tag:blogger.com,1999:blog-61776431493798495382024-02-20T22:21:18.139-08:00The Good Fight News | 10 Year Anniversary Research Trends & Technology Since 2013The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.comBlogger29125tag:blogger.com,1999:blog-6177643149379849538.post-49007109140184986602021-11-12T13:18:00.028-08:002023-06-20T21:26:15.082-07:00Global Governance: Digital Dominion<p><a href="https://drive.google.com/file/d/1JGKuxbxO6ULp9vmpYkqCEr5f2jnvx0IU/view?usp=sharing" target="_blank"></a></p><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisgFWafDBZkGyJ8DWjsUCeuyJfdsfAL8DKLEWTdPkjZgRAdNS2YBrghWntwp0OUx2nC0ThrjoPu02HD9-JQSxydY4LcBrTcFmFhtXIEswWFpdfS1sJ3xtGfuKS0AXAexdSk0NeewRC3LlD/s2048/Screen+Shot+2021-11-12+at+4.12.12+PM.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="2048" data-original-width="1550" height="157" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisgFWafDBZkGyJ8DWjsUCeuyJfdsfAL8DKLEWTdPkjZgRAdNS2YBrghWntwp0OUx2nC0ThrjoPu02HD9-JQSxydY4LcBrTcFmFhtXIEswWFpdfS1sJ3xtGfuKS0AXAexdSk0NeewRC3LlD/w119-h157/Screen+Shot+2021-11-12+at+4.12.12+PM.png" width="119" /></a></div></div><a href="https://drive.google.com/file/d/1JGKuxbxO6ULp9vmpYkqCEr5f2jnvx0IU/view?usp=sharing" target="_blank"></a><p></p><p style="text-align: left;"><a href="https://drive.google.com/file/d/1JGKuxbxO6ULp9vmpYkqCEr5f2jnvx0IU/view?usp=sharing" target="_blank">Securing The Net: Global Governance in The Digital Domain</a> was a <a href="https://www.merriam-webster.com/dictionary/white%20paper" target="_blank">White Paper</a> written in September 2013. </p><p style="text-align: left;"><i><span style="font-size: small;"><span style="font-family: "MyriadPro";">This report was produced within the framework of
the Global Governance 2022 program, organized
by the Global Public Policy Institute in Berlin, in
collaboration with partner institutions in the
United States (The Brookings Institution and Princeton University), China (Tsinghua University and
Fudan University), and Germany (Hertie School of
Governance). </span></span></i></p><p style="text-align: left;"><span style="font-size: small;"><span style="font-family: "MyriadPro";">The <a href="https://www.ggfutures.net/" target="_blank">Global Governance Futures </a>Group symbiotic with the <a href="https://www.gppi.net/" target="_blank">Global Public Policy Institute(GPPi)</a> outlines Specific Methodologies and Scenarios on the Future of Cyber Risk and Governance. </span></span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic12ZW929rirFFOuSlaewV8WxNx89rS6br6ubqLRgkrtYP6ntk4uPDnw1JN6YWJITef9nkV42Z0uzsJOgUEi6V_R7QHGOac-DR4yjckQqxL9ou0VzrdMZjmnJDFujH5wJm6Af5kowzh2DB/s2048/Screen+Shot+2021-11-12+at+4.12.22+PM.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="2048" data-original-width="1624" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic12ZW929rirFFOuSlaewV8WxNx89rS6br6ubqLRgkrtYP6ntk4uPDnw1JN6YWJITef9nkV42Z0uzsJOgUEi6V_R7QHGOac-DR4yjckQqxL9ou0VzrdMZjmnJDFujH5wJm6Af5kowzh2DB/w123-h155/Screen+Shot+2021-11-12+at+4.12.22+PM.png" width="123" /></a></p><p style="text-align: left;"><span style="font-size: medium;"><b><span><span style="font-family: "MyriadPro";">The 2013 Report Outlines The Following:</span></span> </b></span></p><p style="text-align: left;"><i>"Could the Internet actually die? The path to this outcome might be precipitated by an inability to address growing mistrust, the continued existence and exploitation of major cyber vulnerabilities, and mass fear created by new kinds of cyber attacks. "</i></p><p style="text-align: left;"><i>
</i></p><div class="page" style="text-align: left;" title="Page 7">
<div class="layoutArea"><span style="font-size: medium;"><b><i>'SCENARIO 1: “CYBER DEATH” – THE END OF THE INTERNET AS WE KNOW IT'</i></b></span>
</div>
</div>
<p style="text-align: left;"><i>
</i></p><div class="page" style="text-align: left;" title="Page 7">
<div class="layoutArea">
<div class="column">
<ul style="list-style-type: none;"><li>
<p><i><span style="font-family: 'MyriadPro'; font-size: 10pt;">an “incubation period” during which steadily
growing Sino-American [CHINA-AMERICAN] tensions, an interstate
cyber incident as well as the continued militarization of cyberspace led to a gradual disconnection of various sectors of critical infrastructure from the Internet;
</span></i></p><i>
</i></li><li>
<p><i><span style="font-family: 'MyriadPro'; font-size: 10pt;">› an “outbreak phase,” in which a “tsunami” of cyber crime led to a collapse of e-commerce and
forced governments, overwhelmed by the volume of crime in cyberspace, to develop secure,
parallel network architectures that conformed
to national and regional boundaries;
</span></i></p>
</li><li><i>
</i><p><i><span style="font-family: 'MyriadPro'; font-size: 10pt;">› finally, the “passing of the ‘old’ Internet,” initiated
by Russia, China, and Germany following a global
panic during a brief period of “cyber terror.” </span></i></p><p><i><span style="font-family: 'MyriadPro'; font-size: 10pt;">
</span></i></p><div class="page" title="Page 8"><i>
</i><div class="layoutArea"><i>
</i><div class="column"><i>
</i><p><i><span style="font-family: 'MyriadPro'; font-size: 10pt;"><span style="font-size: x-small;">The collapse of e-commerce</span>, which threw the
global economy into a recession, was paired with a
global run on banks. The lack of confidence in
banks led to the withdrawal of private savings at
record levels. This near-immediate global collapse
of the financial system spurred governments to action.
</span></i></p>
</div>
</div>
</div>
</li></ul>
</div>
</div>
</div>
<p style="text-align: left;"><span style="font-size: medium;"><i><b><i> 'SCENARIO 2: “CYBER PARADISE"</i></b></i></span></p><p style="text-align: left;"><i><b><i>
</i></b></i></p><div class="page" style="text-align: left;" title="Page 10">
<div class="layoutArea">
<div class="column">
<ul style="list-style-type: none;"><li>
<p><i><span style="font-family: 'MyriadPro'; font-size: 10pt;">› bilateral and multilateral efforts between states
that ultimately led to a General Agreement on
Confidence Building in Cyberspace (GACBC);
</span></i></p><i>
</i></li><li>
<p><i><span style="font-family: 'MyriadPro'; font-size: 10pt;">› the diffusion and increased sophistication of cyber security systems/infrastructure, in particular
advanced cryptographic and “electric fence” systems;
</span></i></p>
</li><li><i>
</i><p><i><span style="font-family: 'MyriadPro'; font-size: 10pt;">› and lastly, the creation of a regime centering
around the International Cyber Security Treaty.
</span></i></p>
</li></ul>
</div>
</div>
</div><div class="page" title="Page 10"><div class="layoutArea" style="text-align: left;"><span style="font-size: x-small;"><i>As the Internet was expanded further into all aspects of daily economic and social interactions, attention to the topic by politicians and the media continued to grow. Henceforth, a conference program was initiated that included not only the US and China but also the European Union, India, Russia, and Brazil. The discussions in this “cyber club” carried over to G20 meetings, as cyber security became a priority issue in national defense.</i></span></div><div class="layoutArea"><span style="font-size: x-small;"><i> </i></span></div><div class="layoutArea"><span style="font-size: x-small;"><i><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrX_HA2mxiu0vLcUGyY8QSwzsl_lIS4q7R8wYXL7DtJl8IfphcYYmAwolqWPDssMSTElFNgnk1F88OaZCNPryYzcZjeZa6svS7fckxzg6sQpgpSJtHKM-VYCV4pgZfPxtOaQ1mVMGr6TD-/s1694/Screen+Shot+2021-11-12+at+4.10.07+PM.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1118" data-original-width="1694" height="347" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrX_HA2mxiu0vLcUGyY8QSwzsl_lIS4q7R8wYXL7DtJl8IfphcYYmAwolqWPDssMSTElFNgnk1F88OaZCNPryYzcZjeZa6svS7fckxzg6sQpgpSJtHKM-VYCV4pgZfPxtOaQ1mVMGr6TD-/w529-h347/Screen+Shot+2021-11-12+at+4.10.07+PM.png" width="529" /></a></div><br /> </i></span></div>
</div>
<p><i><b><i> </i></b> <br /></i></p><p><i> </i>As 2021 now Comes to an End we heard the Echos within IT to Safeguard our Legacy <a href="https://en.wikipedia.org/wiki/Industrial_control_system" target="_blank">Industrial Control Systems</a><i>. </i>Updating ICS and the Electrical Grid Should be a #1 Priority for National Security. Unfortunately, either from State Sponsored Actors or from Political Mismanagement, Gov'ts tend to wait for something to break before addressing issues. <a href="https://www.weforum.org/great-reset" target="_blank">The Great Reset</a> now Comes to Mind when thinking about the Future of the Internet. The Cyber Attack <a href="https://blog.checkpoint.com/2021/10/26/deepfakes-cryptocurrency-and-mobile-wallets-cybercriminals-find-new-opportunities-in-2022/" target="_blank">Trends for 2022</a> and this Next Decade will Include Attacks on our Legacy ICS and much more. Cyber Attacks are now becoming Physical. Cyber War will not only affect Data, Communications and IT Systems; in this New Age a Cyber Attack Could Result in No Power during the Winter or Gas and Energy Shortages across the Country. We saw this with the <a href="https://www.energy.gov/ceser/colonial-pipeline-cyber-incident" target="_blank">Colonial Pipe Line Hack</a>. More Ransomware Along with, IoT, Block Chain/Crypto Currency Wallet Attacks, Exchange Shutdowns and <a href="https://www.merriam-webster.com/dictionary/deepfake" target="_blank">Deepfakes</a> will be in the headlines. The Push for a New Global Internet like our now Global Economy will be at the Forefront of all Nations and the UN. The Internet has already become a vastly different place. We saw the Social Media & Banking Purge of Dissenting voices in 2018. Where Individuals, Organizations, Brands and Analytics can just be disappeared by Gatekeepers. </p><p>Will we allow the Internet and our Power Grid to just become another Policy? A Thing for Bureaucrats and so called "Experts" to Control? Something to Campaign on When it's too late?<br /></p><p>Government Failure Should Not Equal Loss of Privacy!<br /></p><p>Lets Bullet Point Some Additional Reading on These Trends.</p><h1 class="text-left"><span style="font-size: small;"><span style="font-weight: normal;"><a href="https://www.powermag.com/biden-signs-national-security-memo-addressing-industrial-control-system-cybersecurity/" target="_blank">Biden Signs National Security Memo Addressing Industrial Control System Cybersecurity </a><br /></span></span></h1><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/07/28/national-security-memorandum-on-improving-cybersecurity-for-critical-infrastructure-control-systems/" target="_blank">White House: National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems </a><h1 class="text-left"><span style="font-size: small;"><span style="font-weight: normal;"><a href="https://www.cisa.gov/publication/cisa-global" target="_blank">Cybersecurity & Infrastructure Security Agency [GLOBAL]</a></span></span><br /></h1><p><a href="https://centerforsecuritypolicy.org/situation-report-cyberattack-on-worlds-largest-meat-processor-highlights-food-system-vulnerabilities/" target="_blank">Cyber-Attack on world’s largest meat processor highlights food system vulnerabilities June 2021</a></p><p><a href="https://www.mitre.org/news/press-releases/mitre-releases-framework-for-cyber-attacks-on-industrial-control-systems" target="_blank">MITRE Framework on ICS Jan.2020</a></p><p><a href="https://www.nist.gov/speech-testimony/solarwinds-and-beyond-improving-cybersecurity-software-supply-chains" target="_blank">NIST: SolarWinds and Beyond: Improving the Cybersecurity of Software Supply Chain</a><a href="https://www.nist.gov/speech-testimony/solarwinds-and-beyond-improving-cybersecurity-software-supply-chains" target="_blank">s May 2021</a></p><p><a href="https://www.thegoodfightnews.com/2016/08/icann-and-united-nations_19.html" target="_blank">ICANN and The United Nations </a></p><p><a href="https://us-cert.cisa.gov/ics/Industrial-Control-Systems-Joint-Working-Group-ICSJWG" target="_blank"><br />Industrial Control Systems Joint Working Group (ICSJWG)</a></p><p> <a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-011a" target="_blank">CISA: Threat of Russian Attack on Critical Infrastructure </a></p><p> </p><p> <span style="font-size: large;"><b>*** UPDATES 2023***</b></span></p><p><i>We are now seeing a trends in everything I wrote at the end of 2021 coming ahead in 2023 From Power Grid Attacks to Deepfake Porn.<br /></i></p><p><a href="https://www.justice.gov/usao-wdwa/pr/two-charged-attacks-four-pierce-county-power-substations" target="_blank">FBI: Attacks on 4 Stations in 1 County</a></p><p><a href="https://www.fbi.gov/wanted/seeking-info/shooting-of-electrical-substations" target="_blank">FBI: Shootings at Sub-Stations in NC</a> </p><p><a href="https://www.justice.gov/opa/pr/former-ge-power-engineer-sentenced-conspiracy-commit-economic-espionage" target="_blank">FBI: GE Engineer Sentenced for Espionage</a></p><p><a href="https://time.com/6244977/us-power-grid-attacks-extremism/" target="_blank">TIME: Power Grid Extremist Attacks</a></p><p><a href="https://www.theguardian.com/technology/2022/nov/10/ftx-cryptocurrency-collapse-investigation" target="_blank">FTX Crypto Exchange Shutdown </a></p><p><a href="https://www.msn.com/en-us/news/politics/russian-ransomware-gang-breaches-us-energy-department-other-federal-agencies/ar-AA1cDpwI" target="_blank">Ransomware Group Breached Federal Agencies in Cyberattack</a></p><p><a href="https://www.ic3.gov/Media/Y2023/PSA230605#fna" target="_blank">FBI: A.I Deepfake Sex Extortion </a></p><p><a href="https://www.nbcnews.com/tech/internet/deepfakes-twitter-tiktok-stars-rcna87295" target="_blank">Deepfake Porn of TikTok Stars </a><br /></p><p><a href="https://www.msnbc.com/the-reidout/reidout-blog/putin-deepfake-russia-rcna88014" target="_blank">Putin Deepfake Declares Martial Law </a></p><p><a href="https://www.npr.org/2023/05/22/1177590231/fake-viral-images-of-an-explosion-at-the-pentagon-were-probably-created-by-ai" target="_blank">Deepfakes of US Pentagon Explosion Go Viral </a><br /></p><p style="text-align: right;"> </p><p style="text-align: right;"> </p><p style="text-align: right;"> </p><p style="text-align: right;"> </p><p style="text-align: right;">-Sodaghar 11/12/21 <br /> </p>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-82624852359604329162020-10-20T22:20:00.008-07:002022-04-26T21:17:24.112-07:00How to Not be Hunter Biden: A Guide to Securing Data<div><div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; text-align: left;"> <br /></div><div class="separator" style="clear: both; text-align: left;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZwJ4G3HsA5XWgBG0WrFN_lKnVbcgeIy-a_sW6rreIuBKv3pG3DsUngqkJufrSSyBzaH4ckZjR-3U4TdNW_lqmqBbMABDf9MfgaRvGxt7xOFELOoi3v9LkIHowdVILrT1L_uqqyQUNvYbc/s1766/Screen+Shot+2020-10-20+at+11.11.28+PM.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1766" data-original-width="1532" height="169" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZwJ4G3HsA5XWgBG0WrFN_lKnVbcgeIy-a_sW6rreIuBKv3pG3DsUngqkJufrSSyBzaH4ckZjR-3U4TdNW_lqmqBbMABDf9MfgaRvGxt7xOFELOoi3v9LkIHowdVILrT1L_uqqyQUNvYbc/w146-h169/Screen+Shot+2020-10-20+at+11.11.28+PM.png" width="146" /></a></div><div style="margin-left: 160px; text-align: left;"><a href="https://www.nytimes.com/2022/03/16/us/politics/hunter-biden-tax-bill-investigation.html" target="_blank">UPDATE MARCH 2022: NYT FINALLY CONFIRMS INVESTIGATION </a><br /></div><div style="margin-left: 160px; text-align: left;"> </div><div style="margin-left: 160px; text-align: left;">BREAKING: <a href="https://www.newsmax.com/newsmax-tv/photo-hunter-biden-laptop-criminal/2020/10/20/id/992958/">Rudy Giuliani has handed over the Hard Drive to Delaware State Police</a> Stating: "There's a sexual depravity to this that's disgusting," and "This is a really very, very sensitive one," We now know that the Computer and Hard Drive of Hunter Biden, the Bombshell Story by <a href="https://nypost.com/2020/10/14/email-reveals-how-hunter-biden-introduced-ukrainian-biz-man-to-dad/" target="_blank">The New York Post</a> is Confirmed and Being Investigated by Multiple Agencies including the <a href="https://www.foxnews.com/politics/fbi-purported-hunter-biden-laptop-sources">FBI</a> and <a href="https://www.hsgac.senate.gov/media/majority-media/-a-scandal-in-and-of-itself-johnson-hits-mainstream-media-for-ignoring-biden-conflicts-of-interest">Senate Homeland Security Committee</a> Director of National Intelligence John Ratcliffe also said: "Let me be clear: the intelligence community doesn't believe that [the Laptop being Russian Dis-info]
because there is no intelligence that supports that. And we have shared
no intelligence with Adam Schiff, or any member of Congress." on <a href="https://www.foxnews.com/politics/ratcliffe-hunter-biden-laptop-emails-not-russian-disinformation-campaign">FBN</a> </div></div><p style="text-align: left;">We might hear the echoes of Conspiracy around this data however, those with InfoSec/OpSec backgrounds know this data can easily be verified through metadata and forensic software like <a href="https://www.guidancesoftware.com/encase-forensic">EnCase</a> or <a href="https://distrowatch.com/table.php?distribution=deft">DEFT.</a> Also, IMO I believe that <a href="https://www.linealservices.com/what-is-the-chain-of-custody-in-digital-forensics/">Chain of Custody</a> was followed by the Shop Owner once this became his property after 90 Days. <a href="https://www.dailymail.co.uk/news/article-8841255/Man-Hunter-Bidens-emails-Trump-voter-say-told-FBI-came-him.html">He is quoted:</a> 'I think that it's not the government as an entire entity but I think
there's a history in this country of people with political motives doing
horrible things. I don't want to be on the receiving end of that.'</p><p style="text-align: left;"> </p><h4 style="text-align: left;">HOW TO NOT BE HUNTER BIDEN: <br /></h4><p style="text-align: left;">Both Windows 10 and MacOS have built in File Encryption Software for Data<br /></p><ul style="text-align: left;"><li>Both <a href="https://www.macupdate.com/blog/post/66-how-do-you-encrypt-files-folders-on-mac">FileVault & DiskUtility</a> for MacOS allow you to encrypt Files, Folders and Disk Drives. </li><li><a href="https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview">BitLocker</a> for Windows also lets you Encrypt Data at Rest and Disk Drives.<br /></li><li><a href="https://www.amherst.edu/offices/it/knowledge_base/security/set-bios-password/node/499888">Set a BIOS Password</a> - This is an easy quick option which won't let any Drives start unless a Password is entered. Less Secure because the BIOS can be flashed and reset but this requires time and physical access inside of the Computer. Also, a Disk Drive with no Encryption can just be removed and have it's Disk Image cloned.</li><li>Don't store any actual data on your physical devices. Use Cloud Services like <a href="icloud.com">iCloud</a>, <a href="dropbox.com">DropBox</a>, <a href="https://drive.google.com">Google Drive </a> </li></ul></div><p style="text-align: left;"></p><p style="text-align: left;">Remember unless you write and rewrite over data numerous times files and meta data can still be recovered from a device. <a href="https://www.blancco.com/blog-dod-5220-22-m-wiping-standard-method/">The Dept of Defense Standard</a> for wiping Data recommends rewriting over data at least 3 times while being the most secure at 7 times.<br /></p><br /><h4 style="text-align: left;">Extra Reading:</h4><ul style="text-align: left;"><li><a href="https://web.mit.edu/rhel-doc/4/RH-DOCS/rhel-sg-en-4/s1-wstation-boot-sec.html">Boot Loader Security in Linux </a></li><li><a href="https://resources.infosecinstitute.com/category/computerforensics/introduction/free-open-source-tools/">Free & Open Source Cyber Forensic Tools</a> </li></ul></div><p></p><p><br /></p><p style="text-align: right;">- Sodaghar 10/20/20<br /></p><div><br /><div><p></p><div class="separator" style="clear: both; text-align: left;"></div><p></p></div></div>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-125451221231945242016-08-19T10:19:00.006-07:002023-06-19T09:04:33.180-07:00ICANN and the United Nations<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqw_U0pBvWFqLojQIRaHmYlpRV6Od1S5E_9pL1P0eD6GzFZUx0Bnm5EQwZNrrrtZ-CUy_9HppQMBChg8-kv0n5hCgBtVoCIXTmOJqgbk_h4WcAu-AmunxqZMAm2v1X46k21FRV1aXzU9nZ/s1600/IT-Security.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqw_U0pBvWFqLojQIRaHmYlpRV6Od1S5E_9pL1P0eD6GzFZUx0Bnm5EQwZNrrrtZ-CUy_9HppQMBChg8-kv0n5hCgBtVoCIXTmOJqgbk_h4WcAu-AmunxqZMAm2v1X46k21FRV1aXzU9nZ/s320/IT-Security.jpg" width="320" /></a></div>
