Kind of shocking to see the phrase “false flag events” in PC magazine. I’m inclined to think LulzSec is legit, but who knows?
Out of the blue, Citigroup was hacked, then the CIA, and then the FBI and other groups were hacked. Now I’m finding this a little odd and wondering who is being set up here. Supposedly, some of the hacks of government agencies stem from the arrest of a few hackers in Europe. This is an attempt to make the hackers appear to be online versions of Hezbollah, as there are retaliatory attacks reported. You know, the way terrorists would do it.
It’s all possible, but I’m suspicious of the whole scene. These hackers, who are normally casual in their approach, are made to look like bomb throwing Trotskyites from the 1920s, each wielding a Molotov cocktail and out to overthrow the government.
This above mental image, of course, is for public benefit. By making any one of these hackers appear to be a horrendous threat to public safety, a number of initiatives can be rushed through Congress. All sorts of onerous laws will be passed, which probably will not affect the scene at all but will allow more government intrusion into the Internet. It will become illegal to sell any programming tools that can be used by a hacker, despite the usefulness of these tools to security experts. It will also become a felony to attempt to deconstruct a password or enter a system for whatever reason.
I have predicted for years that at some point people are going to have to be registered and licensed to use the Internet at all. You can see it coming as clear as day. These hackers, of course, have to be stopped, and this is how they’ll do it.
There are events in history known as false flag events. These are staged by a government usually to distress the public, so the government can do something that the public would otherwise disapprove.
Take it as a given that governments and corporations have a vested interest in surveilling the population and subtly swaying it’s opinions. Also accept that they sacrifice a considerable percentage of their profits to further those interests. Also interesting here, it was the dreaded hackers, the new terrorist threat, who brought this information to light.
After having spent several months studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey. The programme appears to allow for the large-scale monitoring of social networks by way of such things as natural language processing, semantic analysis, latent semantic indexing and IT intrusion. At the same time, it also entails the dissemination of some unknown degree of information to a given population through a variety of means – without any hint that the actual source is US intelligence. Scattered discussions of Arab translation services may indicate that the programme targets the Middle East.
Industrial designer and tinkerer Markus Kayser spent the better part of a year building and experimenting with two fantastic devices that harness the sun’s power in some of the world’s harshest climates. The first he calls a Sun Cutter, a low-tech light cutter that uses a large ball lens to focus the sun’s rays onto a surface that’s moved by a cam-guided system. As the surface moves under the magnified light it cuts 2D components like a laser. The project was tested for the first time in August 2010 in the Egyptian desert and Kayser used thin plywood to create the parts for a few pairs of pretty sweet shades. But he didn’t stop there.
DMT (dimethyltryptamine) is the most powerful and fast-acting of the tryptamine class of hallucinogens. After smoking DMT users regularly report fantastic trips to other dimensions and conversations with intelligent alien life forms. Meyer outlines DMT usage, pharmacology, mythology and occult application, including shamanic uses. He also presents fascinating anecdotal material regarding DMT “alien contact.” Materials from DMT researchers Terence McKenna, Gracie and Zarkov, and dozens of other correspondences are included, providing clues to deciphering the DMT “hyperspace” state.
Assume for a moment this is all true. What difference would it make?
This is something that I heard about months ago and still need to look into more. Could be very interesting for planning campaign strategies.
A software companion to a 30+ year-old CIA research methodology, Open Source Analysis of Competing Hypotheses (ACH) will help you think objectively and logically about overwhelming amounts of data and hypotheses. It can also guide research teams toward more productive discussions by identifying the exact points of contention.
Design is undergoing a revolution. Technology is empowering more people to create and disseminate designs, and professionals and enthusiasts are using it to share their work with the world. Open design is changing everything from furniture to how designers make a living.
Open Design Now: Why Design Cannot Remain Exclusive surveys this emerging field for the first time. Insiders including John Thackara, Droog Design’s Renny Ramakers and Bre Pettis look at what’s driving open design and where it’s going. They examine new business models and issues of copyright, sustainability and social critique. Case studies show how projects ranging from the RepRap self-replicating 3D-printer to $50 prosthetic legs are changing the world.
Why did the hackers at Lulz Security (“LulzSec”) invade Sony Pictures websites, take down cia.gov, and release 60,000+ e-mail addresses and passwords? For the lulz, of course—but what might look lulzy to one person could certainly enrage another. In honor of its 1,000th tweet, the witty wankers of LulzSec released a manifesto of sorts, defending their actions to the angry Internets.
Sure, they’re in it for the lulz, but they claim that their behavior is also in the public interest. What—don’t most public servants end their dispatches with “Thank you, bitches”?
In a sure sign that the virtual currency Bitcoin has hit the mainstream, a new Trojan horse program discovered in the wild Thursday seeks out and steals victims’ Bitcoin wallets, the same way other malware goes for their banking passwords or credit card numbers.