Friday, September 30, 2016

America's Last Day Of Freedom?

America's Last Day Of Freedom??

AMERICA’S LAST DAY OF FREEDOM

Video:  America's Last Day Of Freedom? - YouTube



We are being hit with so many negative stories from the TV, the Internet, News Papers, Magazines, and the Radio that we are almost  completely immobilized with fear.

We walk around in a daze afraid of our own shadow as we are pummeled with reports that scare us half to death.

It seems as if the world has been turned upside down and as we become more and more fearful the Fallen Angels thrive off of the frequencies we send off.

Here is what they are hitting us with now:

1) WAR: US Secretary Of State John Kerry has stated that they are cutting off Diplomatic Relations with Russia - a thing only done when you plan to attack that nation.

The news is so Censored we have no idea what is really going on.

For example - all news about t the Syrian War is being sent out by one guy and he has not been in Syria for 15 years - Rami Rahman - who is paid by British Intelligence - to give every major news outlet his stories about Syria.

Further - Rick Wyles on Trunews had a member of Obama’s Staff clearly state they are planning to start blowing up  Russian Cites if they do not get out of Syria

The Pentagon really wants the New Middle East as they have drawn it or it is all out war.

The Obama Regime - from the top to the Bottom is suicidal and insane.

If they can’t have THEIR Oil Pipeline they plan to blow up the world

This is who they are - absolutely caddywhompus crazy and insane.


2) ECONOMIC COLLAPSE

The world is on the verge of Economic Collapse

So here are 2 Fear Mongering Stories to scare us all to death:
Deutsche Bank is the German Bank of the Holy Roman Empire - run out of the Vatican - a Bank with a cross on top.

A)…..Yesterday it was announced that Deutsche Bank would collapse today so last night it’s stocks tanked.

Everybody Panicked over a story released by Super Station 95.1 in New York City.

After huge selling offs and buying by the BIG BOYS who announced the Bank Collapse it was announced that the Bank will not fold because it will re-negotiate its $14 Billion Dollar Fine with the US Department of Justice.

Deutsche Bank hold $75 Trillion in Hedge Funds - so - what is $14 Billion????

The world holds $1,000 Trillion in Hedge Funds so even if Deutsche Bank fails - big whoop.

B)…..Just spotted in front of the New York

……Shred-it

……State Dismantling Corporation with their number on the side of the truck

No - the US Dollar will loose value - yes, but not collapse.


3) INERNET

Tomorrow the Internet will be in the hands of the ICCAN Corporation located in Los Angeles California

They have a hub office in China, Turkey and Singapore, Brussels, Geneva, Montevideo (Uruguay), Soul (S Korea) and Washington DC

This is an international organization wet up in 1998 by Pres Bill Clinton to allow a member state with 108 representative s to control the search engines.

What the transfer will do is stop the Cencorship and Contrlo of the Internt by Google and You Tube

They will, as of tomorrow, be required to stop their Censorship of storeis on the internet.

Heck - if we want to cruies the net we goto

Google.ru
Google.cn
MSN.ru
MSN.cn
Etc

So the Foreign Search Engines - run right here in the United States and have huge amounts of unused Band With - are free from Censorship.

SO in a last ditch attemopt to keep control of the Internet Servers the US Based Companies that are paid to Censor the Internet are throwing a Temper Tantrum.

Thank GOD the Internet Search Engines are being taken away form these Demon Possessed NAZIs in the United States Corporation in DC.
===========================

Oh - and the Dinar will revalue tomorrow - right????

Please pray that your family will be safe with what is coming.

Please also pray that the leaders of the United States Corporation cast off their handlers and turn to the Living GOD immediately.

