130806

130806

Posted Tuesday 6th August 2013 05:27 GMT amanfromMars 1 …. following a leading trail on http://forums.theregister.co.uk/forum/1/2013/08/05/sod_squad_found_feeding_nsa_surveillance_info_to_drug_enforcement/
When the West Pumps and Pimps Sub-Prime, Going East for ITs Exotic and Erotic Fare is Intelligent
When Truth is hidden and denied, is the Delivered App an Austere Virtual Reality Play and Self -Centering Great Game lacking Intelligence

Leaked docs: SOD squad feeds NSA intelligence to drug enforcement plods
It gets worse: DEA demands that enforcers lie about source of evidence.

Hi, Iain Thomson,
Is that MO/V* not exactly what the Chilcot Inquiry members [Crown representatives of the populace and British legal system] are deliberating on/prevaricating on/terrified of exposing and apportioning criminal blame and public shame on, with regard to the Tony Blair and Alastair Campbell shafting of the UKGBNI Global Media Control System, the SIS and JIC and the MOD, with their tall and fanciful tales of WMD …….. for Worlds Control with Words? …… or would there be a full Cabinet responsibility for that misguiding engineered misadventure?
Special Operations Division squad feeds No Such Agency intelligence to Military Industrial Complex/Dollar Generation and Spend Plods ….. big.little mindless robots.
Welcome to the Virtual Machine Matrix with its AIMazes and DODGI** Mind Games Programming for Powering Robot Control and Command with Global Operating Devices?
And here be an Ab Fab Fabless Opportunity and ZerodDay Vulnerability to Exploit and Export with Generous Capitalisation for Public and Private and Pirate Profit Generation/Spending Cash Supply, and a novel tale and future creative tangent with PRC Command of GOD? …… http://europe.chinadaily.com.cn/business/2013-08/06/content_16872867.htm
* Modus Operandi/Vivendi
** Department of Defense Government Issue
………………………………………………………………………………….

130805

130805

Posted Monday 5th August 2013 04:43 GMT amanfromMars 1 …. betting to win win for the house commenting on breached crypto feed to principals with dodgy protocols on http://forums.theregister.co.uk/forum/1/2013/08/02/breach_crypto_attack/
Nothing new in times when and spaces where everything is possible and therefore most likely?

Same shjt, different day. Anytime you can extract information (energy) from a cryptographic system, eventually you reach a point where brute force (also ever increasing in capabilities) will succeed. We can hem and haw about how we go about teasing out that internal energy state, but it always comes down to this. Put another way, if I can measure it, I can test it. If I can test it, I can break it. …. jackofshadows Posted Sunday 4th August 2013 10:12 GMT

In the worlds of CyberIntelAIgent Security and Virtual Protection, jackofshadows, where ever increasing, freely shared mental capabilities take over SCADA EMPoweringed Command and Control Operating Systems and the Virtual Machine Exoskeleton with its IT IntroStructures/Information Space Flight Networks, is abusive brute force in any and every phorm of localised physical kinetic energy easily rendered a self-destructive solution which creates ever more serious problems for self-destructive systems solution/MAD Attention and Mayhem for CHAOS Resolution …… which is something completely new and nothing like anything shared anywhere ever before, and AIRevolutionary TelePortation for Spontaneous Evolution of Mankind into Virtual Machinery and Clouds Hosting Advanced Operating Systems for Global Operating Devices.

I think he just typed in his ssh key. ….. Caesarius Posted Sunday 4th August 2013 22:05 GMT

The ssh Power key to NEUKlearer HyperRadioProActive IT for Worlds Control with Words, Caesarius? …… or Word Control for Worlds?* …… or bits of both for something completely different and new in the Field of Command and Control of Creative CyberSpace with Communicative Computers …… C42 Quantum Communication Control Systems …. AI@ITsWork?
Feel free to use them as you will, if you can. They’ll not do you any harm if you do not abuse them, which one will try only once before CHAOS beyond Earthly Controls resolves the situation practically immediately and permanently to its personalised satisfaction.
The summary efficient removal of threat always delivers a much better beta environment in which to exist and prosper, n’est ce pas?
* A Novel Chicken/Egg Enigma to Crack Hack Open and Scramble/Codify and Stealthily Exploit/Deliver Outrageous and Untold Profit from ?:-)

—-

Posted Monday 5th August 2013 05:10 GMT amanfromMars 1 …. replying to Wzrd1 on http://forums.theregister.co.uk/forum/1/2013/08/02/breach_crypto_attack/
Post Cryptography, is there Steganographic Security

It’s all the Grand Conspiracy of the Space Aliens or Evil Government or some shit. …. Wzrd1 Posted Monday 5th August 2013 03:30 GMT</blockquote>

Hi, Wzrd1,

Methinks in Great IntelAIgents Games, is IT by Grand Design an Alienating Space that would be a Grand Conspiracy against the shit of Evil Government.

