So, what would you do if Danny Casolaro asked for your help?

Moderators: Elvis, DrVolin, Jeff

Postby American Dream » Thu Aug 13, 2009 7:21 pm

Bridge It wrote:
:backtotopic:


Anyway, I did correspond recently with VM about what was happening here and while I will not reproduce her comments here, I will say that she does not agree with desertfae's version of reality at all, nor does she trust her agenda.
American Dream
 
Posts: 19946
Joined: Sat Sep 15, 2007 4:56 pm
Location: Planet Earth
Blog: View Blog (0)

Postby justdrew » Thu Aug 13, 2009 7:45 pm

stoneonstone wrote:How very strange. Earlier this morning I was thinking about the large box of documents I have from an access to info request with the RCMP about Promis, from the early 90s. Thought about tossing it, or looking up Bill Hamilton after all these years to see if he wanted it for old-times-sake.

If it's useful to someone, better than putting it in the recycle bin.

Globe and Mail reporter Eric Reguly might have some documents he'd like to get rid of now - at one point he was also researching Promis (as I was)...and was so freaked out, a friend actually wrote a play about his experiences/fears/findings/reconstructions.

Riconnoscutio is, well, like Ari Ben Menashi; what he knows first-hand, and what he molds and sculpts from second and third parties into recognizable objects, is, well, impossible to sort out.

GH


I'd love to see any actual documentation for PROMIS, user manuals, etc... Who supported this almost magical software? I can turn a box of papers into a PDF fairly quickly.
User avatar
justdrew
 
Posts: 11966
Joined: Tue May 24, 2005 7:57 pm
Location: unknown
Blog: View Blog (11)

Postby desertfae » Thu Aug 13, 2009 7:54 pm

American Dream wrote:Bridge It wrote:
:backtotopic:


Anyway, I did correspond recently with VM about what was happening here and while I will not reproduce her comments here, I will say that she does not agree with desertfae's version of reality at all, nor does she trust her agenda.

And I'll bet that VM will agree that I'm me though.
Of course she's not going to agree with me, she doesn't like me because I called her out on stuff. If she has any actual "PROOF" of her suspicions of me, she ought to show it.. she won't though, you know why? Because she has none.
Instead of you being VM's cheerleader, why doesn't she come here and talk for herself if she's so concerned?
Rachel
desertfae- exposing the octopus
http://www.desertfae.com
User avatar
desertfae
 
Posts: 191
Joined: Sun Jan 27, 2008 5:39 pm
Blog: View Blog (0)

Postby desertfae » Thu Aug 13, 2009 7:56 pm

justdrew wrote:
stoneonstone wrote:How very strange. Earlier this morning I was thinking about the large box of documents I have from an access to info request with the RCMP about Promis, from the early 90s. Thought about tossing it, or looking up Bill Hamilton after all these years to see if he wanted it for old-times-sake.

If it's useful to someone, better than putting it in the recycle bin.

Globe and Mail reporter Eric Reguly might have some documents he'd like to get rid of now - at one point he was also researching Promis (as I was)...and was so freaked out, a friend actually wrote a play about his experiences/fears/findings/reconstructions.

Riconnoscutio is, well, like Ari Ben Menashi; what he knows first-hand, and what he molds and sculpts from second and third parties into recognizable objects, is, well, impossible to sort out.

GH


I'd love to see any actual documentation for PROMIS, user manuals, etc... Who supported this almost magical software? I can turn a box of papers into a PDF fairly quickly.


I don't think at this point with open cases it would be wise to have all this stuff all over the net. It can affect how the court may see the documentation. If you live anywhere near Louisville, KY though I'd be willing to meet with you and show you some stuff if we met in a very public place.
Rachel
desertfae- exposing the octopus
http://www.desertfae.com
User avatar
desertfae
 
Posts: 191
Joined: Sun Jan 27, 2008 5:39 pm
Blog: View Blog (0)

Postby justdrew » Thu Aug 13, 2009 8:06 pm

desertfae wrote:
justdrew wrote:
stoneonstone wrote:How very strange. Earlier this morning I was thinking about the large box of documents I have from an access to info request with the RCMP about Promis, from the early 90s. Thought about tossing it, or looking up Bill Hamilton after all these years to see if he wanted it for old-times-sake.

