Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
‘Sovereign Citizens’ members arrested with help of Predator drone
By Stephen C. Webster
Monday, December 12, 2011
http://www.rawstory.com/rs/2011/12/12/sovereign-citizens-members-arrested-with-help-of-predator-drone/?utm_source=Raw+Story+Daily+Update&utm_campaign=902704c238-12_12_1112_12_2011&utm_medium=email
A family in North Dakota that were members of the “Sovereign Citizens” movement became in June the first American citizens in history to be arrested with the help of Predator drone aircraft, according to a report published Monday morning.
The arrests happened after members of the Brossart family chased off a sheriff looking for missing cows, The Los Angeles Times reported. They did so at gunpoint, so the sheriff called in reinforcements from the state troopers, a regional SWAT team and Grand Forks Air Force Base, which dispatched the remote controlled aircraft.
Using thermal optics, the pilot was able to locate the Brossart family members on their 3,000 acre farm, determining that they were likely armed. Hoping to avoid a violent confrontation, police waited until the sun came out again. In the early morning light, they spotted the family members and determined they were unarmed, then sent SWAT in to make the arrests.
“Rodney Brossart, his daughter Abby and his three sons face a total of 11 felony charges, including bail jumping and terrorizing a sheriff, as well as a misdemeanor count against Rodney involving the stray cattle,” Times reporter Brian Bennett noted.
All of the adults in the family are allegedly members of the “Sovereign Citizens” movement, which holds that the Posse Comitatus Act forbids virtually all government functions. (It doesn’t.) Two members of the loosely spun movement were arrested last year after murdering two police officers in West Memphis, Arkansas, and the Federal Bureau of Investigation considers them to be one of the nation’s top domestic terror threats.
Since the arrests of the Brossart family, police in North Dakota say they’ve called out drones “several” more times, but generally in situations where live aerial pictures can give them an advantage. Drone aircraft are more commonly used in war zones like Afghanistan or Pakistan, but the U.S. also uses them for law enforcement in Colombia, where they’re operated out of military bases and used to track down drug smugglers.
Police to test laser that 'blinds rioters'
A shoulder-mounted laser that emits a blinding wall of light capable of repelling rioters is to be trialled by police under preparations to prevent a repeat of this summer's looting and arson.
Police will trial a laser-firing rifle to suppress riots, the Home Office said.
By Matthew Holehouse11:34AM GMT 11 Dec 2011 462 Comments
(yet another reason to "do nothing")
http://www.telegraph.co.uk/news/uknews/crime/8949060/Police-to-test-laser-that-blinds-rioters.html
The technology, developed by a former Royal Marine commando, temporarily impairs the vision of anyone who looks towards the source.
It has impressed a division of the Home Office which is testing a new range of devices because of the growing number of violent situations facing the police.
The developer, British-based Photonic Security Systems, hopes to offer the device to shipping companies to deter pirates. Similar devices have been used by ISAF troops in Afghanistan to protect convoys from insurgents.
The laser, resembling a rifle and known as an SMU 100, can dazzle and incapacitate targets up to 500m away with a wall of light up to three metres squared. It costs £25,000 and has an infrared scope to spot looters in poor visibility.
Looking at the intense beam causes a short-lived effect similar to staring at the sun, forcing the target to turn away.
"The system would give police an intimidating visual deterrent. If you can't look at something you can't attack it," said Paul Kerr, the firm's managing director, told The Sunday Times.
"If police spot someone trying to do something untoward, painting them with this would certainly make them think twice about it," he said. He said it could also be deployed during hostage rescues.
The Home Office has been considering new forms of non-lethal equipment since the August riots, with the limited range of tasers and CS gas leaving a "capability gap".
A Home Office spokesman said scientists at its Centre for Applied Science and Technology believe the use of lasers "has merit" and that it will be piloted by at least one police force. However, they will have to be satisfied the technology does not cause long-term health damage before it can be approved by the Home Secretary.
Other technology being studied includes 'wireless electronic interceptors' that can be fired a greater distance than Tasers, and long-range chemical irritant projectiles, the newspaper said.
The Metropolitan Police is exploring the possibility of buying three water cannons at a cost of £4m. Currently the only police force in the UK to operate water cannon is the Police Force of Northern Ireland (PSNI), which has six. Scotland Yard is also increasing the number of officers trained to fire plastic bullets, as a direct response to the riots.
China Joins Russian Army Order To Prepare For The Third World War
December 9, 2011 By T Kelly 1 Comment
http://exposingthetruth.info/china-joins-russian-army-order-to-prepare-for-the-third-world-war/
A worrying bulletin of the Ministry of Defence turned to Prime Minister Putin and President Medvedev today said that President Hu has “agreed in principle” that the only way to stop the aggression of the West led by the United States is through of “direct and immediate military action” and that the Chinese leader has ordered its naval forces “prepare for war.”
Hu’s call for war is attached to Rear Admiral and prominent Chinese military commentator Zhang Zhaozhong which, likewise, warned last week that “China will not hesitate to protect Iran even if this requires a Third World War” and the General Russian Nikolai Makarov that fatefully declared last week “not rule out that local and regional armed conflicts leading to large-scale war, including the use of nuclear weapons”
Rising global tensions between East and West exploded over the last fortnight when the Russian Ambassador Vladimir Titorenko and two of his assistants returning from Syria were brutally attacked and sent to hospital by security forces aided by agents of Qatar CIA and British M16 trying to gain access to diplomatic pouches containing Syrian intelligence information that the U.S. was flooded with Syria and Iran to al Qaeda mercenaries American-backed government that ousted the Libyan.
Source: http://translate.google.es/translate?sl=es&tl=en&js=n&prev=_t&hl=es&ie=UTF-8&layout=2&eotf=1&u=http%3A%2F%2Flahoradedespertar.wordpress.com%2F2011%2F12%2F08%2Fchina-se-une-a-rusia-ordena-al-ejercito-prepararse-para-la-tercera-guerra-mundial%2F
They run everything as a front for something else. You can't find them. They're like rats running into dark holes.
An Incredible Look At The Exploding Levels Of Financial Industry Interconnectedness
Joe Weisenthal | Dec. 9, 2011, 1:21 PM | 4,659 | 9
One of the hottest academic papers in the world right now is Econometric Measures of Connectedness and Systemic Risk in the Finance and Insurance Sectors by professors Monica Billio, Loriana Pelizzon, Andrew W. Lo, and Mila Getmansky.
The paper tries to come up with hard definitions of interconnectedness and systemic risk.
We suspect a big part of the appeal of the paper is simply these two charts, showing financial industry interconnectedness in the 90s, and then prior to the 2008 crisis. The dramatic increase in linkages between banks, hedge funds, insurance companies, and other investment companies, is remarkable.
