Hello, yes, the site has been pretty quiet for a while now. Between prepping for the last workshop, traveling, decompressing from traveling, and getting my life back in order I haven’t had much time to work on civil resistance stuff. But that’s changing! Lots more to come soon, and for now enjoy then new reading list page where I’ve uploaded lots of great articles that have informed my thinking. Good reading while you’re trapped indoors during a hurricane.
Kind of shocking to see the phrase “false flag events” in PC magazine. I’m inclined to think LulzSec is legit, but who knows?
Out of the blue, Citigroup was hacked, then the CIA, and then the FBI and other groups were hacked. Now I’m finding this a little odd and wondering who is being set up here. Supposedly, some of the hacks of government agencies stem from the arrest of a few hackers in Europe. This is an attempt to make the hackers appear to be online versions of Hezbollah, as there are retaliatory attacks reported. You know, the way terrorists would do it.
It’s all possible, but I’m suspicious of the whole scene. These hackers, who are normally casual in their approach, are made to look like bomb throwing Trotskyites from the 1920s, each wielding a Molotov cocktail and out to overthrow the government.
This above mental image, of course, is for public benefit. By making any one of these hackers appear to be a horrendous threat to public safety, a number of initiatives can be rushed through Congress. All sorts of onerous laws will be passed, which probably will not affect the scene at all but will allow more government intrusion into the Internet. It will become illegal to sell any programming tools that can be used by a hacker, despite the usefulness of these tools to security experts. It will also become a felony to attempt to deconstruct a password or enter a system for whatever reason.
I have predicted for years that at some point people are going to have to be registered and licensed to use the Internet at all. You can see it coming as clear as day. These hackers, of course, have to be stopped, and this is how they’ll do it.
There are events in history known as false flag events. These are staged by a government usually to distress the public, so the government can do something that the public would otherwise disapprove.
Take it as a given that governments and corporations have a vested interest in surveilling the population and subtly swaying it’s opinions. Also accept that they sacrifice a considerable percentage of their profits to further those interests. Also interesting here, it was the dreaded hackers, the new terrorist threat, who brought this information to light.
After having spent several months studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey. The programme appears to allow for the large-scale monitoring of social networks by way of such things as natural language processing, semantic analysis, latent semantic indexing and IT intrusion. At the same time, it also entails the dissemination of some unknown degree of information to a given population through a variety of means – without any hint that the actual source is US intelligence. Scattered discussions of Arab translation services may indicate that the programme targets the Middle East.
A year after the G20 summit in Toronto, the Toronto police have promised to permanently abandon the practice of “kettling,” through which groups of demonstrators and passers-by are gathered into a police line and held indefinitely without charge or judicial oversight. Kettling is a form of extrajudicial detention, and has been found illegal in many jurisdictions around the world. The G20 summit saw the largest mass-arrest in Canadian history, though practically no charges were laid:
This is something that I heard about months ago and still need to look into more. Could be very interesting for planning campaign strategies.
A software companion to a 30+ year-old CIA research methodology, Open Source Analysis of Competing Hypotheses (ACH) will help you think objectively and logically about overwhelming amounts of data and hypotheses. It can also guide research teams toward more productive discussions by identifying the exact points of contention.
A newly-released study from the Congressional Research Service bolsters claims that the nation’s largest banks profited off the Federal Reserve’s financial crisis-era programs by borrowing cash for next to nothing, then lending it back to the federal government at substantially higher rates.
The report reinforces long-held beliefs that the banking system in essence engaged in taxpayer-financed arbitrage: They got money for free, then lent it back to Uncle Sam while collecting juicy returns. Left out of the equation are the millions of everyday borrowers, like households and small businesses, who were unable to secure loans needed to tide them over until the crisis ended.