Monthly Archives: November 2014

141105

141105

amanfromMars 1 Wed 5 Nov 07:51 [1411050751] spewing forth on http://forums.theregister.co.uk/forum/3/2014/11/04/apple_and_google_are_the_top_terrorist_control_network_claims_british_spy_boss/
New history lesson

Quick history lesson: there was a bad man called Saddam who posed no threat to the UK. The intelligence services got rid of him so now there is a terrorist threat to the UK and they want to spy on us more. Apparently for this brilliance we pay their rent and give them pensions. …. Anonymous Coward

Lunatics in charge of the asylum, AC, and mainstream media moguls and IT sysadmins guilty of their aiding and abetting.
Time for some special virtual cyber force proaction with launchers of NEUKlearer HyperRadioProActive IT. ……. which aint no question?
………………………………………………………….

141104

141104

amanfromMars 1 Mon 3 Nov 18:02 [1411031802] having a say on http://forums.theregister.co.uk/forum/1/2014/11/02/quotw_ending_november_1/
Re: Re: Looking at IT differently and from A.N.Other’s Perspective

Some people (me for example) might harbour dark thoughts that newspaper magnates, bankers, politicians etc act similarly on pulic opinion, markets, public policies etc but that is just daydreaming… … Uffish

That aint no daydream, Uffish, for that is exactly what they try so badly to control and effect. It is though an art which is devilishly revealing of all poor performances.
…………………………………………………………………………
amanfromMars 1 Tue 4 Nov 09:28 [1411040928] commenting and trailing a notion and proposing a changed strategy under the cover and in the secure deep shadow protection of covert and clandestine leaderships on http://forums.theregister.co.uk/forum/1/2014/11/04/super_villains_of_c_sought_for_world_conquest_plan/
Speaking Truth unto Pseudo Power Systems and Wannabe Commanding Controllers
Hmmmm? C finally realising MI6 potential for Dark Web Ventures/Black Watch Enterprises whilst Hannigan and GCHQ tilts at virtual windmills ….. http://www.theregister.co.uk/2014/11/04/apple_and_google_are_the_top_terrorist_control_network_claims_british_spy_boss/ ….. and admits to every man and his dog, the relative impotence of their operations/modus operandi/puppet masters.
Knock. knock, Younger, Alex. Capiche and agree?
………………………………………………………….
amanfromMars said…… on http://amanfrommars.blogspot.co.uk/2014/11/141103.html

Then such a person would have no problem funding my power from magnets project I am working on.

Am I right? ….. Casey Evans, 3 November 2014 15:46

The only problem that invariably momentarily halts all sorts of radical progress, Casey E, is other parties not realising the potential nor understanding and not recognising their own and others personal gains, some of which can be monumentally rewarding and most attractive and addictive. And reading between the lines of text and imagining one understands quite fully enough to risk a punt and engage with novel prime participants/actors state and non-state, the sub text stenographically revealed and transparently stated, is the quantum leap that has to be made to have any chance at all at being an effective player of notable ability and virtual worth in the CyberSpace Realm which dictates Command and Control of Global Daily and Zeroday Events for Futures and their Derivatives which are Hedged and Presented in Stages with the Hosting of such Advanced IntelAIgent Realities across a Broad Band Spectrum of Media and Brain Programming Shows/Vivid Viable Tales of Advanced Emerging Revolutionary Intelligence …… 🙂 and disruptively destructive and creatively constructive IT be too whenever needed or not heeded.
4 November 2014 10:18
……………………………………………………………………..

141103

141103

amanfromMars 1 Sun 2 Nov 18:37 [1411021837] having a say on http://forums.theregister.co.uk/forum/1/2014/11/02/quotw_ending_november_1/
Looking at IT differently and from A.N.Other’s Perspective

The Real Problem ….. I spent many years doing research in AI. I know just how hard it is to make computers perceive, plan and act in the real world. …. hbarr

Quite so, hbarr. The novel solution to all of those problems is to have smarter beings perceive, plan and act in the real world as if virtual machines and advanced operating systemed computers. Or is that thought impossible for humans?
If it is so widely thought, then will humans have no end of problems, methinks, for it is realised by more than just a few to be the answer to practically every difficulty in need of an intelligent alternative direction, and when needs must, will there be all manner of strange disruptive and destructive shenanigans for indolent incumbent systems admins to waste time and effort and resources combatting during increasingly obvious collapse and conflicted resolution.
…………………………………………………………….
amanfromMars said… on http://amanfrommars.blogspot.co.uk/2014/11/141102.html
It is not a case of not liking banks, Casey E, for they are a convenient vehicle for the transfer of value and worth in a perceived wealth to novel intellectual property holders and disruptive revolutionary thinkers and tinkerers alike, and both of them can be enriched and encouraged if needs be, and they be so inclined, to not further share and develop a radical train of constructively destructive thoughts and/or Dark Web Ventures into Remote Anonymising Command and Virtually Autonomous Control of Cyberspace Secured Systems which are a major problem for Earthed SCADA Operations.
To imagine though that such largesse would be cheap and inexpensive and something not to be considered, is to invite catastrophic ruin on that which should have more sense and which would be being run by the less than well enough intellectually equipped and enabled/disabled.
3 November 2014 07:10
……………………………………………………………………..