The News You Need

Dr William B. Mount

“Level B” Russian Ministries Ordered To Bunkers After US Threat To Cut Off Diplomacy

Land Destroyer: West's Syrian Narrative Based on "Guy in British Apartment"



EXCLUSIVE: Man who runs SOHR admits to RT he last visited Syria 15 years ago — RT News

Russian Ground Troops in Syria Fighting Jew-ISIS in the Name of Justice – Daily Stormer

Stocks Soar After French Press "Confirm" Deutsche Bank Near Settlement With DOJ | Zero Hedge






Insider "Deutsche Bank COLLAPSE Tomorrow - Friday 9-30-2016" - Will Wipe out banking system worldwide!

4 States Sue To Block Obama's Internet Transition Set For Tomorrow Night | Zero Hedge


ICANN - Wikipedia, the free encyclopedia

Contact - ICANN

ICANN Memorandum that started the Internet Transfer created in 1998 by the Clinton's ... Dirty Hellry's Project ... screws Google and You Tube out of Billions and control of the Internet.



MEMORANDUM OF UNDERSTANDING BETWEEN
THE U.S. DEPARTMENT OF COMMERCE
AND
INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS
I. PARTIES
This document constitutes an agreement between the U.S. Department of Commerce (DOC or USG) and the Internet Corporation for Assigned Names and Numbers (ICANN), a not-for-profit corporation.
II. PURPOSE
A. Background
On July 1, 1997, as part of the Administration's Framework for Global Electronic Commerce, the President directed the Secretary of Commerce to privatize the management of the domain name system (DNS) in a manner that increases competition and facilitates international participation in its management.
On June 5, 1998, the DOC published its Statement of Policy, Management of Internet Names and Addresses, 63 Fed. Reg.31741(1998) (Statement of Policy). The Statement of Policy addressed the privatization of the technical management of the DNS in a manner that allows for the development of robust competition in the management of Internet names and addresses. In the Statement of Policy, the DOC stated its intent to enter an agreement with a not-for-profit entity to establish a process to transition current U.S. Government management of the DNS to such an entity based on the principles of stability, competition, bottom-up coordination, and representation.
B. Purpose
Before making a transition to private sector DNS management, the DOC requires assurances that the private sector has the capability and resources to assume the important responsibilities related to the technical management of the DNS. To secure these assurances, the Parties will collaborate on this DNS Project (DNS Project). In the DNS Project, the Parties will jointly design, develop, and test the mechanisms, methods, and procedures that should be in place and the steps necessary to transition management responsibility for DNS functions now performed by, or on behalf of, the U.S. Government to a private-sector not-for-profit entity. Once testing is successfully completed, it is contemplated that management of the DNS will be transitioned to the mechanisms, methods, and procedures designed and developed in the DNS Project.
In the DNS Project, the parties will jointly design, develop, and test the mechanisms, methods, and procedures to carry out the following DNS management functions:
    a. Establishment of policy for and direction of the allocation of IP number blocks;

    b. Oversight of the operation of the authoritative root server system;

    c. Oversight of the policy for determining the circumstances under which new top level domains would be added to the root system;

    d. Coordination of the assignment of other Internet technical parameters as needed to maintain universal connectivity on the Internet; and

    e. Other activities necessary to coordinate the specified DNS management functions, as agreed by the Parties.
The Parties will jointly design, develop, and test the mechanisms, methods, and procedures that will achieve the transition without disrupting the functional operation of the Internet. The Parties will also prepare a joint DNS Project Report that documents the conclusions of the design, development, and testing.
DOC has determined that this project can be done most effectively with the participation of ICANN. ICANN has a stated purpose to perform the described coordinating functions for Internet names and addresses and is the organization that best demonstrated that it can accommodate the broad and diverse interest groups that make up the Internet community.
C. The Principles
The Parties will abide by the following principles:
1. Stability
This Agreement promotes the stability of the Internet and allows the Parties to plan for a deliberate move from the existing structure to a private-sector structure without disruption to the functioning of the DNS. The Agreement calls for the design, development, and testing of a new management system that will not harm current functional operations.
2. Competition
This Agreement promotes the management of the DNS in a manner that will permit market mechanisms to support competition and consumer choice in the technical management of the DNS. This competition will lower costs, promote innovation, and enhance user choice and satisfaction.