If it's useful to someone, better than putting it in the recycle bin.

Globe and Mail reporter Eric Reguly might have some documents he'd like to get rid of now - at one point he was also researching Promis (as I was)...and was so freaked out, a friend actually wrote a play about his experiences/fears/findings/reconstructions.

Riconnoscutio is, well, like Ari Ben Menashi; what he knows first-hand, and what he molds and sculpts from second and third parties into recognizable objects, is, well, impossible to sort out.

GH


I'd love to see any actual documentation for PROMIS, user manuals, etc... Who supported this almost magical software? I can turn a box of papers into a PDF fairly quickly.


I don't think at this point with open cases it would be wise to have all this stuff all over the net. It can affect how the court may see the documentation. If you live anywhere near Louisville, KY though I'd be willing to meet with you and show you some stuff if we met in a very public place.
Rachel


nope. no where near.

So I wonder what ever's become of Bill Hamilton?

more info here @ historycommons timeline

well, they still have a website: http://www.inslawinc.com/
but it's mostly broken, and seems to have been thrown together ten years ago in a couple hours. Sometimes I think PROMIS was the scam, over-hyped software that they tried to over-charge for and ended up getting ripped off themselves. After that, a vast body of legendary capability attributions have been made, which are probably mostly false.

Whatever went on with this whole Octopus thing, it seems to be covered by the same kind of self-generating (and generated) fractal-style complex mythology as "the whole bay of pigs thing" in Dallas.
Last edited by justdrew on Thu Aug 13, 2009 9:02 pm, edited 3 times in total.
User avatar
justdrew
 
Posts: 11966
Joined: Tue May 24, 2005 7:57 pm
Location: unknown
Blog: View Blog (11)

Postby Percival » Thu Aug 13, 2009 8:12 pm

Bridge It wrote:This blog is still available.
You don't have to go thru way back. http://dreamsend.wordpress.com/

It's the new stuff that he's pulled. There was a lot of Michael Jackson pattern recognition and then the clues about the "McNair conspiracy." What is that thing where people see patterns in everything and feel that they are enlightened somehow because they see it and others don't. He seemed to have that going on. I read his big "wow" over the discovery that Michael Jackson danced like Bob Fosse in the Billy Jean video...and I am thinking to myself....uh huh, and so did everybody on broadway in the 70's 80's. Because Bob Fosse was a very influential force in the dance arts then - and this is precisely when Michael Jackson learned to dance. Duh.

:backtotopic:


Schizophrenia.
User avatar
Percival
 
Posts: 1342
Joined: Thu May 15, 2008 7:09 pm
Blog: View Blog (0)

Postby daba64 » Thu Aug 13, 2009 8:58 pm

nathan28 wrote:
Bridge It wrote:This blog is still available.
You don't have to go thru way back. http://dreamsend.wordpress.com/

It's the new stuff that he's pulled.


Somebody HTTrack it before it disappears



Now it's all gone except for an old About Me section.

Weird that an ARG pops up here and DE disappears. Coincidence? You decide.
daba64
 
Posts: 143
Joined: Fri May 01, 2009 3:49 pm
Blog: View Blog (0)

Postby American Dream » Thu Aug 13, 2009 9:04 pm

I would be happy to find out that this is a simple ARG, with no hidden strings attached.

Things would be simpler if life was that lacking in mystery, but often, it's not...
American Dream
 
Posts: 19946
Joined: Sat Sep 15, 2007 4:56 pm
Location: Planet Earth
Blog: View Blog (0)

Postby Searcher08 » Thu Aug 13, 2009 9:40 pm

Rachel back well over a year ago when I started this thread, I felt very concerned over your personal safety and hoped that there might be some support for what I felt at that time was a brave and Don Quixote style fight for justice.

