBIS, <http://sun3.lib/uci.edu/~slca/microform/resources/f-g/f_049.htm>.

10.Ibid.

11.Niu Li, Li Jiangzhou, and Xu Dehui, "On Information Warfare Stratagems," Beijing Zhongguo Junshi Kexue, 12 January 2001, 115-22. Translated and downloaded from FBIS, <http://sun3.lib/uci.edu/~slca/microform/resources/f-g /f_049.htm>.

12.Ibid.

13.Ibid.

14.Dai, "Innovating and Developing Views on Information Operations."

15.Ibid.

16.Ibid.

17.Ibid.

18.Ibid.

19.Wang Pufeng, "Meeting the Challenge of Information Warfare," Zhongguo Junshi Kexue (China Military Science), 20 February 1995, 8-18. Translated and reported in FBIS-CHI-95-129, 6 July 1995, 29 and 30.

20.Xianjin Bao, 10 December 1999, provided by Mr. William Belk to the author via e-mail.

21.Wang Xuanming, The Thirty-Six Strategems: The Secret Art of War (China Books and Periodicals, December 1992).

22.These strategies and their meaning were downloaded from <http://www.chinastrategies.com>; the information-age interpretation is the author's.

23."PRC Army Pays Attention to the Role of Network Warfare," Hong Kong Zhongguo Tonnxun She, 6 August 2000, translated and downloaded from FBIS, <http://sun3.lib/uci.edu/~slca/microform/resources/f-g/f_049.htm>.

24.Dai. "Soft" means temporary sabotage or deception using electronic jamming, computer virus attacks, network infiltration, carbonized-fiber bombs, virtual reality attacks and psychological attacks. "Hard" means permanent sabotage, weakening an enemy's overall fighting capacity, and includes conventional arms, sabotage attacks with forces, attacks with electromagnetic pulses and attacks with arms-carrying direction finders.

25.Ibid.

26.Ibid.

27.Hai Lung and Chang Feng, "Chinese Military Studies Information Warfare," Kuang Chiao Ching, 16 January 1996, 22 and 23. Translated in FBIS-CHI-96-035, 21 February 1996, 33 and 34.

28.Jia Xi and Shi Hongju, "Analysis on Key Elements of Knowledge Warfare," Beijing Jiefangjun Bao, 18 September 2000. Translated and downloaded from FBIS, <http://sun3.lib/uci.edu/~slca/microform/resources/f-g/f_049.htm>.


Lieutenant Colonel Timothy L. Thomas, US Army, Retired, is an analyst with the US Army Foreign Military Studies Office, Fort Leavenworth, Kansas, and is an adjunct professor at the US Army's Eurasian Institute, Garmisch, Germany. He received a B.S. from the US Military Academy and an M.A. from the University of Southern California and is a graduate of the US Army Command and General Staff College and the US Army Russian Institute (USARI). He held various command and staff positions in the Continental United States and Europe, including director, Soviet Studies, USARI, Garmisch; inspector of Soviet tactical operations, Conference on Security and Cooperation in Europe, Eurasian Institute, Garmisch; and S2, 2d Brigade, and commander, Company C, 313th Military Intelligence Battalion, 82d Airborne Division, Fort Bragg, North Carolina. He is the assistant editor of the journal European Security. His article "Grozny 2000: Urban Combat Lessons Learned" appeared in the July-August 2000 issue of Military Review.

Photos:
People's Liberation Army
US Army
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline zeke105

  • Member
  • *****
  • Posts: 669
  • “Liberty means responsibility."
    • Veracity Videos
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #89 on: July 27, 2009, 03:00:35 pm »
The video is fixed.  :)

Advertise on VeracitySane made me do it!Veracity Videos - Find the Truth
NewsX - Alternative News Resource

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #90 on: July 27, 2009, 04:11:39 pm »
Well since it seems like they aren't gonna post my article again (god I hope they don't let someone scoop me again...) I'm gonna post it here.



