Friday, February 7, 2014

Dinar News!!!

Subject: Dinar News!!!
IMF has pushed out the RV through Iraq. Right now there are three rates around the $3.xx range but no contract rates. NDAs are still up in the air. Negotiations are continuing to get higher rates.

 Many resignations are taking place. Tony has been asked to hold off on going public. He is going to wait and see if they make good on their word this weekend. Some things are supposed to be said on the Sundaypolitical shows. If the people Tony is dealing with do not follow through then Tony will go forward with his exposure campaign on Monday possibly sooner. –B

Another Banker Commits "Suicide" By Shooting Himself EIGHT Times With A Nail Gun...

The Rumor Mill News Reading Room 

Another Banker Commits "Suicide" By Shooting Himself EIGHT Times With A Nail Gun...
Posted By: Watchman
Date: Friday, 7-Feb-2014 19:04:14

A nail gun, yet... My, these guys are sure getting creative....
Daily Mail
A CEO has committed suicide by shooting himself multiple times with a nail gun, a coroner reported on Friday.
Richard Talley, 57, founder of American Title Services in Centennial, Colorado, was found dead in his home on Tuesday with up to eight wounds to the torso and head.
His company was being investigated by state insurance regulators at the time of Mr Talley’s suicide.
A family member found the 57-year-old dead in his garage, the Denver Post reported.
Mr Talley has been married to his wife Cheryl since 1989. He moved to Colorado from Chicago where he was a regional finance officer for Drexel Burnham Lambert.
He attended the University of Miami and Northwestern University’s Kellogg Graduate School of Management.
The Post also claimed that Talley had once said he was a member of the 1980 U.S. Olympic swimming team’ – but a spokesman for USA Swimming refuted this.
The Department Of Regulatory Agencies confirmed that an investigation was focused on Talley and the company to the Post but gave no additional information.
Talley had formed a number of companies, some of which closed down, including American Escrow, Clear Title, Clear Creek Financial Holdings, Swift Basin, Sumar, American Real Estate Services, and the American Alliance of Real Estate Professionals.
His funeral will be held on Saturday in Centennial.
Read more: http://www.dailymail.co.uk/news/article-2553964/CEO-commits-suicide-nail-gun-company-investigation.html#ixzz2sgRAm1JK 

Privacy World's February 2014 Newsletter Issue 2Feb

Privacy World - The WORLD'S SHREWDEST PRIVACY NEWSLETTER

Through a Face Scanner Darkly

Anonymity forms a protective casing. When it's punctured, on the street or at a party, the moment of recognition falls somewhere on a spectrum of delight and horror. Soon enough, though, technology will see to it that we can no longer expect to disappear into a landscape of passing faces.

<youtu.be/pVwBXr_nU9Q, an app built for Google Glass <newyorker.com/reporting/2013/08/05/130805fa_fact_shteyngart?currentPage=all
by a company called FacialNetwork.com <http://facialnetwork.com/, offers a face scanner for encounters with strangers. You see somebody on the sidewalk and, slipping on your high-tech spectacles, select the app. Snap a photo of a passerby, then wait a minute as the image is sent up to the company's database and a match is hunted down. The results load in front of your left eye, a selection of personal details that might include someone's name, occupation, Facebook and/or Twitter profile, and, conveniently, whether there's a corresponding entry in the national sex-offender registry.

According to the app's creator, Kevin Alan Tussy, to build the database, the company is "targeting those with the largest online profiles first, like celebrities, business people, and public figures. But we eventually plan on having everyone with a public social-media profile included in NameTag." At the moment, the app's expanding network includes about two million entries, and three hundred testers have already started using it. When the app is officially released to a general audience, sometime before the end of March, you will have to opt out of the database if you don't want to be listed.

NameTag may appeal first to people who use dating sites: Tussy said the company plans to partner with all of them, like Plenty of Fish, Match.com and OkCupid. When scouting a potential mate, you can look deep into his eyes through your Google Glass and, as is every romantic's dream, see whether or not he's a sex offender. Tussy told the press, "It's much easier to meet interesting new people when we can simply look at someone, see their Facebook, review their LinkedIn page, or maybe even see their dating-site profile. Often, we are interacting with people blindly or not interacting at all. NameTag on Google Glass can change all that." It can, assuming that the technology works the way it's supposed to---a tall order, especially at a crowded party, where most people aren't found in scan-ready postures or well-lit areas.