You replied to me then:
Honestly though, I can't ask that anyone, anywhere actively help me in this because too many people have died already.. I can't take the chance that someone would be hurt helping me. I've put myself in danger doing this and don't want to put anyone else in harms way.. these people are very 'ugly' if you know what I mean.
Thats not to say if someone has a document or whatever that I would discourage them from sharing it at all.. or if someone wants to get me paperwork or whatever... I just don't want anyone getting too deep into this due to the nature of it, ya know?
The octopus has a way of tangling you up in it before you realize you're a part of it... it's highly complicated and with so much disinfo out there you really do have to go through stuff to weed out the bad info. Also when speaking with people involved you have to do backgrounds on everyone to see who you can trust and who you can't...


Since that time I have been interested in exploring what ARE the dangerous areas of research - my take now is that the your area of research may be seen as a 'cold case' and does not pose any threat to you, but I may be very very wrong.

The areas that I have been told may reduce one's life expectancy include:

a) Links between 9/11 and the drug trade.
Both Daniel Hopsicker and Indira Singh were threatened - and AFAIK Indira is in hiding after the suspicious death of the late lamented (well lamented by 8bit and myself) Michael Corbin of the radio show '4 a closer look'

b) High level finance such as how the Bank of International Settlements really works.

c) High level corruption such as Sibel Edmonds discovered.

d) Anything associatd with the Franklin case

What is the latest on people like Michael Riconoscuito? William Hamilton? Robert Booth Nichols? (and what on earth was RBN's arms company being involved in farming out research to Japanese universities about "induction and activation of cytotoxic T-lymphocytes"??!!

Have these people you have been involved with got any connection with 'secret societies' such as Skull and Bones, to your knowledge?

You were really driven when you started this, but seem to have a very different view about it now - is that accurate?

cheers

:snoopdance:

S08
User avatar
Searcher08
 
Posts: 5887
Joined: Thu Dec 20, 2007 10:21 am
Blog: View Blog (0)

Postby desertfae » Thu Aug 13, 2009 11:22 pm

Searcher08 wrote:Since that time I have been interested in exploring what ARE the dangerous areas of research - my take now is that the your area of research may be seen as a 'cold case' and does not pose any threat to you, but I may be very very wrong.

My dad's murder case is a cold case. However, that is not all I'm looking into.

Searcher08 wrote:The areas that I have been told may reduce one's life expectancy include:

a) Links between 9/11 and the drug trade.
Both Daniel Hopsicker and Indira Singh were threatened - and AFAIK Indira is in hiding after the suspicious death of the late lamented (well lamented by 8bit and myself) Michael Corbin of the radio show '4 a closer look'

b) High level finance such as how the Bank of International Settlements really works.

c) High level corruption such as Sibel Edmonds discovered.

d) Anything associatd with the Franklin case

All of the above and more are dangerous things. All of the above and more, I'm looking into and have documentation on.

Searcher08 wrote:What is the latest on people like Michael Riconoscuito? William Hamilton? Robert Booth Nichols? (and what on earth was RBN's arms company being involved in farming out research to Japanese universities about "induction and activation of cytotoxic T-lymphocytes"??!!

Have these people you have been involved with got any connection with 'secret societies' such as Skull and Bones, to your knowledge?


The latest on MR- he's still in prison. I'm not comfortable talking about what he's doing currently on this board because of past attacks on me.
The latest on Bill Hamilton- He's still plugging away at his case against the DOJ etc. I don't want to speak for Bill and say something that could potentially hurt his case. I'll let him talk for himself.
The latest on RBN- He's supposedly dead. Please see http://desertfae.com/wordpress/?p=270 and dates after 04/30/09 for updates on what is going on with RBN & the treasury note.


