The Quality of the Constitution is fundamental to any civilization. The recent outcomes of Brexit, Nexit and Frexit indicates that the 5D shift in the Parliamentary systems must be thoroughly evaluated. Moreover, the removal of the US FBI head indicates the existence of a para-FBI within the US. Most fortunately, the Western nations have entered the phase of perceiving such realities, - after the first phase of shocks and denials of their dysfunctional state. Now, it is time to deal with the realities, even though preventive maintenance might hurt some. Still, one major technocratic fact has been denied too long; - that ‘Big Red’ is not ‘Big Blue’, - but quite the contrary. Such mass-psychotic dilution and fatal consequences have been pinpointed for years, yet still in a denial phase. Now the traumas in the Western US, EU and NATO Constitutions are real and evident.
The intention of this blog is to set focus on some cyber issues in the eve of this 4th Industrial Revolution. In order to do so, several previous summaries are quoted about the abuse of technocratic dysfunctionalities. Focus is mainly set on; The resent removal of the US FBI Head; This 5th Pyramid Game and its relation to the 3rd International’s Conditions; The Quality of LEJ (Legal, Executive and Judicial Parliamentary Powers) and; The radicalizations of the IT industries. This is vital now, since the world war of secret services became official in 2017.1.1.
First of all, the removing of US FBI head was a desperate move in a CdE Game that is about to fail. The sole purpose is to hinder the US’s own Secret Services to investigate any Russian meddling in the US election; the Russian associations in White House, and the remote-controlled President of US. The president did not even inform the FBI head, James Comey, that was fired, but let the mass-media spread a gossip. This is secret services indeed, - yet apparently not by any US organization. Three heads are removed earlier; chief federal prosecutors Sally Yates, because she followed the Justice Department instructions rather than the President’s contradicting immigration order; chief of federal law enforcement officer Preet Bharara due to compromising contacts with foreign agents, and; first national security advisor Michael Flynn for misinforming the vice president Mike Pence about the Russian communications.
The Moves are evident, - when knowing this is really a CdE Game, - where the ethics are based on the saying; ‘Honesty is for suckers’. The NY Times and CNN writes: “Days before he was fired, James asked the Justice Department for more resources to accelerate the investigation of Russian interference in the US presidential election.” “The Senate’s pressures did force a potential showdown of the investigations by the President’s administration. It appeared unlikely that the Justice Department or the White House would do so, though. However, the officials of the President’s and other administrations’ have demanded the investigations of them to end.” “Still, the White House denies that removing the FBI head is related to the investigations. The Justice Department spokeswoman even said that the FBI chief’s request was ‘totally false’, - without elaborating further on that.” Comey himself writes about his removal; “To all: I have long believed that a President can fire an FBI Director for any reason, or for no reason at all.” “The American people should see the FBI as a rock of competence, honesty, and independence.” “My hope is that you will continue to live our values and the mission of protecting the American people and upholding the Constitution.”
In brief, there seems to be a full scale internal war between all the US LEJ powers now. The dysfunctionality imposed on the FBI is as controversial and corrupted as the ‘Saturday Night Massacre’ when President Richard Nixon's terminated Archibald Cox that investigated the Watergate scandal. However, such Games are not about persons, but about organizations, - highly dysfunctional such. The most obvious explanations for such self-damaging acts are that there certainly is a fully operational Para-FBI within the US Constitution. Such an anti-FBI is probably remote-controlled by the FBI most powerful rivals, - like the new Russian MGB (Ministry for State Security) and its Chinese role-model MSS. (UU 2016.sept.23 & UU 2014.nov.28) Anyways, there is no doubt that this is organized crime of High Treason. The question is then whether the quality of US Constitution includes proper immunity to hinder the a scenario like ‘5D-2 – RAF White House’ that is described in UU 2017.feb.24 (See the series of 6 US CdE scenarios in UU2017.feb.10 to UU 2017.march.17).
France was exposed to massive cyber-attacks in its most critical phase of their President Election too. Wikipedia writes: “A report published on 25 April by the Japan-based security firm Trend Micro alleged that a group of hackers was targeting the (President candidate) Macron’s campaign. The group, known as ‘Pawn Storm’, better known as ‘Fancy Bear and ’APT28’ (Advanced Persistent Threats), is believed to be linked to the Russian state, and was responsible for previous attacks, including on TV5Monde in April and the Bundestag in May 2015. In particular, the group attempted a phishing operation, registering four domains strongly resembling those actually used by En Marche! (Macron’s campaign), of which three were domiciled in Ukraine and one in France.” The Russian secret cyber services probably hoped to alter the French president election with compromising information, and indirectly favoring the anti-EU and anti-NATO candidate, Le Pen. However, Macron’s staff anticipated such a repetition of the attacks on the US President election. The French counter-fought the cyber-attacks successfully. The new French president (Macron) will probably engage the Europol and the European Parliament for preventive measures against such international crimes against any European parliamentary system.
