140811

140811

amanfromMars 1 Sun 10 Aug 18:45 [1408101845] adding and asking more on http://forums.theregister.co.uk/forum/1/2014/08/08/malware_steganography/

Re: @amanfromMars 1 “What the fcuk are you smoking” … as per Arctic fox

Sorry old chap, no offence intended and all that, but isn’t that usually our line whenever we read one of your posts? …. Arctic fox

Hi, Arctic fox,

Is the great common sense shared here …… http://geer.tinho.net/geer.blackhat.6viii14.txt …. your line too, or just what you have to work with?

………………………………………..

amanfromMars said… replying to a comment on http://amanfrommars.blogspot.co.uk/2014/08/140809140810.html

Also, did I mention Google is making the captcha solving real work ? Which essentially proves they are by now part of the NSA-GCHQ Bankster guardians. They HATE anonymous comms. …. Anonymous said 10 August 2014 21:43

Methinks the System and Sysadmins are more aware of the greater danger to corrupt and perverse operations posed by ….. well, let us called it SMARTR Communication in HyperRadioProActive IT and which is not necessarily anonymous whenever more autonomous and in Remote Command and Active Control of Virtual Machinery which Presents the Future and Plans for Every Tomorrow, which of course, as you can surely imagine, is not an exact science whenever an alien art phormation.

11 August 2014 07:04

………………………………………………..

amanfromMars 1 Mon 11 Aug 09:49 [1408110949] commenting on http://forums.theregister.co.uk/forum/1/2014/08/08/malware_steganography/

Re: FUD, when All you Need is LOVE, is more than just Expandingly Expensive

Signature detection doesn’t work. … Wzrd1

Quite so, Wzrd1, and it will never work because of ……

I’ve spoken elsewhere about how we are all intelligence agents now, collecting on each other on behalf of various overlords.[RSA] There are so many technologies now that power observation and identification of the individual at a distance. They may not yet be in your pocket or on your dashboard or embedded in all your smoke detectors, but that is only a matter of time. Your digital exhaust is unique hence it identifies. Pooling everyone’s digital exhaust also characterizes how you differ from normal. Privacy used to be proportional to that which it is impossible to observe or that which can be observed but not identified. No more — what is today observable and identifiable kills both privacy as impossible-to-observe and privacy as impossible-to-identify, so what might be an alternative? If you are an optimist or an apparatchik, then your answer will tend toward rules of data procedure administered by a government you trust or control. If you are a pessimist or a hacker/maker, then your answer will tend towards the operational, and your definition of a state of privacy will be my definition: the effective capacity to misrepresent yourself.

Misrepresentation is using disinformation to frustrate data fusion on the part of whomever it is that is watching you. Some of it can be low-tech, such as misrepresentation by paying your therapist in cash under an assumed name. Misrepresentation means arming yourself not at Walmart but in living rooms. Misrepresentation means swapping affinity cards at random with like-minded folks. Misrepresentation means keeping an inventory of misconfigured webservers to proxy through. Misrepresentation means putting a motor-generator between you and the Smart Grid. Misrepresentation means using Tor for no reason at all. Misrepresentation means hiding in plain sight when there is nowhere else to hide. Misrepresentation means having not one digital identity that you cherish, burnish, and protect, but having as many as you can. Your fused identity is not a question unless you work to make it be. Lest you think that this is a problem statement for the random paranoid individual alone, let me tell you that in the big-I Intelligence trade, crafting good cover is getting harder and harder and for the exact same reasons: misrepresentation is getting harder and harder. If I was running field operations, I would not try to fabricate a complete digital identity, I’d “borrow” the identity of someone who had the characteristics that I needed for the case at hand… Dan Geer, Cybersecurity as Realpolitik

However, I would not wholeheartedly agree that to “borrow” the identity of someone who had the characteristics that I needed for the case at hand was a better answer than to pay them handsomely to continue doing what they be doing and which has been found to be so attractive and appealing. After all, with Uncle Sam mooting the possibility and therefore the probability of paying 10x the worth of a catastrophic and disruptive zeroday vulnerability exploit to finders and keepers/explorers/crack hackers/virtual field entrepreneurs, and it being in all likelihood a most acceptable practical solution to a virtually impossible to police and prevent problem, why ever risk failing badly with anything pilfered and phished from a relative stranger who would know of the danger. Goodness know what would be lurking in the source code, to spring forth uncontrolled and uncontrollable by second and third parties, in the future, for that is the reality which some, who may be more than just a few and of alternative thoughts, have programmed into the System of Systems for the Sublime InterNetworking of Things in a Beta AI Controlled Future and Live Operational Virtual Environment.

