Search This Blog

Tuesday 30 July 2013

The Jet age allows us a unique vantage point as travellers that, within the last ten generations, can enjoy being in diverse parts of the world in only a few hours when such  fantastic voyages of a few thousand miles would once take days or several months with great trepidation. The sight of clouds and sky breaking through with rays of sunshine is miraculous as you journey through the atmosphere at 500 miles per hour and humbly so. It may help decision-makers to appreciate God's perspective of beauty and hopefully with a humble realisation of this beautiful creation's limitations. We have yet to go supersonic as part of our daily experience while we use space-age, satellite enabled, touch devices to find restaurants and the closest Howard Johnson Hotel. It's so fast and uh efficient and helps to uh save paper since mapbooks are close to obsolete and 411 operators seldom hear your voice so keep your batteries close and the hydrogen powered phone charger. This is, in fact, exciting. Howard Johnson includes breakfast if you can present a Samsung Galaxy; get it?-so I was told. When our lives truly become supersonic in some near and not too distant supersonic age, may it be that our perspective of life and our limited yet renewable planet will be a truly God-like perspective instead of one that is indicative of a God complex beset by temporal and myopic demands that are suitable for this expiring existence only. God sees everything. This beautiful planet is always the "best space station", so to speak, for 6 billion people with a natural human biosphere that is friendly to a Swiffer brush and bio-friendly Febreze(TM) with the Green check mark since it is going to be hard, on the first go, to have enough water and a wave machine to make surfing on the earth obsolete. Water is really very very heavy!  

Monday 29 July 2013

Neanderthals were probably just as racially tolerant as cats. As Horkeimer and Adorno have pointed out time and again, the issue or concern can be summarised as such or it may be said this way; that we are so intelligent that we have become, in many ways, defiantly unnatural. See Ecclesiastes 7:29. http://www.sup.org/book.cgi?id=1103 The Dialectic of Enlightenment is undoubtedly the most influential publication of the Frankfurt School of Critical Theory. Written during the Second World War and circulated privately, it appeared in a printed edition in Amsterdam in 1947. "What we had set out to do," the authors write in the Preface, "was nothing less than to explain why humanity, instead of entering a truly human state, is sinking into a new kind of barbarism."
Cain was sitting there all day asking himself what he can do to feel better than his brother or what he could to feel better about himself by hurting his brother or maybe someone else. His mind was on his brother or neighbour all day long as to what he might do. His brother had no idea. It is the craziest thing but Cain suffered Malice aforethought. Abel was the victim of an unlawful killing of another contrary to God's majestic peace and it all began with Cain killing one of Abel's old old sheep. It's just that Abel appreciated everything as if it was of God's hand. It had to be because He created everything and as such, Abel did not dissociate anything in his life from God. He would say the tree is God's tree and his loin cloth was God's loin cloth. Read Psalms 50 and Romans 8. It says that Enoch ascended into Heaven and so have you if you accept that the Kingdom of God is at hand and within you. Read John 1. Paul the apostle was right to say that we do not have an attitude as having already attained it but we press on toward the goal that is salvation in Christ. But certainly attitude determines altitude so live like it and your neighbour's new Billabong shoes won't bother you soo much or the other neighbour's used (but with some new polish) roof racks; racks get it?

Sunday 28 July 2013

Jesus is referred to as a friend who sticks closer than a brother.  Relationships, therefore,  are learning opportunities where you can pick up your cross, deny yourself and follow Him. It is not that you should allow yourself to be mistreated but it is an opportunity to decide and choose a response.  Read 1st Corinthians 13. Relationships are an opportunity to do a good deed but not an opportunity for neediness and dependence.  It is an opportunity for growth. So stay beyond the feeling of running when you can see everything is essentially really perfect-like and you get along real good, as you would say maybe.  A seed that does not fall into the ground and die( to self) abides alone and does not bear the fruit so go and join a French club or something or a bible study and be nice because not everyone you meet will have read Emotional Intelligence by Daniel Goleman or inherited by faith in Christ the fruit of the spirit.  Yoda is a movie character and Jesus is Luke's or sky walker's master; get it?  Read the book of Luke and understand Elizabeth and Zechariah.  Throw Romeo ( Shakespeare's Romeo)  overboard because he is a needy and dependent person who cannot appreciate what Luke (book of Luke) learned yet or think of what is best for everybody in the longterm. But, he might after he has left Navy College, the ROTC or an Aikido dojo with a bible in his pocket maybe. You need a Joseph (Mary's husband) who was faithful to his uh umm assignment. 

M. Scott Peck...

"... But while consciousness is the whole cause of pain, it is also the cause of our salvation, because salvation is the process of becoming increasingly conscious. When we become increasingly conscious, we go further and further into the desert instead of burrowing into a hole like the people who choose not to grow up.  As I said above, the word salvation means "healing."  It comes from the same word as salve, which you put on your skin in order to heal an area of irritation or infection.  Salvation is the process of healing and the process of becoming whole. And health, wholeness and holiness are all derived from the same root. They all mean virtually the same thing.  Even old atheist Sigmund Freud recognised the relationship between healing and consciousness..."-Consciousness and the Problem of Pain-p.25 of the Sequel to the Road Less Travelled. 

Saturday 27 July 2013

The football, basketball, horn, violin or  science equation is no respecter of persons and neither is your final exam results. As it says, God is no respecter of persons.

Congratulations to everyone who graduated form their Masters program in Divinity and Chemistry this year; so enormously grand as an achievement.  You know who you are.   Humanity will always try to fatigue you and jostle with you because it is not sure of itself.  Read Romans 1 and John 1.  Go to Yoda School in the event the point is lost in some translation.   However, if humanity is thoughtful enough to make lipstick and light bulbs, it is human enough to recognise its own narcissism and say excuse me. The light bulbs were for the mirror in the bathroom and the make-up mirror in the vehicle( make- up mirrors in vehicles since 1953). It will remain available in the fuel cell version; circa 2005.

   http://www.autoconcept-reviews.com/cars_reviews/honda/Honda-FCX-Concept-2005/cars_reviews-honda-fcx-concept-2005.html

There was generation X, Y and now there is Community Z ( a happy place for all to enjoy their new and old human and civic rights). This has very little to do with World War Z the movie which is about zombies; creatures that resemble a barbarised humanity where there are no morals except passion, lust, anger, jealousy and a seething resentment for the fact that you floss and use the store brand products. Store brand products were designed by people who drive Aston Martins and Jaguars; after all?    

It is rumoured that Zombies are a religious metaphor conceived of by intellectuals to express their concerns for a time in history when a morally empty, soulless and rabid humanity would be less innocuous and more overt about their existence. It also brings to mind the concerns of Thomas Hobbes about any society in civil war.
God did not say to pimp and soil the earth but to be fruitful, multiply and to be a good steward of the earth.  There are enough potatoes, carrots and discount designer cologne sales at the Target, Walgreen's, Boots, TK Maxx or at a discount cologne outlet in your town such as Dayton for everyone.    
It is rumored that Henry Louis Gates Junior and M. Scott Peck were found curious by the neighbors not only for their writing style but also because they eschewed the value of watching tv shows for more than 1 hour per week. In fact, their favorite programming included Nova, the news and the occasional  NBC or ABC sports presentation with Howard Cosell who once said that "What's right isn't always popular. What's popular isn't always right."   

