Saturday, February 24, 2018

The most beautiful cups sometimes contain the darkest poisons

                                                                                    -liquidambar tree
    When will humanity awaken to the wiles of manipulation?  When will they realize that their best values are being traduced?  When will they perceive that even from their earliest training in the schools the scum and ignorance of the world have been fostered upon them as delightful tomes of sacred wisdom?  The most beautiful cups sometimes contain the darkest poisons and frequently these poisons are introduced via the most pleasant-tasting elixirs.
  The publishing industry of the world in the hands of a few through cartels and secret agreements seem bent upon pushing humanity into a one-world government, founded not upon ascended master Law but upon the decadent philosophies of the laggards.  Many are the couriers trained in Moscow who have gone forth in the name of religion, in the name of brotherhood, in the name of Christ to crete an ecumenical attitude in the hearts of men.  Concealing their real purpose of world control through a world council they espouse noble cause--but their motives are dark….
  I am certain that many understand that modern methods of communication if properly used would enable the people to educate their young and to receive untold blessings in this day and age; instead they are being victimized through the misuse of the very instruments which were released by the Brotherhood for the enlightenment of man.  Individuals must learn not to believe everything that they read, they must also learn not to believe all that they see….
  America and free world, awake!  The people of all lands await the hour of your awareness when, casting off the yoke of all those who would rule you, you shall cleave with all your heart to the light of the ages and understand that freedom is more than a name, it is a game in which all must engage or be tyrannized….
Receiving power from above
And holding forth His flame
The age of brotherhood will come
To be no secret pact
But honor in the flame is born
As man like God does act.        -K-17 for the Cosmic Secret Service

Pearls of Wisdom 13:24   
              
             sundown near Shasta, 2-23

Friday, February 23, 2018

this peaceful world: Putin and Kim Jong Un

7-31-17  
       When you have almost 200,000 people in prison camps, export what amounts to slave labor and threaten to nuke most of Asia and America on a daily basis, you aren't exactly going to win a global popularity contest.  That belligerence combined with Washington's military capabilities and its ability to impose regime change have driven Pyongyang to develop the ultimate weapon: nuclear warheads paired to ballistic missiles that could soon be able to kill millions in the continental United States.
   Shared enemies plus shared interests equal shared goals.  That means Vladimir Putin and Kim Jong Un could be partners in crime, developing deeper ties while eventually seeking to push back against Washington.  Indeed, there even seems to be some evidence that this could already be happening.  http://theweek.com/articles/714278/how-vladimir-putin-kim-jong-un-could-become-partners-crime
.............................................................................................................................
3-6-17    Even Abel Romero
, the director of government relations
 at the Missile Defense Advocacy Alliance,
 told Business Insider that missile defense is not "solely the answer" to stopping threats from North Korea.  China and Russia have missiles that can reach the US in less than 30 minutes, defeat all existing missile defenses, and target up to 10 separate locations with individual warheads, but no one in the US looks to defend against such attacks, according to Romero.
"As of right now I've never heard anyone come out and say we need to build a missile defense system to defend us from Russia and China," said Romero. Instead, the US uses diplomacy and the doctrine of mutually assured destruction to coexist with Russia and China.   http://nordic.businessinsider.com/north-korea-thaad-missile-defense-2017-3/
.........................................................................................................................

Military vehicles carry missiles with characters reading 'Pukkuksong'

