The assassin Tommy Mair was an early subscriber to a South African nationalist agitation rag. ([Update #1] This information has been removed from the link. Was it the wrong Tommy Mair?)

The dumb fuck could have waited two weeks for the vote; Brexit was up in the polls until now.

Now watch the other side squirm and insist that a politically motivated killer was only mentally ill and it had nothing to do with his politics. ([Update #1] If the evidence of his motivation has been pulled, we're stuck with no evidence about his motivation. Still, it wouldn't surprise me.)
Update #2: his political motive is confirmed.

So I logged onto Facebook for the first time in a year or two and it recommends three people:

  1. My dad again
  2. Someone I briefly knew at a different school, and not the last person.
  3. A third person who I don't know but is someone who Facebook could reasonably have found through my friends network. The first two suggestions are not.

A possible explanation: the second person got me to join some other social network whose name I have forgotten. It's possible that I might have used the same email to join both and that Facebook bought and merged their database.

Another possibility is that I may have searched Facebook for the names of these acquaintances years ago and Facebook stored the search requests to datamine later. However, I don't see why I would have searched for this person if I knew that they used a different social network.

Earlier posts on this subject:

  1. Facebook recommends a co-worker with no apparent connections
  2. Facebook recommends my dad -- when I'm using a fake name
  3. Facebook recommends an organization that spammed my email account
  4. Facebook gives me its French version after I read Le Monde
  5. Facebook recommends pages for interests that I removed from my personal information
  6. Facebook recommends my dad -- when he's using a fake name
  7. Facebook recommends an old school acquaintance shortly after her account got hijacked by spammers
  8. Facebook recommends a website that I was reading the night before
  9. Facebook might be recording words spoken near your cell phone

From the Shorenstein Center:

The report shows that during the year 2015, major news outlets covered Donald Trump in a way that was unusual given his low initial polling numbers—a high volume of media coverage preceded Trump’s rise in the polls. Trump’s coverage was positive in tone—he received far more “good press” than “bad press.” The volume and tone of the coverage helped propel Trump to the top of Republican polls.

And with Trump standing in support of the gay community after Orlando while Democrats in Congress protested against a moment of silence for the victims and demanded the disarmament of ISIS's future victims, and with Clinton's creation of ISIS hanging around her neck, Trump probably just won the presidency. Sanders or Warren could beat him if Clinton is indicted, but the Democratic Party is probably too corrupt to allow that to happen.

Take it with a grain of salt, it's in the Mail after all:

A recent public letter warning against Brexit argued that EU laws have ‘a hugely positive effect’ on the environment. It was signed by the heads of a dozen green pressure groups including Natural England, the Green Alliance, the RSPB and the Natural Environment Research Council. What was not mentioned was that the European Commission funds eight of the 12 organisations directly.

[...]

The last time Britain had to approve a major transfer of power to Brussels was in 2007, when we ratified the Lisbon Treaty. Introducing the Bill in Parliament, the then Foreign Secretary, David Miliband, made a great song and dance of quoting a whole range of organisations in favour. ‘The NSPCC has pledged its support, as have One World Action, Action Aid and Oxfam,’ he said, looking pleased with himself. [...] It turned out every organisation he cited was in receipt of EU subventions. Hardly surprising, then, that they should dutifully endorse a treaty supported by their paymasters.

What was surprising was the extent of their financial dependency. When I asked the European Commission how much money it had paid these organisations, it emerged that Action Aid, the NSPCC, One World Action and Oxfam had among them been given €43 million in a single year.

[...]

Back in 2003, when the European Constitution was first being drawn up, 200 organisations supposedly representing ‘civil society’ were invited to submit their suggestions on what it should contain. All of them were in receipt of EU grants.

This sounds more like a racket than a government. I would not be surprised if all of it were true.

An unconfirmed report of how the Nevada Democratic caucus went

A motion was brought to the floor by the DNC chairwoman to retroactively change the nevada primary rules...to give a victory to Hillary instead of to Bernie (who had stood as the winner by all counts when the day began).

To "democratically" enact this, the chairwoman called for a voice-vote...and although the NAYS far-outweighed the YEAS, she declared it a 'YEA'...and the rules retroactively changed.

When a motion was brought to the floor to unseat the chairwoman...and it looked like it would succeed...she adjourned the meeting without following the rules and declared Hillary the victor. Then she ran off the stage behind a wall of state police, just moments before this picture was taken...

Earlier: Yglesias makes it big - "how is a journalist able to afford a million-dollar home?"

Now: Vox’s Puff Piece on Goldman Sachs Doesn’t Reveal Goldman Sponsors Vox

Vox’s Matthew Yglesias (4/25/16) gave a generous write-up to Goldman Sachs’ new commercial banking subsidiary, GS Bank, without noting that Goldman Sachs is a sponsor of Vox.

One of the revelations from the Panama Papers:

Among those companies is the Russian Sberbank, whose U.S. investment banking branch recently enlisted the services of the Podesta Group. According to its lobbying registration form, the firm will work on banking, trade, and foreign relations issues.

One of the three lobbyists working on the account is Tony Podesta, a bundler for the Clinton campaign and the brother of campaign chairman John Podesta, who co-founded the firm.

Previously: the Podesta Group lobbied for Russia to buy 20% of US uranium mining rights.


Probably related: Some natsec tweeters are endorsing a dead cat as the least bad candidate in this election. It is difficult to imagine a persuasive counterargument.