Read more at http://www.brainyquote.com/quotes/authors/h/howard_cosell.html#U4GoqEkpLqMDV4Y6.99

Friday 26 July 2013

The "Stand your ground" law is the perfect law for employees that go "postal" and wish to create contexts of fear or dangers in which they find themselves. If such a law exists where you live, be advised that life insurers are making considerations as to a new prayer to be added to existing policies. Your monthly prayer rates have "gun" up.  

Wednesday 24 July 2013

In a new movie, what does "gay" have to do with a good soccer goal or a touchdown?  There has to be a gay person of all colours and races and gender.  What does it have to do with efficiency or good air?

After the soccer game is over, I go home to my girlfriend and you can go home to your "partner" and everybody is happy. The team won't do so well if you refuse to pass the ball on the basis of orientation.  The truth is that  no one asked about your position on same-sex or unisex washrooms, headphones or marriage. If a gay waiter or straight waiter spills coffee on a customer, my heart goes out to him and the customer.   That would be a natural reaction. 

Now, everyone has to stand their ground in the science or math exam room but you are not entitled to any self-defence if you create a context of danger( approaching a stranger and invading their personal space while not in any official capacity to do so)  in which you find yourself.

A "gay marriage" law necessitates a "safe streets and less gun use" law because if the issue is mutual respect, human rights and tolerance for difference, then it is evident that law can be used to buttress the end goal as proven by the media coverage and campaigning for gay marriage to ensure everyone is tolerated and respected in a civil society. Safe streets and less gun use has nothing to do with gun ownership as gun ownership will be a consistent variable in an unevolved democracy.

It is the continuing policy of Londinium TV Channel to discuss everything in a light hearted manner and to let everyone know that homosexuals are human beings. It is also to share the gospel. They should be as well respected in public as any bible believing Christian. Hatred is not tolerated against homosexuals and nor should anyone tolerate anyone, including homosexuals, perpetrating crimes of anger, passions and violence. 
Warren Lyon, Editor.
Londinium TV Channel. 

Tuesday 23 July 2013

To study a country's present, you must study a country's past to understand the country's current juncture. In doing this, you will come to understand aspects of culture which are seemingly innocuous.  For instance, most country's brew their own beer and have their own blood banks and expectations with respect to general education.  These expectations may vary within the country itself but there has to be a general minimum to allow someone to walk into society as a person able to know when he is being wrongfully treated by a soccer referee or a maytag repair man.  In domestic situations, it might be possible to say that the average family in Provence will never know the shadow of any form of domestic violence and this may also be true of a family that finds its origins in Switzerland ( where they make pretty chocolate); just over the border from France or Italy.  In certain other cultures,  the story is more diverse and a young expatriate from Croatia or Holland might find his experience with his wife from another culture quite the same or possibly  more demanding of his passionate love for sports, good perpetual motion machines and his formative experiences; maybe not.

It is rumoured that a long time ago, a young man on the north side of the Swiss border met an Iberian young lady while getting lost hiking in the Spring.  A storm came the next day and he had to spend four nights with her family.  By chance, they copulated on the fourth night and the snow cleared in time for the seventh day.  They had known each other and he promised to return. He left a compass that had a watch built into it. No batteries were required miraculously as it was a new invention. During the time he shared with his wife's family( see Matthew 19), he noted public affection but also heated discussions over a half spoon of butter in the pasta preparations. The husband insisted on a half spoon while the wife wanted a full spoon. She would touch him a lot and it seemed as if she would ask him to be aggressive as if she needed to know something.  He would then oblige and it was confusing to this visitor.  The only comparison in his family is the time his father spent reading to his mother (his  father's wife).  He would read something like a blue print for a boat or a bible quote and they would discuss it heatedly and passionately.  His father was raised by Franciscan monks as a boy in Italy.  His mother respected this and if his father did not do this, he would see the emotions displayed by his(now) mother in-law. 

The young man reflected on this slight comparison in domestic behaviour as it disclosed one thing. The wife seemed to want some form of communication and the explanation for this is the comments made by Sara with respect to Abraham in the bible.  She called him her Lord. But, it could not have been the heat in the Iberian country that resulted in the difference. It seemed to be an issue of trust that begins quite early on in life and knowing that your Lord, father or husband  is not anyone who will impose a decision  that you should be allowed to make at some time. But, it seemed as if  moments spent reading were not enough for his new Iberian mother. She wanted something more tactile and was surprised that her daughter said he will not as did her older sister's husband from down the road. He slapped her knees with a cinnamon covered chocolate.  He said it was a "macaroon"(-google it) if you wanted it to be and it was best to be delicate with it as it was designed that way.   Her older sister had another suitor who lived five minutes in the other direction and he would not.  The sister's husband understood while this new son did not.   He decided to follow what he understood because in his culture, your mother would not give you any more pretty chocolate if she knew you weren't treating someone as you would wish to be treated.  That was punishment enough.   The young man's grandson grew up to be a designer for Longines apparently. He made watches that were passionate, efficient yet humbly traditional.
I am not from a backwater that is that lawless but it might be. I don't really know since it takes only 12 minutes for a police/national guard officer to show up if you call 911. However, only backwaters approve OK corral laws; laws that allow you to make up your own story subjectively as to why you took someone's life with a weapon and all couched in the just and traditional notion of self defence. But this is not a self defence law. It is a murderers law. Such a law allows you to follow someone and start a fight or altercation in any less than capable state of sanity and to then use deadly force because you claim to be afraid of the scenario you created. You may have picked a fight with someone who might be younger and more drunk than you may have been but the Ok Corral (stand your humanity on a plank of fear)law entitles you to evade responsibility by claiming you were afraid and that your fear was sufficient to use force to take the life of the person with whom you started the altercation. So, in such a backwater beware not to raise a butter knife while you think angrily about the cold coffee poured by your waitress at the local saloon or McDonalds because someone( another patron) may perceive your gesture as an aggressive posture, they may become afraid as your eyes turn red over the cold coffee and they may decide to use deadly force to repel your perceived butter knife assault. Subjectively and objectively speaking, who pulls the trigger first wins and in a world wear unbridled anger, irresponsibility, the will to kill and juvenile emotive patterns are given an alibi, be careful not to let anyone see you pick up the last pack of steaks for $5.99(  8 eight oz steaks per pack) at the big blue W---Mart store as they laywait you outside to find out if you were the one who stepped on his toe during a high school football game 28 years ago and somehow they lost a scholarship to Backwater College. Just hand him the steaks since his holster is open and your gun is in the glove box of your Durango. Whomever succeeds in pulling the trigger first, wins and gets to tell the tale with self inflicted razor blade wounds all over his football toe. It doesn't matter if its a black zombie or white zombie because zombies do not discriminate. Zombies will attack impulsively and kill the white widget or black widget. They will steal the white or black I-Pad and they will destroy the white or black chalk board in the school when told to write lines about how to respect a teacher or 911 operator.

