Steel & Tube : Fortress Fasteners New Plymouth is moving ...

Season 6 Opening Credits – Company Logo Changes and Additions / Comparison to Season 1-5

In good practice, tradition and duty I expanded the list 😃
List of companies shown:
Season 1
https://www.youtube.com/watch?v=q_J0wpueotM
Season 2 (additions / changes)
https://www.youtube.com/watch?v=mQF1tHf6IOE
Season 3 (additions / changes)
https://youtu.be/lSmDiMx3D8c
Season 4 (additions / changes)
https://www.youtube.com/watch?v=SiO9-Xz29T4

Season 5 (additions / changes)
https://www.youtube.com/watch?v=4eMYiDaY3-Q
Did I miss something? Let me know and I'll add it to the list!
Redditor lkalashnikov created a video comparison with a lot more hidden details: https://www.youtube.com/watch?v=W7oV45qTBeM
Amazing work! Check it out!

Season 6 (additions / changes)
https://www.youtube.com/watch?v=I_-36wm0j-I
Please let me know if something is missing.
submitted by nezia to SiliconValleyHBO [link] [comments]

HUOBI – THE EXCHANGE BUILT FOR THE FUTURE - A HONEST REVIEW BY AN USER

HUOBI – THE EXCHANGE BUILT FOR THE FUTURE - A HONEST REVIEW BY AN USER
HUOBI – THE EXCHANGE BUILT FOR THE FUTURE
A HONEST REVIEW BY AN USER
https://preview.redd.it/3il28cidztt41.png?width=313&format=png&auto=webp&s=b7c7ccafde202532977305d9be044ba9c7f88e42
Leon Li founded Huobi in 2013, a former computer engineer at Oracle. Huobi Global is a digital asset and crypto currency exchange headquartered in Singapore. Huobi also has local exchanges in South Korea, Japan, and through its strategic partner, the United States.
The Huobi Group, the parent company of Huobi Global, has received venture capital finance from prominent Beijing based ZhenFund and American VC firm Sequoia Capital.
The Huobi Global exchange serves traders in 130 countries. Through Huobi Global, traders can access almost 200 crypto and stable coin assets. Huobi users can download trading clients on both mobile and desktop devices.
Huobi has traded over US$1.2 trillion in digital assets, and at one time it was the world’s leading exchange by volume, capturing 50% of all global trading volume.
In terms of security, Huobi has adopted a decentralized exchange structure, which helps to resist DDOS attacks. However, Huobi has implemented the ‘Huobi Security Reserve, in which Huobi has set aside 20,000 BTC reserved for users who have lost funds either due to hacks, or exchange failures.
Ease of use
The UI is clean, user-friendly and perfectly designed with all the basic requirements for a crypto-trader. The charting software is provided by Tradingview, which is exactly what you want.
https://preview.redd.it/nm2fr51mztt41.png?width=602&format=png&auto=webp&s=16c406a4eec33a1c28d2bcb5330bee6b043fc359
Huobi OTC
Huobi’s OTC exchange is a good initiative. The Huobi OTC exchange allows users to trade funds peer-to-peer which doesn’t affect the market price of the underlying asset. The OTC trading-desk, with transfer options like bank-transfers, PayPal, WU, Paytm, UPI, IMPS, Alipay & many others, is an easy to use payment gateway. With a secure exchange to diversify your investment, right next door, too with effective list of Buy and Sell options for BTC, ETH, USDT and EOS coins.
https://preview.redd.it/66c2zr2oztt41.png?width=602&format=png&auto=webp&s=41899be5c02791f9f5323b957ad13d092b5275f7
Huobi Lite
Huobi Lite App provides a convenient channel for everyone to buy cryptocurrencies at the best prices. Tailor-made for beginners, traders, and users.
We can download the App directly from the respective iOS Store or Google Play Store. Alternatively, we may access via the link: https://lite.huobi.com/download
https://preview.redd.it/tw8p8cmpztt41.png?width=260&format=png&auto=webp&s=88f4d4d45b8b287d452f02547adfd187f2b09977
On Huobi Lite, you can buy Bitcoin with your local currencies, credit card, or exchange cryptocurrencies tokens, with zero fees at competitive prices. Huobi Lite currently supports MYR / HKD / VND / USD (Credit Card deposit only), with more to come in the future.
Huobi Derivative Market (Huobi DM)
Margin Trading
Huobi Global launched Huobi Derivative Market (Huobi DM) exchange to selected countries. It provides margin trading, with very low daily loan interest rates of 0.1%. Margin Trading allows users to increase their investment exposure given a limited base principal to enjoy multiple returns.
3-Steps taken in Margin Trading:
  1. Request for Loan
  2. Trade on Margin (Long/Short)
  3. Repay Margin Loan and Interest
With the introduction of Cross Margin on Huobi, users will have to explicitly input the respective margin type before executing the above 3 steps. Balances on the Cross Margin balance does not show on the Isolated Margin balance.
Huobi Futures
Huobi Futures is a kind of digital currency derivatives. Users can make a profit from the rising/falling of digital currencies prices by going long or selling short based on their own judgment.
The Huobi Futures Contract adopts spread delivery. When the contract expires, all open positions will be closed at the index-based last-hour arithmetic average price, instead of physical delivery.
BTC/ETH/EOS/LTC/XRP/BCH/TRX/BSV/ETC Contracts are available on Huobi DM. Contracts are priced in USD, with corresponding digital currency (BTC/ETH/EOS/LTC/XRP/BCH/TRX respectively) as margin to open positions, and PnL is also settled in corresponding digital currency.
Weekly, bi-weekly and quarterly contracts are available in Huobi DM. Weekly contracts will be settled on imminent Friday; Bi-weekly contracts will be settled on next Friday; Quarterly contracts will be settled on the last Friday of March, June, September and December.
Choices of leverage: 1x, 5x, 10x, 20x
Huobi Perpetual Swap
Huobi introduced Perpetual Swaps on March 27, 2020 (GMT+8). Huobi Perpetual swap is a kind of digital currency derivatives. Users can make a profit from the rising/falling of digital currencies prices by going long or selling short based on their own judgment. Similar to a margin spot market, its price is close to the price of the underlying reference index. The main mechanism for anchoring spot prices is the cost of funds. Perpetual swap have no delivery date. Users can always hold it. Perpetual swap are settled every 8 hours. After each settlement, the realized profit/loss and unrealized profits/losses are transferred to the user account balance.
Partial Liquidation
Huobi Futures adopted partial liquidation to help position holders reduce liquidation risk. Users with large positions and high leverage bear high risk. Huobi Futures releases partial liquidation with the aim to lower possible losses due to high price volatility thus giving users better trading experience.
Under partial liquidation mechanism, when liquidation is triggered, instead of liquidating all positions at once, the system reduces positions gradually till a grade whose margin ratio is great than 0. Full liquidation will only occur when the margin ratio of tier 1 upper limit net position still fails to be great than 0.
Trading Fees
The Huobi exchange has a fair trading fee structure. Every asset traded via Huobi Global is subject to a 0.2% trade fee, for both market makers and takers. Further, Huobi Global has introduced a tiered fee system which offers competitively lower fees for high volume traders. VIP membership gives access to various fee reductions and other benefits.
Huobi Prime
Huobi Prime, the Launchpad platform which we can call Direct Premium Offering (DPO), does share some similarities with initial exchange offerings (IEO) like Binance Launchpad, but it is unique as it is not a fundraising platform, and any coins purchased on the platform are immediately deposited into the users’ wallets and tradable on Huobi Global. Huobi Prime offers its users early access to the coins of premium projects, which can be bought using its native crypto currency, the Huobi Token. To avoid dumping, Huobi has implemented an innovative idea of a period of tiered price limits.
Huobi FastTrack
Huobit FastTrack, rebranded from Huobi Prime Lite, is a new listing model. Wherein, all participants will have a direct say in what projects are listed on Huobi Global and when. In addition, winning voters will get access to quality tokens at below market rates. The program also provides much needed exposure and a straightforward listing process.
Huobi Wallet
https://preview.redd.it/6iux5zotztt41.png?width=602&format=png&auto=webp&s=fef6f6d6813ec82a70df28b160fe18ba2237daba
Huobi Wallet is the official mobile wallet of Huobi Group, a leading global digital asset financial service provider. It is a multi-chain asset management tool that provides native support for various types of blockchains and all of the ERC20 tokens. So far Huobi Wallet supports BTC, BCH, LTC, ETH, ETC, USDT and all ERC20 tokens.
Huobi wallet is the first wallet to expand support to cover seven stablecoins including, Paxos Standard Token (PAX), TrueUSD (TUSD), USD Coin (USDC), Gemini Dollar (GUSD), Dai (DAI), Stasis EURS (EURS), and Tether (USDT).
Huobi Wallet is built based on the core principle of security-first. The wallet gives back its users, complete control of their private keys. In simple terms, You own your assets. The wallet is backed up with mnemonics, so in future when you want to import your wallet, it’s just simple few clicks.
Currently, the wallet is compatible with both iOS and Android devices and you can download both from here (www.huobiwallet.com/en)
Huobi Chain
Huobi launched Huobi Chain’s Testnet (“the Testnet”) on February 29th 2020 (GMT+8). Huobi Chain is China’s autonomous cum compliant-ready blockchain platform, and is committed to providing a global, blockchain-based, digital asset infrastructure. Huobi Chain is committed to providing a high-performance, blockchain-based, global digital asset infrastructure. Once the Mainnet goes live, Huobi Chain will announce HT- related events: e.g. pledge HT to be a Super Node, etc.
HT Lock & Mine (Huobi Pool)
Huobi launched HT Lock and Mine operations on 25th July 2019 (GMT+8). Users who lock HT tokens receive daily HPT rewards. Specific reward quantity will depend on lock option period selected, quantity locked and Huobi Pool’ s mining hash power and daily float.
DPOS Rewards: All Huobi Global users with more than 1,000HPT holdings in their HBG account will receive DPOS mining rewards. Currently, token reward received under DPOS mining include EOS, TRX, CMT, ONG, IOST, ATOM, IRIS, LAMB。
Huobi Support
Users of the Huobi exchange can access 24/7 live chat and Huobi help center. Those facing issues can also open a support ticket to have their issue resolved by an expert representative immediately.
The Huobi Group has a very active YouTube channel, featuring Huobi Talk, where it posts user tutorials, detailed guides, and crypto currency information for traders.
What I like the most about Huobi
  1. An established platform that’s been operating since 2013, which is a long time in the crypto world.
  2. Highly secured with decentralized exchange structure, which helps to resist DDOS attacks. Huobi has never suffered a large hack.
  3. Huobi Security Reserve of 20000 BTC to compensate users’ loss of funds.
  4. Dedicated, fast and 24/7 customer support.
  5. Regulated in major jurisdictions.
  6. User interface is very smooth and clean.
  7. Over 230 crypto assets are available.
  8. User education program is good initiative.
  9. Separate trading desk for institution and firm size users.
  10. Very transparent about its operations, listings and projects.
  11. Huobi Wallet is secured and very easy to operate.
  12. Huobi mobile app is smooth and very easy to use.
  13. Competitive fees.
  14. Has taken serious steps towards avoiding wash trading.
  15. Impressive array of trading pairs.
  16. Has given more important on community participation, like voting for listing, mining pool, Huobi Knights program etc.
  17. I like Huobi Prime because of following reasons: -
(a) Purchased tokens are immediately deposited into user’s accounts,
(b) As projects launch exclusively through Huobi Prime from day one, all users get assets at the best price.
(c) Tiered price limits on the platform protect both investors and projects from immediate dump.
  1. Huobi screen projects and launches which are only the best. I don’t have to worry about poor or scammy projects.
  2. Burning of HT is a great move and it would benefit long term holders.
Join Huobi by click here: https://www.huobi.com/en-us/topic/invited/?invite_code=7zkb4
Visit
Huobi Global: https://www.huobi.com/en-us/
Join Indian Group: https://t.me/huobiglobalindia
Global telegram Channel: https://t.me/huobiglobalofficial
Join Huobi by click here: https://www.huobi.com/en-us/topic/invited/?invite_code=7zkb4
submitted by VinayTM to HuobiGlobal [link] [comments]

Season 5 Intro – Company logo changes and additions in comparison to season 1-4

In good tradition and duty I expanded the list 😃
List of companies shown:
Season 1
https://www.youtube.com/watch?v=DNp1ullIXP4
Season 2 (additions / changes)
https://www.youtube.com/watch?v=mQF1tHf6IOE
  • AOL (now completely replaced by Facebook)
  • MySpace (replaced by smaller startups + ATD / re/code
  • Adobe (cut out, due to different framing)
  • LinkedIn (cut out, due to different framing)
  • PayPal (cut out, due to different framing)
  • All Things D
  • re/code
  • Uber
  • WhatsApp
  • Oculus Rift
  • Alibaba Group
  • 23andme
  • Clinkle
  • Appcelerator
  • Anybots
Season 3 (additions / changes)
https://youtu.be/lSmDiMx3D8c
  • Alphabet now thrones over Google
  • Amazon Prime drones in the shape of a DJI Phantom
  • Tesla where the old Apple building was
  • Yahoo’s logo is getting smaller, while Alibaba Group’s is gaining size
  • Soylent food trucks instead of the BBQ ones
  • Napster (the balloon got replace with one of Lyft, which is bumping into Uber = battle for market share)
Season 4 (additions / changes)
https://www.youtube.com/watch?v=7m2j_0ivw2I
  • REDDIT logo shown for a fraction of a second
  • PayPal (new logo, almost out of frame)
  • LinkedIn added, but almost out of frame
  • Zynga logo now hidden in shadow
  • Snapchat ghost floating around
  • Dropbox
  • Yelp
  • Wunderlist logo appears
  • Vine logo now attached to Twitter and quickly thrown in the trash
  • Theranos + FBI trucks
  • Uber (new logo, bigger balloon) + taxis and tents in the park to represent the protests against Uber
  • Lyft is now more aggressively battling for more market share with Uber
  • DiDi Chuxing balloon above Uber’s
  • Pinterest has a building
  • AirBnB
  • Amazon Prime Air drones that don't look like DJI's
  • Slack added
  • Twitch added
  • Nest added
  • Kind financials added
  • Samsung building behind Apple’s space ship
  • Porta pottys behind the Soylent truck
  • Private jets flying in and dumping money on Oculus Rift
  • Housemoving truck next to Alibaba? (Referencing the explosion of housing prices in SF)
  • people living in RVs were added behind Soylent truck
  • ladder to Twitter logo with varying person standing on top of it (rumors about change of leadership?)
Season 5 (additions / changes)
https://www.youtube.com/watch?v=4eMYiDaY3-Q
  • Uber and Lyft replace Theranos and Slack office-buildings and the balloons are gone (more stable and established?)
  • Uber and Lyft - detail of people transferring from Uber to Lyft by walking across a bridge connecting the buildings, as if to signify they're jumping ship
  • also money is pouring out of Uber's building, as if someone was literally throwing it out of the window
  • stack of Bitcoin-coins with Coinbase logo on top
  • excavator added next other growing stacks (silver = LiteCoin, the other gold one shows the Ethereum Logo) as a symbol for mining
  • Tesla-Semi trucks everywhere
  • less Soylent trucks, except a last stationary one
  • Amazon Prime Air drones that carry a Whole Foods package, as well as Amazon Prime packages
  • DiDi Chuxing balloon
  • Apple Park construction finished
  • Juicero added with huge building, immediately abandonned
  • Facebook got a bigger ad-like billboard, which glitches to display a version of their logo in cyrillic
  • Facebook no longer ends up covering Whatsapp and Oculus, but remains beside them
  • Alibaba
  • Yahoo
  • ladder to Twitter logo has been removed and Twitter logo is growing in size
Did I miss something? Let me know and I'll add it to the list!
Redditor lkalashnikov created a video comparison with a lot more hidden details: https://www.youtube.com/watch?v=W7oV45qTBeM
Amazing work! Check it out!
submitted by nezia to SiliconValleyHBO [link] [comments]

