Anyway, I did correspond recently with VM about what was happening here and while I will not reproduce her comments here, I will say that she does not agree with desertfae's version of reality at all, nor does she trust her agenda.
Moderators: Elvis, DrVolin, Jeff
stoneonstone wrote:How very strange. Earlier this morning I was thinking about the large box of documents I have from an access to info request with the RCMP about Promis, from the early 90s. Thought about tossing it, or looking up Bill Hamilton after all these years to see if he wanted it for old-times-sake.
If it's useful to someone, better than putting it in the recycle bin.
Globe and Mail reporter Eric Reguly might have some documents he'd like to get rid of now - at one point he was also researching Promis (as I was)...and was so freaked out, a friend actually wrote a play about his experiences/fears/findings/reconstructions.
Riconnoscutio is, well, like Ari Ben Menashi; what he knows first-hand, and what he molds and sculpts from second and third parties into recognizable objects, is, well, impossible to sort out.
GH
American Dream wrote:Bridge It wrote:![]()
Anyway, I did correspond recently with VM about what was happening here and while I will not reproduce her comments here, I will say that she does not agree with desertfae's version of reality at all, nor does she trust her agenda.
justdrew wrote:stoneonstone wrote:How very strange. Earlier this morning I was thinking about the large box of documents I have from an access to info request with the RCMP about Promis, from the early 90s. Thought about tossing it, or looking up Bill Hamilton after all these years to see if he wanted it for old-times-sake.
If it's useful to someone, better than putting it in the recycle bin.
Globe and Mail reporter Eric Reguly might have some documents he'd like to get rid of now - at one point he was also researching Promis (as I was)...and was so freaked out, a friend actually wrote a play about his experiences/fears/findings/reconstructions.
Riconnoscutio is, well, like Ari Ben Menashi; what he knows first-hand, and what he molds and sculpts from second and third parties into recognizable objects, is, well, impossible to sort out.
GH
I'd love to see any actual documentation for PROMIS, user manuals, etc... Who supported this almost magical software? I can turn a box of papers into a PDF fairly quickly.
desertfae wrote:justdrew wrote:stoneonstone wrote:How very strange. Earlier this morning I was thinking about the large box of documents I have from an access to info request with the RCMP about Promis, from the early 90s. Thought about tossing it, or looking up Bill Hamilton after all these years to see if he wanted it for old-times-sake.
If it's useful to someone, better than putting it in the recycle bin.
Globe and Mail reporter Eric Reguly might have some documents he'd like to get rid of now - at one point he was also researching Promis (as I was)...and was so freaked out, a friend actually wrote a play about his experiences/fears/findings/reconstructions.
Riconnoscutio is, well, like Ari Ben Menashi; what he knows first-hand, and what he molds and sculpts from second and third parties into recognizable objects, is, well, impossible to sort out.
GH
I'd love to see any actual documentation for PROMIS, user manuals, etc... Who supported this almost magical software? I can turn a box of papers into a PDF fairly quickly.
I don't think at this point with open cases it would be wise to have all this stuff all over the net. It can affect how the court may see the documentation. If you live anywhere near Louisville, KY though I'd be willing to meet with you and show you some stuff if we met in a very public place.
Rachel
Bridge It wrote:This blog is still available.
You don't have to go thru way back. http://dreamsend.wordpress.com/
It's the new stuff that he's pulled. There was a lot of Michael Jackson pattern recognition and then the clues about the "McNair conspiracy." What is that thing where people see patterns in everything and feel that they are enlightened somehow because they see it and others don't. He seemed to have that going on. I read his big "wow" over the discovery that Michael Jackson danced like Bob Fosse in the Billy Jean video...and I am thinking to myself....uh huh, and so did everybody on broadway in the 70's 80's. Because Bob Fosse was a very influential force in the dance arts then - and this is precisely when Michael Jackson learned to dance. Duh.
nathan28 wrote:Bridge It wrote:This blog is still available.
You don't have to go thru way back. http://dreamsend.wordpress.com/
It's the new stuff that he's pulled.
Somebody HTTrack it before it disappears
Honestly though, I can't ask that anyone, anywhere actively help me in this because too many people have died already.. I can't take the chance that someone would be hurt helping me. I've put myself in danger doing this and don't want to put anyone else in harms way.. these people are very 'ugly' if you know what I mean.
Thats not to say if someone has a document or whatever that I would discourage them from sharing it at all.. or if someone wants to get me paperwork or whatever... I just don't want anyone getting too deep into this due to the nature of it, ya know?
