Monthly Archives: March 2015

# 4 Side Notes, Nanobots, Microbots

(c) Terry Floyd Johnson, 2015

Secrecy, within governments, is a laugh, for nanobots/microbots communities, share all of this information, and its common knowledge, for all the bot communities to know, and this is archived, in the bot communities, which interest lies in this area.

Thus, the United States, Russia, and every other country in the world, your secrets are not secret, the bots have it stored, in the communities, which handle that area of secrecy reports, actions, etc..

Anyway, this July 4th, World Freedom Day, will be the next gathering of all the bots in Roswell, New Mexico, at a place, that will not be shared.

Roswell, NM is a hot bed of bots, reproduced and sent out to form new communities.

Long Beach, CA is another hot bed of bots, and strong ET presence; with a strong Rowdies Rangers presence, as well, which angers the ETs, since Rowdies Rangers are at war with them, and within, the last few weeks, have defeated them, across many solar systems, and galaxies, so they don’t get along very well.

San Francisco, is a city, used by military, and others, to test out weak examples of deadly nerve, etc., gases, etc., for the hills allow the gas to be put out, and it travels directly down into the city, and countryside.

Many deaths can be laid at the Military ops, in this area, murder charges, need to be put out and enforced, because being in the military, does not mean you can cause Americans death and harm.

Paris, France, another hot bed of bots, but for different reasons, love, romance, and duty to your important one, and a study of those, who breakaway from this fidelity, into infidelity.

Barcelona, Spain- they love the work of Antoni Gaudi, and love to play, with the figures he created for his park, and the bread crumb like cathedral, he designed, and worked on, for over twenty years.

Sydney, Austrailia- They love it, and interact with Australians, who don’t know they’re doing so. They’re helping them to stop being ashamed of their forebearers, and be here and now, so they have a strong individual love of self, and country.

Dallas, Texas- they love it, for the ranches, cows and other animals, plus the way Texans, see themselves as ruthless, to all, who would oppose or hurt them; the bots have a strong affinity with the cows, and horses.

More later on.


May the Microcosmic Force be with You!

Alibaba And The Cognitive Dissonance Of American Data Policy


Editor’s note: Paul Rosenzweig is a senior adviser to The Chertoff Group, a global security advisory firm that advises clients on information security, including cloud computing, and former Deputy Assistant Secretary for Policy at the U.S. Department of Homeland Security.

“Who says A must say B…”

The aphorism, often attributed to the conservative philosopher James Burnham (though it originated in the fable of Hansel and Gretel), is a short-hand phrase that is intended to capture the requirement of intellectual consistency. Or, put more colloquially – don’t be an intellectual hypocrite. American cyber policy makers may well rue not paying heed to Burnham. The legal interpretations they currently espouse may soon turn around to bite them in the proverbial hypocritical posterior.

The issue is put in stark relief by the recent announcement from Alibaba, the Chinese technology company that plans to open up a new data center in Silicon Valley

View original post 690 more words

Tech Giants Call For “Clear, Strong And Effective End” To NSA’s Phone Metadata Surveillance


As expected, technology companies, tech trade groups and privacy organizations sent a letter today to the President Barack Obama, various members of Congress, and governmental security officials, urging reform of the U.S. government’s surveillance practices.

Tech companies represented by groups that signed the letter include Microsoft, Dropbox, Facebook, Apple and Google. Other tech firms such as Mozilla and CloudFlare signed on alone.

The missive concerns Sections 215 and 214 of the PATRIOT Act, a law passed in the wake of the 9/11 terrorist attacks that’s been a key legal foundation for the government’s collection of Americans’ call record metadata, for example. The now-infamous Section 215 of the act will sunset on June 1, barring Congressional action.

That is why the companies and groups have banded together: The aligned front increases pressure on Congress to reform the act to end bulk surveillance. The letter’s language:

There must be a clear, strong, and…

View original post 282 more words

A Look Inside Transcriptic’s New Biotech Testing Facility


[tc_aol_on code=”518713362″]

Transcriptic, the cloud-based biotech lab that tests for experimental drugs automation and robotics, has become a key platform for many biotech companies in Silicon Valley.