Georgia Tombstones (Part 2)

Georgia Tombstones (Part 2)
by Jayge 8^J
"Project Blue Beam is a conspiracy theory that claims that NASA is attempting to implement a New Age religion with the Antichrist at its head and start a New World Order, via a technologically-simulated Second Coming. The allegations were presented in 1994 by Quebecois journalist and conspiracy theorist Serge Monast, and later published in his book Project Blue Beam (NASA). Proponents of the theory allege that Monast and another unnamed journalist, who both died of heart attacks in 1996, were in fact assassinated, and that the Canadian government kidnapped Monast's daughter in an effort to dissuade him from investigating Project Blue Beam. The project was apparently supposed to be implemented in 1983, but it didn't happen. It was then set for implementation in 1995 and then 1996. Monast thought Project Blue Beam would be brought to fruition by the year 2000, really, definitely, for sure. The theory is widely popular (for a conspiracy theory) on the Internet, with many web pages dedicated to the subject, and countless YouTube videos explaining it. The actual source material, however, is very thin indeed. Monast lectured on the theory in the mid-1990s (a transcript of one such lecture is widely available), before writing and publishing his book, which has not been reissued by his current publisher and is all but unobtainable. The currently available pages and videos all appear to trace back to four documents: A transcript of the 1994 lecture by Monast, translated into English. A GeoCities page written by David Openheimer and which appears to draw on the original book. A page on educate-yourself.org, compiled in 2005, which appears to include a translation of the book from the French. Monast's page in French Wikipedia. The French Wikipedia article is largely sourced from two books on conspiracy theories and extremism by Pierre-André Taguieff, a mainstream academic expert on racist and extremist groups. From these few texts have come a flood of green ink, in text and video form, in several languages. Even the French language material typically does not cite the original book but the English language pages on educate-yourself.org. However, conspiracy theorists seem to use quantity as a measure of substance (much as alternative medicine uses appeal to tradition) and never mind the extremely few sources it all traces back to. Proponents of the theory have extrapolated it to embrace HAARP, 9/11, the Norwegian Spiral, chemtrails, FEMA concentration camps and Tupac Shakur. Everything is part of Project Blue Beam. It's well on its way to becoming the Unified Conspiracy Theory. Behold A Pale Horse, William Cooper's 1991 green ink magnum opus, has lately been considered a prior claim of, hence supporting evidence for, Blue Beam by advocates. The book is where a vast quantity of now-common conspiracy memes actually came from, so retrospectively claiming it as prior evidence is somewhere between cherrypicking and the Texas sharpshooter fallacy. However, the following quotes, from pages 180-181, intersect slightly with the specific themes of Blue Beam: It is true that without the population or the bomb problem the elect would use some other excuse to bring about the New World Order. They have plans to bring about things like earthquakes, war, the Messiah, an extra-terrestrial landing, and economic collapse. They might bring about all of these things just to make damn sure that it does work. They will do whatever is necessary to succeed. The Illuminati has all the bases covered and you are going to have to be on your toes to make it through the coming years. Can you imagine what will happen if Los Angeles is hit with a 9.0 quake, New York City is destroyed by a terrorist-planted atomic bomb, World War III breaks out in the Middle East, the banks and the stock markets collapse, Extraterrestrials land on the White House lawn, food disappears from the markets, some people disappear, the Messiah presents himself to the world, and all in a very short period of time? Can you imagine? The world power structure can, and will if necessary, make some or all of those things happen to bring about the New World Order. “Without a universal belief in the new age religion, the success of the new world order will be impossible!” The alleged purpose of Project Blue Beam is to bring about a global New Age religion, which is seen as a core requirement for the New World Order's dictatorship to be realised. There's nothing new in thinking of religion as a form of control, but the existence of multiple religions, spin-off cults, competing sects and atheists suggest that controlling the population entirely through a single religion isn't particularly easy. Past attempts have required mechanisms of totalitarianism such as the Inquisition. Monast's theory, however, suggests using sufficiently advanced technology to trick people into believing. Of course, the plan would have to assume that people could never fathom the trick at all — something contested by anyone sane enough not to swallow this particular conspiracy. The primary claimed perpetrator of Project Blue Beam is NASA, presented as a large and mostly faceless organization that can readily absorb such frankly odd accusations, aided by the United Nations, another old-time boogeyman of conspiracy theorists. According to Monast, the project has four steps: Step One requires the breakdown of all archaeological knowledge. This will apparently be accomplished by faking earthquakes at precise locations around the planet. Fake "new discoveries" at these locations "will finally explain to all people the error of all fundamental religious doctrines", specifically Christian and Muslim doctrines. This makes some degree of sense — if you want to usurp a current way of thinking you need to completely destroy it before putting forward your own. However, religious belief is notoriously resilient to things like facts. The Shroud of Turin is a famous example that is still believed by many to be a genuine shroud of Jesus as opposed to the medieval forgery that it has been conclusively shown to be. Prayer studies, too, show how difficult it is to shift religious conviction with mere observational fact — indeed, many theologians avoid making falsifiable claims or place belief somewhere specifically beyond observation to aid this. So what finds could possibly fundamentally destroy both Christianity and Islam, almost overnight, and universally all over the globe? Probably nothing. Yet, this is only step one of an increasingly ludicrous set of events that Project Blue Beam predicts will occur. Step Two involves a gigantic "space show" wherein three-dimensional holographic laser projections will be beamed all over the planet — and this is where Blue Beam really takes off. The projections will take the shape of whatever deity is most predominant, and will speak in all languages. At the end of this light show, the gods will all merge into one god, the Antichrist. This is a rather baffling plan as it seems to assume people will think this is actually their god, rather than the more natural twenty-first century assumption that it is a particularly opaque Coca Cola advertisement. Evidence commonly advanced for this is a supposed plan to project the face of Allah, despite its contradiction with Muslim belief of God's uniqueness, over Baghdad in 1991 to tell the Iraqis to overthrow Saddam Hussein. Someone, somewhere, must have thought those primitive, ignorant non-Western savages wouldn't have had television or advertising, and would never guess it was being done with mirrors. In general, pretty much anything that either a) involves light or b) has been seen in the sky has been put forward as evidence that Project Blue Beam is real, and such things are "tests" of the technology — namely unidentified flying objects. Existing display technology such as 3D projection mapping and holograms are put forward as foreshadowing the great light show in the sky. This stage will apparently be accomplished with the aid of a Soviet computer that will be fed "with the minute physio-psychological particulars based on their studies of the anatomy and electro-mechanical composition of the human body, and the studies of the electrical, chemical and biological properties of the human brain", and every human has been allocated a unique radio wavelength. The computers are also capable of inducing suicidal thoughts. The Soviets are (not "were") the "New World Order" people. Why NASA would use a Soviet computer when the USSR had to import or copy much of its computer technology from the West is not detailed. The second part of Step Two happens when the holograms result in the dissolution of social and religious order, "setting loose millions of programmed religious fanatics through demonic possession on a scale never witnessed before." The United Nations plans to use Beethoven's "Ode to Joy" as the anthem for the introduction of the new age one world religion. There is relatively little to debunk in this, the most widely remembered section of the Project Blue Beam conspiracy, as the idea is so infeasible. Citing actual existing communication technology is odd if the point is for the end product to appear magical, rather than just as cheap laser projections onto clouds. This hasn't stopped some very strange conspiracy theories about such things popping up. Indeed, the notion of gods being projected into the sky was floated in 1991 by conspiracy theorist Betty J. Mills. And US general (and CIA shyster extraordinaire), Edward Lansdale, actually floated a plan to fake a Second Coming over Cuba to get rid of Castro. Step Three is "Telepathic Electronic Two-Way Communication." It involves making people think their god is speaking to them through telepathy, projected into the head of each person individually using extreme low frequency radio waves. (Atheists will presumably hear an absence of Richard Dawkins.) The book goes to some lengths to describe how this would be feasible, including a claim that ELF thought projection caused the depressive illness of Michael Dukakis' wife Kitty. Step Four has three parts: Making humanity think an alien invasion is about to occur at every major city; Making the Christians think the Rapture is about to happen; A mixture of electronic and supernatural forces, allowing the supernatural forces to travel through fiber optics, coax, power and telephone lines to penetrate all electronic equipment and appliances, that will by then all have a special microchip installed. Then chaos will break out, and people will finally be willing — perhaps even desperate — to accept the New World Order. "The techniques used in the fourth step is exactly the same used in the past in the USSR to force the people to accept Communism." A device has apparently already been perfected that will lift enormous numbers of people, as in a Rapture. UFO abductions are tests of this device. Project Blue Beam proponents believe psychological preparations have already been made, Monast having claimed that 2001: A Space Odyssey, Star Wars and the Star Trek series all involve an invasion from space and all nations coming together (the first two don't, the third is peaceful contact) and that Jurassic Park propagandises evolution in order to make people think God's words are lies. The book detailed the theory. In the 1994 lecture, Monast detailed what would happen afterwards. All people will be required to take an oath to Lucifer with a ritual initiation to enter the New World Order. Resisters will be categorised as follows: Christian children will be kept for human sacrifice or sexual slaves. Prisoners to be used in medical experiments. Prisoners to be used as living organ banks. Healthy workers in slave labour camps. Uncertain prisoners in the international re-education center, thence to repent on television and learn to glorify the New World Order. The international execution centre. An as yet unknown seventh classification. Joel Engel's book Gene Roddenberry: The Myth and the Man Behind Star Trek was released in 1994, shortly before Monast's lecture on Project Blue Beam: “In May 1975, Gene Roddenberry accepted an offer from Paramount to develop Star Trek into a feature film, and moved back into his old office on the Paramount lot. His proposed story told of a flying saucer, hovering above Earth, that was programmed to send down people who looked like prophets, including Jesus Christ.” All the steps of the conspiracy theory were in the unmade mid-'70s Star Trek film script by Roddenberry, which were recycled for the Star Trek: The Next Generation episode Devil's Due, broadcast in 1991. There is no evidence of deliberate fraud on Monast's part; given his head was quite thoroughly full of squirrels and confetti by this time, it's entirely plausible that he thought this was the revelation of secret information in a guise safe for propagation. However, the actual source was so obvious that even other conspiracy theorists noticed. They confidently state it was obvious that Monast had been fed deceptive information by the CIA. Of course!" -- rationalwiki.org "Serge Monast was a Québécois investigative journalist, poet, essayist and conspiracy theorist. He is known to English-speaking readers mainly for Project Blue Beam and associated conspiracy tropes. His works on Masonic conspiracy theories and the New World Order also remain popular with French-speaking conspiracy theorists and enthusiasts." -- Wikipedia
"A human microchip implant is typically an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being. This type of subdermal implant usually contains a unique ID number that can be linked to information contained in an external database, such as personal identification, law enforcement, medical history, medications, allergies, and contact information. The first experiments with an RFID implant were carried out in 1998 by the British scientist Kevin Warwick. His implant was used to open doors, switch on lights, and cause verbal output within a building. After nine days the implant was removed and has since been held in the Science Museum (London). On 16 March 2009 British scientist Mark Gasson had an advanced glass capsule RFID device surgically implanted into his left hand. In April 2010 Gasson's team demonstrated how a computer virus could wirelessly infect his implant and then be transmitted on to other systems. Gasson reasoned that with implanted technology the separation between man and machine can become theoretical because the technology can be perceived by the human as being a part of their body. Because of this development in our understanding of what constitutes our body and its boundaries he became credited as being the first human infected by a computer virus. He has no plans to remove his implant. Several hobbyists have placed RFID microchip implants into their hands or had them inserted by others. Amal Graafstra, author of the book RFID Toys, asked doctors to place implants in his hands in March 2005. A cosmetic surgeon used a scalpel to place a microchip in his left hand, and his family doctor injected a chip into his right hand using a veterinary Avid injector kit. Graafstra uses the implants to access his home, open car doors, and to log on to his computer. With public interest growing, in 2013 he launched biohacking company Dangerous Things and crowdfunded the world's first implantable NFC transponder in 2014. He has also spoken at various events and promotional gigs including TEDx, and built a smartgun that only fires after reading his implant. Alejandro Hernandez CEO of Futura is known to be the first in Central America to have Dangerous Things' transponder installed in his left hand by Federico Cortes in November 2017. Mikey Sklar had a chip implanted into his left hand and filmed the procedure. Jonathan Oxer self-implanted an RFID chip in his arm using a veterinary implantation tool. Martijn Wismeijer, Dutch marketing manager for Bitcoin ATM manufacturer General Bytes, placed RFID chips in both of his hands to store his Bitcoin private keys and business card. Patric Lanhed sent a “bio-payment” of one euro worth of Bitcoin using a chip embedded in his hand. Marcel Varallo had an NXP chip coated in Bioglass 8625 inserted into his hand between his forefinger and thumb allowing him to open secure elevators and doors at work, print from secure printers, unlock his mobile phone and home, and store his digital business card for transfer to mobile phones enabled for NFC. Biohacker Hannes Sjöblad has been experimenting with NFC (Near Field Communication) chip implants since 2015. During his talk at Echappée Voléé 2016 in Paris, Sjöblad disclosed that he has also implanted himself between his forefinger and thumb and uses it to unlock doors, make payments, and unlock his phone (essentially replacing anything you can put in your pockets). Additionally, Sjöblad has hosted several "implant parties," where interested individuals can also be implanted with the chip. Researchers have examined microchip implants in humans in the medical field and they indicate that there are potential benefits and risks to incorporating the device in the medical field. For example, it could be beneficial for noncompliant patients but still poses great risks for potential misuse of the device. Destron Fearing, a subsidiary of Digital Angel, initially developed the technology for the VeriChip. In 2004, the VeriChip implanted device and reader were classified as Class II: General controls with special controls by the FDA; that year the FDA also published a draft guidance describing the special controls required to market such devices. About the size of a grain of rice, the device was typically implanted between the shoulder and elbow area of an individual’s right arm. Once scanned at the proper frequency, the chip responded with a unique 16-digit number which could be then linked with information about the user held on a database for identity verification, medical records access and other uses. The insertion procedure was performed under local anesthetic in a physician's office. Privacy advocates raised concerns regarding potential abuse of the chip, with some warning that adoption by governments as a compulsory identification program could lead to erosion of civil liberties, as well as identity theft if the device should be hacked. Another ethical dilemma posed by the technology, is that people with dementia could possibly benefit the most from an implanted device that contained their medical records, but issues of informed consent are the most difficult in precisely such people. In June 2007, the American Medical Association declared that "implantable radio frequency identification (RFID) devices may help to identify patients, thereby improving the safety and efficiency of patient care, and may be used to enable secure access to patient clinical information", but in the same year, news reports linking similar devices to cancer caused in laboratory animals had a devastating impact on the company's stock price and sales. In 2010, the company, by then called "PositiveID", withdrew the product from the market due to poor sales. In January 2012, PositiveID sold the chip assets to a company called VeriTeQ that was owned by Scott Silverman, the former CEO of Positive ID. In 2016, JAMM Technologies acquired the chip assets from VeriTeQ; JAMM's business plan was to partner with companies selling implanted medical devices and use the RFID tags to monitor and identify the devices. JAMM Technologies is co-located in the same Plymouth, Minnesota building as Geissler Corporation with Randolph K. Geissler and Donald R. Brattain listed as its principals. The website also claims that Geissler was CEO of PositiveID Corporation, Destron Fearing Corporation, and Digital Angel Corporation. In 2018, A Danish firm called BiChip released a new generation of microchip implant that is intended to be readable from distance and connected to Internet. The company released an update for its microchip implant to associate it with the Ripple cryptocurrency to allow payments to be made using the implanted microchip. In February 2006, CityWatcher, Inc. of Cincinnati, OH became the first company in the world to implant microchips into their employees as part of their building access control and security system. The workers needed the implants to access the company's secure video tape room, as documented in USA Today. The project was initiated and implemented by Six Sigma Security, Inc. The VeriChip Corporation had originally marketed the implant as a way to restrict access to secure facilities such as power plants. A major drawback for such systems is the relative ease with which the 16-digit ID number contained in a chip implant can be obtained and cloned using a hand-held device, a problem that has been demonstrated publicly by security researcher Jonathan Westhues and documented in the May 2006 issue of Wired magazine, among other places. The Baja Beach Club, a nightclub in Rotterdam, the Netherlands, once used VeriChip implants for identifying VIP guests. The Epicenter in Stockholm, Sweden is using RFID implants for employees to operate security doors, copiers, and pay for lunch. In 2017 Mike Miller, chief executive of the World Olympians Association, was widely reported as suggesting the use of such implants in athletes in an attempt to reduce problems in sport due to drug taking. Theoretically, a GPS-enabled chip could one day make it possible for individuals to be physically located by latitude, longitude, altitude, speed, and direction of movement. Such implantable GPS devices are not technically feasible at this time. However, if widely deployed at some future point, implantable GPS devices could conceivably allow authorities to locate missing persons and/or fugitives and those who fled from a crime scene. Critics contend, however, that the technology could lead to political repression as governments could use implants to track and persecute human rights activists, labor activists, civil dissidents, and political opponents; criminals and domestic abusers could use them to stalk and harass their victims; and child abusers could use them to locate and abduct children. Another suggested application for a tracking implant, discussed in 2008 by the legislature of Indonesia's Irian Jaya would be to monitor the activities of persons infected with HIV, aimed at reducing their chances of infecting other people. The microchipping section was not, however, included into the final version of the provincial HIV/AIDS Handling bylaw passed by the legislature in December 2008. With current technology, this would not be workable anyway, since there is no implantable device on the market with GPS tracking capability. Since modern payment methods rely upon RFID/NFC, it is thought that implantable microchips, if they were to ever become popular in use, would form a part of the cashless society. Verichip implants have already been used in nightclubs such as the Baja club for such a purpose, allowing patrons to purchase drinks with their implantable microchip. In a self-published report anti-RFID advocate Katherine Albrecht, who refers to RFID devices as "spy chips", cites veterinary and toxicological studies carried out from 1996 to 2006 which found lab rodents injected with microchips as an incidental part of unrelated experiments and dogs implanted with identification microchips sometimes developed cancerous tumors at the injection site (subcutaneous sarcomas) as evidence of a human implantation risk. However, the link between foreign-body tumorigenesis in lab animals and implantation in humans has been publicly refuted as erroneous and misleading and the report's author has been criticized over the use of "provocative" language "not based in scientific fact". Notably, none of the studies cited specifically set out to investigate the cancer risk of implanted microchips and so none of the studies had a control group of animals that did not get implanted. While the issue is considered worthy of further investigation, one of the studies cited cautioned "Blind leaps from the detection of tumors to the prediction of human health risk should be avoided". The Council on Ethical and Judicial Affairs (CEJA) of the American Medical Association published a report in 2007 alleging that RFID implanted chips may compromise privacy because there is no assurance that the information contained in the chip can be properly protected. Following Wisconsin and North Dakota, California issued Senate Bill 362 in 2007, which makes it illegal to force a person to have a microchip implanted, and provide for an assessment of civil penalties against violators of the bill. In 2008, Oklahoma passed 63 OK Stat § 63-1-1430 (2008 S.B. 47), that bans involuntary microchip implants in humans. On April 5, 2010, the Georgia Senate passed Senate Bill 235 that prohibits forced microchip implants in humans and that would make it a misdemeanor for anyone to require them, including employers. The bill would allow voluntary microchip implants, as long as they are performed by a physician and regulated by the Georgia Composite Medical Board. The state's House of Representatives did not take up the measure. On February 10, 2010, Virginia's House of Delegates also passed a bill that forbids companies from forcing their employees to be implanted with tracking devices. Washington State House Bill 1142-2009-10 orders a study using implanted radio frequency identification or other similar technology to electronically monitor sex offenders and other felons. The general public are most familiar with microchips in the context of tracking their pets. In the U.S., some Christian activists, including conspiracy theorist Mark Dice, the author of a book titled The Resistance Manifesto, make a link between the PositiveID and the Biblical Mark of the Beast, prophesied to be a future requirement for buying and selling, and a key element of the Book of Revelation. Gary Wohlscheid, president of These Last Days Ministries, has argued that "Out of all the technologies with potential to be the mark of the beast, VeriChip has got the best possibility right now"." -- Wikipedia
"In this latest book Joseph P Farrell examines the subject of mind control, but from a very unusual perspective, showing that its basic underlying philosophy, and goal, is not only cosmological in nature, but that the cosmology in view is very ancient, and that mind control of any sort, from the arts to hypnosis, remote electromagnetic technologies and “electroencephalographic dictionaries” has cosmological implications." -- Microcosm and Medium: The Cosmic Implications and Agenda of Mind Control Technologies publisher's description
submitted by anti-ZOG-sci-fry to u/anti-ZOG-sci-fry [link] [comments]