They used to just tell kids to run away from strangers and to avoid talking to them. A neighbourhood watch volunteer has no power of arrest or detention and cannot stop you for any reason. You may now have to tell children not to forget to re-load  their child friendly pistol available in six pastel colors since zombies have legal protection. When Lincoln conceived of a uniform crime bill, he echoed a future that was consistent of the hopes of the founding fathers that held many truths to be self-evident. Telecommunications and the speed of national travel or mail made such unity with evident common goals and values difficult whether only 1/8 of the entire population had seen and lived in slavery in the south or not.  Hoover obviously met with similar resistance as many argued that the interests of the distant states made such a law difficult but there is no distance as you can twitter the draft uniform crime bill today. Otherwise, the fog of the notion of common freedom and unity under an inspiring flag is the only common truth for centuries to come if it wasn't for the NFL. It has existed for as long as the very first Nazi party.  It's a national league where everyone can count on common rules in any city.  It may turn out that mass shootings are truly celebrations of the obvious stubborn dysfunction of  a society.

Saturday 20 July 2013

Emotions and opinions are quite powerful but without rules or a sense of natural justice to govern them, everybody would be right and there would be no wrong. Solomon had to sit in front of two mothers claiming a child. Only one mother was anxious about the child's long term survival like Moses' mother. If you can watch the Merchant of Venice, you will learn how rules based on a natural sense of justice can lead to a satisfactory result for all. You may get the same feeling watching Oliver Twist. Anyway, a good cotton shirt at $12.99 is always a just result. Shop well and do not envy anyone if you did not go to the big chain department store to get a good and just deal. Once you get the shirt, everybody will agree that it was a good choice. The retailer must have pleaded insanity at that price but it's recorded in the price tag. It's a fact.

Wednesday 17 July 2013

Someone made the analogy of Sunday School being like Yoda School ( Empire Strikes Back). They drew the contrast and said the Holy Spirit is a powerful ally and a powerful ally it is. You want to move a stone but you can't agree to overcome negative emotions. The went on to say that you should use the Holy Ghost to have the power to forgive. Read John 6:26-29. I heard someone say it once in a Single Adult Ministry class. Everybody probably saw Empire Strikes Back to get the point about chastening your emotions and then after that you can think of feeding five thousand and telling every single person how to be a good single parent or fiance'.

Saturday 13 July 2013

Isaiah 65; read it for your kind purpose in addition to Psalms 27:10. Put on Maybelline and call the man you believe will be both a good friend to you and a husband. Marry the good friend.
People are buying labels such as Seventh day_________ or Baptist but is it not true that God is looking for heart? See Joel 2:13 and 1st Corinthians 1: 10-18. As this is the result, if one man standing in front of God has a 1998 AMG and another has a 2002 Pagoda, which one goes away justified? One says, "...I am glad I am not like those other non Baptists or non Pentecostals" and the other says "...have mercy on me as Peter prayed." It may depend on how many people in his church own a Pagoda or maybe God has an answer of His own.

Friday 12 July 2013

It's ok. Be yourself as a Star Trek-Sexual. Don't lock your neighbour outside of the airlock.

When my Boss was growing up in the late 70's and 80's, the only thought he had about clothing and attire was natural materials or synthetic. In terms of style he thought of formal, semi-formal and casual. That was it. This was probably everybody's consideration and then came quality of stitch. This way, every designer made a good deal of attention and the best located shirt in the store suited for the purchaser's purpose would win. In this way, when E.F. Hutton or Spock speaks everybody listens. Metro is MEME and Startrek is UNME.

Volvo Fuel Cell

http://www.gizmag.com/volvo-hydrogen-fuel-cell/16760/ In an effort to overcome one of the main drawbacks of battery electric vehicles, Volvo is initiating development of a hydrogen fuel cell that is expected to increase an electric car’s operating range by up to 250 km (155 miles). In the first phase of the project the company, together with Powercell Sweden AB, will conduct a study into a Range Extender, which consists of a fuel cell with a reformer that breaks down a liquid fuel – in this case petrol – to create hydrogen gas. The fuel cell then converts the hydrogen gas into electrical energy to power the car’s electric motor. The fuel cell would generate electricity without any emissions of carbon oxide (CO), nitrogen oxides (NOx), sulfur oxides (SOx) and particles. The only end products are electricity, water and a small amount of carbon dioxide. The technology can also be adapted for renewable fuels. The reformer’s ability to break down existing liquid fuels provide a distinct advantage over other hydrogen fuel cell vehicles such as Honda’s FCX Clarity, which can use a standalone Home Energy Station unit to produce hydrogen for the car to cater for current lack hydrogen distribution infrastructure. "This is an exciting expansion of our focus on electrification. Battery cost and size means that all-electric cars still have a relatively limited operating range. Fuel cells may be one way of extending the distance these cars can cover before they need to be recharged. What is more, the project gives us increased knowledge about fuel cells and hydrogen gas," says Volvo Cars President and CEO Stefan Jacoby. In the second phase of the project, Volvo and Powercell aim to produce two test cars based on the current C30 DRIVe Electric that will be ready for testing in everyday traffic in 2012. "We have just taken the first steps and it is naturally too early to talk about market introduction of electric cars with Range Extenders. The industrial decision will come after we have learned more about fuel cells and the opportunities they offer," says Jacoby.

Thursday 11 July 2013

You are living first class when your family in Dakota or Oregon can give you a choice of lunch snack and so is your neighbour. Will it be apple sauce, twinkies, oreo cookies or Granola bar? You are in paradise and you may read about children somewhere else who can tell you the angle of a straight line but who had to hope for, at most, a bowl of rice a day and one coke a week; one coca cola? They are living in economy class; you say. But, they are very thankful. For dinner, will that be rice, potatoes at $3.99 for the ten pound bag or macaroni? You are living first class with your choice of sides for dinner. So, choose your sides well. Read John 1 because God must have chose you to know something as you live first class and he probably also chose you to reproduce or to at least have a good companion( you are so special) since one of your grade school or high school friends died at 15 or 16. Peter Parker knows. What did Peter Parker's uncle say. He said that "...to whom much is given, much is required" or something like that.