The Information Technology (IT) and Cyber powers was the main focus in the blog is called the ‘P5GO10 –PROSA Technocracy’ (UU 2016.sept.09). At that time, the theme was related to the EU and thereby those 12 blogs. However, it is the very similar and fundamental problem for NATO, EU and US. Here are some quotes from the blog that can be related to the 50 additional blogs about to the US and ‘the West in general’.
- “The sociopathy of the 5th Pyramid Game aims to cause dysfunctionalities (dystopia), like the previous 4 Pyramid Games caused CCD (Colony Collapse Disorders) and World Wars. Therefore, it is important that ‘Western’ Parliamentary Democracies strengthen their superiority over technocracy. In order to enlighten the issues, this main focus is set on the criminal ‘21 Conditions of the 3rd International’. This will show that the previous failed CdE (Coup d’ Etat) -attempts are main reasons for present abuses of Information Technocracy in the Parliamentary System. All related organizations suffer from the corruption in economy, politics and legality, - as talked through in blogs like UU 2015.juni.05, UU 2015.juni.26, UU 2014.okt.17, UU 2013.nov.01 and UU 2013.sept.27.”
- “(The 5) Internationals, refer to the (obligatory) conditions, most of which were suggested by Vladimir Lenin, to the adhesion of the socialist parties to the Third International (Comintern) created in 1919.” The 3rd condition says: “In almost every country in Europe and America the class struggle is entering the phase of civil war. Under such conditions the communists can place no trust in bourgeois legality. They have the obligation of setting up a parallel organizational apparatus which, at the decisive moment, can assist the party to do its duty to the revolution. In every country where a state of siege or emergency laws deprive the communists of the opportunity of carrying on all their work legally, it is absolutely necessary to combine legal and illegal activity.” Wikipedia has been able to publish the high treasonous conditions of the 3rd international. Similar conditions to the present 5th International (5th Pyramid Game) are obviously much more treasonous and destructive.)
- “With the Gulag colonialization program, workers were radicalized by ‘Red Mafia’ methods - in order to make bureaucratic schizophrenia with ‘parallel apparatus’ within the prey nations. International masspsychosis were propagated by national mass-media, like TV, papers, radio, tele companies and cultural events. Such were subsidized by the nations’ own budgets and favored PROSA Oligarchs by regulations. All this is illegal and even treasonous by penalty laws, - executed by remote controlled Labour parties and Unions – like some avatars.”
- “During the 5 Pyramid Games, the Information Technology (IT) has developed from 1) Pen, 2) Telegraph, 3) Telephone, 4) Television to 5) Computers. All these new technologies caused industrial revolutions that were abused by the para-Technocracy at their times, - inspired by concepts of parasite organizations. Therefore, some bits from previous blogs are relevant hints for the present and future Technocratic Games.”
- “Originally, IBM’s predecessor, CTR (Tabulating Machine Company) by and Hollerith, had relation to Russia and Tsar Nicolas II before WW1, as well as Stalina Automobile Plant and Germany before WW2. It is publicly silenced that CTR/IBM was an active and important actor for both Soviet Union (SU) and Germany before WW2. IBM might also have got ‘grandiose besserwised’ inspirations, re-valuations of ethics, ‘half truths’, imperial ‘take-it-all-politics’ and disfavors of democracy. However, Watson Sr. and Jr. are the patriarchs of IBM’s with democratic tendencies. They represented the motto ‘Think’. However, IBM became involved with the US government and military during the cold war. That was probably controversial in relation to Russia. Stalin’s close relation to Mao was further challenged with IBM’s engagement in the Korean war. An internal cold war inside IBM might have developed by those strong external influences.” The organizational Ego was about to split.” (UU 2013.dec.13) However, no one should Think that the present IBM brand Watson has anything to do with the previous democratic values of Watson Sr. and Jr.
