Podcast: Play in new window | Download (Duration: 1:59:45 — 33.4MB) | Embed
Behind The Woodshed 3rd year Anniversary at Real Liberty Media
At the Situationally Aware Action Oriented Intelligence Center
The Victory Against You in the Silent War is Your Silence
Protect Your Granted Rights
- Sign The Petition – Please
From the Jefferson Mining District front page, Click on the petition link. Thank you very much for defending your property and that of future generations, no the real ones, and additionally, for helping Jefferson Mining District help you.
On Again Off Again
- Navy cancels planned GPS outage in Southern California
The U.S. Navy has canceled plans to jam GPS signals in the vicinity of the China Lake, California, Naval Air Weapons Station. AOPA had raised concerns about the impact on civilian air traffic and the size of the affected area. The Navy did not reveal the cause of the cancellation, other than to say the reason was “internal.”
Dialectic Narrative Controls
- This story could be the smoking gun for false-flag operations
Santa Monica; Two police officers who wish to remain anonymous for fear of retaliation say that James Wesley Howell, an Indiana man who was found with a car full of explosives and weapons on Sunday morning, told police he was part of a team that planned shooting attacks on gay communities in Florida and California.
Howell told police he was turning himself in because he wanted protection. His story was that he had been assured by his recruiters that he would not be harmed in the shooting but, when he heard on the news that Omar Mateen, the lead gunman in the Orlando group, had been killed by sniper fire, he realized he was being set up as a patsy and would be killed.
Soon after that, the FBI took over the investigation, and information to the public was filtered to remove any facts that might show the Orlando shooting as a planned event involving others. GetOffTheBS 2016 Jun 15 (Story) (Cached)
- Police Admit Officers May Also Be Responsible For Gunning Down Orlando Nightclub Patrons
New details have emerged that may shed more light on the extreme casualty count in the Orlando nightclub killings. On Monday, Orlando Police Chief John Mina intimated that some of the victims may have been killed by officers trying to perform a rescue operation.
“I will say this, that’s all part of the investigation,” Mina said. “But I will say when our SWAT officers, about eight or nine officers, opened fire, the backdrop was a concrete wall, and they were being fired upon.”
A confidential law enforcement source close to the investigation said a crowd of up to 300 people within the club — combined with the complex layout of the structure — may have resulted in numerous patrons being struck by gunfire from officers, according to WFAA-ABC 8.
Mina stood by his decision to employ a tactical strike amidst the rising likelihood that a number of the dead were the result of “friendly fire” from officers.
“It was a hard decision to make, but it was the right decision,” he said. “Our No. 1 priority is on saving lives, and it was the right decision to make.”
- NARRATIVE FAIL: Orlando Islamic Terrorist Did NOT Use An AR-15
The anti-gun politimedia wasted no time at all demonizing the most common rifle in the United States as being the real villain of the Islamic terrorist attack on Pulse nightclub in Orlando.
Newsweek screamed, “ORLANDO SHOOTING PUTS SPOTLIGHT ON AR-15 RIFLE.”
Judd Legume of Think Progress squeaked, “The NRA’s Love Affair With The AR-15, Weapon Of Choice For Mass Murderers, In 22 Tweets.”
Always wrong Christopher Ingraham of the Washington Post whined, “The gun used in the Orlando shooting is becoming mass shooters’ weapon of choice.”
Here’s the thing.
The rifle used by the Islamist terrorist in Orlando was not an AR-15.
- Fact Check: An AR-15 Wasn’t Used In Orlando, And It Wouldn’t Have Mattered Anyway
Black Rifles Aren’t Boogeymen
It’s frankly fascinating to watch anti-gun politicians and the media attempt to sow so much fear about AR-15s and similar firearms.
- When You Hear Someone Call an AR-15 an Assault Rifle, Show Them This
What defines an assault rifle?
There are many criteria such as the use of detachable magazines (something almost all modern firearms do), and the use of an intermediate cartridge such as the .223 or 5.56 caliber ammunition used by an AR-15.
But the primary difference between an AR-15 style modern sporting rifle and an assault rifle is selective fire – the ability to switch from semi-automatic and fully automatic fire.