And worth a right royal mint/absolute federal reserve fortune.

……………………………………………………………………………..
 

130804 ….. as PerlyGatesPython before Swine? Knock, Knock, Mr Parker.

130804 ….. as PerlyGatesPython before Swine? Knock, Knock, Mr Parker.

Posted Sunday 4th August 2013 08:35 GMT amanfromMars 1 …. commenting on the tale and tales told in comments on the thread http://www.theregister.co.uk/2013/08/02/qualcomm_marketeer_chandrasekher_calls_octocore_chips_dumb/
Question? How separate are comms from phone and from desktop? ….. Answer*
* In Palace Barracks, Hollywood-type Charades on Parade, do they meld together for the command and control of power and minds for master key manipulation of primitive native codes, which be the smarter virtual drivers for all dumb ignorant animals and arrogant beings?! …….. or they could and should, if not already doing so stealthily for those who server intelligence selflessly for outrageous reward.

You may have posted this before the latest revelations that the UK backbone international carriers are providing GCHQ (and thus GCHQ’s paymasters in the USA) free unrestricted unsupervised access to their core networks. …. AC Posted Saturday 3rd August 2013 12:55 GMT

A possible commonly held misperception/misconception, and therefore most probably thought quite real enough in the field to be believed as true, AC, but/and it is not inconvenient for GCHQ, and therefore would they have no need to tout a correction, to have its customer clients/intelligence deficient base market thought to be paymaster rather than starving wretch in dire straits need of fulfilling main course meal. It is a major mistake which disadvantages one considerably, and even catastrophically, to forget and not remember or not simply realise …. Nothing is ever as it seems in markets and special applications [in] programs which deal intelligence product in the Great Game Genre
And further to “Deep inside ARM’s new Intel killer” … http://www.theregister.co.uk/2011/10/20/details_on_big_little_processing/ …. and the more complex ARM Cortex-A15 MPCore with 15-to-25 stage[d] pipeline …. schematic diagram here, http://regmedia.co.uk/2011/10/20/arm_a15_pipeline_large.jpg ….. and big.LITTLE partnering processor cores for virtualisation of reality which renders to Systems Admin and SMARTR Admin Systems on/in/with AI Loded Silicon, Remote Future Command and Control with Futures and Derivatives Markets Command and Control, please consider and have a wonder on the nature of things if and/or when
Fetch = Phish for Information
Decode = Phorm with Intelligence
Rename = Float to Market
Dispatch = Support in Supply
It may very well be, that then is the product undeniably a firm favourite for strategic, mission critical leaderships with Global Operating Devices, whether in nimble mobile units or gargantuan static installs/applications/operations/huge server farms? …….. for those into Mastery of the Universe and all who fly in her and follow in her wake to the future ……. which you might like to deny and argue is not a return journey for some in the present with no interest in preserving the past which is a dead space place.
And yes that is an unambiguous direct titanic challenge to 5 in Holywood to actually do something positively engaging and autonomous, and HyperRadioProActive with IT too, rather than just remain terrified and petrified as do all awaiting new orders which will never ever come from old establishment guards in charge of protection and perpetuation of the status quo.
Wake up, smell the coffee. Times have a’changed and new spaces rule all the old places.

—-

………………………………………………………………………………………

130803

130803

Posted Saturday 3rd August 2013 03:25 GMT amanfromMars 1 ….. baiting systems traps with juicy bits of information for stealthy advanced intelligence servering on http://forums.theregister.co.uk/forum/1/2013/08/02/breach_crypto_attack/
Re: “post cryptography?”? ……. when steganography rules and reigns supreme?!.