The more immediate concern, though, is whether the app will be widely accessible. About a year ago, when Google made Glass and its built-in camera available to early adopters and developers, it was apparent that an irksome possibility presented itself:
the omniscience of cyber eyes. A few companies leapt at the opportunity to capitalize on facial-recognition software: in addition to Nametag, twenty-four year-old Stephen Balaban's San Francisco-based startup Lambda Labs <lambdal.com/has an app called FaceRec in the works. Orbeus, a computer-vision company, created a facial-recognition service, called Rekognition <techcrunch.com/2013/06/12/visual-recognition-api-for-google-glass/,
which promises to identify faces, detect emotion, and determine whether or not the subject is attractive. But it is all black-market software, as far as Google is concerned. Last May, the company posted a statement <plus.google.com/+googleglass/posts/fae5vo4zece
after hearing feedback from the first Glass-wearers: "We've been listening closely to you, and many have expressed both interest and concern around the possibilities of facial recognition in Glass. As Google has said for several years, we won't add facial recognition features to our products without having strong privacy protections in place. With that in mind, we won't be approving any facial recognition Glassware at this time."

The same is true today. A Google spokesperson told me that facial-recognition software will be banned for the foreseeable future, explaining, "It's in the very early days, and we are thinking very carefully about how we design Glass, because new technology always raises new issues."

Developers are holding out hope that they'll be allowed into the app marketplace eventually---whether Apple's, Google's, or that of some other device. At the moment, NameTag's Glass testers are using a workaround to manually load the program. This will serve on a limited basis, but it won't suffice for wider distribution. "Making real-time facial recognition work on Glass hasn't been easy, but we did it," Tussy said when NameTag was announced. "Now the question isn't if we will support Glass; it's will Google support us?"

It's ultimately a question of taste. For years, developers have had the ability to make illicit apps---for gambling and pornography---that wouldn't be sold in an app store. Facial recognition isn't criminal, but it carries one's online presence out into the physical world in a manner that assumes a single, coherent identity. What appears is a virtual twin, one with whom we don't wish to be seen in person. The entrepreneurs creating this software are betting that, as we've seen before, what was once viewed as an invasion of privacy will come to be seen as friendly and insightful. At least for those who can afford a Google Glass.

The above article by Betsy Morais, The New Yorker.

Until our next issue stay cool and remain low profile!

Privacy World

PS - Their back! US$99 (plus shipping) anonymous Asian sim chips.
Email for details by placing "$99" in your subject heading.

-----------------------------------------------------------------------------
To subscribe,   send a blank message to PrivacyWorld-on@mail-list.com
To unsubscribe, send a blank message to PrivacyWorld-off@mail-list.com To change your email address, send a message to PrivacyWorld-change@mail-list.com
    with your old address in the Subject: line To contact the list owner, send your message to


Privacy World, 502 Hotta-kata, 3-6-10 Hirusaido, Kagurazaka, Shinjyuku-ku, Tokyo Japan

Snowden Docs: British Spies Used Sex and 'Dirty Tricks' - NBC News.com

Snowden Docs: British Spies Used Sex and 'Dirty Tricks' - NBC News.com


By Matthew Cole, Richard Esposito, Mark Schone and Glenn Greenwald, Special Contributor 

British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.

Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda campaigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.

In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S., which can be viewed by clicking here and here. The documents are being published with minimal redactions.

The spy unit’s cyber attack methods include the same “denial of service” or DDOS tactic used by computer hackers to shut down government and corporate websites.

Other documents taken from the NSA by Snowden and previously published by NBC News show that JTRIG, which is part of the NSA’s British counterpart, the cyber spy agency known as GCHQ, used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous.


Civil libertarians said that in using a DDOS attack against hackers the British government also infringed free speech by individuals not involved in any illegal hacking, and may have blocked other websites with no connection to Anonymous. While GCHQ defends the legality of its actions, critics question whether the agency is too aggressive and its mission too broad.

Eric King, a lawyer who teaches IT law at the London School of Economics and is head of research at Privacy International, a British civil liberties advocacy group, said it was “remarkable” that the British government thought it had the right to hack computers, since none of the U.K.’s intelligence agencies has a “clear lawful authority” to launch their own attacks.

“GCHQ has no clear authority to send a virus or conduct cyber attacks,” said King. “Hacking is one of the most invasive methods of surveillance.” King said British cyber spies had gone on offense with “no legal safeguards” and without any public debate, even though the British government has criticized other nations, like Russia, for allegedly engaging in cyber warfare.