Military vehicles carry missiles with characters reading 'Pukkuksong' CREDIT: REUTERS/DAMIR SAGOLJ
4-15-17   North Korea displayed its submarine-launched ballistic missiles for the first time on Saturday ahead of a massive military parade in the capital, Pyongyang.  http://www.telegraph.co.uk/news/2017/04/15/north-korea-displays-submarine-based-missiles-first-time-nuclear/
..........................................................................................................................................
May 28, 1989     In a highly secret arrangement, the United States has long provided substantial covert assistance to the French nuclear weapons program, apparently in violation of American law, an authority on international relations says. 
  Under the arrangement, Washington furnished information to France on how to design and build nuclear weapons and to deliver them by missiles and aircraft.  It has been highly beneficial to both countries and since the mid-1970's has encouraged the de facto reintegration of France into North Atlantic Treaty Organization's defense plans, Richard H. Ullman wrote in an article for the summer issue of Foreign Policy magazine.  The French withdrew from the NATO defense arrangement in 1966. 
  The agreement to share secret nuclear information with France was instituted more than 15 years ago by President Richard M. Nixon and his national security adviser, Henry A. Kissinger, who was also Secretary of State, and has been endorsed and approved by every President since, Mr. Ullman said.    http://www.nytimes.com/1989/05/28/world/us-secretly-helped-france-develop-nuclear-weapons-an-expert-writes.html?pagewanted=all
...................................................................................................................................
The M51 SLBM is a submarine-launched ballistic missile, built by Airbus Defence & Space, and deployed with the French Navy.   Airbus Defence and Space has its corporate headquarters in OttobrunnGermany, and is led by Dirk Hoke, the Chief Executive Officer.   https://en.wikipedia.org/wiki/M51_(missile)     (M-51 is mirved--carries multiple nukes.    
-r.)
...................................................................................................................................
In a recent poll, 85 percent of Germans spoke against the continued deployment of U.S. nuclear weapons in Germanyhttp://carnegieendowment.org/2016/12/06/sudden-german-nuke-flirtation-pub-66366
...................................................................................................................................
7-3-17   Germany’s leading serious newspaper today reported on Abbott’s comments because back in April 2016 Thyssen Krupp Marine Services (TKMS) had lost out in a competition to Naval Group  a.k.a. DCNS of France; the Australian government picked the French firm to build 12 submarines for the price of 50 billion dollars.  Australia chose the French to build conventional submarines.  But, according to the FAZ, “the order could be redefined at any time” to specify nuclear-powered craft. When the German firm dropped out of the race to build Australian boats, it asserted darkly, “behind the scenes it was suspected that that had happened because the Germans offer no nuclear option.”  (The above-linked article from 15 months ago in fact mentioned the French vendor’s atomic advantage over TKMS.)  https://www.armscontrolwonk.com/archive/1203491/australia-and-nuclear-submarines/
.............................................................................................................................
9-13-17    According to Geoff Hellman, Chairman and CEO of the Economic Policy Forum which focuses on business dealings in the Asia-Pacific Region and Russia, it (Putin's deep support of Kim Jong Un) is all an “Asymmetric Hybrid Warfare” (AHW) tactic aimed at promoting Russia’s image at home, as a place of “law and order, peace-loving and devoted to economic prosperity” compared to a more “war-mongering” United States.

  “Russia supports actions that benefit Russia.  Russia purports to support sanctions against North Korea, but in practice supports North Korea in its effort to evade sanctions,” he said.  “Russia employs criminal networks to set up front companies in Singapore, for example, to transship oil.”...
  North Korea has undertaken 16 missile tests this year alone – including two intercontinental ballistic missile (ICBM) tests and one possible hydrogen-bomb test this month.  President Trump has warned the rogue state that the sanctions imposed are “nothing compared to what ultimately will have to happen.”   http://www.foxnews.com/world/2017/09/13/why-russia-props-up-dangerous-north-korean-regime.html
..........................................................................................................................
10-6-17     But to prevent the Kim regime from holding the U.S. civilian population hostage to an EMP threat, or even to prevent an irrational North Korean attack, the United States should turn to new technologies to construct a far more effective missile defense now....
Advanced drones could patrol North Korean airspace to destroy Pyongyang’s nuclear weapons arsenals, research facilities, and missile sites.  Others could seek to fire on North Korean ICBMs in their initial boost phase, when the missiles are slow and at their most vulnerable.  We could deploy Aegis anti-missile cruisers, equipped with upgraded radar and sensor systems, in the seas around North Korea to also fire on any launches.  ...
Second, the United States should unleash the cyber arsenal that it has steadily built over the last decade.  Cyber weapons alone cannot prevent North Korea from launching a nuclear missile.  But North Korea needs networked computers to conduct research and development, such as the design of missiles and nuclear warheads and simulated testing, to carry out command and control of the weapons and to conduct intelligence and reconnaissance....
as advances in robotics and communications have sparked a revolution in precision-guided munitions, the United States (may) be able to soon deploy a rudimentary anti-missile system over North Korea.  Firing down on North Korea from the ultimate high ground of space would add another layer of defense behind anti-missile cruisers and aerial drones.   http://thehill.com/opinion/national-security/354176-space-weapons-robotics-and-cyber-are-key-to-defeating-north-korea
.......................................................................................................................
updated 7-6-17      "There is a very strong belief that the US -- through cyber methods -- has been successful on several occasions in interrupting these sorts of tests and making them fail," former British Foreign Secretary Malcolm Rifkind told the BBC earlier this year.
    Rifkind's comments came on the heels of a report in the New York Times saying US President Donald Trump inherited a cyberwar on North Korea meant to sabotage its missile tests.
    "It's clear United States policy to develop the cyber capability to disable enemy ballistic missiles," said Greg Austin, a professor at the Australian Centre for Cyber Security at the University of New South Wales.
    As far as what to hack, "there's lots of ways in, which makes it very hard for the defender to know what's being attacked and what's not being attacked," said Austin, who is leading the UNSW's newly announced Research Group on Cyber War and Peace.  Most missiles have a self-destruct button, which could be activated.  Something like the Stuxnet virus, which penetrated Iran's Natanz nuclear facility, could be deployed. 
    In theory, it could be as simple as infecting systems with corrupted software via a USB thumb drive, says Jai Galliott, a defense analyst and professor at UNSW.  Though the question remains how that could physically be done in a country as closed off as North Korea.
    Austin believes a successful hack would most likely target the launch sequencing, which could potentially degrade the launch.  "All you'd have to do in a complex missile launch system is like the (Stuxnet virus in the) Iranian nuclear enrichment facility.  Just interfere with a process that creates a physical effect of some sort that then has a destructive effect on the operation of the missile."
    Most advanced missiles also have an air-gap built in -- a way to keep the technology disconnected from the outside world -- says Galliott, though some research shows they can be hacked using other methods. 
    Measuring its efficacy would be difficult, too.  A lot can go wrong in a missile launch and it may not always be clear if a launch fails because of meddling or an error on the North Korean side.  The technology also raises thorny questions.  Some might argue deploying this sort of offensive technology is tantamount to a pre-emptive military strike -- something North Korea says it would respond to militarily.   https://www.cnn.com/2017/04/18/asia/cyber-missile-defense-north-korea/index.html


