#ThatMomentWhen murderer-in-chief barry obama realizes he missed a few brown children, and their mothers, in his latest drone strike.
(NaturalNews) The USDA has announced its intention to allow China-grown chicken meat to be imported into the USA. “The U.S. Department of Agriculture’s Food Safety and Inspection Service (FSIS) has announced that China is eligible to export processed, cooked chicken to the United States,” says an official announcement on the USDA website.
The announcement goes on to ridiculously claim that the USDA “has determined that China’s poultry processing inspection system is equivalent to that of the United States, and cooked chicken imported from China would be processed under equivalent conditions as in the United States.”
This statement holds about as much water as Obama’s claim that “you can keep your health plan if you like it.” It’s a lie, in other words, and everybody knows it.
The Waco siege began on February 28, 1993, and ended violently 50 days later on April 19. The siege began when the United States Bureau of Alcohol, Tobacco and Firearms (ATF) attempted to execute a search warrant at the Branch Davidian ranch at Mount Carmel, a property located 9 miles (14 km) east-northeast of Waco, Texas. On February 28, shortly after the attempt to serve the warrant, an intense gun battle erupted, lasting nearly 2 hours. In this armed exchange, four agents and six Branch Davidians were killed. Upon the ATF’s failure to execute the search warrant, a siege was initiated by the Federal Bureau of Investigation. The siege ended 50 days later when a second assault on the compound was made and a fire destroyed the compound. 76 people (24 of them British nationals) died in the fire, including more than 20 children, two pregnant women, and the sect leader David Koresh.
The other day I was talking to one of my followers from Waco, Texas. They had no idea about any of this. Why don’t they teach this stuff in schools?
The biggest trick the Government pulled was convincing people that it had the ability to legislate away constitutional rights. Congress cannot take them, the Supreme Court cannot take them, the President cannot take them. Through common reason it is evident that these rights belong to all human beings, and we have had it with their scheming, lies, and treasonous plots.
Throw a shoe and miss Hillary Clinton and face 2 years in federal prison.
Murder innocent children with drone strikes and receive a Nobel Prize.
Sell Bitcoin and face 20 years in prison.
Lose $6 Billion of taxpayer money and front run for US Presidency
Release information found on unsecured public webpage and spend 41 months in prison after being convicted in a state where no crime was committed.
Illegally monitor every American’s phone and computer using taxpayer money and exploits then receive $52.6 Billion in funding with no criminal charges.
Are you getting it yet?
Photos from the 21st Century Wire.
BLM during the stand-off near I-19(?).
This photo caught my eye of a group of BLM gentlemen standing around the hood of their vehicle. What caught my eye, specifically, was that the gentleman at the top center is rolling a SureFire 60-round magazine in his AR carbine variant. I do believe this is the first time I’ve seen a government agency running the magazine.
With Harry Reid’s statement to KRNV-TV on Monday — “Well, it’s not over … We can’t have an American people that violate the law and then just walk away from it. So, it’s not over.” — is an indicator that the government is not standing down and there will be repercussions. Unfortunately, neither will the other side. This could potentially lead to a shoot-out between armed BLM forces and the American supporters of Cliven Bundy.
You guys realize they’re going to murder the people on the ranch, right?
They’re going to shut off electricity, water, etc, then set it on fire (claiming the people at the ranch did it), raid it (without provocation), kill everyone (claiming they were threatening), and blame them as being “extremists”. It happened a year or two. It happened in Waco. It happened at Ruby Ridge. Nothing is going to be captured on video, other than by the media which is already being paid by the Obama administration (as evidenced by the whistleblowers at CNN, etc who’ve quit because of fake stories knowingly being fed to them by the Obama administration). The lies have already started. The only truth is that the government is bullying someone - again. But then again, the day does in a Y.
Wherever someone isn’t sucking Uncle Sam’s dick, they get murdered by whatever talking head the people have elected POTUS. This time it’ll be under Murderer-in-Chief barry obama’s watch.
By the way, let’s not ignore the hypocrisy by Harry Reid, claiming someone broke the law & must face justice. Let’s start in his closet, then go through all of Congress & see who’s broken what laws. Harry Reid, you want justice? Lead by example. (Psst - he won’t.)
When ex-government contractor Edward Snowden exposed the NSA’s widespread efforts to eavesdrop on the internet, encryption was the one thing that gave us comfort. Even Snowden touted encryption as a saving grace in the face of the spy agency’s snooping. “Encryption works,” the whistleblower said last June. “Properly implemented strong crypto systems are one of the few things that you can rely on.”