But intelligence officials defended the British government’s actions as appropriate responses to illegal acts. One intelligence official also said that the newest set of Snowden documents published by NBC News that describe “Effects” campaigns show that British cyber spies were “slightly ahead” of U.S. spies in going on offense against adversaries, whether those adversaries are hackers or nation states. The documents also show that a one-time signals surveillance agency, GCHQ, is now conducting the kinds of active espionage operations that were once exclusively the realm of the better-known British spy agencies MI5 and MI6. READ MORE >

US In “Shock And Turmoil” After Snowden Info Lets Russia Tap Top Obama Officials

February 7, 2014
US In “Shock And Turmoil” After Snowden Info Lets Russia Tap Top Obama Officials
By: Sorcha Faal, and as reported to her Western Subscribers

A new Ministry of Foreign Affairs (MoFA) report circulating in the Kremlin today says that the Obama regime is in“total shock and turmoil” today after the YouTube leaking by the Federal Security Service (FSB) of a highly encrypted telephone conversation between the US Assistant Secretary of State for European and Eurasian AffairsVictoria Nuland and the American Ambassador to Ukraine, Geoffrey Pyatt, wherein this top US State Department official was discovered engineering the overthrow of the Ukrainian government and shaming her European counterparts by saying “Fuck the EU.”
The “YouTube leaking” referred to in this report involves a video posted yesterday titled “Marionettes of the Maidan” [see video below] that became known to the world after a tweet from Dmitry Loskutov, an aide to the Deputy Prime Minister of Russia, Dmitry Rogozin, that said: “Sort of controversial judgment from assistant secretary of state Victoria Nuland speaking about the EU.”


After hearing this conversation, this report continues, German chancellor, Angela Merkel, erupted in anger calling Nuland’s remarks “totally unacceptable,” and which Nuland subsequently apologized for making.
Following her apology, the Guardian reports, Nuland refused to be drawn further into the row and stated, “I will not comment on a private diplomatic conversation.” But she implied she had been a victim of a sophisticated eavesdropping operation carried out by Russia's spy agencies as the embarrassing tape surfaced with Russian subtitles.“It was pretty impressive tradecraft. [The] audio quality was very good,” Nuland said earlier today.
Most ironic about Nuland’s statement of “pretty impressive tradecraft” being used to capture her highly encrypted conversation, this report says, was that it was actually the United States own National Security Agency/Central Security Service (NSA/CSS) which provided this information to the FSB.
In what this MoFA report calls a “masterpiece” of reverse-engineering, Russian technological experts with the FSB have been able to “surreptitiously link” to every form of communication emanating from the Joint Worldwide Intelligence Communications System (JWICS).
JWICS is a system of interconnected computer networks primarily used by the United States Department of Defense, United States Department of State, United States Department of Homeland Security and the United States Department of Justice to transmit classified information by packet switching over TCP/IP in a secure environment and is administered by the Defense Intelligence Agency.  
The “roadmap,” so to speak, for allowing the FSB access to JWICS, this report continues, was provided by the over 24 million documents provided by the most wanted man in world,” Edward Snowden, described as an “intelligence treasure trove,” and which US Senator Susan Collins, a Republican from Maine, said if stacked “would be three miles high.”
American news reports confirming this report state that Snowden fabricated the digital keys—essentially assuming the identity—of multiple senior intelligence officials to gain access to classified intelligence systems well outside of the NSA-CSS like the US military’s top secret JWICS, and which US House Representative Mac Thornberry, a Texas Republican, warned this week “would cost billions to repair.”
What is not stated in this report, but should most assuredly be assumed, is that the FSB in gaining access to Nuland’s highly secretive and encrypted conversations has, in turn, captured everything that has flowed out from JWICS, including the conversations of all top Obama regime officials.
And in what can only be described as “farce meeting irony,” Obama’s White House, though not directly blaming Russia for the catastrophic leak of Nuland’s conversation, is nevertheless crying foul”…and this coming from a government that by all measures and accounts has become one of the largest spying nations in the entire history of the world.

February 7, 2014 © EU and US all rights reserved. Permission to use this report in its entirety is granted under the condition it is linked back to its original source at WhatDoesItMean.Com. Freebase content licensed under CC-BY and GFDL.
[Ed. Note: Western governments and their intelligence services actively campaign against the information found in these reports so as not to alarm their citizens about the many catastrophic Earth changes and events to come, a stance that the Sisters of Sorcha Faal strongly disagrees with in believing that it is every human beings right to know the truth.  Due to our missions conflicts with that of those governments, the responses of their ‘agents’ against us has been a longstanding misinformation/misdirection campaign designed to discredit and which is addressed in the report “Who Is Sorcha Faal?”.]

CANCER -- Proton radiation, compared to conventional radiation.