<a href="http://www.bbc.com/news/technology-37114313">BBC: </a><br />
The US has confirmed it is finally ready to cede power of the internet’s
naming system, ending the almost 20-year process to hand over a crucial
part of the internet's governance.<br />
<br />
In an <a href="http://www.thegoodfightnews.com/2015/11/hotspot-hotwar.html">earlier post this year</a> I wrote a little tidbit on how there is a DATA ESCROW AGENT Program. Anyone who followed that trail will know this is run by ICANN which stands for the Internet Corporation for Assigned Names and Numbers. Basically they are in charge of issuing your IP address. They control numbers, all numbers on the internet. Without an IP you don't exist on the web. In basic terms your IP links to their DNS (Domain Name System). They run the gTLD and this gives your place on the web(if they allow it). ICANN has the power to revoke your IP, NS, and DNS. In the <a href="http://www.thegoodfightnews.com/2015/11/hotspot-hotwar.html">previous article</a> I said "There is also a DATA ESCROW AGENT program which is Big Brother in the realm of Internet Protocol." And this is now more solidified through the Alliance with the UN. In their first draft from ICANN on the DATA ESCROW AGENT program back in the late nineties it was something out of a sci-fi film giving AGENTS god-like powers over IP, Spying, and Data Mining. Into other things like 'How handwritten Encryption needs to be sent back to ICANN.'<br />
<br />
DATA AGENT third parties physically have the data, physically store the data and physically send the data.<br />
<br />
All data...<br />
<br />
In the mid 2000's ICANN and <a href="http://www.ironmountain.com/Services/Technology-Escrow-Services/ICANN-Registry-and-Registrar-Data-Escrow.aspx">IRON MOUNTAIN </a>formed the agreement on the new DATA ESCROW AGENT PROGRAM. Know that a handful of people in the United States hold the Keys to the Internet and now it will be the UN and all their round tables.<br />
<br />
Below is a link to these DATA ESCROW AGENT contracts and agreements along with ICANN's full archive of data.<br />
<br /><a href="https://drive.google.com/open?id=0BwT6h7cq183IME9kV0dwQWZ1b2M">ICANN FILES</a><br />
<br />
<br />
<br />
<span style="font-family: "courier new" , "courier" , monospace;"><b><span style="font-size: xx-small;"> -SODAGHAR 8/19/16</span></b></span><br />
<br />
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-40316679029654890492016-03-11T15:11:00.001-08:002020-10-20T18:17:54.126-07:00The Open Source Intelligence Framework<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4UhVXA5llAqWwJl5n7U9iXrCdhaL8KZ5sOM03t3nu5NUX-yuspHiQu1yHgpliZoKkgNPV2TzXkHfWtyMgG45oRIH4RcXeo41350zeuHotWdf8bTVbVkt1V7ZtGBJtcIiqwRzfxuhDbus7/s1600/Screen+Shot+2016-01-18+at+5.58.49+PM.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="193" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4UhVXA5llAqWwJl5n7U9iXrCdhaL8KZ5sOM03t3nu5NUX-yuspHiQu1yHgpliZoKkgNPV2TzXkHfWtyMgG45oRIH4RcXeo41350zeuHotWdf8bTVbVkt1V7ZtGBJtcIiqwRzfxuhDbus7/s320/Screen+Shot+2016-01-18+at+5.58.49+PM.png" width="320" /></a><br />
<a href="data:image/jpeg;base64,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" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="https://en.wikipedia.org/wiki/Open-source_intelligence">Open Source Intelligence (OSINT)</a> is defined as intelligence collected from publicly available sources. In the intelligence community, the term "open" refers to overt, publicly available sources; it is not related to open-source software or public intelligence. This form of gathering and analysis of information is crucial to understand for both cyber and physical security professionals. Today I want to look at some concepts and tools used in OSINT. I'd have to write a book to cover it all so I'll touch on some basics. First, being able to gain all the knowledge on a target or organization without having the daunting task of penetrating networks and finding vulnerabilities in the machines to then exploit those machines could prove to be priceless. Using OSINT and Social Engineering tactics such as <a href="https://en.wikipedia.org/wiki/Neuro-linguistic_programming">NLP </a>and <a href="http://www.social-engineer.org/framework/influencing-others/pretexting/">Pretexting</a> can literally give you any information desired. Mix in lock picking, disguise and stealth; soon you're on the way to a road less traveled in the cyber security field. I mention Cyber Security because with <a href="http://www.cisco.com/c/en/us/solutions/internet-of-things/overview.html">The Internet of Things </a>and billions of devices online there are countless exploits and vulnerabilities. Companies hire technical auditors called <a href="https://en.wikipedia.org/wiki/Penetration_test">Pentesters or Ethical Hackers</a> to find vulnerabilities within their intranet and networks, however this only covers the technical aspect not the physical. Let's say for instance I was contracted to find the network vulnerabilities of the corporation. They are well secured with Web Application Firewalls, Mod_Security on their Apache servers to prevent SQL Injects, Reverse Proxies Load Balancers and it's just something on this given day I don't feel like spending my time on or getting the team together so what do I do? Well using OSINT I join their LinkedIn group and find out they hire a Third Party overnight Security. I also find out that there is overnight construction tasked with the new building add on set to complete next year BINGO! Now when I get to the gate I already know the names and details of the security team, their bosses, the construction crew and the foreman. "Hey sorry I'm not in the company truck today my wife is expecting any minute now, we're having a boy I'm so excited! So I'll need to be able to leave whenever. Mr. Smith (the construction foreman) is aware and they should be right behind me." This situation could of gone a million ways, I could of just used stealth and jumped the wall in a construction outfit disguise that matches the logo and design of the crew doing the work(which I found using OSINT). I could of called the Security Officer at the entrance gate on his cell phone with a spoofed number from his wife's cell phone all obtained online using OSINT told him I was a Doctor and she is critical condition and we need you to come to the hospital to sign off on surgery. Unethical, yes but you gotta be able to have the balls to do what needs to be done and a corporation like this should have protocols in place for any situation. Plus who knows once he leaves the entrance gate and finds out his wife is alive it might be the best day of his life! The point is I needed access to not only set up a router for a Man in The Middle attack(as Plan B) but because I know OSINT is greater than IT I just want to stick to my roots and dumpster dive(Plan A). Not only do I find their financial reports from last quarter. I also find the names of their internal staff, routers, ISP and other information that I'll use to eventually exploit their internal network. At the end of the day information like this can fetch a pretty penny to competitors or on the black market so don't call yourself a security professional if you only conduct audits behind a screen, you're far from it.<br />
<br />
Some basic technical skills are needed however to understand the concepts of foot printing and finger printing. If a simple <a href="http://www.ancestry.com/">ancestry.com </a>search can find your mother's maiden name, your social media profile lists your favorite things, your birthday and your children's name one can probably deduce your credit card PIN, and passwords without having to spend days using a brute force attack. Instead an attacker with this information could use a dictionary type attack giving the program being used clues and phrases that suit a specific target. These are all examples of using OSINT information that is readily available and in Open Sight. For the interest of time I'll now bullet point a list of tools and resources and you can take it from there. <br />
<br />
<br />
Remember if your attack targets in the right area, is executed properly a simple punch can be deadly. This is the power of OSINT!<br />
<br />
<br />
<br />
*Search Engines and Social Media: Sometimes a simple <a href="http://google.com/">Google</a> or <a href="http://facebook.com/">Facebook</a> search can give you all the information you need to hijack a company mixer and gain further intel. <br />
<br />
*<a href="http://www.social-engineer.org/resources/">The Social Engineering Framework</a>: Provides an outstanding collection of modern concepts and books and is really a one stop shop for all the tools you need. <br />
<br />
*<a href="https://www.shodan.io/">Shodan</a>: The Worlds first search engine that lets you find anything connected to the internet. Instead of searching for words or people you can basically search IP tables. This is an amazing resource but be warned you may be tempted by the dark side once you go there. <br />
<br />
*<a href="https://www.youtube.com/watch?time_continue=2078&v=JupQ3BpKGYg">Video</a>: The basics of Locking Picking DEFCon 13<br />
<br />
*<a href="https://www.exploit-db.com/google-hacking-database/">Google Dorking</a>: Inputting Commands into your search to reap its benefits <br />
<br />
*<a href="http://blog.dradisframework.org/">Dradis Framework</a>: Provides a centralized repository of info that you can use and share <br />
<br />
*<a href="http://www.paterva.com/web6/products/maltego.php">Maltego</a>: Focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining. <br />
<br />
*<a href="http://tineye.com/">Tineye</a>: Reverse Image lookup that crawls the web to find all online locations of an image<br />
<br />
<br />
<br />
We covered a lot in this one article and I know there is a ton of things missing but I hope this can provide you with a starting point and give you an understanding into the power Open Source Intelligence and how it impacts security in all aspects. Feel free to comment or contact me with any questions or if you have something to add.<br />
<br />
<span style="background-color: #f2f2f2; font-family: inherit; font-size: x-small;"><u><br /></u></span>
<span style="background-color: #f2f2f2; font-family: inherit; font-size: x-small;"><u><br /></u></span>
<span style="background-color: #f2f2f2; font-family: inherit; font-size: x-small;"><u>How to open locks with a Nut-wrench old school technique</u></span><br />
<span style="background-color: #f2f2f2; font-family: inherit;"><br /></span>
<br />
<div style="text-align: right;">
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dxt7VdYOR8fH4f8T_4De2RZ2_Zogb1w6yXRMK3lmBTsQZjMByVRh8ToAEG0LfSrSGysrdYlJgy1wTw-HKkdkg' class='b-hbp-video b-uploaded' frameborder='0'></iframe><span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small; text-align: right;"> <b>-SODAGHAR 1/18/16</b></span></div>
</div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-23837072879916217362016-03-10T20:12:00.002-08:002023-08-31T19:21:57.056-07:00Hotspot Hotwar<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie4UKwbUJF3fMZ15xDb8LD3Iz5jpVZFUZdAicvN389YU1YrvXytKboUZpxPQmFjIIU37xAuCqxv5wzxw7GMi7x5-Czlui8jWr3g_p6A28khJUupa8eRXKXSHXK79DqRucQo8WaP2wmm-Lr/s1600/Unknown.jpeg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie4UKwbUJF3fMZ15xDb8LD3Iz5jpVZFUZdAicvN389YU1YrvXytKboUZpxPQmFjIIU37xAuCqxv5wzxw7GMi7x5-Czlui8jWr3g_p6A28khJUupa8eRXKXSHXK79DqRucQo8WaP2wmm-Lr/s400/Unknown.jpeg" /></a><a href="https://www.blogger.com/blogger.g?blogID=6177643149379849538"></a> Most end users keep their Wi-Fi on at all times. With most devices the standard operation is to auto connect, or connect when the request is asked of it. I noticed a strange occurrence in my area; in which there are 8 xfinity hotspots within a block radius. I know COMCAST provides these to their users for the ability to connect when abroad. However seeing more than 2 in a given area seemed odd. Having curiosity I began to investigate. Before I connected I did some footprinting and noticed these 8 seemingly innocent hotspots all shared the same MAC ADDRESSES of only 3 ACCESS POINTS. One of the more odd facts is that two of the three AP's had routers which belong to AT&T. With certain tools I was able to pinpoint with precise detail the location and physical address of said Access Points. These 8 "xfinity" hotspots are all coming from the exact location and sharing the same MAC ADDRESSES of the 3 AP's there in.<br />
The security risk happens when a device connects. Immediately the device is flooded with packets which hold PAYLOADS linking to APPSFLYER.COM. These payloads are designed to to change the device DNS, backdoor the device and use it as a slave/botnet for PAY PER CLICK and other AD REVENUE AFFILIATE PROGRAMS as shown in this snippet of the payload<br />
<br />
00f0 20 42 75 69 6c 64 2f 4a 5a 4f 35 34 4b 29 0d 0a Build/J ZO54K)..<br />
0100 48 6f 73 74 3a 20 74 72 61 63 6b 2e 61 70 70 73 Host: tr ack.apps<br />
0110 66 6c 79 65 72 2e 63 6f 6d 0d 0a 41 63 63 65 70 flyer.co m..Accep<br />
0120 74 2d 45 6e 63 6f 64 69 6e 67 3a 20 67 7a 69 70 t-Encodi ng: gzip ...<br />
<br />
<br />
Further investigations shows of my DEVICE and ANY NETWORK I connected to; after receiving the PAYLOAD, would have it's DNS changed and credentials spoofed to serve the benefit of those generating ad revenue. In the simplest of terms what this means is; if the infected device or network was go to<a href="http://icann.org/" target="_blank"> https://ICANN.org</a> the traffic is rerouted and web traffic is then falsely represented generating ad and pay per click revenue for affiliates.<br />
<br />
Additionally the "xfinity" hotspot login page is SSL STRIPPED and a XSRF meaning it is an illusion of the actual site and anyone who enters their login info would have it and all data on the device compromised.<br />
<span style="font-size: x-small;"><span style="font-family: inherit; font-size: xx-small;"><i>//this is know as Drive by Pharming and </i></span><i style="font-family: inherit;">confirmed through use of the Metasploit Framework//</i></span><br /><br /><div>These are low level, affiliate, Pay Per Click, Identity Theft Criminals and Script Kiddies at best. Most people with newer, faster devices wouldn't notice payloads being unleashed upon their system. The broadcast strength is so powerful these 8 "xfinity" hotspots stretch for about 1 kilometer so even driving by, having Wi-Fi on within a few seconds you'll have connected, received the payloads and by the time you've gone up the block the signal drops and none the wiser. Even if you take certain basic security measures within system settings there is still risk.<br />
<br />
These routers are sending out ARP and WoL packets that will trick a less secure device into connecting as soon as it enters its sphere of influence. Now, by the time we're home we've ingested megabytes of payloads, trojans and any other types of Malware from operations like this or by any malicious person/s.<br />
<br />
These payloads, Cross Site Scripting and SSL exploits reach all the way to the top through allowance and negligence. Corporations, ISPs and even ICANN from a top down approach are all responsible for web crawlers, botnets and fake internet traffic.<br />
<br />
Only through education of threats and being aware of the technology around us we can be more secure in not just our own lives but of those around us.<br />
<br />
<span style="font-family: "courier new" , "courier" , monospace;">Summary:</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">*Keep Wi-Fi off</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">*Be cautious of any open networks</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">*Be security minded</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">*Be Aware</span><br />
<br />
//<br />
<br />
Below you will find a link to my google drive which has the full packet captures for you to analyze of this specific event.<br />
<a href="https://drive.google.com/folderview?id=0BwT6h7cq183IN0ZHay1oVEgwbmM&usp=sharing" target="_blank">PACKET WARS</a><br />
<br />
<br />