Scroll down to see the second chart.
http://www.businessinsider.com/financial-institution-interconnectedness-2011-12?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+clusterstock+%28ClusterStock%29
I thought he said about 6 mo ago that they weren't interested in Iran?
Swift is second only to David Blech in sliminess.
The ugly is over. :)
They'll try to bury it, they'll try to bury her but just like alternative energy, people are figuring out multiple ways to beat out the bad guys' tech suppression. They are either going to have to start killing off massive amounts of population to limit the numbers of us with brains like that or we're going to beat them.
Seems believes that the bottom is already in for silver.
I am really going to try to make it to see this place this year.
I still do NOT buy hunter gatherer society.
I heard he's the one who brought over Uri Geller to be studied by the spooks and that he was one of the ones in charge of the setting up the government's first remote viewing program?
Water as Fuel - Andrija Puharich and Suppression by David Rockefeller
2010 04 16
(This is probably old news for most of you but I'd never heard this guy's name before)
http://www.redicecreations.com/article.php?id=10601
Pope John Paul II meeting with Andrija Puharich
Puharich was well connected, and respected within the most elite of global society. He was known academically, and internationally among the power elite. He therefore was a significant threat to those special interests involving a direct influence regarding energy sources as fuel derivatives. And his use of ‘water as fuel’ was a direct threat to one of the most powerful families on planet Earth. Puharich had to personally assure the Rockefeller family, that he would no longer engage in further research or usage of ‘water as fuel’ to power combustion engines.
One of the most interesting research projects that I personally got involved in has been research involving ‘water as fuel’ dynamics. From the time of Jules Verne to the present ‘water as fuel’ has been man’s quest, if not speculative goal, to discern, decipher and to design. We know that water can be dissociated, and separated into its’ two combined components, of hydrogen and oxygen. With the use of electrolysis, water is easily dissociated, giving off its properties, in the form of useful gases, but, in very limited quantities, depending upon the amount of current directly used to accomplish its dissociation. From Brown’s (Rhodes) Gas to 4-Space, water is indeed mysterious, ultimately, remaining the focus of countless experimenters and practitioners. And still it remains elusive just out of the reach of useful usage. Or has it?
Several recent experiments involving a variety of ‘water as fuel’ derivatives has ultimately surfaced, strongly indicating that ‘hydrogen’ based ‘energy’ structuring is fundamentally possible and will ultimately provide a means at accomplishing a very serious alternative to so-called ‘fossil fuel’ technologies. What remains to be seen, is whether the existing superstructure involving the monopolistic cartels of “Global Big Oil” and “International Nuclear Based Companies” will allow any advancement towards ‘market’ restructuring, without their approval and cooperation. Oil is just as easily ‘cracked’ and ‘restructured into ‘hydrogen’ formats. In fact, it is the goal of both of these factions to ultimately build a network of ‘novel’ nuclear reactors capable of providing ‘electricity’ and ‘hydrogen’ production derived from this combination, precluding any attempt to escape from their monopolistic designs of enforcing their ‘control’ paradigm.
The suppression of ‘water as fuel’ technologies invented by small independent inventors, therefore, takes on significance, since this would prevent further monopolistic dominance by the existing cartels, already dominating the existing ‘energy’ field.
Andrija Puharich was granted a U.S. patent # 4,394,230 for a "Method and Apparatus for Splitting Water Molecules." This method would reportedly split water molecules into Hydrogen and Oxygen with a net energy gain, and is essentially a perpetual energy device that many believe violates the first law of thermodynamics. Puharich was a very interesting gentleman, with friends in very high places, and led a very dynamic life, incorporating both, style and access, to some of the most powerful components of the political spectrum internationally. Puharich being a friend of R. J. Reynolds (3rd) found support and protective acceptance, until he fell into disfavor with David Rockefeller, ultimately necessitating him to seek protection from another friend, the [then] Mexican President. Puharich capitulated, acquiescing to Mr. Rockefeller’s demands, promising not to engage in further ‘water as fuel’ research, thereby, stopping all attempts at his sanctioned assassination by the CIA.
David Rockefeller
I mention Puharich, in my initial introductory statement, because of his direct relationship within the most significant references of power politics.. Puharich was well connected, and respected within the most elite of global society. He was known academically, and internationally among the power elite. He therefore was a significant threat to those special interests involving a direct influence regarding energy sources as fuel derivatives. And his use of ‘water as fuel’ was a direct threat to one of the most powerful families on planet Earth. Puharich had to personally assure the Rockefeller family, that he would no longer engage in further research or usage of ‘water as fuel’ to power combustion engines.
Read more: Actual Case Histories of Suppression Occurrences
Water Fueld Car
Dr. Andrija Puharich in 1983, made complex electrical waveforms resonate water molecules and shatter them. This freed hydrogen and oxygen, creating a new kind of environment-friendly fuel made of water. Dr Andrija Puharich reportedly drove his motor home for hundreds of thousands of miles around North America in the 1970s using only water as fuel. According to Dr. Puharich the basic cycle of using water for fuel is described in the following two equations, familiar to every high school student of Chemistry:
H2O Electrolysis + 249.68 Btu Delta G H2 + (1/2)O2 per mole of water (1 mole = 18 gms)
This means that it requires 249.688 Btu of energy (from electricity) to break water by electrical fission into the gases hydrogen and oxygen.
H2 and (1/2)O2 + catalyst H2O - Delta H 302.375 Btu per mole of water.
Read more: Water Fueled Car - Andrija Puharich
This company is money in the bank. Who wouldn't try to get this thing down as far as they can to accumulate more. Expect some games going forward but the trend will be up after the day trading here is wrung out. Looks like it's almost over.
Looks like you'll have to wait for that tomorrow.
Absolutely.
I expected a little more umph out of it there at the end. Oh well. Good volume day again.
Last 15 min might be interesting here.
I suspect we'll see some whiplash back into the green soon. This is a really nice churn at this level.
Looking at your last 50 posts of a grand total of 79 over the last 18 months or so I honestly can't tell if you own A Penny Stock Blog or got burned by them. *roflmao*
You're like a negative infomercial and everyone knows that bad exposure is still good exposure. hahaha
New Device To Convert Heat To Electricity In Development At MIT
December 3, 2011
http://www.redorbit.com/news/science/1112433571/new-device-to-convert-heat-to-electricity-in-development-at-mit/index.html
Researchers at MIT say that they have discovered a way to generate electricity from the sun’s light that uses solid-state devices, but does not require mirrors to focus the sunlight, meaning that they could be simpler and less expensive to make than similar, traditional devices.