3. Private, Bottom-Up Coordination
This Agreement is intended to result in the design, development, and testing of a private coordinating process that is flexible and able to move rapidly enough to meet the changing needs of the Internet and of Internet users. This Agreement is intended to foster the development of a private sector management system that, as far as possible, reflects a system of bottom-up management.
4. Representation.
This Agreement promotes the technical management of the DNS in a manner that reflects the global and functional diversity of Internet users and their needs. This Agreement is intended to promote the design, development, and testing of mechanisms to solicit public input, both domestic and international, into a private-sector decision making process. These mechanisms will promote the flexibility needed to adapt to changes in the composition of the Internet user community and their needs.
III. AUTHORITIES
A. DOC has authority to participate in the DNS Project with ICANN under the following authorities:
(1) 15 U.S.C. § 1525, the DOC's Joint Project Authority, which provides that the DOC may enter into joint projects with nonprofit, research, or public organizations on matters of mutual interest, the cost of which is equitably apportioned;
(2) 15 U.S.C. § 1512, the DOC's authority to foster, promote, and develop foreign and domestic commerce;
(3) 47 U.S.C. § 902, which specifically authorizes the National Telecommunications and Information Administration (NTIA) to coordinate the telecommunications activities of the Executive Branch and assist in the formulation of policies and standards for those activities including, but not limited to, considerations of interoperability, privacy, security, spectrum use, and emergency readiness;
(4) Presidential Memorandum on Electronic Commerce, 33 Weekly Comp. Presidential Documents 1006 (July 1, 1997), which directs the Secretary of Commerce to transition DNS management to the private sector; and
(5) Statement of Policy, Management of Internet Names and Addresses, (63 Fed. Reg. 31741(1998) (Attachment A), which describes the manner in which the Department of Commerce will transition DNS management to the private sector.
B. ICANN has the authority to participate in the DNS Project, as evidenced in its Articles of Incorporation (Attachment B) and Bylaws (Attachment C). Specifically, ICANN has stated that its business purpose is to:
(i) coordinate the assignment of Internet technical parameters as needed to maintain universal connectivity on the Internet;
(ii) perform and oversee functions related to the coordination of the Internet Protocol (IP) address space;
(iii) perform and oversee functions related to the coordination of the Internet domain name system, including the development of policies for determining the circumstances under which new top-level domains are added to the DNS root system;
(iv) oversee operation of the authoritative Internet DNS root server system; and
(v) engage in any other related lawful activity in furtherance of Items (i) through (iv).
IV. MUTUAL INTEREST OF THE PARTIES
Both DOC and ICANN have a mutual interest in a transition that ensures that future technical management of the DNS adheres to the principles of stability, competition, coordination, and representation as published in the Statement of Policy. ICANN has declared its commitment to these principles in its Bylaws. This Agreement is essential for the DOC to ensure continuity and stability in the performance of technical management of the DNS now performed by, or on behalf of, the U.S. Government. Together, the Parties will collaborate on the DNS Project to achieve the transition without disruption.
V. RESPONSIBILITIES OF THE PARTIES
A. General.
1. The Parties agree to jointly participate in the DNS Project for the design, development, and testing of the mechanisms, methods and procedures that should be in place for the private sector to manage the functions delineated in the Statement of Policy in a transparent, non-arbitrary, and reasonable manner.
2. The Parties agree that the mechanisms, methods, and procedures developed under the DNS Project will ensure that private-sector technical management of the DNS shall not apply standards, policies, procedures or practices inequitably or single out any particular party for disparate treatment unless justified by substantial and reasonable cause and will ensure sufficient appeal procedures for adversely affected members of the Internet community.
3. Before the termination of this Agreement, the Parties will collaborate on a DNS Project Report that will document ICANN's test of the policies and procedures designed and developed pursuant to this Agreement.
4. The Parties agree to execute the following responsibilities in accordance with the Principles and Purpose of this Agreement as set forth in section II.
B. DOC. The DOC agrees to perform the following activities and provide the following resources in support of the DNS Project:
    1. Provide expertise and advice on existing DNS management functions.

