Pages

Iranian Nuclear Fac. + Stuxnet

Flame, Stuxnet and You

Israel’s Vice PM Ya’alon Practically Admits Responsibility for Flame Worm

On Tuesday, May 29, 2012, Israel’s Vice Prime Minister Moshe Ya’alon made official comments during an interview to Israel’s Army Radio on the involvement of Israel in the development and deployment of Flame, a computer worm that on the same day was blamed for a series of attacks in Iran, the West Bank, Sudan, Syria, Lebanon, Saudi Arabia and Egypt. “It is reasonable to assume that anyone considering the Iranian threat as significant, will take several steps, including these [the worms],” he said, and added: “Israel is blessed as being a country rich with high-tech, these tools that we take pride in, open up all kinds of opportunities for us.” Very few Hebrew listeners would fail to understand this as: “I admit, but will not be more specific” statement.

Flame and Stuxnet

Iranian Nuclear Fac. + Stuxnet

Considering the size of the egos involved, one could claim that Ya’alon was just boasting, and dismiss the entire issue. Yet, last month, Iran’s oil ministry, national oil company and main export terminal were all hit by a computer worm; authorities managed to prevent major damage by disconnecting them from the web. After the event, Iran said that there is a long-running technological war with the United States and Israel. Tehran has repeatedly announced it has defused malware in its industrial sector, including the highly specialized Stuxnet worm in 2010, which had targeted the country’s nuclear facilities uranium enrichment facility in Nantaz. Iran admitted that the worm had damaged centrifuges. Earlier this year, the head of Iran’s civil defense agency Gholam Reza Jalali said that the energy sector of the country has been a main target of cyber-attacks over the past two years. Yet, the attack that took place this week was different from the Stuxnet related events since it was discovered from afar.

On Monday, Internet security company Kaspersky Lab announced it had found the worm Flame in over 600 computers in the Middle East, including computers owned by businesses, academic institutions, and government systems. Flame was defined by the company as a sophisticated attack toolkit, capable of transferring files, screenshots, audio recordings and keystrokes from infected computers. The company added that Flame contained a specific element that was used in the Stuxnet worm and which had not been seen in any other malware. Moreover, Flame was described as much more complex than Duqu, the electronic vehicle used to deliver Stuxnet. Kaspersky also said that certain parts of the new worm were identical to those used by the worm that hit the Iranian oil industry last month. The company summarized the event claiming that Flame could have been developed only by a state-actor. In other words, Kaspersky claims we are watching evolving versions of a worm computer designed by a large organization, “no doubt a state” according to the company, or a few of them working together. “An organized, well-funded group of people working to a clear set of directives,” further defined them the company. In 2010, Israel and the USA were widely blamed for Stuxnet.

A representative of Kaspersky Lab spoke to Israel Army Radio on the same day and said: “the worm does not operate independently, but is controlled by a remote computer, and thus only when it receives an order does it start working. For this reason, it is difficult to detect, because it is not always active.” This activated all my alarms; I have seen that before.

The Worms and You

Veteran readers of this website may perhaps remember that, in 2009, I published a series of articles on the safe use of memory cards. Afterwards, I unified them in a single article, and this year the latter was published as a chapter in The Cross of Bethlehem II. These texts were the result of ongoing attacks on my memory cards that had forced me to develop defensive techniques allowing safe access to the web. I have no doubt that the vast majority of internet users are susceptible to the type of data-collection techniques implemented by Flame. I have also no doubt that the West is developing these tools for years with the non-consensual cooperation of its unsuspecting citizens. At the very least, the victims of this scandalous behavior should be notified; this is what makes the Nazi regime a more moral kind of state than the Western Democracies are (see Israel’s Eugenics Program: Dr. Mengele Blues). As a service to my readers, following is an update of the rules for data storage protection.

A computer connected to the internet is on enemy territory. No storing device should be connected to it, unless it is in the form of a buffer one, to be described later. Download all the files desired for subsequent work into the computer. Then, disconnect the computer from the web. This should not be done electronically but by physically pulling out the cable. Then, connect the storing device to the computer, and transfer the files to it. This doesn’t provide absolute protection since signals can still be picked up from nearby with certain equipment, but for regular work, this is robust enough. Unluckily, this is not possible with wireless devices. All work on files should be done from an extractable device; if editing the text—or working on the data—from software installed on the computer, make sure of cleaning any temporary files created on the computer during the process.