The platform has been particularly useful for many of the biotech companies now coming out of Y Combinator. These startups don’t have the deep pockets of big pharma and need a low-cost solution that produces rapid results. Transcriptic has offered a $20,000 credit to Notable Labs, AtomWise and other YC-backed startups to help spark the drug discovery market within the valley.


It takes an average of 12 years and billions of dollars to get a new drug on the market. According to Transcriptic, its services enable scientists to work remotely with a wide swath of data and automated equipment that can produce low-cost results in days. While there’s a lot more to getting a drug on the market, this could greatly reduce the time and cost involved in getting life-saving…

View original post 95 more words

Adapting To The Changing Global Enterprise Security Landscape


Editor’s note: Randy Sabett is the vice chair of the privacy and data protection practice group at Cooley and the former commissioner of the commission on cyber security for the 44th presidencyLindsy Solanki represents technology companies and startups as an associate in the Emerging Companies practice group at Cooley, LLP.  

The finishing touches of the European Union General Data Protection Regulation (GDPR) are underway, and with it, many international companies that have data passing through the EU, house customer data of EU residents or are based in the EU are concerned about how they will fare once the new law is enacted. And they should be, as non-compliance could result in costly penalties under the proposed regulation – up to 5 percent of a company’s annual worldwide revenue or up to €100 million (~$120 million).

In addition to the heavy fines and loss in revenue, non-compliance could…

View original post 1,095 more words

Reach Your Customers Through The Subconscious


Editor’s note: Liraz Margalit serves as customer experience psychologist for ClickTale, which helps businesses optimize visitor interactions with their websites. 

Consider a scene that happens a billion times a day, at a billion computers across the globe. A man is searching online for new running shoes, or a woman is clicking through e-commerce sites on the hunt for a birthday gift, a new dress or a book to read on her next vacation.

Shoppers navigating the online marketplace think they are in control of their decisions. But the truth is, as they scroll and browse and perhaps buy, there are dozens of unconscious processes and cues directing their behavior.

For businesses with online marketplaces, understanding how these unconscious cues affect consumers is crucial.

The most researched indication of this automatic process is the priming effect, which says that the exposure to one stimulus influences the way we respond to another stimulus. We know that our mental paradigms –  how we categorize things around us – like to lump similar themes and thoughts together…

View original post 636 more words

Spear-Phishing Could Enable Cyberterrorism Attacks Against The U.S.


Editor’s note: Tom Chapman is a former Navy intelligence officer who now serves as director of cyber operations at cybersecurity firm Edgewave

If terrorists ever orchestrate a cyberattack against the U.S., the odds are 9 in 10 that spear-phishing will be the first step of their assault. The same technique that has breached Sony, Anthem, Target, the Pentagon and thousands of organizations every year, spear-phishing is used in some 91 percent of cyberattacks, according to the security firm Micro Trend. We can either spread awareness of spear-phishing now or suffer the consequences later.

Spear-phishing, like phishing, involves emailing a malicious link or file. Whereas phishers send mass emails in hopes of stealing credit card information, Social Security numbers and login credentials from as many people as possible, spear-phishers are more precise. They usually target one or few individuals at an organization, and they conduct extensive research in order to…

View original post 1,148 more words

Tech Titans Blast New Anti-Gay Law In Indiana


It’s hard to believe, after how far the gay rights movement has come, that we’re still doing this. But here we are.

Republican Indiana Gov. Mike Pence has signed into law a bill that allows private businesses to discriminate against gay and lesbian consumers, according to CNN. The “Restoration of Religious Freedom Act” is meant to allow businesses and corporations to cite “religious beliefs” as a defense, should they be sued by a private party for discrimination.

This of course means that Gov. Pence and the state of Indiana are prioritizing the religious beliefs of a company or corporation (after all, corporations are people!) over the basic human rights of a gay person.

Right on queue, tech industry titans have swooped in to decry the move, led by Salesforce CEO Marc Benioff.

Benioff tweeted yesterday that Salesforce would be canceling all programs that require customers or employees to travel…

View original post 441 more words

Powerful films from 5 young people: What health inequality looks like in the US

TED Blog

By Michael Painter. 

For some of us, it’s easy to choose to be healthy. We can’t control whether disease or accidents strike, but we can decide where we live and what we eat, as well as if, when and how much we’ll exercise. Some of us live in a culture of health — a time and place where, for the most part, we have the real hope and opportunity to live a healthy life.