Monday 8 July 2013

The devil was gifted by God not unlike Moses but Moses passed Sunday School with some struggle while the devil failed the class. See Matthew 4. Jesus passed with flying colours.
http://myhormonesmademedoit.com/the-male-hormone-cycle/ Male Hormone Cycle Women aren’t the only ones with a hormone cycle. Men have a hormone cycle, too. But there are big differences. For instance, instead of having a month-long hormone cycle like gals, males go through an entire hormone cycle in a single 24 hours. Another difference: Men have 10 times more testosterone than women, so their hormone cycle is usually all about how their testosterone affects them. A man’s body does make estrogen and progesterone like a woman’s body, though in much smaller amounts. So, what’s a man’s 24-hour hormone cycle look like? His testosterone is highest in the morning when he wakes up and gets lower and lower as the day goes on. Here’s some of what you can expect throughout his day: Morning: Testosterone is highest His hormone horoscope: He’s at his most energetic, talkative, aggressive, focused, competitive, independent, impulsive and confident. He also may be antsy or quick to anger and is more likely to say “no” to a favor or request for something you want, like a raise. His virility is at its peak. So is his ability to read maps and do spatial thinking. Best time to… Have him put together a piece of furniture or fix a shelf, have him compete in a contest, give him a project to do solo, figure out the best driving route and initiate passionate sex. Afternoon: Testosterone is in the middle of its cycle His hormone horoscope: He’s a tad mellower than his morning self, but isn’t going on empty just yet. As a result, he’s still upbeat, driven and focused, but not as quick to anger. He’s more open to working with others rather than going solo. You’ll also catch him smiling more now than in the morning. Best time to… Invite him to work as part of a team, have him talk to or pitch clients or customers, brainstorm ideas with him. Evening: Testosterone is lowest His hormone horoscope: He’s more passive, agreeable and low-key. He may feel tired or fuzzy. His libido hits its lowest point. For some men, this low point is still quite high, making him interested and capable of passionate sex; in other men, they may feel too tired to have sex or have difficulty maintaining an erection. Best time to… Ask him for a favor, request a raise (ask after 4 pm if your workday ends at 5 pm), get him to agree to the pink living room curtains or pose any other question that you need a “yes” to. He’ll be more likely to give in now than in the earlier hours of the day. The exceptions: A man’s testosterone is affected by things he does. For instance, his testosterone level rises when he drinks alcohol or caffeine, sees an action movie, plays video games or competes in or anticipates a sports game or game of chess. His testosterone also rises when he simply watches his favorite team compete. While his testosterone stays high if his team wins, it plunges if his team loses, making him feel blue, cranky or lethargic. WHAT ABOUT WOMEN? Now that you know all about a guy’s hormone cycle, learn about the female hormone cycle, too! _____________________________________ http://health.howstuffworks.com/sexual-health/male-reproductive-system/10-things-about-male-hormones.html 2: Men have Monthly Cycles There's plenty of information (official and anecdotal) about the wax and wane of female hormone levels throughout the month. But did you know that men's hormones rise and fall each month, too? These 30-day hormone cycles are still a controversial topic within the medical community, largely because there's not a lot of data to back up the idea. Still, it makes sense to many people that men probably experience monthly hormonal ups and downs that affects mood and energy levels. After all, there are seasonal, daily and even hourly deviations in hormone levels. Testosterone quantities can range up and down four or five times an hour, and are typically higher in the morning and lower at night. For many men, testosterone levels follow a seasonal pattern, too: They are increased in the fall and decreased in the spring. [source: Diamond]. Keeping track of mood fluctuations for 30 days will likely reveal an emotional pattern prompted by hormones; simply understanding what's behind one's attitude can make a big difference in daily interactions, as you'll read on the next page. Some scientists now think male hormones fluctuate monthly just like female hormones do and may cause mood changes.
Regardless of the hormonal cycle, everyone needs to treat others as they wish to be treated( see 1st Corinthians 13-its like a smile or top 40 hit. Everybody likes it-my grandma and your grandma sitting by the fire; Hey now!!) with reasonable communication and reasonable approaches to the cycle like reviewing the news, doing a cross-word, eating some chocolate from IKEA or going to the gym. You cannot covet God's child and nor can you make people responsible for your immature (fruitloop) approach to hormonal changes; too many fruitloops and not enough science tv documentary in your regular habits and diet. Change the fruitloops.
Now Bain (from Batman Begins I think or from the movie Savages...?) and Lord Humongous were working for the Spanish Inquisition or for the Gestapo but if they are working on bringing anarchy as representatives of the obvious tabloid buying majority( there is nothing wrong with that with good sports news), who is working to ensure that someone brings cooperation, civil society and common sense? There is only so much fresh air and ozone to go around.

You could probably build your own cell phone and build your own burgers...but you want uh convenience..right?

Hydrogen fuel is to be made available on mass and sold to the public at corner gas stations because you could just make a burger at home or run your ethanol(E 95 ) vehicle on moon shine or rubbing alcohol. Read Popular Science for more. T-mobile and vodaphone will be opening gas stations soon with fuel supplied by ELF BP etc straight from the Gulf of Biscay or the Bay of Biscayne. There is also a road by that name. Your phone company makes billions selling communications and signals and 3G hot air for your touch device or android; right? They will make trillions selling hot air with existing oil companies for your blue tooth enabled hands-free vehicle.

Saturday 6 July 2013

Be a parasite on the Holy Ghost.

For the parasitically emotionally dependent, the key ministry is Psalms 42 and John 4. If she breaks up and says she can't trust you when you are speaking to a good friend of your mother, she was conceived in hell. She is ill and does not know she is God's child.  You were speaking to a friend of your mother. Weren't you?  You got her a nice gift the other day and had a bible study although she struggles to accept she is God's child.  She is just a pass-time unless she really heals. It is simple enough for a child to understand. 





Jesus Talks With a Samaritan Woman

Now Jesus learned that the Pharisees had heard that he was gaining and baptizing more disciples than John although in fact it was not Jesus who baptized, but his disciples. So he left Judea and went back once more to Galilee.
Now he had to go through Samaria. So he came to a town in Samaria called Sychar, near the plot of ground Jacob had given to his son Joseph. Jacob’s well was there, and Jesus, tired as he was from the journey, sat down by the well. It was about noon.
When a Samaritan woman came to draw water, Jesus said to her, “Will you give me a drink?” (His disciples had gone into the town to buy food.)
The Samaritan woman said to him, “You are a Jew and I am a Samaritan woman. How can you ask me for a drink?” (For Jews do not associate with Samaritans.[a])
10 Jesus answered her, “If you knew the gift of God and who it is that asks you for a drink, you would have asked him and he would have given you living water.”
11 “Sir,” the woman said, “you have nothing to draw with and the well is deep. Where can you get this living water? 12 Are you greater than our father Jacob, who gave us the well and drank from it himself, as did also his sons and his livestock?”
13 Jesus answered, “Everyone who drinks this water will be thirsty again, 14 but whoever drinks the water I give them will never thirst. Indeed, the water I give them will become in them a spring of water welling up to eternal life.”
15 The woman said to him, “Sir, give me this water so that I won’t get thirsty and have to keep coming here to draw water.”
16 He told her, “Go, call your husband and come back.”
17 “I have no husband,” she replied.
Jesus said to her, “You are right when you say you have no husband. 18 The fact is, you have had five husbands, and the man you now have is not your husband. What you have just said is quite true.”
19 “Sir,” the woman said, “I can see that you are a prophet. 20 Our ancestors worshiped on this mountain, but you Jews claim that the place where we must worship is in Jerusalem.”
21 “Woman,” Jesus replied, “believe me, a time is coming when you will worship the Father neither on this mountain nor in Jerusalem. 22 You Samaritans worship what you do not know; we worship what we do know, for salvation is from the Jews. 23 Yet a time is coming and has now come when the true worshipers will worship the Father in the Spirit and in truth, for they are the kind of worshipers the Father seeks. 24 God is spirit, and his worshipers must worship in the Spirit and in truth.”
25 The woman said, “I know that Messiah” (called Christ) “is coming. When he comes, he will explain everything to us.”
26 Then Jesus declared, “I, the one speaking to you—I am he.”