Blue Beelzebub (Part 1)

For years, years, I wondered – ‘why me’ – you know, you know, kiddo – ‘why me’ – but there is no ‘why me’. What? As if there were, you know, ‘chosens’, there’s no ‘chosens’ – there’s no all–seeing, all–knowing powerful nothing. It happened. That’s it. I fell for it. I took its bait – hook, line, sinker. Didn’t I do it to myself? Wasn’t I the sucker? There’s no ‘why me’ – and once I realized that, that there was no, that there was no, no any kind of justice what so ever, until I acted, that gave my existence purpose. And now I’m gonna fulfill that purpose. I don’t want you getting involved. You’re deep enough as it is. Don’t be the sucker!
– Bobby Mortaren; famous last words
I raced from the house to the hotel, at Walsenburg, where I struggled to make sense of everything that transpired. I poured myself over notes and records that I had brought along. Only my laptop’s glow illuminated the room. Every so often lights through I-25 swept across the bed. Every so often breezes stirred trees around the perimeter. Soon midnight passed. The world darkened, relaxing as it were into slumber.
A knock rattled the door - and I could have shrieked if it weren’t for what remained of my nerves. All of a sudden, I felt so icy, so cold, that I stood, frozen, uncertain of how to proceed. Who was it? It couldn’t be good. Not the FBI. Not the Thules. Ache, already?
I balked at chucking my laptop - whoever they were at the door, they’d find it, they’d find it.
It’s the 21st century; evidence doesn’t vanish without a trace.
As my heart pounded my chest, I reached that door and cracked it a notch. I braced for the kick certain to follow. It didn’t come. The hotel’s courtyard / lot spread, deserted except for my rented Wrangler. There wasn’t anyone - anyone who may have been my visitor.
Yet - by my feet - at the edge of the threshold - my visitor had left a box.
I poked at it with my pole and turned it over and over. It wasn’t postmarked. It wasn’t addressed. It had been delivered by hand and, suspecting what it was, I yanked it inside. Leaning onto and drooping against the door, I tore its lid. The box contained two floppies, a CD, and a stack paper. It was Blue Beelzebub - all of it, every part of it. As well as instructions: a How-To-Guide for destroying your future, fetched onto my doorstep, white-glove-style to boot, as promised. It may as well have been a bomb.
###
How did Blue Beelzebub mutate into my obsession?
Worse - did I expect to find its truth remarked into code from 1996? 1996! There wasn’t a lot to the internet way, way back when. But crime was crime no matter its era. Was it crime? And did the game start this way or that way then evolve into crime? Was it crime from its start?
The programmer of Blue Beelzebub, a hacker by the avatar ‘ZuZu’, claimed to be legit. Their MO had been to create games not scams. Or so it appeared until Blue Beelzebub entered the story. If it were a product of malware, why had ZuZu devoted so much of their effort into its creation? Why had they boasted of the game’s nitty gritty details during its gestation? Why all of that trouble, if only a fraction of it would have been appreciated by those who played it? Even LVN, when they weren’t laundering bitcoin, expressed what may be described as passion for that game.
Was it a game?
By 1996 standards, its demos parlayed atrocious graphics and threadbare mechanics. The way it affected the player’s rig ensured nobody would be eager to replay it. The game passed every scan available yet it twisted the OS and hijacked the PC to serve as a node, a link into a yet-unknown and yet-unnamed network for purposes every bit as mysterious as the game itself.
As I contemplated the reality of the situation, I settled onto the notion that that game may have been a gimmick to cover truly malevolent intentions. That had been the crux of LVN’s KickStarter and GoFundMe rackets - they always proposed plausible if lofty projects as if they were real, actual products people buy. However, case after case demonstrated that their pretense unraveled after scrutiny. Could it be, as far back as 1996, the creator(s) of Blue Beelzebub conceived of such a deception? FPS (of the type Blue Beelzebub reported to be) were the rage through the 90s. If so then their MO resembled that of a typical bait-and-switch scheme - bait them with a game, switch them with a virus. Then? What? Profit?
###
In the summer of 2017, Czech authorities in conjunction with the EU, arrested LVN at their apartment south of Plzen. They seized the hacker’s laptop, PC, as well as their twenty thousand CD library. LVN was a hacker-for-fire; evidence presented at their arraignment demonstrated to the court that they had been paid by Russian and other Eastern European actors to pilfer bitcoin wallets. In addition to theft, the court entertained charges connected to a NiceHash heist of 64 million euros earlier that year.
It was the breach of NiceHash’s security that brought my skills to the EU’s attention. For a few weeks, between March and May, I played my part to aid the investigation and the conviction of its mastermind. We discovered that the breach had been directed from inside NiceHash. We split the work: ‘brick and mortar’ detectives ran interviews and stakeouts while my fellow ‘white-hats’ and I toiled at the forensics. To meet our end of the bargain, we created a model of that cyber-attack, in order to construct and deconstruct its operation. As we realized how the crime had been executed, we identified the party responsible for it and built the authorities a solid chain-of-evidence - a chain-of-evidence that identified LVN as the perpetrator.
LVN masterminded not just that NiceHash heist but a dozen scams at sites like KickStarter and GoFundMe. LVN traded exclusively through bitcoin. Their MO was to sow fake projects then to reap real funds submitted by backers - by backers who aimed to launder money via its exchange into bitcoin. Projects were advertised to those who sought the service; they were fraudulent through and through yet they appeared real enough to fool the maintainers of those sites and the public at large who may have been tricked by the scams.
Under the supervision of the investigation at large, I pledged my dollars to a few of LVN’s projects, to see what the response would be. Soon, LVN and I exchanged emails. They wanted to speak face-to-face. In front of the experts, I played to type and gained access to a roster of services from that hacker-for-hire. As a result of the communication, the investigation brought into play anti trafficking & exploiting agencies from around the world and accelerated their goal to convict LVN.
One of the projects LVN advertised didn’t fit into the mold in so far as it felt like a genuine hobby of theirs. LVN sought investors to fund their (re)development of a game, Blue Beelzebub. The project listed at KickStarter - removed but saved to my laptop - included a lightbox of images and demos as well as snippets of code. It discussed such esoterics as: updates to its physics engine and its video & audio renderer; upgrades to its arsenal and its gallery of foes; changing its play - expanding its levels and ditching its linearity.
The details impressed me as they perplexed me. Why? I kept asking. What’s the idea? What’s the racket? Why create a game using twenty year old technology? I understood its esoterics perfectly for I came of age during the 90s. So much of what went into Blue Beelzebub felt familiar as it was familiar. An FPS - first person shooter - propelled by a fork of that fabled, 2.5D DOOM engine. Little wonder that its caps parlayed the look and feel of classic 90s PC games!
Maybe it was yet another scam? Or - maybe - it was a hobby of a gamer / programmer? Could it be that LVN recalled those early DOS games and wanted to re-create the era? But that wasn’t everything. And as I mused & Googled I started to ask myself if there wasn’t more about Blue Beelzebub beyond the haze of my nostalgia. I failed to connect the dots although that did not shake the deja vu - somehow, someway, I recognized that game.
###
Escape published my article about LVN’s conviction. Against the advice of my editor, I stalked its commentary, to see what, if anything, the story drew out of the woodwork. Its aside re: Blue Beelzebub attracted attention. I wasn’t surprised, to be honest, as I had inserted it into the text to draw reaction. And my rouse worked! But I wasn’t the only one who felt deja vu about the game.
A commentator, who asked for anonymity, posted a link to 4CHAN about Blue Beelzebub. LVN had advertized the KickStarter for the game at a group devoted to indie developers. LVN never advertized their work at 4CHAN out of fear of exposure. So that thread where they didn’t ask for money confirmed my sense that it wasn’t, necessarily, a scam.
As I scanned that thread, however, I realized what a rabbit-hole the business would be. After LVN’s post, anonymous replies went to and fro as they typically do. Then the tenor of the thread devolved into a war amongst those who were for vs. those who were against what LVN proposed to do with the game. It was a question about credit. At last - somebody revealed a truth I duly suspected of - that Blue Beelzebub wasn’t the work of LVN - that the game as it existed predated LVN by twenty years or so.
The idea for Blue Beelzebub had floated about USENET c. 1995. The majority of the conversations extracted from the archives suggested that the game was vaporware. Its supporters countered that either a P/C or a DEMO existed and that a play-through had been uploaded to (early) YouTube. Everyone who added their opinion - pro & con - agreed that it was “inspired by Satan”, “took its cues from Crowley’s ‘Thelema’“, and that it included clips “replete with ever more corrupt” gore and snuff. A self-described player, whose rig they claimed had been “totaled” by the game, stated bluntly that it contained a “Chinese Sandwich”.
Undeterred by the confusion, I kept at my search, ramming through the archives, pushing my way further back in time, from 1997 to 1995. USENET had been mirrored prior to its collapse yet its content was not indexed completely; a robust query of its posts required force and patience.... In spite of the odds, my effort worked, my persistence located the roots of Blue Beelzebub.
It was a posted dated June 15, 1995 written by the game’s originator, a hacker by the name of ZuZu. According to their missive, they claimed to have produced “a proof of concept demo” for their “latest and greatest” game, Blue Beelzebub, and that it was “a legit game catering to those who worship and admire Lucifer and everything that stands for”. ZuZu listed, point by point, the substance of their creation. I wasn’t surprised to see, splattered across that post, the verbiage LVN usurped for their own advert.
Except - they weren’t seeking funding. According to their missive, the game had been bankrolled “by entities of a foreign sort, who don’t want to be credited”. Rather, they were seeking “experts” willing to alpha & beta test the product.
Blue Beelzebub and by extension ZuZu went rouge between 1997 and 2005.
Then - October 31, 2005 - ZuZu submitted their last, known public statement. Broadcasted through their usual, over-the-top flamboyance, they wished for their “fans to learn and spread the word” that they “secured an exclusive”. They had convinced a devote of indie horror / FPS games to review Blue Beelzebub. The player they had snagged was famous for their day and their name I recognized as I read it.
Bobby Mortaren - an internet pioneer par excellence. Mixing reviews and play-throughs together, his format had been lauded as visionary and just as imitated. Tweaked a bit by-the-by it continued to find use. His name, though, hadn’t been spoken of for a decade. Games had changed. Tastes had changed. He could have shifted into yet another venture so far as I knew.
Mortaren posted his works to YouTube - to YouTube prior to its merger with Alphabet. As I considered the changes that transpired across the years, I wasn’t surprised to discover that all of my links to his works were dead. Eerily, though, it was impossible to locate his reviews directly via YouTube. So I tried Google and Bing. No result. Ditto with DuckDuckGo. Ditto with Wiki, SlideShare, BoardReader. Out of desperation I surfed into the remnants of Alta Vista - maybe its database saved the information? No. No. Futile - all of it.
YouTube’s size was greater than USENET’s size. My task’s extent was altogether a colossal order of magnitude. If that which I pursued had not been deleted, then, it would be found ad finem omnia. So to dig further I opted for a quick & dirty hack - a bot. A bot scripted to sift and sort all YouTube’s content that matched keywords Mortaren and Blue Beelzebub. I ran it and waited for days then for weeks then for months.
###
My extensive search corroborated the fact that Mortaren left the internet c. 2006. Assuming they may have continued via pseudonym, I enquired into the matter with colleagues who devoted themselves to games and / or to reviews. Only a few recognized their name; nobody was cognizant of their voice.
An editor from ToplessRobot directed my attention to a defunct fansite’s messageboard where somebody asked why Mortaren vanished without a trace. To my shock, the reply was that Mortaren had been arrested by the FBI c. 2006. I could not fathom why. Nevertheless, if the revelation were correct, then, the resolution to the matter was tantalizingly viable. Arrests - and trials - were public.
The LVN / EU case brought my forensic skills to the notice of the DOJ and the Treasury / Secret Service. The FBI, like its European counterparts, wanted to understand everything about bitcoin and how it might (might) be possible to trace transactions to individuals.
As part of my freelance work, I already met and debriefed FBI agents re: the Czech hacker. Eventually ‘large’ talk gave way to ‘small’ talk amongst us. It was at that juncture that I broached the subject of Blue Beelzebub - namely, that LVN hatched a scheme to defraud investors (via bitcoin) ostensibly by promising to develop an update to that game.
“They got exposed by players who recognized the game’s ill-repute,” I stated. “Apparently, the game’s infamy started after its reviewer, a fellow by the name of - er - Robby Mortaren? Bobby Mortaren? Well - they got arrested by the FBI.”
Neither the game nor the reviewer elicited a reply - immediately, anyhow.
A (censored) document, summarizing a DOJ investigation, worked its way into my mailbox. Mortaren had been under FBI surveillance from November 2005 to May 2006. Why wasn’t stated; just that the FBI obtained search warrants for computers & electronics. A federal judge issued an arrest warrant May 30, 2006; however, the DOJ withdrew the charges after Mortaren agreed to an immunity deal. Mortaren turned star witness at a trial that involved organized crime as well as rackets, cults, ritualized human & civil rights abuses and elements that suggested Satanism. The perpetrator(s) that the DOJ wanted to convict fled either to South America OR Eastern Europe / Central Asia. The trial evaporated; neither the charges nor the perpetrator(s) were detailed.
Mortaren’s immunity deal with the DOJ wasn’t negotiable or retractable and included a complete internet ban.
The document listed a PO BOX as Mortaren’s permanent address.
To Mr. B. Mortaren:
Sir, I apologize. Blue Beelzebub. Were it not for the fact that you may be the only person left to recall that game, I would not have stretched my resources so thin to find you. If you are not able to assist my research, is anyone?
I was part of an EU investigation re: bitcoin, theft & fraud, as well as trafficking & exploiting vagrants. Through that investigation I came into contact with a hacker; they claimed to be working on Blue Beelzebub; they sought funds to upgrade it. While disturbing to say the least, that game did not strike me as part of the hacker’s MO. So I pried further into the matter and discovered, to my astonishment, that Blue Beelzebub dated to the mid 90s and that you reviewed & posted the demo at YouTube.
I am curious about that game. I cannot get it out of my head. Who was the programmer? Who was the developer? Where did they get the money? What were their goals? What was the game about, if the game was about anything?
A DOJ document summarizing your immunity from prosecution was brought to my attention. I suspected, as I matched the timeframe of the FBI’s surveillance and arrest, to the demo, that these matters are related. I was not able to find a link, due to the fact that all records, transcripts, etc., were sealed by request of the FBI.
If, for any reason what so ever, we cannot communicate about this matter, would it be possible to contact a surrogate or anybody with the information I seek?
With All Due Respect
JK
###
Due to limits that existed at YouTube’s debut, videos posted from 2005 to 2010 were capped to 10 minutes. Both image and sound playback quality were kept low to spare bandwidth. A lack of (accessible) software and hardware to edit video forced vloggers to improvise. Mortaren had always used a webcam and mic from the 90s to shot their videos ‘live’, i.e., without edits.
YouTube retained the majority of Mortaren’s content; however, after a check of the dates and the poster’s IDs, I determined that Mortaren’s videos had been reposted c. 2006 by another user.
If the titles / numbers were correct then there were seven parts to the demo Mortaren recorded for Blue Beelzebub. Of seven, six remained. Specifically, the 5ifth - which must have been filmed as evidenced by the discontinuity between 4ourth and 6ixth - defied my ability to trace.
The reposter stated that “the 5ifth wasn’t part of the review package”. Yet, as I perused copies of replies they had saved, commentary that referenced material that doesn’t appear anywhere else, I strongly suspected that a 5ifth had been posted for a while and, for whatever reason, Mortaren removed it prior to 2006.
1irst - details facts re: the game: the developer, the programmer, the system requirements, etc.
“If your rig’s able to run DOOM, Blue Beelzebub works,” they state then add: “although, prepare yourselves, kiddos, the game takes a very, very long time to install”.
Passingly, he adds that a fan of his had ditched the game after they experienced “a catastrophic system failure” that they blamed “on either a bug or a virus or both”.
The executable and its auxiliary files pass every virus and malware checker Mortaren throws at it.
2econd & 3hird - demonstrates the game play or what passes for it.
Mortaren prefers to record his reviews live so that his fans experience the game exactly as he does. His videos contain hints / cheats if they are discovered as he plays. He describes Blue Beelzebub as a DOOM-GUY-ESQUE player who moves through an enshadowed monochromatic maze.
“There’s no backwards, I, I, I don’t believe it! Did they forget to give us backwards? There’s forwards and left, right. Kiddos, you gotta do a circle to go backwards.” He continues to berate the game, adding: “Yeah, there’s only forwards. And you know, I gotta say it, the programmer may think they’re the money’s nuts for it.... But it’s so weird that going forwards causes the view to bob up and down or side to side. What’re they trying to do? Are they trying to replicate a player’s gait? Takes me right out of the game. Let me tell y’all why. Like I said, the programmer’s got to be thinking they’re the monkey’s nuts but it’s that bizarro attention to detail that’s so jarring as I consider the lack of detail given to the graphics. Guys. Guys. Guys. You gotta think about what you present.”
Mortaren piles his criticism of the graphics and the sounds, comparing both unfavorably to DOOM. Especially frustrating is the invariance of the black & white textures throughout the maze. He praises the response of the maze to the player as he notes, while attempting to draw the maze, that its passages shift at random. Then more and more criticisms were strewn at the game, including its lack of weaponry, its lack of powerups / extras, its lack of anything.
“A game can’t be about going through the maze, guys, there’s got to be a point - something to do!” Finally, he voices the suspicion that he had been duped by ZuZu.
4ourth - the demo gets interesting.
Mortaren finds an area of the maze where the textures differ. The video’s pixilation - perhaps due to the webcam - perhaps due to the way the reposter preserved it - masks the bulk of the alteration. I detect a change of shade, though, from black & white to blue.
“Well it can’t be for nothing that the wall is blue. Jeez!” As he cracks the joke, to his shock (an explicative slips), the sounds became those of “eerie, drone-like notes fading into reverb” and the monitor displays a still-shot. Mortaren zooms into the image; I recognize it as coming from the shock-site, ROTTEN.
After that alteration, every blue-hued texture Mortaren faces produces other images, increasingly nihilistic and graphic, usually of the dead or the dying, often of celebrities, suicides, accidents, wrecks.
5ifth - ?
6ixth - the segment starts at an awkward jump.
It must have been split from the 5ifth video and while Mortaren does not state why, explicitly, the tone of the voice suggests that something serious transpired.
“Sorry, kiddos, I turned the webcam away - a first - I guess this ZuZu accomplished something.”
When he returns the webcam to the monitor, it is apparent that in addition to tone the substance of the game itself altered.
The player stands at the center of a room Mortaren describes as “a vault with a hole at its floor”. The 2.5D renderer prevents the player from gazing inside the hole. But by directing the player to walk the hole’s circumference it is possible to catch bits of its contents. A sharp, blue light shoots out of the hole; the way it cast light at the ceiling suggests there might have been “water”, as if the hole were a well of sorts.
What shocks Mortaren is that the room fills with children. The renderings of faces make each of the children unique. However: “the ghastliness of the imagery resembles how faces voxilate like with Delta Force games”. Further, he notes, after a pause that echoes my own consternation and trepidation, “I’ve seen these kids. Yeah, I’ve seen these kids from those, those photographs the game stopped everything to show us. Jeez!”
The children stand statue-like as the player walks about them. They serve as obstacles that block movement, otherwise, inert, unresponsive, “not that the player interacts with the kids as there’s no other keys available except A, W, D”.
The video continues, then, Mortaren shrieks.
The playback jostles as if it were about to stop. When everything resettles, he speaks, calmly and evenly, that “there’s a kid that’s different ... animated. You gotta see it, kiddos, I can’t say if it’s awful because it’s awful or if it’s awful because it’s awful....” The webcam zooms into the monitor; the child rendering appears to show it breathing, haphazardly, with their mouth agape. And then, then the child moves and the player like the viewer alike slip an explicative. “I take it back, everything, this is truly and utterly awful.”
7eventh - the coda feels like the set’s longest but is the shortest.
“Right now I’m running. I don’t have a weapon, jeez! I’m running as fast as this keyboard allows but my health is shrinking.” Mortaren stops and rotates the player to face backwards. The animated child is behind and striking the player using a technique that resembles “Hanna-Barbera laziness - or who knows - who knows, kiddos, it could be part of the style”. Just as it is with DOOM, as the player’s health decreases, the view gets redder and the avatar gets bloodier. Mortaren aims into the maze; there is no exit, there is no weapon, no upgrade to assist, all that exists is the floor where the player drops, dead.
The 7eventh adds a post-script recorded after the demo. It shows Mortaren’s PC, open and split to pieces. “The game installed a virus,” he declared then described its symptoms.
“Immediately upon my player’s death, the PC rebooted. After the BIOS, instead of going into DOS, it starts a telnet session and tries to connect via IP. Of course it doesn’t get a reply since my PC uses dial-up. So it freezes, pinging and pinging a server somewhere that it cannot reach.”
Mortaren concludes by theorizing that if Blue Beelzebub were a virus, it must have been designed to target high-end systems with LAN / Ethernet ports.
I jot the IP and attempt to connect to it. Strangely, it will not load yet it will not issue an error of any kind. Chrome, FireFox, Edge, etc., freeze. WHOIS is not able to resolve the owner. Nevertheless, it yields the location of the server, a site approximately 50 miles north east of Trinidad, Colorado.
I reject the result; users of tracers already know that they rely on ISP databases to match IP / location - and how often are those databases updated? - and how often are those updates distributed? The decade that passed between today and the video, and between the video and the creation, assures that there must have been a drift re: the location of the IP.
###
I will not reveal the particulars of when, where, and how I received the call.
“The coordinates.” Into my ear spoke a voice that my investigation made familiar. “Check the coordinates.”
“Coordinates?”
“Blue Beelzebub.”
“Yes,” I replied and Mortaren implied we’d meet.
Mortaren had traced my whereabouts through the blogosphere. He wanted to talk about the game yet feared the government “and or others” eavesdropping. I admitted off-handedly that as I sunk into my work with the DOJ, my paranoia tipped.
“What’s the deal with the game, anyway?”
“What do you want on your Chinese Sandwich?”
My impression settled onto a mixture of intrigue and trepidation. The matter felt so cryptic as to defy credulity. Coordinates? Blue Beelzebub. Chinese Sandwich? Nevertheless, even as we talked (brief as the conversation was) I put together that by coordinates + Blue Beelzebub Mortaren referred to the IP the game telnet’ed.
submitted by 0fruitjack0 to nosleep [link] [comments]