    inside the Kremlin

    by Mark Galeotti  9-1-17
    Until August 2016, the Presidential Administration was headed by Sergei Ivanov, a heavy-hitting veteran of the KGB and FSB, with a powerful reputation in the security and executive communities.  His successor, Anton Vaino, is a rather less powerful figure, so far at least, but in common with many of the key figures within the Presidential Administration, he is a foreign service MID veteran (and part of the ‘MGIMO mafia’ of alumni of MID’s own university).  Although Vaino has both the MID background and was born in Estonia, the consensus among both Western Kremlin-watchers and Russian insiders and near-insiders seems to be that he is focused on domestic policy and management issues, working with first deputy chief of staff Sergei Kirienko.
    Foreign affairs are instead part of the portfolio of the other first deputy chief of staff, Alexei Gromov.  Another MID veteran, it is noteworthy that Gromov is under both EU and US sanctions for his role in the 2014 annexation of Crimea – while his superior at the time, Ivanov, is only under EU sanction.  It is also indicative that Gromov (a patron of Margarita Simonyan, head of RT)[65] appears to be responsible for media affairs, even though Kirienko is the point man for domestic politics.[66]  Gromov may therefore be coordinating, and possibly even commanding, the active measures campaign, given that it brings together foreign policy, media, and other instruments.
     To this end, he and the other key players (including Ushakov and Surkov) draw on key elements of the Presidential Administration of relevance to the active measures campaign, notably:
    • The Foreign Politics Department (UPVneshP), headed by MID veteran Alexander Manzhosin.  He has been especially connected with attempts to undermine the sanctions regime, notably by engaging Western lobbyists and seeking to encourage foreign businesspeople to campaign against them in their own countries.[67] This department is also a primary consumer of intelligence materials, and thus also a key tasking body for the services, even if only relatively few staffers have an intelligence background.
    • The Department for Interregional Relations and Cultural Contacts with Foreign Countries (UPMKSZS) has a particular role in managing soft power operations, including Rossotrudnichestvo’s work courting the Russian diaspora (even though the agency is technically subordinated directly to MID).  Its head, Vladimir Chernov, is a specialist in international economic affairs, but was also Ivanov’s head of secretariat and has been described as “well able to work in an intelligence-heavy and conspiratorial environment.”[68]
    • The Department on Social and Economic Cooperation with the Commonwealth of Independent States, the Republic of Abkhazia and the Republic of South Ossetia (UPSESG) is by definition involved in political operations within the so-called ‘Near Abroad’ of the post-Soviet states, and it is unlikely to be a coincidence that its head, Oleg Govorun, is known to be a close ally of Surkov’s.[69]
    • The Domestic Politics Department (UPVnuP) may seem an unlikely inclusion, but it handles parliamentary and party-to-party contacts with European politicians and parties, placing it very much at the forefront of attempts to suborn some and support others.  It was, for example, the deputy head of this department, Timur Prokopenko, who arranged for Marine Le Pen’s Front National to receive loans from Russian banks, and then – via Russian politician, wealthy media producer, and French tax resident Konstantin Rykov – pressed her to endorse the Crimean referendum.[70]
    • The Press and Information Directorate (UPSIP), headed by Alexander Smirnov but very much under Peskov’s sway, is the main nexus for control of the media and the issuance of regular talking points and temniki guidance memos.  It also seems likely that contracts with the ‘troll farms’ and their instructions come directly or indirectly from UPSIP.[71]
    • The Experts’ Directorate (EUP), under former deputy minister for economic development Vladimir Simonenko, not only conducts its own analytic work, it acts as a point of contact for a wide range of scholars, think-tanks, and the like that, in turn, can sometimes be more than simply sources of information.  One of the think-tanks from which it regularly commissions reports is the aforementioned RISI, once part of the SVR and now notionally independent, although still closely connected to the spooks. RISI is not just an analytic centre (of especially hawkish character and debatable impact), though.[72]  It has also played a more active role in lobbying and cultivating clients in the Balkans and Scandinavia.  In Finland, for example, RISI’s official representative is the scholar and
    pro-Russian activist Johan Bäckman who has been an outspoken supporter of the Donbas rebels.