Since 2002, I work primarily with memory cards and their readers; memory sticks are less convenient than split devices since if their reader goes wrong, saving the memory part of the device is complicated. The technology of these cards is based on solid-physics and in all my tests they have proven to be also physically solid. I never experienced an unprovoked problem with them and am quite confident the cards can survive everything I’ll survive. Yet, since October 2009, my memory card readers are systematically short-circuited every few weeks. I took one of them to be checked out at an electronic laboratory; they found traces of short-circuit. This is an unsolved problem; I am still experiencing this in 2012. It forced me to develop a mobile and robust data storage system, which is not entirely accessible to government spooks.

The idea is to keep a set of cards. One is designed as “Buffer Zone,” files downloaded from the web and still unorganized, or files about to be uploaded are to be kept in it. The organization of the files on it should not resemble in any way the one in the “inner cards.” The latter are where all data should be stored and worked on; these cards are never to be connected to the web. Yet, they could be accessed through a resident worm designed slightly different than Flame is. Thus, the following rules are crucial.

Unluckily, the computer industry (including Mac computers) has adopted Microsoft FAT as the files organization system. This allows rapid access of snoopers to the structure tree of your files. There is no way to avoid malicious software at least copying the structure. Thus, change the structure often, so that no scripts targeting specific files would be effective on your card. In the past, I have been the victim of a quite vicious attack on the FAT system of my buffer card. Several computers in the various shops I was working on began reporting problems with their available memory. None of my subsequent tests justified the report. Then, if I saved any of my open files it would be saved wrongly, ruining also the FAT data of physically adjacent files. This causes a snowball effect; the more files you touch, the more extensive the damage becomes. Once this is spotted, disconnect the memory, and go to a safe computer. Copy all the files from the memory card to the computer; during this process, don’t open them. Note that damaged files won’t copy. Then, format the damaged card. Afterwards, copy the files back from the computer to the card. Restore the damaged files from a backup card, and then wipe out the computer you worked on; cleaning programs are easily found these days; sensitive files stored on the computer should be thoroughly shredded before re-connecting it to the web. This type of file should not be “cut and paste;” otherwise you’ll need to wipe the entire hard disk to ensure deletion. To be entirely safe, replace the whole operating system on the computer after wiping it.

There is another instance in which Microsoft sold us out: autorun.inf. This is the name of an archive capable of automatically launching a program or a script. Amazingly, Windows defaults leave active this dangerous file on mobile devices. In this way, you can easily transfer virus and worm attacks from computer to computer. The best defense is creating an inaccessible mule, a sterile autorun.inf on your card. There are free programs on the web performing this service.

Kaspersky Lab warned that Flame is activated upon recognition of the victim; in the case of a public computer, this is achieved in one of two ways. The first one is obvious: by logging into one’s accounts. The second is often overlooked. All the readers I tested until now do not include personal identification numbers (IDs), but all the memory cards include one. This number can be used to track down a specific person using a public computer. I recommend changing the pre-installed ID number; as a service to my readers, I am attaching a link to a suitable—and free—program. In order to keep this article friendly I won’t explain here how to use the program. Users experiencing difficulties in its use are invited to contact me. The masterstroke is that we all should use the same number, rendering useless the true Number of the Beast. I propose using 0000-0000; hinting thus at the new value of this institutional human rights violation.

Related to this are various scripts that can be implanted in the card, and are activated by the autorun.inf and similar files. To be sure the card is clean, make visible all hidden and system files. Scripts featuring the .vbs extension would then be visible. Delete all scripts. Another noteworthy point is avoiding storage of files with active code in them, like .html files. Change their extension or save the content in a text format. Following an attack on my personal copy of this website’s code, I moved to .txt files and have not experienced a similar attack since 2009. Note that files allowing macros, like the Microsoft Office ones, are extremely vulnerable.