<span style="font-family: "courier new" , "courier" , monospace;"><span style="font-size: xx-small;"> -SODAGHAR 11/20/15 </span></span></div>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-88946144363420767402016-03-08T23:07:00.001-08:002016-03-08T23:07:58.892-08:00Guccifer Arrested <br /><br /><br /><div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH067hKUcKU57OSHAWfSsEe7lT18d_C8HHTI-ZOm9AD13FqVZ1cQb2nmespVsWgq1etv3aJcvEtlqjnV9f4lHZbxc6qJffgDIdtOPZ2Oo3fUUTSb60o5-TTUjGByVSLIDiV_uWxlrdbK9F/s1600/Screen+Shot+2016-03-09+at+2.04.10+AM.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="296" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH067hKUcKU57OSHAWfSsEe7lT18d_C8HHTI-ZOm9AD13FqVZ1cQb2nmespVsWgq1etv3aJcvEtlqjnV9f4lHZbxc6qJffgDIdtOPZ2Oo3fUUTSb60o5-TTUjGByVSLIDiV_uWxlrdbK9F/s320/Screen+Shot+2016-03-09+at+2.04.10+AM.png" width="320" /></a><a href="https://www.rt.com/usa/334846-romanian-hacker-guccifer-extradition/">RT</a>: Guccifer, the infamous Romanian hacker who accessed emails of celebrities and top US officials, will be extradited to the United States, after losing a case in his home country’s top court. <br /><br /><br />Reuters reports that Lehel will come to the US under an 18-month extradition order, following a request made by the US authorities. Details of the extradition have not been made public, however.<br /><br />Marcel Lehel, a 42-year-old hacker better known by his pseudonym “Guccifer,” achieved notoriety when he released an email with images of paintings by former President George W. Bush, including a self-portrait in a bathtub. He also hacked and published emails from celebrities Leonardo DiCaprio, Steve Martin and Mariel Hemingway.Also released were emails between former Secretary of State Colin Powell and Corina Cretu, a Romanian member of European Parliament, prompting Powell to deny that the two had had an affair.<br /><br />Perhaps most notably, Lehel was also the first source to uncover Hillary Clinton’s improper use of a private email account while she was Secretary of State, which the FBI is investigating as a potential danger to national security.<br /><br />In March 2013, the hacker released to RT and several other news outlets the <a href="https://www.rt.com/usa/clinton-emails-guccifer-benghazi-492/">four memos</a> that had been sent to Clinton from her former political adviser Sidney Blumenthal. The memos contain information regarding the September 11, 2012 attacks on the US diplomatic mission in Benghazi, Libya, as well as the January 2013 hostage crisis in In Amenas, Algeria.<br /><br />Lehel was indicted by the Department of Justice in 2014 on charges of wire fraud, unauthorized access to a protected computer, cyberstalking, aggravated identity theft and obstruction of justice.<br /><br />In 2014 a Romanian court sentenced to four years in jail for hacking into the accounts of the country’s public figures “with the aim of getting… confidential data” as well as violating his parole. He is serving three years on top of that for other hacking-related offenses. After his extradition to the US, Lehel will return to Romania to serve out his sentences there.<br /><br />The Romanian national, who goes by the pseudonym “Small Fume” in addition to Guccifer, is an unemployed taxi driver and paint salesman, and he says that he accessed the emails by using social engineering methods that included guessing the answers to security questions to access various accounts.<br /><br />"I don't oppose. I go there to United States to fight. I know what I did and this is okay with me," Guccifer <a href="http://www.thesmokinggun.com/documents/internet/hacker-guccifer-seeks-extradition-648293">said</a> in February to The Smoking Gun, where he published many of the documents he found.<br /><br />Prosecutors have said that Lehel has a “compulsive need to be famous,” according to The Register.</div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com1tag:blogger.com,1999:blog-6177643149379849538.post-40607512987949451842016-03-07T22:49:00.000-08:002018-11-20T19:20:52.849-08:00'Anonymous Conservative' Google Bar SQL Exploit <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJY9LU1sCh7dMSyUyX4y1QnxbpwS_Zcyb-tASREw4pXMpS965qDv-tTj110OVhJH-CZOlupah3LAuCgRWl2tQ2NYdxFJQOnWVG_YcWktK48vww5r35UH86q_PfhbPpA_xcr3lhyUsd7_jp/s1600/Screen+Shot+2016-01-26+at+12.43.18+AM.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="219" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJY9LU1sCh7dMSyUyX4y1QnxbpwS_Zcyb-tASREw4pXMpS965qDv-tTj110OVhJH-CZOlupah3LAuCgRWl2tQ2NYdxFJQOnWVG_YcWktK48vww5r35UH86q_PfhbPpA_xcr3lhyUsd7_jp/s320/Screen+Shot+2016-01-26+at+12.43.18+AM.png" width="320" /></a>'Anonymous Conservative' has defaced the main page of the <a href="http://2016iowacaucus.com/">Official Iowa Caucus website</a> using a <a href="http://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=21239">Google Bar SQL Inject Vulnerability </a>within The Google Toolbar Application. The group provides this message...<br />
<br />
<span style="font-size: x-small;">"<span style="font-family: "courier new" , "courier" , monospace;">The recent endorsement of Donald Trump by Sarah Palin is the final straw for our organization, The Anonymous Conservative. Every good Conservative knows that Sarah Palin is a national embarrassment and she represents everything that is wrong with America. She has failed at everything she has attempted since quitting her office as governor half way through her term. Her Anti-American, Anti-Family, Anti-Common-Sense stances have made her the laughing stock of American politics.<br /> Yet, even though Donald Trump has himself reached lower than a snake in the grass with his lies about his views on religion, abortion, health care, and Hillary Clinton, he has crawled lower. Trump has already alienated the black vote, the Hispanic vote, and a high enough percentage of the women vote to make it mathematically impossible for the GOP to win with him in 2016, but now he has let the devil back in the door by seeking and accepting the endorsement of Sara Palin.<br />We the people will not stand in silence. We, THE ANONYMOUS CONSERVATIVE, have hacked and taken over the front page of the Iowa Caucus site in hopes to reveal the truth</span>."</span><br />
<div>
<br />
<br />
Now let's get to the fun stuff, the actual coding of the attack...</div>
<div>
<br /></div>
<div>
'http://2016iowacaucus.com/wp-admin/admin-ajax.php'</div>
<div>
<br /></div>
<div>
What the <a href="https://en.wikipedia.org/wiki/Code_injection">Code Injections </a>are allowing the attacker/s to do is obtain escalated privilege on the front page that will probably be there for some time. The 'firstchild' syntax within the script allows whatever the "Admin" wants to appear first. This is a simple attack and why you should always Mod Sec and Black/White List your servers if you run an organization.</div>
<div>
<br /></div>
<div>
<div>
'<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;">function proceedWithGoogleBarInject() {</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> clearTranslateInjects();</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> var e;</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> var theBody = document.body;</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> if (theBody != null) {</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e = document.createElement("div");</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e.id = "google_translate_element";</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e = document.createElement("script");</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e.innerHTML = "function googleTranslateElementInit(){ new google.translate.TranslateElement({ pageLanguage: '" + translateFrom + "', includedLanguages: '" + translateTo + "' }); }";</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> theBody.insertBefore(e, theBody.firstChild);</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e = document.createElement("script");</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e.src = "https://translate.google.com/translate_a/element.js?cb=googleTranslateElementInit&tl=" + translateTo + "&sl=" + translateFrom + "&hl=" + translateFrom;</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> theBody.insertBefore(e, theBody.firstChild)'</span></div>
</div>
<div>
<br /></div>
<div>
Again using another Vulnerability this time it's an exploit within the <a href="https://hub.microsofttranslator.com/">Microsoft Translator Hub</a></div>
<div>
<br /></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;">'function proceedWithMicrosoftInject() {</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> clearTranslateInjects();</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> var e;</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> var theBody = document.body;</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> if (theBody != null) {</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e = document.createElement("div");</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e.id = "MicrosoftTranslatorWidget";</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e.style.cssText = "display:none!important;visibility:hidden;";</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> theBody.insertBefore(e, theBody.firstChild);</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e = document.createElement("script");</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e.type = "text/javascript";</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> e.innerHTML = "setTimeout(function(){{var s=document.createElement('script');s.type='text/javascript';s.charset='UTF-8';s.src=((location && location.href && location.href.indexOf('https') == 0)?'https://ssl.microsofttranslator.com':'http://www.microsofttranslator.com')+'/ajax/v3/WidgetV3.ashx?siteData=ueOIGRSKkd965FeEGM5JtQ**&ctf=True&ui=true&settings=auto&from=';var p=document.getElementsByTagName('head')[0]||document.documentElement;p.insertBefore(s,p.firstChild); }},0);setTimeout(function(){ Microsoft.Translator.Widget.Translate(null,'en');},5000);";</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> theBody.insertBefore(e, theBody.firstChild);</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> if (didMStranslate) {} else {</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> didMStranslate = true</span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"><br /></span></div>
<div>
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"><br /></span></div>
<div>
<br />
<br />
Never trust that which takes one political choice or ideal over another</div>
<div style="text-align: right;">
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> -SODAGHAR 1/25/16</span></div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com1tag:blogger.com,1999:blog-6177643149379849538.post-50179655536277311662016-02-17T01:55:00.000-08:002016-02-23T14:26:40.394-08:00Apple Ordered to Hack Users<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkySufOohPmcZX2ZjBvlRUtZIKKtgtX1oTpTalO9Z6A9SZnsEMAzaNaalBgpMlXf3_pahLIIImk_SRlnMEjsq9P981_zCILysX7fpFHXx3y-nbfVJOXqmnaTBqgD-3XgC3N3Flz6rWpMMu/s1600/Screen+Shot+2016-02-17+at+4.50.24+AM.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkySufOohPmcZX2ZjBvlRUtZIKKtgtX1oTpTalO9Z6A9SZnsEMAzaNaalBgpMlXf3_pahLIIImk_SRlnMEjsq9P981_zCILysX7fpFHXx3y-nbfVJOXqmnaTBqgD-3XgC3N3Flz6rWpMMu/s320/Screen+Shot+2016-02-17+at+4.50.24+AM.png" width="320" /></a> A Federal <a href="http://www.latimes.com/local/lanow/la-me-ln-fbi-apple-san-bernardino-phone-20160216-story.html">Judge has ordered Apple</a> to comply with the FBI in decrypting their own intellectual property in regards to the San Bernardino terrorism case.<br />
<br />
“Apple has the exclusive technical means which would assist the government in completing its search, but has declined to provide that assistance voluntarily.” Said U.S Attorney Eileen Decker.<br />
<br />
Yes lets tell the world our own FBI is to incompetent to find other work arounds within <a href="http://www.mobiledit.com/forensic-solutions">Mobile Forensics</a> such as Cloning and <a href="https://drive.google.com/file/d/0BwT6h7cq183IRkVBLVcteWpJV2s/view?usp=sharing">Over the Air techniques</a>; instead lets force a company which prides itself on its users privacy to go against their own ethics. Apple CEO <a href="https://en.wikipedia.org/wiki/Tim_Cook">Tim Cook</a> told the FBI to get lost in a<a href="http://www.apple.com/customer-letter/"> Customer Letter</a> released Tuesday. I want to personally thank Tim Cook for the appeal because anyone with a a clear understanding of Information Security knows that once you create a backdoor eventually we ALL obtain that backdoor. This is the nature of Cyberspace and this Gov't needs to step its game up if it wants to be relevant in defense because the next major wars will be Cyber Wars. This will also set a precedent for other Governments around the world to court order not just Apple but any company on their intellectual property.<br />
Apple I really hope you stay the course, provide no quarter and continue to Fight The Good Fight. You will have the support of all privacy advocates such as myself and the <a href="https://www.eff.org/deeplinks/2016/02/eff-support-apple-encryption-battle">Electronic Frontier Foundation</a><br />
<br />
"EFF applauds Apple for standing up for real security and the rights of its customers. We have been <a href="https://www.eff.org/cases/bernstein-v-us-dept-justice">fighting to protect encryption</a>, and stop backdoors, for over 20 years. That's why EFF plans to file an amicus brief in support of Apple's position."<br />
<div>
<br /></div>
<div>
Here is the statement release by Tim Cook, it couldn't of been said better....</div>
<div>
<br /></div>
<i><span style="font-size: x-small;">"February 16, 2016A Message to Our Customers<br /><br />The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand. <br /><br />This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.<br /><br />The Need for Encryption<br /><br />Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.<br /><br />All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.<br /><br />Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.<br /><br />For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.<br /><br />The San Bernardino Case<br /><br />We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.<br /><br />When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.<br /><br />We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.<br /><br />Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.<br /><br />The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.<br /><br />The Threat to Data Security<br /><br />Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.<br /><br />In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.<br /><br />The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.<br /><br />The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.<br /><br />We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.<br /><br />A Dangerous Precedent<br /><br />Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.<br /><br />The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.<br /><br />The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.<br /><br />Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.<br /><br />We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.<br /><br />While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect."</span></i><br />
<div>
<i><span style="font-size: x-small;"><br /></span></i>
UPDATE* FBI already screwed up by <a href="http://www.businessinsider.com/fbi-confirms-shooters-icloud-password-reset-2016-2?op=1">resetting iCloud Password</a><br />
<i><span style="font-size: x-small;"><br /></span></i></div>
<div>
<i><span style="font-size: x-small;"><br /></span></i></div>
<div style="text-align: right;">
<i style="font-size: small;"> </i><span style="font-size: xx-small;"><b>-SODAGHAR 2/17/16</b></span></div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-78443182197959164432016-02-11T01:22:00.001-08:002018-11-20T19:38:49.710-08:00Intelligence Chief: Spy using IoT <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifBBU2d3xzNcqPtqYJuXGiqqjGa7q58tOjO3Ku-qUqX9khltwNRBmLVkiZV7RwAeZx6_AzWTJwZRliPTPPBLYT8sI1ny3_Lfnn4Mc_QuG_K3eS-2OKAX7Iycal7a0FZJedibpjSsng_Xyu/s1600/Screen+Shot+2016-02-11+at+4.34.31+AM.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="274" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifBBU2d3xzNcqPtqYJuXGiqqjGa7q58tOjO3Ku-qUqX9khltwNRBmLVkiZV7RwAeZx6_AzWTJwZRliPTPPBLYT8sI1ny3_Lfnn4Mc_QuG_K3eS-2OKAX7Iycal7a0FZJedibpjSsng_Xyu/s320/Screen+Shot+2016-02-11+at+4.34.31+AM.png" width="320" /></a><br />
<a href="https://en.wikipedia.org/wiki/James_R._Clapper">James Clapper</a> the Director of National Intelligence <a href="http://techcrunch.com/2016/02/10/iot-could-be-used-to-spy-admits-james-clapper/?ncid=rss">told a Senate Panel Tuesday</a>:<br />
<br />
“In the future, intelligence services might use the [Internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,”<br />
<br />
<a href="https://en.wikipedia.org/wiki/Internet_of_Things">The Internet of Things</a> (IoT) is the network of devices that communicate with each other and have networking capabilities like your smart phone controlling your smart appliances or new cars that are capable of WiFi access.<br />
<br />
<br />
Samsung quickly made changes to its privacy policy when it told users their <a href="http://www.huffingtonpost.com/2015/02/09/your-samsung-tv-is-spying-on-you_n_6647762.html">smart televisions will pick up audio and video and share that information. </a><br />
<div>
<br />
As you read this I’m sure for most of you there is no shock that a retired lieutenant general and director of the Defense Intellegince Agency such as James Clapper would say such things. </div>
<div>
Back in 2013 during the Edward Snowden revelations of Government Spying <a href="http://www.thegoodfightnews.com/2013/12/spy-nation.html">I wrote</a> how the NSA collects Billions of Emails, Calls and other data on a daily basis. So yea, just like you there is no shock anymore on what Big Brother is capable of. </div>
<div>
All this data collection didn’t stop the horrible events in Paris nor did it stop the radicals in San Bernardino while we have the <a href="http://www.usatoday.com/story/news/2016/02/09/fbi-says-san-bernardino-terrorists-phone-still-locked-due-encryption/80074292/">FBI Director James Comey begging</a> for the end of encryption because they are to incompetent to crack the code. Is this a joke? We’ll keep our encryption, Thanks. </div>
<div>
<br /></div>
<div>
This next decade will see the biggest advancement of technology ever witnessed by our species and we will literally be in the Age of Information where everything will be known. From self driving cars becoming a reality to <a href="http://www.usatoday.com/story/cruiselog/2014/11/01/quantum-robot-bar-cruise/18308319/">cruise ships right now with robotic bartenders</a>. Next year the first Robotic Kitchens will hit the market to cook for you. </div>
<div>
<iframe allowfullscreen="" frameborder="0" height="222" src="https://www.youtube.com/embed/BSBTCOEdLkA" width="444"></iframe>
<br />
<br /></div>
<div>
The United States has <a href="https://secure.marketwatch.com/story/there-are-now-260000-robots-working-in-us-factories-2016-02-10">260,000 robot factory workers</a>. So while yuppies debate a minimum wage increase I wonder about the <a href="http://www.techinsider.io/robots-in-warehouses-for-online-shopping-2016-1">millions of jobs</a> about be lost.<br />
<br />
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> -SODAGHAR 2/11/16</span></div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-42435376416552758072015-11-19T13:29:00.002-08:002022-04-27T04:31:58.492-07:00WikiLeaks vs Cryptome<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="data:image/jpeg;base64,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" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoOsfTEpNMftYXWEMyZbWrPLsjuRUGcikjKCDnKq1EIPh7FW_rViaGFrdpLdvHUwXgs5v6-IBA7y-OSy9GQfFzOK83MZ5Hnr-Pcw1bwizaK3W0Tikl2W5DLODZrmI4DBUTa9-_YwnXqKoK/s1600/Screen+Shot+2016-01-31+at+6.34.32+AM.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="76" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoOsfTEpNMftYXWEMyZbWrPLsjuRUGcikjKCDnKq1EIPh7FW_rViaGFrdpLdvHUwXgs5v6-IBA7y-OSy9GQfFzOK83MZ5Hnr-Pcw1bwizaK3W0Tikl2W5DLODZrmI4DBUTa9-_YwnXqKoK/s320/Screen+Shot+2016-01-31+at+6.34.32+AM.png" width="320" /></a></div>
<br />
From: nobody<br />
Subject: Wikileaks honeypot/SAIC whistlebreaker update<br />
Date: Fri, 30 Oct 2015 16:56:29 +0100 (CET)
<br />
Wikileaks is not offering a search of Cryptome - the files are hosted on
their server as a honeypot for snatching user data for who knows what.
<br />
There are subtle sneaky differences that give it away.
<br />
Look at the html source code for
<a href="https://cryptome.wikileaks.org/frontpage">https://cryptome.wikileaks.org/frontpage</a>
and
<a href="https://cryptome.org/">https://cryptome.org</a>.
Why the code changes? What else is different?
<br />
Look at the SSL certs, the WL mirror uses its own and its own SSL crypto.
May not even be valid certs.