    2. Provide expertise and advice on methods and administrative procedures for conducting open, public proceedings concerning policies and procedures that address the technical management of the DNS.

    3. Identify with ICANN the necessary software, databases, know-how, other equipment, and intellectual property necessary to design, develop, and test methods and procedures of the DNS Project.

    4. Participate, as necessary, in the design, development, and testing of the methods and procedures of the DNS Project to ensure continuity including coordination between ICANN and Network Solutions, Inc.

    5. Collaborate on a study on the design, development, and testing of a process for making the management of the root server system more robust and secure. This aspect of the DNS Project will address:


      a. Operational requirements of root name servers, including host hardware capacities, operating system and name server software versions, network connectivity, and physical environment.

      b. Examination of the security aspects of the root name server system and review of the number, location, and distribution of root name servers considering the total system performance, robustness, and reliability.

      c. Development of operational procedures for the root server system, including formalization of contractual relationships under which root servers throughout the world are operated.

    6. Consult with the international community on aspects of the DNS Project.

    7. Provide general oversight of activities conducted pursuant to this Agreement.

    8. Maintain oversight of the technical management of DNS functions currently performed either directly, or subject to agreements with the U.S. Government, until such time as further agreement(s) are arranged as necessary, for the private sector to undertake management of specific DNS technical management functions.
C. ICANN. ICANN agrees to perform the following activities and provide the following resources in support of the DNS Project and further agrees to undertake the following activities pursuant to its procedures as set forth in Attachment B (Articles of Incorporation) and Attachment C (By-Laws), as they may be revised from time to time in conformity with the DNS Project:
    1. Provide expertise and advice on private sector functions related to technical management of the DNS such as the policy and direction of the allocation of IP number blocks and coordination of the assignment of other Internet technical parameters as needed to maintain universal connectivity on the Internet.2. Collaborate on the design, development and testing of procedures by which members of the Internet community adversely affected by decisions that are in conflict with the bylaws of the organization can seek external review of such decisions by a neutral third party.3. Collaborate on the design, development, and testing of a plan for introduction of competition in domain name registration services, including:

      a. Development of procedures to designate third parties to participate in tests conducted pursuant to this Agreement.

      b. Development of an accreditation procedure for registrars and procedures that subject registrars to consistent requirements designed to promote a stable and robustly competitive DNS, as set forth in the Statement of Policy.

      c. Identification of the software, databases, know-how, intellectual property, and other equipment necessary to implement the plan for competition;

    4. Collaborate on written technical procedures for operation of the primary root server including procedures that permit modifications, additions or deletions to the root zone file.5. Collaborate on a study and process for making the management of the root server system more robust and secure. This aspect of the Project will address:

      a. Operational requirements of root name servers, including host hardware capacities, operating system and name server software versions, network connectivity, and physical environment.

      b. Examination of the security aspects of the root name server system and review of the number, location , and distribution of root name servers considering the total system performance; robustness, and reliability.

      c. Development of operational procedures for the root system, including formalization of contractual relationships under which root servers throughout the world are operated.