Slipped Not Flipped
- Donald Trump Just Flipped On Gun Control
Donald Trump has flipped on gun control and is now parroting a liberal policy point that jeopardizes all of our rights. Trump has indicated that he has meant with the NRA about supporting restrictions that would ban anyone on a terrorism watch list from buying firearms.
Here’s the problem — people on watch lists haven’t been charged with a crime, let alone convicted. Perhaps people are not aware, but if get rid of the Fifth Amendment you may well kiss the Second Amendment goodbye, too.
I will be meeting with the NRA, who has endorsed me, about not allowing people on the terrorist watch list, or the no fly list, to buy guns.
— Donald J. Trump (@realDonaldTrump) June 15, 2016
More Arms For U.S. Not You
- US Gov’t Just Approved Billions For Its Own Weapons The Same Day it Pushed Gun Control For Citizens
In the wake of the mass shooting in an Orlando, Florida, nightclub over the weekend, politicians opportunistically pushed for excessively strict gun control legislation — but didn’t hesitate for a second to clear another hurdle to pass the next $602 billion defense spending bill.
Essentially, government guns aimed at the government’s enemies — which all too often also kill civilians — are perfectly acceptable; but your constitutionally protected right to own your own guns, not so much..
- Final Rules Disclosed for How Social Security Admin. Plans to Disarm Its Beneficiaries
Final rules on how the Social Security Administration (SSA) plans to prohibit its beneficiaries from owning firearms were published in early May, but it took several weeks for observers parsing the 41-page document to realize its implications for the Second and Fifth Amendments.
It was sold as impacting, on an annual basis, only about 75,000 beneficiaries receiving disability benefits, or 0.11 percent of the 65 million people already receiving checks from the system. This was to counteract the initial impression that the new rules would prohibit more than four million citizens from owning firearms because of mental health issues. As expressed by Alan Zarembo, writing for the anti-gun Los Angeles Times a year ago, “The push is intended to bring the Social Security Administration in line with [other] laws regulating who gets reported to the National Instant Criminal Background Check Systems (NICS) … which is used to prevent gun sales to felons, drug addicts, immigrants in the country illegally, and others.”
That “others” category was about to get much larger: Anyone who has named a “representative payee” to receive his or her benefits. Initially it was designed to follow the Veterans Administration, which places the names of anyone “adjudicated as a mental defective” with the only criterion being that that beneficiary has appointed someone else as a fiduciary or “representative payer” to receive his benefits for him or her.
In January the White House issued its executive orders “to reduce gun violence and make our communities safer,” which included this regarding the expansion of regulations by the SSA:
The Social Security Administration has indicated that it will begin the rule-making process to ensure that appropriate information in its records is reported to NICS [which] will cover appropriate records of the approximately 75,000 people each year who have a documented mental health issue, receive disability benefits and are unable to manage those benefits because of their mental impairment, or who have been found by a state or federal court to be legally incompetent.
Notably missing from the White House directive was any mention of due process required under the Fifth Amendment, or the Second Amendment rights about to be violated. The rules the agency was “developing” were buried deep in the 41-page document released for public review and comment.
The key phrase containing the dangerous overreach by the agency — far outside the purview of Congress (the only law-making branch of the government allowed under the Constitution) — was this:
Under the proposed rule, we [SSA bureaucrats] would identify, on a prospective basis, individuals who received Disability Insurance Benefits under Title II of the Social Security Act … or Supplemental Security Income (SSI) payments under Title XVI of the Act.
And just how would identification take place, exactly? On Page 19 the question is answered in part:
If we have information that the beneficiary has a mental or physical impairment that prevents him or her from managing or directing the management of benefits, we will develop the issue of capability.
And what is this “issue of capability”? That is found in a footnote at the bottom of page 19, referring one to the rules by which said SSA bureaucrat determines whether said beneficiary is capable of handling his or her own affairs, or not:
Does the individual have difficulty answering questions, getting the evidence or information necessary to pursue the claim, or understanding explanations and reporting instructions?
If so, do you think this difficulty indicates the beneficiary cannot manage or direct the management of [his or her] funds?