<br />
<a href="http://www.computing.co.uk/ctg/news/2430138/fake-banking-websites-issued-with-ssl-certificates-by-symantex-comodo-and-godaddy">http://www.computing.co.uk/ctg/news/2430138/fake-banking-websites-issued-with-ssl-certificates-by-symantex-comodo-and-godaddy</a>
<br />
and
<br />
<a href="http://www.pcworld.com/article/2999146/encryption/google-threatens-action-against-symantec-issued-certificates-following-botched-investigation.html">http://www.pcworld.com/article/2999146/encryption/google-threatens-action-against-symantec-issued-certificates-following-botched-investigation.html</a><br />
<br />
Look at the traceroutes. <br />
<br />
traceroute to cryptome.wikileaks.org (195.35.109.44), 20 hops max, 40 byte
packets<br />
1 208.64.252.229.uscolo.com (208.64.252.229) 0.409 ms
0.454 ms 0.545 ms<br />
2 199.197.11.45.uscolo.com (199.197.11.45) 0.550 ms
0.594 ms 0.599 ms<br />
3 199.197.10.25.uscolo.com (199.197.10.25) 1.133 ms
0.889 ms 1.161 ms<br />
4 31.217.128.5 (31.217.128.5) 0.412 ms 0.453 ms
0.456 ms<br />
5 s1.eq1.ams.ixreach.com (91.196.186.78) 66.691 ms
66.711 ms 66.722 ms<br />
6 91.196.187.50 (91.196.187.50) 158.441 ms 158.423
ms 175.391 ms<br />
7 r2.thn.lon.ixreach.com (91.196.184.182) 164.760 ms
164.769 ms 164.755 ms<br />
8 r1.tc2.ams.ixreach.com (91.196.184.138) 169.547 ms
170.111 ms 169.575 ms<br />
9 blix.telecity5.nl-ix.net (193.239.116.75) 195.183 ms
195.550 ms 195.450 ms<br />
10 te-9-1.dig-osl.blix.com (31.169.49.33) 195.238 ms 195.390
ms 195.433 ms<br />
11 po-8.hmg-osl.blix.com (31.169.49.90) 195.161 ms 195.315
ms 195.414 ms<br />
12 po-2.sa-hmg-osl.blix.com (178.255.145.162) 196.934 ms
196.696 ms 195.632 ms
<br />
traceroute to cryptome.org (209.17.116.160), 20 hops max, 40 byte packets<br />
1 208.64.252.229.uscolo.com (208.64.252.229) 0.382 ms
0.435 ms 0.480 ms<br />
2 199.197.10.6.uscolo.com (199.197.10.6) 0.743 ms
0.802 ms 0.811 ms<br />
3 199.197.10.25.uscolo.com (199.197.10.25) 0.984 ms
1.026 ms 0.979 ms<br />
4 c-5-144-66-207.lax.ca.wolfe.net (207.66.144.5) 0.904
ms 1.056 ms 1.109 ms<br />
5 ACCRETIVE-T.edge2.Atlanta4.Level3.net (4.53.238.38) 52.495
ms 52.515 ms 52.716 ms<br />
6 xe-9-2-2.edge2.Atlanta4.Level3.net (4.53.238.37) 50.834
ms 50.917 ms 51.021 ms<br />
7 vl-3518.car2.Atlanta1.Level3.net (4.69.206.25) 51.413
ms 51.295 ms 51.472 ms<br />
8 FIDELITY-IN.car2.Atlanta1.Le<a class="rg_l" href="http://www.google.com/imgres?imgurl=https://cryptome.org/cryptome-01.jpg&imgrefurl=https://cryptome.org/2013/11/snowden-tally.htm&h=208&w=694&tbnid=a0uevJkUwEatpM:&docid=4wlLSc7vLhNJvM&ei=vT5OVvfSIcex-QHs84pw&tbm=isch&client=iceweasel-a&ved=0CB0QMygAMABqFQoTCLel3-a2nckCFcdYPgod7LkCDg" style="height: 107px; left: 0px; width: 346px;"></a><br />
<div class="_aOd rg_ilm">
<div class="rg_ilmbg">
<a class="rg_l" href="http://www.google.com/imgres?imgurl=https://cryptome.org/cryptome-01.jpg&imgrefurl=https://cryptome.org/2013/11/snowden-tally.htm&h=208&w=694&tbnid=a0uevJkUwEatpM:&docid=4wlLSc7vLhNJvM&ei=vT5OVvfSIcex-QHs84pw&tbm=isch&client=iceweasel-a&ved=0CB0QMygAMABqFQoTCLel3-a2nckCFcdYPgod7LkCDg" style="height: 107px; left: 0px; width: 346px;"><span class="rg_ilmn"> 694 × 208 - cryptome.org </span></a></div>
</div>
vel3.net (4.71.22.42) 52.250
ms 52.286 ms 52.300 ms<br />
9 (209.17.112.46) 51.437 ms (209.17.112.42)
51.840 ms 51.962 ms<br />
10 209.17.116.160 (209.17.116.160) 52.003 ms 52.281 ms
51.944 ms
<br />
The fellow that told me about his whistlebreaker project isn't here anymore.
Only a sub-subcontractor here for one phase of a project, paid from a special
fund. Friend says he had no HR records except his checks and security info.
<br />
Talk to Wikileaks, find out whos idea it was and who executed it. Snake oilers.
<br />
<br />
//<br />
<br />The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-35969934243544641372015-10-06T15:21:00.001-07:002020-10-20T19:20:40.805-07:00Operation Fox News<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvEWbZQOk1w00NoUkqdwL9OVkbqjRASTSELljH4wDsyraK5kc6TpFih1LVT9Ec_fBw6fFt649PFJzfW-0a0HxWhAHA88Lu30hZkmGt5X4pVB6bh9U8kbSxLbCmID5-dTgSjQ4A-qNFGYBr/s1600/1003599_881765155273133_3917207684559238910_n.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvEWbZQOk1w00NoUkqdwL9OVkbqjRASTSELljH4wDsyraK5kc6TpFih1LVT9Ec_fBw6fFt649PFJzfW-0a0HxWhAHA88Lu30hZkmGt5X4pVB6bh9U8kbSxLbCmID5-dTgSjQ4A-qNFGYBr/s320/1003599_881765155273133_3917207684559238910_n.png" width="320" /></a><span aria-label="hashtag"><a data-ft="{"tn":"*N","type":104}" href="https://www.facebook.com/hashtag/opfox?source=feed_text&story_id=1063345197062791"></a></span><span aria-label="hashtag"><a data-ft="{"tn":"*N","type":104}" href="https://www.facebook.com/hashtag/opfox?source=feed_text&story_id=1063345197062791">#</a></span><a data-ft="{"tn":"*N","type":104}" href="https://www.facebook.com/thegoodfightnews"><span aria-label="hashtag"></span>OpFoxNews </a> <a data-ft="{"tn":"*N","type":104}" href="https://www.facebook.com/hashtag/letranddebate?source=feed_text&story_id=1063345197062791"><span aria-label="hashtag">#StandwithRand</span></a> FOX decided to cut Rand Paul from the main debate. They did this same thing to his father and I for one won't allow the dinosaur media to control what we can and can't hear any longer. Rand Paul is polling Higher than that one big guy, Jeb Bush, and Kasich (who I just now heard of) <a href="https://www.facebook.com/MorningJoe/videos/10153838689918762/">Rand Paul is polling 5th/6th Nationally</a>, Has 1000 precinct chairs in Iowa and met all the criteria for the <a data-ft="{"tn":"*N","type":104}" href="https://www.facebook.com/hashtag/gopdebate?source=feed_text&story_id=1063345197062791"><span aria-label="hashtag">#</span>GOPDEBATE</a> on the 14th. The past has a way of repeating itself. Fox <a href="http://www.newsmax.com/Headline/paul-fox-debate/2008/01/06/id/322574/">excluded his father Ron Paul from debates</a> they are now doing the same to <a data-hovercard="/ajax/hovercard/page.php?id=54172246106" href="http://finance.yahoo.com/news/rand-paul-declares-war-media-171019218.html">Rand Paul</a>. I have a rule. When the media starts to silence a person it means that person is doing something correct and they are scared of the message. Rand Paul is a <a href="http://www.cnn.com/2015/05/20/politics/rand-paul-filibuster-patriot-act-nsa-surveillance/index.html">champion against the NSA and the Patriot Act</a> and the only candidate on both sides talking about peace through diplomacy so I'll champion him with Open Source Intelligence!</div>
<div>
</div>
<div>
So here's a list of Corporate Phone Numbers and Emails, DNS, Apache Servers and a plethora of other information concerning <a data-hovercard="/ajax/hovercard/page.php?id=15704546335" href="https://drive.google.com/file/d/0BwT6h7cq183IeTdvRWM3VVRBMVE/view?usp=sharing">Fox News</a>. This is all information on the public domain ~_^. I did my part. Now do yours. The media is the Fourth Branch of gov't and if we continue to allow it control the message, who can and can't speak then soon the only voice left will be theirs.<br />
<br /></div>
<div>
This is <a data-ft="{"tn":"*N","type":104}" href="https://www.facebook.com/hashtag/infowars?source=feed_text&story_id=1063345197062791"><span aria-label="hashtag">#</span>infowar</a> !<br />
<br /></div>
<div>
</div>
<div>
/*Corporate Phones*/</div>
<div>
+1 212 601 7000</div>
<div>
+1 877 367 2526</div>
<div>
+1 888 788 9910</div>
<div>
+1 678 942 3158</div>
<div>
+1 212 301 3320</div>
<div>
+1 866 868 6861</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
+1 866 408 7669</div>
<div>
+1 888 672 1411</div>
<div>
+1 212 301 3000</div>
<div>
+1 888 369 4762</div>
<div>
+1 760 757 3560</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
+1 339 186 7544</div>
<div>
+1 215 627 6005</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
/*Corporate Emails*/</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
david@robertson.foxnews.com</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
online@news.com.au</div>
<div>
yourcomments@foxnews.com</div>
<div>
contribute@beforeitsnews.com</div>
<div>
http://video.foxnews.com/?</div>
<div>
fox@megansafox.com</div>
<div>
foxnewsonline@foxnews.com</div>
<div>
discussions@silive.com</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
videos@foxnews.com</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
me@example.com</div>
<div>
ldepartment@foxnews.com</div>
<div>
website@www.adr.org</div>
<div>
newsmanager@foxnews.com</div>
<div>
julie@revelantwriting.com</div>
<div>
closedcaptioning@foxnews.com</div>
<div>
foxnewsonline@foxnews.com</div>
<div>
deleteaccount@foxnews.com</div>
<div>
you@domain.com</div>
<div>
more@maxim.com</div>
<div>
penelope@x17online.com</div>
<div>
foxnewssunday2@foxnews.com</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<br /></div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<br /></div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
admin.newsletters.foxnews.com</div>
<div>
66.230.192.0-66.230.223.255</div>
<div>
66.230.193.66</div>
<div>
66.230.193.0-66.230.193.255</div>
<div>
66.230.193.65</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<br /></div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
Apache</div>
<div>
Apache Tomcat Coyote</div>
<div>
66.230.193.66</div>
<div>
email.foxnews.com</div>
<div>
66.230.193.65</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<br /></div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
Omniture Adobe Test and Target</div>
<div>
23.3.98.74</div>
<div>
23.3.98.51</div>
<div>
jQuery</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<br /></div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
en.hao123.com</div>
<div>
video.latino.foxnews.com</div>
<div>
magazine.foxnews.com</div>
<div>
radio.foxnews.com</div>
<div>
nomoremister.blogspot.com</div>
<div>
usw1.akam.net - FIREWALL</div>
<div>
video.foxnews.com</div>
<div>
dns.tpa.foxnews.com- FIREWALL</div>
<div>
feeds.foxnews.com</div>
<div>
ns1-253.akam.net -FIREWALL</div>
<div>
usw3.akam.net</div>
<div>
shop.foxnews.com</div>
<div>
nation.foxnews.com</div>
<div>
www.best918.com</div>
<div>
usc4.akam.net -FIREWALL</div>
<div>
usc2.akam.net -FIREWALL</div>
<div>
metrics.foxnews.com</div>
<div>
foxnews.com</div>
<div>
interactive.foxnews.com</div>
<div>
helpingheroeswork.foxnews.com</div>
<div>
www.laughatliberals.com</div>
<div>
ns1-157.akam.net -FIREWALL</div>
<div>
www.rebelmouse.com</div>
<div>
press.foxnews.com</div>
<div>
asia3.akam.net -FIREWALL</div>
<div>
www.greenecountymo.org</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<br /></div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
/*FIREWALL IPv4 and Endpoints*/</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
a23-78-222-115.deploy.static.akamaitechnologies.com (<a href="http://23.78.222.115/" target="_blank">23.78.222.115</a>) </div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
netrange: <a href="http://23.72.0.0/" target="_blank">23.72.0.0</a> -<u> </u><a href="http://23.79.255.255/" target="_blank">23.79.255.255</a><br />
| netname: AKAMAI<br />
| orgname: Akamai Technologies, Inc.</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
firewall1.tpa.foxnews.com</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
firewall1.tpa.foxnews.com</div>
<div>
video.foxnews.com</div>
<div>
2.22.234.89</div>
<div>
upload.foxnews.com</div>
<div>
video.imag.foxnews.com</div>
<div>
brocade2.tpa.foxnews.com</div>
<div>
beta.webfarm.tpa.foxnews.com</div>
<div>
ns1-253.akam.net</div>
<div>
1.tpa.foxnews.com</div>
<div>
usw3.akam.net</div>
<div>
us.foxnews.com</div>
<div>
response.foxnews.com</div>
<div>
2.22.234.154</div>
<div>
165.254.155.67</div>
<div>
usc4.akam.net</div>
<div>
insider.foxnews.com</div>
<div>
feeds.foxnews.com</div>
<div>
125.56.201.115</div>
<div>
mail2.foxnews.com</div>
<div>
mysql.tpa.foxnews.com</div>
<div>
nation.foxnews.com</div>
<div>
107.14.45.81</div>
<div>
rwtest.foxnews.com</div>
<div>
2.22.234.83</div>
<div>
107.14.34.153</div>
<div>
origin-4.tpa.foxnews.com</div>
<div>
165.254.42.80</div>
<div>
165.254.27.80</div>
<div>
usw1.akam.net</div>
<div>
firewall2.tpa.foxnews.com</div>
<div>
mailout1.foxnews.com</div>
<div>
dns.tpa.foxnews.com</div>
<div>
66.230.193.2</div>
<div>
fn-hp-origin.tpa.foxnews.com</div>
<div>
165.254.34.232</div>
<div>
usc2.akam.net</div>
<div>
latino.foxnews.com</div>
<div>
2.20.142.253</div>
<div>
dns.tpa.foxnews.com</div>
<div>
media.foxnews.com</div>
<div>
2.22.234.137</div>
<div>
199.117.103.121</div>
<div>
ns1-157.akam.net</div>
<div>
magazine.foxnews.com</div>
<div>
drupal7test.tpa.foxnews.com</div>
<div>
asia3.akam.net</div>
<div>
video.insider.foxnews.com</div>
<div>
165.254.155.81</div>
<div>
14.200.100.16</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
mail3.foxnews.com</div>
<div>
response.foxnews.com</div>
<div>
ftp.newsletters.foxnews.com</div>
<div>
help.foxnews.com</div>
<div>
breakingnews1.foxnews.com</div>
<div>
.foxnews.com</div>
<div>
video.imag.foxnews.com</div>
<div>
sb11.tpa.foxnews.com</div>
<div>
business.foxnews.com</div>
<div>
ardomeva.foxnews.com</div>
<div>
broadband.foxnews.com</div>
<div>
api.foxnews.com</div>
<div>
qa.foxnews.com</div>
<div>
1.tpa.foxnews.com</div>
<div>
breakingnews2.foxnews.com</div>
<div>
a57.foxnews.com</div>
<div>
nation.foxnews.com</div>
<div>
live.foxnews.com</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
foxnewsonline@foxnews.com</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<br /></div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
/*Standalone Servers & Traceroute*/</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
www.foxnews.com</div>
<div>
96.17.10.48</div>
<div>
email.foxnews.com</div>
<div>
storage.foxnews.com</div>
<div>
96.17.10.41</div>
<div>
ads.foxnews.com</div>
<div>
storage.foxnews.com</div>
<div>
blogs.foxnews.com</div>
<div>
careers.foxnews.com</div>
<div>
email.foxnews.com</div>
</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<br /></div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
/#APACHE*/</div>
<div style="font-family: HelveticaNeue; font-size: 12px;">
<div>
www.pagesinventory.com</div>
<div>
www.skymem.com</div>
<div>
Tampa, United States</div>
<div>
64.26.30.0-64.26.31.255</div>
<div>
Apache Tomcat Coyote</div>
<div>
United States</div>
<div>
66.230.239.234</div>
<div>
66.230.239.240</div>
<div>
66.230.193.0-66.230.193.255</div>
<div>
30217</div>
<div>
66.230.239.237</div>
<div>
66.230.224.0-66.230.239.255</div>
<div>
66.230.239.235</div>
<div>
63.208.1.0-63.208.1.255</div>
<div>
66.230.192.0-66.230.223.255</div>
<div>
66.230.239.236</div>
<div>
64.41.94.0-64.41.95.255</div>
<div>
64.41.82.0-64.41.83.255</div>
<div>
66.230.193.65</div>
<div>
64.26.29.0-64.26.29.255</div>
<div>
66.230.239.248</div>
<div>
66.230.239.239</div>
<div>
64.41.92.0-64.41.92.255</div>
<div>
66.230.193.66</div>
<div>
66.230.239.238</div>
<div>
66.230.239.247</div>
<div>
64.23.0.0-64.23.127.255</div>
<div>
charles@city-guide.com</div>
<div>
8.6.220.0-8.6.223.255</div>
<div>
+1 813 676 6666</div>
<div>
64.41.97.0-64.41.97.255</div>
<div>
admin.newsletters.foxnews.com</div>
<div>
63.91.157.0-63.91.157.255</div>
<div>
www.domain2008.com</div>
<div>
64.41.88.0-64.41.91.255</div>
<div>
64.41.84.0-64.41.87.255</div>
<div>
66.230.239.233</div>
<div>
66.230.239.245</div>
<div>
66.230.239.246</div>
</div>
<div style="text-align: center;">
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"><span class="text_exposed_show" style="color: #141823; display: inline;"></span> </span></div>
<div style="text-align: center;">
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"><br /></span></div>
<div style="text-align: center;">
<span style="font-family: "courier new" , "courier" , monospace; font-size: xx-small;"> - SODAGHAR 1/12/16</span></div>
<div>
<br /></div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-90741871503580029822015-03-30T18:04:00.001-07:002016-02-13T10:01:01.890-08:00Anonymous Vows Cyber Holocaust on Israel <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEmUrHaf1C9ULH0cXngM3-E67K3ONWZmhnvXWgbacKT5_MROBm-rqkTxr0MuCQz9BJRsema0tuWp5_7unr3PbyFLTUUkTSt_j9MNz958LPdWGkpoTatMvfwNGPlBOsnyApAH_lQdaKWrrG/s1600/Bv19iq6CEAAlRON.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEmUrHaf1C9ULH0cXngM3-E67K3ONWZmhnvXWgbacKT5_MROBm-rqkTxr0MuCQz9BJRsema0tuWp5_7unr3PbyFLTUUkTSt_j9MNz958LPdWGkpoTatMvfwNGPlBOsnyApAH_lQdaKWrrG/s1600/Bv19iq6CEAAlRON.jpg" height="240" width="320"></a><em style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 15.001501083374px; line-height: 21.0021018981934px; margin: 0px; padding: 0px; vertical-align: baseline;"></em><br>
<em style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 15.001501083374px; line-height: 21.0021018981934px; margin: 0px; padding: 0px; vertical-align: baseline;"><em style="font-size: 15.001501083374px; line-height: 21.0021018981934px; margin: 0px; padding: 0px; vertical-align: baseline;">“As we did many times, we'll take down your servers, government websites, Israeli military websites, banks, and public institutions. We’ll erase you from cyber-space as we have every year, 7 April 2015, will be an electronic holocaust,”</em></em><br>
<br>
<span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 15.001501083374px; line-height: 21.0021018981934px;"><br></span><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 15.001501083374px; line-height: 21.0021018981934px;"><br></span><span style="background-color: white; font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15.001501083374px; line-height: 21.0021018981934px;">Dubbed 'OpIsrael' the Hacker group stated it will "erase Israel from cyberspace" for crimes against humanity on the Palestinian people. This will take place on April 7th </span></span><div><font face="Arial, Helvetica, sans-serif"><span style="line-height: 18.901891708374023px;"><br></span></font><div><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 15.001501083374px; line-height: 21.0021018981934px;"><br></span></div><div><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 15.001501083374px; line-height: 21.0021018981934px;"> This Video was Release by Anonymous on March 4th 2015</span><br>
<div class="separator" style="clear: both; text-align: center;">
<br></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/5wxzJsBmdd8/0.jpg" frameborder="0" height="266" src="http://www.youtube.com/embed/5wxzJsBmdd8?feature=player_embedded" width="320"></iframe></div>
<br>
<br>
<br>
<span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em;">"Anonymous held its first OpIsrael cyber-attacks in November 2012 during Operation Pillar of Defense which was an eight day Israeli Defense Force </span><span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 22.3999996185303px;">assault</span><span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em;"> on the Gaza strip.</span><br>
<div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em; margin-bottom: 15px; padding: 0px; vertical-align: baseline;">
<span style="line-height: 1.4em;">700 Israeli website suffered repeated DDoS (Denial of Service)attacks, which targeted high-profile government systems including banks, military and even the Presidents own site.</span></div>
<div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em; margin-bottom: 15px; padding: 0px; vertical-align: baseline;">
The <a href="http://rt.com/news/anonymous-israel-cyber-attack-737/">Israeli Finance Ministry reported</a> an estimated 44 million unique attacks on government websites over a four day period.<span style="line-height: 1.4em;"> Anonymous posted the online personal data of 5,000 Israeli officials, including names, ID numbers and personal emails."</span></div>
<div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em; margin-bottom: 15px; padding: 0px; vertical-align: baseline;">
<span style="line-height: 1.4em;"><br></span></div>
<div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em; margin-bottom: 15px; padding: 0px; vertical-align: baseline;">
<span style="line-height: 1.4em;"> You can even be a part of the DDoS attack on April 7th by going </span><a href="http://www.anons-cyber.blogspot.com/p/ddos.html" style="line-height: 1.4em;">here</a><span style="line-height: 1.4em;">. </span></div>
<div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em; margin-bottom: 15px; padding: 0px; vertical-align: baseline;">
<br></div>
<div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em; margin-bottom: 15px; padding: 0px; vertical-align: baseline;">
<br></div>
<div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em; margin-bottom: 15px; padding: 0px; vertical-align: baseline;">
<span style="font-size: xx-small;"> -sodaghar 3/30/15</span></div>
<div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; line-height: 1.4em; margin-bottom: 15px; padding: 0px; vertical-align: baseline;">
</div>
</div></div>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-58012520245540408952015-03-18T11:49:00.004-07:002022-04-26T21:25:52.619-07:00Obama Blames Bush for ISIS<br />
<br />
<br />
<iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://ytimg.googleusercontent.com/vi/2a01Rg2g2Z8/0.jpg" frameborder="0" height="266" src="http://www.youtube.com/embed/2a01Rg2g2Z8?feature=player_embedded" style="clear: left; float: left;" width="320"></iframe><i style="background-color: white; font-family: "Segoe UI", "Gill Sans Light", Helvetica; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></i><br />
<div style="text-align: right;">
<i style="background-color: white; font-family: "Segoe UI", "Gill Sans Light", Helvetica; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"> </i><span style="font-size: x-small;"><i style="background-color: white; font-family: "segoe ui", "gill sans light", helvetica; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;">"Two things: One is, ISIL is a direct outgrowth of Al-Qaeda in Iraq that grew out of our invasion,”</i><span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; line-height: 21.0021px;"> Obama said in an interview with VICE News. </span><i style="background-color: white; font-family: "segoe ui", "gill sans light", helvetica; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;">“Which is an example of unintended consequences. Which is why we should generally aim before we shoot.” </i><span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;">President Obama said.</span></span></div>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span><span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"> This is something I totally I agree with however it seems like he's just playing the blame game instead of taking control. He fails to mention the fact that <a href="https://msuweb.montclair.edu/~furrg/pol/wtc/oblnus091401.html" target="_blank">Bin Laden was a CIA asset</a> and was trained and deployed to fight the Soviets in 1979 when they invaded Afghanistan.</span><br />
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span><span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;">The President also fails to mention the fact that the <a href="http://www.cnsnews.com/news/article/patrick-goodenough/russia-free-syrian-army-no-longer-exists-rebels-are-coordinating">Syrian Rebels</a> we have been funding for the past 3 years have <a href="http://www.almasdarnews.com/article/3000-fsa-fighters-defect-isis-qalamoun-mountains/">turned to ISIS. </a></span></span><br />
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span><span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;">The US has had a presence in the middle east and other Muslim countries since 1953 with <a href="http://en.wikipedia.org/wiki/1953_Iranian_coup_d%27%C3%A9tat">Operation Ajax</a> in which the CIA started a <a href="http://en.wikipedia.org/wiki/Colour_revolution">Colour Revolution</a> to overthrow the democratically elected president of Iran Mohammad Mosaddegh. </span></span><br />
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;">This is <a href="http://rt.com/usa/iran-coup-cia-operation-647/">admitted by the CIA...</a></span></span><br />
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;">We have been a presence in these Muslim countries for two generations now. It was only a matter of time before that population became radicalized.</span></span><br />
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;">This is the consequence of being the global police even if the intentions are good. It's time to fix the problems at home and stop worrying about the rest of the world. On the other hand, perhaps we created a monster that nothing can tame. At the cost of another World War it will be up to the United States to stop the monster it formed.</span></span><br />
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span><span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span><span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<br />
<span style="line-height: 21.0021px;"><span style="font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px;"> </span><span style="font-family: Courier New, Courier, monospace;"><span style="font-size: 15.0015px;"> </span><b><span face="Helvetica Neue, Arial, Helvetica, sans-serif">Thesis-Antithesis-Synthesis</span></b></span></span><br />
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"><br /></span></span>
<span style="font-size: 15.0015px; line-height: 21.0021px;"><span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; margin: 0px; padding: 0px; vertical-align: baseline;"></span></span><br />
<span style="font-family: "segoe ui" , "gill sans light" , "helvetica";"><span style="font-size: 15.0015px; line-height: 21.0021px;"> </span><span style="line-height: 21.0021px;"><span style="font-size: xx-small;">-Sodaghar 3/18/2015</span></span></span><br />
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>
<span style="background-color: white; font-family: "segoe ui" , "gill sans light" , "helvetica"; font-size: 15.0015px; line-height: 21.0021px; margin: 0px; padding: 0px; vertical-align: baseline;"><br /></span>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-68473059886251860432015-03-12T11:47:00.001-07:002020-10-20T19:22:02.623-07:00The Intellectual as Servant of the State <span style="background-color: white; box-sizing: border-box; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; font-weight: bold; line-height: 16.7999992370605px; text-transform: lowercase;">by</span><span style="background-color: white; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; font-weight: bold; line-height: 16.7999992370605px; text-transform: lowercase;"> </span><span class="uBlogsy_author_name" style="background-color: white; box-sizing: border-box; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; font-weight: bold; line-height: 16.7999992370605px; text-transform: lowercase;"><a href="http://www.ronpaulinstitute.org/archives/featured-articles/?author=Andrew+Bacevich" style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: none; box-sizing: border-box; line-height: inherit; text-decoration: none;" title="Andrew Bacevich">andrew bacevich</a></span><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUdkln2_TUyTSjxRT0LFXjZo22OLSNd-7rUakmxoCUXpUDSJvSF4_9nF9-_NJIZpxrnHcTc57TP8Ipf62Bz7IQtfpDXlAYrYWBcc6MJ3neIvkTteJBjW22odvLMStbsQ72DEaLY9ERgg-x/s1600/ThinkTanks_2.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="226" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUdkln2_TUyTSjxRT0LFXjZo22OLSNd-7rUakmxoCUXpUDSJvSF4_9nF9-_NJIZpxrnHcTc57TP8Ipf62Bz7IQtfpDXlAYrYWBcc6MJ3neIvkTteJBjW22odvLMStbsQ72DEaLY9ERgg-x/s1600/ThinkTanks_2.jpg" width="320" /></a></div>
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Policy intellectuals — eggheads presuming to instruct the mere mortals who actually run for office — are a blight on the republic. Like some invasive species, they infest present-day Washington, where their presence strangles common sense and has brought to the verge of extinction the simple ability to perceive reality. A benign appearance — well-dressed types testifying before Congress, pontificating in print and on TV, or even filling key positions in the executive branch — belies a malign impact. They are like Asian carp let loose in the Great Lakes.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> It all began innocently enough. Back in 1933, with the country in the throes of the Great Depression, President Franklin Delano Roosevelt first imported a handful of eager academics to join the ranks of his New Deal. An unprecedented economic crisis required some fresh thinking, FDR believed. Whether the contributions of this “</span><a href="http://www.gwu.edu/~erpapers/teachinger/glossary/brains-trust.cfm" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">Brains Trust</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">” made a positive impact or served to retard economic recovery (or ended up being a wash) remains a subject for debate even today.</span><span style="background-color: white; box-sizing: border-box; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> </span><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">At the very least, however, the arrival of Adolph Berle, Raymond Moley, Rexford Tugwell, and others elevated Washington’s bourbon-and-cigars social scene. As bona fide members of the intelligentsia, they possessed a sort of cachet.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> Then came World War II, followed in short order by the onset of the Cold War. These events brought to Washington a second wave of deep thinkers, their agenda now focused on “national security.” This eminently elastic concept — more properly, “national insecurity” — encompassed just about anything related to preparing for, fighting, or surviving wars, including economics, technology, weapons design, decision-making, the structure of the armed forces, and other matters said to be of vital importance to the nation’s survival. National insecurity became, and remains today, the policy world’s equivalent of the gift that just keeps on giving.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> People who specialized in thinking about national insecurity came to be known as “defense intellectuals.” Pioneers in this endeavor back in the 1950s were as likely to collect their paychecks from think tanks like the prototypical RAND Corporation as from more traditional academic institutions. Their ranks included creepy figures like Herman Kahn, who took pride in “thinking about the unthinkable,” and Albert Wohlstetter, who tutored Washington in the complexities of maintaining “the delicate balance of terror.”</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> In this wonky world, the coin of the realm has been and remains “policy relevance.” This means devising products that convey a sense of novelty, while serving chiefly to perpetuate the ongoing enterprise. The ultimate example of a policy-relevant insight is </span><a href="http://www.imdb.com/title/tt0057012/?ref_=fn_al_tt_1" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">Dr. Strangelove’s</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> discovery of a “mineshaft gap” — successor to the “bomber gap” and the “missile gap” that, in the 1950s, had found America allegedly lagging behind the Soviets in weaponry and desperately needing to catch up. Now, with a thermonuclear exchange about to destroy the planet, the United States is once more falling behind, Strangelove claims, this time in digging underground shelters enabling some small proportion of the population to survive.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> In a single, brilliant stroke, Strangelove posits a new raison d'être for the entire national insecurity apparatus, thereby ensuring that the game will continue more or less forever. A sequel to Stanley Kubrick’s movie would have shown General “Buck” Turgidson and the other brass huddled in the War Room, developing plans to close the mineshaft gap as if nothing untoward had occurred.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<strong style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;">The Rise of the National Insecurity State</strong><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> Yet only in the 1960s, right around the time that Dr. Strangelove first appeared in movie theaters, did policy intellectuals really come into their own. The press now referred to them as “action intellectuals,” suggesting energy and impatience. Action intellectuals were thinkers, but also doers, members of a “large and growing body of men who choose to leave their quiet and secure niches on the university campus and involve themselves instead in the perplexing problems that face the nation,” as LIFE Magazine put it in 1967. Among the most perplexing of those problems was what to do about Vietnam, just the sort of challenge an action intellectual could sink his teeth into.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Over the previous century-and-a-half, the United States had gone to war for many reasons, including greed, fear, panic, righteous anger, and legitimate self-defense. On various occasions, each of these, alone or in combination, had prompted Americans to fight. Vietnam marked the first time that the United States went to war, at least in considerable part, in response to a bunch of really dumb ideas floated by ostensibly smart people occupying positions of influence. More surprising still, action intellectuals persisted in waging that war well past the point where it had become self-evident, even to members of Congress, that the cause was a misbegotten one doomed to end in failure.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">In his fine new book </span><a href="http://www.amazon.com/dp/0670025399/ref=nosim/?tag=tomdispatch-20" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">American Reckoning: The Vietnam War and Our National Identity</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">, Christian Appy, a historian who teaches at the University of Massachusetts, reminds us of just how dumb those ideas were.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">As Exhibit A, Professor Appy presents McGeorge Bundy, national security adviser first for President John F. Kennedy and then for Lyndon Johnson. Bundy was a product of Groton and Yale, who famously became the youngest-ever dean of Harvard’s Faculty of Arts and Sciences, having gained tenure there without even bothering to get a graduate degree.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">For Exhibit B, there is Walt Whitman Rostow, Bundy’s successor as national security adviser. Rostow was another Yalie, earning his undergraduate degree there along with a PhD. While taking a break of sorts, he spent two years at Oxford as a Rhodes scholar. As a professor of economic history at MIT, Rostow captured JFK’s attention with his modestly subtitled 1960 book </span><em style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;">The Stages of Economic Growth: A Non-Communist Manifesto</em><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">, which offered a grand theory of development with ostensibly universal applicability. Kennedy brought Rostow to Washington to test his theories of “modernization” in places like Southeast Asia.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Finally, as Exhibit C, Appy briefly discusses Professor Samuel P. Huntington’s contributions to the Vietnam War. Huntington also attended Yale, before earning his PhD at Harvard and then returning to teach there, becoming one of the most renowned political scientists of the post-World War II era.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">What the three shared in common, apart from a suspect education acquired in New Haven, was an unwavering commitment to the reigning verities of the Cold War. Foremost among those verities was this: that a monolith called Communism, controlled by a small group of fanatic ideologues hidden behind the walls of the Kremlin, posed an existential threat not simply to America and its allies, but to the very idea of freedom itself. The claim came with this essential corollary: the only hope of avoiding such a cataclysmic outcome was for the United States to vigorously resist the Communist threat wherever it reared its ugly head.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Buy those twin propositions and you accept the imperative of the U.S. preventing the Democratic Republic of Vietnam, a.k.a. North Vietnam, from absorbing the Republic of Vietnam, a.k.a. South Vietnam, into a single unified country; in other words, that South Vietnam was a cause worth fighting and dying for. Bundy, Rostow, and Huntington not only bought that argument hook, line, and sinker, but then exerted themselves mightily to persuade others in Washington to buy it as well.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Yet even as he was urging the “Americanization” of the Vietnam War in 1965, Bundy already entertained doubts about whether it was winnable. But not to worry: even if the effort ended in failure, he counseled President Johnson, “the policy will be worth it.”</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">How so? “At a minimum,” Bundy wrote, “it will damp down the charge that we did not do all that we could have done, and this charge will be important in many countries, including our own.” If the United States ultimately lost South Vietnam, at least Americans would have died trying to prevent that result — and through some perverted logic this, in the estimation of Harvard’s youngest-ever dean, was a redeeming prospect. The essential point, Bundy believed, was to prevent others from seeing the United States as a “paper tiger.” To avoid a fight, even a losing one, was to forfeit credibility. “Not to have it thought that when we commit ourselves we really mean no major risk” — that was the problem to be avoided at all cost.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Rostow outdid even Bundy in hawkishness. Apart from his relentless advocacy of coercive bombing to influence North Vietnamese policymakers, Rostow was a chief architect of something called the Strategic Hamlet Program. The idea was to jumpstart the Rostovian process of modernization by forcibly relocating Vietnamese peasants from their ancestral villages into armed camps where the Saigon government would provide security, education, medical care, and agricultural assistance. By winning hearts-and-minds in this manner, the defeat of the communist insurgency was sure to follow, with the people of South Vietnam vaulted into the “age of high mass consumption,” where Rostow believed all humankind was destined to end up.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">That was the theory. Reality differed somewhat. Actual Strategic Hamlets were indistinguishable from concentration camps. The government in Saigon proved too weak, too incompetent, and too corrupt to hold up its end of the bargain. Rather than winning hearts-and-minds, the program induced alienation, even as it essentially destabilized peasant society. One result: an increasingly rootless rural population flooded into South Vietnam’s cities where there was little work apart from servicing the needs of the ever-growing U.S. military population — hardly the sort of activity conducive to self-sustaining development.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Yet even when the Vietnam War ended in complete and utter defeat, Rostow still claimed vindication for his theory. “We and the Southeast Asians,” he wrote, had used the war years “so well that there wasn’t the panic [when Saigon fell] that there would have been if we had failed to intervene.” Indeed, regionally Rostow spied plenty of good news, all of it attributable to the American war.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">”Since 1975 there has been a general expansion of trade by the other countries of that region with Japan and the West. In Thailand we have seen the rise of a new class of entrepreneurs. Malaysia and Singapore have become countries of diverse manufactured exports. We can see the emergence of a much thicker layer of technocrats in Indonesia.”</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">So there you have it. If you want to know what 58,000 Americans (not to mention vastly larger numbers of Vietnamese) died for, it was to encourage entrepreneurship, exports, and the emergence of technocrats elsewhere in Southeast Asia.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Appy describes Professor Huntington as another action intellectual with an unfailing facility for seeing the upside of catastrophe. In Huntington’s view, the internal displacement of South Vietnamese caused by the excessive use of American firepower, along with the failure of Rostow’s Strategic Hamlets, was actually good news. It promised, he insisted, to give the Americans an edge over the insurgents.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">The key to final victory, Huntington </span><a href="http://www.foreignaffairs.com/articles/23988/samuel-p-huntington/the-bases-of-accommodation" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">wrote</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">, was “forced-draft urbanization and modernization which rapidly brings the country in question out of the phase in which a rural revolutionary movement can hope to generate sufficient strength to come to power.” By emptying out the countryside, the U.S. could win the war in the cities. “The urban slum, which seems so horrible to middle-class Americans, often becomes for the poor peasant a gateway to a new and better way of life.” The language may be a tad antiseptic, but the point is clear enough: the challenges of city life in a state of utter immiseration would miraculously transform those same peasants into go-getters more interested in making a buck than in signing up for social revolution.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Revisited decades later, claims once made with a straight face by the likes of Bundy, Rostow, and Huntington — action intellectuals of the very first rank — seem beyond preposterous. They insult our intelligence, leaving us to wonder how such judgments or the people who promoted them were ever taken seriously.