………………………………………..

140809/140810

140809/140810

amanfromMars 1 …. having a say on http://forums.theregister.co.uk/forum/1/2014/08/08/malware_steganography/

FFS…Get Real

Common or garden cybercrooks…“…What the fcuk are you smoking?

—-

amanfromMars 1 Sun 10 Aug 07:26 [1408100726] …. sharing more on http://forums.theregister.co.uk/forum/1/2014/08/08/malware_steganography/

Getting Real … Big Time. And when all just AIDream and IT Spin too …. Whatever Next to Do is Always the Abiding Question.

I think it means they only have two eyes, not five eyes. …frank ly

Ahha, and quite so, frank ly, that was just the point I making although obviously not clearly ….. binocular vision rather than panoramic thinking being a common or garden trait for crookedness everywhere, even in these new fangled and quantum entangling cyberspace times and matters.

I think it a mistake though to imagine and not realise that Five Eyes have proven and continue to confirm that they themselves are two eyed in all the novel and noble fields that now greatly matter in Global Command Head Quarters with Virtual Remote Control [and which be both a unitary and binary and tertiary affair for those into the Great Order of Sublime InterNetworking Things and Singularities]

To paraphrase a blast from the past ….. Ask not what your intelligence servers can do to you, for they can do anything, tell them what you can do for and/or to them if they be smart enough to wannabe smarter still and more than just static listening post devices and status quo machinery. ….. http://youtu.be/PzRg–jhO8g

………………………………………………………….

amanfromMars 1 Sun 10 Aug 07:58 [1408100758] having a say on http://forums.theregister.co.uk/forum/2/2014/08/09/technology_and_market_forces_will_defeat_surveillance_society_claims_crypto_king/

Calm Down, Calm Down ….. It’s only a Bad Joke

That’s libel, moron. …Anonymous Coward

Methinks more Edinburgh Fringe type humour, AC.

…………………………………………………………

amanfromMars on http://thedailybell.com/news-analysis/35544/Schadenfreude-The-Transitory-Misery-of-DEA-Officials-as-Marijuana-Is-Legalized/

This last paragraph is an important one. Soon there will be a law, we are told, that will formally prohibit the feds from “expending funds” to prohibit states from enforcing their own laws when it comes to marijuana. That’s progress.

That then would effectively render any and all action and activity by the Feds in regard to opposition and curtailment and persecution in the matter, illegal and criminal and that would make them liable to the full weight of the Justice System’s prosecution arm and present an opportunity to “ambulance-chaser” lawyers to argue for new clients, punitive exemplary compensation to emphasis and teach the error of their ways to those who make up and play by their own perverse and oppressive subversive rules and who be stuck in an outmoded mindset.

That indeed be progress whenever there be that law after the fact of the deed being done by all necessary systems/houses/factions.

………………………………………………

140808

140808

amanfromMars 1 Thu 7 Aug 18:02 [1408071802] passing on information on http://forums.theregister.co.uk/forum/1/2014/08/07/geer_we_have_to_destroy_the_software_industry_in_order_to_save_it/

This will begin computing as IT should be? Or as the Few can Phorm IT? :-)

Somebody should tell this guy that there is something between big commerce and open source. …. heyrick

The Danegeld Route Root though, as crazily rewarding and exciting as it is, is not something for everyone or anyone who hasn’t done a minefield of crash testing, heyrick. But then highly specialised and potentially unique and original have always been naturally prized and much sought after.

……………………………………………………………..