 Cancer Info, should be wise to check out.
     http://youtu.be/iEKqv8q16rw]  =[one] 16
Proton radiation, compared to conventional radiation.
 At; "Loma Linda University Medical Center",  A Seventh-day Adventist school. ---A Christian hospital.

 Loma Linda University Medical Center
·    
Loma Linda University Medical Center is a teaching hospital on the campus of Loma Linda University in Loma Linda, California, United States. Wikipedia
·  ·  Address11234 Anderson St, Loma Linda, CA 92354
·  Phone(909) 558-4000
·  ·  CEORichard H. Hart



Requirements for an Enforceable Contract

Requirements for an Enforceable Contract

 1. Offer - to loan
 2. Acceptance - of offer to loan
 3. Mutual Consideration-on  offeror...and offeree
 4. Mutual Intention-on offeror...and offeree
 5. Capacity - over age eighteen...of sound mind
 6. Legal Object - free of fraud
 7. In Writing if Required
 8. Privity - the relation privies...obsolete..privacy


Promissory Note - Note - There are two principal qualities essential to the validity of a note; first, that it be payable at all events, not dependent on any contingency; nor payable out of any particular fund. And, secondly, it is required that it be for the payment of money only; and not in bank notes, though it has been held differently in the state of New York. A promissory note payable to order or bearer passes by indorsement. A Law Dictionary Adapted To The Constitution And Laws Of The United States Of America And Of The Several States Of The American Union by: John Bouvier Revised Sixth Edition, 1856

To convey a title the seller must himself have a title to the property, which is the subject of the transfer. But to this general rule there are exceptions. 1. The lawful coin of the United States will pass the property along with the possession. 2. A negotiable instrument endorsed in blank is transferable by any person holding it, so as by its delivery to give a good title "to any person honestly acquiring it." 3 B. & C. 47; 3 Burr. 1516; 5 T. R. 683; 7 Bing. 284; 7 Taunt. 265, 278; 13 East, 509; Bouv. Inst. Index, h.t. A Law Dictionary Adapted To The Constitution And Laws Of The United States Of America And Of The Several States Of The American Union by: John Bouvier Revised Sixth Edition, 1856





Promissory Note – Note – Mortgage – Maritime Lien

The I.M.F. Needs a Reset

The I.M.F. Needs a Reset

By ROBERT H. WADE and JAKOB VESTERGAARDFEB. 4, 2014

For all the criticism that has been directed at it over the decades, the International Monetary Fund provides vital services to the world economy. In particular, it acts as the nearest thing to an international lender of last resort to countries experiencing external financial crises — and thereby helps to maintain international financial stability.
But the I.M.F. is experiencing a crisis of governance. The governments of big developing countries have become frustrated with the unwillingness of Western countries to adjust the distribution of power in the fund in line with their rising economic weight. Frustration has encouraged some to explore bypass institutions, such as the development bank and the currency-pooling scheme being negotiated among the BRICS (Brazil, Russia, India, China, South Africa).
Today the four big BRICS (Brazil, Russia, India, China) have a combined shareof world gross domestic product of 24.5 percent, compared with the 13.4 percent share of the four big European economies (Germany, France, Britain, Italy); but the four BRICS countries have a combined share of votes of only 10.3 percent, compared with the four European nations’ share of 17.6 percent.
In 2010 the fund’s board of governors agreed on a package of governance reforms, subject to ratification by the I.M.F.’s member countries. Members would increase their quota subscriptions (similar to credit union deposits), raising the fund’s resources. At the same time 6.2 percent of voting shares would be shifted in favor of “dynamic” emerging-market and developing countries.
The I.M.F.’s managing director at the time, Dominique Strauss-Kahn, called the accord “the most fundamental governance overhaul in the fund’s 65-year history and the biggest-ever shift of influence in favor of emerging-market and developing countries to recognize their growing role in the global economy.”
But the small print revealed that the agreed vote shift from developed countries to emerging-market and developing countries was only 2.6 percent, the rest being adjustments within the category of emerging-market and developing countries from “overrepresented” ones to “underrepresented” ones. Even if implemented, the 2010 reforms would leave large discrepancies between a country’s share of economic weight and its share of voting power.
The overwhelming majority of I.M.F. member states approved the changes, but more than three years later the quotas and votes remain unchanged because the United States Congress has still not approved what the executive branch agreed to. Without congressional approval the whole readjustment remains paralyzed.
The deeper problem is that the 2010 accord is a one-off. I.M.F. member states say that the fund should agree on a formula for the adjustment of quota shares going forward, but the executive board has repeatedly missed deadlines for doing so. Most members agree that quotas and votes should be based on a country’s G.D.P., in the interests of simplicity and consistency. But the Europeans insist they should be based not only on G.D.P. but also on “openness.” In response, some developing countries argue that if measures beyond G.D.P. are to be included, criteria like “contributions to global growth” should be among them.
The upshot is stalemate. This lack of agreement suits the Europeans well, for it protects their current overrepresentation in the I.M.F.
To unblock the stalemate, the board of governors should agree to amend the fund’s constitution to delink the reallocation of quotas and votes from increases in total financial subscriptions. The I.M.F.’s constitution says that a member state can veto any loss of quota and votes. In practice this means that a reallocation can only occur when there is also a large net increase in financial subscriptions. By separating the two issues, the fund could institute a routinized adjustment of voting power as countries’ relative economic weight changes, without the changes always being held hostage to governments’ willingness to make new capital contributions.
This would remove the fiscal component of the reforms and go a long way to disarm its opponents in the Republican Party. The remaining parts of the 2010 reform might even make them happy to come on board. The United States would keep its solitary veto over super-majority decisions requiring 85 percent of votes, such as changes to the fund’s constitution. And an agreement by the United States would open the way to changes that substantially cut Europe’s overrepresentation, making space for increased representation for emerging-market economies — a long-standing American objective.
2014 is the 70th anniversary of the Bretton Woods conference at which the International Monetary Fund and World Bank were founded. Breaking the deadlock in I.M.F. governance reform would help to ensure that emerging-market and developing countries see the fund as a cooperative of states — and no longer a device for Western countries to impose their conditions on others. It also would boost the prospects for international financial stability, and not incidentally, constitute a triumph for President Obama and the I.M.F.’s current managing director, Christine Lagarde.
Robert H. Wade is a professor of political economy at the London School of Economics. Jakob Vestergaard is a senior researcher at the Danish Institute for International Studies