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">How was it that during Vietnam bad ideas exerted such a perverse influence? Why were those ideas so impervious to challenge? Why, in short, was it so difficult for Americans to recognize bullshit for what it was?</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<strong style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Creating a Twenty-First-Century Slow-Motion Vietnam</strong><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">These questions are by no means of mere historical interest. They are no less relevant when applied to the handiwork of the twenty-first-century version of policy intellectuals, specializing in national insecurity, whose bullshit underpins policies hardly more coherent than those used to justify and prosecute the Vietnam War. </span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">The present-day successors to Bundy, Rostow, and Huntington subscribe to their own reigning verities. Chief among them is this: that a phenomenon called terrorism or Islamic radicalism, inspired by a small group of fanatic ideologues hidden away in various quarters of the Greater Middle East, poses an existential threat not simply to America and its allies, but — yes, it’s still with us — to the very idea of freedom itself. That assertion comes with an essential corollary dusted off and imported from the Cold War: the only hope of avoiding this cataclysmic outcome is for the United States to vigorously resist the terrorist/Islamist threat wherever it rears its ugly head.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">At least since September 11, 2001, and arguably for at least two decades prior to that date, U.S. policymakers have taken these propositions for granted. They have done so at least in part because few of the policy intellectuals specializing in national insecurity have bothered to question them.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Indeed, those specialists insulate the state from having to address such questions. Think of them as intellectuals devoted to averting genuine intellectual activity. More or less like Herman Kahn and Albert Wohlstetter (or Dr. Strangelove), their function is to perpetuate the ongoing enterprise.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">The fact that the enterprise itself has become utterly amorphous may actually facilitate such efforts. Once widely known as the Global War on Terror, or GWOT, it has been transformed into the War with No Name. A little bit like the famous Supreme Court opinion on pornography: we can’t define it, we just know it when we see it, with ISIS the latest manifestation to capture Washington’s attention.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">All that we can say for sure about this nameless undertaking is that it continues with no end in sight. It has become a sort of slow-motion Vietnam, stimulating remarkably little honest reflection regarding its course thus far or prospects for the future. If there is an actual Brains Trust at work in Washington, it operates on autopilot. Today, the second- and third-generation bastard offspring of RAND that clutter northwest Washington — the Center for this, the Institute for that — spin their wheels debating latter day equivalents of Strategic Hamlets, with nary a thought given to more fundamental concerns.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">What prompts these observations is Ashton Carter’s return to the Pentagon as President Obama’s fourth secretary of defense. Carter himself is an action intellectual in the Bundy, Rostow, Huntington mold, having made a career of rotating between positions at Harvard and in “the Building.” He, too, is a Yalie and a Rhodes scholar, with a PhD. from Oxford. “Ash” — in Washington, a first-name-only identifier (“Henry,” “Zbig,” “Hillary”) signifies that you have truly arrived — is the author of books and articles galore, including </span><a href="http://www.washingtonpost.com/wp-dyn/content/article/2006/06/21/AR2006062101518.html" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">one op-ed</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> co-written with former Secretary of Defense William Perry back in 2006 calling for preventive war against North Korea. Military action “undoubtedly carries risk,” he bravely acknowledged at the time. “But the risk of continuing inaction in the face of North Korea's race to threaten this country would be greater” — just the sort of logic periodically trotted out by the likes of Herman Kahn and Albert Wohlstetter.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">As Carter has taken the Pentagon’s reins, he also has taken pains to convey the impression of being a big thinker. As one Wall Street Journal</span><a href="http://www.wsj.com/articles/ash-carter-seeks-fresh-eyes-on-global-threats-1424826250" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">headline</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> enthused, “Ash Carter Seeks Fresh Eyes on Global Threats.” That multiple global threats exist and that America’s defense secretary has a mandate to address each of them are, of course, givens. His predecessor Chuck Hagel (no Yale degree) was a bit of a plodder. By way of contrast, Carter has made clear his intention to shake things up.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">So on his second day in office, for example, he dined with Kenneth Pollack, Michael O’Hanlon, and Robert Kagan, ranking national insecurity intellectuals and old Washington hands one and all. Besides all being employees of the Brookings Institution, the three share the distinction of </span><a href="http://www.salon.com/2007/07/30/brookings/" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">having supported</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> the Iraq War back in 2003 and calling for redoubling efforts against ISIS today. For assurances that the fundamental orientation of U.S. policy is sound — we just need to try harder — who better to consult than</span><a href="http://www.brookings.edu/blogs/markaz/posts/2014/12/03-iran-airstrikes-iraq-isis-islamic-state" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">Pollack</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">, </span><a href="http://nationalinterest.org/feature/brothers-arms-it-time-us-iraqi-alliance-11712" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">O’Hanlon</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">, and </span><a href="http://www.nationalreview.com/corner/388522/robert-kagan-obama-administration-must-prove-its-willing-fight-isis-order-gain-allies" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">Kagan</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">(</span><a href="http://www.understandingwar.org/report/strategy-defeat-islamic-state" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">any Kagan</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">)?</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Was Carter hoping to gain some fresh insight from his dinner companions? Or was he letting Washington’s clubby network of fellows, senior fellows, and distinguished fellows know that, on his watch, the prevailing verities of national insecurity would remain sacrosanct? You decide.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Soon thereafter, Carter’s first trip overseas provided another opportunity to signal his intentions. In Kuwait, he convened a war council of senior military and civilian officials to take stock of the campaign against ISIS. In a daring departure from standard practice, the new defense secretary </span><a href="http://www.militarytimes.com/story/military/pentagon/2015/02/23/ash-carter-powerpoint-brass/23895027/" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">prohibited PowerPoint briefings</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">. One participant described the ensuing event as “a five-hour-long college seminar” — candid and freewheeling. “This is reversing the paradigm,” one awed senior Pentagon official </span><a href="http://www.wsj.com/articles/ash-carter-seeks-fresh-eyes-on-global-threats-1424826250" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">remarked</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">. Carter was said to be challenging his subordinates to “look at this problem differently.”</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Of course, Carter might have said, “Let’s look at a different problem.” That, however, was far too radical to contemplate — the equivalent of suggesting back in the 1960s that assumptions landing the United States in Vietnam should be reexamined.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">In any event — and to no one’s surprise — the different look did not produce a different conclusion. Instead of reversing the paradigm, Carter affirmed it: the existing U.S. approach to dealing with ISIS is sound, he announced. It only needs a bit of </span><a href="http://finance.yahoo.com/news/carter-says-plan-destroy-isis-101500266.html" style="background-color: white; border: none; box-sizing: border-box; color: #4c7093; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; text-decoration: none;">tweaking</a><span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;"> — just the result to give the Pollacks, O’Hanlons, and Kagans something to write about as they keep up the chatter that substitutes for serious debate.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Do we really need that chatter? Does it enhance the quality of U.S. policy? If policy/defense/action intellectuals fell silent would America be less secure?</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">Let me propose an experiment. Put them on furlough. Not permanently — just until the last of the winter snow finally melts in New England. Send them back to Yale for reeducation. Let’s see if we are able to make do without them even for a month or two.</span><br />
<br style="background-color: white; box-sizing: border-box; color: #111111; font-family: 'Open Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;" />
<span style="background-color: white; color: #111111; font-family: "open sans" , "trebuchet ms" , "verdana" , sans-serif; font-size: 12px; line-height: 16.7999992370605px;">In the meantime, invite Iraq and Afghanistan War vets to consider how best to deal with ISIS. Turn the op-ed pages of major newspapers over to high school social studies teachers. Book English majors from the Big Ten on the Sunday talk shows. Who knows what tidbits of wisdom might turn up?</span>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-6057035706760335472015-03-03T08:43:00.002-08:002015-03-20T14:16:23.876-07:00Historic Jury Decision Proves Power of the People<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuJHejvCyYEfdJiLCm2ZZTpjF6-71ht2ov52PAK8DbpOvvR_8dlJGu0hr8SMeKMxcnt1s0bjG-LkTNIAxM0wdLkRT1JbISO-cicSPv6D9zyp2xcSIBDR92K7jW-nzvI0qLFr-lBpjNFs7n/s1600/640px-Cannabis_Plant.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuJHejvCyYEfdJiLCm2ZZTpjF6-71ht2ov52PAK8DbpOvvR_8dlJGu0hr8SMeKMxcnt1s0bjG-LkTNIAxM0wdLkRT1JbISO-cicSPv6D9zyp2xcSIBDR92K7jW-nzvI0qLFr-lBpjNFs7n/s1600/640px-Cannabis_Plant.jpg" height="320" width="213" /></a> <a href="http://www.sun-sentinel.com/local/broward/fort-lauderdale/fl-marijuana-medical-need-verdict-20150302-story.html" target="_blank">Broward County Florida</a> : A jury acquits a marijuana grower with 46 plants citing medical use and proves the true power is always within the people.<br />
<br />
Two years ago Jesse Teplicki got a visit from detectives and was arrested. He is the first defendant in Florida to argue medicinal use of the plant. "You saved my life" as he wept and told the jury after the not guilty decision was reached. Possession of Cannabis can get you up to 5 years in prison but honestly who is going to convict someone over marijuana these days when half the country has some form of legal weed. I know I wouldn't. This is why you always go to trial by jury and NEVER take a plea deal. A jury of your peers is higher than any judge or any law and as Americans we seem to forget that as sovereigns we are in full control. Jury Nullification is a term that can be used when even though you might be breaking a "law" the jury finds that "law" to be ridiculous.<br />
<br />
Remember there was a time in this country when slavery was legal and just because it's a "law" doesn't make it right.<br />
<br />
<br />
Jury's around the country are also responsible for <a href="http://www.nytimes.com/2003/08/12/business/jury-acquits-pilot-who-questioned-liability-for-income-tax.html" target="_blank">acquitting people being charged with tax evasion </a>citing to the IRS "show me the law".<br />
<span style="background-color: white; font-family: georgia, 'times new roman', times, serif; font-size: 15px; line-height: 22.0049991607666px;"><br /></span>
<span style="background-color: white; font-family: georgia, 'times new roman', times, serif; font-size: 15px; line-height: 22.0049991607666px;">"A federal jury in Memphis has acquitted a FedEx pilot on six counts of tax evasion after she testified that she wrote letters asking the Internal Revenue Service what law required her to pay taxes but never received a response.</span>"<br />
<br />
<br />
This truly is a historic day not just for Florida but for the whole country and a silver lining in what seems to be endless dark. I have not heard any mainstream media talking about this because they do not want you to know where the true power lies which is YOU. Imagine 15 years ago getting caught with 46 marijuana plants! It would have made national news and pinned you as some drug lord. With the nations capitol <a href="http://www.huffingtonpost.com/2015/02/26/marijuana-legalization-dc_n_6753554.html" target="_blank">Washington D.C legalizing pot </a> I can't imagine any cop or jury convicting anyone over this medical plant.<br />
<br />
<br />
Last year <a href="http://www.floridatoday.com/story/news/politics/elections/2014/11/04/medical-marijuana-initiative-defeated-in-florida/18500723/" target="_blank">Florida voted 58% </a> to get medical marijuana in the state but because of a "law" passed two years prior requiring 60% of the vote if it's an amendment to the states constitution Florida is now lagging behind the rest of the country.<br />
<br />
<br />
Call to Action on 4/20/15 <a href="https://www.facebook.com/events/403887653119001" target="_blank">Florida Smoke Out Day</a> on Fort Lauderdale Beach!<br />
We The People choose our own rights!<br />
<a href="https://www.facebook.com/events/403887653119001" target="_blank">Join me and others</a> as we light up our freedoms in public<br />
<a href="https://www.change.org/p/florida-state-house-florida-state-senate-florida-governor-legalize-the-recreational-and-medical-use-of-cannabis-either-through-emergency-vote-or-executive-action" target="_blank">Sign the Petition</a><br />
<br />
<br />
<br />
<span style="background-color: white; font-family: 'Trebuchet MS', Trebuchet, Verdana, sans-serif; font-size: xx-small; line-height: 12.6000003814697px;"> -Sodaghar 3/3/15</span><br />
<br />
<br />
<br />
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-53167887577803264882015-02-28T10:19:00.001-08:002016-04-17T12:17:55.148-07:00How to Survive the Internet <br />
<div>
</div>
<div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHk9JW9ugoUwgfdwkgFOd5C8iwbwqNZlwtPyY2-IQqKJMjydSW1RgFXzhnslH-iDLt4f-yhemddEuqFczdcQgEjcAxEaeMIGrvLF__-3oC16ioicI5S0ra6uGYu-RJezKTqp1VOJoTO7-D/s1600/2009-tor-logo_400x400.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHk9JW9ugoUwgfdwkgFOd5C8iwbwqNZlwtPyY2-IQqKJMjydSW1RgFXzhnslH-iDLt4f-yhemddEuqFczdcQgEjcAxEaeMIGrvLF__-3oC16ioicI5S0ra6uGYu-RJezKTqp1VOJoTO7-D/s1600/2009-tor-logo_400x400.png" width="320" /></a></div>
With the internet gaining <a href="http://www.foxnews.com/politics/2015/02/26/fcc-approves-sweeping-internet-regulation-plan-obama-accused-meddling/" target="_blank">new regulations</a> and Government oversight we all need to know how to be able to connect when the internet goes dark. Government hasn't been able to do a single thing correct and giving it regulatory commission over the once free internet there is only a matter of time until we are restricted into where and what we can do online. Thankfully there has been what is known as the <a href="http://en.wikipedia.org/wiki/Deep_Web" target="_blank">Deep Web</a> which is as old as the internet itself. Here you can find and say whatever you want. You're connected through proxy which basically means you connect to the relay or internet through an IP address which isn't yours. For example: using my home connection through AT&T my IP will not change and shows up as something like 107.345.67.237 with this information mostly anyone can target my general location and other information about who I am and where I'm located. Connecting online through a proxy now my IP address shows up as 6.124.45.908 for example and shows I'm connecting from Spain or some other country or state. This makes it nearly impossible for big brother or anyone else to watch over your internet activity (unless you're connected to a government run proxy)</div>
<div>
<div>
<br /></div>
<div>
In the old days you would have to manually configure your router and browser to the proxy and then through trial and error hopefully be able to connect. The good folks over at the <a href="https://www.torproject.org/" target="_blank">TOR Project </a> have eliminated the manual labor and technicalities. Head over to their website and download the<a href="https://www.torproject.org/download/download-easy.html.en" target="_blank"> TOR bundle</a> and you're all set. Make sure to donate anything you can because I'm telling you the internet as we know it will soon be gone forever and this will be all we have. They need support just like all independent media, artist do. The term Net Neutrality is a form of <a href="http://en.wikipedia.org/wiki/Doublespeak" target="_blank">doublespeak</a> meant to make you think one way and do another. Like the Patriot Act which eliminated the bill of rights there was nothing patriotic about it. This language is used by the social engineers to put you at ease before they stab you in the back and laugh over the bloody corpse. The 300+ page regulations have not been released or publicly debated yet this being hailed as some victory for freedom. If it's not broke don't fix it and I can only hope through public pressure we can redact the government takeover of the internet.<br />
<br />
<br />
RIP Internet 1990-2015<br />
<br />
<br />
<br />
Once you're online through TOR this is the best place to start <a href="http://zqktlwi4fecvo6ri.onion/">http://zqktlwi4fecvo6ri.onion</a></div>
<div>
</div>
<div>
<br />
See you on the deepweb<br />
<br />
<b>-set up proxy chains beforehand-</b></div>
<span style="font-size: x-small;"><i>$ cd /etc vim proxychains.conf<br />#unhash which service you'd like to use and <b><u>add</u> </b>proxies SOCKS5 SOCKS4 etc...<br />$ service tor start<br />$ /etc proxychains 'any service like ping, nmap, firefox and so on'</i></span><br />
<div>
<br /></div>
<div>
</div>
<div>
<span style="background-color: white; color: #333333; font-family: "georgia" , "times new roman" , "times" , serif; font-size: xx-small; line-height: 23px;">-Sodaghar 2/28/15</span> </div>
</div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com1tag:blogger.com,1999:blog-6177643149379849538.post-14290049227963892292015-02-26T18:13:00.000-08:002016-02-13T10:27:20.386-08:00Internet RIP by Ron Paul<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt5hyJYgfSLWqgO3OnoZKYnfzT6AvXodpMXf5x5rDmv5a2y5vU-d-Y5iRaQiBCFIUDUqlJU0uvUMzCgADZXE_PEuZ5e7YuNofndD3prOAJlIDZOvQMJN8Ld7LmrmafEbcM2T1_-V7zzDRg/s1600/Screen+Shot+2016-02-13+at+1.23.02+PM.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="254" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt5hyJYgfSLWqgO3OnoZKYnfzT6AvXodpMXf5x5rDmv5a2y5vU-d-Y5iRaQiBCFIUDUqlJU0uvUMzCgADZXE_PEuZ5e7YuNofndD3prOAJlIDZOvQMJN8Ld7LmrmafEbcM2T1_-V7zzDRg/s320/Screen+Shot+2016-02-13+at+1.23.02+PM.png" width="320" /></a> Today the Federal Communications Commission (FCC),
a non-elected federal government agency, voted three-to-two to<a href="http://www.nytimes.com/2015/02/27/technology/net-neutrality-fcc-vote-internet-utility.html" target="_blank"> reclassify broadband Internet </a>as a common carrier service under Title II
of the Communications Act. This means that – without the vote of
Congress, the peoples’ branch of government – a federal agency now
claims the power to regulate the Internet.<br />
<br />
<br />
I am surprised that even
among civil liberties groups some claim the federal government in<span class="text_exposed_show">creasing regulation of the Internet somehow increases our freedom and liberty.</span><br />
The truth is very different. The adoption of these FCC rules on the
Internet represents the largest regulatory power grab in recent history.