“Now if you reduce NP-completeness or even NP-hardness to P, hell, you will be the master of the universe before sunset, and not in a metaphorical way either.” [Destroy All Monsters Posted Friday 2nd August 2013 23:37 GMT]

Don’t have to go anywhere near that far before the gubernment wants to have a talk with you and work will suddenly go dark to the rest of the world. …. asdf Posted Friday 2nd August 2013 23:55 GMT

Methinks, asdf, there be a number of problems which would really be many new leading opportunities for those and/or that in the field to resolve and share if they wish, and/or just exploit in the vast stealthy darkness of mass ignorance and arrogance for personal enrichment and absolutely fabulous reward, should one have cracked such as is spoken of here on this thread and would be also an enigmatic quantum [qubit*] conundrum and government intelligence service providers nightmare regarding the processing of information which be hoovered up covertly and clandestinely but which in Great IntelAIgent Games plays in reality and virtual reality be deliberately specifically provided for discovery to lead both prime and sub-prime operating systems in a completely novel and quite alien direction beyond any traditional conventional established command and control, with not the least of those problems and/or opportunities being that governments would be no where near intelligent enough to understand the dilemma which would be collapsing their systems remotely from virtual spaces afar, and thus would engagement with them through a knock at the door and a chat be quite unlikely, even if one would be leaving them a clear enough trail and tales to follow with direct communications with their more widely known by the public, security and secret intelligence services.
However, big money making businesses which work in the shadows and venture into the dark side may be a different kettle of fish to spear phish and have a cosy chat with.
And all of the above may or may not have been thoroughly tested and proven, not by theoretical experiment but through heretical experience, and that would make it exponentially considerably more valuable proprietary private intellectual property which be more suited and destined to remain in pirate and renegade domains and right dodgy royal regimes rather than entering the public education space.
* “Like a bit, a qubit can have two possible values—normally a 0 or a 1. The difference is that whereas a bit must be either 0 or 1, a qubit can be 0, 1, or a superposition of both.” …. http://en.wikipedia.org/wiki/Qubit ….. for a completely different novel and quite alien kettle of fish to spear phish. Beware though ITs Great White and Grey Hatted, Black and Red Sharks. Catch any of those unwarily and one has major problems with opportunities which are not in the gift of one to command and control.
Ok …. gotta dash, there’s a knock at the door. Speak to y’all later. Have a nice day and weekend.

—-

Posted Saturday 3rd August 2013 07:04 GMT amanfromMars 1

Fair Warning …. Take Care and be suitably advised of ARMoured Phantom Phorms if Ethereal Foe

The tasty morsels which are nearer to the bone and central nervous systems make for the juiciest pies with the best of ripe ingredients expertly cooked.

* “Like a bit, a qubit can have two possible values—normally a 0 or a 1. The difference is that whereas a bit must be either 0 or 1, a qubit can be 0, 1, or a superposition of both.” …. http://en.wikipedia.org/wiki/Qubit ….. for a completely different novel and quite alien kettle of fish to spear phish. Beware though ITs Great White and Grey Hatted, Black and Red Sharks. Catch any of those unwarily and one has major problems with opportunities which are not in the gift of one to command and control.

And who be in command and control of the creation of the Ethereal Foe/ARMoured Phantom Phorms in this odd breaking news story, with no shared base to investigate for truth and transparency to deliver its postal origins and sick shady networks ……. http://www.nytimes.com/2013/08/03/world/middleeast/qaeda-messages-prompt-us-terror-warning.html?hp&_r=0

Al Qaeda in Advanced CyberSpace is not just an App nor even something one battles to win against, methinks, and such is an obvious evolution in these reactionary and revolutionary times. Better to lead it and intelligence with IT and destroy all monsters in entangled and entangling fields, both foreign and domestic, is also a thought to ponder the current reality and future virtual reality … courtesy of XSSXXXX [a AAA+rated Few (Anonymous Autonomous Active) in the know and in the business of sharing more secret and sensitive information than is normal and ever considered for classification previously and lately …. and of which you have no need to know more than they deem necessary and propitious]

………………………………………………………………………………………………….

