Thursday, January 30, 2014
Monday, January 27, 2014
Saturday, January 25, 2014
From BULLRUN to NOCON and LACONIC
On September 5, The Guardian, The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption systems used on the internet. This is done by for example inserting vulnerabilities into commercial encryption and IT systems. This program is codenamed BULLRUN, which, according to NSA documents, is not a regular sensitive information compartment, but a "secure COI".
COI or CoI stands for Community of Interest, a more common computer security feature by which network assets and/or users are segregated by technological means. This is done through a logical or physical grouping of network devices or users with access to information that should not be available to the general user population of the network. According to the 2011 Classification Manual (pdf), information residing on secure COIs may not be taken out of the COI or moved to other databases without appropriate approval.
According to a GCHQ briefing sheet about BULLRUN, there are at least two other COIs: ENDUE and NOCON, both for sensitive materials. These Community of Interest codenames were revealed here for the first time. For classification purposes they are treated as dissemination markings: they appear at the very end of a classification line, separated from other markings (like NOFORN and ORCON) by a single forward slash. For example: TOP SECRET//SI//NOFORN/BULLRUN
Surprise
As the COI codenames BULLRUN, ENDUE and NOCON are used within a Top Secret environment for highly sensitive NSA operations, it was quite a surprise to find the NOCON marking on another document too: an appendix (pdf) of a very secret NSA document. This appendix is about Public Key crypto s
ystems and has no date, but seems to be from the 1980s. It was declassified by the NSA in March 2007 upon request of the Cryptome website:
The document was marked TOP SECRET UMBRA LACONIC NOCON. This old style classification marking (without slashes between the categories and terms) means that the document has the overall classification level TOP SECRET and was protected by putting it in the UMBRA compartment, which was designated for the most sensitive communications intercept material. The LACONIC and NOCON markings will be explained below.
LACONIC
The function of LACONIC is clarified in the NSA's internal Cryptolog (pdf) magazine, 2nd issue from 1988, which says that LACONIC is not a clearance or a classification, but a handling control marking. It's described as a restrictive distribution indicator for certain techniques - what kind of techniques is blacked out. Access to documents marked with LACONIC does not require a special clearance, but the reader must have a need to know certain details about those undisclosed things.
An indication about what kind of techniques are blacked out can be found in the Cryptolog (pdf) issue of January/February 1986. There it's said that "LACONIC access" is required for attending the CRYSCO-86 conference about computer technology and cryptanalysis, so it seems likely that LACONIC is about sensitive computer codebreaking techniques.
This comes close to the BULLRUN program and therefore it's not unthinkable that LACONIC was one of its forerunners, allthough according to the New York Times, the direct predecessor of BULLRUN was a program codenamed MANASSAS.
The LACONIC marking was retired as of October 2006 and apparently replaced by a new compartment within the control system for Exceptionally Controlled Information (ECI).
NOCONTRACT
In addition to restricting access to people with the need-to-know, the 1988 Cryptolog explanation says that LACONIC was also designed to deny access to contractors and consultants. Therefore, LACONIC had always to be accompanied by the NOCONTRACT marking. Apparently this marking could also be shortened to NOCON, as can be seen in the aforementioned document about public key crypto systems.
The Director of Central Intelligence Directive (DCID) 1/7 from April 12, 1995 ruled that as from that date, the NOCONTRACT marking should not be used anymore. This because it had "clearly outlived [its] usefullnes". Officials could now release intelligence bearing the NOCONTRACT marking to appropriately cleared and access-approved contractors. It's no surprise that this came at a time when US intelligence agencies started their large-scale outsourcing to private contractors.
However, it seems strange that Directive 1/7 eliminated the NOCONTRACT marking in 1995, but at the same time we still see NOCON as a COI in recent BULLRUN documents. A possible explanation could be that NSA still wanted to keep some sensitive materials out of the hands of contractors, and therefore continued to use the NOCON marking internally.