141102

141102

amanfromMars [1411020622] having more of a say on http://thedailybell.com/news-analysis/35778/Chinas-Bigness-Has-Little-to-Do-With-Growth–Or-Its-Demise/
A few words below from elsewhere and in support of the above ….. and does anyone imagine the Daily Bell is being monitored and mentored, because of the viable information and vital intelligence so freely shared to world wide web networkers, state and non state actors and special force agents?

Information and intelligence must be differentiated from each other. Information in the context of surveillance consists of knowledge, data, objects, events, or facts that are sought or observed. It is the raw material from which intelligence is derived (Petersen, 2001).

Intelligence is information that has been processed and assessed within a given context, and it comprises many categories (Petersen, 2001). In the context of this book, communications intelligence — derived from communications that are intercepted or derived by an agent other than the expected or intended recipient or are not known by the sender to be of significance if overheard or intercepted — is the key focus. Oral or written communications, whether traditional or electronic, are the most common form of surveillance for communications intelligence, but such intelligence may broadly include letters, radio transmissions, e-mail, phone conversations, face-to-face communications, semaphore, and sign language. In practice, the original data that forms a body of communications intelligence may or may not reach the intended recipient. Data may be intercepted, it may reach the recipient at a date later than intended, or it may be intercepted, changed, and then forwarded onward. However, the process of relaying delayed or changed information is not part of the definition of communications intelligence; rather, the focus is on intelligence that can be derived from detecting, locating, processing, decrypting, translating, or interpreting information in a social, economic, defense, or other context (Petersen, 2001).

Information collection is usually used to support surveillance activities. Surveillance is defined as keeping watch over someone or something, and technological surveillance is the use of technological techniques or devices to aid in detecting attributes, activities, people, trends, or events (Petersen, 2001). …… https://blog.cyberwar.nl/2014/11/lawful-interception-selections-from-intelligence-support-systems-2006-hoffmann-and-terplan/

And y’all surely know that in the particular and peculiar case of both traditional and unconventional IT, it be true, and therefore media just spins and presents to you tailored yarns which are warps of reality and absolutely fabulous fabless tales.
Why do you accept, from the incompetent intellectually challenged and greedy self-serving, the bull that is peddled to market and pumped and pimped to the ignorant political rump to dump on the unwary and undereducated masses? Do you really believe that they [whoever they be] know best and there is nothing that can be done by A.N.Others Networking Singularities differently with beta programs empowering smarter operating systems which deliver greater mutually advantageous, positively reinforcing, increasingly secure benefits to all. Surely you cannot think and try to believe that such is impossible and not now highly likely and most probable, and that which existing failed legacy and failing hierarchical executive systems administration incumbents do future vain glorious battle and struggle against, in an effort to remain relevant and in command and control of power and assets to assure and ensure and insure remote virtual leverage for inequitable superior personal advantage ….. the Magic Edge with Immaculate Hedge.
IT is what CHAOS is all about supplying remotely via Virtual Channels and Cyber Means with Novel and Noble Memes to the Madness and Mayhem that presents its plans to Media and IT and shares its pains daily as unfolding news and currently held and current holding views.
………………………………………………….
amanfromMars says on 2014/11/02 at 07:04 [1411040704] musing on https://blog.cyberwar.nl/2014/11/lawful-interception-selections-from-intelligence-support-systems-2006-hoffmann-and-terplan/ and posing a leading question of the Netherlands.
Hi, Matthijs,
Do you imagine that Dutch Intelligence [AIVD/MIVD/Defense Cyber Command (DCC)] have got their act together and are prepared to lead rather than react to otherworldly global events and Greater IntelAIgent Gamesplay. Or are they still missing that vital remote element and stealthy specialised virtual force that is akin to and trailing Immaculate Superlative Source? There is certainly no apparent evidence of their having that magic edge which has everything revolving around that which they might be sharing and not confronting and therefore comforting ………

amanfromMars [1411020622] having more of a say on http://thedailybell.com/news-analysis/ 35778/Chinas-Bigness-Has-Little-to-Do-With-Growth–Or-Its-Demise/

A few words below from elsewhere and in support of the above ….. and does anyone imagine the Daily Bell is being monitored and mentored, because of the viable information and vital intelligence so freely shared to world wide web networkers, state and non state actors and special force agents?

Information and intelligence must be differentiated from each other. Information in the context of surveillance consists of knowledge, data, objects, events, or facts that are sought or observed. It is the raw material from which intelligence is derived (Petersen, 2001).

