Monday, January 30, 2012

PressTV - UK's Hague questioned over Iran assasination

PressTV - UK's Hague questioned over Iran assasination

USS Enterprise

'On board of the oldest US aircraft carrier, the USS Enterprise, Panetta told the crowd of 1,700 sailors that the 50-year-old ship is heading to the Persian Gulf region in a direct message to Tehran.

“The reason we maintain a presence in the Middle East ... We want them to know that we are fully prepared to deal with any contingency and it's better for them to try to deal with us through diplomacy," Panetta said.

The USS Enterprise is the oldest active duty ship in the American naval fleet and its mission dates back to the Cuban missile crisis in 1962 and the Vietnam War.'

Read more: US to Send Old Warship to Persian Gulf in Potential Pearl Harbour Redux

With the collapse of the oil embargo to force Iran into a confrontation over the Straight of Hormuz, the US and Israel are looking for another way to get the long-sought war with Iran started, and more to the point, need to make it look like Iran is starting hostilities in order to make it politically more difficult for Russia and China to support Iran.

'Now, recall that Israel has a past history of attacking US warships and framing others to trick the US into attacks on Israel's enemies, with the Israeli attack on the USS Liberty (initially blamed on Egypt) as the most well-known example.

So here we have the USS Enterprise, the oldest carrier in the fleet, on her last legs, scheduled to be decommissioned next year. Her name is well known, in part because of the Star Trek TV series. Decommissioning a nuclear aircraft carrier is a very expensive process. USS Enterprise is powered by 8 nuclear reactors, all of which must be disposed of as nuclear waste material along with all the associated machinery. The US Navy would save a great deal of money, more than the scrap worth of the steel, if USS Enterprise were to be sunk in the Persian Gulf, where the radioactive mess is someone else's problem to deal with.

So, why send an ancient ship at the end of her useful life into harms way? The same reason Franklin Roosevelt moved a bunch of obsolete warships from San Diego to Pearl Harbor, while the newer carriers and warships were well away from Hawaii on December 7th, 1941.

Israel has 3 Dolphin submarines, given to her by Germany. They have been seen transiting the Suez Canal in the past, and could well be operating in the Gulf of Oman, even the Persian Gulf by now, lying in wait for a used-up and obsolete warship, more useful as a sacrificial lamb than an actual weapon, a ship with American sailors, to be attacked as Israel attacked the USS Liberty, then to be blamed on the designated target, Iran, by a compliant media.'

The USS Liberty Cover-Up

The USS Liberty Cover-Up: "If it was an accident, it was the best planned accident I've ever heard of" - USS Liberty survivor

Forget global warming - it's Cycle 25 we need to worry about (and if NASA scientists are right the Thames will be freezing over again) | Mail Online

Forget global warming - it's Cycle 25 we need to worry about (and if NASA scientists are right the Thames will be freezing over again) | Mail Online: The supposed ‘consensus’ on man-made global warming is facing an inconvenient challenge after the release of new temperature data showing the planet has not warmed for the past 15 years.


Does anyone actually know whats going on?????????????

Activist Post: Cashless Society: India Implements First Biometric ID Program for all of its 1.2 Billion Residents

Activist Post: Cashless Society: India Implements First Biometric ID Program for all of its 1.2 Billion Residents

Sunday, January 29, 2012

Activist Post: ACTA: The Corporate Usurpation of the Internet

Activist Post: ACTA: The Corporate Usurpation of the Internet

Activist Post: Monsanto Investor Bill Gates Says GMO Crops Needed to Fight Starvation

Activist Post: Monsanto Investor Bill Gates Says GMO Crops Needed to Fight Starvation

Activist Post: Two brave policemen shoot 43-year-old woman in the back with tasers

Activist Post: Two brave policemen shoot 43-year-old woman in the back with tasers

Nigeria: Thrown into Chaos and a State of Civil War: The Role of the IMF

Nigeria: Thrown into Chaos and a State of Civil War: The Role of the IMF

Internet Censorship: The Anti-Counterfeiting Trade Agreement | The Economic Voice

The Anti-Counterfeiting Trade Agreement | The Economic Voice


StopACTA

Egypt Uprising: Cartoons - Zapiro - Mail & Guardian Online: The smart news source

Cartoons - Zapiro - Mail & Guardian Online: The smart news source

Fukushima: A Nuclear War without a War: The Unspoken Crisis of Worldwide Nuclear Radiation

Fukushima: A Nuclear War without a War: The Unspoken Crisis of Worldwide Nuclear Radiation

Thursday, January 19, 2012

Black America Paralyzed, Powerless, Irrelevant: Year 4 of the Obama Era | Black Agenda Report

Black America Paralyzed, Powerless, Irrelevant: Year 4 of the Obama Era | Black Agenda Report

How to Protect Your Internet Privacy

The U.S. Government is one of the leading threats to Internet freedom.