This could also explain the fact that NOCON, like the BULLRUN and ENDUE COI markings, are not listed in the extensive classification marking manuals for the intelligence community. The 2010 BULLRUN Classification Guide confirms that "the BULLRUN data label (for use in databases) and marking (for use in hard- or soft copy documents) are for NSA/CSS internal use only".
Conclusion
At least since the 1980s, NSA used the LACONIC marking to protect sensitive information, which was probably related to computer codebreaking techniques. Whether LACONIC was for internal NSA use only is not entirely clear, but as LACONIC material was not meant for contractors and consultants, it had to be accompanied by the NOCONTRACT marking which was used throughout the intelligence community.
After the general use of NOCONTRACT or NOCON was prohibited in 1995, NSA seems to have continued it as an internal marking. Similar are the probably more recent markings ENDUE and BULLRUN, which are all used for highly sensitive information that is protected by putting it in separated and secured parts (COIs) of NSA's internal computer networks
http://electrospaces.blogspot.pt/2013/10/from-bullrun-to-nocon-and-laconic.html
On September 5, The Guardian, The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption systems used on the internet. This is done by for example inserting vulnerabilities into commercial encryption and IT systems. This program is codenamed BULLRUN, which, according to NSA documents, is not a regular sensitive information compartment, but a "secure COI".
COI or CoI stands for Community of Interest, a more common computer security feature by which network assets and/or users are segregated by technological means. This is done through a logical or physical grouping of network devices or users with access to information that should not be available to the general user population of the network. According to the 2011 Classification Manual (pdf), information residing on secure COIs may not be taken out of the COI or moved to other databases without appropriate approval.
ECI = Exceptionally Controlled Information; PTD = Penetrating Target Defences
IIB = Initial Infrastructure Build ?
IIB = Initial Infrastructure Build ?
According to a GCHQ briefing sheet about BULLRUN, there are at least two other COIs: ENDUE and NOCON, both for sensitive materials. These Community of Interest codenames were revealed here for the first time. For classification purposes they are treated as dissemination markings: they appear at the very end of a classification line, separated from other markings (like NOFORN and ORCON) by a single forward slash. For example: TOP SECRET//SI//NOFORN/BULLRUN
Surprise
As the COI codenames BULLRUN, ENDUE and NOCON are used within a Top Secret environment for highly sensitive NSA operations, it was quite a surprise to find the NOCON marking on another document too: an appendix (pdf) of a very secret NSA document. This appendix is about Public Key crypto s
ystems and has no date, but seems to be from the 1980s. It was declassified by the NSA in March 2007 upon request of the Cryptome website:
The document was marked TOP SECRET UMBRA LACONIC NOCON. This old style classification marking (without slashes between the categories and terms) means that the document has the overall classification level TOP SECRET and was protected by putting it in the UMBRA compartment, which was designated for the most sensitive communications intercept material. The LACONIC and NOCON markings will be explained below.
LACONIC
The function of LACONIC is clarified in the NSA's internal Cryptolog (pdf) magazine, 2nd issue from 1988, which says that LACONIC is not a clearance or a classification, but a handling control marking. It's described as a restrictive distribution indicator for certain techniques - what kind of techniques is blacked out. Access to documents marked with LACONIC does not require a special clearance, but the reader must have a need to know certain details about those undisclosed things.
An indication about what kind of techniques are blacked out can be found in the Cryptolog (pdf) issue of January/February 1986. There it's said that "LACONIC access" is required for attending the CRYSCO-86 conference about computer technology and cryptanalysis, so it seems likely that LACONIC is about sensitive computer codebreaking techniques.
This comes close to the BULLRUN program and therefore it's not unthinkable that LACONIC was one of its forerunners, allthough according to the New York Times, the direct predecessor of BULLRUN was a program codenamed MANASSAS.
The LACONIC marking was retired as of October 2006 and apparently replaced by a new compartment within the control system for Exceptionally Controlled Information (ECI).