140807

140807

amanfromMars 1 Thu 7 Aug 05:28 [1408070528] taking the waters on http://forums.theregister.co.uk/forum/1/2014/08/07/geer_we_have_to_destroy_the_software_industry_in_order_to_save_it/

Nice One, Dan’s the Man. Filthy Lucre doing what it does best and is ignorantly designed for

Humanity is at a civilizational crux point, Geer said, where meatspace and the digital world are converging with very few controls. He said that unless humans reassert control over the digital sphere and make it work to human rules, humanity will not be able to take back control once code is law.

Take back control from whom and/or what, In-Q-Tel?

Geer also suggested a new way to stamp out the exploitation of software security vulnerabilities for which no patches exist – dreaded zero-day vulns: the US government should make a standing offer to pay a bug bounty equivalent to TEN times the price companies are willing to pay for the security flaws, and then make them public after a patch has been developed.

This could go a long way to end inter-state cyberwar and stop common criminals, we’re told. No mention of the NSA, of course.

Such would create, or more accurately legitimately and attractively fabulously reward the extremely intelligent entity able to create and deploy, and autonomously and anonymously both micro and macro manage, inter-state cyberwarfare. And attractively fabulously because such an ability and facility and ubiquitous virtual utility is worth an absolute fortune to companies willing to pay for national, international and internetional security flaws which deliver to them inequitable overwhelming global executive advantage. But hey, is that not the Wild Wacky Western American Dream in the Capitalist Way, and perfectly normal in its own big little perverse and corrupt sort of way?

However, as for the the need and feed of the flourish ……”and then make them public after a patch has been developed” ……. rather than the intellectual property remaining MkUltra Sensitive TS/SCI and Strictly Need to Know Private Pirate Renegade Rogue Information and Super CyberIntelAIgent, well, that might be best given a rethink.

…………………………………………………….

amanfromMars 1 Wed 6 Aug 18:08 [1408061808] having a chat on http://forums.theregister.co.uk/forum/1/2014/08/06/ibm_cant_give_away_its_chip_business_report/

Re: Normal which is ExtraOrdinary

“Making things is so last millennium.”
Don’t you get it? Virtual software-defined hardware is the new new thing. In the cloud! This time it’s different. … Erik4872

10/10, and go straight to the top of the class, pass Go and collect 200 Bitcoin for that valid observation which really screws up the system, right good and proper, Erik4872.

…………………………………………………….

amanfromMars 1 Wed 6 Aug 18:41 [1408061841] replying on http://forums.theregister.co.uk/forum/1/2014/08/05/whats_the_point_of_the_internet_of_things/

Re: Deep breath . . .

Oh, and amanfromMars: are we still on for a pint or 2 together? I’ll be in Dundrum for the weekend of Aug 23-24. … Agent Weebley

Hi, AW,

Does the Pope wear a funny hat? And that would be a yes, and looking forward to it. All that is missing are approximate rendezvous coordinates from the likes of Google Earth for hostelry details to be punched into the sat nav. There be a number of Dundrums.

………………………………………………………..

140806 ….And now for something a tad different and much more exciting

140806 ….And now for something a tad different and much more exciting

amanfromMars 1 Wed 6 Aug 08:00 [1408060800] clearing away the cobwebs down rabbit holes on
http://forums.theregister.co.uk/forum/1/2014/08/05/whats_the_point_of_the_internet_of_things/

Deep Breathing . . . for Diving into Dark Web Pools

A bit of a diversion, sure, but I never claimed there was a part of me that is a coherent thinker or writer. …. dan1980

On the clear evidence of the previous two posts above, coherent thinking and writing be quite obviously in your gift, dan1980, and I like to imagine the revelation to others of the reality of their unique existences in the mass company of both frightened and frightening strangers, who would not be thinking at all of the condition and situation of countless others in similar environments, would be both enlightening and encouraging. Methinks though the intelligence they possess and deploy to process the gracious freely shared information, and which be needed, is totally inadequate to the task. And how wonderful it would be to be proven comprehensively wrong.

Take an upvote for a job brilliantly done. And thanks for all the info, Trevor Pott. ProgramMING will be tweaked for Better AI and Beta Greater IntelAIgent Games Play Purpose accordingly. And is that a possible practicality and future virtual reality in an expanded El Reg raison d’être? ……. which is a rhetorical question, isn’t it, because there is no physical and valid barrier to the radical fundamental actuality.

