Conspiracy Theory Unofficial Narrative Fake Manufactured Terrorism The story of the London Bombings 7 July 2005 7/7 Jean Charles de Menezes Ian Blair Tony Blair

Spread the love

I’m not sure about this and I’d like some feedback.

THIS ARTICLE IS TO BE REPEATEDLY UPDATED AND AMENDED. While I have a lot, I don’t have the whole story so I would appreciate help with the uncertain parts. Thanks.

[23/11/13 One of the problems I encounter is that people helping don’t realise what I’ve already got. For example, I got the ’empty’ lead years ago when I was ignoring it as it was repeatedly raised.]

It’s a good day (to start).

Context, Terrorism, 2005 election, Inquiries Act, Bristol Indymedia, G8 & Privy Council ruling, Dust explosions, London Bombings, Cobra meeting for G8 not 7/7, Jerusalem Post articles, Ian Blair, murder of Jean Charles de Menezes

START:

Terrorism is a godsend for governments. It provides a wonderful excuse for dodgy newly-developed airplanes falling out of the sky when their doors open at 30 thousand feet and it provides a wonderful excuse for dust explosions on the London Underground. It provides a ready excuse for shitty old Jeeps with documented faults crashing off motorways and bursting into flames. It provides for massive made for television sacrificial rituals to start already planned wars.

7/1/14 The magick is working, I’m making fine progress – it’s almost as if it was hidden in plain sight all along. It was.

Just a tiny piece today. On 7/7/2005 – the day of explosions on the London underground and the strange bombing of a double-decker bus an hour later – the boss of the Metropolitan police Ian Blair said “The most important message though however is just that it, while it is a confused situation it must be a confused situation in multiple sites like this, a co-ordinated effort is slowly bringing order out of the chaos.”

There are two issues about this statement. Firstly try finding it using a search engine. It’s almost as if I made it up. I didn’t of course but the web has been scrubbed. That takes the sort of power that only governments have.

Secondly, what is meant by the phrase ‘order out of (the) chaos’ which is explained very well here

The need to deter democracy by alienating public opinion from public policy, is one that has been long understood. Back in 1921, the highly influential political columnist and media analyst Walter Lippmann, wrote the book “Public Opinion”,where he discussed the need for the “manufacture of consent”; given the inherent pitfalls and barriers to an accurate and effective public opinion (democracy, essentially), it is necessary that this opinion is crafted by a higher sphere of influence. This was understood very well by Edward Bernays, who was the founder of Public Relations (he indeed coined the term), and the formulator of not just corporate, but also political PR. He sketches out his views on this in his 1928 work, “Propaganda where he states that “The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society”, suggesting like Lippmann, that democracy is a “chaos” that needs regulation from above. This “above” is a small section of elites: “We are governed, our minds are molded, our tastes formed, our ideas suggested, largely by men we have never heard of.” These are the people who will ensure that the masses are sedated, and free to run their daily lives, without participating in the broader picture of public policy, given the dangers that this would pose to the influence of said elites, and thus the smooth functioning of society. To paraphrase Bernays, a leader must serve by leading, not lead by serving.   Read more: http://u2r2h.blogspot.co.uk/2007/08/911-and-propaganda-model.html#ixzz2pkrbXafu

As explained in the quoted section above, bringing order out of chaos can be understood to be ‘manufacturing of consent’,  “the conscious and intelligent manipulation of the organized habits and opinions of the masses …”

Well-educated people – better educated than myself – politicians and the like, people who … for whatever reason … have come to realise the meaning of the term would, er … recognise the term and know what it means. That there was a manipulation of events to manufacture consent going on.

8/1/14 Just for fun since we shouldn’t take ourselves too seriously, … he know’s I’m right. I’ve seen the light, it’s been revealed to Me, etc.

Enjoy

 

Continue ReadingConspiracy Theory Unofficial Narrative Fake Manufactured Terrorism The story of the London Bombings 7 July 2005 7/7 Jean Charles de Menezes Ian Blair Tony Blair

An original geeky post for a change (because as well as a political activist I’m also a geek)

Spread the love

OpenBSD is widely regarded as the most secure operating system. Today is the release date of the latest release OpenBSD 5.4. You’ll need to give it a few hours because it’s not yet 1/11 in Canada.