     Presidential Councils.  Notionally independent, these advisory bodies are housed within and serviced by the Presidential Administration, and a number play a significant role in active measures.  The Presidential Council for Civil Society and Human Rights, for example, disburses grants which have in the past gone to a number of Russian soft power and lobbying front organisations abroad, as has the Presidential Council on the Russian Language (which supports friendly émigré groups under the cloak of assisting language education and cultural programmes).  The Presidential Council for Coordination with Religious Organisations plays a crucial role in liaising with the Russian Orthodox Church and other state-affiliated faith bodies.  The Presidential Council for Cossack Affairs plays a central role in not only mobilising Cossacks for domestic political purposes, but also encouraging pro-Kremlin Cossack groups abroad, such as the hundred Cossacks who turned up in Republika Srpska as a visible demonstration of Moscow’s support for local nationalists in 2014.[73]     http://www.ecfr.eu/publications/summary/controlling_chaos_how_russia_manages_its_political_war_in_europe
    ..............................................................................................................................................
    -Serguei CheloukhineM.R. Haberfeld:  -Russsian Organized Corruption Networks, 2011   https://books.google.com/books?id=ZBa1Hu7-H-cC&pg=PA137&lpg=PA137&dq=fsb+structure&source=bl&ots=x6kpK0uHcQ&sig=EOdaTCelLY_RefQGTwp6oUWxu6I&hl=en&sa=X&ved=0ahUKEwjl0b7cz73ZAhUX5mMKHUekB3QQ6AEIlgEwFQ#v=onepage&q=fsb%20structure&f=false
    ......................................................................................................................................
    8-17-17    I had some sort of confirmation that I was being tracked by the [intelligence agency and KGB's heir] FSB for various reasons but I certainly think that they were interested in what I was doing while I was there. What I did to counter that was use all sorts of methods. The biggest one was staying off the internet. Staying offline, using burner phones, sending encrypted emails and stuff like that. The biggest one was keeping a lot of our chats, both among our team and with our sources, completely offline. Everything was done while we were in country, and as limited as possible.  https://motherboard.vice.com/en_us/article/vbbbvb/cyberwar-season-2-trailer
    ..............................
    7-20-16    it's all investigative journalists, dissidents, political opposition etc being targeted, never "standard" crime. The vast majority of law enforcement resources everywhere are dedicated to monitoring threats to those in power, in one of the rare glimpses to how police spend their resources in a "democratic" government. Back before everything was on hard drives and you could hack them in your pajamas, it was in filing cabinets and you had to physically break in. But when the citizens commision to investigate the FBI broke into their office they find: according to its analysis of the documents in this FBI office, 1 percent were devoted to organized crime, mostly gambling; 30 percent were "manuals, routine forms, and similar procedural matter"; 40 percent were devoted to political surveillance and the like, including two cases involving right-wing groups, ten concerning immigrants, and over 200 on left or liberal groups. Another 14 percent of the documents concerned draft resistance and "leaving the military without government permission." The remainder concerned bank robberies, murder, rape, and interstate theft. Draft Resistance and leaving the military I'll include under not "real" crime but threats to those in power. So like 70 percent political, 30 percent real crime. The difference between authoritarian regimes and "democratic" ones is that Hacking Team customers jail, torture and kill, where the "democratic" ones have gentler ways of managing dissent....Well yeah, the natural tendency of everyone in power is to want more power and control, and they need surveillance for that.  https://motherboard.vice.com/en_us/article/78kwke/hacker-phineas-fisher-hacking-team-puppet
    ............................................................................................................
    6-20-17    A hacker army has systematically undermined practically every sector of Ukraine:  media, finance, transportation, military, politics, energy.  Wave after wave of intrusions have deleted data, destroyed computers, and in some cases paralyzed organizations’ most basic functions.  “You can’t really find a space in Ukraine where there hasn’t been an attack,” says Kenneth Geers, a NATO ambassador who focuses on cybersecurity.
    In a public statement in December, Ukraine’s president, Petro Poroshenko, reported that there had been 6,500 cyberattacks on 36 Ukrainian targets in just the previous two months.  International cybersecurity analysts have stopped just short of conclusively attributing these attacks to the Kremlin, but Poroshenko didn’t hesitate:  Ukraine’s investigations, he said, point to the “direct or indirect involvement of secret services of Russia, which have unleashed a cyberwar against our country.”  (The Russian foreign ministry didn’t respond to multiple requests for comment.)   https://www.wired.com/story/russian-hackers-attack-ukraine/
    ..................................................................................................................................
    1-5-18  https://www.independent.ie/business/countries-on-red-alert-for-2018-cyber-war-36459446.html