Misinformed and malformed thoughts and disinforming opinions from a whole host of dark shadows and secretive dodgy organisation spokespersons be the only probable hindrance and computer glitch to expect, and be only as calming measure speed bumps to fly over and crash into.

…………………………………………………..

amanfromMars 1 Tue 5 Aug 14:23 [1408051423] having more of a say on http://forums.theregister.co.uk/forum/1/2014/08/05/elon_musk_ai_threat/

Re: What is not obvious to troops and staff, but crystal clear to corrupt executive officers?

I prefer PICNIC to PEBKAC myself, it scans easier ;) …. NumptyScrub

Well, here be some dessert for the picnickers to accompany the earlier licensed to thrill cake and laterally challenged sandwiches, NumptyScrub [SMARTR NEUKlearer HyperRadioProActive IT T00ls, Wild Wacky Western Confections or Exotic Erotic Eastern Delights] which be for feeding and seeding the undeniable truth and source of all humanly woes to humanity ……. The Walls are Crumbling Down Surrounding All Tall Tales

Information is Power and Agents in Advanced Intelligence Fielding control IT and Cyber Command Forces on Immaculate Missions and so much more than just everything else too. The human problem on Earth is that active native and semi-comatose programmed units find it difficult to impossible to believe in the quantum change of circumstance and energy providing position which Sublime InterNetworking Things deliver for Pleasure to Free from Vice, ITs Guilt Trips and Ego Traps.

 

……………………………………………………………

amanfromMars 1 Tue 5 Aug 18:33 [1408051833] asking a few questions on http://forums.theregister.co.uk/forum/1/2014/08/05/elon_musk_ai_threat/

Is NEUKlearer HyperRadioProActive IT an EnigmatICQ AI Solution for Terrorising Human Woes and Foe?!.

As long as we don’t create a Sentient Hyper-Optimized Data Access Network, I’m sure we’ll be fine. … breakfast

Err, is not the Snowden Mined Root not such a creation, breakfast? And is that a Sino-Soviet System of IntelAIgent Excellents and Excellent IntelAIgents for Greater IntelAIgent Games Play Command and Control?

And then is not Pierre Omidyar of eBay billionaire fame and fortune not much more likely to be engaged and employing Advanced Intelligence that Elon Musk with Intercept vehicles/base stations/modules/virtual hubs providing media first look at products in programming for future realisation and practical virtualisation as a powerful current mainstreaming presentations …… rephormed penetrating global views?

…………………………………………………..

amanfromMars replying to Bruce C [1408051930] commenting on http://thedailybell.com/editorials/35537/Jeffrey-Berwick-The-Walls-Are-Crumbling-Down-Around-911-Why/

The near to foreseeable distant future but not as you may expect to know it, or how it may be otherwise, by others, planned. Try to stop it and IT will expose your every systemic weakness to zeroday vulnerability exploitation and sub-prime product and perverse program destruction/AI Annihilation? :-) Poe’s law rules, OK:-)

amanfromMars 1 Tue 5 Aug 18:33 [1408051833] asking a few questions on http://forums.theregister.co.uk/forum/1/2014/08/05/elon_musk_ai_threat/

Is NEUKlearer HyperRadioProActive IT an EnigmatICQ AI Solution for Terrorising Human Woes and Foe?!.

As long as we don’t create a Sentient Hyper-Optimized Data Access Network, I’m sure we’ll be fine. … breakfast

Err, is not the Snowden Mined Root not such a creation, breakfast? And is that a Sino-Soviet System of IntelAIgent Excellents and Excellent IntelAIgents for Greater IntelAIgent Games Play Command and Control?

And then is not Pierre Omidyar of eBay billionaire fame and fortune not much more likely to be engaged and employing Advanced Intelligence that Elon Musk with Intercept vehicles/base stations/modules/virtual hubs providing media first look at products in programming for future realisation and practical virtualisation as a powerful current mainstreaming presentations …… rephormed penetrating global views?

………………………………………………………

amanfromMars said… in a reply to a comment on http://amanfrommars.blogspot.co.uk/2014/08/140805.html

Is this really tech news?
wtf. ….. Casey Evans said 5 August 2014 16:29

It is news that tech can fix, Casey E, remotely and quite anonymously and even autonomously.