- “Most alarming is the recent take-over of all IBM Intel Server in all NATO nations public and private sectors. (See UU 2014.nov.28.) Big Blue made Big Red by handing over the needed resources, network, servers and technology to execute considerable IT hacking, espionage, and info/money manipulations.” NATO nations’ public sectors do not seem to realize that most of their main IT systems are now legally in Chinese control too.” Dane public IT shows serious indications that the social Superior Egos is on a destructive paths that might become irreversible. The whole LEJ might be involved.” (UU 2015.nov.06 & UU 2014.dec.12) An example of IBM anti-democratic is the evident abuse of Lotus Notes. It was ‘built to fail’ by not using the architectures of ‘relation databases’, but dysfunctional catalogues. However, IBM bought Lotus and used it aggressively toward Microsoft democratic technologies, - very aware that the enterprises and users taking the bait eventually became dependent on IBM’s technological dysfunctionalities and their ‘international business machine’.
- “It is most crucial to realize the sociopathic warlike 4th degree Games going on in the national IT & Tele enterprises, public ones as well as commercial ones. There are also evidently indications that Nor Tele sector is as abused as the Dane IT sector. Despite serious warnings from NATO allied, Telenor has let the Chinese anti-NATO Huawei massive installations of G4 mobile network. The equipment has all capacities for illegal monitoring, manipulation and other foreign secret services. When established, a concerned newspaper hired an independent security company that registered most serious unregistered monitoring of mobile communications in governmental, financial and industrial centers in the capital Oslo. The head of PST (Norwegian secret service, like Dane PET) denied any illegal activity and closed the case in 6 months. However, now the government has allocated 12 million Kr to fight illegal mobile monitoring. Now, a major corruption case causes major political scandals. The Telenor related company Vimpelton has been involved in heavy corruption in Uzbekistan for years. Nor Telenor and Dane TDC are apparently competitors in Denmark, but very close in reality. (See related links below.) This close relation TDC/Telenor relations to anti-NATO actors concerns America as well as European nations, - just like the Moscow thesis does. Unsound psychosocial neuro-systems, like some S-E/S-I relations, might be on destructive paths that might become irreversible.”
- “However, true Parliamentary authorities must differ between willing and forced PROSA workers, when investigating such PROSA crimes. In fact, criminal law is stricter to public servants than to civilians. Yet, public servants are rarely sentenced for their crimes even though the scandals of low quality services and expenditures are far too high. It is proof though, of too much fraud and corruption, - like in mafia-dominated markets (UU 2015.okt.23). Most public laborers are forced by violent mafia organizations that are related to the so-called ‘Red Mafia’ (see video link). The threats of Underworld Games were talked through in the previous UU 2016.juli.15 ‘P5GO03 – PROSA Pension’. Although any member of a high treasonous organization can be guilty by association, there are exceptions, - like for civil criminal relation, - by supporting the true Parliamentary system to improve the LEJD Quality by uncloaking the criminal ‘parallel organizational apparatus’ (C3).” (UU 2016.juli.22)
- (UU 2013.okt.25) “IT crimes is a vast field that the 15 video-documentations in the Computer World -article provide some overview and insight to. Some circumstances are that; the search for hackers is too often outside the ‘firewall’, while it is often ‘an inside job’. In fact, ordinary IT supporters get full ‘administrator rights’ to the whole IT system, - and thereby get collective anonymous ‘administrators rights’ that includes full rights to read, change and delete any information in the whole IT system and any user’s data-files. However, upgrading the IT system to newer versions limits these rights to what is necessary for the ‘administrator’. Such restrictions can be the real reason for internal resistances towards modernizing of public IT – there are para-organizations within the enterprise. Furthermore, any citizen (in Denmark) has a public IT ID. However, the security by Java/Oracle is too often compromised that the security level for the citizens has become hazardous. It is symptomatic for such policies though, that the bank ID cards and CPR ID cards are without pictures and thereby not identifiable. All in all, as mentioned 20 years ago, it is alarming that the (Norwegian) Public department for economic crimes do not have a division for the public sector, - like public servants are some ‘untouchables’ to the Penalty Laws.”