Another serious security problem results from the tendency of most of us to use a constant file structure. That allows writing scripts that allow downloading files without the victim being aware of that. The solution is simple. Store the files in a tree structure, and change the root directory name often; this works well against off-line scripts especially if the structure includes thousands of useless files used specifically for this purpose. The name of the root directory should be changed every time the work is begun and not at its end, in such a way, if working offline, snoopers cannot change the script to allow for the new structure on time. Moreover, a decoy mock-structure should be kept on the same card; this should allow for some extra-time if by any chance using an infected computer. The abovementioned “inner card” with the main files should be connected to a computer as little as possible.

All this is fine, but it doesn’t solve the presence of key-loggers in public computers. I have proven the existence of these to my satisfaction, even before Flame was disclosed. If working on a public computer on highly sensitive files, there are several ways to make sure the key-logger is deactivated. I’ll mention only the most obvious solution. After the work is saved, and while the computer is kept offline at all times, perform a low-level format of all the hard-disks and their partitions from the card. Only experienced users should do that; the staff at the kiosk would afterwards need to re-install the operating system, but no other damage is caused. Rotating between the available public computers is vital because it blocks certain systematic attacks.

A key feature of keeping such a mobile file system is being able to roll-back to its past positions, so that if a delayed attack is performed, the system can be easily recovered. This can be achieved with many backup tools available in the market; yet, that would be a serious error. You cannot be sure you purchased unmodified software, and it will be cumbersome to assure your copy was not modified by a worm after it was installed. The answer is creating a roll-back system manually. There are several forms of making this; one of the features assuring its safety is not disclosing the exact method one adopts. Daily, weekly, or monthly? Total, or partial? I won’t be more specific; in any case, also here it is important to create decoys and mock roll-back systems. /p>

How much unproductive work caused only by the unlawful activities of civil-servants! Why don’t the American and Israeli administrations engage in doing good? They won’t need to fear attacks then…

Parts of this text were adapted from The Cross of Bethlehem II: Back in Bethlehem.

Share Button

, , , ,

43 Responses to Flame, Stuxnet and You

  1. who_me June 2, 2012 at 4:43 am #

    things like flame and stuxnet can be considered as “jewish morality” applied. here, one see’s israel’s quislings taking the rap, sort of:

    http://www.reuters.com/article/2012/06/02/us-usa-iran-cyberwar-idUSBRE85100N20120602

    Cyber-attacks “bought us time” on Iran: U.S. sources

  2. who_me June 2, 2012 at 5:18 am #

    “Stuxnet malware is reportedly a contributing factor to the Fukushima nuclear disaster. Clue … virtually every control system failed or reacted wrongly to emergency conditions.”

    http://www.nuc.berkeley.edu/node/5230

  3. who_me June 2, 2012 at 5:25 am #

    stuxnet and flame are not new strategies used by israel’s proxies, but a variation on the theme to suit the change in technology. example:

    Reagan approved sabotage to wreck Soviet economy

    http://www.theage.com.au/articles/2004/02/27/1077676960916.html

  4. who_me June 4, 2012 at 8:10 am #

    kaspersky has some info on how to find out if the virus is in your computer here:

    http://www.securelist.com/en/blog/208193538/Flame_Bunny_Frog_Munch_and_BeetleJuice#page_top

  5. Jonathon Blakeley June 4, 2012 at 9:52 am #

  6. who_me June 13, 2012 at 3:48 pm #

    http://www.rt.com/news/flame-virus-windows-updates-346/

    “The spy malware Flame used bogus Microsoft certificates to infect new computers, a prominent cybersecurity expert says. The science needed to pull the trick probably required some of the world’s best knowledge of cryptography.”

    microsoft and their intentionally engineered backdoors for you know who to exploit.

  7. who_me July 24, 2012 at 5:03 am #

    microsoft has long been suspected of being in cahoots with israeli and american government spooks, facilitating their spying with secret backdoors, etc. now they are apparently no longer that concerned about hiding their role helping these governments spy:

    http://rt.com/usa/news/microsoft-eavesdropping-skype-patent-867/

    “Are your Skype calls safe from the eyes and ears of snooping feds? Microsoft has filed a patent to allow eavesdropping over Skype and other VOIP platforms, but the Silicon Valley giants won’t say whether or not they are already implementing it.”