IBM, UNISYS AND PARTNER CORPORATIONS PUSH SUPPLY CHAIN EUGENICS

By: Chris Paine

Sources:

Anti-Illuminati Film Productions
UNISYS
City of Minneapolis
Various IBM Commercials via YOUTUBE.com

   The global elite sure love to flaunt their intentions in front of the masses. Take the recent IBM propaganda push for the Global Information Grid (GIG) (ad 1, ad 2, ad 3) technology or “Smart Grid” as they call it. Their most brazen push so far is blatantly showing how all of your personal information would be accessible from a single database that is connected to multiple agencies around the world. They even push their eugenics propaganda when they talk about “tailoring vaccines to your DNA”.  These ads run multiple times a day on national television right now!

   UNISYS, an international computer security firm that has ties to virtually all sectors of the government, is actually taking on the eugenics agenda from a technological perspective called “Supply Chain Eugenics”. According to their recent propaganda video, they describe the many facets of industry that their security technology can protect or control by using Artificial Intelligence software that can determine problems or attacks before they occur. This software is oddly familiar to the capabilities of the AI software recently coming back out into the spotlight known as Ptech. They also specifically make the point multiple times in their video that those who do not comply with the system “get left behind” and will die.

   The major example of a modern day place using this technology is the city of Minneapolis, Minnesota. During the bridge collapse over the Missouri River in 2007, the City's Information website was being “bombarded” by traffic and needed attention in order to help notify the general public of the disaster. The Chief Information Officer, Lynn Willenbring, states that UNISYS called her and offered to take over all of the IT functions of the city immediately in order to “fix” their problems, free of charge! Today, UNISYS runs all IT functions of transportation and security in the City of Minneapolis, with street cameras and database “protection” software. They also have wireless broadband anywhere in the city, accessible by businesses and citizens alike.

   However, while all of those things may seem like nice “perks” and benefits, do not be fooled. They are all tools of control used by the NWO to suppress the population. They will have the power of  all of your personal data and total control over the use of the internet at their fingertips allowing them to make sure that people only travel where they say we can and only use what they provide for us and only hear what they want us to hear. It will be used to totally monopolize the markets and make everything function in their favor.

   The video provided by Anti-Illuminati Film Productions, shows how the UNISYS video is linked to Indira Singh's testimony on Ptech, as well as accounts by John Zachman, the “father” of enterprise architecture (aka free thinking AI). It also shows how even 14 years ago in the Hollywood movie, “The Net” starring Sandra Bullock, the entire concept with Ptech (Gatekeeper in the movie) and the GIG going on right now, was thrown right in our faces and we didn't even know it! In the wake of potential catastrophic events, lets hope that the majority of the world wakes up about this before its too late because the price of remaining unaware  is nothing short of slavery.


http://www.vimeo.com/5770472
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #91 on: July 27, 2009, 04:26:23 pm »
Excellent article lavo - keep up the great work!
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

luckee1

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #92 on: July 27, 2009, 04:27:23 pm »
Lavosslayer  will you post that over here too?  It is the overseas version of Prison Planet Forumorum.

http://propagandamatrix.com/forum/index.php

Anti_Illuminati

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #93 on: July 27, 2009, 04:41:47 pm »
Well since it seems like they aren't gonna post my article again (god I hope they don't let someone scoop me again...) I'm gonna post it here.



IBM, UNISYS AND PARTNER CORPORATIONS PUSH SUPPLY CHAIN EUGENICS

By: Chris Paine

Sources:

Anti-Illuminati Film Productions
UNISYS
City of Minneapolis
Various IBM Commercials via YOUTUBE.com

   The global elite sure love to flaunt their intentions in front of the masses. Take the recent IBM propaganda push for the Global Information Grid (GIG) (ad 1, ad 2, ad 3) technology or “Smart Grid” as they call it. Their most brazen push so far is blatantly showing how all of your personal information would be accessible from a single database that is connected to multiple agencies around the world. They even push their eugenics propaganda when they talk about “tailoring vaccines to your DNA”.  These ads run multiple times a day on national television right now!

   UNISYS, an international computer security firm that has ties to virtually all sectors of the government, is actually taking on the eugenics agenda from a technological perspective called “Supply Chain Eugenics”. According to their recent propaganda video, they describe the many facets of industry that their security technology can protect or control by using Artificial Intelligence software that can determine problems or attacks before they occur. This software is oddly familiar to the capabilities of the AI software recently coming back out into the spotlight known as Ptech. They also specifically make the point multiple times in their video that those who do not comply with the system “get left behind” and will die.