NOCONTRACT
In addition to restricting access to people with the need-to-know, the 1988 Cryptolog explanation says that LACONIC was also designed to deny access to contractors and consultants. Therefore, LACONIC had always to be accompanied by the NOCONTRACT marking. Apparently this marking could also be shortened to NOCON, as can be seen in the aforementioned document about public key crypto systems.
The Director of Central Intelligence Directive (DCID) 1/7 from April 12, 1995 ruled that as from that date, the NOCONTRACT marking should not be used anymore. This because it had "clearly outlived [its] usefullnes". Officials could now release intelligence bearing the NOCONTRACT marking to appropriately cleared and access-approved contractors. It's no surprise that this came at a time when US intelligence agencies started their large-scale outsourcing to private contractors.
However, it seems strange that Directive 1/7 eliminated the NOCONTRACT marking in 1995, but at the same time we still see NOCON as a COI in recent BULLRUN documents. A possible explanation could be that NSA still wanted to keep some sensitive materials out of the hands of contractors, and therefore continued to use the NOCON marking internally.
This could also explain the fact that NOCON, like the BULLRUN and ENDUE COI markings, are not listed in the extensive classification marking manuals for the intelligence community. The 2010 BULLRUN Classification Guide confirms that "the BULLRUN data label (for use in databases) and marking (for use in hard- or soft copy documents) are for NSA/CSS internal use only".
Conclusion
At least since the 1980s, NSA used the LACONIC marking to protect sensitive information, which was probably related to computer codebreaking techniques. Whether LACONIC was for internal NSA use only is not entirely clear, but as LACONIC material was not meant for contractors and consultants, it had to be accompanied by the NOCONTRACT marking which was used throughout the intelligence community.
After the general use of NOCONTRACT or NOCON was prohibited in 1995, NSA seems to have continued it as an internal marking. Similar are the probably more recent markings ENDUE and BULLRUN, which are all used for highly sensitive information that is protected by putting it in separated and secured parts (COIs) of NSA's internal computer networks
http://electrospaces.blogspot.pt/2013/10/from-bullrun-to-nocon-and-laconic.html
Wednesday, January 22, 2014
Sunday, January 12, 2014
Sdot Micha 2005 Arrow 3 Israeli Base
This moment is a big victory to me, personnal and politically, no one would get the blogger was shutdown, the specification about the Arrow 3 base for 2005 were gone, no country around the world gets satellite images over the Israeli terretory, Sdot Micha images wre a big victory, I'm celebrating with a lot of friends on the frequency. Now, grand grand father has nothing to say to me right now. He lost his argument, I'm sorry grand Pa.
Friday, January 10, 2014
Caros amigos e amigas, através de alguns contactos, foi-me solicitado que informasse um grupo de pressão, recentemente criado, que envolvem forças de segurança pública, sobre a matéria de impugnação do cargo de Presidente da República. Face ao estudo da jurisprudência sobre esta matéria, penso que a cassação da manifestação de vontade, de um eleitor singular, ou grupo de cidadãos eleitores, poderá... ser efectuada do seguinte modo:
1. Caso o Presidente da República tenha recebido formalmente uma queixa crime sobre corrupção em altos cargos de Estado, como sejam, o presumível "desvio" de verbas da Segurança social, para depósito particular de cargo público, ou o presumível "desvio" de dinheiro público na aquisição de equipamento que implique verbas avultadas, e caso não tenha enviado essa queixa crime para à PGR, com a sua assinatura a validar a investigação judicial, a lei justifica a impugnação do cargo de Presidente da República, por fraude e corrupção.
2. O prazo de lei, para a manifestação de vontade na impugnação, é de 15 dias após o recebimento da queixa crime, com a devida tomada de conhecimento formalizada.