The octopus has a way of tangling you up in it before you realize you're a part of it... it's highly complicated and with so much disinfo out there you really do have to go through stuff to weed out the bad info. Also when speaking with people involved you have to do backgrounds on everyone to see who you can trust and who you can't...
Searcher08 wrote:Since that time I have been interested in exploring what ARE the dangerous areas of research - my take now is that the your area of research may be seen as a 'cold case' and does not pose any threat to you, but I may be very very wrong.
Searcher08 wrote:The areas that I have been told may reduce one's life expectancy include:
a) Links between 9/11 and the drug trade.
Both Daniel Hopsicker and Indira Singh were threatened - and AFAIK Indira is in hiding after the suspicious death of the late lamented (well lamented by 8bit and myself) Michael Corbin of the radio show '4 a closer look'
b) High level finance such as how the Bank of International Settlements really works.
c) High level corruption such as Sibel Edmonds discovered.
d) Anything associatd with the Franklin case
Searcher08 wrote:What is the latest on people like Michael Riconoscuito? William Hamilton? Robert Booth Nichols? (and what on earth was RBN's arms company being involved in farming out research to Japanese universities about "induction and activation of cytotoxic T-lymphocytes"??!!
Have these people you have been involved with got any connection with 'secret societies' such as Skull and Bones, to your knowledge?
Searcher08 wrote:You were really driven when you started this, but seem to have a very different view about it now - is that accurate?
cheers
daba64 wrote:nathan28 wrote:Bridge It wrote:This blog is still available.
You don't have to go thru way back. http://dreamsend.wordpress.com/
It's the new stuff that he's pulled.
Somebody HTTrack it before it disappears
Now it's all gone except for an old About Me section.
Weird that an ARG pops up here and DE disappears. Coincidence? You decide.
justdrew wrote:I'd love to see any actual documentation for PROMIS, user manuals, etc... Who supported this almost magical software? I can turn a box of papers into a PDF fairly quickly.
Working from either huge mainframe computer systems or smaller networks powered by the progenitors of today's PCs, PROMIS, from its first "test drive" a quarter century ago, was able to do one thing that no other program had ever been able to do. It was able to simultaneously read and integrate any number of different computer programs or data bases simultaneously, regardless of the language in which the original programs had been written or the operating system or platforms on which that data base was then currently installed.
In the mid 1970s, at least as far as computer programs were concerned, the "universal translator" of Star Trek had become a reality.
What would you do if you possessed software that could think, understand every language in the world, that provided peep holes into everyone else's computer "dressing rooms," that could insert data into computers without people's knowledge, that could fill in blanks beyond human reasoning and also predict what people would do - before they did it? You would probably use it wouldn't you? But Promis is not a virus. It has to be installed as a program on the computer systems that you want to penetrate.
The DOD is developing a parallel to Planet Earth, with billions of individual “nodes” to reflect every man, woman, and child this side of the dividing line between reality and AR.
Called the Sentient World Simulation (SWS), it will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information”, according to a concept paper for the project.
“SWS provides an environment for testing Psychological Operations (PSYOP),” the paper reads, so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.
The United States has confirmed it has been monitoring international financial transactions, including those in and out of Switzerland, for almost five years.
The Swiss government has remained quiet on the issue, but data protection experts and lawyers are concerned by Friday's revelations in the New York Times.
US Treasury Secretary John Snow defended the secret programme, carried out by the CIA and the Treasury, calling it "government at its best" and a valuable aid for fighting terrorism.
Snow confirmed that since just after the attacks on September 11 2001, the Treasury had been tapping into records of the Belgium-based Society for Worldwide Interbank Financial Telecommunication (Swift) for evidence of potential activity by terror groups.
"The legal basis for this subpoena is routine and absolutely clear," Treasury Under Secretary Stuart Levey told a hastily called news conference, adding that it was "a grave loss" that the surveillance programme had been revealed but indicated that it would continue.
Swift is a cooperative owned by the 7,800 financial institutions in more than 200 countries that use it. Its headquarters are in Brussels.
CIA could get access to even more EU banking records
Europeans are uneasy about US access to their financial information, but Germany's privacy commissioner fears the situation could soon get worse: the CIA and the Treasury Department might gain access to every single European interbank transaction.