According to an online article by David L. Chandler, of the MIT News Office, the discovery is essentially an enhancement of devices known as thermophotovoltaics, a less common way to take advantage of the sun’s heat. The researchers, including MIT Research Laboratory of Electronics research scientist Peter Bermel, developed a system in which a photonic crystal to prevent heat from escaping from the thermoelectric material used in the device.
Basically, the method involves “an array of precisely spaced microscopic holes in a top layer of the material,” Chandler wrote. “The approach mimics Earth’s greenhouse effect: Infrared radiation from the sun can enter the chip through the holes on the surface, but the reflected rays are blocked when they try to escape. This blockage is achieved by a precisely designed geometry that only allows rays that fall within a very tiny range of angles to escape, while the rest stay in the material and heat it up.”
Bermel, co-authors John Joannopoulos, the Francis Wright Davis Professor of Physics; Physics Professor Marin Soljacic; and a quartet of students published their findings in the October issue of the journal Nanoscale Research Letters. Their work was funded by the National Science Foundation, the MIT S3TEC Energy Research Frontier Center of the Department of Energy, and the Institute for Soldier Nanotechnologies, Chandler said.
“Selective solar absorbers generally have limited effectiveness in unconcentrated sunlight, because of reradiation losses over a broad range of wavelengths and angles,” Bermel and his colleagues wrote in their paper. “However, metamaterials offer the potential to limit radiation exchange to a proscribed range of angles and wavelengths, which has the potential to dramatically boost performance.”
“After globally optimizing one particular class of such designs, we find thermal transfer efficiencies of 78% at temperatures over 1,000°C, with overall system energy conversion efficiencies of 37%, exceeding the Shockley-Quiesser efficiency limit of 31% for photovoltaic conversion under unconcentrated sunlight. This represents a 250% increase in efficiency and 94% decrease in selective emitter area compared to a standard, angular-insensitive selective absorber,” they added.
The MIT professor told Chandler that putting ordinary, dark-hued heat and light absorbing material in direct sunlight will only get about as hot as boiling water, as the object re-radiates heat nearly as quickly as it can absorb it.
In order to increase the temperature to effectively generate powers, ordinarily mirrors are used, but Bermel says that he is looking for a smaller and less complicated alternative. He describes concentrating the sunlight thermally by capturing it, then reflecting it back into the material, thus allowing it to absorb the same amount of heat as a standard black object and limiting the amount re-radiated.
According to Chandler, the next step in the process will be to test different materials in order to see which can produce power with the highest amount of efficiency. Bermel told the MIT News Office writer that “the highest efficiency [in converting solar energy to electricity] is 10 percent, but with this angular-selective approach, maybe it could be 35 to 36 percent,” which would be higher than the theoretical maximum achievable by traditional photovoltaic solar cells.
—
Source: redOrbit (http://s.tt/14wtj)
Army makes strides in smart-phone security
Aggressive deployment seen as a model for other services
By Henry KenyonJan 13, 2011
http://defensesystems.com/articles/2011/01/24/cyber-defense-army-smartphone-deployment.aspx
(This is what I'm talking about, ECRY is going to be the solution to the problem. This article makes it as plain as day who it's going to be that fills this gap between secure phone and not secure.)
The U.S. military is increasingly looking to equip its personnel with smart phones that resemble civilian designs. Although that plan could significantly improve productivity and efficiency, it comes with considerable security problems.
The Army is at the forefront of the march toward wider smart-phone use. With support from its top ranking officers and officials, the Army plans to begin issuing smart phones to personnel early this year, and the service is taking steps to secure those digital tools.
To provide adequate security for the smart phones, the Army is turning to the same methods it uses for protecting computers and other mobile devices, said Army Lt. Col. Keith Newsome, lead for mobile electronic device activity at the Army CIO’s cyber directorate. All smart phones must go through a certification and accreditation process to meet Defense Department and Army security, statutory and regulatory requirements. The devices must also receive a Certificate of Networthiness from the Army Enterprise Designated Approval Authority before they can safely connect to the service’s networks, Newsome said.
A critical communications security requirement for the service's smart phones is the ability to use Common Access Cards via the DOD public key infrastructure so users can digitally sign and encrypt e-mail messages. Newsome said using the CAC PKI provides the nonrepudiation and secure communications that DOD networks require. Handheld device cryptography also must be certified under Federal Information Processing Standards 140-2 and protect data at rest and in transit.
All Army wireless devices must meet the policy guidance in DOD Directive 81000.02 and use CAC PKI capabilities as outlined in DOD Instruction 8520.2, "Public Key Infrastructure and Public Key Enabling." Newsome said Army leaders must ensure that smart phones and their supporting infrastructure are configured in accordance with the appropriate DOD Security Technical Implementation Guide.
The service released the DOD Unified Capabilities Approved Products List Oct. 1, 2010. Newsome said the purpose of the UC APL is to maintain one consolidated list of products for all DOD components that have completed interoperability and information assurance certification. The UC APL helps the Army choose approved smart phones for its networks, he said. The UC certification process will use multiple DOD laboratories to test smart-phone candidates. The testing will also use existing DOD component smart-phone evaluations to get more timely delivery of emerging handheld technologies to warfighters, Newsome said.
Well it damn well better go down before it goes up again because I did sell 25% of my holdings Tuesday.
I'm holding my breath for the big Euro mtg on Friday. It could all go to hell when that whole thing proves to produce no real results.
You talking about Security Strategies for Mixed Use Mobile Computing Devices?
http://www.navysbir.com/n11_2/N112-168.htm
The military is desperately trying to figure out how to secure phones and laptops. Check out this request for bids. Think they found their solution by that date????
Security Strategies for Mixed Use Mobile Computing Devices
Navy SBIR 2011.2 - Topic N112-168
SPAWAR - Ms. Summer Jones - summer.m.jones@navy.mil
Opens: May 26, 2011 - Closes: June 29, 2011
http://www.navysbir.com/n11_2/N112-168.htm
N112-168 TITLE: Security Strategies for Mixed Use Mobile Computing Devices
TECHNOLOGY AREAS: Information Systems, Battlespace
ACQUISITION PROGRAM: JPEO JTRS ACAT 1
RESTRICTION ON PERFORMANCE BY FOREIGN CITIZENS (i.e., those holding non-U.S. Passports): This topic is "ITAR Restricted." The information and materials provided pursuant to or resulting from this topic are restricted under the International Traffic in Arms Regulations (ITAR), 22 CFR Parts 120 - 130, which control the export of defense-related material and services, including the export of sensitive technical data. Foreign Citizens may perform work under an award resulting from this topic only if they hold the "Permanent Resident Card", or are designated as "Protected Individuals" as defined by 8 U.S.C. 1324b(a)(3). If a proposal for this topic contains participation by a foreign citizen who is not in one of the above two categories, the proposal will be rejected.