3. O Supremo Tribunal de Justiça, tem 5 dias, para apreciar as provas, e 3 dias para se pronunciar.
1. Caso o Presidente da República tenha recebido formalmente uma queixa crime sobre corrupção em altos cargos de Estado, como sejam, o presumível "desvio" de verbas da Segurança social, para depósito particular de cargo público, ou o presumível "desvio" de dinheiro público na aquisição de equipamento que implique verbas avultadas, e caso não tenha enviado essa queixa crime para à PGR, com a sua assinatura a validar a investigação judicial, a lei justifica a impugnação do cargo de Presidente da República, por fraude e corrupção.
2. O prazo de lei, para a manifestação de vontade na impugnação, é de 15 dias após o recebimento da queixa crime, com a devida tomada de conhecimento formalizada.
3. O Supremo Tribunal de Justiça, tem 5 dias, para apreciar as provas, e 3 dias para se pronunciar.
Um amigo meu aqui da frequência está de cana, 13 anos, por posse e tráfico de estupefacientes, foi agarrado com 30 sabonetes. E eu estava-lhe a dizer o seguinte: primeiro, o batimento de maluco, ou seja não sou culpado, por mais que a Polícia insista no porquê, o argumento é que não te convém falar, sempre primeiro dizer que não és culpado. Segundo, no tráfico mundial de droga, existem correios, e... transportadores de larga envergadura, os correios normalmente batem se de malucos, que não sabiam que transportavam droga, mas o melhor argumento é dos grandes traficantes, que é sou intermediário, preciso por necessidade primária para viver, portanto, e aceitei ser intermediário, logo a acusação não deduz tráfico puro ou seja, venda directa no mercado, assim, embora haja lugar sempre a uma pena, esta pode ser suspensa, e no caso da Polícia questionar quem era o comprador final, pode se dizer, era para fazer uma entrega numa cabine telefónica, sem contactos, e já lá estava o dinheiro
Wednesday, January 8, 2014
LAJES : AMERICANOS AFASTAM-SE CHINESES APROXIMAM-SE
Base Aérea º4 nas Lajes, Terceira |
Segundo notícia divulgada ontem pela Agência Lusa, a administração norte-americana informou o Governo português da sua intenção de reduzir significativamente a presença na Base Aérea das Lajes nos Açores.
Apesar de ser atualmente ponto de passagem e apoio para a aviação norte-americana, principalmente nas ligações de e para o Médio Oriente, novos tempos parecem avizinhar-se, com o consequente impacto que terá para a economia dos Açores e política externa nacional.
Esta decisão do executivo de Obama, vem na continuidade do que parece ser uma política de desinvestimento em bases externas, já que em 2006 os EUA abandonaram a utilização de outra base no Atlântico, mais concretamente em Keflavik na Islândia, tendo desde então o espaço aéreo desta nação nórdica sido patrulhado rotativamente pelos aliados da NATO (incluindo Portugal em agosto e setembro últimos).
Entretanto (e talvez por isso) têm circulado rumores do interesse da China na insular base aérea portuguesa, levantados especialmente pela passagem pouco previsível do Primeiro-Ministro chinês pelas Lajes em Junho passado, no regresso de uma visita oficial ao... Chile, que não fica propriamente em caminho.
O Primeiro-Ministro chinês e sua comitiva estiveram quatro horas de visita à base e ilha Terceira apesar de oficialmente a passagem ter sido designada como "escala técnica".
Do ponto de vista estratégico para a China, ter uma base no Atlântico Norte seria uma forma excelente de impor a sua presença entre EUA e a Europa, bem como contrabalançar o incómodo que é a a influência americana em Taiwan, um espinho cravado no orgulho chinês.
Teleporting (cont.)
LONDON, England (Reuters) -- Beaming people in "Star Trek" fashion is still in the realms of science fiction, but physicists in Denmark have teleported information from light to matter bringing quantum communication and computing closer to reality.
Until now scientists have teleported similar objects such as light or single atoms over short distances from one spot to another in a split second.