Open thread, August 2017

This is an open thread to discuss items of interest. I may also use it to drop thoughts as they occur to me as well -- something of a replacement of my former "tab closure" posts, as ... well, it seems tabs are simply running away from me. Consider this an experiment that's been mulling for some time.
If you've got a question, observation, link, or anything else, feel free to post it, with a thought to the lair rules -- like house rules, but larrier.
An evolving conversation....

Kafka as Epistemist

From "The Kafkaesque Process of Cancer Diagnosis", the concept applied here to cancer diagnosis, and in Kafka's The Trial to a process of judgement, strikes me as profoundly epistemological:
The patient continued, “You understand that the many tests and the elusive information of the recent weeks remind me of Franz Kafka's words in his famous work Der Prozess, meaning both trial and process.” “The verdict does not come suddenly, proceedings continue until a verdict is reached gradually.”

I am looking for tools to make sense of HTML DOMs

Probably in Python, though other general scripting, or possibly, compiled languages, might work. Javascript is another possibility, with a few extant tools employing this.
The primary goal is to extract document metadata (title, author, publisher, date, URL), and include the body of a document whilst excluding, or at the very least marking as secondary the ancillary bits. The though occurs that frequency / similarity analysis of the constant bits might help.
The extant tools of Readability's parser (it's survived the fall of the service), Pocket, Instapaper, Outline, etc., may be useful.
Inquiries elsewhere have also brought up Pilgrim, a project of the Knight Foundation (as Outline may also be), which isn't exactly what I'm looking for, but it's interesting in its own right.

On nuclear power and safety

There's an article making the rounds, poorly argued, IMO, extolling nuclear energy. I've been heartened by the critical response it's triggered at Hacker News, including my own contribution, previously submitted at G+ on Joerg Fliege's thread, drawing comparisons to the Banqiao Dam disaster of 1975. In part:
Proponents of nuclear power assume that we can assess risks with tails not of the decade or so of Banqiao, but of 100, 1,000, 1 million years. Utterly outside the scope of any human institutions, or of the human species itself.
Our models of risks and of costs fail us....
The problems with nuclear power are massive, long-tailed, systemic and potentially existential. The same cannot be said of a wind farm or solar array. There is no significant 10,000 year threat from wind power, or solar power. We're not risking 30 - 60 km exclusion zones, on an unplanned basis, of which we've created at least four in the half-decade of significant nuclear energy applications: Hanford, Washington, Three Mile Island, Pennsyvania, Chernobyl, Ukraine, and Fukushima, Japan. And this is with a global plant of some 450 operating nuclear power plants as of 2017....
If the total experience has been, say, 500 reactors, over 50 years, or 25,000 reactor-years of experience, and we've experienced at least four major disasters, then our failure rate is 0.016%.
The global share of nuclear power generation in 2012 was about 10%.[4] Which means that without allowing for increased electrical consumption within existing or extending to developing nations, the plant count would have to increase tenfold.
Holding the reactor-year failure rate constant would mean 80 core meltdowns per century. Reducing that to the present rate of four meltdowns/century would require reducing the failure rate to 0.0008%. That's five nines, if anyone's counting.
Five nines on a process involving weather, politics, business, social upheaval, terrorism, sabotage, individual psychology, group psychology, climate, communications, response, preparedness....

"8 Lessons from 20 years of Hype Cycles"

A look at the Gartner Hype Cycle, and lessons derived therefrom:
  1. We're terrible at making predictions. Especially about the future.
  2. An alarming number of technology trends are flashes in the pan.
  3. Lots of technologies just die. Period.
  4. The technical insight is often correct, but the implementation isn't there
  5. We've been working on a few core technical problems for decades
  6. Some technologies keep receding into the future
  7. Lots of technologies make progress when no-one is looking
  8. Many major technologies flew under the Hype Cycle radar
Michael Mullany, "8 Lessons from 20 Years of Hype Cycles".

David Gerard at the Financial Times on Bitcoin and Blockchain

David Gerard, author of Attack of the 50 Foot Blockchain, interviewed by Izabella Kaminska about Bitcoin, /Buttcoin, and Tulips, among other topics. There's a bunch of great information in this podcast, of which I'll highlight two items in particular.
I've been reflecting a great deal on information, truth, and that boundary between information and belief, most principally trust. Gerard nails the value proposition of trust, and a problem with the Free All the Things trope of decentralisation:
Decentralisation is the paramount feature in bitcoin, but it turns out that that's a bad idea that's really, really expensive, because it turns out that a tiny bit of trust saves you a fortune.
"Decentralised" isn't a useful buzzword in a lot of ways, because it turns out that you want to be a part of society.
He also points at the invalidity of market capitalisation as a concept. It's an arithmetically inexpensive value to obtain (multiply total quantity by present price), but, especially in the thin markets typical of Bitcoin, it is essentially a fantasy value with no real meaning. From a conversation at The Other Place:
[C]rypto "market cap" is a meaningless number. Even on Bitcoin, the most popular one, about 100 BTC will clear the order book on any exchange. Crypto "market cap" is not a number you could realise, it's not how much money went into it, it's not anything useful. If you want to compare cryptos by interest, you'd need to measure daily trading volumes, which is a harder number to gather, and market cap doesn't turn out to be a good proxy for it. So billions of dollars in free money weren't actually just created - instead it's millions of tokens that may or may not be tradeable for ordinary bitcoins or for cash, if you don't go very fast at all.
This evokes my own explorations of cost, price, and value, and what exactly they mean.
One analogy that Gerard, Alex Kudlick, and I are leaning toward is that of electric circuits. Price is analogous to pressure, or potential (voltage). Volume would be current. This raises the question of what resistance, capacitance, and impedance would have as analogues....
FT: Attack of the 50 Foot Blockchain with David Gerard (Soundcloud: 65 minutes). Highly recommended.
And you'll find Gerard on Reddit as dgerard.

Yonatan Zunger on the evolution of U.S. "court costs"

In "The history of “court costs”", Zunger writes of "a system that [you might think] has gone out of control, a mechanism that started with a good purpose that got eaten by corruption and incompetence. But you would be wrong."
In the post-Civil War South, a system came up when plantations, factories, or mines needed workers. It was based on that clever little exception in the 13th Amendment:
Neither slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted, shall exist within the United States, or any place subject to their jurisdiction.
Note that it doesn’t say what kind of crime you have to be convicted of.
The short of it: slavery is not illegal in the United States, just somewhat regulated.
My own main commentary ... probably worth posting in its own right, is that whilst Zunger raises excellent points about the intentionality of this system and its antecedents to Nazi Germany's concentration camps, the fact is that none of these phenomena are particularly American, nor particularly new. This isn't to excuse the United States of its guilt.
Rather: these behaviours, systems, and dynamics seem to be deeply rooted. Whether they're merely cultural (the examples I've given are all from cultural antecedants or siblings to US tradition), part of human behavioral psychology, or deeper even than that, this is not simply a matter of bad laws and bad people. Rather: It is a case of such rules and dynamics actively succeeding and crowding out alternatives.
There are two good discussions at The Other Place from the original Tootstorm and from the Medium essay.

When your political opponents are made of money ...

In politics, a growing problem is the dominance of interests who apparently have nothing but money to throw at problems
Utilising this fact in judo fashion, the thought occurs that that one possible response is to create a vast wall of problems for which they find it necessary to throw money at.
The less ease with which to discern between actual problems and fantasmic simaculra of problems, so much the better.
Have fun storming the castle!

Bill Browder: "It turned out that in Putin's Russia, there are no good guys."

At NPR: "Businessman Paints Terrifying And Complex Picture Of Putin's Russia:
In what one senator called one of the Senate Judiciary Committee's "most important" hearings, [William] Browder, a wealthy businessman-turned-activist-turned Putin-adversary shed a chilling new light on a Russian system of government that operates ruthlessly in the shadows — as Browder described it for lawmakers: a "kleptocracy" sustained by corruption, blackmail, torture and murder with Putin at its center.
"Effectively the moment that you enter into their world," Browder told senators investigating Russian interference in the 2016 presidential election, "you become theirs."
Oh, and "Russian adoptions" are one of the dog whistles for the Magnitsky Act, legislation passed in the U.S. in 2012, named after Browder's now-murdered Russian lawyer, Sergei Magnitski, imposing sanctions on human-rights violators.
Also the topic of a certain July, 2016 meeting featuring Donald Trump, Jr., and senior members of the Trump campaign, of recent memory.

The distinction isn't "online vs. offline" but "direct vs. mediated"

Articles and books on the impacts of digital and mobile media are a dime a dozen, and may be as laughable, or prophetic, as previous gerimiads on new media. "Has the Smartphone Destroyed a Generation" is fairly typical of the genre, if better than most.
Reading it, a thought recurs to me: the distinction isn't of online vs. offline, but or even screen time, but of mediated vs. direct experience.
Media mediates. It is literally that which is between the observer and the observed. And with increasingly smart media, those exchanges are very directly mediated, interposed, by third (and fourth, and fifth, and ...) parties.
This has multiple effects, a few:
I'd argue there are degrees of mediation as well. Analogue devices such as the telephone are less mediated than digital feeds such as Facebook or YouTube.
And this isn't the first period to have such experiences. I have frequent cause to point out that intellectual, academic, and creative experiences were very often epistolary, exchanges of letters. Though generally with less rapidity than today's 'round-the-world-in-a-second emails.
But that whole "online" and "cyberspace" distinction? Lose it.

The etymology of "data" ... peculiarly uninformative

I'm rather the fan of looking at etymologies of words. They often reveal interesting origins, connections, or evolutions. The etymology of data would be a peculiar exception:
1640s, classical plural of datum, from Latin datum "(thing) given," neuter past participle of dare "to give" (from PIE root *do- "to give"). Meaning "transmittable and storable computer information" first recorded 1946. Data processing is from 1954.
By way of definitions:
a collection of facts, observations, or other information related to a particular question or problem; as, the historical data show that the budget deficit is only a small factor in determining interest rates.
Which raises the question of whether data is the collection of facts, or the symbolic or other representation of those facts.
Arising as discovered that there is a philosophy of data and I've encountered its philosopher, Brian Ballsun-Stanton (via Mastodon).

Amathia: Unteachably stupid

There are a few concepts on the harm or danger of stupidity. In "One Crucial Word", Massimo Pigliucci explores the Greek term Amathia:
Amathia. It is often translated as “ignorance,” as in the following two famous quotes from Socrates:
“Wisdom alone, is the good for man, ignorance the only evil” (Euthydemus 281d)
“There is, he said, only one good, that is, knowledge, and only one evil, that is, ignorance” (in Diogenes Laertius, II.31)
But just as in the case of other ancient Greek words (like “eudaimonia,” about which I will write later this week) the common translation hardly does the job, and indeed often leads people to misunderstand the concept and quickly dismiss it as “obviously” false, or even incoherent....
Very much worth reading. Via /Philosophy and Paul Beard.

I've made good on a year-old threat and opened up Miranda's Knitting and Tea House

Enjoy! Welcome to the Tea House: Knitting. Tea. Discussion. Intelligence. Sunshine. "We Do Things Different"tm .
This is a sibling subreddit, with more open submissions, though still in a controlled manner. More at the notice.

Dietrich Bonhoeffer on stupidity vs. evil

From The Other Place: Stupidity is a more dangerous enemy of the good than malice:
Stupidity is a more dangerous enemy of the good than malice. One may protest against evil; it can be exposed and, if need be, prevented by use of force. Evil always carries within itself the germ of its own subversion in that it leaves behind in human beings at least a sense of unease. Against stupidity we are defenseless. Neither protests nor the use of force accomplish anything here; reasons fall on deaf ears; facts that contradict one’s prejudgment simply need not be believed- in such moments the stupid person even becomes critical – and when facts are irrefutable they are just pushed aside as inconsequential, as incidental. In all this the stupid person, in contrast to the malicious one, is utterly self-satisfied and, being easily irritated, becomes dangerous by going on the attack. For that reason, greater caution is called for than with a malicious one. Never again will we try to persuade the stupid person with reasons, for it is senseless and dangerous....
Read through to the source for the full quote.
I've dug a bit deeper into the backstory. Dietrich Bonhoeffer was a contemporary and friend of Reinhold Neibur, of "Serenity Prayer" fame. He served in the Abwehr, the Nazi intelligence service, during WWII, headed by Wilhelm Canaris. Bonhoeffer and Caneris were executed by the Nazi regime on 9 April, 1945, only three weeks before the fall of Berlin and Hitler's own death. And it turns out that the Abwehr, centre of relatively unfiltered information during the regime, was an active centre of resistance to it, from within.
Bonhoeffer was one of eight children. A brother, and the husbands of two of his sisters, were also executed by the Nazi regime. Bonhoeffer's twin sister Sabine survived until 1999.
Strongly related to the previous item on amathia, and observations from Hanah Arendt.

