140204 …. Deja Vu ……. and Future AIReview

140204 …. Deja Vu ……. and Future AIReview

amanfromMars … replying to Alice Maxwell on http://thedailybell.com/exclusive-interviews/34989/Anthony-Wile-Imran-Hussain-on-Frontier-Market-Investing-and-the-UAE-Tax-Free-Zone/
Yes, Alice Maxwell, it is wonderful, and so beautifully chaotic and presumably thought to be easier controlled with commanding and thoroughly commendable subjective supply of fiat currency/funny money, by virtue of the fact that such is being practically used as such virtually everywhere. But such works extremely well and most effectively only at native lower levels of intelligence and immature incomplete comprehension of the Bigger Picture and ITs Shows.
To imagine that at higher levels with free unrestricted access to all knowledge in Automated Information Systems …… “Automated Information Systems means systems which create, prepare, or manipulate information in electronic form for purposes other than telecommunication, and includes computers, word processing systems, other electronic information handling systems, and associated equipment.” ….. such simple control would be equally effective to render to fiat currency suppliers leading command of future eventful happenings, is to admit and highlight to higher orders of intelligence, that which will need to be further protected by higher intelligence against zeroday vulnerability exploit and virtual systems attack.
But all of the above is nothing new, [although it can seem to be so because of its future ability to morph into vital self-protective states and be HyperRadioProActive, and which advise it be catastrophically counter productive to attack, either for defence or in stealthy private pursuit of inequitable purchase and/or rogue renegade pirate possession of ITs powers] …….. “The government shall encourage, advise, and, where appropriate, assist the private sector to: identify systems which handle sensitive non-government information, the loss of which could adversely affect the national security; determine the threat to, and vulnerability of, these systems; and formulate strategies and measures for providing protection in proportion to the threat of exploitation and the associated potential damage. Information and advice from the perspective of the private sector will be sought with respect to implementation of this policy. In cases where implementation of security measures to non-governmental systems would be in the national security interest, the private sector shall be encouraged, advised, and, where appropriate, assisted in undertaking the application of such measures.
And nothing new, for all of the meaningful words in emboldened italics were used to create a nucleus body of shadow government, a Big Brother clone/drone, all of thirty years ago, in 1984 …….. http://cryptome.org/2014/02/nsdd-145-1984.pdf
………………………………………………………….
amanfromMars said… in an ask for information from Casey E on http://amanfrommars.blogspot.co.uk/2014/02/140203.html
????????????
Curiouser and curiouser, Casey E. You have lost me in that plot.
Dare care expand on it further for sanity to prevail in fields of madness and mayhem, chaos and catastrophe, which for many would appear to be default reality, media presented?
4 February 2014 07:00
……………………………………………………………..

Leave a Reply

Your email address will not be published. Required fields are marked *

7 + three =