But Professor Eugene Polzik and his team at the Niels Bohr Institute at Copenhagen University in Denmark have made a breakthrough by using both light and matter.
"It is one step further because for the first time it involves teleportation between light and matter, two different objects. One is the carrier of information and the other one is the storage medium," Polzik explained in an interview on Wednesday.
The experiment involved for the first time a macroscopic atomic object containing thousands of billions of atoms. They also teleported the information a distance of half a meter but believe it can be extended further.
"Teleportation between two single atoms had been done two years ago by two teams, but this was done at a distance of a fraction of a millimeter," Polzik, of the Danish National Research Foundation Center for Quantum Optics, explained.
"Our method allows teleportation to be taken over longer distances because it involves light as the carrier of entanglement," he added.
Quantum entanglement involves entwining two or more particles without physical contact.
Although teleportation is associated with the science-fiction series "Star Trek," no one is likely to be beamed anywhere soon.
But the achievement of Polzik's team, in collaboration with the theorist Ignacio Cirac of the Max Planck Institute for Quantum Optics in Garching, Germany, marks an advancement in the field of quantum information and computers, which could transmit and process information in a way that was impossible before.
"It is really about teleporting information from one site to another site. Quantum information is different from classical information in the sense that it cannot be measured. It has much higher information capacity and it cannot be eavesdropped on. The transmission of quantum information can be made unconditionally secure," said Polzik whose research is reported in the journal Nature.
Quantum computing requires manipulation of information contained in the quantum states, which include physical properties such as energy, motion and magnetic field, of the atoms.
"Creating entanglement is a very important step, but there are two more steps at least to perform teleportation. We have succeeded in making all three steps -- that is entanglement, quantum measurement and quantum feedback," he added.
Until now scientists have teleported similar objects such as light or single atoms over short distances from one spot to another in a split second.
But Professor Eugene Polzik and his team at the Niels Bohr Institute at Copenhagen University in Denmark have made a breakthrough by using both light and matter.
"It is one step further because for the first time it involves teleportation between light and matter, two different objects. One is the carrier of information and the other one is the storage medium," Polzik explained in an interview on Wednesday.
The experiment involved for the first time a macroscopic atomic object containing thousands of billions of atoms. They also teleported the information a distance of half a meter but believe it can be extended further.
"Teleportation between two single atoms had been done two years ago by two teams, but this was done at a distance of a fraction of a millimeter," Polzik, of the Danish National Research Foundation Center for Quantum Optics, explained.
"Our method allows teleportation to be taken over longer distances because it involves light as the carrier of entanglement," he added.
Quantum entanglement involves entwining two or more particles without physical contact.
Although teleportation is associated with the science-fiction series "Star Trek," no one is likely to be beamed anywhere soon.
But the achievement of Polzik's team, in collaboration with the theorist Ignacio Cirac of the Max Planck Institute for Quantum Optics in Garching, Germany, marks an advancement in the field of quantum information and computers, which could transmit and process information in a way that was impossible before.
"It is really about teleporting information from one site to another site. Quantum information is different from classical information in the sense that it cannot be measured. It has much higher information capacity and it cannot be eavesdropped on. The transmission of quantum information can be made unconditionally secure," said Polzik whose research is reported in the journal Nature.
Quantum computing requires manipulation of information contained in the quantum states, which include physical properties such as energy, motion and magnetic field, of the atoms.
"Creating entanglement is a very important step, but there are two more steps at least to perform teleportation. We have succeeded in making all three steps -- that is entanglement, quantum measurement and quantum feedback," he added.
Biodigital Cloning
In 1998, physicists at the California Institute of Technology (Caltech), along with two European groups, turned the IBM ideas into reality by successfully teleporting a photon, a particle of energy that carries light. The Caltech group was able to read the atomic structure of a photon, send this information across 1 meter (3.28 feet) of coaxial cable and create a replica of the photon. As predicted, the original photon no longer existed once the replica was made.