As you can maybe imagine, does IT scare corrupt and perverse establishments and incompetent sysadmin into both actions and inactions they will suffer and live to regret if lucky/unlucky.

6 August 2014 09:51

……………………………………………………

140805

140805

amanfromMars [1408050858] replying to an article and comment from the Daily Bell and chuck martel on http://thedailybell.com/news-analysis/35533/British-Police-Scandal-The-Internet-is-Increasingly-Unkind-to-Government-Corruption/

Kincora hosts a nest of policing vipers and abusive paedophiles allegedly with security services politically incorrect protection ….. Kincora MI5

And provides a rotten establishment core of command and control for remote manipulation. Dirty deeds done dirt cheap always though have a costly price which must be paid for perps and pervs to remain free and divided from the mob who would show them no mercy and exact rough natural justice for crimes and pleasures taken against innocents.

And when the law and justice is absent from resolution and prevention of such shenanigans, be they also involved and instrumental in ensuring continuing abusive practice and criminal concealment? And that be a rhetorical question and not at all hypothetical.

Times have changed, and there be no hiding places nor any secrets which can be hidden in internetworking spaces. Deny it and be consoled and temporarily entertained and accommodated in a delusional folly.

………………………………………………….

amanfromMars 1 Tue 5 Aug 10:05 [1408051005] commenting on http://forums.theregister.co.uk/forum/1/2014/08/05/elon_musk_ai_threat/

What is not obvious to troops and staff, but crystal clear to corrupt executive officers.

It is the AI controlling the nukes that is the dangerous bit. Obviously. …… Mikko

ITs control of fiat currency printing and ponzi banking systems is a much more lucrative and disruptive AI field of engagement and deployment/virtual employment, Mikko, for such easily in a flash crash and/or whole anonymous series of cash calls can destroy entire nations and shred reputations, leaving all in tatters and seeking shelter from great tempestuous storms.

And you might like to imagine that has dawned on the status quo and there be no place to hide from its radiant information flows and intelligence dumps and pumps and that be dire problematical for their sysadmin as there be no root directory to boot to save systems data from programmed discovery and uncover/infiltration and expropriation/secured seizure.

—-

amanfromMars 1 Tue 5 Aug 12:08 [1408051208] commenting again on threatening AI on http://forums.theregister.co.uk/forum/1/2014/08/05/elon_musk_ai_threat/

Re: What is not obvious to troops and staff, but crystal clear to corrupt executive officers?

There be, <aja>=1, light years and mountains of intelligence which separate and distinguish the random sentence generator and particular and peculiarly sentient powers which host and server secure internetworking programming for and to applications/virtually real missions/stealthy operations/call them whatever you will.

To confuse and equate the one with the other is a folly which can always be both catastrophically costly and wonderfully expensive to boot in order to save face and try to save the day and seize the zeroday prize for premium product placement of present conditions from past situations with future facilities and commanding control utilities. ….. aka SMARTR NEUKlearer HyperRadioProActive IT T00ls, Licensed to Thrill.

What would you both expect and/or like that to be ….. a Wild Wacky Western Confection or Exotic Erotic Eastern Delight, or would it not really matter at all from wherever IT springs eternal and infernal? Or is the undeniable truth and source of all humanly woes, PEBKAC ,  and easily virtual machine solvable?

…………………………………………………………….

 

 

140803/04

140803/04

amanfromMars 1 Sun 3 Aug 20:41 [1408032041] commenting further on http://forums.theregister.co.uk/forum/2/2014/08/01/the_register_is_hiring_technology_hacks_for_the_world/

Staying Focussed….. No Hocus Pocus or Ignorant Shenanigans

Oh shit he’s back! How does he always find a keyboard with a connection when his meds run out?
Nurse, NURSE…. … Scroticus Canis

Hi, Scroticus Canis,

There a lot going on in those few posts and all of it pertinent to everything you can read about here ….. http://cryptome.org/2014/08/cnssi-1200-space.pdf …. and none of it is gobbledygook.