The Edge Question, 2017

"What Scientific Term or Concept Ought to be More Widely Known?" I find The Edge to be a bit hit-or-miss, and there are some misses here. But there's a heck of a lot of hits on topics that have been floating through my brain-space, and a few names I've been following as well. David Christian ("Big History"), confirmation bias, motivated reasoning, networks, information pathology, ... Daily Nous has a promising list as well. I've got the essays lined up to ... hopefully, read. And this note as a reminder to do that.

John Stuart Mill: A Few Words on Non-Intervention

By way of Wikipedia:
There seems to be no little need that the whole doctrine of non-interference with foreign nations should be reconsidered, if it can be said to have as yet been considered as a really moral question at all... To go to war for an idea, if the war is aggressive, not defensive, is as criminal as to go to war for territory or revenue; for it is as little justifiable to force our ideas on other people, as to compel them to submit to our will in any other respect. But there assuredly are cases in which it is allowable to go to war, without having been ourselves attacked, or threatened with attack; and it is very important that nations should make up their minds in time, as to what these cases are... To suppose that the same international customs, and the same rules of international morality, can obtain between one civilized nation and another, and between civilized nations and barbarians, is a grave error...

Oil is other people's money

I was thinking through the history of the Indiana natural gas boom -- oh, yeah, what Indiana gas boom, you ask? This Indiana gas boom, lasting from about 1884 to 1903. Basically, people realised you could stick a pipe in the ground and burn what came out. Which people did. As free-standing, natural-wonder flambeaux -- flaming torches, visible for miles around. After all, such a God-given abundance would surely last forever, right?
The field burned out, literally, in two decades.
But why waste that resource? I'm thinking of a typical Analyst's Matrix, describing spending your own, vs. other people's money. Let's do that in a table:
Your money Someone else's money
Your use High quality / Low cost High quality / Cost irrelevant
Somebody else's use Quality irrelevant / Low cost Quality irrelevant / Cost irrelevant
When it comes to natural gas, or oil, or coal, the majority of the cost, that is, its initial formation is not borne by you. Only the extraction cost is. That un-borne fraction is effectively other people's money. You care about the quality of the use (its use value), but not the full formation cost.
Oil, coal, and gas, are other people's money.
The legacy of the Indiana boom lives on in a few ways. Ball Glass Company originally formed in the state to take advantage of cheap gas for glass blowing, as did numerous other manufacturing concerns. They eventually shifted to coal. And you'll find the word flambeau turning up in place-names and the odd company name to. Relics to other people's money.

Limitations on Free Speech -- revisiting "shouting 'No Fire!' in a theatre that is in fact on fire"

The dynamics since the American Fascists riots in Charlottesville, VA, and the ACLU reconsidering its position on free speech reminds me that I had started, quite uncomfortably, revisiting my own views on this about three years ago. "Shouting "No Fire" in a Warming World as a Clear and Present Danger" was my thinking at the time.
Further developments -- Charlie Hebdo attacks, "punching vs. punching down", questions over revisionist history, the amazingly good two-part YouTube set by Contrapoints: "Does the Left Hate Free Speech? (Part 1)" (video: 16:53) and "Does the Left Hate Free Speech? (Part 2)" (video: 17:46) (I'm surprised I hadn't already mentioned it), various research (Jill Gordon, "John Stuart Mill and 'The Marketplace of Ideas'" and Jill Lepore (Kansas City Public Library lecture) both address parts of this. Karl Popper's "Paradox of Tolerance". Many, many discussions, mostly on G+.
The history of free expression / free speech itself is interesting and surprising, particularly the role between Protestant and Catholic factions -- the latter being seen much the same way as Fascists are today, as constitutionally opposed to tolerance, and therefore not subject to the benefits of free speech themselves.

Jeff Schmidt on salaried professionals and the soul-battering system that shapes their lives

Disciplined Minds by physicist Jeff Schmidt has been in my files for a while. Per Unwelcomed Guests Wiki:
This book explains the social agenda of the process of professional training. Disciplined Minds shows how it is used to promote orthodoxy by detecting and weeding out dissident candidates and by exerting pressure on the rest to obey their instructors and abandon personal agendas such as social reform -- so that they, in turn, can perpetuate the system by squeezing the life out of the next generation.
This ... is strikingly similar to the critique of John Stuart Mill of England's educational systems in the 1860s. Hans Jensen addresses this in "John Stuart Mill's Theories of Wealth and Income Distribution" (available via Sci-Hub).
Several prior Reddit mentions.

So no, Sonos! Palindromic boycott of privacy-skewering IoT ToS change

Wireless, cloud-connected speaker manufacturer Sonos have retroactively changed terms of service and required existing product owners monitoring subjects accept the new terms or the devices will cease to function.
And this, boys and girls, is why you don't buy Sonos products, ever.
(Or any Internet of Things that Spy On You devices.)
Palindrome courtesey Sakari Maaranen.

Alexander Hamilton Church and cost accounting: Capital-Labour analysis

Alexander Hamilton Church (28 May 1866 – 11 February 1936) was an English efficiency engineer, accountant and writer on accountancy and management, known for his seminal work of management and cost accounting. In particular, it was his work which expanded the concept of factors of production from just labour to include capital and other inputs.
Among his works, Production factors in cost accounting and works management (1910), from whose introduction:
From the earliest days of manufacturing there has grown up a custom of considering labor as the main and only direct item in production, and of expressing all other expenditure in more or less vague percentages of wage cost. The fact is, however, that labor, while always important, tends to become less important relatively to other items as the progress of organized manufacture develops and the use of specialized and expensive mechanical equipment increases. Very few concerns have come to grief by ignoring labor costs, but many have passed into the hands of receivers by ignoring the relative imiportance of the other factors of production.

On social media and online tools as "optional": Facebook required for AirBnB

Via The Guardian, "I didn’t have enough Facebook friends to prove to Airbnb I was real":
At the other end of the Airbnb helpline in Colorado, “Casey” sounded incredulous. “You have how many Facebook friends?” she drawled. “Er … about 50,” I replied. Long pause. “Well, you don’t have enough for us to verify you. You’d need at least 100.”
“But”, I squeaked, “I post every now and again … I’m on Facebook most days to check on my friends and relations.” This, however, was not enough to convince Airbnb I existed. And, as I didn’t exist, I could not book a room.
Keep this in mind next time someone declares "nobody forces you to use Facebook". Despite the many other refutations of this trope, we can now respond unequivocally: "AirBnB do".

Milestones: the 900 club

Just to memorialise this, and to bury the item as I close out this thread: the Dreddit has crossed the 900 subscriber threshold for the first time. Thanks to all, again, I will strive to be worth your time. It's interesting how much I prefer not to note such things, and yet do in fact note them. The days of teetering just on the edge in particular.

Previously:

One last thing ...

Do you like what you're reading here? Would you like to see a broader discussion? Do you think there are ideas which should be shared more broadly?
The Lair isn't a numbers game, my real goal is quality -- reaching, and hopefully interacting with, an intelligent online community. Something which I've found, in several decades of online interactions, difficult to achieve.
But there's something which works surprisingly well: word of mouth. Shares, by others, to appropriate venues, have generated the best interactions. I do some of that, but I could use your help as well.
So: if you see something that strikes you as particularly cogent (or, perhaps, insipid), please share it. To another subreddit. To Twitter or Facebook or G+. To the small-but-high-quality Metafilter. To your blogging circle, or a mailing list. If you work in technology, or policy, or economics, there as well.
Thanks, Morbius.
submitted by dredmorbius to dredmorbius [link] [comments]

Transcript of George Webb Video Series Part 219 "Hillary's Leakers, Hackers, and Henchmen" [@Georgwebb / #HRCRatlne]