    6. Collaborate on the design, development and testing of a process for affected parties to participate in the formulation of policies and procedures that address the technical management of the Internet. This process will include methods for soliciting, evaluating and responding to comments in the adoption of policies and procedures.7. Collaborate on the development of additional policies and procedures designed to provide information to the public.8. Collaborate on the design, development, and testing of appropriate membership mechanisms that foster accountability to and representation of the global and functional diversity of the Internet and its users, within the structure of private- sector DNS management organization.9. Collaborate on the design, development and testing of a plan for creating a process that will consider the possible expansion of the number of gTLDs. The designed process should consider and take into account the following:

      a. The potential impact of new gTLDs on the Internet root server system and Internet stability.

      b. The creation and implementation of minimum criteria for new and existing gTLD registries.

      c. Potential consumer benefits/costs associated with establishing a competitive environment for gTLD registries.

      d. Recommendations regarding trademark/domain name policies set forth in the Statement of Policy; recommendations made by the World Intellectual Property Organization (WIPO) concerning: (i) the development of a uniform approach to resolving trademark/domain name disputes involving cyberpiracy; (ii) a process for protecting famous trademarks in the generic top level domains; (iii) the effects of adding new gTLDs and related dispute resolution procedures on trademark and intellectual property holders; and recommendations made by other independent organizations concerning trademark/domain name issues.

    10. Collaborate on other activities as appropriate to fulfill the purpose of this Agreement, as agreed by the Parties.
D. Prohibitions.
1. ICANN shall not act as a domain name Registry or Registrar or IP Address Registry in competition with entities affected by the plan developed under this Agreement. Nothing, however, in this Agreement is intended to prevent ICANN or the USG from taking reasonable steps that are necessary to protect the operational stability of the Internet in the event of the financial failure of a Registry or Registrar or other emergency.
2. Neither Party, either in the DNS Project or in any act related to the DNS Project, shall act unjustifiably or arbitrarily to injure particular persons or entities or particular categories of persons or entities.
3. Both Parties shall act in a non-arbitrary and reasonable manner with respect to design, development, and testing of the DNS Project and any other activity related to the DNS Project.
VI. EQUITABLE APPORTIONMENT OF COSTS
The costs of this activity are equitably apportioned, and each party shall bear the costs of its own activities under this Agreement. This Agreement contemplates no transfer of funds between the Parties. Each Party's estimated costs for the first six months of this Agreement are attached hereto. The Parties shall review these estimated costs in light of actual expenditures at the completion of the first six month period and will ensure costs will be equitably apportioned.
VII. PERIOD OF AGREEMENT AND MODIFICATION/TERMINATION
This Agreement will become effective when signed by all parties. The Agreement will terminate on September 30, 2000, but may be amended at any time by mutual agreement of the parties. Either party may terminate this Agreement by providing one hundred twenty (120) days written notice to the other party. In the event this Agreement is terminated, each party shall be solely responsible for the payment of any expenses it has incurred. This Agreement is subject to the availability of funds.



____________________________ 
Joe Sims
Counsel to ICANN
Jones, Day, Reavis & Pogue
1450 G Street N.W.       
Washington, D.C. 20005-2088
_____________________________
J. Beckwith Burr
Associate Administrator, NTIA
U.S. Department of Commerce
Washington, D.C.  20230



PARTIES ESTIMATED SIX MONTH COSTS
A. ICANN
Costs to be borne by ICANN over the first six months of this Agreement include: development of Accreditation Guidelines for Registries; review of Technical Specifications for Shared Registries; formation and operation of Government, Root Server, Membership and Independent Review Advisor Committees; advice on formation of and review of applications for recognition by Supporting Organizations; promulgation of conflicts of interest policies; review and adoption of At-Large membership and elections processes and independent review procedures, etc; quarterly regular Board meetings and associated costs (including open forums, travel, staff support and communications infrastructure); travel, administrative support and infrastructure for additional open forums to be determined; internal executive, technical and administrative costs; legal and other professional services; and related other costs. The estimated six month budget (subject to change and refinement over time) is $750,000 - 1 million.
B. DOC
Costs to be borne by DOC over the first six months of this Agreement include: maintenance of DNS technical management functions currently performed by, or subject to agreements with, the U.S. Government, expertise and advice on existing DNS management functions; expertise and advice on administrative procedures; examination and review of the security aspects of the Root Server System (including travel and technical expertise); consultations with the international community on aspects of the DNS Project (including travel and communications costs); general oversight of activities conducted pursuant to the Agreement; staff support equal to half-time dedication of 4-5 full time employees, travel, administrative support, communications and related other costs. The estimate six month budget (subject to change and refinement over time) is $250,000 - $350,000.