    cyberwar update

    2-22-18   Between the third and fourth quarters of 2017, cyberattacks rose 82% and malware spread at a rapid pace, according to new data from digital security firm Fortinet.  http://www.cutimes.com/2018/02/22/cyberattacks-nearly-double-in-q4-report-says
    2-20-18   Phil Quade, chief information security officer, Fortinet:  "The stark reality is that traditional security strategies and architectures simply are no longer sufficient for a digital-dependent organization.  There is incredible urgency to counter today’s attacks with a security transformation that mirrors digital transformation efforts. Yesterday’s solutions, working individually, are not adequate.  Point products and static defenses must give way to integrated and automated solutions that operate at speed and scale.”...  
    Digital transformation isn’t just reshaping business, cybercriminals are leveraging the expanding attack surface it creates for new disruptive opportunities to attack.  They are implementing newer swarm-like capabilities while simultaneously targeting multiple vulnerabilities, devices, and access points.  The combination of rapid threat development combined with the increased propagation of new variants is increasingly difficult for many organizations to combat....
    An example is an attack codenamed Triton.  It is sophisticated in nature and has the ability to cover its tracks by overwriting the malware itself with garbage data to thwart forensic analysis.  Because these platforms affect vital critical infrastructures, they are enticing for threat actors....
     Fortinet Global Threat Landscape Report is a quarterly view that covers global, regional, industry sector, and organizational perspectives.  It focuses on three central and complementary aspects of that landscape, namely application exploits, malicious software, and botnets.  It also examines important zero-day vulnerabilities and infrastructure trends to add context about the trajectory of cyberattacks affecting organizations over time.  To complement the report, Fortinet publishes a free, subscription-based Threat Intelligence Brief that reviews the top malware, virus, and web-based threats discovered every week, along with links to that week’s most valuable Fortinet research.
    http://markets.businessinsider.com/news/stocks/fortinet-threat-landscape-report-reveals-attacks-per-firm-increased-by-82-swarm-cyberattacks-target-the-internet-of-things-iot-with-growing-intensity-1016444776
    ................................................................................................................................
    2-9-18     Personal information is boosting the phenomenal innovations happening in the AI, machine learning and deep learning spaces,” says Anton Jacobsz
    , managing director at value-added distributor, Networks Unlimited.  “But, where there is a door in to reach this info, there is also the danger of cyber criminals slipping through keyholes and squeezing in under doorframes, all with the basic aim of using data maliciously.  Of course, the more machines that are connected – think Internet of Things (IoT) and all things smart: cars, homes, mobile devices, industry machines, utilities, and more – the more widespread the potential cybercrime infestation and destructive aftermath becomes.”...
    “We expect to see new service offerings from the dark web as Crime-as-a-Service organisations use new automation technology for their offerings.  We are already seeing advanced services being offered on dark web marketplaces that leverage machine learning.  For example, a service known as FUD (fully undetected) is already part of several offerings.  This service allows criminal developers to upload attack code and malware to an analysis service for a fee.  Afterwards, they receive a report as to whether security tools from different vendors are able to detect it,” the blog points out, and also observes that “Infected machines leveraging Coinhive is a latest example – browser plugins that infect end-user machines to hijack their CPU cycles to mine for virtual currency. This process is rapidly accelerating the time from concept to delivery of new malware that is both more malicious and more difficult to detect and stop.  Once true AI is integrated into this process, offense vs defence (time to breach vs time to detect/ protect) will be reduced to a matter of milliseconds rather than the hours or days it does today.”...
      it is easy to predict that cybercriminals will eventually replace botnets built with mindless zombie devices with intelligent clusters of compromised devices to create more effective attacks.  This would be a hivenet instead of a botnet.  It would be able to use millions of interconnected devices, or swarmbots, to simultaneously identify and tackle different attack vectors, enabling attacks at an unprecedented scale,” explains the blog.  “Such hivenets are especially dangerous because, unlike individual zombies, individual swarmbots are smart.  They are able to talk to each other, take action based on shared local intelligence, use swarm intelligence to act on commands without the botnet herder instructing them to do so, and recruit and train new members of the hive.  As a result, as a hivenet identifies and compromises more devices it will be able to grow exponentially, and thereby widen its ability to simultaneously attack multiple victims.”  -Jcobsz   http://www.itnewsafrica.com/2018/02/cyber-security-the-winner-takes-it-all/
    .................................................................................................................................................
    2-23-18   Attacks are also increasing, with Akamai's State of the Internet / Security report for 4Q17 showing a 14 percent year-over-year gain in the number of Distributed Denial of Service (DDoS) attacks....
    According to Trend Micro, there was a 32 percent increase in new ransomware families from 2016 to 2017....
    93 percent of organizations surveyed by Verizon stated that mobile devices present a growing threat.  Furthermore, 79 percent of the organizations are concerned about  employee misuse of mobile devices.  "As mobility becomes more integral to business operations in today’s digital economy—from supply chain management to IoT-enabled sensors to customer-facing mobile apps—protecting mobile platforms is critical," Thomas Fox, senior vice president with Verizon, stated....
    Raytheon 2018 Study on Global Megatrends in CyberSecurity...."Every day the cyber-threat is growing more sophisticated and aggressive, posing a real threat to global businesses across all sectors," Raytheon Chairman and CEO Thomas A. Kennedy, stated.
    The primary issue highlighted by Centrify is that there is a disconnect between executive management and technical staff.  For example, 35 percent of technical officers identified malware as the primary threat to cyber-security.  In contrast, 62 percent of CEOs cited malware as the primary threat to cyber-security.    http://www.eweek.com/security/cyber-security-reports-reveal-growing-concerns-about-data-breach-risks
    .................................................................................................................................
    The report surveyed 1,911 respondents in 80 countries, including Allianz’ customers, brokers, risk consultants, underwriters, senior managers and claims experts.