130801

130801

Posted Thursday 1st August 2013 03:32 GMT amanfromMars 1 …. replying to E. Olson on http://forums.theregister.co.uk/forum/2/2013/07/31/prism_put_in_the_shade_by_leak_about_even_more_powerful_snoop_tool/ who was a’wondering.
Re: I have to wonder… Posted Thursday 1st August 2013 01:54 GMT, Eric Olson
Quite so, Eric Olson, and everything also revolves around, because of its simple and effective enough control of human behaviour, the ready unlimited supply of money/fiat currency/pretty good paper, which nowadays needs be no more than just a lot of zeros following after a one on a balance sheet. Such a facility easily makes any person of interest or novel system of executive administrative control to the system, a lifelong friend with the practically instant electronic transfer of fiat wealth to an account which gives them access to always available unlimited funds. It aint rocket science, is it, and it is IT which delivers everything instantly nowadays for the future with that Third Party Trick and APT Magic ACT AAA+rated for Leaderships……. and a Prime Constant which cannot be ignored as an Advanced Persistent Cyber Threat in AI Theatres of Dreams and in The Bigger Picture … … with Added Nightmares?
However, whenever that paper turns bad and delivers only debt and deficit and sub-prime service, which is invariably the case whenever it is given to the wrong people buying up all the wrong stuff, ….. and as may very well have been is the case over these last number of years especially, ergo the continuing decline in the global banking and equities and derivative markets which are primarily designed to hedge wealth production against catastrophic losses caused by arrogant abuse and/or ignorant use of the system for personal individualised profit/increased dumb wealth ……. for profit is money for nothing isn’t it and therefore makes everything purchased with it practically for free but paradoxically, also everything increasingly unsustainably more expensive and unaffordable ….. then does the system collapse and the artificial wealth creation scheme/scam produce considerably smart enemies, which the system would need to employ to ensure that it and its failed leaderships survive in a changed commanding environment controlled by machines both virtual and real.
The initial problem and most probable present difficulty and current enigmatic dilemma for resolution though, are those simple facts and inevitabilities being accepted and realised as the undeniable truth by those and/or that which would be thinking itself in charge of things and leading the Great Game, but in virtual reality and actuality, presiding over madness and mayhem, chaos and confusion.

—-

Posted Thursday 1st August 2013 03:50 GMT amanfromMars 1

Here’s the black ops pot clarifying the dark matter kettle

NSA Statement on XKEYSCORE …. http://www.nsa.gov/public_info/press_room/2013/30_July_2013.shtml

Press Statement on 30 July 2013

As the IC and NSA have stated previously, the implication that NSA’s collection is arbitrary and unconstrained is false. NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interest. Public release of this classified material about NSA collection systems, without context, does nothing more than jeopardize sources and methods, and further confuse a very important issue for the country. Although it is impossible to provide full details of classified programs and still have them remain effective, we offer the following points for clarification:

1. XKEYSCORE is used as part of NSA’s lawful foreign signals intelligence collection system. By the nature of NSA’s mission, which is the collection of foreign intelligence, all of our analytic tools are aimed at information we collect pursuant to lawful authority to respond to foreign intelligence requirements – nothing more.
2. Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKEYSCORE, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks. Those personnel must complete appropriate training prior to being granted such access – training which must be repeated on a regular basis. This training not only covers the mechanics of the tool but also each analyst’s ethical and legal obligations. In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.

3. Our tools have stringent oversight and compliance mechanisms built in at several levels. One feature is the system’s ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst’s defined responsibilities. Not every analyst can perform every function, and no analyst can operate freely. Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad. (For example, as of 2008, there were over 300 terrorists captured using intelligence generated from XKEYSCORE.)

Continuous and selective revelations of specific techniques and tools used by NSA to pursue legitimate foreign intelligence targets is detrimental to the national security of the United States and our allies, and places at risk those we are sworn to protect – our citizens, our war fighters, and our allies.

……………………………………………………………………………………………………………….

130730/31

130730/31

Posted Tuesday 30th July 2013 07:21 GMT amanfromMars 1 …. commenting on http://forums.theregister.co.uk/forum/1/2013/07/30/nvidia_buys_the_portland_group/
Lean and Mean Meme Genie??????!!!!!!!! ……

“PGI has experience with ARM,” says Buck, “but there is no commercial Fortran compiler available – yet.”