Presto! Rights under the Second and Fifth Amendments are suddenly and secretly obliterated. Notice is then sent to the beneficiary after the fact, with instructions as to how he or she might want to contest the decision. Meanwhile his or her name is now on the list at the NICS of persons ineligible to own firearms — currently at 13 million and growing daily.
- DAO Attacker Says 3m Ether Loss is Legal
In an email which is PGP signed and titled “An Open Letter To the DAO and the Ethereum community” the claimed attacker believes he examined the code and believes the Ether drained is now legitimately in his/her possession. The attacker writes that people characterizing the event as “theft” are completely unjustified and it the smart contract itself has allowed this to happen. The attacker writes:
“I have made use of this feature and have rightfully claimed 3,641,694 ether, and would like to thank the DAO for this reward. It is my understanding that the DAO code contains this feature to promote decentralization and encourage the creation of “child DAOs”. I am disappointed by those who are characterizing the use of this intentional feature as “theft”. I am making use of this explicitly coded feature as per the smart contract terms and my law firm has advised me that my action is fully compliant with United States criminal and tort law.”
It is interesting that the person referenced the United States within the letter and could mean he/she is from the U.S. The so-called “attacker” also cites the written words of the binding smart contract which says, “The terms of The DAO Creation are set forth in the smart contract code existing on the Ethereum blockchain. Nothing in this explanation of terms or in any other document or communication may modify or add any additional obligations or guarantees beyond those set forth in The DAO’s code.”
- Simple Contracts are Better Contracts: What We Can Learn from the Meltdown of The DAO
$50 million were “stolen” from a project called “The DAO” and now the Ethereum community is deciding how to move forward and recover from the disaster. But each crisis presents a learning opportunity, so let’s take a deeper dive into the matter and see how we can do better.
First, though, here’s a primer on The DAO for those new to the subject.
The DAO is a digital pool of funds that is governed by code. Anyone can contribute funds to the pool to purchase voting power in it, and a quorum of shares is required to release funds to support select projects, just like with Kickstarter. This “group fund” was implemented on a digital currency platform called Ethereum and recently raised $150 million from hundreds to thousands of backers.
Crisis with The DAO
Last week, cryptocurrency security researchers identified vulnerabilities in both the code that governs The DAO and in the Ethereum programming language (Solidity) that The DAO was written in. This week, it was discovered that an attacker was exploiting the bugs in The DAO and managed to withdraw over $50 million worth of Ether from the fund.
Bailing out The DAO
In order to avert the disaster of a $50M loss, the Ethereum core developers have presented a proposal whereby the withdrawal would be reversed and the code of the contract would be replaced with a simple contract that would allow the original funders to recover their funds.
Issues with the Bailout
This may sound like a great outcome for the coin holders, but it presents several problems.
Big Data Trespass Against Us
- What Microsoft Does NOT Want You To Know About Windows 10
Windows 10 could be a major threat to your privacy, and Microsoft is trying to force you to use it whether you want it or not.
In fact, if you use Windows 7 or 8, Microsoft could automatically update you to Windows 10 and begin tracking your every move.
“Microsoft openly stated that pervasive data collection will be present in any Windows version starting from Windows 10, and as a host of research on the Internet shows, this data collection cannot be disabled using official means,” tech expert Artem S. Tashkinov wrote at itvision.altervista.org.
The default settings for Windows 10 allow Microsoft to track every website you visit, every purchase you make, and every word you type into the search engine. It even allows Microsoft to track your physical location. Microsoft makes upgrading to the operating system tempting by making it free – at least until July 29.
- McAfee’s new cybersecurity firm John McAfee Global Technologies seeks to secure cryptocurrency products
Earlier this week cybersecurity mogul John McAfee took the CEO position at MGT Capital Investments, Inc. and announced that the name will be changed to John McAfee Global Technologies, Inc. and the company will focus on a suite of security products. The company also announced that Roger Ver, long time Bitcoin evangelist and owner of Bitcoin.com, and Erik Voorhees, Bitcoin entrepreneur and CEO of cryptocurrency exchange ShapeShift.io , two well known names in the cryptocurrency industry, will be joining the company. See SiliconANGLE’s earlier coverage in Bitcoin Weekly for that news.