OBJECTIVE: Investigate the use of sandboxing techniques to speed certification and accreditation of COTS smartphones for SBU military mission usage. Develop a software-only solution that may be fielded on COTS smartphones without specialized hardware to host SBU military-only apps capable of communicating with tethered military radios for the purpose of sharing/collecting/transmitting/storing sensitive military information, even when the COTS phone is compromised by malware and/or rootkits.
DESCRIPTION: Military personnel are increasingly using their personal smartphones in their daily duties. Sometimes these devices are used as part of mission operations. Smartphones can contain data that may be mission sensitive, including photos, geolocation information, contact information such as names, phone numbers, and so on. In some cases, these devices may have applications that are military-only purposed apps. This data, while unclassified, may be sensitive and can result in OPSEC breaches [HIG10]. Both the sensitive data at rest, as well as the military-purpose apps, may be subject to compromise from malware that could reside on these devices, or may be inadvertently shared across an untrusted domain.
There is currently much research ongoing in the area of virtualization and hardware assisted partitioning to separate trusted and untrusted applications [BAR10]. However, none of these features are available in current smartphones, and may not appear as a standard option in COTS smartphones in the near future. Furthermore, commercial sector solutions will not address the stringent requirements of the DoD. All Army wireless devices must meet the policy guidance in DOD Directive 81000.02 and use CAC PKI capabilities as outlined in DOD Instruction 8520.2, "Public Key Infrastructure and Public Key Enabling." DARPA and the NSA have started looking at software solutions addressing the issues related to integrating smartphones with DoD networks but viable, cost effiective, elegant solutions have yet to emerge. In order to address OPSEC needs for immediate fielding of smartphone apps, a software-only solution to protect SBU data and military-use-only apps is needed for current COTS smartphones.
Under this topic, a framework of applications and services for commercial smartphones must be presented that protects data-at-rest and sandboxes military-use applications from untrusted applications[LG10], providing separation between trusted and untrusted applications, and simplifying the OPSEC concerns raised by dual use of the smartphone in an operational setting. This framework must support open source development of apps and operate on current COTS smartphone platforms in common use today. This framework should be designed to support extensions to the supported apps and services in a convenient and secure manner.
PHASE I: Design a concept that can be readily deployed on smartphones that would provide separation between trusted and untrusted applications and services, and protect sensitive data-at-rest in trusted applications. The submission must address techniques to prevent inadvertent sharing of information between trusted and untrusted applications, leakage of data to untrusted applications, and strong protections for data-at-rest on the smartphone platform. The large scope of the problem dictates that solutions identified in Phase I will be carefully defined and the scope sufficiently limited to identify achievable tasks for Phase II.
The outcome of Phase I will be architecture descriptions and a preliminary prototype description demonstrating the feasibility of the design on a single smartphone development platform.
PHASE II: Demonstrate application and data protection capabilities on two or more commercial smartphone platforms, showing resilience against malware and protections of data-at-rest using the proposed framework. The framework will be capable of identifying attempts by malware to access protected data and applications and notifying the user. The software framework will create virtual partitions and be capable of purging data of OPSEC sensitive information before releasing it outside the sandbox. The outcome of Phase II will be a full implementation of the design and prototype delivered in Phase I, providing technology that can be tested in a real-life environment.
PHASE III: The integration of COTS equipment with military communications systems will require new security policies that meet stringent DoD standards. Security will be of paramount importance in order to successfully integrate commercial handsets into military networks and communication systems. Transition opportunities will be focused on tactical wireless communications system such as JTRS.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Commercial smartphones and social networks are becoming part of our daily culture. New security risks and vulnerabilities are revealed almost daily. The proposed technology will enable communities of interest to develop dual-use handsets for handling sensitive business information along with personal-use applications. A robust security system for personal movile devices would be of value to corporate, government and military customers.
REFERENCES:
(1) [OCP10] "Social Media Roundoup: Geotags and Location-Based Social Networking", US Army Office of the Chief of Public Affairs, Pentagon, ocpa.osmd@us.army.mil, 2010
(2) [MUL06] "Using Labeling to Prevent Cross-Service Attacks Against Smartphones", Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), pp. 91-108, Springer, Berlin, Germany, July 2006
(3) [HIG10] Kelly Jackson Higgins, "Google Issuing Fix for Latest Android Vulnerability Disclosure", Dark Reading, Nov. 16, 2010. Referencing work by Jon Oberheide and Zach Lanier of Scio Security and Intrepidus respectively.
(4) [BAR10] Ken Barr, Prashanth Bungale, Stephen Deasy, Viktor Gyuris, Perry Hung, Craig Newell, Harvey Tuch, and Bruno Zoppis. 2010. The VMware mobile virtualization platform: is that a hypervisor in your pocket?. SIGOPS Oper. Syst. Rev. 44, 4 (December 2010), 124-135.
(5) [LG10] http://www.androidcentral.com/lg-vmware-bringing-corporate-sandbox-android
(6) Want, Roy; Pering, Trevor, System Challenges for Ubiquitous & Pervasive Computing, ICSE 05, May 15-21 2005
(7) Want, Roy, You are Your Cell Phone, IEEE Pervasive Computing, April – June 2008
KEYWORDS: Smartphone; security; mobile ad-hoc networks; dual use; JTRS, Information Security
I found ECRY a year ago and when I read who was on the BOD I bought a few shares. Then about 8 weeks ago I read an article in a magazine about the fact that the NSA, Pentagon and all the armed services were hot and heavy to get the use cell phones and laptops for sensitive data and that there were now encyption programs that had been approved by the NSA I ran out and loaded up because I knew who they were talking about.
If people could just read between the lines here and know why Curt Weldon, former US Congressman and retired Vice Chairman of the Armed Services Committee and Vice Chairman of the Homeland Security Committee who is ONLY on the BOD is going to every continent HIMSELF to introduce this encryption technology...... well they'd be buying this thing up into the dollars because these contracts are going to be worth hundreds of millions of dollars in business. Think about it.
Don't think he's going in blind to all these stops. They want this tech and it shouldn't take that long to get results from this. Could be a matter of weeks. It's apparent the buying for this little marketing foray began a month ago and hasn't abated yet. Knowing that this stuff is military grade and approved by the NSA how much you figure a program that can secure military and intelligence is worth to a government? Remember, no one's ever been able to secure cell phones and wireless data transfer this way before. The planet's entire military and intelligence community is still TIED TO THE LAND LINE because to date they've never been able to secure wireless transmission. NEVER.