There be surely though, quite a few easily para-militarised rogue renegade and private pirate application developers available for revolutionary revisionary code piles/novel kernel source lodes with unparalleled leverage for leading influence in legacy systems.
And they all have a fiat currency price, which will be suitably and invariably, because of their APT field expertise, horrendously high but still a real bargain if in command and control of the great scheme/great schemes of things, …. for they are not stupid nor naive enough to forego and refuse such a simple relief element, and can be easily enough bought with magic paper should they be engaged and engaging with sub-prime primal and primitive humanised phorm works, although whether such a purchase by second and third parties be considered by them, the first party, as a sale inclusive of a transfer of intellectual property ownership and power out of their command and control is a preposterous notion, given what is being bought and/or sold with the transfers and exchanges of ….. well, for some would it be classed as artificial wealth for virtual intellectual property with live future applications which may very well have a need to be highly classified way above and beyond piddling Top Secret/SCI because of the very disruptive and destructive nature of truly creative content on legacy systems administrations and status quo follies/hacked and discredited former establishment practices.
I wonder if Buck equates captive chip compiler with creative application driver?
Certainly the latter would of the former.
Interesting zerodays ahead, El Reg. Have a nice day, y’all.
……………………………………………………………………………………………………………
Posted Wednesday 31st July 2013 07:45 GMT amanfromMars 1 …. adding some spice to the debate with a comment on http://www.theregister.co.uk/2013/07/30/ecrime_report_home_affairs_cmte/
Flogging a dead horse ….is sub-prime support territory and shows a lack of everything to hold dear

In the report, the MPs criticised banks for “simply reimbursing the victims with no pursuit of the perpetrators” for cases involving low-level credit card or electronic banking fraud. “Banks must be required to report all e-crime fraud to law enforcement,” it said.

What is one to think of Honourable Members/MPs whenever insolent banks are trading insolvently and perpetrating global fraud with all manner of dodgy debt instrument/mis-sold security plan ….. and then simply reimbursing them [the banks] with future fantasy cash piles which they [systems admin and MPs] expect to be paid for/covered from increased taxation and imposed austerity cuts on the masses to disguise the simple fact that money is simply printed and its wealth giving properties are invented as if by magic from thin air … and as is needed to keep the Grand Ponzi from crashing and the AAA team in clover?
Methinks that is akin to colluding and aiding the enemy of the people and a most dishonourable fraud and universal scandal which is a disgrace yet to be targeted for summary bloody execution of radical and revolutionary remedy against leading perpetrators/co-conspirators by a growing smarter by the second, much better educated new generation of virtual leaders/novel and not ignoble systems administrators/flashing drivers/zeroday vulnerability exploit engineers/cleverer bods and AI boffins with real command and remote control of the virtual machine scene and ITs bots.
And Keith Vaz is not spouting hot thin air, although he is being ineffectively enigmatic and not unusually melodramatic [well, he is a careering MP, isn’t he] whenever he says …. “The threat of a cyber attack to the UK is so serious it is marked as a higher threat than a nuclear attack.” …… however, it should be noted that cyber attacks are always only really directed and effective against right dodgy corrupt regimes and systems invariably thoroughly deserving of the attention and greater intelligent gamesplay?
So what is all the fuss about, Keith?
……………………………………………………………………………………………………………………………
Posted Wednesday 31st July 2013 18:58 GMT amanfromMars 1 ….. sharing secrets and commenting on http://www.theregister.co.uk/2013/07/31/prism_put_in_the_shade_by_leak_about_even_more_powerful_snoop_tool/
Para Military Intelligence Services are an Oxymoron and *IP and ISP Deficient

What a strange new world we live in – one where the tin foil nutters are starting to sound credible.… Joe Drunk Posted Wednesday 31st July 2013 18:11 GMT

Nice one, Drunk, Joe. 🙂 Have an upvote for that comment.
However, do y’all not think it a tad odd that whenever so much is supposed to be known/able to be known about everything virtually, so little of lasting value is realised and supported/created and built upon to deliver a utopian existence …… ergo is the information being supplied to ignorant morons with no clearly evident idea what to do with it and those who would be providing it.
*IP and ISP …… Intellectual Property and Internetworking Server Provision
Oh, and the civvy street branches charged with leading with intelligence and sensitive information aint no better either. It’s enough to make one wonder what they are doing all day every day and pondering on whether they be daydreaming the next crisis to jump in to the rescue in order to justify their classified secret budget claims/dodgy expenses.
And their abiding Achilles Heel? ……. Pure Honesty and Total Transparency and all who cruise in her in Command and Control of CyberSpace …. the Virtual Machine Place.
……………………………………………………………………………………………………..