OpenBSD is secure because it is continually security audited. It is absolutely ideal for firewall/routers because of it’s advanced pf packet filter. It’s best suited for servers but also performs well on desktops and multimedia machines.

Other geeky things I’ve been doing lately

Learning C programming properly. C is all about pointers and indirection. It seems to be taught totally the wrong way. Pointers are key and all else follows …

I recapped a motherboard. You don’t need a new machine nowadays and I was pleased to revive a machine for a friend’s parents. It’s good to save a computer from the skip. I solder badly because I don’t do it often enough but I obviously solder well enough.

I replaced a Sempron LE-1150 with a really fast Athlon X2. Now it rocks.

[Cartoon of CMS learning curve implying that Drupal is very difficult to learn11/11/13  I’ve been trying to learn Drupal 7. Drupal is a Content Managment System (CMS) which also claims to be a CMS framework. A CMS is used to build websites and Drupal is used to build many of the most complex and advanced websites. As the diagram shows, Drupal is difficult to grok. My experience is that it’s counterintuitive and opposed to many of the principles of programming e.g. the use of global variables. But then it’s not programming of course – it’s an application for developing websites.

I did try Joomla and WordPress but it looks like Drupal is what I need to build the websites I want. I think it may be that you just have to learn the Drupal way. Just lately I’ve been doing some maintenance to this blog and realised that WordPress produces an awful lot of dead links which are no good to anyone. I’m thinking of converting this blog to Drupal soon and get some practice in.

There’s some weirdness about this post – not allowing me to edit it as I normally would. I’ve had to use a different browser because it simply appeared totally blank in the browser I normally use but yet it appears published fine. Weird.]

[9/12/13 I’ve been repairing analogue radios just recently. It’s surprising what some contact cleaner, compressed air and a vacuum cleaner can achieve. I still need to repair my favourite radio which was second-hand and well used when I got it about 1999. It will need some soldering but some radios are special.]

Some geeky tips

Use strong passwords. I particularly like long passwords because I know about brute-forcing.

Backup.

Get a real operating system. Linux livecds can help.

[More geeky tips. This could go on and on.

Firewall. Firewall on all interfaces especially on laptops and mobile devices. Lock it down.

Wireless should be considered insecure.

[6/11/13 The Guardian has published a Guide to Tor. The latest Tor browser bundle should be used and care should be taken. People have been caught-out accessing web-based email by not appreciating how it works. It should not be used for anything that divulges personal info and there’s not really much point in watching Youtube through Tor. If you’re in a repressive country it’s worth using. Basically, it hides what you’re looking at. [edit: It’s likely to get past broad political internet censorship. ]

If you have geek competence and spare resources please consider running a Tor relay as I do. There are certain dangers involved in running an exit node (relay) which do not apply to intermediate nodes.]

 

[4/11 What was I not thinking about? Mobile phones are designed to be mobile bugs.

… and here are the regulations from the ILETS / ENFOPOL affair of the 90s. These regulations are demands made by law enforcement authorities of the capabilities needed to infiltrate communications. Essentially, these law enforcement demands are design requirements for communication systems. You will notice that these requirements date from the mid 1990s. It’s probably safe to assume that they have been implemented by now. [Later edit: These regulations were intended particularly at mobile devices: phones at that time e.g. the reference to location. These regulations are bound to have been updated in the same culture of secrecy for technological developments since.]

COUNCIL RESOLUTION of 17 January 1995 on the lawful interception of telecommunications
(96/C 329/01)
Official Journal C 329 , 04/11/1996 p. 0001 – 0006

Annex: Requirements

This section presents the Requirements of law enforcement agencies relating to the lawful interception of telecommunications. These requirements are subject to national law and should be interpreted in accordance with applicable national policies. Terms are defined in the attached glossary.

1.Law enforcement agencies require access to the entire telecommunications transmitted, or caused to be transmitted, to and from the number or other identifier of the target service used by the interception subject. Law enforcement agencies also require access to the call-associated data that are generated to process the call.

1.1.Law enforcement agencies require access to all interception subjects operating temporarily or permanently within a telecommunications system.