A Ransom...

Jesus gave His life as a ransom so that you may have life and life more abundantly.  If Walgreen's says only three boxes on sale are allowed per family , then don't get upset. There will be another sale coming along in a few weeks anyway. Be thankful.




So, read Psalms 50 and thank God for the sunrise. Take a photo. 

Real Raw Milk-see the ads.

The right to bear arms in a 911 cell phone culture should be the central to a safe commonwealth in that the arms are should have some purpose if available. The purpose should be hunting. Fishing rods could kill people if used accordingly.  The right to real food including food produce is the whole point behind hunting and free grazing. If you buy a milk cow, you should have the right to not only drink that cow's milk but to, at some stage, cook the meat after you kill it and sell the difference to White Castle or McDonalds. The right to real food is tantamount and synonymous with the right to bear arms. You should have the right to fish.

Sunlight(TM) detergent.

No forgiveness means anger. Latent anger means war; with yourself and others. There is no war in Heaven. God forgives. He forgives you too.  Do you remember that boy or girl who took your licorice without asking and did not give it back?  How did you feel? Did they say sorry?  Buy some uh Sunlight(TM) detergent.

Friday 5 July 2013

Fuel Cell Lawn Mower..you have to water the grass anyway..and the air is so fresh;( Tide(TM) and Sunlight(TM)) fresh



Fuel Cell Lawn Mower!


Hydrogen Fuel Cell Lawn Mower..non-liquid gas-not just for heating your house and your Steinway piano.  Trust it with your lawn and not just with your pet poodle and your backside in bed at night.



If there was a message...

If Hollywood had a message right now that is resoundingly consistent, what would that be?  When I watch the movie Fire with Fire with Bruce Willis, I have no doubt. When I watch the movie Olympus, I have not even the slightest of an iota of doubt.  Someone is asking for something because it matters more than a new tv that uses mind blowing realistic LeD technology at 40% at a boxing day sale. You can watch really realistic discovery channel documentaries about the Amazon river and about Paris; such a civil and quiet place with the polite Gendarmes( good Glock 1911's as the side arm) who benefit from universal health care; like Croatians who can travel to London for a Cat Scan on the NHS at no extra charge. They can stay in a Marshall suite with the All inclusive breakfast Plan.  I think what they are asking for is a stable commonwealth(Charles Xavier and Magneto were feeling at home in upstate New York with those decidiuous trees and uh acorns)  and some sense of certainty that is a good plaid colour match for the stable infrastructure that exists for approximately a thousand miles in any direction. That is good for business.  The fear of being  a victim on the way to or inside a retail store is also good for business.  Thank God for www.amazon.com; get it?  

God of War-Wired Magazine.