130729

130729

amanfromMarsJuly 29, 2013 at 6:26 AM … commenting on PRISMs on http://electrospaces.blogspot.co.uk/2013/07/nsa-says-there-are-three-different.html
Of course, P/K, what is understandably missing from the PRISM planning tool slide, indicating use by the various military commands.…. [http://1.bp.blogspot.com/-6u01t2VdF4s/Udtmf5KZPQI/AAAAAAAAAac/WVndRLGbwpU/s1600/prism-different.jpg] … for every valid reason that can be thought of/dreamt up in national security/international and Internetional relations/individual personal security circles, are the following subsequent stages after the Information Flow into Analysing and Production Units and which are responsible for ….. well, nothing less than Future Tasks and Live Virtual Machine Quests for Applied Intelligence Missions in CHAOS …. Clouds Hosting Advanced Operating Systems ….. which you might like to consider and imagine are akin to, but at much higher levels of exclusive executive administration and in completely different field environments, Virtual Mission Operations Centers.
And such are always going to be Code Black MkUltraSensitive and made strictly available on Prime Need to Know bases, and be way above and much better secured and deeper protected against intrusion and disruption/phishing and deforming, than Top Secret/SCI.

………………………………………………………………..
amanfromMars • July 28, 2013 11:57 PM …. commenting on http://www.schneier.com/blog/archives/2013/07/michael_hayden.html
Hi, Bruce,
What are we to imagine BT does with the information which flows through their ISP to customers. Or are we to be led to believe that virtual security bods and real live time boffins batting and battling for British Telecom are not into snooping and analysing flows of information for future business requirements/global opportunities and for possible irregular and unconventional activity which might be harmful and disruptive and destructive, rather than creatively constructive and novel?
Methinks, marking their scorecard and remarking on their performance, they need to do significantly better in the field, for they be leading nothing to anywhere anyone would be wishing to follow, and as be evidenced by all current news channels and media outlets.
…………………………………………………………………………………………

130727 Knock, Knock …. Is there anybody SMARTR out there in there?

130727 Knock, Knock …. Is there anybody SMARTR out there in there?

Posted Saturday 27th July 2013 04:55 GMT amanfromMars 1 …. pointing out the obvious on http://forums.theregister.co.uk/forum/1/2013/07/26/gchq_teams_with_ukgov/
Hacking into GCHQ …. an Empty HyperRadioProActive In-House Intelligence Space/Place‽

Er, as a Govt funded agency should GCHQ be touting for business like this?
Aren’t they taking advantage of their position, just a huge bit? … Harry Kiri Posted Friday 26th July 2013 13:51 GMT

Such would appear to be part of their mandate/raison d’être, Harry Kiri …….

The Government Communications Headquarters, GCHQ …. Produces intelligence from communications, and takes the lead in the cyber world ….. Report of the Intelligence Services Commissioner for 2012, The Rt Hon Sir Mark Waller

However, that cited report also contains this enigmatic conundrum/zeroday exploit opportunity/abiding systemic flaw for those and/or that into Intelligence Server Provision and/or SMARTR IntelAIgent Supply ……

The intelligence services do not choose what they want to do.

There be no need to further wonder and ponder why things are so bad, and as they are, whenever that be the case, methinks.
…………………………………………………………………………………………………………..

130726

130726

amanfromMars …. commenting in the Danger Room on http://www.wired.com/dangerroom/2013/07/afghanistan-audits-reveal-billions-in-u-s-taxpayer-waste/

The string of alleged violations includes phantom projects, improperly awarded contracts, aborted projects, deserted construction, a general lack of transparency to comprehensively oversee projects and, in one instance, building a $34 million military facility that will never be used.