    “The jump that cyber incidents have taken in the past year – from third to first for medium-sized companies and from sixth to second for small-sized companies – is significant and reflects an uptick in the attention paid to data breaches both by SME companies and their insurance brokers,” said Vinko Markovina, global head of MidCorp, AGCS, who was quoted in the report.  https://www.insurancejournal.com/news/international/2018/02/21/481113.htm
    ...............................................................................................................................
    2-23-18  McAfee, in partnership with the Centre for Strategic and International Studies (CSIS), today announces that cybercrime costs the world close to $600 billion – a $150 billion increase since 2014. 
     The research has also found the following below key findings:
    • Nation states are the most dangerous source of cybercrime, with Russia ranking No. 1 and North Korea No. 2. China is the most active player in cyber espionage.
    • Banks are the favourite targets of cybercriminals, even though financial institutions spend three times what other companies spend on cybersecurity.
    • Ransomware is the fastest growing type of cybercrime, aided by cybercrime-as-a-service, which is also flourishing
    • Cryptocurrencies are enabling cybercrime by allowing criminals to hide their identity while paying for services
    • Since 2014, nearly three billioninternet credentials and other personally identifiable information (PII) have been stolen by hackers
    • Two-thirds of people online– more than two billion individuals – have had their personal information stolen or compromised       
      Raj Samani, Chief Scientist and Fellow at McAfee
    • :https://www.informationsecuritybuzz.com/expert-comments/mcafee-research-reveals-cybercrime-takes-almost-600billion-toll-global-economy/
    • ......................................................................................................................
    2-20-18   CrowdStrike, another top cyber security firm, told NBC News it identifies the N. Korean group by the name "Labyrinth Chollima." 
    "Their malware is quite sophisticated and is capable of stealing documents from the air-gapped or disconnected networks," says a CrowdStrike intelligence paper. "Primary targets include government, military, defense, finance, energy and electric utility sectors."...
    Kim Heung-Kwang, a former North Korean computer expert who defected to the south in 2004, told NBC News in an interview in Seoul last year that the North has trained thousands of military hackers capable of inflicting damage on South Korean and Western infrastructure.  https://www.nbcnews.com/news/north-korea/watch-out-north-korea-keeps-getting-better-hacking-n849381
    ....................................................................................................................
    2-23-18    at the end of 2017 North Korea got a look at South Korean and American war plans and were alarmed at what they found. The northerners had every reason to believe this information was accurate because in late 2017 South Korean military networks were hacked and a large quantity of secret documents appear to have been copied. This apparently included several OPLANs (Operational Plan, a plan for a single or series of connected operations to be carried out simultaneously or in succession by specified military units).... OPLANs also include a lot of operational details that do not change much over time so grabbing even one version of a particular OPLAN has its uses.
    South Korea and the United States have a number of shared OPLANs....In response to this latest hack South Korea quickly ordered some changes in its Cyber War defenses.   https://www.strategypage.com/htmw/htintel/articles/20180223.aspx
    ..............................................................................................................................
    2-4-18   The ability of terrorist groups to launch cyber attacks will only increase, a senior counter-terror official has warned
    ISIL and other terrorist groups are turning to the underworld to try to secure tools to carry out cyber-attacks on critical infrastructure.
    Terrorist groups have taken part in low-grade “cyber vandalism” and their ability to wage more damaging attacks will only increase, according to a former operations chief at the UK’s spy centre GCHQ.
    Many of the required tools to launch crippling attacks are becoming increasingly available on criminal markets on the so-called Dark Web, part of the world wide web that needs special software to penetrate.  https://www.thenational.ae/world/europe/isil-likely-to-switch-to-cyber-war-after-battlefield-loss-1.701733
    .......................................................................................................................................
    1-29-18   The Defence Secretary, Gavin Williamson, has warned Russia could cause “thousands and thousands and thousands” of deaths in an attack on Britain’s energy supply. He said Moscow had been looking at UK critical infrastructure such as power stations and links transferring electricity across borders.  https://www.informationsecuritybuzz.com/expert-comments/defence-secretary-says-russia-kill-thousands-cyber-attack/
    ..............................................................................................................................

    Idea to Create


        When the brilliant flash of the divine Idea to Create dazzlingly expanded its diadem of myriad electrons into space--from the first photon of light until infinite appearing points of light composed the cosmos--it was an exercise in crowning the Son of God with earnest dominion.
      The hypocrisy of the present era of Earth’s evolution is a pain to many hearts for it is a clear indication to those who can discern the face of life that man is in no way linked with the crowning chain of cosmic purpose.  His energies go down the drain and are swallowed up a in a giant hole as his attention pursues a senseless series of moving pictures, accelerating the trend of degradation….
      In fact much if not all of the violence that humanity is facing today is the result of a deliberate manipulation of the minds of the people by those who are drunk with power.  Guided by the darkest stars they would cast down my Son, they would cast down the Christ consciousness, they would cast down the essential saving grace inherent within awareness of the Only Begotten of God.  The concept of the Only Begotten of God, full of grace and truth, when properly understood reveals that God has begotten only good.  No duality of good and evil came forth from His hand but only the clearly defined purest light and noblest hope for all creation.
      As it was in the time of Babel so it is today:  men in their psychological and intellectual pursuits ignore the great genius-power by which God framed the worlds, created the flexibility and marvelous tenacity of the mind and spirit of man and endowed His best servants with illimitable grace….Whereas the blessed children of men do not know their best friends, either ascended or unascenDed, those who do are also found among their condemners, denying the Christ ere the cock crows thrice.  It is not easy in this darkening hour for men and women who stand up for our cause; yet light must banish darkness and men must never lose heart or hope….
      Immerse yourselves in the sweetness of the Christ consciousness and let no one destroy in you that beauty which is the light of God that never fails.           
                                            -Archeia Mary:  Pearls of Wisdom 13:23
    …………………………………………………………………………………………....................................
    Beloved heavenly Father!  Beloved heavenly Father!  
    Beloved heavenly Father!

    Take command of our youth today
    Blaze through them opportunity’s ray
    Release perfection’s mighty power
    Amplify cosmic Intelligence each hour

    Protect, defend their God-design
    Intensify intent divine
    I AM I AM I AM the power of infinite Light
    Blazing through our youth

    Releasing cosmic proof acceptable and right
    The full power of cosmic Light
    To every child and child-man
    In America and the world!
        Beloved I AM!  Beloved I AM!  Beloved I AM!


    (Mother Mary has requested that students establish a prayer vigil for the youth by daily lighting a candle and giving the above decree—it can be given multiple times.)

