Archive for the 'Strange' Category
This article smells very bad. Lets take a sniff…
Al-Qaeda group’s encryption software stronger, security firm confirms
By Ellen Messmer
Shame on you for propagating this nonsense.
Al-Qaeda support group Al-Ekhlaas has improved the encryption software it now provides to its online members, according to one security researcher who examined the software, known as “Mujahideen Secrets 2.”
Al-Qaeda support group, also known as ‘NSA’.
Anyone who is smart enough to know how to write an encryption algorithm and a package to deliver its functionality, and who is responsible for keeping people secure, knows that it is far better to use an off the shelf set of tools rather than build your own application and algorithm from scratch.
If ‘Al-Qaeda’ was real, and someone in their group knew about encryption, all they would need to do is settle on standard tools to keep their communications secure; they would never risk, or waste time trying to create from scratch, using their own proprietary system.
Mujahideen Secrets 2 has added the ability to encrypt chat communications, which the first version lacked, says Paul Henry, vice president of technology evangelism at Secure Computing. Henry says he got the software through a contact in the intelligence community.
OH REALLY??!?!? a contact in the ‘intelligence community’???!!!!
It is OBVIOUS to even the most casual observer that the way to infiltrate a group like this, that is paranoid about security, would be to infiltrate them and then provide them with a ‘secure’ way of chatting that logs all of their communications. You could do this even if the clients were secure; all you would need to do is control the chat server.
I assure you that all of the people, even those that are casually interested in cryptography understand this. They would immediately recommend open source publicly available tools to do this job. For example, if you want to have one to one encrypted chat, you use Adium. If you want encrypted email, you use GNU Privacy Guard. If you want to shred files, manage keys, recipient keys, encrypt attachments and files there is no better tool than Enigmail. Any tool that is not peer reviewed cannot be trusted. This tool, by its very nature, is untrustworthy; this whole story doesn’t sound right.
The home-grown Mujahideen Secrets 2 encryption software, based on open source RSA code, can encrypt binary files so they can be posted on ASCII-text-based bulletin boards and Web sites.
‘Pics or it didn’t happen’. Without looking at the source of this programme, it is impossible to say how good this software is, and once again, there are other, better more secure tools to do this.
Lets think about the sentence above. If you are going to post an encrypted binary on an ascii bulletin board, you need to encrypt it to the members of that board, using the private key of each member. If you cannot control who is on your board, i.e. you have a single infiltrator, your enemy will have access to the file and the list of recipients. The whole point of posting files on a board is to distribute them widely, and so you do not want to encrypt them in this way; if you want to send encrypted binaries to multiple people, you send the file by email, encrypting the file for each recipient individually. Once they get on your board in the scenario provided by this ‘journalist’, your enemy can get a hold of the file, at any time after it was posted, and then list the keys needed to decrypt the file, giving a list of all the nicknames of the recipients of the file. Sending
“They have improved the operation of the graphical user interface and it will now encrypt chat communications,” says Henry, who adds that the Arabic translation suggests the software is encouraged for use by Al-Ekhlaas members to evade U.S. government efforts at surveillance.
This sentence is the exact OPPOSITE of what the truth is; it is software encouraged by U.S. government to aid its efforts at surveillance of Al-Ekhlaas.
Tampa-based ISP NOC4Hosts and Rochester, Minn.,-based SiteGenesis in January found out their operations were being used to host the Al-Ekhlaas Web sites where Mujahideen Secrets 2 can be found. Both hosting firms pulled the plug on the Web sites after receiving specific technical information about the content.
This week another Web hosting company, CrystalTech Web Hosting in Phoenix, shut down sites linked to the Al Qaeda-link support group.
Once again, these people could, if they were real, host their websites anywhere in the world. They would not host thier sites in Minnesota or Pheonix. This is just utter nonsense of the first order, and those sites were most probably ‘honey pots’ set up to get this Back Orifice ‘Jihad Edition’ into the hands of dweebs that want to help the CIA operaton ‘Al-Qaeda’ who they will then use as patsies to carry out false flag attacks, all under the guise of ‘Radical Islamo Facscism’.
“As soon as we found out, we brought the IP sites down,” says Bob Cichon, president of CrystalTech Web hosting, who blamed a reseller for it happening. “We’re a very large host and it’s hard to track everything.”
Its not your fault Bob.
In its analysis of Mujahideen Secrets 2, Secure Computing has noticed that the software appears to violate copyright law.
“Typically with open source, they still require a copyright notification,” Henry says. “There’s no copyright notification whatsoever here.”
So, the latest supercrime of Radical Islamo Facscists is not blowing up buildings and making them fall in defiance of the laws of physics, NO, we can prosecute them for violating the GPL.
Another notable thing is that the public-key signature in Mujahideen Secrets 2 leaves a tell-tale sign that the Al-Ekhlaas home-rolled software produced it. The encryption itself is strong at up to a 2,048-bit key length, and like the previous version, provides e-mail and file encryption using public-key certificates.
All contents copyright 1995-2008 Network World, Inc
Once again, if any of this is even true, there are only a handful of people who are capable of understanding how to best fulfill the requirements of encrypting chat and instant messaging, and then the subset of people who can actually pull this off in a software client is even smaller. No one in their right mind would do this in a ‘home-rolled’ package…unless your home is the NSA.
Everything that this journalist claims could be done with off the shelf packages, and in fact, it would be safer to do it with off the shelf packages.
Lets say that the above report is true, and these packages are out there. The only way you can know that the package has not been tampered with is if you can check the signature against it. GPG does this so that you know that you are getting an un-tampered with binary or source. Publicly available tools give you a high level of confidence that your communications will not be susceptible to a ‘man in the middle attack‘. By settling on those tools, rather than rolling your own, you get a higher level of trust. And everyone who understands how this works knows that.