   The major example of a modern day place using this technology is the city of Minneapolis, Minnesota. During the bridge collapse over the Missouri River in 2007, the City's Information website was being “bombarded” by traffic and needed attention in order to help notify the general public of the disaster. The Chief Information Officer, Lynn Willenbring, states that UNISYS called her and offered to take over all of the IT functions of the city immediately in order to “fix” their problems, free of charge! Today, UNISYS runs all IT functions of transportation and security in the City of Minneapolis, with street cameras and database “protection” software. They also have wireless broadband anywhere in the city, accessible by businesses and citizens alike.

   However, while all of those things may seem like nice “perks” and benefits, do not be fooled. They are all tools of control used by the NWO to suppress the population. They will have the power of  all of your personal data and total control over the use of the internet at their fingertips allowing them to make sure that people only travel where they say we can and only use what they provide for us and only hear what they want us to hear. It will be used to totally monopolize the markets and make everything function in their favor.

   The video provided by Anti-Illuminati Film Productions, shows how the UNISYS video is linked to Indira Singh's testimony on Ptech, as well as accounts by John Zachman, the “father” of enterprise architecture (aka free thinking AI). It also shows how even 14 years ago in the Hollywood movie, “The Net” starring Sandra Bullock, the entire concept with Ptech (Gatekeeper in the movie) and the GIG going on right now, was thrown right in our faces and we didn't even know it! In the wake of potential catastrophic events, lets hope that the majority of the world wakes up about this before its too late because the price of remaining unaware  is nothing short of slavery.


http://www.vimeo.com/5770472


Outstanding article.

Btw if anyone does scoop this that is a member of this site, I guarantee you that I will personally do everything in my power to get you permanently banned.

We did the research on this, not you.  I compiled the video (and wrote the video description), lavosslayer wrote the article not anyone else.

The relevancies and correlations illustrated with the strategic chaining of those videos the way they are is a result of over 1000 hours of research that I have done to understand WHY it matters and how it exactly all ties into everything.

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #94 on: July 27, 2009, 04:41:50 pm »
Lavosslayer  will you post that over here too?  It is the overseas version of Prison Planet Forumorum.

http://propagandamatrix.com/forum/index.php

Done :)
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

luckee1

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #95 on: July 27, 2009, 05:27:03 pm »
What happened to Anti_Illuminati's avatar?

nevermind, scared me there for a minute!

Offline RemixNinja

  • Member
  • ****
  • Posts: 312
  • If you fail to prepare, then prepare to fail!
    • Remixx World!
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #96 on: July 27, 2009, 08:10:46 pm »
Is it okay to post that article on my blog in connection with the video?  I'll give you the source credit and link to you.

Offline John Galt

  • Member
  • *****
  • Posts: 866
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #97 on: July 27, 2009, 08:35:06 pm »
Excellent article lavo - keep up the great work!

I wholeheartedly agee, excellent job lavo!

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #98 on: July 27, 2009, 09:31:03 pm »
Is it okay to post that article on my blog in connection with the video?  I'll give you the source credit and link to you.

have at it! exposure is the key! and thanks everyone for the kudos definitely helps make it worth it, even if Infowars doesn't bite at least I know its not work done in vain.
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #99 on: July 27, 2009, 10:39:10 pm »
GE to Transform U.S. Military Base into Smart Grid Showcase
http://news.moneycentral.msn.com/ticker/article.aspx?Feed=BW&Date=20090708&ID=10127116&Symbol=GE
July 8, 2009 10:00 AM ET


With the goals of increasing energy security, energy efficiency, and promoting cleaner, alternative energy at U.S. military bases,GE today announced it has been awarded $2 million in Federal stimulus funding from the U.S. Department of Defense (DOD) for a smart microgrid demonstration project at Twentynine Palms Base, California.The base is the world's largest Marine Corps Base and it is the premier training facility in the world for Marine operations, drawing military personnel from all over the world for Combined Arms Exercises. GE and the Environmental Security Technology Certification Program (ESTCP) office at DOD are in the process of finalizing a contract for the project.