Terror Attack Against Yellowstone; effort to induce super volcano erupti...

TERRORIST ATTACK ATTEMPT AGAINST YELLOWSTONE NATIONAL PARK; Artificial
> Resonance Targeting Yellowstone Lake / Volcano; Irrefutable Proof of
> man-made effort to trigger Eruption
>
> February 5, 2014 -- (TRN) -- A Terrorist Attack appears to have been
> attempted for several hours yesterday-into-today, against Yellowstone
> National Park; specifically, against the Super Volcano located beneath
> Yellowstone Lake. Seismometers at Yellowstone picked up precisely-timed
> vibrations which cannot occur naturally, being focused on the Caldera
> (mouth) of the super volcano by some external means. Whatever was being
> used SUCCEEDED in achieving resonance vibration underground inside the
> caldera (mouth) of the super volcano and the resonance is got worse by
> the hour. The sole purpose of this effort could ONLY be to destabilize
> the Yellowstone caldera with the intent of causing an eruption of the
> super volcano.
>
> TRN has the proof, shown below; now the world has it too. Common sense
> dictates this type of effort can only be undertaken by a nation-state.
> If this is not stopped, a super-volcanic-eruption could be induced,
> wiping out the entire northwestern quadrant of the United States and
> killing millions, in an act of state-sponsored terrorism.
>
> Details, charts, maps and links to USGS data at:
> http://www.turnerradionetwork.com/news/263-pat

President’s Brother Malik Obama Wears Kaffiyeh Declaring that Muslims Will Destroy Israel

For those who doubt, here is further proof ... share with others.


Our anti-American, imperialist, narcissistic president has a muslim brother ... with shared beliefs.



President’s Brother Malik Obama Wears Kaffiyeh Declaring that Muslims Will Destroy Israel


Malik Obama is Barack Obama’s half-brother, but he is close enough to the president to have been the best man at Barack and Michelle’s wedding. He has also visited the White House, and is president of the Barack H. Obama Foundation.
It’s at the BHO Foundation website that Malik Obama has posted this curious photo.
http://pjmedia.com/tatler/files/2014/01/malik-kaffiyeh.jpg

The Barack H. Obama Foundation was fast-tracked to IRS tax-exempt status at the same time that the IRS was abusing numerous Tea Party and conservative groups. While those groups’ tax-exempt applications were taking two years and mountains of paperwork and invasive queries about their memberships and activities, the Barack H. Obama Foundation won its status in just 30 days. That status was back-dated 38 months, which is against the law.

The scarf is a Hamas scarf. Hamas is a designated terrorist group according to the US State Department. It has held that status since 1997.

The text on the scarf that the president’s brother is wearing in the 2010 photo reads, “‘Jerusalem is ours – WE ARE COMING!’” It also includes a map of Palestine that reads “From the river to the sea!”




TR