But Snowden also warned that crypto systems aren’t always properly implemented. “Unfortunately,” he said, “endpoint security is so terrifically weak that NSA can frequently find ways around it.”
This week, that caveat hit home — in a big way — when researchers revealed Heartbleed, a two-year-old security hole involving the OpenSSL software many websites use to encrypt traffic. The vulnerability doesn’t lie in the encryption itself, but in how the encrypted connection between a website and your computer is handled. On a scale of one to ten, cryptographer Bruce Schneier ranks the flaw an eleven.
Though security vulnerabilities come and go, this one is deemed catastrophic because it’s at the core of SSL, the encryption protocol so many have trusted to protect their data. “It really is the worst and most widespread vulnerability in SSL that has come out,” says Matt Blaze, cryptographer and computer security professor at the University of Pennsylvania. But the bug is also unusually worrisome because it could possibly be used by hackers to steal your usernames and passwords — for sensitive services like banking, ecommerce, and web-based email — and by spy agencies to steal the private keys that vulnerable web sites use to encrypt your traffic to them.
A Google employee was among those who discovered the hole, and the company said it had already patched any of its vulnerable systems prior to the announcement. But other services may still be vulnerable, and since the Heartbleed bug has existed for two years, it raises obvious questions about whether the NSA or other spy agencies were exploiting it before its discovery to conduct spying on a mass scale.
“It would not at all surprise me if the NSA had discovered this long before the rest of us had,” Blaze says. “It’s certainly something that the NSA would find extremely useful in their arsenal.”
NSA Sets Its Sights on SSL
Although the NSA could use the Heartbleed vulnerability to obtain usernames and passwords (as well as so-called session cookies to access your online accounts), this would only allow them to hijack specific accounts whose data they obtained. For the NSA and other spies, the real value in the vulnerability lies in the private keys used for SSL that it may allow attackers to obtain.
Cracking SSL to decrypt internet traffic has long been on the NSA’s wish list. Last September, theGuardian reported that the NSA and Britain’s GCHQ had “successfully cracked” much of the online encryption we rely on to secure email and other sensitive transactions and data.
According to documents the paper obtained from Snowden, GCHQ had specifically been working to develop ways into the encrypted traffic of Google, Yahoo, Facebook, and Hotmail to decrypt traffic in near-real time, and there were suggestions that they might have succeeded. “Vast amounts of encrypted internet data which have up till now been discarded are now exploitable,” GCHQ reported in one top-secret 2010 document. Although this was dated two years before the Heartbleed vulnerability existed, it highlights the agency’s efforts to get at encrypted traffic.
The Snowden documents cite a number of methods the spy agencies have used under a program codenamed “Project Bullrun” to undermine encryption or do end-runs around it — including efforts to compromise encryption standards and work with companies to install backdoors in their products. But at least one part of the program focused on undermining SSL. Under Bullrun, the Guardian noted, the NSA “has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.”
Security experts have speculated about whether the NSA cracked SSL communications and if so how the agency might have accomplished the feat. Now, Heartbleed raises the possibility that in some cases the NSA might not have needed to crack SSL. Instead, it’s possible the agency used the vulnerability to obtain the private keys of companies to decrypt their traffic.
The Good News
So far, though, there’s no evidence to suggest this is the case. And there are reasons why this method wouldn’t be very efficient for the NSA.
First, the vulnerability didn’t exist on every site. And even on sites that were vulnerable, using the Heartbleed bug to find and grab the private keys stored on a server’s memory isn’t without problems. Heartbleed allows an attacker to siphon up to 64kb of data from a system’s memory by sending a query. But the data that’s returned is random — whatever is in the memory at the time — and requires an attacker to query multiple times to collect a lot of data. Though there’s no limit to the number of queries an attacker can make, no one has yet produced a proof-of-concept exploit for reliably and consistently extracting a server’s persistent key from memory using Heartbleed.
“It is very likely that it is possible in at least some cases, but it hasn’t been demonstrated to work all the time. So even if a site is vulnerable, there’s no guarantee you’re going to be able to use [Heartbleed] to actually get keys,” Blaze says. “Then you’ve got the problem that it’s an active attack rather than a passive attack, which means they need to be able to do multiple round trips with the server. This is potentially detectable if they get too greedy doing it.”
The security firm CloudFlare, which has spent the last three days testing various configurations to determine if, and under what conditions, it’s possible to extract private keys using the Heartbleed vulnerability, says it hasn’t been able to do so successfully yet, though its tests have been limited to configurations that include the Linux operating system on Nginx web servers.