Fiat Money Explained in 4 minutes or less (this one is quite good)
Egypt’s Revolution: Creative Destruction for a ‘Greater Middle East’?
December 2nd, 2011GREANVILLEPOST
http://www.greanvillepost.com/2011/12/02/egypts-revolution-creative-destruction-for-a-greater-middle-east/
Editor’s Note: American foreign policy has many layers of duplicity, all designed to hide its true motives, and now that American power is aggressively on the move in many areas simultaneously, from the Middle East to Burma, Eastern Europe, and the larger Pacific, it’s critical for Americans to understand what is really going on. This piece goes a long way to explaining the actual situation. As usual no such analysis will ever be found in the mainstream media.
By F. William Engdahl
Left: The April 6 Youth Movement emblem. The April 6 movement is using the same raised fist symbol as the Otpor! movement from Serbia, that helped bring down the regime of Slobodan Miloševic and whose nonviolent tactics were later used in Ukraine and Georgia.
Originally posted on February, 5, 2011
http://www.engdahl.oilgeopolitics.net/
Fast on the heels of the regime change in Tunisia came a popular-based protest movement launched on January 25 against the entrenched order of Egypt’s Hosni Mubarak.
Contrary to the carefully-cultivated impression that the Obama Administration is trying to retain the present regime of Mubarak, Washington in fact is orchestrating the Egyptian as well as other regional regime changes from Syria to Yemen to Jordan and well beyond in a process some refer to as “creative destruction.”
The template for such covert regime change has been developed by the Pentagon, US intelligence agencies and various think-tanks such as RAND Corporation over decades, beginning with the May 1968 destabilization of the de Gaulle presidency in France. This is the first time since the US-backed regime changes in Eastern Europe some two decades back that Washington has initiated simultaneous operations in many countries in a region. It is a strategy born of a certain desperation and one not without significant risk for the Pentagon and for the long-term Wall Street agenda. What the outcome will be for the peoples of the region and for the world is as yet unclear.
Yet while the ultimate outcome of defiant street protests in Cairo and across Egypt and the Islamic world remains unclear, the broad outlines of a US covert strategy are already clear.
No one can dispute the genuine grievances motivating millions to take to the streets at risk of life. No one can defend atrocities of the Mubarak regime and its torture and repression of dissent. No one can dispute the explosive rise in food prices as Chicago and Wall Street commodity speculators, and the conversion of American farmland to the insane cultivation of corn for ethanol fuel drive grain prices through the roof. Egypt is the world’s largest wheat importer, much of it from the USA. Chicago wheat futures rose by a staggering 74% between June and November 2010 leading to an Egyptian food price inflation of some 30% despite government subsidies.
What is widely ignored in the CNN and BBC and other Western media coverage of the Egypt events is the fact that whatever his excesses at home, Egypt’s Mubarak represented a major obstacle within the region to the larger US agenda.
To say relations between Obama and Mubarak were ice cold from the outset would be no exaggeration. Mubarak was staunchly opposed to Obama policies on Iran and how to deal with its nuclear program, on Obama policies towards the Persian Gulf states, to Syria and to Lebanon as well as to the Palestinians. He was a formidable thorn in the larger Washington agenda for the entire region, Washington’s Greater Middle East Project, more recently redubbed the milder-sounding “New Middle East.”
The strategy had been in various State Department and Pentagon files since at least a decade or longer. After George W. Bush declared a War on Terror in 2001 it was called the Greater Middle East Project. Today it is known as the less threatening-sounding “New Middle East” project. It is a strategy to break open the states of the region from Morocco to Afghanistan, the region defined by David Rockefeller’s friend Samuel Huntington in his infamous Clash of Civilizations essay in Foreign Affairs. As real as the factors are that are driving millions into the streets across North Africa and the Middle East, what cannot be ignored is the fact that Washington is deciding the timing and as they see it, trying to shape the ultimate outcome of comprehensive regime change destabilizations across the Islamic world. The day of the remarkably well-coordinated popular demonstrations demanding Mubarak step down, key members of the Egyptian military command including Chief of General Staff Lt. Gen. Sami Hafez Enan were all in Washington as guests of the Pentagon. That conveniently neutralized the decisive force of the Army to stop the anti-Mubarak protests from growing in the critical early days.
Egypt rising?
The current Pentagon scenario for Egypt reads like a Cecil B. DeMille Hollywood spectacular, only this one with a cast of millions of Twitter-savvy well-trained youth, networks of Muslim Brotherhood operatives, working with a US-trained military. In the starring role of the new production at the moment is none other than a Nobel Peace Prize winner who conveniently appears to pull all the threads of opposition to the ancien regime into what appears as a seamless transition into a New Egypt under a self-proclaimed liberal democratic revolution.
Some background on the actors on the ground is useful before looking at what Washington’s long-term strategic plan might be for the Islamic world from North Africa to the Persian Gulf and ultimately into the Islamic populations of Central Asia, to the borders of China and Russia.
Washington ‘soft’ revolutions
The protests that led to the abrupt firing of the entire Egyptian government by President Mubarak on the heels of the panicked flight of Tunisia’s Ben Ali into a Saudi exile are not at all as “spontaneous” as the Obama White House, Clinton State Department or CNN, BBC and other major media in the West make them to be.
They are being organized in a Ukrainian-style high-tech electronic fashion with large internet-linked networks of youth tied to Mohammed ElBaradei and the banned and murky secret Muslim Brotherhood, whose links to British and American intelligence and freemasonry are widely reported.
At this point the anti-Mubarak movement looks like anything but a threat to US influence in the region, quite the opposite. It has all the footprints of another US-backed regime change along the model of the 2003-2004 Color Revolutions in Georgia and Ukraine and the failed Green Revolution against Iran’s Ahmedinejad in 2009.
The call for an Egyptian general strike and a January 25 Day of Anger that sparked the mass protests demanding Mubarak resign was issued by a Facebook-based organization calling itself the April 6 Movement. The protests were so substantial and well-organized that it forced Mubarak to ask his cabinet to resign and appoint a new vice president, Gen. Omar Suleiman, former Minister of Intelligence.
April 6 is headed by one Ahmed Maher Ibrahim, a 29-year-old civil engineer, who set up the Facebook site to support a workers’ call for a strike on April 6, 2008.
According to a New York Times account from 2009, some 800,000 Egyptians, most youth, were already then Facebook or Twitter members. In an interview with the Washington-based Carnegie Endowment, April 6 Movement head Maher stated, “Being the first youth movement in Egypt to use internet-based modes of communication like Facebook and Twitter, we aim to promote democracy by encouraging public involvement in the political process.”