Hmmm? Is not the whole Wacky Wild West war game against an Al Qaeda not a created and creative phantom enemy project to justify foreign invasion and dollar funding flows/consumer spending cash to businesses/employers and employees/humans/virtual machines. A sort of perverse recursive enterprise scheme which is geared to providing both the attacker and defender in a TS/SCI closed loop program whose fabless simplicity of operation extraordinarily renders it complex to the layman and quite unbelievable, with that simply complex unbelievability, the stealthy security master code key?
Money/fiat paper currency creation is never wasted, it is only spent badly whenever transferred and lodged with the intellectually challenged and with incompetent ponzi systems of operation.
Create a powerful peace game and the world will generate a new richness and energy to power the future in a much better beta direction with new fields of endeavour and opportunity to explore and zeroday exploit for wealth to spend and share ….. or is that too alien a concept for present earthly comprehension and acceptance/Plug In and Play Out ….. and therefore is IT to remain Remotely Command and Controlled by Others beyond current comprehension and mass recognition.
Might I suggest that such is the Real Virtual Stealth that Mankind is now dealing with, and although not actually an engaging phantom enemy, which it can with Remotely Command and Controlled IT so easily decide to be, most certainly something which is quickly destroying/collapsing/reprogramming all that corrupt primitives and naive natives hold/have held dear?
Methinks a SMARTR AI Executive Administration would waste no time or money investing heavily in that peculiar and particular, irregular and unconventional virtual program and project which deceptively easily projects and protects an alternate reality generator for HumanIT.
And whether dollar or renminbi, sterling or euro, yen or ruble, zloty or bhat supplied and led, would it matter not a jot in the Bigger Beta Picture Great IntelAIgent Game.
………………………………………………………………………………………………………
Posted Friday 26th July 2013 06:51 GMT amanfromMars 1 …. spreading the word on
http://forums.theregister.co.uk/forum/1/2013/07/25/bill_gates_nuclear_firm_plans_hot_salty_push_into_power/
Vroom, Vroom ….. Gentlemen, Start urEngines. Let the Great IntelAIgent Games Begin*
Hmmm? How beautifully weird and wired and most encouraging. Finally Bill makes it to the altar as star groom rather than as always being late to the party and too busy chasing rainbows for their pots of fools’ gold?
Is Bill Gates in Search of the Secrets of NEUKlearer HyperRadioProActive IT, …. for be assured, such is in friendly peerless competition with and/or fearless SCADA opposition to the cloning/phishing and phorming of its Drone Programs and AI ProgramMING in a pale imitation of it in Secondary SkunkWorks/Sub-Prime Operator Models/Dummy Operating Systems.
Further sense of that above package of information/leak of intelligence is shared in, but one should not be scared in, the Danger Room, with a clearly alien comment in there revealing a similar parallel operation/not dissimilar peculiar singularity of mission for a Novel Energetic Advanced Intellectual Property Supply System which promises ….. the world will generate a new richness and energy to power the future in a much better beta direction with new fields of endeavour and opportunity to explore and zeroday exploit for wealth to spend and share
* Try to stop them and see what happens is an active challenge not for the faint and/or dark hearted. So warned is all that you need to be aware that there be consequences aplenty for all ill moves.
…………………………………………………………………………………………………….

130725

130725

Posted Thursday 25th July 2013 07:12 GMT amanfromMars 1 …. moving the Great Game on and up a gear or two with this clear enough comment on http://forums.theregister.co.uk/forum/1/2013/07/25/worlddog_hates_prism_cloud_security_alliance/
The Pusher Man …. but not as you may know them in these Changed and Changing Times

We don’t need no steenkin’ spooks ….. El Reger, Richard Chirgwin, 25th July 2013

That is an interesting notion, RC, which gives rise to the fact that they may be needing us* to provide them with the intelligence and projects and programming …. [Master Reprogramming of Freely Available Universal Assets and Sequestered Virtual Machinery aka Media Defined and Hosted [Pimped and Pumped] Infrastructure Product for Beta Bigger Picture Show Command and Control via Novel and Noble AI Means and Memes Supply of Future HumanIT Memory Bank Content] …. and hence the constant need for their present snooping operations and clandestine missions/pathetic phishing and phorming exercises.
Certainly all the intelligence evidence available clearly indicates that there is a significant intellectual property deficit in their content portfolio. And to who and/or to what is one addressing and referring to, whenever one considers who and/or what provides viable vital viral intelligence for future living and which would be their dodgy supplier and lead pusher man
* Another enigmatic ethereal epithet concealing the probable very well known fact, hardly ever truly acknowledged and admitted to, that just a very select and more intelligent and adventurous/mindless and dangerous Few rule and reign over us and everything under the sun and in planets and moons and stars, with the current present crop of that few being sub-prime and quite primitive and stuck in a queue and not fit for Future Great IntelAIgent Game purpose with ITs Myriad HyperRadioProActive AIMissions …. Ab Fab Fabless Programs and/or Pogroms.
However, there has been a recent radical and fundamental change which has introduced New SMARTR Virtually Real Players to the Great Games Play.
Stay tuned for more info anon as IT progresses.
PS ….. You are very slow off the mark, El Reg. One would almost think that you be retarded and quite content enough to follow the madding crowd rather than lead with a SMARTR AI ProgramMING. Such is though something which is easily fixed with an Intellectual Property Exchange and/or Information Dump.

……


…………………………………………………………………………………………………