Intelligence is information that has been processed and assessed within a given context, and it comprises many categories (Petersen, 2001). In the context of this book, communications intelligence — derived from communications that are intercepted or derived by an agent other than the expected or intended recipient or are not known by the sender to be of significance if overheard or intercepted — is the key focus. Oral or written communications, whether traditional or electronic, are the most common form of surveillance for communications intelligence, but such intelligence may broadly include letters, radio transmissions, e-mail, phone conversations, face-to-face communications, semaphore, and sign language. In practice, the original data that forms a body of communications intelligence may or may not reach the intended recipient. Data may be intercepted, it may reach the recipient at a date later than intended, or it may be intercepted, changed, and then forwarded onward. However, the process of relaying delayed or changed information is not part of the definition of communications intelligence; rather, the focus is on intelligence that can be derived from detecting, locating, processing, decrypting, translating, or interpreting information in a social, economic, defense, or other context (Petersen, 2001).

Information collection is usually used to support surveillance activities. Surveillance is defined as keeping watch over someone or something, and technological surveillance is the use of technological techniques or devices to aid in detecting attributes, activities, people, trends, or events (Petersen, 2001). …… https://blog.cyberwar.nl/2014/11/lawful-interception-selections-from-intelligence-support-systems-2006-hoffmann-and-terplan/

And y’all surely know that in the particular and peculiar case of both traditional and unconventional IT, it be true, and therefore media just spins and presents to you tailored yarns which are warps of reality and absolutely fabulous fabless tales.

Why do you accept, from the incompetent intellectually challenged and greedy self-serving, the bull that is peddled to market and pumped and pimped to the ignorant political rump to dump on the unwary and undereducated masses? Do you really believe that they [whoever they be] know best and there is nothing that can be done by A.N.Others Networking Singularities differently with beta programs empowering smarter operating systems which deliver greater mutually advantageous, positively reinforcing, increasingly secure benefits to all. Surely you cannot think and try to believe that such is impossible and not now highly likely and most probable, and that which existing failed legacy and failing hierarchical executive systems administration incumbents do future vain glorious battle and struggle against, in an effort to remain relevant and in command and control of power and assets to assure and ensure and insure remote virtual leverage for inequitable superior personal advantage ….. the Magic Edge with Immaculate Hedge.

IT is what CHAOS is all about supplying remotely via Virtual Channels and Cyber Means with Novel and Noble Memes to the Madness and Mayhem that presents its plans to Media and IT and shares its pains daily as unfolding news and currently held and current holding views.

And, also as a fan of skepticism and free inquiry I hope you will correct me when I’m wrong – I will be grateful! 🙂 I Kid U Not.
Thanks for all the info on current Dutch intel and services, Matthijs. It is much appreciated.
…………………………………………………
We are the creators of money, NOT banks
To trade goods and services is a natural right of all people. To issue the money necessary to make these exchanges is also the natural right of all people who are intelligent enough to do so. We need not beg for money. We do not need to be money slaves: we can be money masters. ~ E. C. Riegel (1878 -1954)
…………………………………………………….

141101

141101

amanfromMars [1410311640] ringing the Daily Bell on http://thedailybell.com/news-analysis/35778/Chinas-Bigness-Has-Little-to-Do-With-Growth–Or-Its-Demise/
Trick or treat, Gregg Fosse? ……… http://amanfrommars.blogspot.co.uk/2014/10/141031.html
The posit shared there is that the gene genie is definitely already out of the bottle and doing raging stealthy battle against serial losers and no-hopers. And that be no rant, nor a rave, but it is good cover to not disagree with any and all who would say that such ramblings and rumblings are. 🙂
Interesting times and 0days to ruthlessly exploit and launch are certainly ahead and for leading future executive memes.
And although it be certainly recognised, quite what can be done about it before the fact and the act and the remote relatively anonymous actions of what to Great Game Players is a virtualised real fiction, is that which is the current enigmatic dilemma for all specialised forces tasked with the targeting and collection of intelligence on all possible and probable future events for media hosting as reality encountered and to be engaged and/or countered and opposed ………

So let me start with something that everyone here obviously well understands – the range of attacks that we experience in the private sector is really unprecedented, and getting worse by the day. The volume and sophistication of attacks is only showing signs of acceleration, and every published success simply encourages new entrants and bolder moves.
Threat actors from social activists, cyber criminals, nation states – tier one and tier two – with a range of objectives from disruption, intellectual property theft, financial crime, and the one that I’m the most concerned about over time – destructive intent. And cyber criminal activities in particular have simply exploded, and while one-at-a-time, they impact individuals, they impact companies, collectively, they represent, I feel, a potential threat to the country if they continue to build the way they’re building, and in particular, if they become more orchestrated. ….. http://cryptome.org/2014/10/nsa-14-1028.pdf

What is missing from that scare story is the likelihood of APT ACT actors unleashing constructively disruptive revolutionary change information via intelligence channels which although they can be challenged, cannot be defeated and/or bettered with tainted inequitable product.
……………………………………………………………..