Mini-Me: Myths of US Government Shattered – JFK Assassination by USG Cabal Set to Unravel Along with 9/11 Related Lies and Cover-Ups

07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Blog Wisdom, Book Lists, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Government, IO Deeds of War, IO Impotency
Who? Mini-Me?

Huh?

The Murder of [CIA Spouse] Mary Pinchot Meyer

Jacob G. Hornberger
Future of Freedom Foundation

Recently by Jacob G. Hornberger: The Kennedy Assassination

In early 1976 the National Enquirer published a story that shocked the elite political class in Washington, D.C. The story disclosed that a woman named Mary Pinchot Meyer, who was a divorced spouse of a high CIA official named Cord Meyer, had been engaged in a two-year sexual affair with President John F. Kennedy. By the time the article was published, JFK had been assassinated, and Mary Pinchot Meyer herself was dead, a victim of a murder that took place in Washington on October 12, 1964.<

The murder of Mary Pinchot Meyer is the subject of a fascinating and gripping new book by Peter Janney, who was childhood friends with Mary Meyer’s three sons and whose father himself was a high CIA official. Janney’s father and mother socialized in the 1950s with the Meyers and other high-level CIA officials.

Amazon Page

Janney’s book, Mary’s Mosaic, is one of those books that you just can’t put down once you start reading it. It has everything a reader could ever want in a work of nonfiction – politics, love, sex, war, intrigue, history, culture, murder, spies, racism, and perhaps the biggest criminal trial in the history of our nation’s capital.

Just past noon on the day of the murder, Mary Meyer was on her daily walk on the C&O Canal Trail near the Key Bridge in Washington, D.C. Someone grabbed her and shot a .38-caliber bullet into the left side of her head. Meyer continued struggling despite the almost certainly fatal wound, so the murderer shot her again, this time downward through her right shoulder. The second bullet struck directly into her heart, killing her instantly.

A 21-year-old black man named Raymond Crump Jr., who lived in one of the poorest sections of D.C., was arrested near the site of the crime and charged with the murder. Crump denied committing the crime.

There were two eyewitnesses, neither of whom, however, personally identified Crump. One witness, Henry Wiggins Jr., said that he saw a black man standing over the body and that the man wore a beige jacket, a dark cap, dark pants, and dark shoes. Another witness, William L. Mitchell, said that prior to the murder, he had been jogging on the trail when he saw a black man dressed in the same manner following Meyer a short time before she was killed.

Continue reading “Mini-Me: Myths of US Government Shattered – JFK Assassination by USG Cabal Set to Unravel Along with 9/11 Related Lies and Cover-Ups”

Howard Rheingold: Robin Good Picks Best News Discovery Tools

Advanced Cyber/IO
Howard Rheingold

Best News Discovery Tools 2012

Robin Good: If you are curating a specific topic you may find yourself often wading through tons of useless content and wondering where you can find some good stuff.

One option is to start using some good news discovery tools which can greatly help you filter out some of the useless spammy content that fills in most unfiltered searches and feed streams.

Here is my mindmap on news discovery tools which can help you in finding your best crop of interesting stories on the specific topic you are interested in.

It contains over 30 news discovery tools and services all with a direct link.

Direct map link: http://bit.ly/bestnewsdiscoverytools

(Thanks also to Beth Kanter for featuring me and this list in her recent live presentation in NY – find out more in her curated report here: http://storify.com/kanter/what-can-nonprofits-learn-about-content-curation-f )

Click on Image to Enlarge

Howard Rheingold: Groofer Social Search, Bookmarking and Reader

Advanced Cyber/IO
Howard Rheingold

Groofer Social Search, Bookmarking and Reader

Groofer makes finding and sharing online information easier.

Instead of having to visit multiple web sites, Groofer let’s you and your team share search results and links directly from your browser so that they can be discussed and archived as needed.

You can also subscribe to, read and discuss your favorite feeds as a group and collectively stay informed on what’s important to you.

Making Search Social

Groofer makes searching and bookmarking social within your organization. You can easily rate or leave comments on links, search results and feeds in one secure private social network. Members of your team or work group can view the same results, see your comments, and add their thoughts too.

Sharing and Discussion

Groofer is built for sharing search results, links, news and blog articles, and group messages. It is the ability to add comments and context to search results that sets Groofer apart.

Collective Intelligence

Groofer automatically stores discussions and comments from group members and displays them as you search or read. You don’t have to do anything different. Work groups can also save relevant information on topics or research projects for easy access.

Your Own Private Social Network for Free

Groofer can also work as a private social network for your team or work group. You can create groups, send messages, share links and store information in folders aligned with your projects or interest areas. Try it now!

Mini-Me: Debunking Civil War Myths – About Control and Money, Not Freedom – Time for Secession Again, But From All Four Corners?

05 Civil War, 07 Other Atrocities, 11 Society, Civil Society, Cultural Intelligence, Government, History, IO Impotency, Military, Officers Call
Who? Mini-Me?

Huh?

Debunking Civil War Myths – Long Proven Wrong

The Victors Write the War History, but Should Their Lies be Immortal?

[Veterans Today Editors Note: I was 46 before I learned that Lincoln's Emancipation Proclamation did not free a single slave  anywhere ….Jim W. Dean]

… by  Steve Scroggins

The most persistent and pernicious Big Lie regarding the so-called “Civil War”— more properly called the “War to Prevent Southern Independence”— is this:

Noble and saintly yankees fought the war to abolish slavery; evil Confederates fought to preserve it. 

The historical record incontrovertibly refutes this Big Lie and yet it lives on, repeated incessantly by many who know better, and by many, many more who accept without challenge what they were taught in government schools.