  8. who_me July 25, 2012 at 9:45 pm #

    att is also aiding the nsa in gathering data on everyone who uses their services:

    http://techpp.com/2012/07/24/nsa-surveillance-algorithms-see-into-your-life/

    Spooky: How NSA’s Surveillance Algorithms See Into Your Life

    • Ariadna Theokopoulos July 25, 2012 at 9:58 pm #

      Should we be surprised?
      Should we be surprised that more American citizens than ever before (more than 2,000 bet January and June) formally requested to renounce their citizenship? There was a time when the US citizenship was an honor and a dream for so many. Even those who are not sure whose fault it is that this or that is happening/has happened just know that they have had enough and can’t take it anymore.

      • who_me July 25, 2012 at 10:01 pm #

        i’m not surprised. at both the spying and the numbers wanting out permanently.

  9. who_me July 25, 2012 at 10:09 pm #

    http://boingboing.net/2012/07/19/judge-says-its-ok-to-use-you.html

    “A federal judge has upheld the practice of police using seized phones to impersonate their owners, reading messages and sending sending entrapping replies to contacts in the phone’s memory, without a warrant. The judge reasoned that constitutional privacy rights don’t apply to messages if they appear on a seized device — even if the messages originated with someone who has not been arrested or is under suspicion of any crime.”

    with the government now able to murder you at will without even the usual kangaroo trial beforehand, what’s a little entrapment of innocents using a stolen cell phone/ipad, i ask?

  10. who_me July 25, 2012 at 10:20 pm #

    petras and abaya wrote an excellent essay on the rise of the american police state:

    http://petras.lahaine.org/?p=1904

    “One of the most significant political developments in recent US history has been the virtually unchallenged rise of the police state. Despite the vast expansion of the police powers of the Executive Branch of government, the extraordinary growth of an entire panoply of repressive agencies, with hundreds of thousands of personnel, and enormous public and secret budgets and the vast scope of police state surveillance, including the acknowledged monitoring of over 40 million US citizens and residents, no mass pro-democracy movement has emerged to confront the powers and prerogatives or even protest the investigations of the police state.”

    • Roy Bard July 25, 2012 at 10:23 pm #

      “Despite the vast expansion of the police powers ……no mass pro-democracy movement has emerged to confront the powers and prerogatives or even protest the investigations of the police state.”

      Is it possible thats BECAUSE of the vast expansion of police powers?

      Pre-emptive arrests, confinement by kettling and the gathering of personal data give police officers “excessive and disproportionate” control over public protests, a report by a coalition of police monitoring groups has warned.

      • Ariadna Theokopoulos July 25, 2012 at 10:27 pm #

        Not entirely, perhaps not even as the major reason. I think the major reason is the imbecilization of America. The Brainwash Project HAs succeeded to an incredible degree.

      • who_me July 25, 2012 at 10:31 pm #

        besides the dumbing down process ariadna mentioned, there is the decapitation of of movements that would have previously fought against this zionazification/overt fascism. this was mostly done by replacing the leadership with covert zionist stooges who then neutralised the opposition to the point it no longer was an opposition.

        • Ariadna Theokopoulos July 25, 2012 at 10:34 pm #

          Agreed.
          Part of the dumbing down is also the successful packaging of the two parties as … TWO parties.

          • who_me July 25, 2012 at 11:09 pm #

            here is an example of how jp uses agents provocateurs to attack movement leaders and effective activists:

            http://salem-news.com/articles/august012011/slander-tradenotaid-tk.php

            Israel’s Latest Battle Against Ken O’Keefe

            they do this kind of thing across the board. the info documented at deliberation of jewish agents provocateurs taking over the agenda of various palestinian orgs is another example how jp destroys movements, from within, that are opposed to its criminality.