The FCC’s newly adopted rule takes the most dynamic means of
communication and imposes the regulatory structure designed for public
utilities. Federal regulation could also open the door to de facto
censorship of ideas perceived as threatening to the political class –
ideas like the troops should be brought home, the PATRIOT Act should be
repealed, military spending and corporate welfare should be cut, and the
Federal Reserve should be audited and ended.<br />
<div class="text_exposed_show">
<br />
The one bright spot
in this otherwise disastrous move is that federal regulations making it
more difficult to use the Internet will cause more Americans to join
our movement for liberty, peace, and prosperity. The federal government
should keep its hands off of the Internet!<br />
<br />
<br />
<span style="font-family: Courier New, Courier, monospace; font-size: xx-small;"> - Ron Paul 2/26/15</span></div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-75663100426965801382014-06-04T17:05:00.000-07:002015-02-26T18:14:20.354-08:00Russia-China Gas Deal: End of US Superpower?<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPBHZcyt6QinDRS4CdSbDOufvPLvtJDQQXGVVzbk_Fyfynzm-M7jyuUAUsMuBcB6Pmwz6RpilWVMCBXugtwAKULZfF9DFePKzJXrYHZDmO1HUkM6qewy3Oq1XHTNRnK5uUJVbYRbgFz1pY/s1600/russchi.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPBHZcyt6QinDRS4CdSbDOufvPLvtJDQQXGVVzbk_Fyfynzm-M7jyuUAUsMuBcB6Pmwz6RpilWVMCBXugtwAKULZfF9DFePKzJXrYHZDmO1HUkM6qewy3Oq1XHTNRnK5uUJVbYRbgFz1pY/s1600/russchi.jpg" height="225" width="400" /></a></div>
<span style="font-family: Trebuchet MS, sans-serif;"><span style="background-color: white; color: #333333; font-style: italic; line-height: 23px;"><a href="http://www.nytimes.com/2014/05/22/world/asia/china-russia-gas-deal.html?_r=0" target="_blank">Shanghai</a></span><span style="background-color: white; color: #333333; line-height: 23px;"><a href="http://www.nytimes.com/2014/05/22/world/asia/china-russia-gas-deal.html?_r=0" target="_blank"> </a>— </span><span style="background-color: white; color: #333333; line-height: 23px;">China and Russia signed a $400 billion gas deal giving Moscow a megamarket for its leading export and linking two major powers that, despite a rocky history of alliances and rivalries, have drawn closer to counter the clout of the United States and Europe.</span></span><br />
<span style="font-family: Trebuchet MS, sans-serif;"><span style="background-color: white; color: #333333; line-height: 23px;"><br /></span>
<span style="background-color: white; color: #333333; line-height: 23px;"> The 30 year deal </span><span style="background-color: white; color: #333333; line-height: 23px;">which Mr. Putin called an “epochal event,”</span><span style="background-color: white;"><span style="color: #333333;"><span style="line-height: 23px;"> will lead to pipelines and billions of dollars in investments by these two nations. This also solidifies a Russia-China alliance that puts the US and it's NATO allies trailing behind. Back in 2012 the Obama Regime blocked the <a href="http://nation.foxnews.com/canadian-oil/2012/07/28/after-obama-blocks-keystone-pipeline-china-readies-151-billion-canadian-oil-deal" target="_blank">Keystone Pipeline</a> which is a 1,661 mile pipeline from Canada into the US including Nebraska, Illinois, and the Texas Gulf Coast. This pipeline would create over 20,000 jobs and produce over 700,000 barrels of oil a day; while bringing industry and respect back to the former United States.</span></span></span></span><br />
<span style="font-family: Trebuchet MS, sans-serif;"><span style="background-color: white;"><span style="color: #333333;"><span style="line-height: 23px;"><br /></span></span></span>
<span style="background-color: white;"><span style="color: #333333;"><span style="line-height: 23px;"> </span></span></span></span><span style="background-color: white; font-family: 'Trebuchet MS', sans-serif;"><span style="color: #333333;"><span style="line-height: 23px;">With western sanctions over Russia following the Ukraine crisis this deal once again puts Russia into the global market despite the European Union, United States and NATO all being against them. Providing lower gas prices than the EU </span></span></span><span style="background-color: white; color: #333333; font-family: 'Trebuchet MS', sans-serif; line-height: 23px;">China also offered a loan of $50 billion dollars and gas is expected to start flowing by 2018.</span><br />
<span style="background-color: white; color: #333333; font-family: 'Trebuchet MS', sans-serif; line-height: 23px;"><br /></span>
<span style="font-family: Trebuchet MS, sans-serif;">
<span style="background-color: white;"><span style="color: #333333;"><span style="line-height: 23px;"> Our government it seems for awhile now hasn't been good at anything except military force so don't expect us or our children to have industry come home. Our <a href="http://www.cbsnews.com/news/thousands-of-us-bridges-vulnerable-to-collapse/" target="_blank">bridges are collapsing</a>, our railroads are over 100 years old and we a have millions of barrels of oil in Alaska and the Gulf Coast we aren't allowed to pump. Only the entrepreneurship spirit which built this country will save this country. It's up to all of us to do what we can for ourselves and others; working together we can overcome. </span></span></span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: georgia, times new roman, times, serif;"><span style="line-height: 23px;"><br /></span></span></span>
<span style="background-color: white;"><span style="color: #333333; font-family: georgia, times new roman, times, serif;"><span style="line-height: 23px;"><br /></span></span></span>
<span style="background-color: white;"><span style="color: #333333; font-family: georgia, times new roman, times, serif;"><span style="line-height: 23px;"> <span style="font-size: xx-small;"> -Sodaghar 6/4/14</span></span></span></span>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-21054470109994777182014-02-27T13:30:00.001-08:002015-02-26T18:14:58.806-08:00Cold War 2<span id="intelliTXT"><span style="font-family: Verdana,Sans-serif;"><span style="color: black; font-size: x-small;"><span id="intelliTXT"></span></span></span></span><br />
<span style="font-family: Verdana,Sans-serif;"><span style="color: black; font-size: x-small;">
</span></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Verdana,Sans-serif;"><span style="color: black; font-size: x-small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-SjoqjlCj3xvpzKT7GEaWLgEGqUxvMLWCbgC3dH1h27Rp8bMKc-wycEIBHdW7MaQ9B-Fmq0NwTs0qtZ4W2qypwYf3QE-vIBZc8jCkq974eZIcnloIPZVq24femKvV_ZvwV3KPMtaR9ZkV/s1600/ukraine_2832208b.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-SjoqjlCj3xvpzKT7GEaWLgEGqUxvMLWCbgC3dH1h27Rp8bMKc-wycEIBHdW7MaQ9B-Fmq0NwTs0qtZ4W2qypwYf3QE-vIBZc8jCkq974eZIcnloIPZVq24femKvV_ZvwV3KPMtaR9ZkV/s1600/ukraine_2832208b.jpg" height="199" width="320" /></a></span></span></div>
<span style="font-family: Verdana,Sans-serif;"><span style="color: black; font-size: x-small;">SIMFEROPOL, Ukraine, Ukraine (AP) - Masked gunmen stormed the parliament
of Ukraine's strategic Crimea region as Russian fighter jets screamed
above the border, while Ukraine's newly formed government pledged to
prevent a national breakup with the strong backing of the West - the
stirrings of a potentially dangerous confrontation reminiscent of Cold
War brinksmanship.</span></span><br />
<span style="font-family: Verdana,Sans-serif;"><span style="color: black; font-size: x-small;"> </span></span><br />
<a href="http://news.yahoo.com/ukraine-crisis-deepens-russia-scrambles-jets-183824638.html;_ylt=AwrBEiKNhw9TigIAmSTQtDMD" target="_blank"> Moscow</a>, meanwhile, has launched a major military exercise involving
150,000 troops and put fighter jets on patrol along the border. Barack Obama’s national security adviser said it would be a “grave mistake”
for Vladimir Putin to send soldiers into Ukraine to restore a friendly
government after the upheaval. The White House sent a stern message Sunday to <a href="http://www.nydailynews.com/topics/Vladimir+Putin" title="Vladimir Putin">Russian President Vladimir Putin</a> to butt out of the Ukrainian crisis, warning a military intervention on his part “would be a grave mistake.”<br />
<br />
And then you have rational people like myself saying "Not again". Why does the US always feel the need to get involved in all Geo-politics even if the region is for strategic counter measures. We have had too much war and too much bad news in the country and nobody wants to hear Cold War <span class="yshortcuts cs4-visible" id="lw_1393575199055_1">rhetoric</span> from politicians who've never even been in fight. This Slavic territory has been contested for a long time and if these people want to shape their own destinies I say so be it. No more American deaths in the name of national security or policing the world.<br />
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
</div>
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
</div>
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
</div>
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
</div>
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
</div>
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
</div>
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
<span style="font-size: xx-small;">-Sodaghar 2/27/14</span></div>
The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-18589723900869421962014-02-27T13:03:00.002-08:002022-11-15T11:11:24.723-08:00Bitcoin Exchange Shutdown and Vultures Swarm Calling for Regulation <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirpbV0R_t1hyaHLnln6WVpSzHcdwy0QrlWukwwoyXsS3ba6MV50Rtlr2ZR8URIWCWdm_ParCMLy0rWrrhWyjZXd00cxY4ozog0MWEFwHB5VA1rjThLqSgEkvrUSxC6pZDyP38ydOHnlqqN/s1600/mtgox-bitcoin.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirpbV0R_t1hyaHLnln6WVpSzHcdwy0QrlWukwwoyXsS3ba6MV50Rtlr2ZR8URIWCWdm_ParCMLy0rWrrhWyjZXd00cxY4ozog0MWEFwHB5VA1rjThLqSgEkvrUSxC6pZDyP38ydOHnlqqN/s1600/mtgox-bitcoin.png" /></a> Mt.Gox the largest <a href="http://online.wsj.com/news/articles/SB10001424052702304834704579404101502619422?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304834704579404101502619422.html" target="_blank">Bitcoin Exchange has shut down</a> causing an estimated loss of $300,000,000 plus worth of Bitcoin to go unaccounted for. This has left the Bitcoin market to fall about 50% of it's value currently trading at around $540 per 1 BTC. The closure of Mt.Gox has lead to a swarm of supporters, media, and politicians to call for regulations on Bitcoin.<br />
<br />
"U.S. Treasury Department, for example, has suggested that bitcoin
exchanges should follow anti-money-laundering rules that apply to
money-transfer companies such as
<a class="t-company" data-ls-seen="1" href="http://quotes.wsj.com/WU">Western Union</a> Co"<br />
<br /><a href="http://www.thegoodfightnews.com/2013/12/bitcoin-evolution.html">I was originally intrigued by Bitcoin</a> because of the fact there is no oversight over what is being done with my money. Yes, you can launder money and yes you can buy illegal goods using Bitcoin but who is to say what or where my money goes towards?<div><br /></div><div> This is a big blow for Bitcoin and I wouldn't be surprised if governments had something to do with it. I for one lost a small fortune due to this and for now my days in the BTC trade are over. <a href="http://www.wired.com/wiredenterprise/2013/12/fbi_wallet/" target="_blank">The US Government is the largest holder of Bitcoin </a>and they are scared to death of anything that can destroy their fiat banking system. I see this as an attempt to co-op the Bitcoin exchanges and turn this into their favor. Perhaps a One World Currency??<br />
<br />
We all take risks doing anything online we even take risks shopping outside. The recent <a href="http://www.forbes.com/sites/maggiemcgrath/2014/02/26/target-profit-falls-46-on-credit-card-breach-and-says-the-hits-could-keep-on-coming/" target="_blank">Target credit card breach</a> left over 10million of it's customers credit cards to become compromised. Everyday we become targets in both the digital and the real world. That is why we should protect ourselves and our money. I still feel BTC is the future and a good investment but I will feel the opposite if we let bureaucrats and regulators step in.<br />
<br />
Even with my loss I still see anything outside the fractional reserve banking system as something to embrace so long as it's not issued or regulated by the same central banks.<br />
<br />
<br />
<span style="font-size: xx-small;"> -Sodaghar 2/27/14</span></div>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-6150806638360697732014-02-01T11:55:00.000-08:002020-10-20T19:22:02.959-07:00Super Bowl 48: No Tailgating Allowed Slaves<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA5dLjs33SuIsFuc8UI0Z37guTxrETTxNwBkyo2BSK5Hl0xRwvoIUPM-63vEs5EZKyoFBs575DuASxDWtjiu_koBlkuE4I_U96RefEiHXJhi8X7lFmPg0_MhuftJlOMzPBmHZD4PUnsYnw/s1600/NFL.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA5dLjs33SuIsFuc8UI0Z37guTxrETTxNwBkyo2BSK5Hl0xRwvoIUPM-63vEs5EZKyoFBs575DuASxDWtjiu_koBlkuE4I_U96RefEiHXJhi8X7lFmPg0_MhuftJlOMzPBmHZD4PUnsYnw/s1600/NFL.jpg" height="213" width="320" /></a> "You will be allowed to have food in your car and have drink in your
car," game committee <a href="http://www.cbssports.com/nfl/eye-on-football/24370239/no-tailgating-no-limos-no-taxis-at-super-bowl-xlviii" target="_blank">CEO Al Kelly</a> said during a Monday news conference.
"And provided you're in the boundaries of a single parking space, you'll
be able to eat or drink right next to your car. However, you're not
going to be able to take out a lounge chair, you're not going to be able
to take out a grill, and you're not going to be able to take up more
than one parking space. And it'll all be watched very carefully."<br />
<br />
<br />
The average price for a Superbowl 48 ticket is $2,646 and make sure you travel through the harsh weather a few hours earlier to get groped by the TSA before you enter. The <a href="http://blog.tsa.gov/2014/01/tsa-travel-tips-tuesday-super-bowl.html" target="_blank">TSA announced</a>
it will be conducting security, not only at the entrance to the MetLife
Stadium complex in East Rutherford, New Jersey, but at “local
transportation venues, including commercial and general aviation
facilities and mass transit” in the form of VIPR squads. <br />
<br />
“Super Bowl fans may encounter TSA Visible Intermodal Prevention and
Response (VIPR) teams” a recent post on the TSA blog brazenly reveals.<br />
“Most fans are getting to the stadium via mass transit where TSA
officers will be conducting security screening on the way to
the game,” warns the TSA Blog Team, adding that football fans should
arrive early to accommodate enhanced, Constitution-infringing security
procedures.<br />
<br />
No longer is this the home of the free it is now the home of the slave when you cannot attend a sports venue, cannot peacefully assemble and are forced to be "touched" by thugs in uniforms in order to attend a football game.<br />
<br />
The <a href="http://www.infowars.com/nypd-to-roll-out-police-state-for-super-bowl/" target="_blank">NYPD will deploy gun boats</a>,
as well as arm officers with “heavy weapons” in the week prior to the
Super Bowl, preparations the department claims will “protect the public”
and deter terrorists. <br />
<br />
Also while you're at attendance at Super Bowl 48 keep a look out for an armed helicopter above your head.<br />
“The U.S. National Nuclear Security Administration will use a
twin-engine Bell 412 helicopter equipped with radiation sensing
technology, flying in a grid covering about 10 square miles at altitudes
of 150 feet or higher at about 80 miles per hour, according to the New
Jersey Office of Emergency Management,” <a href="http://www.nj.com/hudson/index.ssf/2014/01/choppers_to_scan_background_radiation_as_super_bowl_security_measure_starting_tomorrow.html">reports the Jersey Journal</a>.<br />
<br />
And who flips the bill for all this "security"? You the tax payer do. It doesn't matter that the <a href="http://www.showbiz411.com/2014/01/21/nfl-commish-makes-29-5-mil-a-year-15-times-more-than-tax-free-org-gives-to-charity-more-than-ceos-of-ford-heinz-fedex" target="_blank">NFL Commissioner makes $29.5 Million Dollars a year</a>. And if you didn't know <a href="http://ideas.time.com/2013/12/06/football-a-waste-of-taxpayers-money/" target="_blank">taxpayers pay for the stadiums too.</a><br />
<br />
Did you know there is only <a href="http://online.wsj.com/news/articles/SB10001424052748704281204575002852055561406" target="_blank">11 minutes of actual action in an average football game</a>? Honestly people what is the point? I for one could care less and my "FU" to the Police State is to boycott anything NFL.<br />
<span style="font-size: xx-small;"> </span><br />
<span style="font-size: xx-small;"> </span><br />
<span style="font-size: xx-small;"> -Sodaghar 2/1/14</span>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-5107896491236655652014-01-27T09:59:00.000-08:002015-02-26T18:19:48.746-08:00Bank Imposes Cash Withdrawl Restriction <span class="byline">
<span class="byline-name">By Bob Howard</span>
<span class="byline-title">Reporter, Money Box</span></span><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNUQItYSRMaTCn6tkL8rYF5zzF9PziXy7yX4O5APQDrEFFiHInqWiQ7IqknPJe-aQgHNLoxQ2rpdMEmpeM9inVXl_D67UdXpIvbsGX8g33CuYraKHxZoJnRk3PNkyG0Oud0yLZIJ7HQSUO/s1600/hsbc.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNUQItYSRMaTCn6tkL8rYF5zzF9PziXy7yX4O5APQDrEFFiHInqWiQ7IqknPJe-aQgHNLoxQ2rpdMEmpeM9inVXl_D67UdXpIvbsGX8g33CuYraKHxZoJnRk3PNkyG0Oud0yLZIJ7HQSUO/s1600/hsbc.jpg" height="320" width="243" /></a></div>
<br />
<span class="byline"><span class="byline-title"><a href="http://www.bbc.co.uk/news/business-25861717" target="_blank">BBC</a>:</span></span><br />
<div class="introduction" id="story_continues_1">
<span class="byline"><span class="byline-title"></span></span>Some HSBC customers have
been prevented from withdrawing large amounts of cash because they could
not provide evidence of why they wanted it, the BBC has learnt. </div>
<div class="introduction" id="story_continues_1">
<br /></div>
Listeners have told Radio 4's Money Box they were stopped from withdrawing amounts ranging from £5,000 to £10,000. HSBC admitted it has not informed customers of the change in policy, which was implemented in November. The bank says it has now changed its guidance to staff.
<span class="cross-head">New rules</span>
<br />
Stephen Cotton went to his local HSBC branch this month to
withdraw £7,000 from his instant access savings account to pay back a
loan from his mother.<br />
A year before, he had withdrawn a larger sum in cash from HSBC without a problem.<br />
But this time it was different, as he told Money Box: "When
we presented them with the withdrawal slip, they declined to give us the
money because we could not provide them with a satisfactory explanation
for what the money was for. They wanted a letter from the person
involved."<br />
Mr Cotton says the staff refused to tell him how much he
could have: "So I wrote out a few slips. I said, 'Can I have £5,000?'