1.2.Law enforcement agencies require access in cases where the interception subject may be using features to divert calls to other telecommunications services or terminal equipment, including calls that traverse more than one network or are processed by more than one network operator/service provider before completing.

1.3.Law enforcement agencies require that the telecommunications to and from a target service be provided to the exclusion of any telecommunications that do not fall within the scope of the interception authorization.

1.4.Law enforcement agencies require access to call associated data such as:

1.4.1.signalling of access ready status;

1.4.2.called party number for outgoing connections even if there is no successful connection established;

1.4.3.calling party number for incoming connections even if there is no successful connection established;

1.4.4.all signals emitted by the target, including post-connection dialled signals emitted to activate features such as conference calling and call transfer;

1.4.5.beginning, end and duration of the connection;

1.4.6.actual destination and intermediate directory numbers if call has been diverted.

1.5.Law enforcement agencies require information on the most accurate geographical location known to the network for mobile subscribers.

1.6.Law enforcement agencies require data on the specific services used by the interception subject and the technical parameters for those types of communication.

2.Law enforcement agencies require a real-time, fulltime monitoring capability for the interception of telecommunications. Call associated data should also be provided in real-time. If call associated data cannot be made available in real time, law enforcement agencies require the data to be available as soon as possible upon call termination.

3.Law enforcement agencies require network operators/service providers to provide one or several interfaces from which the intercepted communications can be transmitted to the law enforcement monitoring facility. These interfaces have to be commonly agreed on by the interception authorities and the network operators/service providers. Other issues associated with these interfaces will be handled according to accepted practices in individual countries.

3.1.Law enforcement agencies require network operators/service providers to provide call associated data and call content from the target service in a way that allows for the accurate correlation of call associated data with call content.

3.2.Law enforcement agencies require that the format for transmitting the intercepted communications to the monitoring facility be a generally available format. This format will be agreed upon on an individual country basis.

3.3.If network operators/service providers initiate encoding, compression or encryption of telecommunications traffic, law enforcement agencies require the network operators/service providers to provide intercepted communications en clair.

3.4.Law enforcement agencies require network operators/service providers to be able to transmit the intercepted communications to the law enforcement monitoring facility via fixed or switched connections.

3.5.Law enforcement agencies require that the transmission of the intercepted communications to the monitoring facility meet applicable security requirements.

4.Law enforcement agencies require interceptions to be implemented so that neither the interception target nor any other unauthorized person is aware of any changes made to fulfil the interception order. In particular, the operation of the target service must appear unchanged to the interception subject.

5.Law enforcement agencies require the interception to be designed and implemented to preclude unauthorized or improper use and to safeguard the information related to the interception.

5.1.Law enforcement agencies require network operators/service providers to protect information on which and how many interceptions are being or have been performed, and not disclose information on how interceptions are carried out.

5.2.Law enforcement agencies require network operators/service providers to ensure that intercepted communications are only transmitted to the monitoring agency specified in the interception authorization.

5.3.According to national regulations, network operators/service providers could be obliged to maintain an adequately protected record of activations of interceptions.

6.Based on a lawful inquiry and before implementation of the interception, law enforcement agencies require: (1) the interception subject’s identity, service number or other distinctive identifier; (2) information on the services and features of the telecommunications system used by the interception subject and delivered by network operators/service providers; and (3) information on the technical parameters of the transmission to the law enforcement monitoring facility.

7.During the interception, law enforcement agencies may require information and/or assistance from the network operators/service providers to ensure that the communications acquired at the interception interface are those communications associated with the target service. The type of information and/or assistance required will vary according to the accepted practices in individual countries.

8.Law enforcement agencies require network operators/service providers to make provisions for implementing a number of simultaneous intercepts. Multiple interceptions may be required for a single target service to allow monitoring by more than one law enforcement agency. In this case, network operators/service providers should take precautions to safeguard the identities of the monitoring agencies and ensure the confidentiality of the investigations. The maximum number of simultaneous interceptions for a given subscriber population will be in accordance with national requirements.

9.Law enforcement agencies require network operators/service providers to implement interceptions as quickly as possible (in urgent cases within a few hours or minutes). The response requirements of law enforcement agencies will vary by country and by the type of target service to be intercepted.