          • who_me July 26, 2012 at 12:17 am #

            apparently there are a lot of israeli sayanim involved in the palestinian support network, working under various covers to wreck the organisations involved ken described how they attacked him here (his version of the crimes these israeli agents provocateurs committed that were described in the salem-news article above):

            http://www.deliberation.info/us-congressional-bill-lists-me-as-terrorist/

            “Say hello to the Trade Not Aid hijacking crew; Catherine Myles (aka Soraya Fitzgerald), Saeb Shaath, Sammi Coulthard (aka Saja Rana & Maitreyi Atmaja), Jez Cuthbert, Allison Hubbard (aka Vera Lynn) Ismail Patel (aka Iggle Piggle), Cath Jenkins and Yousef Khalfan.”

            http://kenokeefe.files.wordpress.com/2012/01/hijacker-collage.jpg

      • Laura Stuart July 25, 2012 at 10:33 pm #

        I used to love Danni & Charlie with their “everything is ok” campaign. Charlie Veitch was arrested before the royal wedding. I wonder what they really thought he might do?

        http://www.youtube.com/watch?v=KGA9ZUEa3ZY

        I don’t know if you go to protests but I find the police photographers taking pictures of all protestors rather ominous – everyone should wear niqab.

        Danni and Charlie parted after a few years but there are some brilliant videos on youtube. We need more people like them to point out how ridiculous the war on terror is.

        • Roy Bard July 25, 2012 at 10:44 pm #

          “I don’t know if you go to protests but I find the police photographers taking pictures of all protestors rather ominous – everyone should wear niqab.”

          For about 5 years I was personally assigned two police officers to follow me where ever I went, whenever I attended a demo. This included following me when when I was with my child who was a pre-teen at the time. On one demo they followed me from Trafalgar Square to Hammersmith, and then stood over me as I read the Guardian from cover to cover on the platform. A number of my friends were treated in a similar way.

          • Laura Stuart July 25, 2012 at 10:51 pm #

            Continuing the kind of stuff that Danni and Charlie talk about – once outside the Israeli embassy just a few feet back from the pavement the police (at a protest) objected to me putting my prayer mat down ON PRIVATE PROPERTY to pray. I told him not to be so ridiculous and just carried on. I suppose they are not able to think for themselves much. Anyway I have not experienced anything like you describe happened to you. When I used to live in Vienna and fly home to the UK, I always used to smile when I saw our British police because they were so gentle looking after the gun carrying ones in Austria but that has all changed now our police are arrogant and present themselves as your enemy not people employed to protect us at all.

  11. who_me July 25, 2012 at 11:16 pm #

    people are surprised at the news that cops murdered in cold blood an unarmed man, but these crimes happen all the time all across the usa. and 99% of the time, the murderers get away with these crimes:

    http://tv.globalresearch.ca/2012/07/police-brutality-cops-try-buy-evidence-witnesses

    “Witnesses to the fatal police shooting of an unarmed man in Anaheim, California say officers offered to buy up cell phone footage of the brutality that followed. The circumstances of the shooting are currently under investigation.”

  12. who_me July 26, 2012 at 5:15 am #

    this is not about government computer warfare upon its citizens, instead it’s about where we get to go after the government uses things like the flame virus, and various other tools, to determine we have naughty thoughts and must be put away for the betterment of society:

    http://www.counterpunch.org/2012/07/25/prisons-as-growth-industry/

    Out of Sight, Out of Mind, Prisons as Growth Industry

    “Ever visit a major prison? The vast majority of Americans have not, despite our country having by far a higher incarceration rate per capita than China or Iran. Out of sight is out of mind.

    Imagine the benefits of the average taxpayer touring a prison. The lucrative prison-industrial complex would definitely not like public exposure of their daily operations. Prison CEOs have no problem with a full house of non-violent inmates caught with possession of some street drugs (not alcohol or tobacco). Our horrendous confinement system cannot change when it clings to perverse practices such as cruel, costly, arbitrary, mentally destructive solitary confinement (again, the highest in the world, see: http://solitarywatch.com/). Corporate profits drive the prison system’s insanity.

    Indeed, for the giant Corrections Corporation of America (CCA), times are booming. CCA builds their prisons or buys or leases public prisons from financially strapped governments. Barron’s financial weekly can always be expected to give us the Wall Street perspective. In a recent article titled “Ready to Bust Out,” writer Jonathan R. Laing is bullish on CCA stock. He thinks it could double to more than $50 a share if the company were to convert to a real estate investment trust (REIT)….”

    one of the few industries, outside of the jewish mafia’s activities and bankstering, that still is a growth industry. and cancer, outside of cancer growth. a major spin-off industry the fascists also get rich on.

