Reference: US Secret Intelligence, US Banks, Illicit Gold, Murder of the Global Economy, RECAP

The memorandum “Collateral Damage: U.S. Covert Operations and the Terrorist Attacks on September 11, 2001” has been circulating for years on the Internet, studiously ignored by most.  It was previously posted as a journal item on this website.  Since then, the public has learned a great deal more about both gold and greed, and the …

Robert Steele: Microsoft Operation Cloudburst

After some effort, the below memorandum on Operation Cloudburst was delivered to and read by Reed Hastings and Norm Judah (the latter Chief Technical Officer for Microsoft).  Microsoft as a culture evidently cannot make the intellectual leap from legacy kludge to Open Everything, monetizing the aggregate instead of the instance.  This memorandum is the intellectual …

Search: readable version of alternative paradigm

There are two alternative paradigms in the history of this modern reform fight.  Here they are: 1992 E3i: Ethics, Ecology, Evolution, & intelligence (An Alternative Paradigm) 2001 Threats, Strategy, and Force Structure: An Alternative Paradigm for National Security Not labeled an alternative paradigm, but of over-arching importance, is this contribution: 1996: CREATING A SMART NATION: …

Review: Sacred Economics – Money, Gift, and Society in the Age of Transition

Charles Eisenstein Beyond 5 Stars, an Integrative Pioneering Work,August 13, 2011 Sacred Economics is the second book in the new Evolver Editions imprint, following Jose Arguelles Manifesto for the Noosphere. Other books in the first season include What Comes After Money, The Secret Tradition of the Soul, The Four Global Truths, The Electric Jesus, Star …

Review (Guest): The Long Twentieth Century – Money, Power and the Origins of Our Times

Giovanni Arrighi Product Description Winner of the American Sociological Association PEWS Award for Distinguished Scholarship: a comprehensive analysis of the development of world capitalism over the millennium. The Long Twentieth Century traces the relationship between capital accumulation and state formation over a 700-year period. Arrighi argues that capitalism has unfolded as a succession of “long …

John Robb: Operation Shady Rat vs Sleeping Dog

Operation Shady Rat. Sustained, silent, IP theft from 70 organizations across 14 countries.  More.  What we have witnessed over the past five to six years has been nothing short of a historically unprecedented transfer of wealth — closely guarded national secrets (including from classified government networks), source code, bug databases, email archives, negotiation plans and exploration details …

Cofer Black: Hackers Evil, Pay Me… + Hackers RECAP

Cofer Black Says Threat Posed by Hackers Same as Pre-9/11 Terrorism Public Intelligence Net, 4 August 2011 not to be confused with Phi Beta Iota the Public Intelligence Blog Ex-CIA official sounds alarm about hackers’ next targets (CNN): The former director of the CIA’s Counterterrorism Center raised concerns Wednesday about an impending “code war” in …

Pierre Levy: New Media Literacies (12 of Them)

This is interesting! The New Media Literacies EXTRACT (12 Literacies) 01 Play: the capacity to experiment with one’s surroundings as a form of problem-solving. Having a strong sense of play can be helpful when you pick up a new piece of technology that you’ve never used before, when you’re trying to write an essay and your …