In 2011, Immigrations and Customs Enforcement (ICE) seized more than 100 domains, often without any basis in law. 

Some politicians--most notably Joseph Lieberman--have called for an Internet Kill Switch whereby the executive branch of the United States Government would be given the "legal authority" to "kill" or terminate some or all of the Internet for any reason.  

More recently, the Stop Online Piracy Act (SOPA), a draconian measure supported by much of Hollywood, threatens to subvert what little freedom remains on the Internet.
 
However, legislation targeting Internet freedom must be construed in a broader context: since September 11th, 2001, the Patriot Act has essentially sundered the rights and freedoms afforded by the United States Constitution.  And, in many ways, it has given birth to the National Security State.
 
In light of the various threats to Internet privacy, it is necessary to protect yourself not only from governments, but multinational corporations, internet service providers, universities, employers, and criminal networks.  

ENCRYPTED INTERNET

Every connection to the Internet has an Internet Protocol (IP) address issued by an Internet service provider (ISP).  The IP address may not only reveal who the internet service provider is, but more importantly, the approximate city, state, and country of a particular user. 

In addition, every search made and every website visited (in particular, online banking, email logins, et al) record a person's IP address and saves it indefinitely.

It is this number that uniquely identifies every user on the Internet.  And since the ISP has a record of the subscriber (name, tax identification number, home address, et al) , every connection is traceable--traceable, that it is, unless the data is first encrypted by a proxy or a VPN service before passing through the internet service provider, making the data unreadable to the ISP. 

In addition to encrypting data, proxies and VPNs can hide a person's IP address and replace it with a different IP.

Although many services on the Internet promise privacy and anonymity, few deliver on such a promise.  All web based proxies, such as yourcheat.com, anonymouse.com, and shadowsurf.com, for example, are ineffective and consequently must be avoided. 

Web based proxies do not encrypt an Internet connection and simply cannot handle third party plugins such as JavaScript, Flash, Java, et al.  More importantly, many web based proxies are in fact run by criminal networks, law enforcement, and intelligence agencies.

Virtual Private Networks (VPNs), unlike proxies, encrypt the whole Internet; however, like proxies, VPNs can be good or bad, depending on the service provider.  A VPN connection typically encrypts data from a person's computer through the ISP to a VPN server.

How to choose a VPN:

    •    Always read the privacy policy of a VPN provider.  Avoid services that keep data logs.
 
    •    Understand that all VPN services, regardless of the privacy policy, offer private--not anonymous--connections.  VPNs are not anonymous because all data passed from users' connections are visible to the VPN provider; ultimately, VPNs require a certain amount of trust on the user's end.

    •    Avoid Point to Point Tunneling Protocol (PPTP) services.  PPTPs are considered less secure than OpenVPN services.
 
    •    OpenVPN is open source VPN technology that encrypts Internet connections with high grade encryption. www.vpn4all.com and www.cyberghostvpn.com are a few popular VPN services.
 

Proxy Services:

    •    Only use network proxies that are open source programs.

    •    Onion Proxy services (such as Tor) are the most anonymous Internet connections but also are among the slowest.
 
    •    Proxies have limitations on the ports they can anonymize.  In order to anonymize all ports, proxies require third party software known as Socksifiers.

EMAIL


Email messages resemble a post card--there is nothing preventing anyone from reading it in transit.  Here are some precautions you can take:

    •    Always encrypt sensitive emails with either PGP or S/MIME standards.

    •    Avoid popular email services offered by www.google.com, www.yahoo.com, and www.hotmail.com.  Those services are neither private nor anonymous.
 
    •    Be cautious of certain email services claiming to be private (i.e. www.safe-mail.com) but are in reality intelligence honeypots.
 
    •    Always read the privacy policy of email services.  It is almost always preferable to use an email service outside of local jurisdiction. www.vekja.net; www.cryptoheaven.com; and www.lavabit.com are popular choices.