    Thursday, February 22, 2018

    Now fiery destiny must be magnetized

       There have way been greedy men upon this Earth.  There have always been men who would sell their souls for a price.  There have always been blackguard in high places.  Some men do evil and know not that they do it, some men do it ignorantly and innocently.  But whereas these men whose dark deeds would destroy all beauty and freedom upon earth remain entrenched in positions of power as moguls of the worlds of finance, entertainment and politics the fact remains that they are still in the minority seeking to control the majority.
     In the great sea of humanity the Lord has sown dedicated soul who are now ready to rally to the cause of making this world free under God-dominion.  God gave man the gift of freedom within his heart:  he must nourish it and make it live in this age so that the lessons of the Prince of Peace, of the Buddha, of Mohammed and of all of the enlightened teachers of the world known or unknown can--not in a sense of competition but in a sense of completion--order the world and the life of the individual.  These lessons will show him clearly how he can find the power to overcome the dark and sordid side of human nature and become imbued with the faith, the wisdom, the wit, the joy and the surety that will be his bond on the pathway to life everlasting.      
                                                      -Saint Germain: Pearls of Wisdom 13:22
    ……………………………………………………………………….…
           Now fiery destiny must be magnetized, it must be drawn by design.  It is never enough for the human to recognize its own designs:  the divine purpose must be invoked, and when it is, simultaneously it is discovered.  Then transcendence as Law becomes the forte of the God-realized man.
      As beads on a string one by one the divine concepts are released.  The soul must be content to play hide-and-seek with God, to engage in the game of discovery.  Although the individual often desires the allness of God here and now there is a purpose in concealment--for through discovery, initiation and realization glory after glory man comes to appreciate the unfolding wonders of the divine design….
      If human perceptions were to become aware at a given moment of all that God could or would do they might mar the purity of the divine matrix with their imperfect patterns. Therefore not only out of mercy but also out of wisdom and inner strength has He kept from the carnal mind the full perception of the beautiful reality He would one day bring forth in the life of the individual.
      That which appears as duality is actually the contrast between the formed and the Unformed--between the three-dimensional world and the descent into that world of what has been called the Oversoul.  However this overseer of man’s every act teaches the realization of cosmic integration whereby every factor of cosmic Grace precipitated in form is harvested in the causal body for the benefit of the soul.  Thus the finite becomes the infinite, and in the process duality is no more….
      The perfection of the Presence of God is a reality for every man, but it can never manifest until the outer self stands aside and permits it to do so….The plan is centered around the individual, it provides for the transmutation and advancement of his consciousness.  But there is danger in bypassing the plan when one is taken up with the outer manifestation, ignoring the still small voice or the knock at the cosmic door of the heart.  The individual must learn to listen to the voice of God….But how do you know, how can you discern when they (psychic impostors) are acting?  That is the question.  

      Well, beloved ones, the truth of being is of necessity within, and its high standards are known by the soul; but if you are unable to make contact with the truth of your own being surely consultation with those who are wise in the light is in perfect order….Certainly to maintain an eagle eye of discrimination is not wrong.  If a being is of the light he will show that light when challenged.         
                                                     -Pallas Athena: Pearls of Wisdom 13:46


    Just as Antichrist attempts to usurp the throne of the living Christ in the seat of God-government in this and many nations, so it is the Great Whore that usurps the position of the Divine Mother.  Now this day she is dethroned, and the legions of our angels and legions of Archangel Michael‘s band have seized those cohorts of the fallen ones, those who actually caused what has been known as the fall of Eve and the descent of the energies of the feminine ray.  Now let them rise through the Mother! Now let those energies be restored to the children of the light as the lost inheritance usurped by those whose perversion of the Divine Mother is known as Babylon the Great.
    Behold, Babylon is fallen, is fallen, and the hosts of the LORD come forth with the defenders of the light and the great teams of conquerors and the legions of angels from the God Star, Sirius.  And there is a cordon of lightbearers defending the Divine Mother and the Mother-flame within each and every one of you and all who serve that flame with utter humility, devotion and purity.

    Who has said that purity is impossible?  I AM Purity!  I stand before you in the living presence of the Elohim!  We will not compromise the standards of the Great White Brotherhood or of the Mother-ray! Let humanity conform to purity or let them give accounting this day.  And let us see whose allegiance is on the side of cosmic virtue and the alignment of the Mother-flame for the victory of the age!           -Elohim Purity and Astrea:  5-25-1975 as San Diego via Messenger Elizabeth Clare Prophet
    ...................................