Sunday, June 30, 2019

the silver thread with Hierarchy must be felt.

a)   II, v, 1. The waves of the currents proceed spirally.  The principle of the spiral whirl is found in everything.     -Leaves of Morya's Garden 1925
……….………..………….………..……….....
b)   169.  It is better not to touch a dog guarding the gateway; if one begins to whip it, its rage will increase tenfold.       -M:  Community 1926
……….………..……….……….………..……….....
c)  275.  The fiery sed of the spirit maintains its elementary wholeness because the essence of the elements is immutable.  But emanations of the seed change with the growth of consciousness.  One should understand that the seed of the spirit is a fragment of the element of fire and the energy accumulated around it is consciousness. 
333.  It is necessary to point out the hierarchy of teachers, each of whom is the disciple of a higher teacher. One must become accustomed to the fact that the Teaching in its wholeness is without contradiction.  The landmarks may be far from one another, but they are signs on the same path.
450.  If people could grasp the wholeness of life, they would sooner learn goal-fitness and responsibility.   -M:  Agni Yoga 1929
………………….………..………. ……….………..………....
d)   183.  the concept of dissolution should be supplanted by that of transmutation.  The creative power is affirmed by the process of transmutation, and in the entire cosmos the guiding principle is transmutation.  The guiding whirl collects all cosmic fires; the guiding whirl engulfs opposing forces; the guiding whirl impels all manifestations toward goal-fitness.  Thus is the creative infinity molded!     -M:  Infinity 1, 1930
………………………….………..……….……….………..……….....
e)   125.  The new cannot be built according to conventional, prejudicial and earthly thoughts. It is necessary to remember that benefaction is issued broadly; its sparks are swept in to various hearths by a cosmic whirl. You yourselves see how unexpectedly the seeds of plants take hold. Likewise there are many classes of human differentiations.
250.  the silver thread with Hierarchy must be felt.  One should not imagine it as something abstract, it exists just like a waterspout in which heaven and earth merge.  The very formation of the silver thread is similar to a waterspout because of its spiral form.  When the energy of the heart swells with love and devotion the radiant spiral will leap out into space and, naturally, by the law of attraction will meet the Teacher's ray.
284.  The dairymaid also knows how useful is a spiral rotation, but to some this postulate will seem prejudiced.  Even if angered think of the surroundings and transfer the physical laws to your own existence!  Only thus will you survive Armageddon!  It would of course be an error to forget the application of the heart as counterbalance of all confusion.
585.  The small in spirit are constantly fearful of battle, or more correctly of that state which we call battle.  But no other word will express that state of inner struggle and success as battle does. Thus one can also find a place for the adversary as a whetstone for sharpening one's sword.      -M:  Heart 1932
………………… ………………….………..……….……….………..
f)   165.  It is inadmissible to refer lightmindedly to decomposition!  This process is transmitted like leprosy.  There can be either an increase of strength or disintegration, there can be no third condition.  One should not advise strengthening by force.  It is impossible to save anyone from leprosy by coercion.  It is impossible to keep anyone from imperil (the substancee produced by irritation) by violence.  Friendliness is not violence.  Growth of the heart comes not from a whip, and a beautiful garden can be grown only by beautiful actions.   
 -Morya:  Fiery World 1933


…………………..…………………….………..……….………. 
  Therefore I, Gautama, I who understand so much how the vision of the elementals can affect world conditions, ask you to pray to Cyclopea for the divine image and the divine vision of the
  And if you will place upon your walls and in your homes pictures of majestic beauty and of light and scenes of paradise, you will find that elementals will gather to meditate upon these focuses of light and will go forth to outpicture peace and the purification of the elements--of the seas and the earth and the air.  And with some cooperation of hearts of light there will be a cleaning up of the environment and of pollution.     -Gautama  Buddha:  4-4-1983 via Messenger of the Brotherhood E C Prophet    
all-seeing Eye of God, of the golden age and City Foursquare and Temple Beautiful to be given to every elemental.   And if you will place upon your walls and in your homes pictures of majestic beauty and of light and scenes of paradise, you will find that elementals will gather to meditate upon these focuses of light and will go forth to outpicture peace and the purification of the elements--of the seas and the earth and the air.  And with some cooperation of hearts of light there will be a cleaning up of the environment and of pollution.     -Gautama  Buddha:  4-4-1983 via Messenger of the Brotherhood E C Prophet    
..........…………………..…………………….………..……….………. ...
  O beloved, realize until the right hand of God descends, until the last grain of opportunity in the hourglass descends there is opportunity, there is dispensation abundant (as has been read to you from our prior dictations) for the world to be raised up, for all to change in the twinkling of the eye.
  Thus it is Elohim of Peace who plant their electrodes as a magnet--peace as the very defiance by Almighty God of war itself.  It is the living flame of peace in your hearts and the hearts of all those who have been converted by my appearances that shall deflect war, even as a diamond heart does deflect it and send back to the enemy, by a mirrored image, the fullness of his mal-intent.
  Blessed ones, may I tell you then the scientific explanation of the prayer of the rosary and all decrees.  Blessed ones, it is a building up of light in the body temple that you yourselves might deflect, as one mystical body of God, the oncoming darkness....
  Understand, beloved, that when We counsel the preparation those who fear most, those who are the unbelieving, those who seek to save their flesh rush in.  They will never be saved then by such preparations. These preparations must be the stem of the chalice of the Holy Grail which you uphold.
  I tell you, beloved, those who build such preparations in fear do not build on a solid foundation.  I tell you their hearts will fail them for that very fear, for it becomes an internal magnet of fear, an internal point of vulnerability.  And when the elements of the earth melt with the fervent heat of a divine alchemy their karma upon them, beloved, will take them from the screen of life even if they have all of the physical necessities.
  Look through the walls!  Look through time and space.  Desire God and only God.               -Archeia Mary:  6-11-1987 via Messenger E C Prophet
…………………..…………………….………..……….………. 

Saturday, June 29, 2019

in service of the Chinese government, or Iran

6-25-19     On Monday night researchers at Boston-based cybersecurity firm Cybereason revealed the results of tracking a years-long cyber-espionage campaign they've called Operation Soft Cell, which they say targeted the networks of at least 10 cellular providers around the world.  And while researchers' visibility into that hacking campaign is incomplete, they say it appears to be a prolific but highly targeted espionage campaign likely based in China.  In one of the 10 breaches that affected a Cybereason customer the researchers say they found that the hackers had gained deep access to the victim's network and stolen gigabytes of metadata related to 20 specific individuals' phone usage and location.
  Cybereason says that the company found no evidence that the hackers stole the actual content of communications from victims, but the firm's principal security researcher, Amit Serper, argues that the metadata alone—device and SIM identifiers, call records, and which cell tower a phone connected to at any given time—can provide a frighteningly high-resolution picture of a target's life. …
  When the researchers reconstructed the timeline of that attack they found that the spies had exploited a vulnerable web service to gain an initial foothold on the victim company's network and then used a customized version of the common tool Mimikatz to pull usernames and passwords out of target machines' memory, using those credentials and repeating the process to spread from one machine to another until they obtained domain administrator access, giving them full control of the company's network.  "At that point, they became the shadow IT department," Serper says.
  Eventually the hackers even installed their own VPN system on the network so that they could enter at will over an encrypted connection.  Cybereason says that the spies ultimately accessed a "call detail record" or CDR database, encrypting and stealing data related to 20 specific individuals they had chosen to track….
  Cybereason believes the hackers behind the cellular provider incident are likely working in service of the Chinese government.  In the process of their espionage campaign the intruders used a set of tools that Cybereason and others associate with Chinese state spies, including a web-shell called China Chopper, the Poison Ivy remote-access trojan, and the scanning tool nbtscan.  Despite the hackers' broad targeting, they didn't seem to target any victims in mainland China.  And the apparent focus on infrastructure-targeted spying also fits with the tactics of Chinese hackers, who have compromised everything from cloud service providers to software supply chains for the purpose of stealthy espionage.
Stealing metadata, Serper says, is hardly an unprecedented trick for intelligence agencies.  But he says that 10 cellular providers targeted in the same operation is more rare.  "We know how intelligence services operate, and it’s not something we haven’t seen before," Serper says.  "But we haven’t seen this scale."
  Analysts at security firms Crowdstrike and FireEye say they couldn't confirm Cybereason's findings, but the two firms noted that they have in fact seen broad targeting of cellular providers including by Russian and Iranian state-sponsored hackers, both for tracking individuals and for bypassing two-factor authentication, intercepting the SMS messages sent to phones as a one-time passcode.  "I wouldn’t be surprised to learn that a Chinese actor has targeted 10 telecom providers," says John Hultquist, who leads threat intelligence at FireEye.  "They're moving toward the backbone, hitting providers with access to a lot of data instead of going after targets in onesies and twosies.  They gain a higher level of access and limit their exposure."    https://www.wired.com/story/chinese-hackers-carrier-metadata/
.........................................................
11-28-18  charged with extorting millions of dollars through them--the two addresses belonged to Faramarz Shahi Savandi and  

Mohammad Mehdi Shah Mansouri (shown) who allegedly created the SamSam ransomware software.  The Justice Department unsealed an indictment against both men today, alleging that they collected $6 million by targeting more than 200 victims--including the cities of Atlanta, Georgia, and Newark, New Jersey.
  SamSam began infecting computers in 2015, and it’s been linked to expensive and temporarily devastating attacks on hospitals and infrastructure .  Like other ransomware, SamSam encrypted users’ machines and ordered them to funnel money — sometimes tens of thousands of dollars--to a bitcoin account.  The Treasury Department says the two accounts above processed over 7,000 transactions although not all were necessarily related to SamSam.
  In a press conference US Attorney Craig Carpenito told reporters that Savandi and Mansouri “worked hard to identify the most vulnerable targets that they could….Money is not their sole objective,” he claimed.  “They’re seeking to harm our institutions and critical infrastructure.  They’re trying to impact our way of life.”
  One of Savandi and Mansouri’s most high-profile alleged crimes was an attack on Atlanta in March 2018.  Major basic municipal functions were affected, including the ability to pay water bills or parking tickets, although Atlanta’s emergency services remained functional.  Altogether the Justice Department lists attacks in 43 US states.
.........................................................................................
Mansouri is an Iranian male with a date of birth of September 24, 1991.  He has brown hair and brown eyes and was born in Qom, Iran.  https://www.fbi.gov/wanted/cyber/samsam-subjects
............................................................................................
3-6-19   Cyberattacks linked to Iranian hackers have targeted thousands of people at more than 200 companies over the past two years, MicrosoftCorp. said, part of a wave of computer intrusions from the country that researchers say has hit businesses and government entities around the globe. 
  The campaign, the scope of which hadn’t previously been reported, stole corporate secrets and wiped data from computers.  It caused damages estimated at hundreds of millions of dollars in lost productivity and affected oil-and-gas companies, heavy-machinery manufacturers and international conglomerates in more than a half-dozen countries including Saudi Arabia, Germany, the U.K., India and the U.S., according to researchers at Microsoft, which deployed incident-response teams to some of the affected companies.  “These destructive attacks…are massively destabilizing events,” said John Lambert, the head of Microsoft’s Threat Intelligence Center.
  Microsoft traced the attacks to a group it calls Holmium. It is one of several linked by other researchers over the past year to hackers in Iran, a country that many security researchers say aspires to join Russia and China as one of the world’s premier cyber powers.  Some of Holmium’s hacking was done by a group that other security companies call APT33, Microsoft said.  Iran “denies any involvement in cyber crimes against any nation,” said a spokesman for Iran’s mission to the United Nations in an email.   https://www.wsj.com/articles/iranian-hackers-have-hit-hundreds-of-companies-in-past-two-years-11551906036
…..............…..............…..............

massive hightech transfer to China--big effort to keep it secret

  •   Apple is moving Mac Pro assembly out of the U.S. and into China, CNBC confirms Friday.  Apple is assembling its new Mac Pro models in China, shifting production from the U.S. where its older models were assembled, CNBC confirmed Friday following a report in The Wall Street Journal.  Apple introduced the new Mac Pro earlier this month. ... But the assembly shift for the Mac Pro from the U.S. to China will help reduce shipping costs, according to the WS Journal.  The Shanghai factory where it will be assembled is closer to Apple’s other suppliers in Asia, the Journal reported.  Apple is working with contractor Quanta Computer to assemble the new $6,000 desktop, CNBC confirmed.  While the assembly will take place in China, Apple said the device is designed and engineered in the U.S. and includes U.S.-made components.   https://www.cnbc.com/2019/06/28/apple-moves-mac-pro-production-from-the-us-to-china.html?__source=twitter%7Ctech
  • ...............................................................
  • 6-26-2019, London
  •   Teams of Chinese hackers penetrated the cloud computing service of Hewlett Packard Enterprise (HPE) and used it a launchpad to attack customers, plundering reams of corporate and government secrets for years, Reuters has found.... Reuters interviewed 30 people involved in the Cloud Hopper investigations, including Western government officials, current and former company executives and private security researchers. Reporters also reviewed hundreds of pages of internal company documents, court filings and corporate intelligence briefings.  HPE “worked diligently for our customers to mitigate this attack and protect their information,” said spokesman Adam Bauer.  “We remain vigilant in our efforts to protect against the evolving threats of cyber-crimes committed by state actors.”
  •   A spokesman for DXC, the services-arm spun off by HPE in 2017, said the company put “robust security measures in place” to protect itself and customers. “Since the inception of DXC Technology neither the company nor any DXC customer whose environment is under our control have experienced a material impact caused by APT10 or any other threat actor,” the spokesman said.
      NTT Data, Dimension Data, Tata Consultancy Services, Fujitsu and IBM declined to comment. IBM has previously said it has no evidence sensitive corporate data was compromised by the attacks.
      The Chinese government has denied all accusations of involvement in hacking.  The Chinese Foreign Ministry said Beijing opposed cyber-enabled industrial espionage. “The Chinese government has never in any form participated in or supported any person to carry out the theft of commercial secrets,” it said in a statement to Reuters.
      For security staff at Hewlett Packard Enterprise, the Ericsson situation was just one dark cloud in a gathering storm, according to internal documents and 10 people with knowledge of the matter.
      For years the company’s predecessor, technology giant Hewlett Packard, didn’t even know it had been hacked.  It first found malicious code stored on a company server in 2012.  The company called in outside experts who found infections dating to at least January 2010.
    Hewlett Packard security staff fought back, tracking the intruders, shoring up defenses and executing a carefully planned expulsion to simultaneously knock out all of the hackers’ known footholds.  But the attackers returned, beginning a cycle that continued for at least five years.
      The intruders stayed a step ahead.  They would grab reams of data before planned eviction efforts by HP engineers.  Repeatedly they took whole directories of credentials, a brazen act netting them the ability to impersonate hundreds of employees.  The hackers knew exactly where to retrieve the most sensitive data....
      Ericsson said it does not comment on specific cybersecurity incidents. “Our priority is always to ensure that our customers are protected,” a spokesman said.  “While there have been attacks on our enterprise network, we have found no evidence in any of our extensive investigations that Ericsson’s infrastructure has ever been used as part of a successful attack on one of our customers.”
      A spokesman for SKF said: "We are aware of the breach that took place in conjunction with the ‘Cloud Hopper’ attack against HPE … Our investigations into the breach have not found that any commercially sensitive information was accessed."  Syngenta and Valmet declined to comment. A spokesman for Vale declined to comment on specific questions about the attacks but said the company adopts “the best practices in the industry” to improve network security.
      The companies were battling a skilled adversary, said Rob Joyce, a senior adviser to the U.S. National Security Agency.  The hacking was “high leverage and hard to defend against,” he said.
      According to Western officials, the attackers were multiple Chinese government-backed hacking groups.  The most feared was known as APT10 and directed by the Ministry of State Security, U.S. prosecutors say.  National security experts say the Chinese intelligence service is comparable to the U.S. Central Intelligence Agency, capable of pursuing both electronic and human spying operations.
      Two of APT10’s alleged members, Zhu Hua and Zhang Shilong, were indicted in December by the United States on charges of conspiracy to commit computer intrusions, wire fraud and aggravated identity theft.  In the unlikely event they are ever extradited and convicted, the two men would face up to 27 years in an American jail.
      Reuters was unable to reach Zhu, Zhang or lawyers representing the men for comment. China’s Foreign Ministry said the charges were “warrantless accusations” and it urged the United States to “withdraw the so-called lawsuits against Chinese personnel, so as to avoid causing serious harm to bilateral relations.”  
      The U.S. Justice Department called the Chinese denials “ritualistic and bogus.”  “The Chinese Government uses its own intelligence services to conduct this activity and refuses to cooperate with any investigation into thefts of intellectual property emanating from its companies or its citizens,” DOJ Assistant Attorney General John Demers told Reuters....
      HP management only grudgingly allowed its own defenders the investigation access they needed and cautioned against telling Sabre everything, the former employees said.  “Limiting knowledge to the customer was key,” one said.  “It was incredibly frustrating. We had all these skills and capabilities to bring to bear, and we were just not allowed to do that.”...
      In early 2017 HPE analysts saw evidence that Huntington Ingalls Industries, a significant client and the largest U.S. military shipbuilder, had been penetrated by the Chinese hackers, two sources said. Computer systems owned by a subsidiary of Huntington Ingalls were connecting to a foreign server controlled by APT10.

     
      It’s not clear if data was stolen....During a private briefing with HPE staff, Huntington Ingalls executives voiced concern the hackers could have accessed data from its biggest operation, the Newport News, Va. shipyard where it builds nuclear-powered submarines, said a person familiar with the discussions. ...
      “The reality is that most organizations are facing cybersecurity challenges on a daily basis, including Ericsson,” Ericsson Chief Security Officer Pär Gunnarsson said in a statement to Reuters, declining to discuss specific incidents.  “In our industry, and across industries, we would all benefit from a higher degree of transparency on these issues.”
      In December 2018, after struggling to contain the threat for years, the U.S. government named the hackers from APT10 – Advanced Persistent Threat 10 – as agents of China’s Ministry of State Security.  The public attribution garnered widespread international support: Germany, New Zealand, Canada, Britain, Australia and other allies all issued statements backing the U.S. allegations against China.
      Even so, much of Cloud Hopper’s activity has been deliberately kept from public view, often at the urging of corporate victims.
      In an effort to keep information under wraps, security staff at the affected managed service providers were often barred from speaking even to other employees not specifically added to the inquiries.
      In 2016, HPE’s office of general counsel for global functions issued a memo about an investigation codenamed White Wolf.  “Preserving confidentiality of this project and associated activity is critical,” the memo warned, stating without elaboration that the effort “is a sensitive matter.”  Outside the project, it said, “do not share any information about White Wolf, its effect on HPE, or the activities HPE is taking.”
      The secrecy was not unique to HPE.  Even when the government alerted technology service providers, the companies would not always pass on warnings to clients, Jeanette Manfra, a senior cybersecurity official with the U.S. Department of Homeland Security, told Reuters....
      One nightmare situation involved client Sabre Corp, which provides reservation systems for tens of thousands of hotels around the world.  It also has a comprehensive system for booking air travel, working with hundreds of airlines and 1,500 airports. 
      A thorough penetration at Sabre could have exposed a goldmine of information, investigators said, if China was able to track where corporate executives or U.S. government officials were traveling.  That would open the door to in-person approaches, physical surveillance or attempts at installing digital tracking tools on their devices. 
      In 2015, investigators found that at least four HP machines dedicated to Sabre were tunneling large amounts of data to an external server.  The Sabre breach was long-running and intractable, said two former HPE employees.   https://www.reuters.com/article/us-china-cyber-cloudhopper-special-repor/special-report-inside-the-wests-failed-fight-against-chinas-cloud-hopper-hackers-idUSKCN1TR1DK
    .......................

Friday, June 28, 2019

Therefore I come and we come together as one to see to it

1)   Only you, sons of the Most High God, can change the world as alchemists of the sacred fire!  You are on stage. It is your opportunity.  Without you and your Christhood and your call and the spoken Word unto the violet flame you must understand that nothing will change and what the psychics have seen may very well come to pass.
  I therefore call, in the name of Jesus Christ, for the multiplication of these loaves and fishes, these sons and daughters of God--that as each one represents a pillar of fire, students of light across the world might tie into that momentum, might receive our book The Science of the Spoken Word, and begin immediately to recite the mantras of the free.       
(by Sindelar, 1930s)
           -Saint Germain: December 5, 1982 via Messenger E C Prophet 

…………………………………………………………..…................................
2)   But We advise you, beloved, that We desire to form a real and living molecule of a Sun-Presence of the first ray and to do so at the Inner Retreat where the land is vast enough to contain the  energy that We would anchor into the Earth.    
            -Elohim Hercules:  12-30-1985 at Camelot, Los Angeles  
……………………………………………………..………...........................
3)   When the mind becomes enfeebled as a matrix, when it does not pulsate with the action of the second ray then you can understand that by the very disintegratedness of the molecules and electrons there does take place a consciousness of dependence, depression, old age and death—minds enfeebled without an activating light of the white sphere and the yellow sphere are indeed prey to World Communism and to socialism.
  Understand the plight of this evolution and therefore understand the cure. There is not the interdependency within the heart and its chamber, within the threefold flame. There is not then a fulcrum in the heart and a balance of the base and the crown chakras.
  The individual does note that he is not sufficient unto himself or unto his God. Those things that he desires he cannot acquire, for he does not have the light of Alpha and Omega in his temple. Therefore, beloved, the creature takes on the animal instinct, self-preservation at any cost.
  And therefore, looking upon those who have amalgamated power among the fallen angels or upon those who have accumulated light among the sons of God, these ones who are empty (for in them the light has gone out) cry out “Injustice!” and they demand to be fed and clothed and tended, educated, entertained, given birth to and buried by the state or other organizations of charity.   
 (by R. Hawkinss)
-Mother Mary and Archangel Raphael:  July 5, 1987 at Royal Teton Ranch via Messenger E C Prophet
………………………………………………………
4)   My prediction then, given coming events, given your own karma is that the only way out of the dilemma of the human equation is to act now.   Hear me, beloved!  I have never been more in earnest.  I have cried unto the Lord for you.  And God's emissaries have brought abundant light and Teaching.
  Hear me, beloved!  For even my plea is a measured one.  For the Father has said to me 'How many times will you plead for their own cause of eternal Life, my Son?'  Therefore the Law and the dispensation of karma does allow it, but not forever.
  Therefore hear my cry to your soul!  Hear my cry to pick yourself up, to wax hot in your devotion and fervor, to know the inner life, to desire to feel the flow of sacred fire in your being and to desire this until by your very imploring, as in the parable of the unjust judge, so God does respond.
  For the soul that does trouble the Lord does truly receive her recompense.  If your desiring is sincere and you implore God daily, I tell you, beloved, the Father will not withhold from you every test and initiation, every teaching and interior correction, every leading you require to the fount of knowledge, even Gnosis,  even my own Lost Teachings.   
-Jesus Christ:  November 1,1987 at Royal Teton Ranch via Messenger E C Prophet
……………………..…………………………………….................
5)  We therefore call to each and every one of you and those who are the creative sons and daughters of God to put your hearts together, to know and to understand how there might be executed a proliferation of the Word and of the Warning and of the Message that has gone forth.
  Let it be so then by the release (through the use of such supply as is available to you) of this message that comes from the heart of Saint Germain, that has been shouted from the housetops, delivered by the Messenger and by yourselves wherever you might be received.  Let it go forth then, for the people of the Earth must have the warning as they had that warning in the days of Noah, and Noah did preach one hundred years.  
(by Hawkins, ~1985)
-Sanat Kumara:  January 2, 1988 at Royal Teton Ranch via Messenger E C Prophet 
……………………..………………………………………
 6)   Therefore I come and we come together as one to see to it that the Christ of woman is raised up, which is to say, the Christ of the soul, the feminine counterpart of [the Spirit of the I AM in] male and female.  It is the hour then when woman must be honored as being the temple of the living Christ, when your souls must be elevated and no longer subjugated to the condemnations of centuries.   
(by Sindelar, 1930s)
                                        Jesus Christ:  November 22, 1990 viMessenger E C Prophet 
……………………………………………………..........................
7)  The goal is to be in advance of prophecy and in advance of astrology.  What does that mean?  It means that you need to decree for the transmutation of the negative astrological portents before they are about to land on your head!  You need to get a running momentum on the (any challenging aspect) ..before it precipitates out of the etheric, the mental and astral planes into the physical.  By so doing you can transmute a large percentage of the personal and planetary portents of negative karma that' . . . (any challenging aspect)...is dumping on the Earth and her evolutions.  By decreeing in advance you literally turn the avalanche of karma back up the mountain.    
                                 -Elizabeth C. Prophet:  July 4, 1993 at Royal Teton Ranch
……………………..………………..……………….......................…..
8)   Blessed ones, the greatest calamity that could come to planet earth is this: that the nations of the earth would become so caught up in money and trade that they would lose all religion and live for the good life and for economic prosperity instead of for the prosperity of the soul.    -:  
Gautama Buddha:  5-4-1995 at Royal Teton Ranch via Messenger E C Prophet 
…………………..………………..……………………..…
9)   We have spoken of conditions in the economy, conditions in the governments of the nations and around the world.   Let us decree on these conditions this evening while we are yet about our service in this violet-flame marathon.  Yes, it is important that you know how intense is the warfare of the spirit within and how intense are the moves that could be made by those who have been the enemies of freedom for aeons.     
(by Bessemer, ~1971)
John the Beloved  3-30-1997 at Royal Teton Ranch via Messenger E C Prophet 
-

……………..………………..………………………………………….

Thursday, June 27, 2019

Hikvision in top three most favoured A-shares.

6-25-19   new report by NGO Human Rights Watch (HRW) has now revealed how a mobile app used by these officials helps them collect vast amounts of personal data and prompts them to flag seemingly normal behaviour as suspicious.  The app, designed by subsidiaries of a state-owned military contractor called China Electronics Technology Group Corporation according to procurement documents, was accessed by HRW when it became publicly available...Once HRW had access to the app they were able to reverse-engineer it.  This process revealed that it is designed to help officials fulfill three broad functions:  collecting personal information, reporting on activities deemed suspicious, and prompting investigations of people the system flags as problematic.
  The HRW report details how the app presents officials with a series of drop-down menus.  The information collected about individuals is wide-ranging, including blood-type, height, car colour, ‘religious atmosphere’ and political affiliation.  This information is fed into a policing programme called the Integrated Joint Operations Platform  (IJOP), one of the main systems Chinese authorities use for mass surveillance in Xinjiang....
  The HRW report notes that many, if not all of these mass surveillance practices appear to be contrary to Chinese law.  It also states that ‘many - if not most - behaviors the IJOP system pays special attention to have no clear relationship to terrorism or extremism’.  Wang explains that while this accords with current understanding of the situation in Xinjiang, it provides an unprecedented insight into how the system actually works.  ‘It reveals a contrast to the authorities’ narrative--this is about targeted surveillance,’ she says.  The report goes on to state that information fed into the IJOP system, via the app and other means of surveillance, can lead to internment in Xinjiang’s prisons and political education camps, while other people are subjected to house arrest or face restrictions on their movement. http://geographical.co.uk/geopolitics/item/3228-surveillance-state
........................................................................
6-1-19  Hikvision, the world’s biggest surveillance company and a once-popular target for foreign investors in China, supplies systems to detention camps in Xinjiang where an estimated 1m Uighurs are detained, according to human rights groups.  Amnesty International has alleged the Chinese government is engaged in “a campaign of mass internment, intrusive surveillance, political indoctrination and forced cultural assimilation”....
  But Candriam’s €458m emerging market fund, which is branded as a socially responsible investment strategy, acquired an initial stake in Hikvision between November and March, according to the latest public filings analysed by Copley Fund Research, a consultancy. Candriam said that 0.76 per cent of its fund was invested in Hikvision....
  Candriam said concern over the use of surveillance technology was not specific to Hikvision, noting that there were “fundamental questions on its use by all governments-- not only China”.  Candriam said it would engage with companies including Hikvision on the topic of the ethics of facial-recognition technology this year....
  Candriam said it had taken the US government’s criticisms of Hikvision into account in the human rights analysis it undertook but that this “did not lead to the company’s exclusion.  For a company to be excluded, strong evidence of repeated, significant and systematic violations of international standards and principles needs to be displayed,” it said.  “Hikvision was not involved in any controversy until now.”  (Only for several years, only involving millions of people.)...
  Candriam’s fund is not the only ESG fund to buy Hikvision stock.  The $3.8bn Vontobel MTX Sustainable EM Leaders fund bought into the company in 2017, and around 0.88 per cent of its assets were invested at the end of March. However, the fund sold out of Hikvision last month, Vontobel said.  Another fund manager who sold out of Hikvision earlier this year told the Financial Times that investors were turning a blind eye to Xinjiang’s detention camps because the booming surveillance industry in China promised strong returns.  “A lot of investors talk about ethical investing but when it comes to Hikvision and Xinjiang they are happy to fill their boots,” said the fund manager.  “It is pretty hypocritical.”...
  Hikvision was among a cohort of companies added by MSCI to its benchmark emerging markets index last year and has been a popular investment for foreign funds seeking exposure to China ever since.  A fifth of about 189 of the world’s largest emerging market funds held Hikvision stock last November, according to Copley, placing the company in the top three most favoured A-shares.
https://www.ft.com/content/3ea09c51-0354-33a3-9a2f-4292b2d30c59

One should not like a pig keep one's eyes directed only toward the ground.

a)  229.  But where the flowers of unity are—guard their petals.  Yes, yes, yes!
357.  Can the tree stand firm?  Yes, yes, yes—f the roots are deeply buried and unseen in the ground.
424.  Thus do not impose the Teaching.  Each word falls on appropriate ground.  The destined word will be received.  Likewise do not reject nor deny.
-Leaves of Morya's Garden 1924
………………………….………………………..................................…..
b)   II, vi, 19.  And the Teacher not only nodded but bowed to the ground, and, opening his garment at the breast, revealed upon his bosom the image of the Blessed One bestowing with both hands.
III, i, 7.  One can compare the essence of the Teaching with the exigency of certain moments of battle.  I will not conceal from you that after a success dark rumors always leak through, and one should allow time for the dark missiles to fly by, especially when the fortress has been marked upon the enemy's map….he who has patience will be able to lay future foundations.  When we sit in silence the bond becomes stronger.
III, vi, 12.  A  good horseman likes to practice upon untrained horses and prefers the obstacle of rough ground and ditches to a level roadway.  Every impediment must be made the birth of a possibility. Disconcertion before an obstacle always emanates from fear.  No matter how the cowardice be garbed We must reveal the page about fear.  Friends, until impediments appear to us as the birth of possibilities we will not understand the Teaching.    -Leaves of Morya's Garden 1925
………………………………………………………................................…..
c)   149.  If a victory of consciousness be not consolidated precisely, then instead of an even light the consciousness will become filled with sharp, painful sparks.  As in all life it is necessary to understand the moment of assimilation….Through inexperience people often begin to be alarmed by a temporary silence of consciousness, but such a consolidation leads to the next leap.  During such a period of assimilation of consciousness do not disturb it with problems.  The butterfly is making ready new multicolored wings—do not harm the cocoon.
196.  Manifestations must be accepted in full reality. For materialists this condition is especially obligatory. But indeed materialists more than others tint various manifestations with their own color, thus impeding the evolutionary process.  We as experienced Builders, realists, can see the harm of intolerance based on coarsest ignorance.  Where then is reality when thinking is constrained?  Instead of a thousand formulas only five are known!  Affirmation becomes distortion if beforehand a stereotype of conventionalities has been forged.  The smile of knowledge breaks open the floodgate of deliberate obstruction.    -M:  Community 1926
…………………………………………………………..
d)   18.  The difference is that Zeus in creating a cosmic storm fills space with ozone, whereas your earthly Zeus, creator of wrath, fills the sphere with suffocating smoke.  In this the lowest and the highest do not meet.
-M:  Infinity 1, 1930
 …………………………………………………………….....................
e)   369.  One should understand that spiritual energy is the element of cosmic Fire which moves life and imbues all vital manifestations.  The power of knowledge of highest energies is the key to Be-ness.    -M:  Hierarchy 1931
…………………………………………………………........................................……
f)   485.  During the Great Battle one must be very much on one's guard.  The chief consideration will be the conviction that behind one is the threat of wavering which begets treason.  One should recall how gradually We revealed the heart-qualities and prepared you for great actions.  One must forever remember that Our indications are not abstract.  One must also understand that Yoga is given in time.        -M:  Heart 1932
………………………………………………………………….…......................
g)   365.  The Greek philosophers knew these shackled souls.  They understood how limitedly man can act when he has been left on a small bit of ground.  He is like a stork on one leg!  Such conflicts would be difficult for a stork who knows his nest in a certain tree and stands on one leg.  But the knowledge of Fire demands two legs, in other words, two natures.  
399.  A sleeping heart cannot be forced toward good. One can point out, one can set milestones, but to break the consciousness means to kill the root of the future tree.  Millions of years may seem long, but neither years nor centuries exist.  People have divided existence into seconds and have drowned themselves in zeros….
  The Teaching gives the precise direction and kindles the fires along the entire path of labor.  One can proceed by these beacons.  One may find solutions already cosmically ripe.   One may hear exact things, but the spirit must by its own will combine them into a mosaic.  To affirm the path is the Ordainment of the Great Architect.  As in legends we must put our ears to the ground lest we miss a single step or whisper.  Though people read much they apply but little.
473.  It must be understood that earthly eyes cannot bear the supreme radiance, therefore We prepare them for the fiery world by sparks and lights.  One should not like a pig keep one's eyes directed only toward the ground.       -M:  Fiery World 1933
……………………………………………….............................................
h)   584.  A disciple asked his Teacher "Tell me, how shall I apply the Teaching in life?”  The Teacher advised him "To begin with, become kinder.  Do not consider good as a supernatural gift; let it be the foundation of your hearth; upon it build your fire and on such a ground the flame will not be scorching."       -M:  Aum 1936 
………………………………………………….............................................…
i)   203.  It would seem necessary to esteem everything which can strengthen the primary energy.  It was said long ago that egoism is extinguished by Fire.  As long as they are not conscious of fiery baptism people will think about themselves only; and as long as the most powerful element is not understood the very concept of Brotherhood will be a barren skeleton.
392.  It is not fitting for man to doom himself to calamities.  Long-sown wails and groans turn into a ruinous vortex.
433.  Goal-fitness has been excellently developed in all the kingdoms of nature….People usually limit themselves to quests of known places; they forget that life passes along the most unexpected paths, and its traces can be found unostensibly and unexpectedly.         -M:  Brotherhood 1937
 …………………………………………………..................................................
j)   112.  In the Great Service there must be an invincible constancy in the realization of righteousness.  People lose their strength when they lose their sense of righteousness, and how can one advance if one's feet do not feel the firm ground?  The spirit must lean upon the solidity of consciousness.
233.  The Thinker said "Once upon a time a great leader delivered a brilliant speech, and when he had finished he began to look for something on the ground.  A simple silver ring had fallen from his finger.  People smiled and suggested that he cease looking for an object of such insignificance and little value, but the leader said 'You do not know the origin of this ring.  Perhaps the whole speech was delivered on its account.’"     
   -Morya:  Supermundane 1, 1930  


…………………..…

Wednesday, June 26, 2019

ground, ground-level--

ground, ground-level in equipoise--
simple, calm, quiet, receptive, plain, straightforward, firm, basic, tempering, patient.

Rakoczy Castle, Transylvania