In performing the experiment, the Caltech group was able to get around the Heisenberg Uncertainty Principle, the main barrier for teleportation of objects larger than a photon. This principle states that you cannot simultaneously know the location and the speed of a particle. But if you can't know the position of a particle, then how can you teleport it? In order to teleport a photon without violating the Heisenberg Principle, the Caltech physicists used a phenomenon known as entanglement. In entanglement, at least three photons are needed to achieve quantum teleportation:
Photon A: The photon to be teleported
Photon B: The transporting photon
Photon C: The photon that is entangled with photon B
If researchers tried to look too closely at photon A without entanglement, they would bump it, and thereby change it. By entangling photons B and C, researchers can extract some information about photon A, and the remaining information would be passed on to B by way of entanglement, and then on to photon C. When researchers apply the information from photon A to photon C, they can create an exact replica of photon A. However, photon A no longer exists as it did before the information was sent to photon C.
In other words, when Captain Kirk beams down to an alien planet, an analysis of his atomic structure is passed through the transporter room to his desired location, where a replica of Kirk is created and the original is destroyed.
A more recent teleportation success was achieved at the Australian National University, when researchers successfully teleported a laser beam.
For a person to be transported, a machine would have to be built that can pinpoint and analyze all of the 10^28 atoms that make up the human body. That's more than a trillion trillion atoms. This machine would then have to send this information to another location, where the person's body would be reconstructed with exact precision. Molecules couldn't be even a millimeter out of place, lest the person arrive with some severe neurological or physiological defect.
If such a machine were possible, it's unlikely that the person being transported would actually be "transported." It would work more like a fax machine -- a duplicate of the person would be made at the receiving end, but with much greater precision than a fax machine. But what would happen to the original? One theory suggests that teleportation would combine genetic cloning with digitization.
In this biodigital cloning, tele-travelers would have to die, in a sense. Their original mind and body would no longer exist. Instead, their atomic structure would be recreated in another location, and digitization would recreate the travelers' memories, emotions, hopes and dreams. So the travelers would still exist, but they would do so in a new body, of the same atomic structure as the original body, programmed with the same information.
For theologists, this means that the new body wouldn't have the original soul
In performing the experiment, the Caltech group was able to get around the Heisenberg Uncertainty Principle, the main barrier for teleportation of objects larger than a photon. This principle states that you cannot simultaneously know the location and the speed of a particle. But if you can't know the position of a particle, then how can you teleport it? In order to teleport a photon without violating the Heisenberg Principle, the Caltech physicists used a phenomenon known as entanglement. In entanglement, at least three photons are needed to achieve quantum teleportation:
Photon A: The photon to be teleported
Photon B: The transporting photon
Photon C: The photon that is entangled with photon B
If researchers tried to look too closely at photon A without entanglement, they would bump it, and thereby change it. By entangling photons B and C, researchers can extract some information about photon A, and the remaining information would be passed on to B by way of entanglement, and then on to photon C. When researchers apply the information from photon A to photon C, they can create an exact replica of photon A. However, photon A no longer exists as it did before the information was sent to photon C.
In other words, when Captain Kirk beams down to an alien planet, an analysis of his atomic structure is passed through the transporter room to his desired location, where a replica of Kirk is created and the original is destroyed.
A more recent teleportation success was achieved at the Australian National University, when researchers successfully teleported a laser beam.
For a person to be transported, a machine would have to be built that can pinpoint and analyze all of the 10^28 atoms that make up the human body. That's more than a trillion trillion atoms. This machine would then have to send this information to another location, where the person's body would be reconstructed with exact precision. Molecules couldn't be even a millimeter out of place, lest the person arrive with some severe neurological or physiological defect.
If such a machine were possible, it's unlikely that the person being transported would actually be "transported." It would work more like a fax machine -- a duplicate of the person would be made at the receiving end, but with much greater precision than a fax machine. But what would happen to the original? One theory suggests that teleportation would combine genetic cloning with digitization.