GE will design and demonstrate a smart energy management system that enables installations to more optimally manage on-site power generation and energy storage, while interacting with the regional electrical grid in a more intelligent and efficient way.Additionally, GE’s system will provide enhanced capabilities for installations to integrate renewable resources, such as solar energy, to help meet their electricity needs and reduce their carbon footprints.

According to the 2009 Defense Appropriations Act, U.S. military installations consumed 3.8 billion kilowatt-hours of electricity last year, enough electricity to power 350,000 households in the United States.In addition to high energy costs for these installations, critical defense facilities must operate seamlessly through a power outage or other infrastructure disturbance.These are two key challenges that a smarter, more intelligent grid management system will help to address.

“GE’s smart microgrid demonstration project will show how a more intelligent energy management system can help military bases further safeguard the operation of their power systems while also reducing overall energy costs,” said John Kern, Manager of GE’s Smart Grid Research Lab. “This project will serve as a model for other bases and it also will demonstrate how similar types of facilities, such as industrial complexes and universities, can take advantage of a smarter grid.”

U.S. military bases typically manage power in two ways:local power is generated on site for critical facility needs; and, the bases are connected to the larger U.S. electrical grid network.As part of the project, GE will provide an enhanced suite of microgrid control system technologies that will enable a military base to more effectively manage its local energy resources as well as the interaction with the larger electrical grid network.

To develop this new system, researchers at GE Global Research in Upstate New York will develop and incorporate advanced algorithms and computational decision engines into a microgrid controller built by GE Digital Energy. This microgrid controller will optimize the power generation and distribution within the microgrid. GE Fanuc Intelligent Platforms will also integrate many of these advanced technologies into a new supervisory control and software system that can span power generation and distribution as well as major power consumers within the microgrid.

GE has completed considerable research and development in microgrids in recent years for both the U.S. Department of Energy and the Canadian government.Because microgrids are essentially self-contained systems, they have great potential for enabling a higher penetration of clean, renewable power sources into the electrical distribution network.For contained complexes like a military base that can supplement their own power needs with power generation onsite, microgrids can be an attractive option for bringing more renewable power online.

About GE Global Research

GE Global Research is one of the world's most diversified industrial research labs, providing innovative technology for all of GE's businesses. Global Research has been the cornerstone of GE technology for more than 100 years, developing breakthrough innovations in areas such as medical imaging, energy generation technology, jet engines and lighting. GE Global Research is headquartered in Niskayuna, New York and has facilities in Bangalore, India, Shanghai, China and Munich, Germany. Visit GE Global Research at www.ge.com/research.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline RemixNinja

  • Member
  • ****
  • Posts: 312
  • If you fail to prepare, then prepare to fail!
    • Remixx World!
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #100 on: July 28, 2009, 12:20:51 am »
have at it! exposure is the key! and thanks everyone for the kudos definitely helps make it worth it, even if Infowars doesn't bite at least I know its not work done in vain.

Here's the link to it.  If you update the article, please let me know.

http://remixxworld.blogspot.com/2009/07/ibm-unisys-and-partner-corporations.html

Thanks for that information.

Mike Philbin

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #101 on: July 28, 2009, 12:36:09 am »
Well since it seems like they aren't gonna post my article again (god I hope they don't let someone scoop me again...) I'm gonna post it here.

Is there not some other alternative news agency where such Infowars-rejected articles as these can be posted? I mean, INFOWARS put out a call for such articles, "Just send it along and we'll publish it." and it's really in-depth and relevant to the whole Prison Planet topic. But they don't publish it? Is the article, is Anti Illuminati's documentary LIBELOUS, is that why IW won't touch it?

How odd.

Anyway, Chris, try ADBUSTERS with it - and they PAY REAL GOOD.

Mike

Offline TBH

  • Member
  • ***
  • Posts: 109
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #102 on: July 28, 2009, 02:15:06 am »
I think the editing is great Anti.  Very nicely done.  Another great article by Lavosslayer as well.  Hopefully they have the good sense to publish it.  I'm gonna keep seeding the torrent.  I'm hoping to find a full version of The Net to watch soon. 

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #103 on: July 28, 2009, 08:47:02 am »
I think the editing is great Anti.  Very nicely done.  Another great article by Lavosslayer as well.  Hopefully they have the good sense to publish it.  I'm gonna keep seeding the torrent.  I'm hoping to find a full version of The Net to watch soon. 