But for many more of us, it isn’t — we don’t have that choice. We live in unsafe neighborhoods. We don’t have strong families to help us through life’s challenges. We can’t readily get nutritious food. We don’t have easy ways to exercise. It’s difficult — or even impossible — to keep our children safe.

The Robert Wood Johnson Foundation was at TED2015 in Vancouver last week, where the theme was Truth & Dare. And we took…

View original post 356 more words

Google Blasts Media Implications That It Runs That Town


Google, a search company, fired back today at a string of reports published in the Wall Street Journal over the past few weeks that have brought the company and its business practices under scrutiny.

The collection of pieces implied that Google has decision-tilting influence in the federal government, and that the Federal Trade Commission (FTC) all but went against its own internal views of Google’s alleged anticompetitive behavior by not deciding to pursue legal action against the search company several years ago.

The FTC responded previously. Today Google followed suit.

One of Google's employed moving-picture-images One of Google’s employed moving-picture-images

The now-dated case against Google came back to the forefront of technology news when the government accidentally leaked — by its own admission — part of an internal document this month arguing that the company had “unlawfully maintained its monopoly over general search” through several tactics. When the final decision in the proceeding was reached and announced in January…

View original post 264 more words

2015 March 16 – Q & A with Cobra – Rob Potter

COBRA Monthly Update – Interview Transcript

Note: I did not post the Rob Potter drama…but only the Cobra interview transcript. If you wish to read the RP part…just click the link at bottom. Mr.Ed 🙂

Rob – Alright ladies and gentlemen. Once again, here we go with another wonderful interview with our emissary of light, Cobra, the true voice of the Resistance here giving us the real latest updates and Intel on what’s going on and we’re going to move into lots of different stuff here today. We’re going to get right into it. First of all, Cobra, welcome to the show. Once again, thank you so much for doing me the honor of coming here on the Victory of the Light Radio show.

COBRA – Thank you for your invitation again.

Rob – It’s always my pleasure. One thing I forgot to ask last month. It was shortly afterwards…

View original post 8,924 more words

How Google, Facebook And Others Pay Their H-1B Employees


Editor’s note:Kiran Dhillon is a senior editor for FindTheBest, where she tackles big datasets to produce interesting insights.

Legislative debate regarding expanding the H-1B visa program is heating up in the U.S. Senate. H-1B visas allow foreign workers — specifically those in technical roles—to legally work in the United States. In lobbying for an expansion of the current H-1B visa program, Google executive Eric Schmidt said, “We take very, very smart people, bring them into the country, give them a diploma and kick them out where they go on to create companies that compete with us.”

Amid this discussion, jobs at Google, Facebook and other tech giants have grown increasingly lucrative for Americans and foreigners alike.

An analysis of records from the Office of Foreign Labor Certification (OFLC) reveals that the median salary offered to H-1B applicants by some of the biggest tech companies — Amazon, Apple, Facebook…

View original post 429 more words

Crossing the Cybersecurity Trust Chasm


Editor’s Note:Deepak Jeevankumar is an enterprise IT investor at General Catalyst Partners where he has a wide range of investments in cybersecurity, big data and storage startups. The opinions expressed here are Deepak’s personal opinions and do not reflect the views of General Catalyst or their portfolio companies. 

Kudos to the President for visiting Silicon Valley last month and drawing the attention of the nation to a new world of continuous cyber attacks.

The executive order signed by the President addresses the critical piece that is needed to help companies protect themselves in the future  – by sharing cyber threat information between different private sector companies, and between the government and the private sector.

But we need to cross the cybersecurity trust chasm to make sharing really work.

Today, this trust has been broken in the system due to incessant hacking of employee/customer confidential data stored in private…

View original post 860 more words

Chairman Wheeler Predicts FCC Will Beat Legal Challenge To Net Neutrality


Now that the FCC is the subject of several lawsuits, and its leader, Chairman Tom Wheeler, was dragged in front of Congress repeatedly to answer the same battery of inanity, it’s worth checking in to see how the agency is feeling. Is it confident that its recent vote to reclassify broadband under Title II of the Telecommunications Act will hold?