In this biodigital cloning, tele-travelers would have to die, in a sense. Their original mind and body would no longer exist. Instead, their atomic structure would be recreated in another location, and digitization would recreate the travelers' memories, emotions, hopes and dreams. So the travelers would still exist, but they would do so in a new body, of the same atomic structure as the original body, programmed with the same information.
For theologists, this means that the new body wouldn't have the original soul
Tuesday, January 7, 2014
http://pt.scribd.com/doc/190536729/principios-gerais-de-manipulacao-e-controle-de-massas" style="text-decoration: underline;" >principios gerais de manipulação e controle de massas
Friday, January 3, 2014
By: Sorcha Faal, and as reported to her Western Subscribers
|
The Main Intelligence Directorate (GRU) is reporting today that Israel’s Institute
for Intelligence and Special Operations (Mossad)
and Egypt’s General Intelligence Service (GIS) have begun an unprecedented joint crackdown in both Egypt and the Sinai
Peninsula against forces loyal to and backing the Muslim Brotherhood whose leader Mohamed Morsi
was recently overthrown in a coup d'etat.
Even more startling, according to this report and confirmed by the Wall Street News Service,
Israeli and Egyptian intelligence forces are presently engaged in a “growing, sensitive relationship” against
what they both claim is their main enemy, US President Barack Obama.
On 3 July, this report continues, General and Commander in Chief of Egyptian Armed Forces,
Abdel Fattah Saeed Hussein Khalil el-Sisi (more commonly known as
General Sisi), staged a coup d’etat against President Morsi after being
presented with evidence provided by Mossad proving that President Obama had
signed a secret agreement with the Muslim Brotherhood to give 40% of the Sinai
Peninsula to the terror organization Hamas
in exchange for $8 billion that has already been paid to the Muslim Brotherhood by Obama.
As first aired to the Egyptian nation by Arabic News
Channel TV14 and reported on by Egypt Daily News following President Morsi’s
ouster [see video HERE], this GRU report says, the terms of this agreement
between Obama and Muslim Brotherhood were:
• SECRET agreement between the Obama administration and the Muslim
Brotherhood (not the Egyptian government) to give 40% of the Sinai and the
annexation of that part of Egyptian territory in Gaza .
The objective is to facilitate the conclusion of a comprehensive peace
agreement between Israel
and the Palestinians
• This agreement was signed by Khairat
el-Shater (number 2 of the Muslim Brotherhood) by Morsi and the
Supreme Guide of the Muslim Brotherhood.
• A sum of U.S. $ 8 billion was paid in exchange for the land.
Following this stunning revelation to the Egyptian
people following Morsi’s ouster, this report says, the Obama regime has
attempted to reach an agreement with General Sisi offering recognition of the
legitimacy of the coup d’etat in exchange for his silence about this secret
agreement.
In what this GRU report calls an even “stranger move” by the Obama regime,
President Obama sent two of Americas most notorious neocons,
Republican Senators John McCain and Lindsey Graham, to negotiate with General Sisi and threatening
to suspend all US aid unless Morsi was reinstated and the secret agreement with
the Muslim Brotherhood was kept silent about, a message no one in Obama’s
Democratic Party said they would deliver.
Important to note about these neocons, this report
continues, is that they have plunged the United
States into total global war over the past 12 years
costing hundreds of thousands of lives and costing trillions of dollars while
at the same time turning the once free America into what is described today
as a modern day police state.
Most stunning about these neocons is that their plan
for total Middle East conquest was openly revealed by former US
Army General Wesley Clark who warned that American people [see video HERE] that barely a fortnight after the 11 September 2001
attacks on the United States that the Pentagon had prepared invasion plans for
Iraq and had during the next few weeks drawn up plans to destroy the nations of
Libya, Syria, Somalia, Sudan and Iran too.
