Showing posts with label internet virus. Show all posts
Showing posts with label internet virus. Show all posts

Monday, July 22, 2024

System of a down: US state of emergency


"HIGH ALERT! This is a state of emergency in the US" | Morris Invest
(Morris Invest) July 22, 2024: We are witnessing a tipping point moment for the United States of America. Pres. Biden [aka Genocide Joe] is stepping down from the next presidential race, the other candidate was almost assassinated, and there a massive collapse of America's infrastructure will be used to control all of us. The [Clinton-affiliated] CrowdStrike failure is just the beginning.

Thanks to Alaska Energy Metals for sponsoring today's video. Read more about their latest nickel projects here: https://alaskaenergymetals.com. Morris owns shares in Alaska Energy Metals, purchased on the open market. 📞 Ready to buy a first fully done for you rental property? Book a free call: https://morrisinvest.com ❓Ask Morris a 30-second question at https://morrisinvest.com/clayton 📺

Watch next: How to Create a Personalized Path to Financial Freedom: https://bit.ly/392kAsB 🏠 What's Your Freedom Number? Download a free PDF to help determine how many rental properties are needed to achieve financial freedom: https://morrisinvest.com/freedom 💵 Ready to get finances in order? Download the FREE 90-Day Financial Empowerment Bootcamp: https://morrisinvest.com/bootcamp 🎓 Want to learn more about creating an individualized plan to wealth with a proven system? Join Financial Freedom Academy: https://financialfreedomacademy.com 👨🏻‍💻 Sign Up for Morris' Webinar: https://morrisinvest.com/webinar

DISCLAIMER: Morris Clayton is not a financial adviser. He only expresses his opinion based on his experience. Other's experience may be different. These videos are for educational and inspirational purposes only. Investing of any kind involves risk. While it is possible to minimize risk, all investments are solely the responsibility of those involved in them. It is imperative that everyone conduct his/her own research. There is no guarantee of gains or losses on investments [but of course losses are much more likely, so be able to lose any money invested].
  • Morris Clayton, Morris Invest (YouTube); Pfc. Sandoval, Seth Auberon (eds.), Wisdom Quarterly

Friday, September 4, 2020

Comedian Jimmy Dore goes spiritual (video)

Mike MacCrae (jimmydorecomedy.com, 9/3/20); Seth Auberon, Ashley Wells, Wisdom Quarterly

Jim Dore evolves, talks about New Age spirituality, psychology, and Mahayana Buddhism/Hinduism.


Wednesday, December 4, 2013

NSA infects 50,000 computer networks

 The NSA or National Security Agency spies legally and illegally (Corbis/NRC.nl)
 
The American intelligence service -- NSA -- infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. 

Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this. A management presentation dating from 2012 explains how the NSA collects information worldwide.

In addition, the presentation shows that the intelligence service uses "Computer Network Exploitation" (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, that is, malicious software.

One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom. For a number of years the British intelligence service -- GCHQ -- has been installing this malicious software in the Belgacom network in order to tap their customers’ telephone and data traffic. 
 
The Belgacom network was infiltrated by GCHQ through a process of luring employees to a false Linkedin page.

NSA has 1,000+ hackers
www.democracynow.org
The NSA computer attacks are performed by a special department called TAO (Tailored Access Operations). Public sources show that this department employs more than 1,000 hackers. As recently as August 2013, the Washington Post published articles about these NSA-TAO cyber operations. More

Friday, March 29, 2013

Being spied on in America (audio)

Pat Macpherson, Pfc. Sandoval, CC Liu, Wisdom Quarterly
Marketplace Tech segment reports on government spying (marketplace.org)

It's legal for the government to read emails that are six months and older -- without a warrant, without probable cause, without a citizen ever knowing it. This is known because the government wants to expand that to earlier emails. National Security Letters are enough. Why bother with a rubber stamp from a FISA court?

That's just the start. Tracking networks. Ten thousand mini drones overhead -- spying, following, remotely downloading hard drive contents with amazing stealth. The abuses never end. It was not the American government prosecuting wars around the world; it was the Military-Industrial Complex using the Pentagon, CIA, NSA, NSC, FBI, DEA, IRS, SEC, SS (Secret Service), Department of War, Department of Homeland Security, State Department, and secret agencies to do their bidding. It hardly matters what the law books say because the MIC is not above breaking the law.

Friday, June 1, 2012

Stuxnet: Obama, Israel attacked Iran (cartoon)

(thismodernworld.org)

A CAMPAIGN FOR THE CYNICS: The candidates know elections are decided by the least informed, the least involved and the least interested in politics.

Obama, Israel ordered computer attacks on Iran
Grant Gross, ComputerWorld.com, June 1, 2012
The Stuxnet worm, developed by U.S. and Israeli agencies, targeted Iran's nuclear program, says the New York Times.

(IDG) U.S. President Barack Obama ordered the Stuxnet cyberattacks on Iran in an effort to slow the country's development of a nuclear program, according to a report in The New York Times.

Quoting anonymous sources, the Times reported that in the early days of his presidency, Obama accelerated attacks related to an effort begun by the George W. Bush administration. The Stuxnet worm, long rumored to have been developed by Israel or the U.S., escaped from Iranian computers in mid-2010 and compromised computers across the Internet.