Searcher08 wrote:You were really driven when you started this, but seem to have a very different view about it now - is that accurate?
cheers

No, I wouldn't say that my drive has decreased, just that the information I choose to go public with has. There are many reasons for this. First and foremost, I don't want to screw up any cases by releasing something I shouldn't. I also don't want to give a 'heads up' to someone who shouldn't know something.
desertfae- exposing the octopus
http://www.desertfae.com
User avatar
desertfae
 
Posts: 191
Joined: Sun Jan 27, 2008 5:39 pm
Blog: View Blog (0)

Postby Percival » Fri Aug 14, 2009 12:41 am

daba64 wrote:
nathan28 wrote:
Bridge It wrote:This blog is still available.
You don't have to go thru way back. http://dreamsend.wordpress.com/

It's the new stuff that he's pulled.


Somebody HTTrack it before it disappears



Now it's all gone except for an old About Me section.

Weird that an ARG pops up here and DE disappears. Coincidence? You decide.


Well we know he is watching since he just deleted that entire site within the last few hours after it was linked here.

Also, there are no coincidences, its all connected somehow I am sure. :lol:
User avatar
Percival
 
Posts: 1342
Joined: Thu May 15, 2008 7:09 pm
Blog: View Blog (0)

Postby Penguin » Fri Aug 14, 2009 4:02 am

justdrew wrote:I'd love to see any actual documentation for PROMIS, user manuals, etc... Who supported this almost magical software? I can turn a box of papers into a PDF fairly quickly.


Sounds like magic to me.

http://www.fromthewilderness.com/free/p ... romis.html
Working from either huge mainframe computer systems or smaller networks powered by the progenitors of today's PCs, PROMIS, from its first "test drive" a quarter century ago, was able to do one thing that no other program had ever been able to do. It was able to simultaneously read and integrate any number of different computer programs or data bases simultaneously, regardless of the language in which the original programs had been written or the operating system or platforms on which that data base was then currently installed.

In the mid 1970s, at least as far as computer programs were concerned, the "universal translator" of Star Trek had become a reality.

What would you do if you possessed software that could think, understand every language in the world, that provided peep holes into everyone else's computer "dressing rooms," that could insert data into computers without people's knowledge, that could fill in blanks beyond human reasoning and also predict what people would do - before they did it? You would probably use it wouldn't you? But Promis is not a virus. It has to be installed as a program on the computer systems that you want to penetrate.


I mean, some (like http://cryptogon.com/?p=956 Synthetic Environments for Analysis and Simulation) of the stuff NSA has today probably approaches that level of sophistication, but in the 70s, with 70s computers? Riight.
Pics or it didn't happen.

http://cryptogon.com/?p=877 NSA, AT&T and the NarusInsight Intercept Suite
http://www.theregister.com/2007/06/23/s ... print.html
The DOD is developing a parallel to Planet Earth, with billions of individual “nodes” to reflect every man, woman, and child this side of the dividing line between reality and AR.

Called the Sentient World Simulation (SWS), it will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information”, according to a concept paper for the project.

“SWS provides an environment for testing Psychological Operations (PSYOP),” the paper reads, so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.


I would pay more attention to these programs than something as fanciful as a program that incorporated all operating systems, all human languages, and an AI far surpassing the human mind, in the 70s. Sounds more like stuff to keep people busy while the real data analysis gets implemented.
Penguin
 
Posts: 5089
Joined: Thu Aug 23, 2007 5:56 pm
Blog: View Blog (0)

Postby OP ED » Fri Aug 14, 2009 4:38 am

Pics or it didn't happen.


like pics would make a difference.

OMG teh PROMIS iz a hologram!
User avatar
OP ED
 
Posts: 4673
Joined: Sat Jan 05, 2008 10:04 pm
Location: Detroit
Blog: View Blog (0)

Postby Penguin » Fri Aug 14, 2009 11:51 am

As to PROMIS yet...
Have you heard of the SWIFT banking transaction database, that was now taken into use in the whole EU as well, along with the IBAN international bank account numbers?

Now / soon all transactions, national and international, will go through SWIFT. And CIA has long had admitted access to it. What this means is that the western intelligence agencies have access to all bank transactions, all the time. Personally, I presume this to be joint EU/USA venture, at least behind the scenes.

http://www.swissinfo.ch/eng/top_news/de ... 1302785000

The United States has confirmed it has been monitoring international financial transactions, including those in and out of Switzerland, for almost five years.