Nick Sullivan, a Cloudflare systems engineer, says he has “high confidence” that a private key can’t be extracted in most ordinary scenarios. Though it may be possible to obtain the key under certain conditions, he doubts it has occurred.
“I think it is extremely unlikely that a malicious attacker has obtained a private key from an Nginx server of a busy website,” he says.
So far, they believe private keys can’t be extracted from Apache servers either, though they don’t have the same level of confidence in that yet. “If it is possible with Apache, it’s going to be difficult,” he says.
A few other researchers have claimed on Twitter and on online forums that they have retrieved private keys under various circumstances, though there doesn’t appear to be a uniform method that works across the board.
Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.
“I suspect there are many people doing exactly that right now,” Blaze says.
So what might the world’s spy agencies say about all this? The GCHQ has a standard response for anyone who might wonder if the spooks used this or any other vulnerability to undermine SSL for their BULLRUN program. In a PowerPoint presentation the British spy agency prepared about BULLRUN for fellow spies, they warned: “Do not ask about or speculate on source or methods underpinning BULLRUN successes.” In other words, they’ll never say.
"We Will Not Comply"
Un-SAFE Act Rally, Empire State Plaza
This pretty much applies to how I feel with anything that has to do with government.
FYI: The SAFE act is Secure Ammunition & Firearms Enforcement, which is basically about taking people’s 2nd amendment rights away to bear arms.
You don’t need to own a gun, but for those that do - it’s none of your business. All this gun control bullshit won’t stop murderers from murdering people. Do you think the kid who shot up an Aurora Colorado theater had a permit and went through the right channels? Do you think the kids who shot up Columbine High School had licenses? What about Sandy Hook? The answer is no.
These acts of unspeakable violence are immoral acts. They are not things that can be legislated. You cannot legislate morality. It’s why anti-abortion laws don’t work. I’d consider myself pro-life, but I also know the fact that I’m a man, and will never have a baby growing inside my big ol’ belly. Who am I to tell someone else what they can do? The same goes for guns.
There have been endless examples of governments, in the 20th century, taking away the guns from its population, then the government eventually steps in and exterminates any particular group of people they deem undesirable. And what do the people have to defend themselves with? Answer: Nothing. Their guns were taken away.
"Well I don’t trust people, there are too many crazy people out there." Yes well, what makes you the poster child for normalcy? There are also crazy people driving one or two ton vehicles, that can run your ass over when you walk outside for a smoke break. (Oh, how’s that smoking habit working out for you, by the way?)
If you want to change society, change their hearts. Tell them the truth, show it to them. Let them decide. No one should be anyone else’s moral compass, not even fucking Andrew Cuomo.
If Cuomo reads this - even better.
Thanks to BasedHeisenberg for putting up some photos. i’ve not met him in person, but he lives here, and we’ve chatted ever so briefly.
Oil is a hell of a drug. Imperialism is one potent aphrodisiac.
PS No one gave me my freedom of speech. We are free because we exist, not because some fucking government, or its murderous clones (who may or may not die by the same gun they live by), gave me shit.
I can believe in my heart what I want to religiously. You can’t control the heart, the spirit, or the soul.
Patriotism is a blind walk to the slaughterhouse.
Gun rights advocates in Saratoga Springs, N.Y., reportedly burned nearly one thousand gun registration forms to ashes in a clear act of civil disobedience. Under the hastily-passed SAFE Act, Gun owners have until April 15 to register their so-called semi-automatic rifles that fall under the state’s own definition of “military-style assault weapons.” The forms they burned are the very forms the state wants them to turn in registering their firearms.
This was all over the news last night. I loved hearing it.
Q:You're a bitch.
How much do you get paid each hour? I ask because if its more than I make, I will quit my job and join you.
Give up, dude you are literally nothing to me. I have so much fun tracking your posts, and my readers love watching you struggle
That moment when the gub’nent gets served.
(LOL @ Cyberdyne)
That moment when you realize government & state support is utter bullshit, & that Anarchism is really the only way to be free.
Do you want solid proof that paid government shills are targeting websites, blogs, forums and social media accounts? For years, many have suspected that government trolls have been systematically causing havoc all over the Internet, but proving it has been difficult. But now thanks to documents leaked by Edward Snowden and revealed by Glenn Greenwald, we finally have hard evidence that western governments have been doing this. As you will see below, a UK intelligence outfit known as the Government Communications Headquarters, through a previously secret unit known as the Joint Threat Research Intelligence Group, has been systematically attempting “to control, infiltrate, manipulate, and warp online discourse”. This should be deeply disturbing to anyone that values free speech on the Internet.
