Special Ops Surge: America’s Secret War in 134 Countries (Before It's News) PressTV They operate in the green glow of night vision in Southwest Asia and stalk through the jungles of South America. They snatch men from their homes in the Maghreb and shoot it out with heavily armed militants in the Horn of Africa. Since September 11, 2001, U.S. In the waning days of the Bush presidency, Special Operations forces were reportedly deployed in about 60 countries around the world. In 2013, elite U.S. forces were deployed in 134 countries around the globe, according to Major Matthew Robert Bockholt of SOCOM Public Affairs. Growth Industry Formally established in 1987, Special Operations Command has grown steadily in the post-9/11 era. ZenGardner.com The post Special Ops Surge: America’s Secret War in 134 Countries appeared first on Just Wondering – Alternative News and Opinions.
How Does Apple Really Feel About Bitcoin? Over the past couple of months, there have been a few Bitcoin app rejections by Apple that have made some waves. First, the venture-backed startup Coinbase had its app removed entirely from the App Store. Today, a blog post from peer-to-peer messaging and payments app Gliph highlights its own rejection and the subsequent removal of its ability to transact in Bitcoin. Gliph’s Rob Banagale talks about a few aspects of the rejection, including the technical details of how Gliph handles Bitcoin, Apple’s motivations for rejecting the app and the possibility that it could change its mind. The rejection, Banagale notes, was based largely off of section 22.1 of Apple’s App Store review guidelines. Bitcoin is not illegal, but it is also not legally recognized by governments as a currency. We reached out to Banagale to talk about the way that Gliph functions, and how it differs from apps like Coinbase. “We didn’t want to specify which wallet you had to use,” Banagale says.
Nanobiometrics Will Track You By Smell Nicholas WestActivist Post In a few short years, we already have become accustomed to drone surveillance and an array of biometric ID tracking technology that has formed a pervasive matrix of identification and personal data retention. As discussed in How Close Are We to a Nano-Based Surveillance State? back in February of 2011, the next phase of ID will be on the nano scale. DARPA and their contractors have been working for quite a while on making you, not just your personal data, the tracking mechanism. A new announcement from a Spanish engineering firm highlights the direction that is being taken in extracting the most innate personally identifying information possible. Nanotechnology for identification purposes already has been introduced in the following ways, just to name a few: Nano sensors for use in agriculture that measure crops and environmental conditions. It is the misappropriation of science and technology that poses one of the greatest threats to our freedom.
For some government agencies, it’s only official if it’s on floppies Imagine this scenario: your job is to take hundreds of pages worth of content every day and publish it to the Web, but the only way you're guaranteed to get that content is on paper. If you're lucky, the paper copy comes with an electronic version on CD—or a 3.5-inch floppy disk. That's exactly what happens at the Federal Register, the New York Times reports. The federal publication, a record of executive orders, proposes regulatory changes and other official federal notices. It's assembled by an office of the National Archives and published on the Web and in print daily by the Government Printing Office. That means that a number of agencies still submit their notices by courier and on floppy disk.
Technologies & History of Directed Energy Weapons - Organised Crime of Covert Electronic Assault, Stalking & Surveillance - New Zealand More on what these victims endure Read the short story below - About what victims endure Pages 1-7.Page 8 onward includes plenty of credible information with directions to the informative links page - to back/up the histories and usages of these tactics etc Re below... The True Story-The Bourne Identity(History Channel) A very informative documentary about the early days of experiments on controlling the human mind and creating assassination with no memory of their killing actions. The CIA and various government departments carried out these experiments on their own people as well as 1000's of unwitting/non consenting innocent citizens. Terrorism and Mental Health: The issue of psychological fragility(October 2009)Journal of Pakistan Medical AssociationByAmin Muhammad - Clinical professor of Psychiatry Of late, there are reports of a new and dreadful invention of weapons of violence that are called Bio-electromagnetic Weapons. See Amin Muhammad’s biography here Human V2.0CNN (BBC Broadcast)
The darkly funny drawings of Laurie Lipton The Drawings of Laurie Lipton, published by Last Gasp, is a comprehensive survey of Lipton’s fantastical, meticulously detailed, hand-drawn images. Gallery below is NSFW When traveling around Europe as a student, she began developing her very own peculiar drawing technique building up tone with thousands of fine cross-hatching lines like an egg tempera painting. “It’s an insane way to draw,” she says, “but the resulting detail and luminosity is worth the amount of effort. “I used to sit for hours in the library copying Durer, Memling, Van Eyck, Goya and Rembrandt. "It was all abstract and conceptual art when I attended university. Buy a copy of The Drawings of Laurie Lipton from Amazon See Laurie at these SF Bay Area venues.
UFO DIGEST COM: UFO and Paranormal News From Around The World By William C. Treurniet Summary. Luminous orbs seen moving across the sky sometimes behave as if they are under intelligent control. Introduction For many years, mysterious luminous spherical objects, or orbs, have been seen in the sky. The British Ministry of Defence (MoD) acknowledged in a summary report written in 2000, that unexplained luminous objects in the sky have occasionally been seen. It is not obvious how to create plasma balls remotely with the science and technology we have in the public domain. Some orbs are man-made plasma balls Recently, such evidence has come to light in several videos of the sky over Reading, England. A second video showed a spot of light in the sky dancing randomly around a mean position for about six minutes. Drawing with orbs A number of reports also mention luminous non-spherical shapes. Figure 1. This ability to arrange multiple orbs in close proximity was also seen in a third video of the sky over Reading. Figure 2. Figure 3. Figure 4. Figure 5.
New Linux worm targets routers, cameras, “Internet of things” devices Researchers have discovered a Linux worm capable of infecting a wide range of home routers, set-top boxes, security cameras, and other consumer devices that are increasingly equipped with an Internet connection. Linux.Darlloz, as the worm has been dubbed, is now classified as a low-level threat, partly because its current version targets only devices that run on CPUs made by Intel, Symantec researcher Kaoru Hayashi wrote in a blog post published Wednesday. But with a minor modification, the malware could begin using variants that incorporate already available executable and linkable format (ELF) files that infect a much wider range of "Internet-of-things" devices, including those that run chips made by ARM and those that use the PPC, MIPS, and MIPSEL architectures. "Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability," Hayashi explained.
Revealed: US spy operation that manipulates social media | Technology The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda. A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world. The project has been likened by web experts to China's attempts to control and restrict free speech on the internet. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives. OEV is seen by senior US commanders as a vital counter-terrorism and counter-radicalisation programme.