Maher also announced that his April 6 Movement backs former UN International Atomic Energy Aagency (IAEA) head and declared Egyptian Presidential candidate, ElBaradei along with ElBaradei’s National Association for Change (NAC) coalition. The NAC includes among others George Ishak, a leader in Kefaya Movement, and Mohamed Saad El-Katatni, president of the parliamentary bloc of the controversial Ikhwan or Muslim Brotherhood.
Today Kefaya is at the center of the unfolding Egyptian events. Not far in the background is the more discreet Muslim Brotherhood.
ElBaradei: political face of Egypt “revolution”?
ElBaradei at this point is being projected as the central figure in a future Egyptian parliamentary democratic change. Curiously, though he has not lived in Egypt for the past thirty years, he has won the backing of every imaginable part of the Egyptian political spectrum from communists to Muslim Brotherhood to Kefaya and April 6 young activists. Judging from the calm demeanour ElBaradei presents these days to CNN interviewers, he also likely has the backing of leading Egyptian generals opposed to the Mubarak rule for whatever reasons as well as some very influential persons in Washington.
Kefaya-Pentagon ‘non-violent warfare’
Kefaya is at the heart of mobilizing the Egyptian protest demonstrations that back ElBaradei’s candidacy. The word Kefaya translates to “enough!”
Curiously, the planners at the Washington National Endowment for Democracy (NED) and related color revolution NGOs apparently were bereft of creative new catchy names for their Egyptian Color Revolution. In their November 2003 Rose Revolution in Georgia, the US-financed NGOs chose the catch word, Kmara! In order to identify the youth-based regime change movement. Kmara in Georgian also means “enough!”
Like Kefaya, Kmara in Georgia was also built by the Washington-financed trainers from the NED and other groups such as Gene Sharp’s misleadingly-named Albert Einstein Institution which uses what Sharp once identified as “non-violence as a method of warfare.”
The various youth networks in Georgia as in Kefaya were carefully trained as a loose, decentralized network of cells, deliberately avoiding a central organization that could be broken and could have brought the movement to a halt. Training of activists in techniques of non-violent resistance was done at sports facilities, making it appear innocuous. Activists were also given training in political marketing, media relations, mobilization and recruiting skills.
The formal name of Kefaya is Egyptian Movement for Change. It was founded in 2004 by select Egyptian intellectuals at the home of Abu ‘l-Ala Madi, leader of the al-Wasat party, a party reportedly created by the Muslim Brotherhood. Kefaya was created as a coalition movement united only by the call for an end Mubarak’s rule.
RAND and KefayaKefaya as part of the amorphous April 6 Movement capitalized early on new social media and digital technology as its main means of mobilization. In particular, political blogging, posting uncensored youtube shorts and photographic images were skillfully and extremely professionally used. At a rally already back in December 2009 Kefaya had announced support for the candidacy of Mohammed ElBaradei for the 2011 Egyptian elections.
No less a US defense establishment think-tank than the RAND Corporation has conducted a detailed study of Kefaya. The Kefaya study as RAND themselves note, was “sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Department of the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.”
A nicer bunch of democratically-oriented gentlemen and women could hardly be found.
In their 2008 report to the Pentagon, the RAND researchers noted the following in relation to Egypt’s Kefaya:
“The United States has professed an interest in greater democratization in the Arab world, particularly since the September 2001 attacks by terrorists from Saudi Arabia, the United Arab Emirates, Egypt, and Lebanon. This interest has been part of an effort to reduce destabilizing political violence and terrorism. As President George W. Bush noted in a 2003 address to the National Endowment for Democracy, “As long as the Middle East remains a place where freedom does not flourish, it will remain a place of stagnation, resentment, and violence ready for export” (The White House, 2003). The United States has used varying means to pursue democratization, including a military intervention that, though launched for other reasons, had the installation of a democratic government as one of its end goals.
However, indigenous reform movements are best positioned to advance democratization in their own country.”
RAND researchers have spent years perfecting techniques of unconventional regime change under the name “swarming,” the method of deploying mass mobs of digitally-linked youth in hit-and-run protest formations moving like swarms of bees.
Washington and the stable of “human rights” and “democracy” and “non-violence” NGOs it oversees, over the past decade or more has increasingly relied on sophisticated “spontaneous” nurturing of local indigenous protest movements to create pro-Washington regime change and to advance the Pentagon agenda of global Full Spectrum Dominance. As the RAND study of Kefaya states in its concluding recommendations to the Pentagon:
“The US government already supports reform efforts through organizations such as the US Agency for International Development and the United Nations Development Programme. Given the current negative popular standing of the United States in the region, US support for reform initiatives is best carried out through nongovernmental and nonprofit institutions.”
The RAND 2008 study was even more concrete about future US Government support for Egyptian and other “reform” movements:
“The US government should encourage nongovernmental organizations to offer training to reformers, including guidance on coalition building and how to deal with internal differences in pursuit of democratic reform. Academic institutions (or even nongovernmental organizations associated with US political parties, such as the International Republican Institute or the National Democratic Institute for International Affairs) could carry out such training, which would equip reform leaders to reconcile their differences peacefully and democratically.
“Fourth, the United States should help reformers obtain and use information technology, perhaps by offering incentives for US companies to invest in the region’s communications infrastructure and information technology. US information technology companies could also help ensure that the Web sites of reformers can remain in operation and could invest in technologies such as anonymizers that could offer some shelter from government scrutiny. This could also be accomplished by employing technological safegaurds to prevent regimes from sabotaging the Web sites of reformers. ”
As their Kefaya monograph states, it was prepared in 2008 by the “RAND National Security Research Division’s Alternative Strategy Initiative, sponsored by the Rapid Reaction Technology Office in the Office of the Undersecretary of Defense for Acquisition, Technology, and Logistics.
The Alternative Strategy Initiative, just to underscore the point, includes “research on creative use of the media, radicalization of youth, civic involvement to stem sectarian violence, the provision of social services to mobilize aggrieved sectors of indigenous populations, and the topic of this volume, alternative movements.”
In May 2009 just before Obama’s Cairo trip to meet Mubarak, US Secretary of State Hillary Clinton hosted a number of the young Egyptian activists in Washington under the auspices of Freedom House, another “human rights” Washington-based NGO with a long history of involvement in US-sponsored regime change from Serbia to Georgia to Ukraine and other Color Revolutions. Clinton and Acting Assistant Secretary of State for Near Eastern Affairs Jeffrey Feltman met the sixteen activists at the end of a two-month “fellowship” organized by Freedom House’s New Generation program.