Comments concerning the layout, construction and functionality of this site
should be sent to webmaster@icann.org.

Page Updated 31-December-99. (c) 1999  The Internet Corporation for Assign

































Thursday, September 29, 2016

Guess Who Sold Weapons To ISIS???

Guess Who Sold Weapons To ISIS???

GUESS WHO SOLD WEAPONS TO ISIS???

Video:  Guess Who Sold Weapons To ISIS??? - YouTube

You guessed it - Coo Coo Pants herself

Dirty Hellry

And not the Fake One who was at the Debates

In a new release of emails it clearly shows that Dirty Hellry sold large cashes of weapons to nations that openly supported ISIS

So while President Obama is openly supporting ISIS Dirty Hellry is openly selling them weapons.

First - listen to President Obama openly support ISIS - here is what he said:
====================

Now what Julian Assagne Said:

The Reagan administration officials hoped to secure the release of several U.S. hostages, and then take proceeds from the arms sales to Iran, to fund the Contras in Nicaragua.
Sounds familiar?
In Obama’s second term, Secretary of State Hillary Clinton authorized the shipment of American-made arms to Qatar, a country beholden to the Muslim Brotherhood, and friendly to the Libyan rebels, in an effort to topple the Libyan/Gaddafi government, and then ship those arms to Syria in order to fund Al Qaeda, and topple Assad in Syria.
Clinton took the lead role in organizing the so-called “Friends of Syria” (aka Al Qaeda/ISIS) to back the CIA-led insurgency for regime change in Syria.
Under oath Hillary Clinton denied she knew about the weapons shipments during public testimony in early 2013 after the Benghazi terrorist attack.

In an interview with Democracy Now, Wikileaks’ Julian Assange is now stating that 1,700 emails contained in the Clinton cache directly connect Hillary to Libya to Syria, and directly to Al Qaeda and ISIS.

JUAN GONZÁLEZ: Julian, I want to mention something else. In March, you launched a searchable archive for over 30,000 emails and email attachments sent to and from Hillary Clinton’s private email server while she was secretary of state.

 The 50,547 pages of documents span the time from June 2010 to August 2014; 7,500 of the documents were sent by Hillary Clinton herself. The emails were made available in the form of thousands of PDFs by the U.S. State Department as the result of a Freedom of Information Act request. Why did you do this, and what’s the importance, from your perspective, of being able to create a searchable base?

==================


JULIAN ASSANGE: Well, WikiLeaks has become the rebel library of Alexandria. It is the single most significant collection of information that doesn’t exist elsewhere, in a searchable, accessible, citable form, about how modern institutions actually behave.

 And it’s gone on to set people free from prison, where documents have been used in their court cases; hold the CIA accountable for renditions programs; feed into election cycles, which have resulted in the termination of, in some case—or contributed to the termination of governments, in some cases, taken the heads of intelligence agencies, ministers of defense and so on. 

So, you know, our civilizations can only be as good as our knowledge of what our civilisation is. We can’t possibly hope to reform that which we do not understand

. So, those Hillary Clinton emails, they connect together with the cables that we have published of Hillary Clinton, creating a rich picture of how Hillary Clinton performs in office, but, more broadly, how the U.S. Department of State operates. 

So, for example, the disastrous, absolutely disastrous intervention in Libya, the destruction of the Gaddafi government, which led to the occupation of ISIS of large segments of that country, weapons flows going over to Syria, being pushed by Hillary Clinton, into jihadists within Syria, including ISIS, that’s there in those emails. 