10.For the duration of the interception, law enforcement agencies require that the reliability of the services supporting the interception at least equals the reliability of the target services provided to the interception subject. Law enforcement agencies require the quality of service of the intercepted transmissions forwarded to the monitoring facility to comply with the performance standards of the network operators/service providers.

22/7/14 My stats show that this is the most popular post – probably because of the ILETS / ENFOPOL quote above.

Got a spares or repair box off eBay cheap and swaped the processor. It rocks – quad core, 2T hard drive and I only ever use a small part of the memory.

Learning django at the moment and hoping to build a site using it soon. Python is good.

Everything wireless strikes me as fantastically insecure. Normal computer users are going to be vulnerable to evil twins at public hotspots. What about wireless keyboards? That’s a keyboard transmitting what keys are pressed. I don’t know but would doubt that encryption is used.

Continue ReadingAn original geeky post for a change (because as well as a political activist I’m also a geek)

Russell Brand on Revolution

Spread the love

Well worth reading and I will adopt and adapt some of his suggestions.

http://www.newstatesman.com/politics/2013/10/russell-brand-on-revolution

Cameron, Osborne, Boris, all of them lot, they went to the same schools and the same universities that have the same decor as the old buildings from which they now govern us. It’s not that they’re malevolent; it’s just that they’re irrelevant. Relics of an old notion, like Old Spice: it’s fine that it exists but no one should actually use it.

We are still led by blithering chimps, in razor-sharp suits, with razor-sharp lines, pimped and crimped by spin doctors and speech-writers. Well-groomed ape-men, superficially altered by post-Clintonian trends.

We are mammals on a planet, who now face a struggle for survival if our species is to avoid expiry. We can’t be led by people who have never struggled, who are a dusty oak-brown echo of a system dreamed up by Whigs and old Dutch racists.

We now must live in reality, inner and outer. Consciousness itself must change. My optimism comes entirely from the knowledge that this total social shift is actually the shared responsibility of six billion individuals who ultimately have the same interests. Self-preservation and the survival of the planet. This is a better idea than the sustenance of an elite. The Indian teacher Yogananda said: “It doesn’t matter if a cave has been in darkness for 10,000 years or half an hour, once you light a match it is illuminated.” Like a tanker way off course due to an imperceptible navigational error at the offset we need only alter our inner longitude.

Capitalism is not real; it is an idea. America is not real; it is an idea that someone had ages ago. Britain, Christianity, Islam, karate, Wednesdays are all just ideas that we choose to believe in and very nice ideas they are, too, when they serve a purpose. These concepts, though, cannot be served to the detriment of actual reality.

The reality is we have a spherical ecosystem, suspended in, as far as we know, infinite space upon which there are billions of carbon-based life forms, of which we presume ourselves to be the most important, and a limited amount of resources.

The only systems we can afford to employ are those that rationally serve the planet first, then all humanity. Not out of some woolly, bullshit tree-hugging piffle but because we live on it, currently without alternatives. This is why I believe we need a unifying and in – clusive spiritual ideology: atheism and materialism atomise us and anchor us to one frequency of consciousness and inhibit necessary co-operation.

[7.30pm edit: I don’t want anyone thinking that I intend to be some political or spiritual leader. There were suggestions of this in the Jerusalem Post articles of 7 & 8th July 2005 which were the script to be followed in the July 7 bombings and investigation.

Brand acknowledges the role of materialism and self-interest in his article. From a personal perspective, many years ago I had a young man and a young woman presenting themselves to be used and I have the different odd nod of acknowledgment [1/11/13 and respect which is appreciated] every now and again. Apart from that it’s been a real pain and nothing but a real pain. Granted while I am occasionally successful in my endeavours, I don’t personally benefit from it and it does take some effort. ]

Continue ReadingRussell Brand on Revolution

Google and Yahoo furious at reports NSA secretly taps data centres

Spread the love

http://www.theguardian.com/technology/2013/oct/30/google-reports-nsa-secretly-intercepts-data-links

Files obtained from Edward Snowden suggest NSA can collect information sent by fibre optic cable between Google and Yahoo data hubs ‘at will’

google-data-center-street-view
Google and Yahoo, two of the world’s biggest tech companies, reacted angrily to a report on Wednesday that the National Security Agency has secretly intercepted the main communication links that carry their users’ data around the world.