Freedom House and Washington’s government-funded regime change NGO, National Endowment for Democracy (NED) are at the heart of the uprisings now sweeping across the Islamic world. They fit the geographic context of what George W. Bush proclaimed after 2001 as his Greater Middle East Project to bring “democracy” and “liberal free market” economic reform to the Islamic countries from Afghanistan to Morocco. When Washington talks about introducing “liberal free market reform” people should watch out. It is little more than code for bringing those economies under the yoke of the dollar system and all that implies.
Washington’s NED in a larger agenda
If we make a list of the countries in the region which are undergoing mass-based protest movements since the Tunisian and Egyptian events and overlay them onto a map, we find an almost perfect convergence between the protest countries today and the original map of the Washington Greater Middle East Project that was first unveiled during the George W. Bush Presidency after 2001.
Washington’s NED has been quietly engaged in preparing a wave of regime destabilizations across North Africa and the Middle East since the 2001-2003 US military invasions of Afghanistan and Iraq. The list of where the NED is active is revealing. Its website lists Tunisia, Egypt, Jordan, Kuwait, Libya, Syria, Yemen and Sudan as well, interestingly, as Israel. Coincidentally these countries are almost all today subject to “spontaneous” popular regime-change uprisings.
The International Republican Institute and the National Democratic Institute for International Affairs mentioned by the RAND document study of Kefaya are subsidiary organizations of the Washington-based and US Congress-financed National Endowment for Democracy.
The NED is the coordinating Washington agency for regime destabilization and change. It is active from Tibet to Ukraine, from Venezuela to Tunisia, from Kuwait to Morocco in reshaping the world after the collapse of the Soviet Union into what George H.W. Bush in a 1991 speech to Congress proclaimed triumphantly as the dawn of a New World Order.
As the architect and first head of the NED, Allen Weinstein told the Washington Post in 1991 that, “a lot of what we do today was done covertly 25 years ago by the CIA”
The NED Board of Directors includes or has included former Defense Secretary and CIA Deputy head, Frank Carlucci of the Carlyle Group; retired General Wesley Clark of NATO; neo-conservative warhawk Zalmay Khalilzad who was architect of George W. Bush’s Afghan invasion and later ambassador to Afghanistan as well as to occupied Iraq. Another NED board member, Vin Weber, co-chaired a major independent task force on US Policy toward Reform in the Arab World with former US Secretary of State Madeleine Albright, and was a founding member of the ultra-hawkish Project for a New American Century think-tank with Dick Cheney and Don Rumsfeld, which advocated forced regime change in Iraq as early as 1998.
The NED is supposedly a private, non-government, non-profit foundation, but it receives a yearly appropriation for its international work from the US Congress. The National Endowment for Democracy is dependent on the US taxpayer for funding, but because NED is not a government agency, it is not subject to normal Congressional oversight.
NED money is channelled into target countries through four “core foundations”-the National Democratic Institute for International Affairs, linked to the Democratic Party; the International Republican Institute tied to the Republican Party; the American Center for International Labor Solidarity linked to the AFL-CIO US labor federation as well as the US State Department; and the Center for International Private Enterprise linked to the free-market US Chamber of Commerce.
The late political analyst Barbara Conry noted that, “NED has taken advantage of its alleged private status to influence foreign elections, an activity that is beyond the scope of AID or USIA and would otherwise be possible only through a CIA covert operation. Such activities, it may also be worth noting, would be illegal for foreign groups operating in the United States.”
Significantly the NED details its various projects today in Islamic countries, including in addition to Egypt, in Tunisia, Yemen, Jordan, Algeria, Morocco, Kuwait, Lebanon, Libya, Syria, Iran and Afghanistan. In short, most every country which is presently feeling the earthquake effects of the reform protests sweeping across the Middle East and North Africa is a target of NED.
In 2005 US President George W. Bush made a speech to the NED. In a long, rambling discourse which equated “Islamic radicalism” with the evils of communism as the new enemy, and using a deliberately softer term “broader Middle East” for the term Greater Middle East that had aroused much distrust in the Islamic world, Bush stated,
“The fifth element of our strategy in the war on terror is to deny the militants future recruits by replacing hatred and resentment with democracy and hope across the broader Middle East. This is a difficult and long-term project, yet there’s no alternative to it. Our future and the future of that region are linked. If the broader Middle East is left to grow in bitterness, if countries remain in misery, while radicals stir the resentments of millions, then that part of the world will be a source of endless conflict and mounting danger, and for our generation and the next. If the peoples of that region are permitted to choose their own destiny, and advance by their own energy and by their participation as free men and women, then the extremists will be marginalized, and the flow of violent radicalism to the rest of the world will slow, and eventually end…We’re encouraging our friends in the Middle East, including Egypt and Saudi Arabia, to take the path of reform, to strengthen their own societies in the fight against terror by respecting the rights and choices of their own people. We’re standing with dissidents and exiles against oppressive regimes, because we know that the dissidents of today will be the democratic leaders of tomorrow…”
The US Project for a ‘Greater Middle East’
The spreading regime change operations Washington from Tunisia to Sudan, from Yemen to Egypt to Syria are best viewed in the context of a long-standing Pentagon and State Department strategy for the entire Islamic world from Kabul in Afghanistan to Rabat in Morocco.
The rough outlines of the Washington strategy, based in part on their successful regime change operations in the former Warsaw Pact communist bloc of Eastern Europe, were drawn up by former Pentagon consultant and neo-conservative, Richard Perle and later Bush official Douglas Feith in a white paper they drew up for the then-new Israeli Likud regime of Benjamin Netanyahu in 1996.
That policy recommendation was titled A Clean Break: A New Strategy for Securing the Realm. It was the first Washington think-tank paper to openly call for removing Saddam Hussein in Iraq, for an aggressive military stance toward the Palestinians, striking Syria and Syrian targets in Lebanon. Reportedly, the Netanyahu government at that time buried the Perle-Feith report, as being far too risky.
By the time of the events of September 11, 2001 and the return to Washington of the arch-warhawk neoconservatives around Perle and others, the Bush Administration put highest priority on an expanded version of the Perle-Feith paper, calling it their Greater Middle East Project. Feith was named Bush’s Under Secretary of Defense.
Behind the facade of proclaiming democratic reforms of autocratic regimes in the entire region, the Greater Middle East was and is a blueprint to extend US military control and to break open the statist economies in the entire span of states from Morocco to the borders of China and Russia.
In May 2009, before the rubble from the US bombing of Baghdad had cleared, George W. Bush, a President not remembered as a great friend of democracy, proclaimed a policy of “spreading democracy” to the entire region and explicitly noted that that meant “the establishment of a US-Middle East free trade area within a decade.”
Prior to the June 2004 G8 Summit on Sea Island, Georgia, Washington issued a working paper, “G8-Greater Middle East Partnership.” Under the section titled Economic Opportunities was Washington’s dramatic call for “an economic transformation similar in magnitude to that undertaken by the formerly communist countries of Central and Eastern Europe.”