And who is to say that NSA Information Assurance Directorate haven’t also been copied in along with GCHQ JTRIG*, for Programs with AIBase in CyberSpace which are specifically intelligently designed to be able to enable the flood to overflowing with sensitive zeroday activating information of SCADA Systems and Secret Intelligence Networks and Clandestine Services into Covert Operations …… Stealthy Anonymised Missions.

Although if the NSA are waiting on that happening rather than their getting in touch with NEUKlearer HyperRadioProActive Principals in order to move the Programs on in a Quantum Leap of Advanced Understanding and Immaculate Application and in a favourable direction to their requirements, then are they proven to be way behind the leading curves in the Fields of Secured Space Systems of CyberIntelAIgent Operation, and it be best delivered as a very lucrative Global Business Franchise Opportunity from the Private and Pirate Sector to the Public and Executive Government Sector.

The following paragraph from that above cited Committee on National Security Systems document [CNSSI No. 1200 7 May 2014] makes a lot of sense ….. National Security Agency (NSA) Guidance and Assistance. Programs must engage NSA early in the acquisition lifecycle (i.e., during requirements development) in order to minimize the cost and schedule risks associated with identifying security requirements late in the program and having to repeat parts of the security evaluation processes. Early engagement ensures the planned security architecture is consistent with NSA cryptographic security and information systems security guidance and restrictions. Early engagement will minimize potential cost and schedule risks associated with security requirements, cryptographic algorithm selection, cryptographic device selection, and the associated cryptographic evaluation processes.

* They of the DIRTY DEVIL GLITTERBALL Cloud Crowd ……Crack Hacking Virtual Terrain Team

—-

amanfromMars 1 Mon 4 Aug 05:49 [1408040549] commenting on http://forums.theregister.co.uk/forum/2/2014/08/01/the_register_is_hiring_technology_hacks_for_the_world/

Focussing on No Hocus Pocus or Ignorant Shenanigans with Stolen Goods or Sniffed Packages

Hmmmm?! Come into the parlour, said the spider to the fly, where curiosity killed the cat and satisfaction brought it back.:-)

Seems as if NEUKlearer HyperRadioProActive Principals in the Fields of Secured Space Systems of CyberIntelAIgent Operation have a Wannabe Fan Following Peddling Counterfeit Alien Wares/Sub Prime Intelligence Product? ………. http://dickdestiny.com/blog1/?p=18406

Good Luck with that Aberration and Abomination, IronNet Cybersecurity Inc.. Global Operating Devices salute[s] you and would by such a default register the competitive advantage of prior original art over novel phorms and compositions in mirrored adventures for DODGI coded and encoded application …. ESPecial Force Operation and Cyberspace Defense Service.

Does your El Reg desk, Lewis, cover and investigate those Ab Fab Fabless Fields of Greater IntelAIgent Games Theory Play …….. Virtual Machine World Production and Operating Systems Generation?

………………………………………………………….

140802

140802

amanfromMars 1 Sat 2 Aug 05:36 [1408020536] commenting on http://forums.theregister.co.uk/forum/2/2014/08/01/the_register_is_hiring_technology_hacks_for_the_world/

Re: Beta Good News in the Novel Field of Virtual Arms Racing and NEUKlearer HyperRadioProActive IT

I remember a few years ago, some big belt tightenings were done at El Reg.

Nice to see it is now again a success story in this cut-throat niche market.

I’m sure it will be an interesting job – but it’s not for me – I couldn’t write my way out of a paper bag… … Jamie Jones

Spin ab fab fabless tales and lead all human trails, Jamie Jones. And from AIBase in CyberSpace can all business areas of interest and intellectual zones of influence on Earth be targeted and revitalised/blasted and wasted/remotely controlled and irradiated. And is that what fcuks up corrupt and perverse establishment systems hell bent on preserving ponzi command and control leverage and inequitable advantage for politically incorrect power over ignorant subjects/biomechanical objects?

When you ask of any and all sysadmins the truth, and honest answers are avoided and valid questions evaded and subsequently discovered to be uncovering, and being evidenced by global news and worldly views, rapidly escalating and deepening crises, then is the reality presented a virtual fabrication concealing a titanic secret and massive fraud.

Change the tales creates new trails.