Obama considered shutting down the cyberattacks after Stuxnet began compromising other computers, but decided to continue with the program, according to the Times. The Stuxnet worm came from a joint U.S. and Israeli effort to target the Iranian nuclear program, the Times said. The newspaper interviewed U.S., Israeli and European officials currently and formerly involved with the cyberattack program, it said. More

Mainstream Media Admissions

One Per Cent: Obama "gave full backing to Stuxnet attack on Iran"
In Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, author David Sanger alleges that Stuxnet...
Cyberweapons: Obama becomes most killing-est president, surpassing Pres. Cheney
Barack Obama "ordered Stuxnet cyber attack on Iran"
Pres. B.S. Obama ordered the viral Stuxnet attack on Iran as part of a wave of cyber sabotage and espionage against the would-be nuclear. It then leaked onto the Internet.
Obama's wave of cyberattacks against Iran
Presidents Bush and Obama behind Stuxnet
Israel and the United States were indeed behind a military-grade computer worm that sabotaged an Iranian nuclear-[power plant] fuel processing facility.
Obama ordered Stuxnet assault on Iran (BankInfoSecurity)

Monday, September 19, 2011

Testosterone Makes the Man

PFC Michael Sandoval, Ashley Wells (Wisdom Quarterly)
Liberal Brian and closeted, hyper-masculine killer Stewie in the Army (Fox TV)

Sadly most US men suffer from "testosterone poisoning" or they behave like they do. From the example of our political leaders (Clinton's satyriasis, Hillary's lesbianism, Pres. Obama's bisexuality) to the use of toxic plastics and other major sources of xenoestrogens, our hormones are all over the map.

This hormone disruption is inflamed by hyper-masculinity in video games, sports, music, gun use and, oddly, homosexuality. Sexual misconduct of obsession and acting like wolves leads to indiscriminate behavior with almost any receptive and some unreceptive partner.

In the military, for example, sexual assault and rape are commonplace. Many of those attacks are male on male. Just as Afghan Pashtuns are accused and condemned for engaging in bacha bazi (dancing boy pederasty/molestation), US soldiers hypocritically engage in similar behavior in the name of top dog pirate/prison machismo. Pirates are famous for the booty they make off with, and they are not the only ones.

A new report, however, reveals that it is a biological trick. Genes and social training gear men for excessive interest in spreading seeds and making conquests, upping the chances of impregnating someone and spreading those genes. But when the baby comes, dwoop! Testosterone levels drop precipitously -- and with those levels attitudes must change uncomfortably. Suddenly it's my daughter, and I think I know what men are thinking when they look at her. Testosterone makes men, not fatherhood. But NPR disagrees.

Fatherhood, Not Testosterone, Makes The Man
(NPR, Weekend Edition, Sept. 17, 2011) A new study says that when men become fathers, our testosterone levels drop. Like a brick. I doubt that many fathers are surprised. Transcript

Heidi Klum is the most dangerous celebrity in cyberspace, according to a new list compiled by Internet security developers McAffee. One in ten websites that come up in searches have more than pictures. They have viruses and malware that ruin computers and steal personal information. It is not only supermodels and scandalous actresses. Number 3 on the list is CNN's Larry King replacement Piers Morgan. But most searches are seeking salacious photos of women.

Tuesday, September 13, 2011

Caught in The Web ("Connected" film)

Wisdom Quarterly
(, Now Playing, Sept., 2011)

Buddhist cosmology speaks of devolutions and evolutions and epochs of quiescence and chaos, after Earthlings descended from space (Aganna Sutra), genetic manipulation (usually by nagas in a kind of creationism or celestial intervention), and always more revolutions through the aeons (kalpas in an Indian context of yugas).


US teachings about Evolution vs. Creationism

How things turn and have turned may only seem comprehensible as envisioned in the Wheel of Samsara, the "continued wandering on" or cycling through rebirths (due to our skillful and unskillful karma) in countless worlds within 31 Planes [broad categories] of Existence.

But for all that, we still get excited that our mobile device (cell phone) connects us to the Web and lets us tune in and drop out by
feeling "connected." Tiffany Shlain is onto something: We are interdependent.


Thursday, June 9, 2011

Macs hit by Malware, iPhones could be next


Unless Apple, Inc. acts fast, Macs are no immune from malware, and iPhones could be hit next. It has taken steps to stop a malware "phishing" program (Image: cutcaster.com).

(NPR, June 6) Apple's computers have been able to avoid most serious hacking attacks, but that era may be over. As Steve Jobs and his colleagues prepared for this week's developers conference, the company was also taking steps to stop a malware "phishing" program.

The ploy, says technology columnist Rich Jaroslovsky of Bloomberg News, uses an infected website to install a piece of software on Apple computers. The software then pops up a new window, with an urgent message about a security vulnerability.

As Jaroslovsky tells NPR's Renee Montagne, the rogue window includes "a scary-sounding message that tells you that your computer is infected, and that you need software to eradicate the infection — and to please give your credit card number." More

Technology
CALLING THE INTERNET POLICE
Hackers Target FBI Affiliate, Post Passwords Online
The hacking collective, Lulz Security, also recently targeted Nintendo, Sony, and PBS.
Nintendo: Server Breached, No Data Lost