Speaking to SiliconANGLE, McAfee went over his plans for how John McAfee Global Technologies would serve the enterprise, businesses and consumers—with an eye for how the company intends to help the cryptocurrency industry as well.
- New Intel CPUs Have NSA Exploitable Secret Hidden Backdoor
New Intel CPUs come with a hidden backdoor that can allow hackers or the NSA to control your computer remotely even while PC is turned off.
Hardware security export Damien Zammit revealed some startling revelations in a recent SoftPedia about the secret backdoor built in to new Intel CPUs that no one can touch or disable.
The backdoor, called the Intel Management Engine (ME) is works as a secret subsystem inside your computer’s CPU and runs constantly even when your computer is not turned on.
It works but setting up a TCP/IP server and since the subsystem has complete uncontrolled access to your computer’s hardware, including the network card and memory, it works without the knowledge of your computers operating system and can not be disabled by the OS or by your computer’s firewall.
No one outside of Intel has seen the ME source code and security experts are warning the built-in backdoor has the potential to explode into the worst root kit ever with every modern Intel based CPU becoming compromised.
Intel asserts it is secure from hackers and such attacks because it is protected by 2048 bit RSA encryption which theoretically thought to be uncrackable during the lifespan of everyone living on earth today.
However, the same theories were thought to be applicable to previous incarnations of the current 2048 bit RSA standard each iteration of which was proven to be absolutely wrong in practice.
Given advancements in mathematical theory relating to algorithms such as the variations of the Quadratic Sieve (QS) and the General Number Field Seive (GNFS) combined with advances in computer hardware and software to support parallel computing researchers have repeatedly surpassed theoretical limits decades and centuries before they were theoretically thought to be vulnerable.
In the mean time relatively unexplored frontiers in current technology remain abound.
- Bilderberg deal? Microsoft to buy LinkedIn for $26.2 billion
Microsoft has purchased the social networking service LinkedIn for $26.2 billion, equating to $196 per share. The network’s co-founder has described the deal as a “re-founding moment” for the service.
The two companies have entered what they call a “definitive agreement” that will see Jeff Weiner staying on as CEO of LinkedIn, but will now be answerable to Microsoft boss Satya Nadella.
2nd Amend Is Homeland Security
- Jeh Johnson: Gun control is now a matter of homeland security
Just days after the massacre in an Orlando nightclub left 49 people dead and 53 wounded, Homeland Security Secretary Jeh Johnson on Tuesday said that gun control is now a critical element of protecting the U.S. homeland and keeping Americans safe.
“We have to face the fact that meaningful gun control has to be a part of homeland security,” Johnson said in an interview on “CBS This Morning.” “We need to do something to minimize the opportunity for terrorists to get a gun in this country.”
On the issue of people on the no-fly list and various other lists being able to purchase a weapon in the U.S., Johnson said, “I believe that that’s something that has to be addressed.”
- Deutsche Bank’s Shocking ECB Rant: Warns Of Social Unrest And Another Great Depression
In early February, in a post titled “A Wounded Deutsche Bank Lashes Out At Central Bankers: Stop Easing, You Are Crushing Us“, we showed just how vast the feud between Europe’s biggest – and ever more troubled commercial bank – and the ECB had become. As DB’s Parag Thatte lamented then, “ECB rhetoric suggests additional easing measures forthcoming in March. While a fundamental tenet of these measures, in particular negative rates, has been to push investors out the risk spectrum, we remind that arguably the impact has been exactly the opposite.” And while the DB analyst has been correct, and now NIRP is widely accepted as a major mistake, the ECB proceeded to not only ease even more just one month after this first DB lament, but in what may have been a direct affront to DB, launched the monetization of corporate bonds, something which as we documented earlier today has now led to the complete disconnect between bonds and underlying fundamentals.
It was also led to daily record low yields for government bonds around the globe.
Last but not least, it has pushed the stock price of Deutsche Bank to levels not seen since the financial crisis as DB suddenly finds itself unable to make money in an NIRP environment.