Its published!! ROCK ON! http://www.prisonplanet.com/ibm-unisys-and-partner-corporations-push-supply-chain-eugenics.html
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin


Orgetorix

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #105 on: July 28, 2009, 10:46:43 am »
Its published!! ROCK ON! http://www.prisonplanet.com/ibm-unisys-and-partner-corporations-push-supply-chain-eugenics.html

One small problem with your article is the 35W Bridge collapse was over the Mississippi River not the Missouri. Not a biggie, but all facts should be correct. Otherwise great article. My uncle used to work for Unisys.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #106 on: July 28, 2009, 10:46:52 am »
Its published!! ROCK ON! http://www.prisonplanet.com/ibm-unisys-and-partner-corporations-push-supply-chain-eugenics.html

Everyone, read the comments.

there are no government trolls so it is all investigative.

AWESOME STUFF!!!!

Promote the hell out of that article it is totally awesome!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

EvadingGrid

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #107 on: July 28, 2009, 11:53:50 am »
If you are seeding you need to increase your Upload Speed

So far I've given full 45 copies today...  about 14 - 15 Gigabytes (roughly)

Those of you that are seeding the torrent really need to consider increasing your upload, it will have no effect what so ever on your downloading and surfing the web.

Also torrents have an overhead, so setting low seed values does you no favours. In other words on low speed settings a large chunk of the bandwidth is used to keep connected and torrent housekeeping, and not distributing the actual movie data.

Those of you who have video accounts with people like You Tube need to upload the video onto the web. The more copies out there, the lesser chance of the video being censored and removed, and the more people we will reach.








Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #108 on: July 28, 2009, 01:05:12 pm »
One small problem with your article is the 35W Bridge collapse was over the Mississippi River not the Missouri. Not a biggie, but all facts should be correct. Otherwise great article. My uncle used to work for Unisys.

damn, your right...hmm...I wonder if I can get them to fix that...its a name issue not a fact issue so maybe...
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #109 on: July 28, 2009, 01:14:21 pm »
ok, I emailed them asking if they could make a small edit to the name of the river in the article...hopefully they are willing to do it. If not I hope that it doesn't discredit the information because the facts in the article are real...
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Orgetorix

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #110 on: July 28, 2009, 03:49:36 pm »
ok, I emailed them asking if they could make a small edit to the name of the river in the article...hopefully they are willing to do it. If not I hope that it doesn't discredit the information because the facts in the article are real...

Not a big mistake, if you didn't live in Minnesota you probably wouldn't notice it. ;)

Anti_Illuminati

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #111 on: July 28, 2009, 05:31:04 pm »
http://www.vimeo.com/5770472

Description added/updated.

It cannot be emphasized enough the statement by John Zachman (not in the video, because there is no video of him saying this that I am aware of, but knowing he said this gives monumental importance to everything else that he has said regarding Enterprise Architecture:

"You would know where the access points are, you'd know how to get in, you would know where the weaknesses are, you'd know how to destroy it."

You hear that Jay, Nick Rockefeller, Lt. Gen Harry Raduege, Gen Cartwright, Alexander Levis, John Grimes?  YOUR OWN HIGHLY PRAISED, AND REVERED SERVANT OF YOUR NEW WORLD ORDER ADMITTED THE TRUTH TO THE ENTIRE WORLD, YOUR OWN *FOUNDER* OF THE ARCHITECTURE THAT DIRECTLY EVEN MAKES WORLD GOVERNMENT ATTAINABLE BY YOU HAD MADE THIS STATEMENT YEARS AGO THAT PROVE YOUR "CYBER-SECURITY" CONCERNS (IN YOUR CONTEXT) ARE AN ABSOLUTE LIE.  THIS IS THE NEW WORLD ORDER EXPOSING THE NEW WORLD ORDER.  HEY FBI, ARE YOU READING THIS?  DO YOU NOT REALIZE HOW GRAVELY SERIOUS THIS IS?


EvadingGrid

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #112 on: July 28, 2009, 05:41:19 pm »
Here is the link for you folks

Download Here

http://anonymous.selfip.org/

Before anybody asks,

I just had to reset the server,
so it was "down" for about 15 mins
But the Server is now back up and on line.