 God of  War

Wired Magazine- July 2013

Illustrations by Mark Weaver, Mike Theiler/Corbis, Enzo Signorelli/Getty Images, Nick Servian/Alamy
Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.
This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. "What we see is an increasing level of activity on the networks," he said at a recent security conference in Canada. "I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in."
In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.
But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.
And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.
The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.
But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for "cyberspace operations," even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.
"We jokingly referred to him as Emperor Alexander, because whatever Keith wants, Keith gets."
Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. "We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets," says one former senior CIA official who agreed to speak on condition of anonymity. "We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else."
Now 61, Alexander has said he plans to retire in 2014; when he does step down he will leave behind an enduring legacy—a position of far-reaching authority and potentially Strangelovian powers at a time when the distinction between cyberwarfare and conventional warfare is beginning to blur. A recent Pentagon report made that point in dramatic terms. It recommended possible deterrents to a cyberattack on the US. Among the options: launching nuclear weapons.
Illustrations by Mark Weaver, John Hyde/Getty Images, Getty Images, Evgeniyozhulay/Getty Images
He may be a four-star Army general, but Alexander more closely resembles a head librarian than George Patton. His face is anemic, his lips a neutral horizontal line. Bald halfway back, he has hair the color of strong tea that turns gray on the sides, where it is cut close to the skin, more schoolboy than boot camp. For a time he wore large rimless glasses that seemed to swallow his eyes. Some combat types had a derisive nickname for him: Alexander the Geek.
Born in 1951, the third of five children, Alexander was raised in the small upstate New York hamlet of Onondaga Hill, a suburb of Syracuse. He tossed papers for the Syracuse Post-Standard and ran track at Westhill High School while his father, a former Marine private, was involved in local Republican politics. It was 1970, Richard Nixon was president, and most of the country had by then begun to see the war in Vietnam as a disaster. But Alexander had been accepted at West Point, joining a class that included two other future four-star generals, David Petraeus and Martin Dempsey. Alexander would never get the chance to serve in Vietnam. Just as he stepped off the bus at West Point, the ground war finally began winding down.
In April 1974, just before graduation, he married his high school classmate Deborah Lynn Douglas, who grew up two doors away in Onondaga Hill. The fighting in Vietnam was over, but the Cold War was still bubbling, and Alexander focused his career on the solitary, rarefied world of signals intelligence, bouncing from secret NSA base to secret NSA base, mostly in the US and Germany. He proved a competent administrator, carrying out assignments and adapting to the rapidly changing high tech environment. Along the way he picked up masters degrees in electronic warfare, physics, national security strategy, and business administration. As a result, he quickly rose up the military intelligence ranks, where expertise in advanced technology was at a premium.
In 2001, Alexander was a one-star general in charge of the Army Intelligence and Security Command, the military’s worldwide network of 10,700 spies and eavesdroppers. In March of that year he told his hometown Syracuse newspaper that his job was to discover threats to the country. "We have to stay out in front of our adversary," Alexander said. "It’s a chess game, and you don’t want to lose this one." But just six months later, Alexander and the rest of the American intelligence community suffered a devastating defeat when they were surprised by the attacks on 9/11. Following the assault, he ordered his Army intercept operators to begin illegally monitoring the phone calls and email of American citizens who had nothing to do with terrorism, including intimate calls between journalists and their spouses. Congress later gave retroactive immunity to the telecoms that assisted the government.
In 2003, Alexander, a favorite of defense secretary Donald Rumsfeld, was named the Army’s deputy chief of staff for intelligence, the service’s most senior intelligence position. Among the units under his command were the military intelligence teams involved in the human rights abuses at Baghdad’s Abu Ghraib prison. Two years later, Rumsfeld appointed Alexander—now a three-star general—director of the NSA, where he oversaw the illegal, warrantless wiretapping program while deceiving members of the House Intelligence Committee. In a publicly released letter to Alexander shortly after The New York Times exposed the program, US representative Rush Holt, a member of the committee, angrily took him to task for not being forthcoming about the wiretapping: "Your responses make a mockery of congressional oversight."
Alexander also proved to be militant about secrecy. In 2005 a senior agency employee named Thomas Drake allegedly gave information to The Baltimore Sun showing that a publicly discussed program known as Trailblazer was millions of dollars over budget, behind schedule, possibly illegal, and a serious threat to privacy. In response, federal prosecutors charged Drake with 10 felony counts, including retaining classified documents and making false statements. He faced up to 35 years in prison—despite the fact that all of the information Drake was alleged to have leaked was not only unclassified and already in the public domain but in fact had been placed there by NSA and Pentagon officials themselves. (As a longtime chronicler of the NSA, I served as a consultant for Drake’s defense team. The investigation went on for four years, after which Drake received no jail time or fine. The judge, Richard D. Bennett, excoriated the prosecutor and NSA officials for dragging their feet. "I find that unconscionable. Unconscionable," he said during a hearing in 2011. "That’s four years of hell that a citizen goes through. It was not proper. It doesn’t pass the smell test.")
But while the powers that be were pressing for Drake’s imprisonment, a much more serious challenge was emerging. Stuxnet, the cyberweapon used to attack the Iranian facility in Natanz, was supposed to be untraceable, leaving no return address should the Iranians discover it. Citing anonymous Obama administration officials, The New York Times reported that the malware began replicating itself and migrating to computers in other countries. Cybersecurity detectives were thus able to detect and analyze it. By the summer of 2010 some were pointing fingers at the US.
Natanz is a small, dusty town in central Iran known for its plump pears and the burial vault of the 13th-century Sufi sheikh Abd al-Samad. The Natanz nuclear enrichment plant is a vault of a different kind. Tucked in the shadows of the Karkas Mountains, most of it lies deep underground and surrounded by concrete walls 8 feet thick, with another layer of concrete for added security. Its bulbous concrete roof rests beneath more than 70 feet of packed earth. Contained within the bombproof structure are halls the size of soccer pitches, designed to hold thousands of tall, narrow centrifuges. The machines are linked in long cascades that look like tacky decorations from a ’70s discotheque.
To work properly, the centrifuges need strong, lightweight, well-balanced rotors and high-speed bearings. Spin these rotors too slowly and the critical U-235 molecules inside fail to separate; spin them too quickly and the machines self-destruct and may even explode. The operation is so delicate that the computers controlling the rotors’ movement are isolated from the Internet by a so-called air gap that prevents exposure to viruses and other malware.
In 2006, the Department of Defense gave the go-ahead to the NSA to begin work on targeting these centrifuges, according to The New York Times. One of the first steps was to build a map of the Iranian nuclear facility’s computer networks. A group of hackers known as Tailored Access Operations—a highly secret organization within the NSA—took up the challenge.
They set about remotely penetrating communications systems and networks, stealing passwords and data by the terabyte. Teams of "vulnerability analysts" searched hundreds of computers and servers for security holes, according to a former senior CIA official involved in the Stuxnet program. Armed with that intelligence, so-called network exploitation specialists then developed software implants known as beacons, which worked like surveillance drones, mapping out a blueprint of the network and then secretly communicating the data back to the NSA. (Flame, the complex piece of surveillance malware discovered by Russian cybersecurity experts last year, was likely one such beacon.) The surveillance drones worked brilliantly. The NSA was able to extract data about the Iranian networks, listen to and record conversations through computer microphones, even reach into the mobile phones of anyone within Bluetooth range of a compromised machine.
The next step was to create a digital warhead, a task that fell to the CIA Clandestine Service’s Counter-Proliferation Division. According to the senior CIA official, much of this work was outsourced to national labs, notably Sandia in Albuquerque, New Mexico. So by the mid-2000s, the government had developed all the fundamental technology it needed for an attack. But there was still a major problem: The secretive agencies had to find a way to access Iran’s most sensitive and secure computers, the ones protected by the air gap. For that, Alexander and his fellow spies would need outside help.
This is where things get murky. One possible bread crumb trail leads to an Iranian electronics and computer wholesaler named Ali Ashtari, who later confessed that he was recruited as a spy by the Mossad, Israel’s intelligence service. (Israel denied the claim.) Ashtari’s principal customers were the procurement officers for some of Iran’s most sensitive organizations, including the intelligence service and the nuclear enrichment plants. If new computers were needed or routers or switches had to be replaced, Ashtari was the man to see, according to reports from semi-official Iranian news agencies and an account of Ashtari’s trial published by the nonprofit Iran Human Rights Voice.
General Alexander’s EmpireThe four-star general presides over a trifecta of intelligence agencies headquartered in Fort Meade, Maryland. Here’s a guide to the alphabet soup of agency and subagency acronyms. —Cameron Bird
Photo: Ann Heisenfelt/Corbis, Illustrations: Jeremy Loyd
NSA(National Security Agency)
The nation’s largest employer of mathematicians. The Department of Defense created this agency in 1952 to intercept, collect, and decrypt foreign communications. In the past decade, the NSA poured hundreds of millions of dollars into offensive cyberwar R&D.
 
CSS(Central Security Service)
Originally envisioned as a fourth branch of the armed services, this organization is now described as a "combat support agency." It coordinates with the Army, Navy, Coast Guard, Marines, and Air Force to eavesdrop on foreign signals—like tapping into undersea cable or wireless communications.
 
USCYBERCOM(US Cyber Command)
Established by the Department of Defense in 2009 to deter cyberattacks—"proactively." In March, Alexander gave a hint of the command’s mandate to the House Armed Services Committee: "I would like to be clear that this team, this defend-the-nation team, is not a defensive team."
CAE(Centers for Academic Excellence)
Launched in 1998, this NSA initiative seeks to increase the number of college students competent in "information assurance." Last year the agency accredited four universities to lead the way in training the next generation of cyber operators in "collection, exploitation, and response."
SCS(Special Collection Service)
A unit whose existence has never been officially acknowledged by the defense establishment. But according to the accounts of an anonymous CIA official, members of the ultra-top-secret group are involved in covert eavesdropping from US embassies around the world.
JFCC-NW(Joint Functional Component Command for Network Warfare)
Created in 2005 as part of US Strategic Command, which controls the nation’s nuclear arsenal, it played a lead role in promoting the idea of thwarting Iran’s own nuclear ambitions with a cyberattack. Folded into Cybercom in 2010.
He not only had access to some of Iran’s most sensitive locations, his company had become an electronics purchasing agent for the intelligence, defense, and nuclear development departments. This would have given Mossad enormous opportunities to place worms, back doors, and other malware into the equipment in a wide variety of facilities. Although the Iranians have never explicitly acknowledged it, it stands to reason that this could have been one of the ways Stuxnet got across the air gap.
But by then, Iran had established a new counterintelligence agency dedicated to discovering nuclear spies. Ashtari was likely on their radar because of the increased frequency of his visits to various sensitive locations. He may have let down his guard. "The majority of people we lose as sources—who get wrapped up or executed or imprisoned—are usually those willing to accept more risk than they should," says the senior CIA official involved with Stuxnet. In 2006, according to Iran Human Rights Voice, Ashtari was quietly arrested at a travel agency after returning from another trip out of the country.
 