Wikileaked Hillary Clinton email #12166, dated July 25, 2012, shows Jared Cohen of Google Ideas working with al-Jazeera to develop a list of defecting Syrian officers and to encourage further defections. Quote:

Please keep close hold, but my team is planning to launch a tool on Sunday that will publicly track and map the defections in Syria and which parts of the government they are coming from. Our logic behind this is that while many people are tracking the atrocities, nobody is visually representing and mapping the defections, which we believe are important in encouraging more to defect and giving confidence to the opposition. Given how hard it is to get information into Syria right now, we are partnering with Al-Jazeera who will take primary ownership over the tool we have built, track the data, verify it, and broadcast it back into Syria

Cohen's email was sent to William J. Burns, Deputy Secretary of State; Jacob J. Sullivan, national security advisor to Hillary Clinton; and Alec Ross, Senior Advisor for Innovation in the State Department. Sullivan forwarded Cohen's email to Clinton, who forwarded it to her aide Monica Hanley.

Previously, al-Jazeera hosted exiled Egyptian Muslim Brotherhood leaders who had given al-Qaeda free rein over Egypt. Also, the US support for extremists in Syria got so bad that a member of the Joint Chiefs of Staff defected to Russia to try to stop it.

Jared Cohen has a reputation as a loose cannon, "doing things the CIA cannot do", with White House and State Department support. Interestingly, Hamas allowed him to travel to Gaza for reasons that the people at Stratfor were not aware of.

The Independent is set to fire 5/8 of its journalists and go online-only. All those dismissed should get together, agree to work for minimum wage for a while, and make a new newspaper called the Insolvent.

This follows The Telegraph getting captured by HSBC.

Previously I imagined an X-files spinoff set in the South, similar to how CSI has spinoffs in different cities. Here's another story in the same universe. Read more... )

An ideally secure network will have certain features:

  • Encrypted contents: MITM attacks cannot determine what data is moving across the network.
  • Encrypted storage: Those with physical access to a network node cannot tell what data the node contains.
  • Redundancy: The network can survive the removal of any node without loss of data.
  • Expansion: The operator can raise new nodes with minimal effort.
  • Immunity: The network can resist the insertion of fraudulent nodes by a hostile party.

Basically, an encrypted cloud with encrypted transportation running on servers with encrypted disks.

Advanced features:

  • Confusing transportation: Upon intercepting and decoding a message, an observer cannot identify the sender or intended recipient.
  • Invisible transportation: The network cannot be identified unless the observer is looking for it.
  • Obscured transport method: An observer will have difficulty determining that observed traffic is part of the network. For example, data sent over DNS or ICMP may be ignored by most observers.
  • Obscured transmission method: An observer with physical access will have difficulty observing that the transmission is taking place. For example, there was a virus that communicated with other infected systems in the same server room using sounds outside of human hearing range through a computer's speakers and microphones.

zdnet lists five cloud systems: Openstack, Docker, KVM, CloudStack, Ceph. Docker is reportedly popular.

Ceph is a distributed storage engine. The others seem to be different types of products.

The closest to an off-the-shelf system might be:

  1. Use Ceph
  2. Run every Ceph instance on an encrypted HD
  3. Run every intermediary connection through an encrypted tunnel
  4. Run the tunnels through tor?
  5. Develop a generic method of raising a new node and adding it

As an update to the earlier post about a Prince Mohammad al Fatih al Bahraini being killed while commanding al-Qaeda forces in Bosnia in 1992, two pieces of evidence add weight to this story.

During the September 1992, the first Mujahedin offensive operation against the Serbs was carried out, under the leadership of the Bahraini Prince Muhammad Al-Faatih Al Bahraini, with Sheikh Anwar Sha'baan, as second in command. The Bosnian Muslim forces had been formed, and Allah willed for them to join the Mujahedin. A group of them participated in the operation. The Mujahedin moved towards the Serb front line, penetrating and gaining control over these areas, inflicting heavy defeats on the enemies of Allah. At this time the Bosnians did not have a complete understanding of the Islam, of [inaudible], and the understanding of why they were fighting. In addition to this, the limited military capabilities of the front line meant that they were unable to hold their positions due to the heavy Serbian shelling.

(...cutting empty rhetoric...)

THE NARRATOR: [In English] Abu Shareef was from the first people to arrive in the land of Jihad of Bosnia on the same ship that was carrying Al-Faatih, and Allah willed for them both to be killed in the first operation against the Serbs. Abu Shareef had participated in the Afghan Jihad. Then he moved to a European country. Upon hearing of the tragedy that had befallen the Muslims in Bosnia he answered the call of his Lord.

As to the say in which he was killed after the death of Al-Faatih, in the physical operation the brothers decided to take his body away. Abu Shareef had the responsibility of providing cover for the brothers with a PK machine-gun whilst they were removing Al-Faatih's body. Then Abu Shareef was hit by a piece of shrapnel on his arm, and a moment later he was hit by a mortar shell which killed him and Abu Anas Al-Jeddawi so they joined their brother Al-Faatih.

The tape goes on to discuss al-Qaeda's oft-forgotten attacks on Croatian forces, in one case "taking women and children as prisoners, to be handed to the Bosnian army", a probable euphemism for selling them into slavery. A contemporary news report backs up that fighting occurred between the Croats and Muslims, and an AFP report accuses the mujahids of killing 200 civilians. It still amazes me that NATO took the side of these Muslims against Fikret Abdic's forces. Another blogger notes that Kosovo and Bosnia are now the primary recruitment grounds for ISIS.

As for the prince himself, we do not have enough information to know that he is a prince or his real name. "Mohammed al-Fatih" is the title of the conqueror of Constantinople so it is likely a nom de guerre.

Profile

tangaroa

June 2016

S M T W T F S
    1234
56 7891011
121314 15 161718
19202122232425
2627 282930  

Syndicate

RSS Atom

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 29th, 2016 05:21 am
Powered by Dreamwidth Studios