Apologies for the disruption.
 ;D

30.7 GB uploaded today so far !

EvadingGrid

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #113 on: July 29, 2009, 09:24:41 am »
Before anybody asks,

I just had to reset the server,
so it was "down" for about 15 mins
But the Server is now back up and on line.

Apologies for the disruption.
 ;D

30.7 GB uploaded today so far !


I'm going to have to Stop this very soon.
As the server is doing 40+ Giga Bytes of Data a DAY . . .

See typically a hosting account will have a limit of say 40 Giga Bytes a MONTH . . .

Hope people understand, but I really, really, really going have to pull the plug.


So, anyone got a bulletproof link I could post as a 302 Redirect ?

I'll edit it to http://www.vimeo.com/5770472
For now . . .








Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #114 on: July 29, 2009, 09:56:37 am »
I'm going to have to Stop this very soon.
As the server is doing 40+ Giga Bytes of Data a DAY . . .

See typically a hosting account will have a limit of say 40 Giga Bytes a MONTH . . .

Hope people understand, but I really, really, really going have to pull the plug.


So, anyone got a bulletproof link I could post as a 302 Redirect ?

I'll edit it to http://www.vimeo.com/5770472
For now . . .


Dude as much as that sucks that its running your bandwidth up so high so fast, you realize that means that TONS of people around the world are reading my article and wanting to watch that video!? THAT IS BADASS!!!! KEEP ON WAKING UP PEOPLE!! WE CAN BEAT THESE BASTARDS!!! THEY ARE MOVING INTO OVERDRIVE AS OF LAST NIGHT!!! LETS SHOOT OUT THEIR TIRES AND DEMAND ARRESTS!!!
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #115 on: July 29, 2009, 10:47:09 am »
Dude as much as that sucks that its running your bandwidth up so high so fast, you realize that means that TONS of people around the world are reading my article and wanting to watch that video!? THAT IS BADASS!!!! KEEP ON WAKING UP PEOPLE!! WE CAN BEAT THESE BASTARDS!!! THEY ARE MOVING INTO OVERDRIVE AS OF LAST NIGHT!!! LETS SHOOT OUT THEIR TIRES AND DEMAND ARRESTS!!!

Get it while it is Hot!

The Video that can be watched over and over and over!

1,000x better than anything the MSM is telling ya!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline jack_2002

  • Member
  • ****
  • Posts: 297
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #116 on: July 29, 2009, 11:54:35 am »
>>> "Unisys was directly involved in the 9/11 false flag inside job black operation in order to spearhead and thrust upon the world everything shown in the video."

this UNISYS outfit is some kind of criminal "securicon" gang which is claiming
that if they are allowed to run the infrastructure of the NWO global police state then
the NWO empire can last forever...


EvadingGrid

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #117 on: July 29, 2009, 01:26:43 pm »
Dude as much as that sucks that its running your bandwidth up so high so fast, you realize that means that TONS of people around the world are reading my article and wanting to watch that video!? THAT IS BADASS!!!! KEEP ON WAKING UP PEOPLE!! WE CAN BEAT THESE BASTARDS!!! THEY ARE MOVING INTO OVERDRIVE AS OF LAST NIGHT!!! LETS SHOOT OUT THEIR TIRES AND DEMAND ARRESTS!!!

Yea well they if they hit my page, they get an instant redirect and jump straight to the Movie to watch On Line...
The article write up really helps . . .

I'll sort something better latter on, probably put back your description and directions to both the Torrent and the On line version.

As it is I've been out, i got soaked to the skin in the rain, so much for the global warming hoax !

http://www.vimeo.com/5770472

Watch On Line

luckee1

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #118 on: July 29, 2009, 02:30:14 pm »
Guys when I am not working, I am seeding it on vuze!  It is not as fast as EG's but it does happen. 

I know I have uploaded 11 times to my one down load.

EvadingGrid

  • Guest
Re: Finalized NWO video mini-doc now completed!- please help seed
« Reply #119 on: July 29, 2009, 05:43:20 pm »
Guys when I am not working, I am seeding it on vuze!  It is not as fast as EG's but it does happen. 

I know I have uploaded 11 times to my one down load.

Excellent, now we gotta persuade a few more people to do there bit for the cause.
 ;D