The malware targeting Iran replicated and spread to computers in other countries.
In June 2008 he was brought to trial in Branch 15 of the Revolutionary Court, where he confessed, pleaded guilty to the charges, expressed remorse for his actions, and was sentenced to death. On the morning of November 17, in the courtyard of Tehran’s Evin Prison, a noose was placed around Ashtari’s neck, and a crane hauled his struggling body high into the air.
Ashtari may well have been one of the human assets that allowed Stuxnet to cross the air gap. But he was not Israel’s only alleged spy in Iran, and others may also have helped enable malware transfer. "Normally," says the anonymous CIA official, "what we do is look for multiple bridges, in case a guy gets wrapped up." Less then two weeks after Ashtari’s execution, the Iranian government arrested three more men, charging them with spying for Israel. And on December 13, 2008, Ali-Akbar Siadat, another importer of electronic goods, was arrested as a spy for the Mossad, according to Iran’s official Islamic Republic News Agency. Unlike Ashtari, who said he had operated alone, Siadat was accused of heading a nationwide spy network employing numerous Iranian agents. But despite their energetic counterintelligence work, the Iranians would not realize for another year and a half that a cyberweapon was targeting their nuclear centrifuges. Once they did, it was only a matter of time until they responded.
Sure enough, in August 2012 a devastating virus was unleashed on Saudi Aramco, the giant Saudi state-owned energy company. The malware infected 30,000 computers, erasing three-quarters of the company’s stored data, destroying everything from documents to email to spreadsheets and leaving in their place an image of a burning American flag, according to The New York Times. Just days later, another large cyberattack hit RasGas, the giant Qatari natural gas company. Then a series of denial-of-service attacks took America’s largest financial institutions offline. Experts blamed all of this activity on Iran, which had created its own cyber command in the wake of the US-led attacks. James Clapper, US director of national intelligence, for the first time declared cyberthreats the greatest danger facing the nation, bumping terrorism down to second place. In May, the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team issued a vague warning that US energy and infrastructure companies should be on the alert for cyberattacks. It was widely reported that this warning came in response to Iranian cyberprobes of industrial control systems. An Iranian diplomat denied any involvement.
The cat-and-mouse game could escalate. "It’s a trajectory," says James Lewis, a cybersecurity expert at the Center for Strategic and International Studies. "The general consensus is that a cyber response alone is pretty worthless. And nobody wants a real war." Under international law, Iran may have the right to self-defense when hit with destructive cyberattacks. William Lynn, deputy secretary of defense, laid claim to the prerogative of self-defense when he outlined the Pentagon’s cyber operations strategy. "The United States reserves the right," he said, "under the laws of armed conflict, to respond to serious cyberattacks with a proportional and justified military response at the time and place of our choosing." Leon Panetta, the former CIA chief who had helped launch the Stuxnet offensive, would later point to Iran’s retaliation as a troubling harbinger. "The collective result of these kinds of attacks could be a cyber Pearl Harbor," he warned in October 2012, toward the end of his tenure as defense secretary, "an attack that would cause physical destruction and the loss of life." If Stuxnet was the proof of concept, it also proved that one successful cyberattack begets another. For Alexander, this offered the perfect justification for expanding his empire.
 
 
In May 2010, a little more than a year after President Obama took office and only weeks before Stuxnet became public, a new organization to exercise American rule over the increasingly militarized Internet became operational: the US Cyber Command. Keith Alexander, newly promoted to four-star general, was put in charge of it. The forces under his command were now truly formidable—his untold thousands of NSA spies, as well as 14,000 incoming Cyber Command personnel, including Navy, Army, and Air Force troops. Helping Alexander organize and dominate this new arena would be his fellow plebes from West Point’s class of 1974: David Petraeus, the CIA director; and Martin Dempsey, chair of the Joint Chiefs of Staff.
Indeed, dominance has long been their watchword. Alexander’s Navy calls itself the Information Dominance Corps. In 2007, the then secretary of the Air Force pledged to "dominate cyberspace" just as "today, we dominate air and space." And Alexander’s Army warned, "It is in cyberspace that we must use our strategic vision to dominate the information environment." The Army is reportedly treating digital weapons as another form of offensive capability, providing frontline troops with the option of requesting "cyber fire support" from Cyber Command in the same way they request air and artillery support.
All these capabilities require a giant expansion of secret facilities. Thousands of hard-hatted construction workers will soon begin erecting cranes, driving backhoes, and emptying cement trucks as they expand the boundaries of NSA’s secret city eastward, increasing its already enormous size by a third. "You could tell that some of the seniors at NSA were truly concerned that cyber was going to engulf them," says a former senior Cyber Command official, "and I think rightfully so."
In May, work began on a $3.2 billion facility housed at Fort Meade in Maryland. Known as Site M, the 227-acre complex includes its own 150-megawatt power substation, 14 administrative buildings, 10 parking garages, and chiller and boiler plants. The server building will have 90,000 square feet of raised floor—handy for supercomputers—yet hold only 50 people. Meanwhile, the 531,000-square-foot operations center will house more than 1,300 people. In all, the buildings will have a footprint of 1.8 million square feet. Even more ambitious plans, known as Phase II and III, are on the drawing board. Stretching over the next 16 years, they would quadruple the footprint to 5.8 million square feet, enough for nearly 60 buildings and 40 parking garages, costing $5.2 billion and accommodating 11,000 more cyberwarriors.
 
