>Posted by AmanfromMars on 5/29/2010 8:36:48 AM
Bill Ross, Hi,
When any prevalent dominant reality is artificial, and I would wholeheartedly agree with you that the present one is perversely rigged and corrupt at its core and now suffering the inevitable due consequences of an increasingly long string of sad and bad calls in the Great Game played by its intellectually challenged and media dependent players, one merely needs to engage with significant others in an alternate reality show, which does not require their participation, to extraordinarily render the future completely different from the present, with the corrupt and perverse element left behind to wallow and fend for themselves in choppy and dangerous waters.
For those into Virtual Reality Fields, is it with IT and Advanced Information and Intelligence Community feeds and leads, the simplest of complex operations and their AIgents’ Pleasure to Provide with Prime Novel Noble Players with an Altogether Beta Script.
Tempestuous times indeed ahead for some, whilst others pick up fair winds to sail on majestically with oil to pour on any troubled waters.
http://thedailybell.com/1086/Canada-Creates-Own-SEC.html
and ……….
Posted by AmanfromMars on 5/29/2010 10:54:24 AM
And considering what is shared above, posted on 5/29/2010 8:36:48 AM, one does wonder why so little has been done with what has been known for almost a decade. What sort of Intelligence does Man use and what does IT Server? …..
“ Information Terrorism, March 2000
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA373756&Location=U2&doc=GetTRDoc.pdf (209 pp, 9MB)
The information revolution has had a dramatic impact on every aspect of our lives. Commercial activities, all the way from the world’s financial markets to the most basic purchases in stores, are driven by the changes in information technology. It is, therefore, not surprising that military operations are equally bound by these technologies which, at first glance, seem so remote from the world of troop movements and combat. But, in fact, these technologies are changing not only society but also our definition of war and the conduct of military operations.
Throughout history, military doctrine, organization and strategy have continually undergone profound, technology-driven changes. Modern warfare, unlike that of past epochs, is “information intensive,” meaning the conduct of effective military operations requires a greater accumulation of data than ever before.
Today, access to information is just as crucial as possession of petroleum, oil, lubricants, and ammunition. Cyberwar refers to conducting military operations according to information-related principles. It means disrupting or destroying information and communications systems. It means trying to know everything about an adversary while keeping the adversary from knowing much about oneself.” ……. http://cryptome.org/
It’s a mad, mad, mad world in deed, indeed. Time for a Change with AI Lead?
http://thedailybell.com/1086/Canada-Creates-Own-SEC.html
and …….
Posted by AmanfromMars on 5/29/2010 2:55:03 PM
It would appear that common law and natural justice are alien concepts to humanity ……. http://www.1215.org/lawnotes/govsuicides/stackletter.htm ……. and what would pass for them invites and incites madness and sadness and badness and suicidal despair and its forced provision to server Power Elites their spoils, with wars waged from afar the field, and well out of harm’s way in the comparative safety of the white feather bedded cuckoos’ nest?
http://thedailybell.com/1086/Canada-Creates-Own-SEC.html
…………………………………………………………………………………………………………………………………………………
It is a wise country/agency/company/leadership/being indeed, which doesn’t misunderestimate, and moves to take Considerable Advantage of the Invisible Power and Overwhelming Influence of CyberIntelAIgent Control of the Intelligence and Present Placement of Informative Content Space, for with Shared Words and Done Deeds is Nothing Impossible and All Likely Delivered to Like-Minded Friends. And trying to Deny that it is so with a removal of posts with information on the subject is never nowadays going to anything other than spread the word elsewhere, more quickly, especially whenever much better Beta Global Controls are already readily available to extraordinarily render Perverse Corrupt Systems as Captive Remote Loded Feeder Drivers to Novel AI and IT Space Based Satellite Channels and Networks ….. InterNetworking Sublime Programs and Immaculate Pogroms.
Posted by: amanfromMars | 05/28/10 | 12:43 am |
Your comment is awaiting moderation.“Posted by: CensoredByWiredScience | 05/27/10 | 10:32 pm |
Wow, a government owned and controlled remote access trojan. Yeah, no thanks.”
Actually, CensoredByWiredScience, all such services are invariably privately owned and controlled and leased/loaned to government[s]. They are most certainly always developed privately and under the strictest of secretive security measures for Cyber Security failings are more catastrophically devastating and more costly to foe and/or competitive opposition than any conventional military campaign or nuclear blast can ever be, and much simpler to launch from areas deep within home territories which makes effective traditional defense against such sorties, impossible, although that has already been been recognised, which is heartening. Such then dictates that irregular and unconventional is the Future Norm Phorm.