Continue reading “Mini-Me: Debunking Civil War Myths – About Control and Money, Not Freedom – Time for Secession Again, But From All Four Corners?”

DefDog: Deja Vu on Cyber-Security, 25 Years After Terminal Compromise

IO Impotency
DefDog

Deja vu!  Seem to recall Winn Schwartau saying all of this in 1990-1991.

The Looming Specter of Cyber Warfare: Deprivations and Social Breakdowns

Keeping your finger on the pulse of evolving cyber threats is very difficult as they change so frequently and abruptly. In the following interview, IDGA’s @DefenseInsider explores the current and future landscape of cyber warfare with Scott Borg, CEO of the Cyber Consequences Unit. Chris Archer asks how cyber warfare will affect defense in the future and what’s being done to ensure the military and government remain ahead of the evolving threats. Scott Borg also reveals the current aims and priorities within the US Cyber Consequences Unit.

Scott, in your opinion how will cyber warfare affect defense in the future?

Cyber warfare will require us to rethink every aspect of defense. Our current weapons and defense systems will still be needed, but the way we use them will become very different. A major cyber assault could completely bypass our military forces. It would not require incoming airplanes, missiles, ships, or troops. The attack could suddenly appear inside the computerized equipment of our major industries. The identity of the country or organization that was responsible could be impossible to determine quickly or with complete confidence. The cyber assault could cause almost any kind of damage that could be produced by the human operators of computerized equipment. In fact, a cyber attack could cause many kinds of damage that the human operators of industrial equipment could only achieve by reprogramming their controls.  A major cyber assault could physically destroy or sabotage electrical generation stations, refineries, pipelines, banking systems, railroad switches, flight control centers, chemical plants, hospital equipment, and water and sanitation facilities. Thousands of people could be killed immediately by explosions, leaks of toxic chemicals, airplane crashes, train crashes, and wrong medical treatments. Hundreds of thousands could be caused to die over the months to come as a result of famine, disease, loss of heating or cooling, and the general deprivations and social breakdowns resulting from people no longer being supplied with the necessities of life. The total economic damage and fatalities could surpass any other kind of assault, except for a nuclear one.

Our current defense strategy ‐‐ having the government defend our boarders, being ready to annihilate adversary military forces or countries, and letting domestic industries completely ignore defense issues ‐‐ is clearly no longer appropriate in a world where this sort of attack is possible. The entire relationship between our military and our society will need to be redefined.

Continue reading “DefDog: Deja Vu on Cyber-Security, 25 Years After Terminal Compromise”

Owl: The DHS Cybersecurity Logjam [aka Goat-Fest Scam]

Corruption, Government, IO Impotency
Who? Who?

Global Insights: The DHS' Cybersecurity Logjam

By Richard Weitz

World Politics Review | 10 Apr 2012

When the Department of Homeland Security (DHS) was established in March 2003, one of the new department’s primary goals was to enhance U.S. cybersecurity. But after several years passed without major DHS initiatives in this area, observers concluded that the department was insufficiently prepared or resourced to address cyber emergencies. Indeed, prior to the 2008 presidential election, the influential think tank Center for Strategic and International Studies’ Commission on Cybersecurity recommended that the next occupant of the White House formally revoke DHS’ limited authority to coordinate cybersecurity because the department, having never had authority over the U.S. military, intelligence community and law enforcement agencies, could not perform this coordination role effectively.

When the Obama administration assumed office, it followed many of the commission’s recommendations, but it ignored this one. With White House encouragement, DHS has made it a higher priority to address the security of U.S. civilian cyber networks and has earned greater support in Congress for remaining the lead civilian agency in this area. For example, DHS made cybersecurity one of its five most important mission areas in the first-ever Quadrennial Homeland Security Review (QHSR) released in 2010, 74 percent higher than in the 2012 budget.

DHS currently has the lead role in securing federal civilian network systems, sometimes described as the “dot.gov” domain. Through its National Infrastructure Protection Plan, DHS works with private- and public-sector owners and operators of critical infrastructure and key resources to bolster their cybersecurity preparedness, risk mitigation and incident-response capabilities. The fundamental problem the department faces is that, at present, it has responsibility to protect all nondefense public- and private-sector networks from cyberattack, but lacks sufficient authority to accomplish this mission.

Continue reading “Owl: The DHS Cybersecurity Logjam [aka Goat-Fest Scam]”

Mini-Me: Bin Laden death-detecting analytics service signs partnership with Twitter

IO Impotency
Who? Mini-Me?

Huh?

Bin Laden death-detecting analytics service signs partnership with Twitter

A Twitter analytics company that said it detected Osama bin Laden's death before it was reported by the news media has signed a partnership with Twitter, and is expanding the availability of its service for notifying financial firms and government clients of highly unusual events.

The company, Dataminr, described its technology at the Twitter Devnest conference last May, shortly after its service used Twitter data to report bin Laden's death to its clients before the story hit major media outlets. Today, Dataminr is announcing a partnership with Twitter allowing it greater access to tweets and their metadata, and is expanding availability of the service.

Dataminr and Twitter did not make its executives available for phone interviews, saying Dataminr customers are concerned about revealing too much information, but gave us an early copy of the press release being issued this morning. The announcement says that “Dataminr has just signed a partnership with Twitter, which includes access to the full Twitter Firehose in real-time,” and that it is unveiling “its novel technology for using Twitter’s public Tweets to create actionable signals for enterprise clients.”

Continue reading “Mini-Me: Bin Laden death-detecting analytics service signs partnership with Twitter”