There’s more than 1,700 emails in Hillary Clinton’s collection, that we have released, just about Libya alone.
====================

Pray that your families are ready for what is coming

The News You Need

Dr William B. Mount

WikiLeaks CONFIRMS Hillary Sold Weapons to ISIS... Then Drops Another BOMBSHELL! Breaking News


BUSTED: HELLRY AND FBI DIRECTOR COMEY:




Julian Assange says "1,700 emails in Hillary Clinton’s collection" proves she sold weapons to ISIS in Syria [Video]

Assange: Why I Created WikiLeaks' Searchable Database of 30,000 Emails from Clinton's Private Server - YouTube
====================
BE READY FOLKS








Wednesday, September 28, 2016

WAR ON ALL FRONTS - BE READY

Revolting: War On All Fronts

WAR ON ALL FRONTS

RUSSIA AND CHINA ARE NOW LEADING THE CHARGE IN THE INTERNAL WARS TO SHUT DOWN THE UNITED STATES CORPORATE STRANGLEHOLD ON THE REST OF THE WORLD

Video: WAR ON ALL FRONTS - BE READY - YouTube

Russia and their BRIC allies have done three things in the last week we are only learning about today. They all are preparing for war:
==========================
1) First: In a very trying moment just after forces loyal to the United States Corporation outright bombed a Syrian/Russian military base 17 September Russia and China  prepped their Portable ICBM’s for immediate launch

Both Nations have been upgrading their Nuclear Forces now for 3 years.

Now these Portable ICBM’s have been moved to their boarders facing Europe, Alaska and Japan, and the Philippines.

These are not the old Liquid Fuelled Rockets of the 1990s but completely upgraded and rebuilt Nuclear Missiles using solid fuels as their propellants.


Whether they contain Nuclear Warheads, Compressed Nuclear Rods, or other explosives they are very dangerous.

Just three of these Thermonuclear warheads have enough force to literally flatten the state of New York…. And 20 would kill every living thing form the Southern tip of Florida to Northern Coast of Maine - Casualty Rate for ALL Living Things: 100 for 250,000 years.

President of Poland - Andrej Duda - You would have about 80 Seconds to seek cover in the event of a Russian launch.

President of Estonia, Latvia, Lithuania: President Iives, Vejonas, and Grybauskaite - you all would have about 10 to 12 seconds from launch to impact ----- One angry Russian Electrician who disconnects the Computer and rewires the launch sequence - that part is easy - and you are all toast from 1 Thermo Nuclear War. Your nations Vanish for 250,000 years minimum.

President of Germany: President Gauck and Prime Minister Merkel - 120 Seconds before you are a Dehydrated Protein Cakes waving in the wind.
President of Romania: President Johannes - you would have about 20 Seconds from launch to impact - not even enough time to wipe your rear end.

If Russia Launches it will be when you are all in your pretty little palaces conducting Routine Affairs. Not one of you will escape.

US Congress - you will have about - oh - Russian Submarine outside DC Waters  - about 150 Seconds from launch to impact.




President Jinping of China - Back in 2009 the North Korean Papers announced that the US Secretary Of State Dirty Hellry gave North Korea 112 Nukes and 12 Minute Man 1 platforms - we did several TV shows on this - so - how long from the North Korean Boarder to Beijing - 180 seconds from launch to Impact????

Are you Draconian Leaders Suicidal?

Maybe it is time to relax and begin opening doors rather than closing them???
=========================

2) Second:  Russia accelerated it’s efforts to take down the US Internet Spy computers by flooding the Internet with billions of Documents using the NSA/CIA Keywords. This is a fairy simple process.

Years ago Whizzer had a computer error that flooded my AOL Email Account with about 1,000 emails a minute. They refused to stop this error and were really mean about it so I programmed my AOL emails to return all Emails with a message - which created a loop because their email had to respond to my email. After completely shutting down their computer they fixed the problem in about 10 minutes.

So how do you shut down the NSA computers?

Suppose you have a Gmail and an AOL Email Account.