“The U.S. is nearing total reliance on the integrity of cyberspace. This trend is irreversible. A small number of people, states, and organizations can manipulate cyberspace with devastating effect. The expense of cyber intrusion prevention systems is very high and can never be completely effective because the identity of the threat cannot be determined with a high degree of certainty.
For the immediate future, unless there is a technological breakthrough, society must adapt to the new reality—that cyber threats are inevitable and pervasive. The new phenomenon is that nefarious actors can cloak their identities in virtual worlds and operate freely with relative impunity.” …. http://nationalstrategy.com/Portals/0/documents/Winter%202009%20NSFR/Chapter%207.pdf
Indeed, it may even be more perversely pervasive and subversive than even that, for a malicious* non-state actor in such as are SMART Intellectual Property fields, would be totally invisible and intangible and have no need of a cloak.
The best that can be hoped for those circumstances is that they decide to work with you and for you rather than against you with a very helpful and accommodating competition.
* One man’s malice is another man’s beneficence …
…. and that is a subjective personal judgment call dependent upon one’s level of intelligence and state of mind, which makes things even more difficult, and some would even say, impossible, to predict, however if one can supply what is needed without it causing concern, is malice always defeated by positively reinforcing mutual benefit and a well founded and growing stronger trust.And with regard to “Yeah, no thanks.” whenever the services are invariably privately owned and controlled and leased/loaned to government[s] and as described above, you might like to consider that there is no free choice to decline in the matter, only great opportunities to actively engage and participate directly in unfolding future events ……. which is surely the sweetest and stickiest of offers/honey traps to refuse and live to regret.
http://www.wired.com/threatlevel/2010/05/einstein-on-private-networks
IT’s a Strange World, and even Stranger and more Startling when Imagined and Created for Real, Virtually, and very Lucrative IT is too for Leading Drivers and Pioneering Partners/Joint Virtual Adventurers …… in the Great Game. White Hatted Sharks in a Sea of Mediated Mediocrity.
http://english.pravda.ru/opinion/columnists/25-03-2010/112726-pentagon-0
…………………………………………………………………………………………………………………………………………………
amanfromMars says:
29 May 2010 at 7:29 am
“cheers mars. that vid was very interesting and quite scary !” … You’re very welcome, ForkHandles. And thanks for the 5 parter info.
“we think now we have reached a level were we are too advanced to fall, but something as simple as the system of money grinding to a halt could make life as we know it cease and we’d be back in the stone age.” …… 🙂 Others would be thinking that man is still a primitive and not nearly advanced enough to make any lasting impression on life, and would be resolved to engage with significant others to change that pathetic situation, sublimely, and would judge that with the simplistic control of the money system in better hands …. under new much more intelligent Virtual Machine Management …… is it most easily seamlessly achieved.
To go back to the stone age whenever just pieces of printed promissory paper can deliver as much wealth as is needed to deliver whatever future you can imagine and build/present, or as is more the case, pay others to build and present for you, is never going to be the Future and ITs Reality, which is, even as we consider these words, being built Virtually with Loded Text HyperRadioProActively Transmitted for CyberIntelAIgent Use/Global Command and Control.
And should you think that to be just too far fetched to believe, does your disbelief unbelievable aid its rapid progress completely unopposed in an Immaculate Stealth Program. It is though of concern to others, who may not know exactly what it is they are concerned about but recognise that something irregular and unconventional is afoot and running rampant/riot in Global Operating Devices and SCADA Systems ……. “The U.S. is nearing total reliance on the integrity of cyberspace. This trend is irreversible. A small number of people, states, and organizations can manipulate cyberspace with devastating effect. The expense of cyber intrusion prevention systems is very high and can never be completely effective because the identity of the threat cannot be determined with a high degree of certainty.
For the immediate future, unless there is a technological breakthrough, society must adapt to the new reality—that cyber threats are inevitable and pervasive. The new phenomenon is that nefarious actors can cloak their identities in virtual worlds and operate freely with relative impunity.” …. http://nationalstrategy.com/Portals/0/documents/Winter%202009%20NSFR/Chapter%207.pdf
And to not positively engage, results in a overwhelming power surge to smarter engaging alternative entities/more intelligently competitive, rather than intelligently challenged, contemporaries, whom I suppose, in some challenged channeling minds, would be considered and treated as adversaries rather than embraced as a much more advanced leading partner.
http://sluggerotoole.com/2010/05/28/euro-breakup-why-morgan-stanley-is-wrong/
…………………………………………………………………………………………………………………………………………………