The US paper said that the key to this would be the strengthening of the private sector as the way to prosperity and democracy. It misleadingly claimed it would be done via the miracle of microfinance where as the paper put it, “a mere $100 million a year for five years will lift 1.2 million entrepreneurs (750,000 of them women) out of poverty, through $400 loans to each.”
The US plan envisioned takeover of regional banking and financial afairs by new institutions ostensibly international but, like World Bank and IMF, de facto controlled by Washington, including WTO. The goal of Washington’s long-term project is to completely control the oil, to completely control the oil revenue flows, to completely control the entire economies of the region, from Morocco to the borders of China and all in between. It is a project as bold as it is desperate.
Once the G8 US paper was leaked in 2004 in the Arabic Al-Hayat, opposition to it spread widely across the region, with a major protest to the US definition of the Greater Middle East. As an article in the French Le Monde Diplomatique in April 2004 noted, “besides the Arab countries, it covers Afghanistan, Iran, Pakistan, Turkey and Israel, whose only common denominator is that they lie in the zone where hostility to the US is strongest, in which Islamic fundamentalism in its anti-Western form is most rife.” It should be noted that the NED is also active inside Israel with a number of programs.
Notably, in 2004 it was vehement opposition from two Middle East leaders-Hosni Mubarak of Egypt and the King of Saudi Arabia-that forced the ideological zealots of the Bush Administration to temporarily put the Project for the Greater Middle East on a back burner.
Will it work?
At this writing it is unclear what the ultimate upshot of the latest US-led destabilizations across the Islamic world will bring. It is not clear what will result for Washington and the advocates of a US-dominated New World Order. Their agenda is clearly one of creating a Greater Middle East under firm US grip as a major control of the capital flows and energy flows of a future China, Russia and a European Union that might one day entertain thoughts of drifting away from that American order.
It has huge potential implications for the future of Israel as well. As one US commentator put it, “The Israeli calculation today is that if ‘Mubarak goes’ (which is usually stated as ‘If America lets Mubarak go’), Egypt goes. If Tunisia goes (same elaboration), Morocco and Algeria go. Turkey has already gone (for which the Israelis have only themselves to blame). Syria is gone (in part because Israel wanted to cut it off from Sea of Galilee water access). Gaza has gone to Hamas, and the Palestine Authority might soon be gone too (to Hamas?). That leaves Israel amid the ruins of a policy of military domination of the region.”
The Washington strategy of “creative destruction” is clearly causing sleepless nights not only in the Islamic world but also reportedly in Tel Aviv, and ultimately by now also in Beijing and Moscow and across Central Asia.
ABOUT THE AUTHOR: F. William Engdahl is author of Full Spectrum Dominance: Totalitarian Democracy in the New World Order. His book, A Century of War: Anglo-American Oil Politics and the New World Order has just been reissued in a new edition. He may be contacted via his website, OilGeoPolitics.net.
I'd say they're definitely filthy and most likely already quite rich but those are the kind of people that money just seems to keep coming to isn't it?
I was wondering what was wrong with you there for a little bit.
Looks like they're going to count it as up 4.44% at $0.94 for the day. Nice recovery from only 2 days of consolidation. That's pretty encouraging. Held up well under all that volume. Hammer time on the chart.
And there you have it, ECRY closes up green for the day, 3.3% at $0.93 although I did see some trades post at $0.94 after the buzzer on the streamer.
As far up as this thing had flown on zero news (insider buying) it was due for consolidation. Nothing goes straight up. With the amount of churn that's happened over the last three trading sessions it should be poised to continue going up. Charts really don't mean a whole lot in a situation like this and I expect it's gonna go on up. Seems to have hit a wall today. No more downside?
Why do you think people like Curt Weldon and Hon Jay M. Cohen who holds a join Ocean Engineering degree from Massachusetts Institute of Technology and Woods Hole Oceanographic Institution and Master of Science in Marine Engineering and Naval Architecture from MIT and graduated from the United States Naval Academy are on board with this?
If people could just read between the lines here and know why Curt Weldon, former US Congressman and retired Vice Chairman of the Armed Services Committee and Vice Chairman of the Homeland Security Committee who is ONLY on the BOD is going to every continent HIMSELF to introduce this encryption technology...... well they'd be buying this thing up into the dollars because these contracts are going to be worth hundreds of millions of dollars in business. Think about it.
"One On One are being used by businesses and professionals including lawyers, accountants, financial advisers and medical practitioners. ", and since ECRY's encryption is approved by the NSA expect contracts with every security agency in the U.S., the military and probably every government in the world because until now no one has been able to secure wireless transmission to the level necessary for intellegence purposes. Yes folks, it's 2011 and they're still using land lines for sensitive date.
Helloooooooo.
Foreclosure fraud whistleblower found dead
By msnbc.com staff
http://usnews.msnbc.msn.com/_news/2011/11/29/9099162-foreclosure-fraud-whistleblower-found-dead
A notary public who signed tens of thousands of false documents in a massive foreclosure scam before blowing the whistle on the scandal has been found dead in her Las Vegas home.
NBC station KSNV of Las Vegas reported that the woman, Tracy Lawrence, 43, was scheduled to be sentenced Monday morning after she pleaded guilty this month to notarizing the signature of an individual not in her presence. She failed to show up for her hearing, and police found her body at her home later in the day.
It could not immediately be determined whether Lawrence, who faced up to one year in jail and a fine of up to $2,000, died of suicide or of natural causes, KSNV reported. ?Detectives said they had ruled out homicide.
Lawrence came forward earlier this month and blew the whistle on the operation, in which title officers Gary Trafford, 49, of Irvine, Calif., and Geraldine Sheppard, 62, of Santa Ana, Calif. — who worked for a Florida processing company used by most major banks to process repossessions — allegedly forged signatures on tens of thousands of default notices from 2005 to 2008.
Trafford and Sheppard were charged two weeks ago with 606 counts of offering false instruments for recording, false certification on certain instruments and notarization of the signature of a person not in the presence of a notary public. You can read a .pdf version of their indictment here.
Police said at the time that the alleged scam had thrown into question the legality of most Las Vegas home foreclosures in the past few years, leaving many people living in foreclosed-upon homes that they unknowingly don't actually own.
"I would suggest you review your documents and bring them to an expert and an attorney," said John Kelleher, chief deputy attorney general for Nevada's fraud unit.
About 5 years ago or so I really gave stevia a shot but to me it tasted like that liquid sweetener they sold in the glass bottles back in the late 60's maybe early 70's. I didn't like it.