The Swiss government has remained quiet on the issue, but data protection experts and lawyers are concerned by Friday's revelations in the New York Times.

US Treasury Secretary John Snow defended the secret programme, carried out by the CIA and the Treasury, calling it "government at its best" and a valuable aid for fighting terrorism.

Snow confirmed that since just after the attacks on September 11 2001, the Treasury had been tapping into records of the Belgium-based Society for Worldwide Interbank Financial Telecommunication (Swift) for evidence of potential activity by terror groups.

"The legal basis for this subpoena is routine and absolutely clear," Treasury Under Secretary Stuart Levey told a hastily called news conference, adding that it was "a grave loss" that the surveillance programme had been revealed but indicated that it would continue.

Swift is a cooperative owned by the 7,800 financial institutions in more than 200 countries that use it. Its headquarters are in Brussels.



http://arstechnica.com/business/news/20 ... ecords.ars

CIA could get access to even more EU banking records

Europeans are uneasy about US access to their financial information, but Germany's privacy commissioner fears the situation could soon get worse: the CIA and the Treasury Department might gain access to every single European interbank transaction.

Back in February, the European Parliament expressed its displeasure with the fact that the Society for Worldwide Interbank Financial Telecommunications (SWIFT) system was being regularly accessed by US authorities, including the CIA, as part of investigations into terrorist financing. Legislators wondered if SWIFT (a Belgium-based company) was obeying EU data protection laws, and proposals were floated that would ask SWIFT to stop mirroring its data to the US. According to Germany's Federal Data Protection Commissioner, Peter Schaar, the situation could get a lot messier: SWIFT might soon handle domestic as well as international fund transfers, and US authorities might then have access to every bank transfer in Europe.

SWIFT has rejected the idea of moving its mirrored servers out of the US, though. Francis Vanbever of SWIFT told a European Parliament committee this week that the system was necessary to avoid any disruptions to the worldwide system, and he pointed out that the company had no choice but to turn over data to the Americans. "After September 11th," he said, "we received a compulsory order to provide information on data stored in the US... We verified the situation with external legal counsel, which confirmed the US had the authority to issue the order. If we did not comply, we would face civil and criminal penalties, including fines or imprisonment."

Even without processing domestic transactions, SWIFT is already a giant in the banking world, and it's easy to see why concerns would be raised about any disclosure of the company's database. On March 1, 2007, SWIFT set a record for the volume of financial transactions handled in a single day as 14 .7 million messages passed through its network. Privacy advocates like Schaar worry about the potential for economic espionage and other kinds of abuse if US authorities keep using their subpoena power to gain access to such a transaction database, which would contain far more messages than the current version.

Combine these worries with earlier fears about a worldwide ECHELON surveillance system run by the US, the UK, and Australia (worries great enough that the European Parliament issued a lengthy report outlining everything it could discover about ECHELON [PDF]), and you have an explosive cocktail of paranoia. http://www.fas.org/irp/program/process/ ... lon_en.pdf


Also, Nicky Hager's book about Echelon now for free as pdf:
http://www.nickyhager.info/ebook-of-secret-power/

Of course, NSA also co-operates with the likes of Microsoft and Apple regarding their popular operating systems. If there are backdoors somewhere in popular OS platforms, they were put there by NSA with the agreement of those corporations.

http://www.schneier.com/blog/archives/2 ... e_sto.html

But one of those generators -- the one based on elliptic curves -- is not like the others. Called Dual_EC_DRBG, not only is it a mouthful to say, it's also three orders of magnitude slower than its peers. It's in the standard only because it's been championed by the NSA, which first proposed it years ago in a related standardization project at the American National Standards Institute.

The NSA has always been intimately involved in U.S. cryptography standards -- it is, after all, expert in making and breaking secret codes. So the agency's participation in the NIST (the U.S. Commerce Department's National Institute of Standards and Technology) standard is not sinister in itself. It's only when you look under the hood at the NSA's contribution that questions arise.