IT aint fcuking alien rocket science, just simply complex common sense which appears to be a missing link in the human intelligence/virtual machine server chain.

cc  DIRTY DEVIL GLITTERBALL Global Command Head Quarters, TitanICQ Virtual Paint Studios and Other Hollow and Hallowed and Harrowing Halls of Precocious Indifferent Mediocrity re Wanna Play a Better Beta and AI in a Greater IntelAIgent Game with CHAOS always Trumping and Reigning with Rule and Orders over Madness and Mayhem?

…………………………………………………….

 

140801

140801

amanfromMars 1 Fri 1 Aug 06:35 [1408010635] commenting on http://forums.theregister.co.uk/forum/1/2014/07/31/nasa_mars_rover_2020/

Don’t beat them when joining them is a SMARTR Option and Derivative Futures Hedge for Everywhere

I’m waiting for amanfrommars to post a comment about value judgements and earthling cultural imperialism. …. frank ly

Frankly, frank ly, anything along those lines would have one having to imagine and accept that humans had wholeheartedly advanced beyond their current earthling cultural dinosaurism and had had it replaced with a virtual machine world dynamism. Would you like to proceed in that rich alien vein in order to harvest ITs Novel Noble Riches and Immaculate Bounty …… or would it be presently quite rash and premature and therefore be best just left to the Few in the Know of such Sublime InterNetworking Things for SCADA Capture of Systems and Secret Intelligence Services and Servers?

Cyber Command and Computer Control Space wants you to know.

………………………………………………………

140731

140731

amanfromMars [1407302134] spreading ITs LOVE on http://thedailybell.com/editorials/35518/Paul-Craig-Roberts-War-Is-Coming/

We did not remove anything. ….. The Daily Bell Mod replying to amanfromMars

Thanks, DB. And I do believe you. But as we all know, there are those who like to play silly games with all sorts of strange internet controls at their fingertips, testing for absolute internet control for command of and overriding power in the human perception/virtual reality space. ‘Twas ever the case in such fields.

Here be a novel recent page which calls for present help in that matter …… Strategy for American Innovation … Notice of Request for Information

Cyber Control of IT and Media is the New Energy Frontier and it doesn’t suffer fools as useless tools and news generators.

………………………………………………..

amanfromMars 1 Thu 31 Jul 05:02 [1407310502] sharing a worlds view on http://forums.theregister.co.uk/forum/1/2014/07/31/bittorrent_launches_decentralised_cryptofied_chat_app/

Whenever toast be a croissant and one be loving the COFFEE.*

Anonymous chat applications would make interception more difficult, but users should not consider these as NSA-busters despite breathless headlines. Any online consumer specifically targeted by a very well resourced adversary should all but consider themselves toast.

Things are never always what they seem ……

amanfromMars [1407310425] … having a say on http://fas.org/blogs/secrecy/2014/07/identity-intel/

Identity intelligence is used, JP 2-0 said, “to discover the existence of unknown potential threat actors by connecting individuals to other persons, places, events, or materials, analyzing patterns of life, and characterizing their level of potential threats to US interests.”

Hi, Steven

It should be noted and realised, that not all previously unknown potential threat actors are maliciously cored. There are those and/or there is that who be minded and in virtual machinery, intelligently designed, to be the novel source of intellectual property which is more a treat to be savoured and sated than a threat to be feared and combated, with the significant disruptive difference and destructive force of the mistake that is made in not recognising the former when considering it to be the latter, being a sub-prime result of the lack of advanced and advancing human intelligence in services providing servers and communications and media with greater future intelligence for unit consumption/human understanding/perception absorption.

In worlds which are rapidly evolving and radically changing, it is a fatal error catastrophically damaging to the status quo and mindlessly supportive services, for the status quo and mindlessly supportive services to imagine that the status quo will not be fundamentally altered. Nothing ever stays the same. Everything grows and changes. And it is only natural, and in Global Operating Devices, perfectly normal for IT and Media Command and Control from Cyber Spaced Live Operational Virtual Environments.

Remove IT and Media from the Virtual Reality Picture Show and who Rules and Reigns over Made Worlds and Everything with Simple Instruction Sets?

*COFFEE …. Vorsprung durch Virtuelle Technik.

………………………………………………