All you do is set up an AOL Message loaded with these NSA Key Words to send out an Email 1,000 times a minutes to your Gmail Account using 30 or 40 of these Key Words and your Gmail Account is set up to automatically respond using 30 or 40 of these Key Words.

Now suppose you set up 30,000, or even a million accounts that do this - the NSA Computer then goes poof!
So - ever since the NSA set up that huge Super Computer in Utah this has been going on.

So now Russia has created the same loops and the NSA Computers are forced to track every email that they send out.

 Further - their access to these NSA Super Computers came when several vets who realized the VA sells their military records for grant money and then defected to China and gave them ALL US Access Codes to break into all Computers connected to the US Corporation.


We have been told that these Shinanigans will cease when the VA stops selling Active Duty Military Records around the world - but the NSA/CIA Staff and White House Staff are too Stupid to do this - literally.

These US Staffers cannot connect the dots.

They are very powerful but not that smart.

There are several other interesting facts now coming out about the New Computer Updates surrounding Window’s 10 that may crash the internet as well:

First:… Many  programs associate with Windows 10 are now crashing. At a Dental office yesterday their entire system has had major problems since the “New Update” last month

Second:… We have had major problems with our Samsung 5 since the Update that ties it into Windows 10.

Third:… We had a friend with a Samsung 6 that melted down on him -- there are too many programs assigned to the Cell Phone by the New Windows 10.

Fourth:… Windows 10 literally will not run most of my software we had with Windows 7 --- you have to purchase “New” Word Processor and in order to transfer work to Windows 10 you first must store in on the cloud - so they have a copy of it.

Do not worry about the Russians, worry about the Chinese Microsoft Programmers who are now reprogramming Windows 10 - YES - much of Microsoft (And Boeing, Etc) are located in China now.

Don’t Worry about the Internet transferring to a corporation under UN control in 3 days, worry about China controlling Microsoft.

Great security, right?
===========================

3) Finally: Many nations around the world are rejecting the purchase of weapons made in the USA and in stead turning towards Russia and China for weapons and as such many, many trade deals are now also being cancelled with the United States Corporations simply because no one trusts the US to deliver weapons, or any goods,  any more.

In addition, many nations are not accepting US Dollars or Treasury Notes for world trade and world would rather pay a slightly higher price for goods than accept these worthless US Dollars in exchange.

So all over the world contracts are being cancelled with nations that work with companies located within the boarders of the United States.

This will accelerate.

As an example: Deutsche Bank - with several offices in the United States - told the US Justice System that they are not paying the $14 Billion Dollar Fine and if they do not like it they will leave the Untied States.

German Prime Minister Merkel was then ordered to immediately announce that Germany - still supported under the Marshal Plan by US Tax Payers -  would not bail Deutsche Bank out.

Conclusion: Under the Current US NAZI Leadership the world has been brought to the edge of economic collapse and total Annihilation
=========================

Please pray that your families are ready for what is coming.

Please also pray that these world leaders turn back to the Living GOD immediately.

==========================

The News You Need

Dr William B. Mount

Russia Moves ICBM’s To EU Border After Recording Confirms Pentagon Coordinated ISIS Attack









Nuclear Armed Drone




Pentagon Employees on the 64th floor under the Pentagon would have about 3 minutes before 3 Bunker Buster Nukes destroyed their little underground structure






Obama-nation at his Finest:













Russia Wants to De-Hyphenate India and Pakistan. Should Delhi Worry? | The Diplomat





Damascus Has Audio of Daesh Talks With US Military Before Strike on Syrian Army

Russia Collapses Entire US Intelligence System Using Microsoft, Facebook And Google











NSA PRISM Keywords For Domestic Spying - Business Insider

THE SECRET WORD LIST THAT GETS YOU IN TROUBLE:

  • dictionary
  • sweeping
  • ionosphere
  • military intelligence
  • Steve Case
  • Scully
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC


WHERE INTERNET TROLLS COME FROM:


How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations