Anonymous ID: 60a95a April 18, 2020, 3:50 a.m. No.8836854   🗄️.is 🔗kun   >>6860 >>7009

A NATION ON FIRE

 

Book mentioned in "secret task force" article in Newsweek by U.S. Army Maj. Gen. Omar J. Jones, commanding general of Joint Force Headquarters-National Capital Region and U.S. Army Military District of Washington

 

Quote is at the end of article here:

 

https://www.newsweek.com/exclusive-washington-dc-faces-coronavirus-spike-secret-military-task-force-prepares-secure-1498276

 

Author is "Clay Risen" (Risen, Clay)

 

>“What about Vietnam?” If violence is wrong, why is America overseas

killing thousands, to no clear end? “Their questions hit home, and I knew that I could never again raise my voice against the violence of the oppressed in the ghettos without having first spoken clearly to

the greatest purveyor of violence in the world today: my own government.”

 

The audience erupted in applause.

 

>But King’s reception beyond the Upper West Side was not so positive. The speech was almost universally panned. Johnson’s staff

immediately saw it as a thinly veiled attack on the president.

 

https://www.denverpost.com/2009/07/02/a-nation-on-fire-by-clay-risen/

 

>>8836444 (PB)

>>8836563 (PB)

Anonymous ID: 60a95a April 18, 2020, 4:22 a.m. No.8836962   🗄️.is 🔗kun   >>6975

"Jimmy had been down there a long time. I thought it was time I went below and had a look for myself." - Mike Nelson, Sea Hunt

 

tens millions of Americans installed ZOOM.EXE on their computers in the last three weeks.

 

who owns zoom?

China.

Zoom comes from Chi-nah

 

>Yuan is the founder of video conferencing app Zoom. Even before the outbreak of the novel coronavirus forced people to work and socialize primarily online, Zoom's share price grew exponentially. Just one year after joining the three-comma club, Yuan has amassed a fortune of over $7.5 billion, according to the Bloomberg Billionaires Index.

 

https://www.businessinsider.com/meet-zoom-billionaire-eric-yuan-career-net-worth-life

 

ZOOM EXE is Chinese spyware. It grants acess to every file on compromised machine.

 

NO way MI is not aware of this.

 

Taking out ZOOM.exe will not fix this problem.

 

The only way to fix the anonymous insecure spy built internet is to replace it

 

with a new kind of identity based information system.

Anonymous ID: 60a95a April 18, 2020, 5:12 a.m. No.8837115   🗄️.is 🔗kun   >>7124

>>8837009

Podcast:

[paraphrase]

Gen talks about leaders responsibility

to maintain good order and discipline

engaged leadership

General is former chief of public affairs

Gen talks about housing - has been Army housing outsourced/privatized by cult DS corruption - current housing conditions still in some cases shit/unsafe/unhealthy

fixing these a high priority - great progress made, more to do.

MOTO !

Go fort Meade

 

Gen talks about book by Clay Risen it's a story about the incitement of the 68 'race' riots in DC.by Deep State cult provocateurs

 

key - the book - message: US Military and the General are well prepared for similar DS provocateur riot shenanigans.

 

From A Nation on Fire by Clay Risen

 

>They began marching. Signs began appearing in the crowd reading

LOEB EAT SHIT. As they reached Main Street, those in front-King, Young, Lawson-began to hear commotion behind them. Several militant

groups, along with a klatch of assorted angers-on, had decided to embarrass King by turning the march into a riot. They were breaking

windows, looting, and harassing onlookers.

 

>What followed was several hours of mayhem: police, who had stood by while the strikers turned their city into an open-air garbage dump, wielded their batons and tear gas with glee. Marchers who sought refuge in Clayborn Temple were ordered out, and as they left the building they were beaten by waiting cops. The sole fatality, sixteen-year-old Larry Payne, was shotgunned in the stomach by a cop who claimed he was wielding a knife, though witnesses said the boy had both hands raised.

“Instead of King’s nonviolent ‘dress rehearsal’ for the Poor People’s Campaign,” historian Michael Honey wrote, “the Memphis march left

behind a wasteland.”

 

Here's the book:

https://www.denverpost.com/2009/07/02/a-nation-on-fire-by-clay-risen/

 

This use of outside provocateurs to initiate riots and execute false flag, perform assassinations is an area of expertise for the pedovore DS cultists.

 

The DS famously used provocateurs in Ferguson, where mysterious 'outside agitators' appeared and began throwing fire bombs at the cops, breaking store windows.

 

Local members of the black activist community were well aware of the fake protester's activities but unable to get MSM news media to take interest in the story. Riots are good ratings.

 

Clay Risen himself is a bugman, he's the second oped page editor from the end and a ranked competitor in the Mockingbird journalist tidy desk Olympics.

Anonymous ID: 60a95a April 18, 2020, 6:27 a.m. No.8837526   🗄️.is 🔗kun   >>7563

"The meta data" is the gold. It tells more about of than the actual transcript of our calls. It is how we are watched and tracked and it is why our data is so valuable right now to commercial users who want to sell us things, and to our opponents in this multi polar information war.

 

>Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted.[1] In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.

 

We can tell everything about an individual without ever knowing our name. Where we shop, how we vote, or if we vote and why. If a subject is of extreme interest the meta data can be used to identify an individual.

 

There's no reason to care about real world identities. We don't need to know someone's name to manipulate their news feed and provide specially prepared media content.

Media news content can make us angry or sad, stimulate us sexually, make us recall old grievance, encourage us to drink or take drugs, make us more threatened by or less conscious of race, religion or economic status.

 

To defeat traffic analysis and remove the possibility of this type of control of anybody by anybody else we need a specific type of advanced network.

 

An identity based secure network which use a series of specially configured servers called a mix net which scramble the data of millions of users encrypting, mixing routing data through multiple, re mixing and encrypting at each stage making it impossible for an enemy to determine where any message came from, defeating "traffic analysis."

 

https://en.wikipedia.org/wiki/Mix_network

 

The former data limitation of mixnets has no been largely overcome.

 

But mix nets are only one component of a secure information distribution system that will prevent the most widely used surveillance.

 

The chief component of a secure network is identity. We need a single, permanent lifetime identity in virtual space for the same reason we need one in the real world. For the same reasons. If our friends or neighbours could appear to be someone else we would not know who to trust. We'd be surrounded by shapeshifters with no fixed identity.

 

Sound familiar? That's what the internet is right now. That's because on an anonymous insecure network it is possible to spoof credentials and present a convincing and deceptive appearance to cheat and manipulate others.

 

We need a single permanent life time identity -but we also need anonymity. There are lost of good reasons for someone to want to be anonymous. To make a gift. To blow the whistle on crime. To show and pay for things without giving your real world identity to a merchant who will sell it to others.

 

On the secure identity based network it is possible to do everything anonymously - credentials can be split many ways. If a users wants to over evidence of expertise in their field we can do so without revealing any more ourselve. "Played violin professionally" or "licensed crab boat captain" or Doctor of Divinity degree.

 

Networks are not secure for anybody until they are secure for everybody.

We need to build the information system of the future as an international engineering project, so the safety and engineering are open to all the nations who will depend on this infrastructure to support civilization.

 

We can not allow an enemy to capture our information systems again. The way to prevent this happening is to make the network a public utility owned and controlled by users used to provide media content provided by trusted individuals or companies, unmanipulated by anyone else. Secure for all, because it is secure from all, even the people who build it.

 

The cult has until now controlled our information supply. They used it to star the first world war.

 

https://www.tabletmag.com/sections/news/articles/karl-kraus-145-fake-news

 

The cult control by symbols, images and music, it uses whatever media exist. The cult will be able to do this as long as we continue to use anonymous, insecure-by-design communications networks like the internet.