As to Obama’s “grand
strategy” in massively supporting the Muslim Brotherhood against the
Egyptian people, this GRU report says, is nothing short of the destruction of
the Jewish State of Israel, which with
his appointment of Samantha Power to the United Nations as US
Ambassador “clearly shows” that the
Obama regime is headed towards a “dangerous
climax” with what had formerly been two of their most stalwart Middle
Eastern allies, Israel and Egypt.
The “master
plan” developed by Ambassador Power, Russian military experts in this
report say, is to create an “iron wall of
terror” around Israel, and which Obama’s secret agreement with Egypt’s
Muslim Brotherhood would help accelerate, thus necessitating the need for
American combat troops to invade the Jewish State and reestablish the 1967
borders recognized by the United Nations.
Ambassador Power’s “master plan” was first outlined by her when
she was the Chairman of Obama’s new Atrocities Prevention Board and called for the
US to pour combat troops into Israeli-controlled territory in order to end
abuses she said were being committed by both sides in the Palestinian-Israeli
conflict.
Having placed Israel’s leader on par with Yasser
Arafat, Ambassador Power further called for massive US military intervention on
behalf of the Palestinians, to impose a solution in defiance of Israel and its
American supporters thus preparing to spend billions of dollars that would be
shifted from Israel’s security to the upkeep of a “mammoth protection force” and a Palestinian state—all in the name
of American “principles.”
As Egypt descends into bloody chaos, this GRU report
concludes, and with Israel now in the Obama regimes “crosshairs,” the fate of our entire world does indeed “stand in the balance” today as Russian
political and military analysts see no likelyhood whatsoever that the Israelis
will give in to President Obama without a fight…and
like the events of 9/11 seemingly showed…even it means attacking
America itself.
[Ed. Note: Western governments and their intelligence services actively campaign against the information found in these reports so as not to alarm their citizens about the many catastrophic Earth changes and events to come, a stance that the Sisters of Sorcha Faal strongly disagrees with in believing that it is every human beings right to know the truth. Due to our missions conflicts with that of those governments, the responses of their ‘agents’ against us has been a longstanding misinformation/misdirection campaign designed to discredit and which is addressed in the report “Who Is Sorcha Faal?”.]
http://www.whatdoesitmean.com/index1697.htm
Wednesday, January 1, 2014
1. Sabettean nazi is a fake gay lobbie and it should be shut off
2. nazi US Ramssumen who was the 9/11 mentor has a secret plan for Israel, you think something diferente about 9/11, about Karl Rove all togheter with a Mossad plot: wrong, you think you had something to do it, you are beeing manipulate too
3. DoD are manipulating oil prices every week. One week they say the US doesn't import oil no more, the other week they say the oil reserves are down, the other week they say they are exploring the artic, the other week they say they are consuming more, and the other week they are using less, so nobody undertands whats the manipulation for. Is it for destabelize the US budget?
4. Muslum Brotherhood is payed to blow up a dirty bomb in behalf of nuclear terroriso, payed 8 billion for accepting Palestine in Sinai, and to take over Syria power. Good shit.
5. Obama is a chimpanzé negour his wife is so look like a monkey thats almost embarrasing for any cold war west spy.
6. Does Kerry knows about the bedouin map?
7. Shutdown the Suez Channel as to lead to a world crises, to benefit a nazi US government, by using the muslum brotherwood to do so? Dangerouse, you think you are controlling the real pure german arians, you are not.
8 saudis and brits were envolved on 9/11, did you miss something?
9. Karl Rove is a Lookheed stock board man, it's all about the Money, he sells his pro jewish position any time, in Swiss
10. why didn't the Obama colapse didn't yet happened? Some midlea east questions about it, right? will it be before labour day?
(que pachorrapara este montes da merda, que papelões internacionais!! Arre Porra!)
(que pachorrapara este montes da merda, que papelões internacionais!! Arre Porra!)
Subscribe to:
Posts (Atom)