Citing documents obtained from former NSA contractor Edward Snowden and interviews with officials, the Washington Post claimed the agency could collect information “at will” from among hundreds of millions of user accounts.

The documents suggest that the NSA, in partnership with its British counterpart GCHQ, is copying large amounts of data as it flows across fiber-optic cables that carry information between the worldwide data centers of the Silicon Valley giants. The intelligence activities of the NSA outside the US are subject to fewer legal constraints than its domestic actions.

The story is likely to put further strain on the already difficult relations between the tech firms and Washington. The internet giants are furious about the damage done to their reputation in the wake of Snowden’s revelations.

guardian-sourced-NSA-google-interception

According to a top-secret document cited by the Post dated 9 January 2013, millions of records a day are sent from Yahoo and Google internal networks to NSA data warehouses at the agency’s headquarters in Fort Meade, Maryland. The types of information sent ranged from “metadata”, indicating who sent or received emails, the subject line and where and when, to content such as text, audio and video. [edit:  This is discussing data knowingly sent by Google and Yahoo to NSA under the Prism system.]

The Post’s documents state that in the preceding 30 days, field collectors had processed and sent on 181,280,466 new records.

Internet firms go to great lengths to protect their data. But the NSA documents published by the Post appear to boast about their ability to circumvent those protections. In one presentation slide on “Google Cloud Exploitation,” published by the Post, an artist has added a smiley face, in apparent celebration of the NSA’s victory over Google security systems.

The Post said that the interception took place on the cables that connect the internet giants’ data centers. The New York Times reported on Wednesday evening that one of the companies that provides such cables for Google was Level 3. It said in a statement provided to the Times: “We comply with the laws in each country where we operate. In general, governments that seek assistance in law enforcement or security investigations prohibit disclosure of the assistance provided.

The Post said that by collecting the data overseas, the NSA was able to circumvent the legal restrictions that prevent it from accessing the communications of people who live in the United States, and that it fell instead under an executive order, signed by the president, that authorised foreign intelligence operations.

In response, the NSA specifically denied that it used the presidential order to circumvent the restrictions on domestic spying, though the agency said nothing about the rest of the story.

The Independent reports that: The infiltration is striking because the NSA, under a separate programme known as Prism, has front-door access to Google and Yahoo user accounts through a court-approved process.

27/11/13 Having received a takedown notice from the Independent newspaper for a different posting, I have reviewed this article which links to an article at the Independent’s website in order to attempt to ensure conformance with copyright laws.

I consider this posting to comply with copyright laws since
a. Only a small portion of the original article has been quoted satisfying the fair use criteria, and / or
b. This posting satisfies the requirements of a derivative work.

Please be assured that this blog is a non-commercial blog (weblog) which does not feature advertising and has not ever produced any income.

dizzy

Continue ReadingGoogle and Yahoo furious at reports NSA secretly taps data centres

News of the World editors ‘must have approved hacker’s contract’

Spread the love

http://www.bbc.co.uk/news/uk-24754518

Image of Rebekah Brooks

News of the World bosses must have approved the contract of a private investigator who later admitted phone hacking, the Old Bailey has heard.

Prosecutor Andrew Edis QC said senior figures would have been involved in the decision to give Glenn Mulcaire a written contract in September 2001.

Former NoW editors Rebekah Brooks and Andy Coulson are among eight defendants facing trial.

They deny charges including conspiracy to intercept communications.

The jury heard Mulcaire was paid a weekly fee until September 2001 when he moved onto a written contract.

The court heard on Wednesday that the private investigator was paid around £100,000 a year for his services.

“It is if course part of the prosecution case that a contract like that, a big contract, involves the senior management, in this case the editor, the deputy editor and the managing editor, the three defendants whom you have to try for phone hacking in addition to Mr Edmondson [former NoW head of news Ian Edmondson] – that is Rebekah Brooks, Andrew Coulson and Stuart Kuttner,” Mr Edis said.

Continue ReadingNews of the World editors ‘must have approved hacker’s contract’