  • Day 43.6 You Knew Reality Winner Was Coming Into the Story - YouTube
    • It's Day 43. This is version 6
    • In this news just broke: ex NSA employee admits he kept top-secret information at home
    • Here again, I think this is one of those Awan covers, where you have someone who has kind of been in close to retirement, etc, that's done a lot of you've done a lot of favors for, and you call it a marker
    • That's what this looks like
    • It looks like a cover to cover the wants and to explain why this classified information is sitting over at the Awan's house
    • I don't know maybe it's not
    • But this article does a pretty good job of talking about the different people at NSA
    • And there's been just a rash of NSA leaks
    • I think this is to explain the the OPM leaks, and the OPM hacks
    • There's a lot of information out there that's being used
    • And this is the guys name here his name's PHO
    • He's 67 not far from where I am in Elliot city
    • And if you're gonna have a lot of Social Security numbers floating around, a lot of people using those Social Security's numbers from veterans who died to then get new home loans
    • This is what we've seen with the Awans, this is kind of one of those covers where well it must have come out with one of these leaks
    • So you can see here from 2010 to 2015, he took home paper and digital copies of government records--
    • I've met a lot of people that work at NSA and this just is something that you don't do
    • I know everyone at NSA knows that you don't do this
    • You would have had to been--doing Sandy Berger stuffing it in--that your your pant legs...
    • You don't walk out of the NSA with a briefcase that's not checked when you at the end of the day
    • {{ 911 Rubiks Cube }}
    • So that's--now it is interesting that he's in the tailored access operations TAO unit which is the unit that Edward Snowden was in
    • So that is an interesting kind of development there
    • This is article is 22 hours old as I was saying
    • So again, district of Maryland, and here's Dana Boente who just left the Eastern District of Virginia, retired to come up here and do this case, in the district of Maryland, which I found was interesting
    • If you're not familiar with the NSA hacks of course there was obviously the 2013 hack with Snowden, but then there's also this the Martin hack
    • Again, close by where we are Glen Burnie in 2015
    • So and then of course the most famous of all hacks in Augusta, Georgia here in 2000
    • With the Reality Winner 25 year old they had all this information
    • Now if you notice Augusta, Georgia I want to say is I'm gonna say 30 miles from the Savannah River Nuclear Site
    • And it's about maybe 45 minutes from Charleston, not very far from Savannah and Charleston is kind of in between
    • This Reality Winner I know we've made a lot of fun of her all along the way, but it's gonna be somebody here at this site at the Savannah River Site that she's covering for if not two
    • Now I thought she they tried to do a throw, saying that she was at a different facility in Georgia
    • But now that I see Augusta and knowing how close Augusta is to Savannah River Site, and how close it is to Charleston, Reality Winner is going to come back into our story as the key throw of The Whistleblower down at Savannah River Site
  • Day 43.7 Wrapup of Comments, Sweat Tea and Kings Bay - YouTube
    • NO Autocaptions
    • A lot of ppl commented PHO was yet-another runny soup with no meat like Campbell (Campbell's soup)
    • And it was covering the fact that he worked in this TAO @NSA
    • That will let you get into secure blackberry folders, for example
    • For example, drone interdiction in Pakistan
    • "Oops I did it again, here are the codes for drone strikes in pakistan"
    • People commented about Reality Winner working at Fort Gordon NSA facility in GA
    • I did't mean to say Reality Winner worked over at the naval nuclear station, but I meant to say that she was close
    • And that the info that RW would be dealing in would be highly secure information for the Navy
    • Our enemies knowing where our nuclear subs are would not be good
    • Turkey wanted to extradite Graham Fuller
    • News keeps chasing you, we're about 3 months ahead on this series--feels like we're being chased
    • Fuller did the infiltration, not the coup plan--coup is more Grange-Petraeus CIA-NATO op
    • SAP secure access program, lets you get into the SAP folders on blackberries...this how Hillary can still have influence even though she's not in power, she just needs a few people in key positions
    • Tap PHO on the shoulders and just say, 'time to call in a flavor and give us the SAP codes'
    • Reminds me of operation duck soup, in Vietnam which was flying heroin into the DMZ for US GIs
    • Maybe that PHO was a wink to Operation Duck Soup way back when since he's retiring now
    • Peter Stzrok, seems like a wink on 'Strzok', gonna call him 'Strzok'
    • Peter Stzoks let go from Mueller team for 'anti-trump' texts
    • {{ 911: that MSM's cover story. Really it was about him paying someone to validate the Fusion PP Dossier, now discredited. This makes Mueller's team look stupid and incompetent, so he was let go }}
    • Asked Robyn Gritz if she knew who Stzoks was and she didn't know him
    • Devin Nunes is mad because the FBI is stonewalling
    • DHS-OIG sentenced to 37 months for deleting Files
    • Georgia Cryptologic Center--sweet tea--sounds like euphemism for drug trade
    • Kings Bay subbase, lots of used car yards where car parts are being picked--illegal trade in car parts
    • People ask about the earthquake and was it a PNE near VA coast?
    • North Anna Nuclear Generating Station
  • Day 43.8 Summary - Sweet Tea and Pho Soup at NSA - YouTube
    • Day 43 and it's part 8
    • And this is a real late night edition
    • But I'm gonna call this mister PHO's runny soup leeks
    • Mr. PHOs runny soup leaks
    • I was thinking either I'll call this friend or foe pho or mr. foes runny soup leeks
    • But this just goes to show you the power of putting out working theory
    • And then people come back and they either say--sweet tea
    • Why are you mentioning sweet tea sweet tea sweet tea?
    • Why are you repeating sweet tea? what sweet tea got to do with anything?
    • Reality Winner was at sweet tea--so what?
    • And there's good challenges there and I just think--this author the guy who did this article linked those two things together he linked together Mister PHO's runny soup leaks with reality winner and sweet tea
    • The Georgia cryptography Center, the Georgia cryptography Center is the one that was built in 2012 to handle CENTCOM traffic
    • So let's say these are the three different cryptology centers
    • There's a whole bunch more there's one in Hawaii where Snowden worked at
    • There's one in Fort Meade near me here
    • And then there's one in this in in down in Georgia at this Fort Gordon, Georgia cryptology Center
    • Well what they did is they they took it and they broke off the traffic here
    • And the first signal intercept
    • They intercept these signals from CENTCOM
    • This is the UAE
    • This is Pakistan and also AFRICOM
    • This is--the all the area where our mining is--Boko Haram and a Niger and all that sort of thing
    • So all that stuff all these stories that emanate from signals intercepted over there are coming out of this Georgia thing
    • Now these guys--let's just call them Navy boys B O Y Z
    • And what I mean there is kind of like this retired Navy
    • This is the military-industrial complex whatever but these are what we think of as deep state or whatever
    • But I'm gonna call them the Navy BOYZ sort of like to John McCain and McCain's dad and McCain's grandfather that type of thing
    • The Navy BOYZ and the Navy BOYZ if you were smart and you were--I'm not saying the Navy knowingly knows that drugs are coming one way and guns are going the other
    • But they did look the other way
    • They're like the common carrier I don't really want to know what you're shipping
    • So the Imran Awan is who's doing the containers and and what goes into containers these guys are just saying how many containers here's the bill
    • But these Navy boys--you'd be smart to take all that kind of traffic that--Awan container traffic and make it go through this Georgia Center--this Georgia communication center
    • That's where you have your reality winner
    • You could then cut off all the communication and just say this is a nothing burger, that's a nothing burger, oh yeah another nothing burger, oh there's another nothing burger
    • Here's Imran communicating in Sialkot, nothing burger here's him in Faisalabad nothing burger oh here he is over in Akina Asana his hometown
    • He's recruiting a bunch of boys for a soccer team that's a nothing burger
    • Oh here he is over in Lahore at the naina set tech tech show that's a nothing burger here he is down at the Customs House in Karachi talking on his Blackberry again, that's a nothing burger
    • Oh here he is over at the Porter Kasim checking the video camera for all the radiation testing oh that's a nothing burger
    • Oh well how about all the UAE shipping traffic well ---you're the Urenco shipments going on the Maersk that's a nothing burger and
    • So you have this Center which basically takes all this traffic of our key players, and just hits it with a nothing burger stand
    • And if anybody does come to the White House, comes up and sees Devin Nunes, and says, "hey all this traffic is actually Imran Awan--this story that's going around Washington right now, that's actually him and his--about 20 or 30 of his secure BlackBerryies--you do know that right?"
    • And so what you do is you just put a Reality Winner in there and then you crush the the two whistleblowers, which is exactly what I think you would do
    • And you would investigate them with DHS
    • And you would use the the case management system at DHS to find out about them
    • And then you would crush these people
    • And if you if you hacked the case management system--if you're Imran Awan, and you hacked the case management system you could crush whistleblowers all day long and
    • So that's what really I think--working theory does
    • Now there's it's a lot of speculation but here I talk about the Navy BOYZ in that little theory that I just gave right there and I talked about--
    • How this Mr. PHO
    • Now I didn't know pho oh it's gonna be pronounced Fah I'm gonna keep pronouncing it focus it's more fun it's called pho noodle soup
    • I'm gonna that's gonna be my new imagery for lane leaks leaks
    • Especially leaks about duck soup type operations
    • This is the the using of opiates to target US soldiers
    • And that's duck soup was was heroin for US soldiers in the DMZ 1968
    • So I'm gonna keep that duck soup model going because Pho is Vietnamese and who knows how long who knows how long Pho has been giving duck soup, I mean noodle soup to the enemy, who knows how long?
    • We don't know that
    • Now of course they're gonna say is a doddering old man...but we don't know that
    • That could be just the way of getting these codes these access codes out of Fort Meade
    • Oops I did it
    • Again, we don't know how long that lasted
    • Now for me again, more working theory, but this just looks like Mattis
    • This looks like Mattis cleaning up the Fort Meade
    • And the next thing after he cleans up Fort Meade, I think the next thing he's gonna do is clean up the Georgia center
    • And Devon Nunes isn't dumb--he realizes that these people came from the center too
    • They went to the Eisenhower building
    • So that's what I think's happening I think Madison's cleaning up on the home home base he's gonna go up and clean out the Colorado cryptography Center I believe
    • He's gonna do Hawaii I think there's one in Texas and the Texas Cryptography Center
    • The Colorado cryptography Center
    • I don't know where those are located yet I know the white one I thought was at Diamond D and I a matter of fact I talked to somebody who worked there
    • So anyway I just think this is this is what I love about these
    • I've met somebody in The Associated Press just the other day
    • They said John Solomon doesn't work there anymore he works at theHill
    • And I thought I knew that but anyway I wanted to mention that correct that
    • But it's just how just one good article about national security here by a good reporter from the AP, I don't know who did it
    • Then sometimes the AP hits a story that somebody writes in one of the the journals--the national security journals and then they'll pick it up the AP picks it up
    • But whoever the editor is over there good job
    • Because it it really gives you an insight into what a clean up operation operation clean up the clean the Duck Soup and clean the pho noodle soup off the floor here at NSA in Fort Meade right by me here
    • And then maybe also the Georgia community, to make sure that the Reality Winners aren't stuffing stuff in their pantyhose
    • I doubt very seriously that she stuffed in their pantyhose
    • I doubt very seriously I think there's probably just a cover
    • It's a it's a nice image nice imagery, but I think there's actually two real whistleblowers
    • I must stay with that story that came the Eisenhower Building
    • I might have got the center wrong I thought it was Huntsville
    • I thought it was Redstone Arsenal but well I'm looking at it
    • Now it may have been sweet tea
  • Day 44.1 Is Peter Strzok Really Andrew McCabe? - YouTube
    • Welcome to day 44 this is the first version and the name to try to pronounce and try to remember as this name right here at the FBI
    • This is Peter Strokes I'm gonna call him because I think--I had said before I think it may be an OP name
    • An OP name is you take a funny name like Peter Strokes, I mean you just Swizzle some of the words[sic] {{ letters }} around
    • So you take the Z and move it maybe to the middle
    • That's the only way you could get a name like Peter Stzrokes who knows
    • Is that Andy McCabe? It sounds like it I'm not saying it is Andy McCabe it sounds like somebody who's extremely close to Andy McCabe if not Andy McCabe
    • But if you just look at the metadata of Peter Strzok it's Annie McCabe Annie McCabe Andy McCabe
    • If you look back here he was in charge of the Hillary investigation
    • He's in charge of shutting down the Hillary investigation, numerous times
    • Who else did that? Andy McCabe
    • Andy McCabe shut down NYPD Intel unit
    • He shut down New York NYPD
    • He shut down Little Rock FBI
    • He shut down the EB-5 investigation in Los Angeles
    • He shut down the EB-5 investigation in Miami
    • He shut down the Clinton Foundation investigation in Washington DC
    • He also conferred with Loretta Lynch to have her do shutdowns as well
    • He also brought in Peter Kadzik at certain key points along the way to leak information over to Podesta
    • So and I believe he also is the same person who goes to Fusion GPS and pays for the peepee dossier
    • And now we have Comey, taking the peepee dossier try to add legitimacy to the peepee dossier, and slip behind the curtain at the White House
    • So to think that Andy McCabe would give that to a second, possibly...
    • ...But the metadata looks like [Peter Strzok] is Andy McCabe's OP Name
    • I'm just gonna say that that right now, just from a technical analysis point of view okay
    • So we'll see if it's Andy McCabe or not
    • Tne picture they trying to picture Mueller with another agent to make it look like it's Peter Strzoks, but that's I don't believe this is I don't believe it's that person
    • And anybody on these teams trying to make it look like this guy here
    • I just don't think that's the case
    • Now this guy if you go back to the heavy article has been named in different wiretaps and sting operations Peter Strzok has been
    • They started with the top of it the story which is he sent anti-Trump and pro-Hillary tweets
    • So he's the one who Peter Strzok is a guy who had personally interviewed Hillary
    • And decided no, not to have the lie detector on, not to do it under oath--these are things that the FBI never does
    • This is Kallstrom's argument
    • Is Andy McCabe gonna leave that to somebody else? I just don't think so
    • So here we go with use of the the polygraph and when interviewing applicants
    • He's just looking for people to kind of be in his little cabal
    • So we'll see as the reports come out
    • The let's see the other report here's the Daily Caller has a little bit of the story just the top two percent of the story
    • Mueller's Russia probe The Washington Post had about 20% of the story
    • So they're getting I think they're in the lead
    • The New York Times had a story as well, so I think they're picking this up
    • The Wall Street Journal was completely caught flat-footed on this--they had no idea: they just thought it was an anti-Trump text thing
    • So that they were completely out of the loop
    • But well let's just do a hot search here and just see where we are with Peter Stzrok
    • Now and the now famous Peter Stzroks of course Peter's gonna be a member of my gonna be in my lawsuit to the FBI
    • Again, I filed the FBI lawsuit before this news broke
    • For all those are gonna say I filed it after the news broke--that's not true
    • You can look at the date, and matter of fact all these people have already been served, so it's gonna be hard for me to go back in time and serve them right?
    • {{ 911: G, why do you care? You said yourself, don't focus on the drama, just the lawsuits }}
    • So let's just see what we've got Trump has weighed in yet?
    • No Trump has weighed in with a couple of tweets, not particularly about Peter Stzrok but you can see that the press is picking this up
    • Now the whole investigation the whole Trump investigation looks like it's through this through this Peter Strzok if / Andy McCabe and the whole machine looks like it's gonna collapse
    • Now there is one theory out there--this is just working theory--that Flynn was working with Mattis the whole time
    • And and use Lisa Page at FBI
    • Lisa Page at FBI is not actually an FBI lawyer
    • She's a stand-in she was seduced Andrew McCabe or Peter Strzok, whoever you want to say
    • And set up him in a sting of his own
    • It's kind of nice to set up a sting with us with somebody who sets up a lot of stings
    • {{ 911: so he burns the whole country down because he doesn't want to risk divorce? Wow, if true wow. }}
    • So we'll see if that's true or not but I think actually it is true when all these texts do come out between Lisa Page and Peter Strzok / somebody
    • We'll figure out more to the story
    • So I'd say just by metadata this Peter Strzok looks like Andy McCabe