It isn’t just that the British government is trying to influence what people are thinking. The reality is that this is far bigger than a mere propaganda campaign. As Greenwald recently noted on his new website, the “integrity of the Internet itself” is at stake…
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
So what techniques are the British using to control and manipulate discourse on the Internet? According to Greenwald, the documents that Snowden has uncovered show that they are willing to sink to despicable lows in order to get the results that they desire…
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.
The following is a list of Internet infiltration techniques that were listed on one particular slide that Snowden leaked…
-Set Piece Operation
-False Flag Operation
-False Rescue Operation
You can check out this slide for yourself right here.
There is also evidence that the Canadian government has been involved in this sort of thing as well. The following comes from Natural News…
You’ve probably run into them before — those seemingly random antagonizers who always end up diverting the conversation in an online chat room or article comment section away from the issue at hand, and towards a much different agenda. Hot-button issues like illegal immigration, the two-party political system, the “war on terror” and even alternative medicine are among the most common targets of such attackers, known as internet “trolls” or “shills,” who in many cases are nothing more than paid lackeys hired by the federal government and other international organizations to sway and ultimately control public opinion.
Several years ago, Canada’s CTV News aired a short segment about how its own government had been exposed for hiring secret agents to monitor social media and track online conversations, as well as the activities of certain dissenting individuals. This report, which in obvious whitewashing language referred to such activities as the government simply “weighing in and correcting” allegedly false information posted online, basically admitted that the Canadian government had assumed the role of secret online police.
You can see a video news report about this activity up in Canada right here.
Are you disturbed yet?
You should be.
So what kind of people are the governments of the western world targeting online?
Well, when it comes to the U.S. government, all you have to do is to look at their official documents to see who they consider the “problems” to be. For much more on this, please see my previous article entitled “72 Types Of Americans That Are Considered ‘Potential Terrorists’ In Official Government Documents“.
Sadly, the reality of the matter is that the days of the free and open Internet are numbered. The governments of the world are increasing their control over the Internet with each passing day, and eventually a time will likely come when we will not be able to communicate openly like this any longer.
Things have gotten so bad in the U.S. already that even Google is spooked…
A recent court decision that endorsed a broad view of the Federal Communications Commission’s authority over the Internet has Google and other Web companies nervous.
In closed-door meetings with regulators and Capitol Hill staff, Google’s lawyers have said they’re worried how the FCC may use its newfound powers, according to multiple people familiar with the meetings.
The extent of the FCC’s authority over Google and other Web services remains unclear, and the current FCC has given no indication that it is interested in pushing aggressive new regulations. But the possibility that the commission could begin telling Google how to organize its search results or handle its users’ data is enough to spook the company’s army of Washington lobbyists.
And this is just the beginning.
If you think that the control freaks that are running things now are bad, just wait until you see the next generation of control freaks.
For example, there is one prominent student writer at Harvard that apparently believes that free speech at her university should be abolished and that any professor that does not advocate for her politically-correct version of “justice” should be fired…
A student writer at Harvard University is raising eyebrows after publishing her belief that free speech on campus should be abolished and professors with opposing views be fired.
Sandra Korn, a senior who writes a column for the Harvard Crimson newspaper, thinks radical leftism is the only permissible political philosophy, and the First Amendment only hinders colleges from brainwashing students with her viewpoint.
“Let’s give up on academic freedom in favor of justice,” states the subtitle of her Feb. 18 column, in which she insists Harvard stop guaranteeing students and professors the right to hold controversial views and conduct research putting liberalism in a negative light.
“If our university community opposes racism, sexism, and heterosexism, why should we put up with research that counters our goals?” Korn asks.
This is what control freaks always want.
They always want to shut down those that are presenting opposing views.
They don’t believe in free speech and a “marketplace of ideas”. Rather, they believe in shoving what they believe down the rest of our throats.
And now we have solid proof that the governments of the western world are paying people to manipulate discourse on social media, blogs, forums and websites.
So will there be great outrage over this, or will the apathetic public just roll over and ignore this like they have so many other times the past few years?
Statist Is As Statist Does
Trying to tell statists about the violence of the state, and hoping they’ll remove their black blindfold, and open their eyes to the truth is a bit like hoping that….well, that people will see the truth.
But not so much, apparently.