    •    To avoid spam, preserve privacy, and protect against potentially dangerous email, always use a disposable email service for forum logins, online coupons, and other online activities.  www.mailinator.com and www.dispostable.com are good choices.  However, please remember that most throwaway email services are not intended for sensitive data, since anyone may be able to read the contents of the email.

ONLINE PURCHASES

    •    It is always preferable to use a prepaid gift card (American Express, Visa, et al) for anonymous online purchases than a debit or credit card.
    •    It is preferable to use an alias when purchasing online products.
---


The author is the author of The Privacy Book.  Contact the jackhelios@vfemail.net    --For more information, please visit https://www.awxcnx.de/handbuch.htm

Tuesday, January 10, 2012

Romney Wins New Hampshire Republican Primary - Bloomberg

Romney Wins New Hampshire Republican Primary - Bloomberg: employees

DEBT LIMIT - A GUIDE TO AMERICAN FEDERAL DEBT MADE EASY. - YouTube

DEBT LIMIT - A GUIDE TO AMERICAN FEDERAL DEBT MADE EASY. - YouTube

World Of Technology: German Hackers Are Building a DIY Space Program to Put Their Own Uncensored Internet into Space

World Of Technology: German Hackers Are Building a DIY Space Program to Put Their Own Uncensored Internet into Space

Greece Spends Bailout Cash On European Military Purchases | ZeroHedge

Greece Spends Bailout Cash On European Military Purchases | ZeroHedge

savethemales.ca - Wear Them Out With Passive Resistance

savethemales.ca - Wear Them Out With Passive Resistance: t's called, "herding cats."

The Great Shadow at the Gates of Ruin. Smoking Mirrors

The Great Shadow at the Gates of Ruin. Smoking Mirrors

Sunday, January 01, 2012

Stuxnet weapon has at least 4 cousins: researchers | Reuters

Stuxnet weapon has at least 4 cousins: researchers | Reuters

Audit of the Federal Reserve Reveals $16 Trillion in Secret Bailouts | Unelected.org

Audit of the Federal Reserve Reveals $16 Trillion in Secret Bailouts | Unelected.org

VEXNEWS © 2012 | KARMA CARNAGE: Sol Lew’s $510 million tax sham scam backfires as he sues his own kids to recover the loot

VEXNEWS © 2012 | KARMA CARNAGE: Sol Lew’s $510 million tax sham scam backfires as he sues his own kids to recover the loot

Do Jews Rule America? | Real Zionist News

Do Jews Rule America? | Real Zionist News

McDonnell Douglas F-15 Eagle - Wikipedia, the free encyclopedia

McDonnell Douglas F-15 Eagle - Wikipedia, the free encyclopedia

U.S. finalizes $30 billion weapons deal with Saudi Arabia - Haaretz Daily Newspaper | Israel News

U.S. finalizes $30 billion weapons deal with Saudi Arabia - Haaretz Daily Newspaper | Israel News: F-15 fighter jet

State Of Human Rights In Israel

State Of Human Rights In Israel

Chimpanzees seem to know what's on other chimps' minds | Science | The Guardian

Chimpanzees seem to know what's on other chimps' minds | Science | The Guardian

Revealed: true scale of breast implant scandal - Telegraph

Revealed: true scale of breast implant scandal - Telegraph

Nigeria declares state of emergency in northern regions - Telegraph

Nigeria declares state of emergency in northern regions - Telegraph

RT's Best of 2011 - YouTube

RT's Best of 2011 - YouTube

PressTV - Israel preparing for another Gaza war

PressTV - Israel preparing for another Gaza war

PressTV - World hunger reaches one billion

PressTV - World hunger reaches one billion

Israeli FM ‘Enraged’ at EU for Noting Discrimination in Israel -- News from Antiwar.com

Israeli FM ‘Enraged’ at EU for Noting Discrimination in Israel -- News from Antiwar.com

Iowa GOP poll shows Santorum closing in on Romney and Paul in late surge | World news | guardian.co.uk

Iowa GOP poll shows Santorum closing in on Romney and Paul in late surge | World news | guardian.co.uk

BBC News - Iowa caucus: Mitt Romney and Ron Paul nearly neck and neck

BBC News - Iowa caucus: Mitt Romney and Ron Paul nearly neck and neck

Monsanto Declared Worst Company of 2011 | Natural Society

Monsanto Declared Worst Company of 2011 | Natural Society