  • Day 44.2 Peter Strzok and Lisa Page - Conspirators With McCabe? - YouTube
    • It's Day 44 and this is the New York Times article about I'm gonna just keep calling him Peter Strzok but you'll know that I mean STR zs t RZ
    • Peter Strzok and Lisa Page the lawyer and the situation or this situation looks a lot differently now with Lisa Page maybe being complicit in the conspiracy, working directly for Andrew McCabe
    • And of course in my analysis metadata analysis this morning, Peter Strzok's career looks so identical and similar to Andrew McCabe just on based on metadata, I thought it was Andrew McCabe
    • It is so close, and I'll go through how some of that is is come about
    • But this is the the very good article here in HEAVY.com
    • It talks about the lawsuits against McCabe and lawsuits against Peter Strzok
    • It talks about--Lisa Page's involvement and some of the other things news I'm breaking this morning with Robyn grits
    • She's talking about how she filed with the office of a special counsel
    • The office of the Special Counsel is Robert Mueller
    • She filed before Robert Mueller took over that position, but the FBI has definitely stonewalled
    • So this is my reporting as a few minutes ago, "hmmm interesting I filed a complaint directly with the Office of Special Counsel. But I know they have been waiting for documents from the FBI. They could delay every document request FOIA, EEOs"--its equal opportunity stuff--"you name it even the Inspector General from DOJ complained about Grassley's office being stonewalled by the FBI."
    • And then she goes on to talk about down here another friend of hers who had retired through OPM, I'll drop it down here, through OPM, and they just never sent the paperwork over
    • So he he was like OK well--I'm gonna send over my paperwork
    • He just never got it and he's been fighting the FBI for 12 years
    • So it's these winners and losers
    • If you're in side of Andrew McCabe's Counterintelligence little clique--the little JTTF click--you're going to the--doing the counterterrorism a week before the Superbowl, a week before--the playoff, football playoffs, NFL games a week before World Cup etc and you're partying it up just like the Hillary did with her Secret Service people in Colombia
    • If you're in that group you're the winners
    • But if you're a a gumshoe FBI out there on the street doing real investigative work, and not fake crime, well then you're in the losers
    • We're going to delay all your paperwork
    • We're going to Stonewall you we're gonna make you sorry you ever work for the FBI
    • We're gonna pad the pad our pad our winners
    • And we're gonna strike in our losers
    • And just so even though even this guy even the Inspector General of the Department of Justice, officer of department of justice and this is going to be Matt Horowitz complained about it
    • So this is not something then--George is--personal vendetta against McCabe
    • Actually as I've said before
    • I'd want him to live on a nice big branch with very green grass, but I don't think that person needs to be running a coup and information coup against the [lawfully elected, non-criminal] President--which is obviously what's happened
    • He's put in his cronies to attack the sitting president
    • This guy here we want to find him
    • He's Eric Karate Croddy. Now he sued (I'm sorry in my phone's just going crazy)
    • He sued the FBI for using these wacky interview questions, that if they if completely subjective, they're these the same questions users of Fairfax County
    • If they like you then great--that means they can get you in
    • If they don't like you they can keep you out
    • So crowd e Croddy here filed a lawsuit--we're gonna be looking at that
    • Kathy Muller was the investigator
    • Awfully close to Mueller, I mean almost if it was your daughter you would want her to drop the e just so people wouldn't say nepotism--we don't know--we don't know but
    • That's why I put it there
    • Now everybody says well why did you put the address of Andrew McCabe, why did you pin that?
    • Well I actually I put an address for him for 1998
    • Now did I know that he bought it in 2016? Yeah I just thought that was a little weird 20 years later
    • I was I used a three year old address
    • Did I know he bought it, actually? Yeah I probably did but when I saw all kinds of power upgrades going in
    • (Sorry about my phone)
    • When I saw all kinds of power upgrades going in there when I saw these new AT&T pedestals
    • When I saw 200 different wiring teams going in, when I saw these--all the Google Fiber going in
    • When I saw the AT&T Wi-Fi, AT&T fiberline going in, when I saw the depressions and dips for these new vaults from the wiring vaults near there
    • I just said well if you were moving your money out of Malaysia, and out of Gülen's little hands
    • And you wanted a safe keep it what would you do well I'd move it offshore
    • I move through Bitcoin and I would mine the bit coin
    • Now mining Bitcoin takes a lot of power and I've been talking to power experts all day about how much power has been wired into Hillary's place
    • Now am I saying Andrew McCabe is laundering money absolutely not
    • There's no way I'm saying that
    • But I just want people to visualize you have this place out in in Maryland the with these 35 people that are spies within that group somewhere
    • You got five or six of your own GPS people
    • You paid for them we have the receipts now that FBI paid Fusion GPS excuse me for these people
    • Where do you move them after they get Flynn to sign off
    • And finally call Kislyac who's dead now
    • Now they say we don't need these guys anymore and they get rid of them
    • Where do you move that five or six guys that's embedded in that team?
    • Do you move it to Chappaqua?
    • Are they living up there in Chappaqua right now?
    • Who knows but they're not answering service
    • And that isn't helping one thing is for sure I'm going to add both of these people to my discovery both the Peter Peter Strzok is what I call them Peter Strzok and
    • So I learned how to pronounce his name Peter Strzok and this Lisa Page if this person is a personal lawyer for Andy McCabe
    • And this person is kind of a personal hitman for Andy McCabe
    • That's going to come forward
    • People in the FBI are sick of this
    • That is going to come forward
    • That information is going to come forward
    • So I'm going to leave it right there right now
    • That's where the investigation kind of is is at
    • It's obviously very fast-moving here--with the phone blowing up
    • But that's where--you kind of took a couple of minutes out of the newsroom here to kind of--do a here's where how the dots are connecting as of right now
    • You can go to the Twitter feed to see how things are going
    • But that's where we are right now
  • Day 44.3. Focused On the Misuse of Power - YouTube
    • It's Day 44 this is part three
    • This is just a quick Sunday summary
    • And I think it's probably good the full flight of the arrow here really goes back to 2010
    • And if you haven't watched the series before--that I really don't care about viewers or subscribers or patreon or any of that
    • I want to get off Andrew McCabe's list
    • That's all I want--that's all up the reason I got in this
    • You could read the accidental journalist by Trish Negron on Google George Webb an accidental journalist if you want the full story
    • But I protested and got in the way of Andrew McCabe and an operation he did in Portland Oregon
    • It's called Muhammad Muhammad [Christmas Tree Bomber]
    • Basically used three different informants for this Muslim kid took a very nice kid who was studying hard a student 17 years old radicalized him over time showing him a lot of pictures of war atrocities that supposedly were done by a--US soldiers
    • And built a bomb for him
    • He never touched a soldering iron
    • And put him away for thirty years
    • And even that kid with no rights from Somalia
    • I think he did later naturalize, but he ended up almost winning a case in the 702 for "collect it all"
    • And I actually think he should have won it because they used illegally-collected information to convict him
    • Which is Fruit-of-the-Poisonous-Tree
    • So I do believe the little guy has rights in America and can challenge the law
    • The Dred Scott--he's sort of the Dred Scott
    • Muhammad Muhammad SAW the Dred Scott of our time and if he would have won that case he would have it would have helped everyone in the United States with their Fourth Amendment rights
    • So yes I do think a little guy can win a guy can win in the pro se Court and from the Supreme Court with 13 shares of stock
    • So my only intention here is to get off the list
    • And I hope all my viewers go to all other channels and make everybody else rich and wealthy and add to their subscribers and do whatever patreon that they're looking for
    • That's not my goal
    • My goal is to get off the list
    • So what I focused on in this is production of documents documents documents documents
    • And most of the documents--I know some people say I'm trying to get documents I can never get that are secret
    • No, most of the documents I'm going for our public documents
    • Inspector General Reports are Public Reports
    • Reports from the House Committee on Administration should be Public Reports
    • Reports, Emails from people in the State Department, using Gmail should be public, the Public Records Act
    • So I'm not asking for anything classified I'm asking for public records and that's how I kind of the government's supposed to run
    • So that's where I am at that's my goal and I really have no other goals
    • And I have no animosity toward anyone
    • And if I make a mistake I'll certainly correct it
    • I have never accused anybody of a crime in this and if anybody is interpreting it that way, that's not the case
    • The only people I might be talking about in terms of committing a crime or the conspirators, which are is going to be the FBI
    • And there are some there are some actions by the Awans, obviously that are criminal
    • And there are some actions by people around them suppressing evidence and destroying evidence that are criminal
    • But everybody that I'm focused on are actually at the highest levels of government impinging on the fundamental rights of every citizen in the United States
    • I'm not interested in any Jones versus Smith type in situations
    • I'm focused on people who are impinging on the fundamental rights of every US citizen
  • Day 44.4 Will Kristen Neilson Name the Three DHS-OIG Hackers? - YouTube
    • This is Day 44 part 4
    • And here is the DHS OIG hack
    • This is the DHS OIG hack where there's three employees that I say these three employees are gonna be Hina Alvi Imran Awan and Jamal Awan this all happens the first week of March this year and there's a temporary Inspector General I don't know yet if the temporary Inspector General was Theresa Grafenstine or not
    • But it's certainly gonna ask that in the request for admissions
    • So this is an article by Ron Nixon and Nick Fandos
    • I think immediately you can ask them, "hey, where's the W? You forgot the W. Here the Who W, you forgot to ask who these three people are. And then you also forgot the when. You said 'in the spring.' And they have the hack happened in the spring"
    • "Can you be more specific about the first three weeks of the first three days excuse me of March, before--he leaves the country on the 5th, and they get fired that first week those same three from Congress?"
    • Okay? So John Roth is the Inspector General now
    • So we'll see if he if he publishes that
    • But tomorrow this is the Kirsten Nielsen is hearings you can see here by the legislative action for this presidential nomination 1095
    • This gal named Kirsten Nielsen is up for debate tomorrow
    • And she went through our first round of hearings was not bad
    • And usually these are just consent votes
    • We'll see what happens
    • For those of you don't know who Kirsten is, she is young lady but that was kind of picked on a little bit for her experience, but she's got quite a bit of experience at TSA George Bush hired her, and she had a lot of critical infrastructure management role at TSA
    • So she has never led a large organization, but she looks like she's up for the task
    • So the first question is: Kristin Nielsen--just like we asked Jessie Liu, when she took over the Awan case--will you announce the first three people the three people that did this hack?
    • This hack was a 159,000 case files.
    • These were the case files of people who were who were researching cases like Zarate in the Kate Steinle case
    • You get out here you look at the facts of all the breach, you'll see that it was the actual case management of people who were looking at cases like Zarate and the Kate Steinle deal
    • Only there's one hundred fifty nine thousand
    • This is why I called this case here 159,000 Kate Steinles
    • This this case right here is 159,000 Kate Steinles
    • Because these are the investigators investigating those cases
    • You look over here at the USA Today report well if you look at Ray lockers report, you'll see that he has a he names how many people that
    • I think that's Ron Nixon right there from New York Times I believe
    • Yeah yeah it's Ron Nixon there and I I haven't looked up Nick Fandos yet
    • But here's the article here Nick Van DOS Ron Nixon New York Times insider stealing data nice report
    • So you can review this and just text them send them text...and say hey--will Kirsten Nielsen be confirmed tomorrow?
    • And well the first thing she does
    • Again, if these guys are double dipping it at DHS
    • And they're into the system of 159 thousand names--that's 159 thousands Zarates
    • That's 100 that's could be more than one hundred fifty nine thousand Kate Steinle
    • I don't know however many people that might might result
    • So even one Kate Steinle even one more Kate Steinle is is not good
    • But this is a hundred and fifty nine thousand case files that were hacked
    • And if you don't identify the hacking team
    • And they can go from all the different 30 departments in the DHS Coast Guard and TSA, you could could just do a round robin of all 30 agencies in DHS
    • This is critical: if you don't name those three people and you have no chance of plugging the leak
  • Day 44.5 Lisa Page - EB5 "Family" Visas? - YouTube
    • This is Day 44 this is part five
    • This is Lisa Page and these are the two people that came out today
    • Lisa Page and Peter Strzok just to two people it just seemed to be everywhere as far as setting up the Comey meeting with Laura and Lynch in there--over at the Hillary investigation
    • They're over at the Hillary interview, and then they're at the Trump investigation, and then they're at the--behind the curtain here, and behind the curtain there
    • And it just seems like the type of person who's involved with fuschia GPSFusion GPS
    • With the--is it are they're really sending anti-Trump messages from the Mueller investigation?
    • There at the they're everywhere
    • They're at the the Hillary investigation together
    • They're at the Trump administration with the Russia Russia Russia
    • Then they're at the Mueller investigation in
    • Are they really are they really lawyers? No
    • I mean she's a lawyer but Peter Strzok is not
    • Aren't they really just sending out information of what the Commission's coming up with?
    • Aren't they just leaking information out to their friends and Andrew McCabe?
    • Isn't that actually what's going on it's not how Andrew McCabe is getting updates on all these investigations as they're going along--isn't it isn't that really the case?
    • Anyway I saw these things that are a record which was this disorderly conduct and whatever obstruct off--businesses is--I don't know what that is
    • But anyway I forgive people for their minor errors
    • But what I what I notice is locations.
    • She's from Columbus, Ohio
    • She got her law degree here in 2006
    • And I just look at Hillary, and then I look at kind of being brought into the to the FBI world
    • And here's Summit County here
    • And this is Akron, where my dad was born
    • And I had visited this Strongsville, Ohio, and the Strongsville Ohio had been kind of had been singled out because
    • (Not because of the creepy building here)
    • But because it had this European adoption agency
    • This creepy European adoption agency that got raided by the FBI
    • I don't know if she was there doing the investigation for this
    • Or if she was doing--it's like maybe a color-of-law, where I bring in all these kids, and after the 10,000th kid I bring in, then I say oh well it's color-of-law
    • I'm the adoption lawyer--I'm the EB-5 lawyer for bringing in all these kids
    • Oh All the kids are gone there with all the families now
    • But ten years later I'm gonna--calling the chit's here
    • I was there I started in 2008 and now it's 2017, so I'm gonna call the chit's in
    • But anyway they adopted this thing called the European adoption consultants
    • And I think a tremendous amount of kids went through this place
    • Just an amazing amount of kids from overseas
    • I think they were flying him in the Wright-Patterson Air Force Base in Springfield Ohio and kind of I don't I can't exactly all the different ways they got in
    • But they were from all over the place
    • They were it was operated by the state department
    • So it was really weird there's that Hillary connection
    • And these people were kids were come from Bulgaria and China and Colombia Congo Haiti or Honduras India Panama Poland Tanzania Uganda Ukraine
    • And I remember how many Russian kids had come through with--look like they had had like polish passports or Bulgarian passports
    • So I don't know if people have read about this but this was a crackdown
    • And I think Hillary was involved in this
    • Now she's she might be able to say, well it was a ten year color-of-law
    • We imported kids ten years and just to make sure we knew who the bad actors were
    • Maybe that's the case here I stay away from pizza gate as much as I possibly can
    • But I mean it's right here in front of your face
    • I mean this is the FBI in and--invading there or shutting this down
    • Now they shut it down ten years later
    • She's there Lisa Page is there near Strongsville in 2008
    • And then ten years later it gets shut down
    • Was she involved in EB-5s?
    • Did she do ten thousand people ask for all these kids?
    • And then they shut it down ten years later?
    • We really don't know
    • But it's a good question to ask Lisa Page
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