- “China has now the personal identity and medical records of all Danes. Quite alarming and almost unnoticed. Unencrypted data-files with 5 million CPR (central personal register) identities and related data from SSI (Statens Serum Institut) was delivered via ordinary mail to the Chinese Visa Authorities in Copenhagen. Any resident in Denmark gets a CPR even though they are not a citizen. The event was claimed to be an accident and that the data has never been entered. However, it is highly likely that some organizations related to the secret services of China (MSS) and Russia (FSB) do abuse the data in violations to the Legalities of European Human Rights. 5th Pyramid ‘suckers’ might claim otherwise and prevents further investigations and not get official insurance that China (and Russia) do not Danes CPR and health data.” (UU 2016.spt.02)
- “Now, it is crucial that the NATO nations takes control over their own IT infrastructures. The timing has never been more critical and binding for the future. NATO considers now the threats of IT crimes larger than any other threats, - even larger than nuclear war. Some security methods are well known and should be deployed long ago, - like; an obligated use of advanced password procedures; using secure websites with https instead of merely http, controlled firewall rules; deployment and updates of antivirus and anti-spyware software; security clearance of IT personnel; limited IT ‘administrator’ rights and personally identifiable administrator acts.” (UU 2014.mars.28)
- “However, there were far more serious long term massive aftermaths. Although not apparently directly related, there are events and results that highly indicate so. Soon after Medvedev’s good-will tour (in US), there were massive exposes of so-called ‘whistle blowers’. Some of the most focused ones are: Bradley Manning who was convicted of violating the US Espionage Act that sentenced to 35 years in US prison. The Australian publisher and journalist Julian Assange, the editor-in-chief of the website WikiLeaks, which he co-founded after an earlier career in hacking and programming. Edward Snowden, a former system administrator for the CIA and a counterintelligence trainer at DIA that leaked masses of classified information from the NSA. Snowden is recently granted 3 years refuge in Russia and is offered Russian citizenship. Actually, it seems that he has been with SU all along and a citizenship will certainly label him with a history as another double agent. Anyways, even with the massive information about the global cyber wars, - the public knowledge is obviously merely from scenes at the stage.” (Taken from the BBC documentary ‘Putin, Russia and The West’ in UU 2014.nov.07, UU 2014.nov.28, UU 2014.nov.21 and UU 2014.nov.14.)
Now that England is Moved into the Brexit Game, the English Human IT Rights are in jeopardy, by rejecting the EU regulations of the GDPR (General Data Protection Regulation). Like some cyber finance center in London is called ‘Londongrad’ (UU 2016.aug.12), - just as murky are some IT datacenters in London. The video ‘From Rio to Roskilde’ in the Extra UU, indicates the actual potential of massive abuse of personal data. The mobile users did not know they were in IBM’s Big Brother processes with their datacenter in the IT Haven of London, - just like a ‘1984’.
Furthermore, these are attempts to sum up to some conclusive proposals, in addition to all the hints in this blog, in order to promote ‘Western’ democratic parliamentary nations during this phase of the 5th Pyramid Game:
- “Laws are simply any society’s operating system (OS). Realizing that the technocratic state machine is simply like a computer, - it is obvious that; it has many faults due to decay, outdating and manipulations; that there are critical upgrades and fixes that can be deployed immediately; and that should have decades ago to reduce crimes. Knowing the warlike Games of IT industries in the public sectors, and the unsound organizational mentality behind, - it is obvious that the very same Games are played in all of LEJ (Legal, Executive and Judicial Parliamentary Powers). Much of the delays, incorrect and terminated ratifications of Parliamentary Law are obviously not due to technical errors, - but to PROSA Technocrats. It is all about protecting PROSA crimes and criminals, - as stated in the 21 Conditions of the 3rd International. The solution is simply, - Rule by Law.”
- “The term ‘The 4th State Power’ is a mass-propagated illusion. The real 4th Parliamentary power is Democracy, not technocracy and bureaucracy. That mass-psychopathy was a main reason for the genocidal warfare towards humanity in the previous century. Realizing that 5D history, it is obvious for anyone that Humans are above machines, - never the opposite. The solution is simply, - Rule by Human Right Laws.”
- “There are hyper-democratic solutions to the mass-propaganda and mass-psychosis of PROSA media, as stated in the 21 Conditions of the 3rd International. A cure for mass-psychosis is to disconnect from the mass-media of the 4th Pyramid Game, - i.e. state dominated para-media of TV, Radio and Papers. It is very simple to end the subscriptions. Next, use the computer and internet instead. Soon anyone realize what the world media offers this century. Have a look at the extra UU TED talks to get an idea of what the rest of the world talks about.”
- “The Bureaucracy need innovation of technocracy. It is not that different from upgrading any IT system to virtual solutions. There are Return of Investments (RoI) in 2-3 years due to the savings from bounding maintenance costs of Oligarchs ineffective, expensive and faulty IT systems. Knowing very well that the Coldwar in the public sector was to double the numbers of employee, as para-organization, - it is about time to free all the resources from the Coldwar bondages. However, most important, even though Big Blue was pro-NATO once, - Big Red is now anti-Western and anti-democratic. There is no way that loyal public servants can ignore that vast security threats Big Red opposes. Therefore, build new bureaucracies with today’s technologies and migrate loyal public servants to the ‘new buildings’.”