    • etominusipi July 30, 2012 at 12:18 am #

      i became aware of the extremely high incarceration rate in the USA a couple of years ago, as a by-product of looking for information about the social cost of drug laws.

      i was quite shocked.

      an echo of this ‘main’ finding was that America’s principal poodle the U of K scored pretty high amongst the European crew.

      assume that the incidence of ‘petty criminality’ does not vary as greatly between different countries as the incarceration rates.

      then the incarceration rates (which pertain mainly to people from underprivileged backgrounds, with further disabilities such as dyslexia…) express some other aspect of the national culture.

      given the aggressive posturing of the USA (with poodle support from the UK) as a global defender of freedom , this readiness to deprive their citizens/subjects of their freedom creates a cognitive dissonance that requires explanation.

      it is true that prisoners may be used for various forms of experimentation. it might even be asserted, though less plausibly, that a larger criminalised underclass could serve as a useful lubricant between the white collar criminals in control of the levers of power and the criminal underworld which serves at times as a useful executive arm of the military and the security services.

      but what of psychodynamics?

      it seems there is only one remotely plausible simple explanation for this – the more unacknowledged criminality there is in high places, the more poverty-stricken or mentally disturbed unfortunates have to be kept under lock and key. it is a matter of transferred guilt, known also in common parlance as scapegoating. another, albeit not fatal to the victim, but widely practised, form of human sacrifice.

      • who_me July 30, 2012 at 12:58 am #

        etominusipi

        about half of the people incarcerated in the usa are there for simple drug possession. this has been true for decades. most of the others are locked up for drug related crimes (crimes committed while under the effects, to get money for drugs, related to illegal drug trafficking, etc.). if one were to count those who have passed through the u.s. law enforcement system, the numbers are astronomical, with black, and perhaps latino, communities seeing more than half of the males having been busted for one crime or another.

        as the jewish mafia, essentially the capitalist establishment (jp and what is referred to as organised crime, as well) profits from this, from being the major purveyor of criminal acts, and being behind the draconian repression of law enforcement, they got both sides well covered and under control.

        the greater jp control of a country, generally the higher percentage of the people of that country will be imprisoned. how could a minority of cowardly people keep the rest under their thumb?

      • Laura Stuart July 30, 2012 at 6:37 am #

        Putting people in prison for petty crime exposes them to worse elements surely? What about the trauma to family whilst that person serves out his term? Surely some Islamic justice would be better? A couple of warning then flogging?

        The fact that the family – kids – wife etc have to pay the price makes prison a bit immoral.

        Good business though
        http://www.newyorker.com/online/blogs/comment/2012/06/when-privatization-doesnt-work.html

        • who_me July 30, 2012 at 6:50 am #

          Laura Stuart

          “A couple of warning then flogging?”

          kinky…

          and very weird.

          btw, does netanyahoo approve of whipping and torturing people for perceived crimes?

          yes?

        • fool me once... July 30, 2012 at 8:28 am #

          “A couple of warning then flogging?”
          You seem to be mellowing with age Laura. A few months ago it was hand chopping all round just to keep your insurance premiums down. A lot of tough talk from someone who was virtually in tears because they might have to sit on a bus opposite an unarmed jew with an israeli passport. You love the attention, the drama – issues Laura, issues.
          https://www.youtube.com/watch?v=-om7ity_DOU

          • Laura Stuart July 30, 2012 at 8:43 am #

            Not issues at all i really do believe that taking someone away from their family (especially parents) and exposing them to potentially worse criminals in prison plus all the bullying that goes on in prison is worse than flogging which is over with quickly.

            Why should innocent children of imprisoned parents have to pay a price as well?

          • fool me once... July 30, 2012 at 8:58 am #

            You clearly don’t understand what it’s all about. Flogging people who are well used to violence and who use violence as a currency are not going to be deterred by a flogging. You might be, but they wont.
            Rob and keep 10 grand for a 5 minute flogging, sounds like a good deal. A high percentage of prisoners are poorly educated with low expectations – you can’t bully and abuse them into submission. That’s Victorian bs.