They said no. I said, 'Can I have £4,000?' They said no. And then I
wrote one out for £3,000 and they said, 'OK, we'll give you that.' "<br />
He asked if he could return later that day to withdraw
another £3,000, but he was told he could not do the same thing twice in
one day. <br />
<div class="story-feature narrow">
<a class="hidden" href="http://www.bbc.co.uk/news/business-25861717#story_continues_2">Continue reading the main story</a> <br />
<h2 class="quote">
</h2>
<blockquote>
<div class="first-child">
As this was not a change to the Terms and Conditions of your bank account we had no need to pre-notify customers of the change”</div>
</blockquote>
<span class="quote-credit">HSBC customer letter</span>
</div>
<div id="story_continues_2">
He wrote to complain to HSBC about the new rules and also that he had not been informed of any change. </div>
The bank said it did not have to tell him. "As this was not a
change to the Terms and Conditions of your bank account, we had no need
to pre-notify customers of the change," HSBC wrote. <br />
<span class="cross-head">Frustrated customers</span>
Mr Cotton cannot understand HSBC's attitude: "I've been
banking in that bank for 28 years. They all know me in there. You
shouldn't have to explain to your bank why you want that money. It's not
theirs, it's yours." <br />
Peter from Wiltshire, who wanted his surname withheld, had a similar experience. <br />
He wanted to take out £10 000 cash from HSBC, some to pay to his sons and some to fund his long-haul travel plans.<br />
Peter phoned up the day before to give HSBC notice and everything seemed to be fine.<br />
The next day he got a call from his local branch asking him
to pay his sons via a bank payment and to provide booking receipts for
his holidays. Peter did not have any booking receipts to show.<br />
The following day he spoke to HSBC again and this time, having examined his account, it said he could withdraw the £10,000.<br />
<br />
Belinda Bell is another customer who was initially denied her
cash, in her case to pay her builder. She told Money Box she had to
provide the builder's quote.<br />
<span class="cross-head">Customer protection</span>
HSBC has said that following customer feedback, it was
changing its policy: "We ask our customers about the purpose of large
cash withdrawals when they are unusual and out of keeping with the
normal running of their account. Since last November, in some instances
we may have also asked these customers to show us evidence of what the
cash is required for." <br />
"The reason being we have an obligation to protect our
customers, and to minimise the opportunity for financial crime. However,
following feedback, we are immediately updating guidance to our
customer facing staff to reiterate that it is not mandatory for
customers to provide documentary evidence for large cash withdrawals,
and on its own, failure to show evidence is not a reason to refuse a
withdrawal. We are writing to apologise to any customer who has been
given incorrect information and inconvenienced."<br />
<div class="story-feature narrow">
<a class="hidden" href="http://www.bbc.co.uk/news/business-25861717#story_continues_3">Continue reading the main story</a> <br />
<h2 class="quote">
</h2>
<blockquote>
<div class="first-child">
In a sense your money becomes pocket money and the bank becomes your parent”</div>
</blockquote>
<span class="quote-credit">Douglas Carswell</span>
<span class="quote-credit-title">MP for Clacton</span>
</div>
<div id="story_continues_3">
Money Box asked other banks what their policy is on large cash withdrawals.</div>
They all said they reserved the right to ask questions about large cash withdrawals. <br />
But none of them said they would require evidence of what the money was being used for before paying out. <br />
Douglas Carswell, the Conservative MP for Clacton, is alarmed
by the new HSBC policy: "All these regulations which have been imposed
on banks allow enormous interpretation. It basically infantilises the
customer. In a sense your money becomes pocket money and the bank
becomes your parent."<br />
But Eric Leenders, head of retail at the British Bankers
Association, said banks were sensible to ask questions of their
customers: "I can understand it's frustrating for customers. But if you
are making the occasional large cash withdrawal, the bank wants to make
sure it's the right way to make the payment." <br />
<span class="byline"><span class="byline-title"> </span>
</span>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-84830342130940891002014-01-14T21:27:00.000-08:002020-10-20T19:22:02.769-07:00Fact: The DEA Struck A Deal With Mexico's Most Notorious Drug Cartel<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw7ZKD45g-fy5rGHpSpfXYovGU8gm5J02NTxzBlZE_c9HYWaGQAAlStLUpGFI0iU44JmxDOtNPC2zqiMuEhyDEvsGtuM5_EuNmdTFqYBbkv5XWyjty4XT4ez_48AXn1zZB8_2hHt9l0w6n/s1600/Mexican-drug-cartel-1024x682.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw7ZKD45g-fy5rGHpSpfXYovGU8gm5J02NTxzBlZE_c9HYWaGQAAlStLUpGFI0iU44JmxDOtNPC2zqiMuEhyDEvsGtuM5_EuNmdTFqYBbkv5XWyjty4XT4ez_48AXn1zZB8_2hHt9l0w6n/s320/Mexican-drug-cartel-1024x682.jpg" height="213" width="320" /></a><a href="http://www.chron.com/technology/businessinsider/article/CONFIRMED-The-DEA-Struck-A-Deal-With-Mexico-s-5138855.php?cmpid=hpbn" target="_blank">CONFRIMED</a>:<br />
An <a href="http://www.eluniversal.com.mx/nacion-mexico/2014/impreso/la-guerra-secreta-de-la-dea-en-mexico-212050.html">investigation by El Universal</a> has found that between the years 2000 and 2012, the U.S. government had
an arrangement with Mexico's Sinaloa drug cartel that allowed the
organization to smuggle billions of dollars of drugs in exchange for
information on rival cartels.<br />
<br />
This shouldn't be too surprising considering the scandal <a href="http://en.wikipedia.org/wiki/ATF_gunwalking_scandal" target="_blank">"Operation Fast and Furious"</a> where the ATF was caught giving guns to drug cartels in Mexico in order to "track" the weapons movement. To see other agencies of the US government involved with drug and weapon smuggling is really nothing new. We did this same thing during <a href="http://en.wikipedia.org/wiki/Iran%E2%80%93Contra_affair" target="_blank">'Iran-Contra affair'</a> of the 1980's where we supplied weapons to Iran while funding the Contra revolution in Nicaragua using their cocaine as export into American streets. Think about it... the average drug dealer or criminal does not have planes to ship in drugs or a factory making guns but our government does and it is fact that the US ships in all the drugs then puts you in jail for using them. This is a top down effect going from the highest levels of government to your local police all involved in drug dealing. <a href="http://www.dailykos.com/story/2007/12/12/420107/-CIA-Torture-Jet-wrecks-with-4-Tons-of-COCAINE" target="_blank">In 2007 a CIA plane ran out of fuel over Mexico and had 4 TONS of Cocaine on board!</a><br />
<br />
<span style="line-height: 1.5em;">Here's what DEA agent Manuel Castanon told the Chicago court:</span><br />
<br />
<span style="line-height: 1.5em;">"On March 17, 2009, I met for
approximately 30 minutes in a hotel room in Mexico City with Vincente
Zambada-Niebla and two other individuals — DEA agent David Herrod and a
cooperating source [Sinaloa lawyer Loya Castro] with whom I had worked
since 2005. ... </span><span style="line-height: 1.5em;">I did all of the talking on behalf of [the] DEA."</span><br />
A few hours later, Mexican Marines arrested Zambada-Niebla (a.k.a. "El Vicentillo") on charges of trafficking more than a billion dollars in cocaine and heroin.
Castanon and three other agents then visited Zambada-Niebla in prison,
where the Sinaloa officer "reiterated his desire to cooperate."<br />
El Universal, citing court documents, reports that DEA agents met
with high-level Sinaloa officials more than 50 times since 2000."<br />
<br />
<span style="line-height: 1.5em;">"Zambada-Niebla also <a href="http://www.businessinsider.com/fast-and-furious-guns-sinaloa-cartel-2012-8?utm_source=hearst&utm_medium=referral&utm_content=allverticals">alleged</a> that </span><span style="line-height: 1.5em;">Operation Fast and Furious was part of an agreement to finance and arm the cartel</span><span style="line-height: 1.5em;"> in exchange for information used to take down its rivals. (If true, that <a href="http://www.businessinsider.com/fast-and-furious-is-eric-holder-clear-2012-9?utm_source=hearst&utm_medium=referral&utm_content=allverticals">re-raises the issue</a> regarding what Attorney General Eric Holder knew about the gun-running arrangements.)"</span><br />
<br />
<br />
<span style="line-height: 1.5em;">Watch this Documentary by Kevin Booth: American Drug War </span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://img.youtube.com/vi/6CyuBuT_7I4/0.jpg" height="266" width="320"><param name="movie" value="http://youtube.googleapis.com/v/6CyuBuT_7I4&source=uds" /><param name="bgcolor" value="#FFFFFF" /><param name="allowFullScreen" value="true" /><embed width="320" height="266" src="http://youtube.googleapis.com/v/6CyuBuT_7I4&source=uds" type="application/x-shockwave-flash" allowfullscreen="true"></embed></object></div>
<br />
<br />
<span style="line-height: 1.5em;"> </span><br />
<br />
<span style="line-height: 1.5em;">Also let's not forget about the major banks laundering money too and from the drug cartels </span><br />
<span style="line-height: 1.5em;"><a href="http://www.bloomberg.com/news/2013-03-31/money-laundering-banks-still-get-a-pass-from-u-s-.html" target="_blank">Money Laundering banks get free Pass in U.S</a></span><br />
<span style="line-height: 1.5em;"><a href="http://www.infowars.com/banksters-laundered-money-for-drug-cartels-and-al-qaeda/" target="_blank">Banksters Launder money for Drug cartels and Al-qudea </a></span><br />
<span style="line-height: 1.5em;"><a href="http://abcnews.go.com/Blotter/hsbc-handled-billions-drug-cartel-cash-report/story?id=16793242&page=2#.UAXk5nCebBU" target="_blank">ABC: Bank Executive Resigns over drug money, blood money</a></span><br />
<span style="line-height: 1.5em;"><a href="http://www.bloomberg.com/news/2010-06-29/banks-financing-mexico-s-drug-cartels-admitted-in-wells-fargo-s-u-s-deal.html" target="_blank">Banks Financing Mexico Gangs Admitted by Wells Fargo </a></span><br />
<span style="line-height: 1.5em;"><a href="http://www.washingtonsblog.com/2014/01/u-s-banks-launder-hundreds-billions-illegal-drug-cartel-money-refuse-provide-services-legal-marijuana.html" target="_blank">Big Banks Launder Hundreds of Billions of Illegal Drug Cartel Money … But Refuse to Provide Services for Legal Marijuana </a></span><br />
<br />
<span style="line-height: 1.5em;"> Where are the arrests? Oh, that's right bankers don't get arrested pot smokers do....</span><br />
<br />
<span style="line-height: 1.5em;"> </span><br />
<span style="line-height: 1.5em;"><br /></span>
<span style="line-height: 1.5em;"> -<span style="font-size: xx-small;">Sodaghar 1/14/14</span></span><br />
<span style="line-height: 1.5em;"> </span>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-82421889146806589172014-01-01T03:58:00.002-08:002020-10-20T19:20:02.927-07:002014 The Year of Government<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1qVg-y3Kg8pDstcjv8rapi9f9KRuHFgQ9Mqv2TtLV0tIQuXs7Uqoq_SabipVTtOCfb4svd4H_2AxdAlrmwD-sV4tLBPj89rVu04ISdxmBDJ6nTqqlhxhg-ceJBD1ALmbXn1m0sh8px_RU/s1600/times-square-ball.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1qVg-y3Kg8pDstcjv8rapi9f9KRuHFgQ9Mqv2TtLV0tIQuXs7Uqoq_SabipVTtOCfb4svd4H_2AxdAlrmwD-sV4tLBPj89rVu04ISdxmBDJ6nTqqlhxhg-ceJBD1ALmbXn1m0sh8px_RU/s320/times-square-ball.jpg" height="211" width="320" /></a>2014 will be the year government shows their true colors. Already <a href="http://www.reuters.com/article/2013/12/29/us-usa-healthcare-idUSBRE9BL0AF20131229" target="_blank">starting January 1st</a> we the people are culled into socialized health care under the "affordable" care act where the healthy pay for the sick and the young for the old and if you don't want any part of it prepare to be fined. 2014 will also be the year where already <a href="http://norml.org/aboutmarijuana/item/states-that-have-decriminalized" target="_blank">20 states</a> have in some form decriminalized marijuana but according to our government you are still a criminal under federal law. It's my understanding of the United States Constitution that the State Government is GREATER than the Federal Government but over the decades this has been forgotten or ignored. It even goes beyond state into the county's if people in local government understood. A county or a state can legalize something and under the constitution this is law. If a county or state wanted to legalize drugs or same sex marriage the federal government has no authority over this. Same with the sheriff departments in all states and counties they can tell homeland security and the feds to GTFO and they would have constitutional authority to do so. Even jury's can overrule laws or judges we the people just need to be aware of this. I predict 2014 will also be the year of the awake. People no longer buy into the concept of government's being the end-all problem solver and is seen more of as a joke rather than any position of authority. Seriously SNL couldn't come with a funnier skit than Clinton, Bush and Obama as our "leaders" and congress has had less than<a href="http://swampland.time.com/2013/11/12/the-9-congress-approval-rating-hits-the-single-digits/" target="_blank"> 10% approva</a>l since Bush and continues to decrease. <a href="http://thelead.blogs.cnn.com/2013/12/31/40000-new-laws-take-effect-in-2014/" target="_blank">40,000 new laws will take effect in 2014</a> and we the people can only laugh at this so called government. 2014 will be the year of the drone, the year of NSA spying and the year of crypto currency. I for one am glad the government is showing it's hand because this will only solidify those who are awake. 2014 will be a year consciousness takes hold and for the unconscious the year of rude awakenings. "But Josh the stocks are at record high look how awesome we are doing" This is a fools quote because they don't understand the federal reserve is pumping trillions into the stock market daily. They also don't understand the definition of inflation because if stocks are at a certain number and the value of the currency is reduced by more than half then you are looking at a fake number. Same with unemployment; they claim it's at 8% or so but don't take into account those who stopped receiving unemployment benefits or stopped looking for a job all together. 2014 will be the year of hope or despair. We choose it's outcome. Happy new year.<br />
<br />
<span style="background-color: white; color: #666666; font-family: Verdana, sans-serif; font-size: 13px; line-height: 18px;"><span style="font-size: xx-small;">- Sodaghar 1/1/14</span></span>The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0tag:blogger.com,1999:blog-6177643149379849538.post-87869418330892490082013-12-12T02:54:00.004-08:002022-11-12T11:52:24.763-08:00Bitcoin The Evolution<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlUglMmIlFnkwyY9JHfstnG0LvX2ASpzf4Gu8Xj_Y4inFma_ybwo51R0v9ULwOtLebVtN9c3Xn66cEiD_TY0lr4YaEKR4xMjvhCOmXUCOss5UjZDIWjgjX3UgjLY0v4yf69ROAjD7Bpee6/s1600/bitcoins.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="122" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlUglMmIlFnkwyY9JHfstnG0LvX2ASpzf4Gu8Xj_Y4inFma_ybwo51R0v9ULwOtLebVtN9c3Xn66cEiD_TY0lr4YaEKR4xMjvhCOmXUCOss5UjZDIWjgjX3UgjLY0v4yf69ROAjD7Bpee6/s320/bitcoins.png" width="320" /></a> By now I'm sure all of you in some way have heard of this thing called Bitcoin. Bitcoin is the first decentralized, digital currency that uses the internet to buy, trade and exchange money worldwide. Decentralized meaning you don't have over bearing banks or financial institutions charging and telling you how to use your own money. Bitcoin is not a fiat printed currency like our dollar so there no risk of inflation and the main benefit I see from Bitcoin is keeping prying eyes like the IRS away from your money. Like I said Bitcoin is a digital currency that fluctuates just the dollar and other currencies.<br />
<br />
The story I'm about to tell you is a personal story of regret<br />
.<br />
A little over a year ago I heard about this Bitcoin thing and after doing some research it got me real excited. I told myself my friends and family that this is the future. The dollar is going nowhere and even if it was it's still controlled by institutions and governments. I went on and on about Bitcoin (BTC for short). And this was when BTC was hovering between $9 and $12! <br />
I did end up buying a couple of Bitcoins and at that time; a year and half ago I told myself to invest at least $1000. Now Bitcoin is well over $400 for one! We should all revel in the fact that this exists because what it means is that we get to keep our own money and watch it grow! I predict by this time next year BTC will be around $1500 if not more. Major companies like<a href="http://techcrunch.com/2013/12/10/kryptokit-lets-you-pay-in-bitcoin-instantly-on-almost-any-webpage/" target="_blank"> Amazon</a> are now beginning to accept BTC because they know this is the future.<a href="http://money.cnn.com/2013/12/10/technology/bitcoin-jpmorgan/" target="_blank"> JP Morgan Chase is even trying to capitalize on Bitcoin</a>. Many other <a href="https://www.spendbitcoins.com/places/" target="_blank">retailers also accept BTC</a>.<br />
Even if your not looking to buy using BTC it's a safe haven for your money and within 15mins that money can be transferred into cash around the world. The <a href="http://www.forbes.com/sites/charleskadlec/2012/02/06/the-federal-reserves-explicit-goal-devalue-the-dollar-33/" target="_blank">dollar is already at an an all time low</a>. No more will we have big brother watching our spending habit's, No more will we have our money lose value and No more will we be taxed on what we earn. Don't make the mistake I did and start investing in Bitcoin now. It's only going to rise in value and it's only going to gain popularity.<br />
<br />
Bitcoin is inflation proof because it's not printed hand over the fist like the dollar and the only way to stop BTC is to shut down the internet. The global economy relies on consumers and consumers do everything online from banking to shopping. Everyone reading this should consider BTC as an investment before it becomes way too expensive. Whether we like it or not Bitcoin may very well destroy the dollar. <a href="https://blockchain.info/" target="_blank">Blockchain</a> is a leading Bitcoin wallet it's fast, free and in about 5 minuets you can have your very own wallet and address. You can go to any place that does western union or money gram and in less than a half hour you will have the Bitcoins in your own personal wallet and with this you can keep your hard earned money hidden and transfer it globally.<br />
<br />
If you're still unsure or have questions about Bitcoin please feel free to contact me and I will help you and tell you some other uses of Bitcoin.<br />
<br />
<br />
<br />
<span face=""verdana" , sans-serif" style="background-color: white; color: #666666; font-size: 13px; line-height: 18px;"><span style="font-size: xx-small;"> - Sodaghar 12/12/13</span></span><span face=""trebuchet ms" , "trebuchet" , "verdana" , sans-serif" style="background-color: white; color: #666666; font-size: 13px; line-height: 18px;"></span> <br />
<br />The Good Fight Newshttp://www.blogger.com/profile/05797891174901209044noreply@blogger.com0