Which brings us to today, when overnight DB’s chief economist David Folkerts-Landau released a scathing report titled “The ECB must change“, one which blows DB’s February lament out of the water, and in which DB accuses the ECB of putting not only its future at risk, but the future of the entire Eurozone, with its destructive policies.
A quick read of the executive summary of this epic rant reveals just how shockingly bad relations between Germany’s biggest bank and the former Goldman partner have now become.
- Banks are secretly ‘red flagging’ our everday transactions for DHS
Last month, ‘Public Intelligence‘ released a Financial Crimes Enforcement Network document revealing how banks are spying on our everyday transactions for DHS.
Your bank transactions are being reported to DHS
The Financial Crimes Enforcement Network (FinCEN) is issuing this advisory to provide financial institutions with information on identifying andreporting transactions possibly associated with Foreign Terrorist Fighters (FTFs) who support the Islamic State of Iraq and the Levant (ISIL), al-Qa’ida, and their affiliates in Iraq and the Lev ant region. Financial institutions may use this information to enhance their Anti-Money Laundering (AML) risk-based strategies and monitoring systems.
Don’t forget that DHS’s Institute of Terrorism Research and Response works with banks to spy on law-abiding activist groups like the Tea Party protestors, pro-life activists and anti-fracking environmental organizations. Banks have a sordid history of spying on Americans. Back in 2011, Wall St., and the NYPD were caught spying on protestors.and during the same year, Spiegel revealed how the NSA uses Tracfin to spy on everyone’s bank records.
Banks are spying on our social media activity
“Financial institutions may find available social media information helpful in evaluating potential suspicious activity and in identifying risks connected to the red flags provided in this and other advisories. Similarly, the location from which a customer logs into a financial institution’s online services platform may also be considered when determining whether a transaction is suspicious.”
Banks are secretly ‘red flagging’ our transactions
“In applying the red flags below, financial institutions are advised that no single transactional red flag is a clear indicator of terrorist activity. Financial institutions should consider additional factors, such as a customer’s overall financial activity and whether he or she exhibits multiple red flags, before determining a possible association to terrorist financing and FTFs. Financial institutions should also refer to the red flags and other information provided in this and the May 2015 non-public advisory to formulate a more comprehensive assessment of potential suspicious activity.”
In other words, banks are checking our purchases looking for ‘suspicious activity’.
“Depending on their products and services offered, financial institutions may be able to observe one or more of the following red flags. Some of these red flags may be observed during general transactional screening, while others may be more readily identified during in-depth case reviews.”
According to the FinCEN document Americans can be ‘red flagged’ for the following reasons….
- Government Wants To Study Frogs On Private Property, Response It Got Back Is Priceless
The Oregon Department of Fish and Wildlife wanted to study frogs on the property belonging to a private homeowner. The homeowner was willing to oblige but first the Oregon Department of Fish and Wildlife would have to get a taste of their own bureaucratic penalties that they place on the public.
Hot Diggity Doge
The Weekend War Report
The DOGE OF WAR
Unleash the Power of the DOGE OF WAR
Please Donate to RLM
In This Doge Eat Doge World
Secure Private Alternative To Skype: Tox
Dump Skype – Piss Off The NSA
Silent Weapons for Quiet Wars
- The people know that they have created this farce and financed it with their own taxes (consent), but they would rather knuckle under than be the hypocrite.Factor VI – Cattle
Those who will not use their brains are no better off than those who have no brains, and so this mindless school of jelly-fish, father, mother, son, and daughter, become useful beasts of burden or trainers of the same.
- Mr. Rothschild’s Energy Discovery
What Mr. Rothschild  had discovered was the basic principle of power, influence, and control over people as applied to economics. That principle is “when you assume the appearance of power, people soon give it to you.”
The Law of War
General Orders No. 100 : The Lieber Code
INSTRUCTIONS FOR THE GOVERNMENT OF ARMIES OF THE UNITED STATES IN THE FIELD
Where Not Throwing Oppression Off, You Live Either Under an Occupation or by Conquest.
The Choice and Responsibility are Yours
United We Strike
Behind The Woodshed for that practical education & hard but necessary dose of reality.
Spread The Word Behind The Woodshed.