The Global war of Secret Services became evident in 2017. The goals are to deliberately cause dysfunctionalities on the rivals; the means are ‘dark nets’ of Cyber IT; the concept is ‘the 21 condition of the 3rd International’ and; the methods are Underworld Games – Jackal Style. Here, in this series of blogs, - it is called the 5th Pyramid Game and the anti-thesis is called P5GO (5th Pyramid Game Over). This is a cloudy war of mutual traumatizing of empires, nations, organizations and individual humans. We can do better than that, - even during the 4th Industrial Revolution. It is rather easy, though. We all know how-to. Just use common democratic sense, the professional knowledge about sound LifeQuality and proper healing organizational dysfunctionality.
Links:
https://www.nytimes.com/2017/05/10/us/politics/comey-russia-investigation-fbi.html
http://edition.cnn.com/2017/05/10/politics/comey-goodbye-letter/index.html
http://www.cbsnews.com/news/trump-fires-fbi-director-james-comey/
https://en.wikipedia.org/wiki/French_presidential_election,_2017#Other_incidents
https://www.b.dk/globalt/tog-macron-fusen-paa-de-russiske-hackere
https://en.wikipedia.org/wiki/James_Comey#Dismissal
http://en.wikipedia.org/wiki/Computer_crime
https://www.microsoft.com/en-us/trustcenter/Privacy/GDPR
http://www.aftenposten.no/verden/FBI-Slik-snek-russiske-hackere-seg-inn-bakveien-for-a-lure-amerikanerne-612018b.html
http://finans.dk/live/it/ECE9293732/dyster-rapport-udenlandske-hackere-kan-goere-hvad-de-vil-i-danmark/?ctxref=ext
Music:
“ ‘The Night’ is a song by Frankie Valli and The Four Seasons that was originally released in 1972. Although it failed to chart when first released, it became a popular track on the northern soul circuit, which led to a successful UK re-release in the spring of 1975, when it reached no. 7 on the Official Chart. The song sees Frankie Valli pleading with a girl that he admires to resist the advances of another guy.
Valli cited this song as an example of a song that should have been a big hit on first release, but didn't chart due to poor promotion by the MoWest label.”
Lene Lovich honor the song ‘The Night’ with a cover version. She is another artist that is undeservingly unknown, even though many can recognize the songs like ‘Lucky Number’ and 'I think we’re alone now’. She is not Russian, even though her cloths might seem so. The inspiration might come from her father that came from Serbia, a nation that was dominated by SU at that time. Her name is short for Lili-Marlene Premilovich. Her theme about travels and freedom stems probably from her earlier years in US and UK. She has a life-long experience in theaters, movies and music. Besides her life-mate since she was 13, Les Chappel, she worked with the artists Thomas Dolby, Nina Hagen, Erasure – and surprisingly for VDGG fans, - Peter Hammil and Judge Smith.
The association to this song is that some second thought might appear in some Manhattan Tower these days.
Lene Lovich - The Night (Frankie Valli And The Four Seasons Cover) + lyrics
https://www.youtube.com/watch?v=m4qxQ9qYFds
http://www.metrolyrics.com/the-night-lyrics-lene-lovich.html
Frankie Valli and The Four Seasons - The night (studio, video, live)
https://www.youtube.com/watch?v=5bBzOBI0tPA
https://www.youtube.com/watch?v=viF1hDSKR58
https://www.youtube.com/watch?v=kiIxRQjAUGw
Soft Cell - The Night (studio + live)
https://www.youtube.com/watch?v=UMy5B09k97s
https://www.youtube.com/watch?v=QLptRQMgbEs
The intention of this blog is to set focus some hazardous cyber issues in the eve of this 4th Industrial Revolution. Here are some videos that set the focus on the deliberately dysfunctionalities, to harm the National Constitutional Qualities as well as any personal LifeQuality.
French election: Are Russian hackers to blame for Emmanuel Macron's leaked emails
https://www.youtube.com/watch?v=uAznfaVBnag
How the Threat Connect Research Team Used the Platform to Investigate FANCY BEAR
https://www.youtube.com/watch?v=wq5MOuCdPhg
Video: Safe Cracking with Feynman - Numberphile
http://ed.ted.com/featured/UCF8BQ3A
Video: Norwegian video about the hacking of EU and US elections.
http://www.aftenposten.no/norge/Slik-kan-en-hacker-prove-a-pavirke-stortingsvalget-617198b.html
IBM – “From Rio to Roskilde" - from data to value. Total monitoring of all mobile users
http://www-05.ibm.com/fi/businessconnect/assets/files/CBS_Per_Ostergaard_Jacobsen.pd
Macron Campaign Says It Was Target of ‘Massive’ Hacking Attack
https://www.nytimes.com/2017/05/05/world/europe/france-macron-hacking.html?_r=0