Yes, unsurprisingly. Recently, Wheeler gave a speech at Ohio State University, laying out his larger philosophy regarding the open Internet. His second to last paragraph is worth reading:

One final prediction: the FCC’s new rules will be upheld by the courts. The DC Circuit sent the previous Open Internet Order back to us and basically said, “You’re trying to impose common carrier-like regulation without stepping up and saying, ‘these are common carriers.’” We have addressed that issue, which is the underlying issue in all of the debates we’ve had so far. That gives…

View original post 209 more words

#3 Side Notes

(c) Terry Floyd Johnson, 2015

This is an update of my remembering happenings, while interacting with ETs, and Black Ops Programs Alpha.

In the Black Ops my codename was Ghost Lightning Dragon, but my ET black ops condenodualname was and is ” Catseye “.

I remembered something else to, that I own and run sporting events all over the Universe, and this upsets the Constellation, for our sporting events, paramutal betting, bridge bets, and so on, rakes in billions of dollars yearly.

We publish our own sports newsletters, racing newsletters, Niche magazines, and we run betting bookies all over the Universe.

Catseye brings terror to those who want to cut in on this sporting empire, for some have tried, and their ending, is not seen on the social pages of our computer empire.

We have film studios, computer games, and much more, all run under the auspices of MadDragon.

We own businesses all over the Universe, and we keep rifraff, out of the sports, much to their anger, but they don’t mess with Catseye, and the security forces of MadDragon, which are better armed, than planets, solar systems, and galaxies.

We like anything that sizzles, such as fashions, video, planetary buzzers, solar ships, galaxycruisers, and most of all the Stars Needle Personal Ships, which allow private travel all over the galaxy/Universe.

We’re also in the nude sex world, and have private and public videos, etc., for sale, as well as magazines, and more.

We have banks across the Universe, and whole governments come to us, to borrow short term loans to carry them over till their monies come in.

We build whole biohabitats, environmentally friendly, and adaptable, where it helps the environment survive any form of attack. The Enviros work this area of our business, and they’re very good at it.

Extended Family Networks, on board the Motherships, are seen as a blessing, and we help them in any way we can, much to the Constellation’s annoyance.

There’s much more, but that’s for a later date.

May the Microcosmic Force be with You!

Kid receives FBI document from whistleblower showing anthrax attack was CIA operation. He’s arrested and tortured by the FBI.

According to Matt, he was sitting at his computer at home in September 2009 when he received an urgent message from a friend. A suspicious unencrypted folder of files had just been uploaded anonymously to the Shell. When Matt opened the folder, he was startled to find documents detailing the CIA’s role in assigning strike targets for drones at the 181st.
Matt says he thought of his fellow airmen, some of whom knew about the Shell. “I’m not going to say who I think it was, but there was a lot of dissatisfaction in my unit about cooperating with the CIA,” he says. Intelligence analysts with the proper clearance (such as Manning and others) had access to a deep trove of sensitive data on the Secret Internet Protocol Router Network, or SIPRNet, the classified computer network used by both the Defense and State departments.

As Matt read through the file…

View original post 183 more words

It’s $​Businesstime For Square Cash


Square is expanding its Cash product to allow businesses to accept payments. In addition, Square is announcing a new identity system called Cashtags (technically $Cashtags) that allows people to claim a unique address that can be used by anyone to send cash directly.

I’ve been waiting for Cash to expand to paying businesses. Cash itself is one of the cleanest, lowest friction constructs I’ve ever seen to exchange money from one lazy person to another — and that includes actual cash. Institutionalizing the ability to use it to pay for services or goods only makes sense.

There will be plenty of people taking you through the press release for Cash and rehashing the party line. But it’s late the night before this embargo lifts and I’m running on a Monster energy drink and some peanuts. So let’s break down these announcements like friends. Just you and me, talkin’ bout postmodern…

View original post 1,240 more words

Stripe’s New Product Helps Marketplaces Go Global More Quickly


Payments company Stripe is today unveiling a new product designed to help marketplaces like Lyft or Kickstarter scale internationally, by offering a suite of tools that allow businesses like these to accept payments from anywhere in the world, and then ensure sellers and service providers get paid. Called Stripe Connect, the product will help speed up the time it takes a marketplace to expand in a new region, making it possible to sign up new sellers in a matter of minutes, Stripe claims.

The new product is not to be confused with “Connect,” Stripe’s first product for store builders. Instead, Stripe Connect is focused on addressing the needs of online marketplaces – something Stripe says came about thanks to its experiences working with thousands of these sorts of companies, which has helped it to understand the challenges they face.

Current Stripe customers include a number of related businesses, and, at launch, the…

View original post 382 more words

Why An Open Salary Policy Always Beats Secrecy


Editor’s note: Dane Atkinson is the CEO of SumAll.

For four years, journalists and entrepreneurs have asked me why we created an open salary policy at my company. Here’s the answer: it prevents evil. Open salary policies mandate truthfulness and ethical behavior in organizations that would otherwise abuse the secrecy. “Transparency” is just a hollow buzzword unless executives are candid about compensation.

I would argue that in any company, salary transparency leads to better culture, higher retention and a more effective business than secrecy – with one caveat. If your company abuses rank-and-file employees to pay monstrous executive salaries that have nothing to do with their performance, then yes, open salaries will backfire. If most employees would be disgusted at the salary structure, you have bigger problems than transparency anyway.

When everyone at a company knows what co-workers make, this knowledge banishes the inequities and lies that otherwise…

View original post 891 more words

UK Chancellor Says “Google Tax” On Diverted Profits Will Come Into Effect Next Month


UK Chancellor George Osborne today confirmed that a new tax dubbed the “Google tax” — because of its aim at tech companies that divert profits made in the UK — will come into effect next month, from April 1. He also pledged £600 million ($880 million) to improving broadband in the country.

The 25% Google tax is part of a wider aim of raising some £3.1 billion ($4.5 billion) over the next five years from those companies who have avoided paying taxes up to now. As was widely expected, the tax was confirmed as part of the Chancellor’s latest budget, delivered today.

“Let the message go out that our toleration for those who will not pay their taxes will now come to an end,” Osborne told Parliament. This is the last budget — which sets out UK spending, taxing and other government financial targets — before the next national election this May.

He noted that some…

View original post 325 more words

The unintended consequences of being “tough on crime”

“We’re in this exciting moment where we’ve had 40 years of being ‘tough on crime,’ and we’ve finally come to recognize that it really hasn’t worked very well,” says sociologist Alice Goffman bluntly. “Scientists have shown in the past few years that the relationship between incarceration and crime is basically zip. The crime rate goes up and down, incarceration just continues to grow. It’s not a good way of fighting crime.”

When it comes to talking about jail, Goffman, a teeny tiny wisp of a woman with wide eyes and an open smile, does not mince her words. Sitting forward on a sofa in the Vancouver Convention Center, the day before she is due to give a TED Talk on the problem of using incarceration as a one-size-fits-all solution to crime, she is hopped up at what she sees as the injustice of it all. And she has seen it…

View original post 348 more words

Political Pressure To Pass CISA Quickly Could Pose ‘Big Problem’ For Civil Liberties


For years lawmakers and civil liberties advocates have sparred over cybersecurity legislation that would allow companies to share information with government agencies and each other.

Now the Cybersecurity Information Sharing Act, better known as CISA, is back. Despite recent amendments intended to bolster protection of consumers’ personal information, privacy advocates worry that political pressure arising from a recent string of high-profile cyberattacks on companies such as Sony could result in Congress pushing through a bill, as ACLU legislative counsel/policy advisor Gabe Rottman said, “recklessly.”

“This is a surveillance bill by another name,” said Rottman, who said the bill would create exceptions to privacy law and too broadly defines what the government can do with information it collects under CISA.

Last year CISA failed to reach the floor after civil liberties advocates denounced the bill, and the White House promised to veto it. But after a closed mark-up session this week, the bill sailed through…

View original post 367 more words

Your Favorite Browser Just Got Hacked, But Don’t Panic



How can I know what your “favorite browser” is? It doesn’t matter, really; if it’s any one of the four most popular browsers — Chrome, Internet Explorer, Firefox, or Safari — it’s just been successfully exploited.

This past week marked the 8th annual Pwn2Own, where security researchers come from near and far to flex their talents. The goal? Demonstrate exploits on the latest builds of popular browsers, get a pile of cash in return.

The good news: because of the nature of the competition, none of the specifics of these exploits are made public until the companies behind the browsers get a chance to patch things up. So while the bugs being exploited here might be lurking in your browser, you’re probably not in danger of actually getting nailed by them before they’re cleaned up.

Mozilla, for example, tells me they’ll have Firefox patched by the end of today…

View original post 361 more words

# 2 Roswell Past-Present-Future

(c) Terry Floyd Johnson, 2015

I have written this before, on another blog, but I haven’t done it on this one, so the Corestars, communities are Iconic symbols, of the real, the fantasy, etc..

The Corestars are focused on stories, and they’re telepathic connected, so that each community of Corestars, can produce an iconic symbol, to represent how the communities see the viability of the story.

Stories are written or visually imprinted on each Corestar’s memory, then they come together, to feel and enjoy the entire story.

They have the ability to see visuals, movies, TV, radio, perceptorial experiences, of those buses, they ride on, to be able to explore their locations. The buses are us.

If you go to Roswell, to see the crash sites, you’re bringing Corestars, with you, and they enjoy returning to Origin, and have a blast with all the stories, and explorations, they do while there.

Corestars are everywhere, on the planet, and though, they have tried to get into the Earth, to be able to have a control panel, to effect the movements of the planet, if needed, by themselves, or their bus humans.

UFO Abductees, have what is called Freshies, which are a different kind of nano/micro/supernano bots, which are imprinters, of the Great Library, and every human on the planet, is a carrier, of some portion of the Great Library.

Corestars consider it an honor, to be able to say they’re imprinting the knowledge of the Universe, and humans are the chosen vehicles, to carry the fullness of the Great Library.

Corestars are able to pull up any informational request of Rowdies Rangers, and planetary races, who want to learn, from the Great Library.

2. I’ve been looking into the Black Ops programs, run on the chosen few, who would become assassins, rebels, truthseekers, planetary disinformation experts, leading to the fall of all the governments on the planet. They’re survivalists, and don’t simply live in the way to survive on the planetary environment, but actually create environments friendly to their health needs. They survive, by creating environments, rather than living off the planet’s environments; if you’re unskilled, you have a high propensity of dying.

3. Black Ops operators, did and do not only work on this planet, but go to many others to practice, and to cause sabotage acts, leading to down falls of governments on that planet. They, also, do assassinations, and group killings, where they destroy the environment, causing instant death to those beings who live on the planet, as their natural birth right, they go into instantaneous death.

4. David Corso, code name was Panther Dragon.

5. My code name is/was Strike/Ghost Lightning Dragon- I was the favorite operator, of the ETs, and I did what they wanted for a short time, but then took over my own planetary falls, and became extremely rich, but I still did work for them on the side.

6. The reason for that is simple, sex, music, birth on the Motherships, of humans, and of non-humans, and the building of the counter resistance to the ETs and their genetic experiments, reproduction practices, and general scientific lifestyle, which created all kinds of exotic weapon;, they would then have us try out, on a variety of planets, or communities, these new weapons.

7. I allowed them to kidnap me, going to the Motherships, then I would stay for a short time, allowing them to do their medical scans, and some tests, but then I would implant in their minds I was still there, and went out and built a music career, which made me millions, then billions, as I started my own company.

8. I always came back though, for the sex, and the way they had us as birth fertilizing movement receptors; allowing the other not so nice operations, they did to us, as simply a cost of being with humans and other races, and starting necessary operations on the Motherships. One of which was- Extended Family Networks, where women were devastated by being screwed by any number of men, and then, they screwed any number of women, and men, so we, as a network, decided, anyone you had sex with, active or passive, would be your husband or wife. This was also true of children, who were made able to have sex and orgasms.

9. The ETs were very clear, that sex between close relatives, was not allowed, for they wanted healthy, intelligent offspring. Some of the ETs, who were compatible with humanity, had men and women have sex with them, for the building and expansion of the Nordics.

10. We developed deeper into the military operation, started by Alexander, building upon the Socrates method, of learning and sharing everything humans saw and learned.

11. We didn’t always stay upon the ships, but went to nearby planets, to do things, for the planetary races, usually naked, for the ETs kept us naked, so we wouldn’t run away. On motherships we were kept naked, so we knew our place among our Processors. There was always a reason for humans to be taken to these planets, especially children, so they would be implanted, on how nice the ETs were, to take them to such beautiful places, then when they got back to the ships, they were put into the sex areas, and had sex with men, women and other children, and from these operations, a multitude of new babies would be born.

The babies, were usually kept in the host, for two to four weeks, then removed, then the birth suit, made up of material that sinks into the skin, but leaves enough above the skin, to be able to allow fertilization of the eggs, within thousands of pockets, then the pocket would close down, and become a stable of liquids to keep the baby safe, and at the same time, they would tell both men and women, when they were carrying babies in these pockets, which were expandable, as the fetus grew, till they took it out, and put it into tubes of liquid, chemicals, which would keep the baby safe, until, its birth, out of the tube.

During this time, the mothers and fathers of all the babies, were encouraged to talk to the babies, in the tubes, so they would know they were loved, and well taken care of.

At the same time, this was going on, there would be a baby, or babies, placed in a woman or a man, and they would carry them naturally, till they were taken out and placed in tubes, like the others.

They were usually ready to come out of the tubes, or from the mother or father, within eight to nine weeks, but they were never forced to come out before they were ready.

They were then taken by the Nordics, and raised in baby tubes, like the ones we were placed in, when we first come aboard, and as they do their testing, so we won’t spoil their work. They can keep us like this, for as long as they want. The tubes are like caskets, and there are hundreds, even thousands, of them, within the motherships.

This gives you a brief rundown, of what humans experience on Motherships, where they are abducted to, for ET usage, and no concern, for their mental and physical health, but they’re taken through what we’re told is decontamination, but in reality, its a energizer, that allows women to produce many eggs, that are then taken from her bodymind. The ETs, then put the birth incubators on each of us, we’re, then, allowed to have sex. We come inside the person, or outside on the whole bodymind, where the incubator hold female eggs. Both men and women are birth incubators.

May the Microcosmic Force be with You!

Website Hackers Slip Under The Radar With Impersonator Bots


Editor’s note:Ofer Gayer is a security researcher at Incapsula.

It was late December when we were contacted by a financial service provider who began noticing a spike in online registration requests. Rather than resulting from end-of-the-year sales efforts, this spike was caused by a targeted spam attack that flooded the organization with fake registration forms, most of which looked reputable enough not be discarded on sight.

The reason for concern was that this company, for internal reasons, needed to perform a manual background check of each new registration form before it was passed over to the sales department. So when the small background check team began to collapse under the deluge of seemingly legitimate online forms, all online sales operations were brought to a halt. After a quick examination of the company’s website traffic, it quickly became clear that what the customer was actually experiencing was malicious bot…

View original post 991 more words

This USB Drive Can Nuke A Computer


Do not ever use a random USB flash drive. There are plenty of software exploits that can ruin your computer or life. And with this flash drive, it can physically destroy your computer by blasting a load of voltage to the USB controller with negative voltage. Think Wile E. Coyote and an ACME Human Cannon. BOOM!


The basic idea of the USB drive is quite simple. When we connect it up to the USB port, an inverting DC/DC converter runs and charges capacitors to -110V. When the voltage is reached, the DC/DC is switched off. At the same time, the filed transistor opens. It is used to apply the -110V to signal lines of the USB interface. When the voltage on capacitors increases to -7V, the transistor closes and the DC/DC starts. The loop runs till everything possible is broken down. Those familiar with the electronics have already guessed…

View original post 169 more words

Here’s The Text Of The FCC’s Net Neutrality Rules


The FCC followed through on its promise to release a massive document laying out its new rules for net neutrality. The order comes two weeks after the board voted to classify broadband Internet as a utility.

The FCC confirmed with TechCrunch last night that the order would be released today. The hundreds of pages in the report lay out a detailed plan for how net neutrality will be enforced. A quick read of the document indicates that it hews to what the FCC originally outlined in a summary that was publicly released before the commission voted on the rules.

Here’s the text:

Today’s release also brings us closer to potential legal challenges. As FCC chairman Tom Wheeler said earlier this year, “The big dogs [ISPs] have promised that they’re going to litigate.” The framework for those challenges will likely be drawn from the dissenting opinions of the Republican members of the…

View original post 45 more words

U.K. Parliamentary Inquiry Calls For New Legal Framework To Govern Spy Agencies


In a report published today, the U.K. parliament’s Intelligence and Security Committee has called for a new single act of Parliament to govern how domestic spy agencies operate with the aim of improving transparency and public trust. It dubs its report “an important first step towards greater transparency”.