Back in February, the European Parliament expressed its displeasure with the fact that the Society for Worldwide Interbank Financial Telecommunications (SWIFT) system was being regularly accessed by US authorities, including the CIA, as part of investigations into terrorist financing. Legislators wondered if SWIFT (a Belgium-based company) was obeying EU data protection laws, and proposals were floated that would ask SWIFT to stop mirroring its data to the US. According to Germany's Federal Data Protection Commissioner, Peter Schaar, the situation could get a lot messier: SWIFT might soon handle domestic as well as international fund transfers, and US authorities might then have access to every bank transfer in Europe.
SWIFT has rejected the idea of moving its mirrored servers out of the US, though. Francis Vanbever of SWIFT told a European Parliament committee this week that the system was necessary to avoid any disruptions to the worldwide system, and he pointed out that the company had no choice but to turn over data to the Americans. "After September 11th," he said, "we received a compulsory order to provide information on data stored in the US... We verified the situation with external legal counsel, which confirmed the US had the authority to issue the order. If we did not comply, we would face civil and criminal penalties, including fines or imprisonment."
Even without processing domestic transactions, SWIFT is already a giant in the banking world, and it's easy to see why concerns would be raised about any disclosure of the company's database. On March 1, 2007, SWIFT set a record for the volume of financial transactions handled in a single day as 14 .7 million messages passed through its network. Privacy advocates like Schaar worry about the potential for economic espionage and other kinds of abuse if US authorities keep using their subpoena power to gain access to such a transaction database, which would contain far more messages than the current version.
Combine these worries with earlier fears about a worldwide ECHELON surveillance system run by the US, the UK, and Australia (worries great enough that the European Parliament issued a lengthy report outlining everything it could discover about ECHELON [PDF]), and you have an explosive cocktail of paranoia. http://www.fas.org/irp/program/process/ ... lon_en.pdf
But one of those generators -- the one based on elliptic curves -- is not like the others. Called Dual_EC_DRBG, not only is it a mouthful to say, it's also three orders of magnitude slower than its peers. It's in the standard only because it's been championed by the NSA, which first proposed it years ago in a related standardization project at the American National Standards Institute.
The NSA has always been intimately involved in U.S. cryptography standards -- it is, after all, expert in making and breaking secret codes. So the agency's participation in the NIST (the U.S. Commerce Department's National Institute of Standards and Technology) standard is not sinister in itself. It's only when you look under the hood at the NSA's contribution that questions arise.
This is how it works: There are a bunch of constants -- fixed numbers -- in the standard used to define the algorithm's elliptic curve. These constants are listed in Appendix A of the NIST publication, but nowhere is it explained where they came from.
What Shumow and Ferguson showed is that these numbers have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can predict the output of the random-number generator after collecting just 32 bytes of its output. To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG.
A technological sleeper cell: The Chinese have manufactured counterfeit Cisco routers and switches and offered them at exceedingly low prices; U.S. vendors upgrading or replacing U.S. government IT systems used these counterfeit devices -- and the FBI and other government agencies are now worried that the gear offers the Chinese undetectable back-doors into highly secure government and military computer system; the FBI investigates
The (Irish) Government did not know about the monitoring scheme, but several EU central banks were informed about the programme, which was introduced after the terrorist attacks on September 11th 2001. Under the scheme the CIA can sift through millions of international banking transactions to try to identify potential terrorist financing. […]
It has emerged that several central banks across Europe knew that the Society for Worldwide Interbank Financial Telecommunications (Swift) has been providing infomation to the US Authorities. Some did not inform their own governments. […]
How do we know whether our software or hardware is backdoored/wiretapped? We all know that using a certain OS from Redmond opens a lot of security holes in itself. Add to that all the now-public attempts of agencies and companies ranging from the FBI, NSA, Sony to antivirus-software vendors who install backdoors on your PC, and you've got some very good reasons to never trust any closed-source software again.
This is not a problem for most of us using Free Software and free operating systems (Linux, *BSD, etc.). Theoretically, we can read the source code of almost every single instruction being executed on our hardware, and verify that the software doesn't do any funny things like phoning home, logging keystrokes, opening backdoors and so on.
(My note: It can be too, if there are undisclosed vulnerabilities that say, NSA does know about, in free software! Like the one that afflicts all linux kernel versions since forever, and was only spotted just now - http://linux.slashdot.org/story/09/08/1 ... art_pos=16 )
However, how can we know whether or not our hardware has been backdoored/wiretapped/trojaned (or whatever you want to call it)?
Bridge It wrote:What is that thing where people see patterns in everything and feel that they are enlightened somehow because they see it and others don't.
Users browsing this forum: No registered users and 10 guests