          • Laura Stuart July 30, 2012 at 9:10 am #

            errrr noooo

            The flogging is for petty drug crime which was mentioned earlier.

            Stealing ….. I think you already know the punishment for that.

          • who_me July 30, 2012 at 9:36 am #

            fool me once…

            i think you may misunderstand the purpose of flogging. it’s not to deter crime. it’s entertainment for the voyeurs watching it. entertainment for those sick, sorry souls who cant get off normally and need, repeat need, to watch someone else in pain first.

            you know, these sods:

            http://www.rt.com/news/tourists-golan-syria-israel-037/
            ;)

          • Laura Stuart July 30, 2012 at 9:42 am #

            You reveal only your own latent perversion with such a comment.

          • who_me July 30, 2012 at 10:06 am #

            Laura Stuart

            July 30, 2012 at 9:42 am

            “You reveal only your own latent perversion with such a comment.”

            my, my, a personal attack from laura “flog ‘em” stuart. :o

            are not personal attacks discouraged here now?

          • who_me July 30, 2012 at 10:26 am #

            btw laura, why did it bother you that i posted that video showing some sicko israelis getting off on the hope they might see some muslims in syria getting killed?

            everybody knows how israelis are, it’s not like that video revealed some unknown secret the goys didn’t already know about, you know, like the mason handshake or something new about organ trafficking.

  13. who_me July 26, 2012 at 5:58 pm #

    http://news.antiwar.com/2012/07/25/apartment-manager-uncovered-nypds-illegal-spying-ring/

    “The NYPD has defended the surveillance as “legal,” saying that the police weren’t “acting as police” when they were spying on Muslims outside of the city, and that therefore anything they did was legal. Mayor Bloomberg insisted the NYPD has a right to go “anywhere in the country” looking for terrorists.”

    bet he says that about all the jewish people working for israel….

  14. who_me July 26, 2012 at 6:37 pm #

    http://sjlendman.blogspot.com/2012/07/lawless-domestic-spying.html

    “Emerging fascism grips America. It’s on a fast track to tyranny. Techniques used would make despots proud.

    Obama achieved the impossible. He exceeds the worst of George Bush. Arrogance and unaccountability define his presidency. Rule of law principles don’t matter. Imagine what’s ahead if he’s reelected.”

    • etominusipi July 30, 2012 at 12:34 am #

      of course Obama and Bush are mouthpieces, actors. even to talk of them as agents is to buy into a paradigm we know is busted for good. it hurts to dump it – over perhaps a century the hustings have witnessed some fired-up or sagacious souls who addressed human problems and aspirations in a genuine way. but they were never more than a small minority, and their number has by now dwindled to an insignificant fraction.

      once the ‘general election’ is recognised as a charade the expectation of significant change in policy direction dwindles away.

      the downside is that it implies we are already living under a dictatorship. it just has a few brown people to ‘pacify’ before it turns its attention to domestic matters. for now the kid gloves are on.

  15. who_me July 29, 2012 at 8:50 pm #

    the zionazis got their patriot act in the usa, now they are working to inflict upon europe a similar draconian fascist protocol:

    http://www.youtube.com/watch?v=_c-GL3XL2rs

    “The US has the Patriot Act, which permits almost unlimited surveillance of its citizens, and the European Union will soon have INDECT.”

  16. Ariadna Theokopoulos July 30, 2012 at 8:12 am #

    Stupid? THAT? That was nothing compared to your inability to comprehend the totality of the NUANCED and COMPLEX penal system in the US, where a huge number of prisons have been privatized and it is not illegal for judges to own a piece of the business.
    Only a simplistic individual would misunderstand the positive impact of this on society and fail to appreciate it good for business and for the economy.

    • who_me July 30, 2012 at 9:00 am #

      “Only a simplistic individual would misunderstand the positive impact of this on society and fail to appreciate it good for business and for the economy.”

      confucius says:

      when all else fails,
      build more jails.

      (bubba likes it that ways ;) )

Leave a Reply