alexander’s forces are formidable—thousands of NSA spies, plus 14,000 cyber troops.
In short, despite the sequestration, layoffs, and furloughs in the federal government, it’s a boom time for Alexander. In April, as part of its 2014 budget request, the Pentagon asked Congress for $4.7 billion for increased "cyberspace operations," nearly $1 billion more than the 2013 allocation. At the same time, budgets for the CIA and other intelligence agencies were cut by almost the same amount, $4.4 billion. A portion of the money going to Alexander will be used to create 13 cyberattack teams.
What’s good for Alexander is good for the fortunes of the cyber-industrial complex, a burgeoning sector made up of many of the same defense contractors who grew rich supplying the wars in Iraq and Afghanistan. With those conflicts now mostly in the rearview mirror, they are looking to Alexander as a kind of savior. After all, the US spends about $30 billion annually on cybersecurity goods and services.
In the past few years, the contractors have embarked on their own cyber building binge parallel to the construction boom at Fort Meade: General Dynamics opened a 28,000-square-foot facility near the NSA; SAIC cut the ribbon on its new seven-story Cyber Innovation Center; the giant CSC unveiled its Virtual Cyber Security Center. And at consulting firm Booz Allen Hamilton, where former NSA director Mike McConnell was hired to lead the cyber effort, the company announced a "cyber-solutions network" that linked together nine cyber-focused facilities. Not to be outdone, Boeing built a new Cyber Engagement Center. Leaving nothing to chance, it also hired retired Army major general Barbara Fast, an old friend of Alexander’s, to run the operation. (She has since moved on.)
Defense contractors have been eager to prove that they understand Alexander’s worldview. "Our Raytheon cyberwarriors play offense and defense," says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for "computer network exploitation specialists." And many other companies, some unidentified, are seeking computer and network attackers. "Firm is seeking computer network attack specialists for long-term government contract in King George County, VA," one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for "attack and penetration consultants."
One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. "We’ve been very careful not to have a public face on our company," former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. "We don’t ever want to see our name in a press release," added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.
Perhaps for good reason: According to news reports, Endgame is developing ways to break into Internet-connected devices through chinks in their antivirus armor. Like safecrackers listening to the click of tumblers through a stethoscope, the "vulnerability researchers" use an extensive array of digital tools to search for hidden weaknesses in commonly used programs and systems, such as Windows and Internet Explorer. And since no one else has ever discovered these unseen cracks, the manufacturers have never developed patches for them.
 
Endgame hunts for hidden security weaknesses that are ripe for exploitation.
Thus, in the parlance of the trade, these vulnerabilities are known as "zero-day exploits," because it has been zero days since they have been uncovered and fixed. They are the Achilles’ heel of the security business, says a former senior intelligence official involved with cyberwarfare. Those seeking to break into networks and computers are willing to pay millions of dollars to obtain them.
According to Defense News’ C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clients—agencies like Cyber Command, the NSA, the CIA, and British intelligence—a unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing what’s called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city— say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Security’s No. 3 Research Institute, which is responsible for computer security—or simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies— the equivalent of a back door left open.
Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed. But such access doesn’t come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.
The buying and using of such a subscription by nation-states could be seen as an act of war. "If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it," wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. "In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war." The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. "It should be illegal," says the former senior intelligence official involved in cyberwarfare. "I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business."
Thus, in their willingness to pay top dollar for more and better zero-day exploits, the spy agencies are helping drive a lucrative, dangerous, and unregulated cyber arms race, one that has developed its own gray and black markets. The companies trading in this arena can sell their wares to the highest bidder—be they frontmen for criminal hacking groups or terrorist organizations or countries that bankroll terrorists, such as Iran. Ironically, having helped create the market in zero-day exploits and then having launched the world into the era of cyberwar, Alexander now says the possibility of zero-day exploits falling into the wrong hands is his "greatest worry."
He has reason to be concerned. In May, Alexander discovered that four months earlier someone, or some group or nation, had secretly hacked into a restricted US government database known as the National Inventory of Dams. Maintained by the Army Corps of Engineers, it lists the vulnerabilities for the nation’s dams, including an estimate of the number of people who might be killed should one of them fail. Meanwhile, the 2013 "Report Card for America’s Infrastructure" gave the US a D on its maintenance of dams. There are 13,991 dams in the US that are classified as high-hazard, the report said. A high-hazard dam is defined as one whose failure would cause loss of life. "That’s our concern about what’s coming in cyberspace—a destructive element. It is a question of time," Alexander said in a talk to a group involved in information operations and cyberwarfare, noting that estimates put the time frame of an attack within two to five years. He made his comments in September 2011.
Contributor James Bamford (washwriter@gmail.com) wrote about the NSA’s new Utah Data Center in issue 20.04.
Illustrations by Mark Weaver

Thursday 4 July 2013

Choose a good friend...

Choose a friend of the opposite gender with whom you can enjoy a 2 dvds on a Friday night.  Enjoy something edifying like Kill Bill 2, MI -1, the Crucible, The Kingdom Of Heaven or Hamlet( with Kenneth Branagh or Mel Gibson.   Get a nice take out or have a frozen pizza. Wake up and go to breakfast at I-Hop; so romantic. Show up at 9 am.  Multiply that by 52 weeks, then multiply that by three or four years and see how happy your family is. They say you are a nice looking couple. A few strangers in the mall will tell you the same thing.  Set a date and exchange nice gifts befitting to your culture( a bracelet, earrings, a ring or some bangles-did God tell you to give anybody a ring? That was many years after the beginning. Ask Abraham and Sara about his wedding registry documents. Ask yourself why Pharaoh found it necessary to ask if Sara was Abraham's wife? Her bangles had no social meaning as a sign of marital covenant).  When the auxiliary community shows up after the exchange of gfts to signify covenant( they never show up before), tell them to mind their own business and to judge their own rings or bangles and remember the woman( or 8 different women) in the mall and your pastor who told you how nice of a couple you are.  Share the popcorn and the twinkie bills.  The Auxillary community watched the first ten minutes of Sleeping Beauty but God's beauty is eternal and is never sleeping; remember  http://www.youtube.com/watch?v=MVkvzscdp1M !! 

Wednesday 3 July 2013

The Holy Ghost is the source and your Brain is the fuel cell battery...

Tuesday 2 July 2013

Confessing your faith in a good sale by looking for the sale advertisements. There will be some sign to tell you the opening hours.

There came a time in history where people could not believe that Michael Jackson, Elvis and Antonio Carlos Jobim existed. But, they kept on looking for their children and anticipating their acknowledgement and discovery.  They said it would be obvious by certain key descriptions as noted in the artist's family bibles.  Essentially they kept on confessing their faith in these musicians and their existence by looking for their children.  It's the same as confessing your faith in Christ everyday by looking for the Antichrist.

Monday 1 July 2013

Three Possibilities

There are three possibilities to our experience in eternity as follows:

1. That there is no consciousness, no recall of 10 ft memorials in your name or mind to reflect on our experience in the temporal world such that there is no thought, no painful or happy reflection, conscience, defeat or triumph on questions of morality or remembrance;

2. That there is consciousness and a constant reflection or recall of all of your experiences and contributions(or the lack thereof) and the feeling of people knowing your imprint on the experience of life(like the designer of rollerskates or the telephone) and that you will feel a cozy warmth of approval as they look at your ten ft memorial if you have one while you enjoy your eternal habitation for many many decades and that you will also feel the hurt if it is defaced by an unruly person; and

 3. The last option is that eternity is such a busy place and much more grand in terms of peace or painful in terms of anger with lots of angry other people that you will have no time or freedom of mind to worry about how people feel about you or remember you! It doesn't really matter. Jesus said the Kingdom of God is at hand if you want it. He also said the Kingdom of God is within you. You can book your eternal destination early; like you do with your travel agent. Don't lose your e-ticket. "E" stands for eternal. Copyright-Warren A. Lyon, June 2013.


 www.londiniumtvchannel.com