This is how it works: There are a bunch of constants -- fixed numbers -- in the standard used to define the algorithm's elliptic curve. These constants are listed in Appendix A of the NIST publication, but nowhere is it explained where they came from.

What Shumow and Ferguson showed is that these numbers have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can predict the output of the random-number generator after collecting just 32 bytes of its output. To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG.


And the most logical place for subverting a computer system -
the CPU, the chip itself inside the machine. That has worried US authorities vs. China as well:

http://homelandsecuritynewswire.com/single.php?id=6007
A technological sleeper cell: The Chinese have manufactured counterfeit Cisco routers and switches and offered them at exceedingly low prices; U.S. vendors upgrading or replacing U.S. government IT systems used these counterfeit devices -- and the FBI and other government agencies are now worried that the gear offers the Chinese undetectable back-doors into highly secure government and military computer system; the FBI investigates


http://www.networkingpipeline.com/blog/ ... a_wir.html
Feds Want A Wiretap Backdoor In All Net Hardware and Software

http://www.indymedia.ie/article/77862
The (Irish) Government did not know about the monitoring scheme, but several EU central banks were informed about the programme, which was introduced after the terrorist attacks on September 11th 2001. Under the scheme the CIA can sift through millions of international banking transactions to try to identify potential terrorist financing. […]

It has emerged that several central banks across Europe knew that the Society for Worldwide Interbank Financial Telecommunications (Swift) has been providing infomation to the US Authorities. Some did not inform their own governments. […]


I definitely consider the whole PROMIS hoopla to be misdirection from these (SEAS, NSA surveillance and simulaton, deep packet analysis of all traffic, ECHELON, SWIFT access and the international finance network) very real issues.

Let me reiterate - software that runs undetected on any operating system, any hardware system, can access any database, and provide a backdoor as well, is bloody (near) impossible to make. Even more so if it can never be spotted. Never say never, but I am stating my scepticism.

If there was such a thing, it would be on the chips. And that presents another problem - there are more than one CPU maker, and in several countries.

http://www.hermann-uwe.de/blog/how-to-d ... d-wiretaps

How do we know whether our software or hardware is backdoored/wiretapped? We all know that using a certain OS from Redmond opens a lot of security holes in itself. Add to that all the now-public attempts of agencies and companies ranging from the FBI, NSA, Sony to antivirus-software vendors who install backdoors on your PC, and you've got some very good reasons to never trust any closed-source software again.

This is not a problem for most of us using Free Software and free operating systems (Linux, *BSD, etc.). Theoretically, we can read the source code of almost every single instruction being executed on our hardware, and verify that the software doesn't do any funny things like phoning home, logging keystrokes, opening backdoors and so on.
(My note: It can be too, if there are undisclosed vulnerabilities that say, NSA does know about, in free software! Like the one that afflicts all linux kernel versions since forever, and was only spotted just now - http://linux.slashdot.org/story/09/08/1 ... art_pos=16 )

However, how can we know whether or not our hardware has been backdoored/wiretapped/trojaned (or whatever you want to call it)?


We can not, at least not easily.

Sorry about the lengthy post, but since PROMIS was discussed here, I consider all this relevant.
Last edited by Penguin on Fri Aug 14, 2009 12:16 pm, edited 5 times in total.
Penguin
 
Posts: 5089
Joined: Thu Aug 23, 2007 5:56 pm
Blog: View Blog (0)

Postby Zap » Fri Aug 14, 2009 12:02 pm

Bridge It wrote:What is that thing where people see patterns in everything and feel that they are enlightened somehow because they see it and others don't.


"Hugh Manatee Wins"?

Oh, wait, you probably mean

http://en.wikipedia.org/wiki/Pareidolia

or

http://en.wikipedia.org/wiki/Apophenia
Zap
 
Posts: 282
Joined: Thu Dec 21, 2006 7:41 pm
Location: I have always been here before
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 10 guests