The Bitcoin Group #199 - Assange Arrested - Hodlonaut Drama - Shaking the System - Coinbase Card Satoshi Nakamoto the Creator of Bitcoin - YouTube New bitcoin free earn Bitcoin Halving 2020 - Live Wie weit geht die Korrektur? Bitcoin Group ein Kauf? (21 ...

CoTa Global Inflatable Pool Float Tube Confetti 36 Inches Premium Swim Ring Heavy Duty Vinyl Flotation Pool Floats Toy for The Beach, Party, Vacation, UV Resistant - Pool Party (Rose Gold) 4.6 out of 5 stars 957. $9.99 #16. Greenco Giant Inflatable Ride-On Banana Float 4.0 out of 5 stars 604. $9.99 - $57.47 #17. Intex River Run I Sport Lounge, Inflatable Water Float, 53" Diameter 4.6 out of 5 ... Earn bitcoins by watching YouTube videos. Low Minimum Payout. jatonen http://www.blogger.com/profile/00745119186940022903 [email protected] Blogger 1 1 25 tag ... Top cryptocurrency prices and charts, listed by market capitalization. Free access to current and historic data for Bitcoin and thousands of altcoins. Changelly.com is the best instant cryptocurrency exchange platform with the best exchange rates for BTC, ETH, LTC, XRP, ADA and 140+ other cryptocurrencies. You can buy bitcoin and other cryptocurrencies with a credit card or any crypto wallet We are pleased and excited to let you know our branch (currently located at 62 De Havilland Drive, New Plymouth) is moving 400m around the corner to 21 Swans Rd, Bell Block, New Plymouth.. You can look forward to the same great service and range of Carbon, Stainless Steel and Fortress Fasteners plus other related products all in ournew premises.

[index] [29923] [40648] [9161] [10787] [10378] [45390] [1804] [25308] [2660] [25406]

The Bitcoin Group #199 - Assange Arrested - Hodlonaut Drama - Shaking the System - Coinbase Card

Der BTC-ECHO Wochenrückblick in der KW35 mit Jan Heinrich Meyer (https://www.youtube.com/channel/UCuLSfeIMuQ_npjjBY3J_FPA) 📰 News: https://www.btc-echo.de/ 👍... Kostenlose Registrierung und weitere Livesendungen auf https://www.heavytraderz.live Werde PLUS+ Mitglied und erhalte Zugang zu den einzelnen Trader-Monitore... bitcoin free earn Hello friend's my name is Sourav Das Take a look at "BTC FARM - Earn free Bitcoin" go to your phone play store and Google Play Store URL -:... Greenpeace, Bitcoin Union, TheOpenMinute w/ Gryfen Crypto Inc., Opal, Soumitra Mandhata, Paypal, & Bitcoin Juggle Btc donations will be used wisely: 17vPhPit... Is bitcoin the blueprint for a bankless currency, or the biggest pyramid scheme ever? When the financial world collapsed in 2008, a mysterious genius under t...

#