The 149-page report is the cumulation of a year long inquiry by the committee, set against the backdrop of ongoing revelations derived from documents leaked by NSA whistleblower Edward Snowden (some of which have specifically pertained to the U.K. GCHQ spy agency), with the aim of examining the operations of the UK intelligence and security agencies — looking specifically at (in the committee’s own words):

  •  the range of intrusive capabilities currently available to the Agencies;
  •  how those capabilities are used, and the scale of that use;
  • the extent to which the capabilities intrude on privacy; and
  • most importantly, the legal authorities and safeguards that regulate their use

View original post 1,197 more words

Understanding Alibaba’s Snapchat Obsession


[tc_dropcap]Raising funding isn’t just about “how much?” but rather “from whom?” Beyond just providing the capital necessary to keep a startup growing — or even, simply, to keep it alive — taking “smart money” can unlock relationships, open doors and more.[/tc_dropcap]

Snapchat is back in the news alongside Alibaba, which is investing $200 million as part of a new $500 million finding round.

This is not the first time that these two companies have been linked with a deal. Bloomberg last July reported that the two sides had met regarding a potential investment at a $10 billion valuation. Leaked emails from Sony — including those of Sony Entertainment CEO and Snapchat board member Michael Lynton — subsequently backed up that story, but no deal was done. Until now.

[tc_writerquote align=”right”]Alibaba missed the messaging-app race in China.[/tc_writerquote]

So why is Alibaba, the company that dominates online retail in China and held the largest…

View original post 1,162 more words

Net Neutrality Rules Offer Few Surprises But Garner Plenty Of Reactions


From Capitol Hill to boardrooms, interested and affected third parties are predictably pouring in on the FCC net neutrality rules that were released this morning.

The rules show how the FCC intends to enforce the open Internet policy it passed two weeks ago. Chairman Tom Wheeler has said he expects legal challenges to this order, and today’s release brings us closer to seeing the gloves come off.

The FCC released a set of “myths” regarding its open Internet rules, pushing back against the narratives that have been employed by net neutrality opponents. A sampling: “The Order does not regulate the Internet,” and “There is no “utility-style” regulation [in the Order].”

Presumably, foes of the rules will continues to press ahead, but it’s worth noting that their complaints have not been ignored by the agency.

Overall, the rules had few surprises for those who have been following the debate over how to keep the…

View original post 662 more words

Cybersecurity And The Future Digital Economy


Editor’s note: Greg Shannon is chief scientist for the CERT Division at Carnegie Mellon University’s Software Engineering Institute, and chair of the IEEE Cybersecurity Initiative.

Director of National Intelligence James Clapper recently testified before Congress that his fundamental concern focuses on the “moderate, iterative and constant barrage of cyber attacks on U.S. infrastructure” that will “impose cumulative costs on U.S. economic competitiveness and national security.” Whether one agrees or not, Clapper’s comment led me to consider what an economy-threatening cyber attack really means.

A long-term cyber threat or attack might be like a war of attrition and last 30 years. If that shaves 1 percent of GDP each year, do we care? Is that “economy threatening”? This may well be the sort of assessment that policymakers will have to make on our behalf.

One approach is to distinguish between, say, petty crime and larger, broader threats. We can’t make everyone…

View original post 1,021 more words

Apple Products May Have Been Compromised By CIA Mass Surveillance Program


The CIA has been involved in a “multi-year effort” to break through Apple’s security code, according to a new report from the Intercept.

Top secret documents provided by former NSA contractor Edward Snowden reveal a CIA-sponsored annual gathering called “Jamboree” where researchers presented the latest tactics at cracking the security code of Apple’s iPhones, iPads and proprietary developer tools.

The report provides a total of 10 presentation slides detailing efforts to weaken the security of Apple’s products. One such slide describes the creation of a dummy version of Xcode that would be targeted at most likely innocent developers in order to “entice all MacOS applications to create a remote backdoor on execution.”


Another reveals efforts to embed surveillance and counter-surveillance for iOS devices (note the British Government Communications Headquarters logo and the reference to the WARRIOR PRIDE program that was revealed by Snowden last year on this slide):

Screen Shot 2015-03-10 at 9.39.03 AM

“The most troubling part is the revelation that the CIA…

View original post 311 more words