Rolling out your own tools, from whatever angle you look at it, is insane. It is clear that this whole story is a glimpse into some secret operation to recruit patsie jihadies. In that respect, it is fascinating.
What will be even more interesting is to read a report from a trusted peer, who would, amongst other things, run a packet sniffer to see if and where this sneaky piece of infiltration-ware phones home.
Is this a warm up article for another attempt to crack down on freely available encryption tools?
This afternoon, we went up to Notting Hill for a late lunch.
Sitting to the right of us was a softly spoken american couple. Many americans in London have loud voices where the letter ‘R’ is brutally over pronounced and the work ‘like’ is used liberally and inappropriately. These two were not of that type. The female was reading a Sunday Tabloid paper, and spontaneously started tutting loudly.
“Thats why I don’t read newspapers in the UK”.
“Oh! I know, they are so TERRIBLE!”
Then it came to, via a circuitous route, to the 2008 election.
They did not know who Ron Paul Was.
It transpired that these two people are using ‘The Undecided Voter’s Guide to the Next President: Who the Candidates Are, Where They Come from, and How You Can Choose‘. as their method of deciding who to vote for.
They did not know that america is borrowing money from China to run the war in Iraq.
I told them that it would be useful for their decision making process to look up Ron Paul on the internets.
The man sitting to our right said that he is supporting John McCain, because, “He (John McCain) is against the earmarks and pork spending of Washington.”
I pointed out that John McCain wants to keep troops in Iraq for 100 years. I also pointed out again that america doesn’t have the money to pay for this, and that america is borrowing money from China to run this ‘war’.
“Even if you agree with John McCain in principle, who is going to pay for this adventure?”, said I.
He said, “america needs to keep troops all over the world. The Soviet Union fell because of those troops, and they help spread democracy. I’ll pay for it.”, said the man.
And we petty much left it at that.
This is the level of insanity and pure ignorance that the american public is operating at, and these people were not the lowest common denominator, but very educated, well spoken types.
Then the female came out with, “what is the central part of Ron Paul’s platform?”.
“Obey the Constitution, small government, no nation building, don’t be the policeman of the world. You can see him talking about this all over the internet, and when you read up about him and his background you will see that he is not like any other candidate”, I replied.
“Does that mean he is for americans being able to own guns, because if he follows the constitution, that means he is for guns, and I am against guns”.
I’m not making any of this up.
This is a person who has just been told that america is about to go bankrupt, there is a dream candidate whose voting record is perfect, who wants to end the insane wars and hatred that is (rightfully) tilted against america, that america is borrowing from China to run its wars….and she is concerned about GUN OWNERSHIP.
That is like a rat being concerned about finding a warm place to sleep on the Titanic.
They both promised that they would ‘Google Ron Paul’, being intrigued as to why it was that they had not heard or read about a man who has just won second place in the Nevada caucus.
Once thing is for certain; american international adventurism is over. The question now is how is it going to end. The idiots who still believe in the lies and false reasoning of the type that John McCain spouts are going to get a nasty wake up call in the future if they do not wake up right now. In any case, the world is a much bigger place than the usa; there are more genius level people in China than there are people in the usa and there are more people learning English in China than the entire population of the US. The world will go ahead without america; she will become a dream, a thing of the past, with only a flag on the moon to remember her by…and that will be plucked out of the lunar soil by Chinese lunar colonists.
People like this charming couple have a choice. They either wake up and hunker down, or have america subsumed after a disastrous crash the likes of which they have not got the brains to imagine.
All of this in around ten minutes.
What a life!
Ladies and gentlemen…
This is a REAL jacket that is being seen in all the big cities.
It’s like something straight out of a 2000AD street scene….astonishing; true dystopian fashion, sci-fi reality leaking into now…or has ‘the future’ arrived? If so, then what on earth comes next?
And let’s not forget that wearing a mask in public is illegal in some countries; how long do you think it will be before some jackass somewhere calls for these hoodies to be outlawed?
Whilst trawling around for a suitable image to vividly demonstrate this hoodie in a sci-fi context, I cam across this astonishing image:
I do believe that is a photo of Patti Smith, next to Jerry Cornelius as drawn by Moebius!
Snarfed from here.
Parisians…’they love Patti Smith’ It’s true!
Zardoz speaks to you, his chosen ones.
You have been raised up from brutality to kill the brutals who multiply and are legion. To this end Zardoz your god gave you the gift of the gun.
The gun is good.
The penis is evil.
The penis shoots seeds, and makes new life, and poisons the earth with a plague of men, as once it was. But the gun shoots death, and purifies the earth of the filth of brutals.
Go forth and kill!
“The future seen here falls very much in the 1970s vision of the future as seen by the likes of 2001: A Space Odyssey (1968), The Andromeda Strain (1971), THX 1138 (1971) and Zardoz (1974) that the future had either become or was becoming such a place of technological perfection that we were all in danger of being drowned in sterility. Here society has been made perfect (some nicely futuristic locations in Dallas) but in all of it there seems a sense of serene dissatisfaction. One of the film’s most potent images is a frighteningly decadent one where a group of bored partygoers detonate trees with a flaregun. Although ironically of all 1970s dystopian futures Rollerball’s is the closest to actually having come true with its visions of a corporate elite ruling the world and cathartic ultra-violent sports being used to placate the masses – if you have any doubt about this look at the popularity of the Superbowl and the WWF. (Although contrary to what the film here says, both of these obtain mass catharsis through the promotion of individuality rather than its suppression).”
and then again in 2006.
If you have never seen this film you really must take a good look at it, because it is one of the best films ever made, and deals with what we are starting to deal with now.
The film from the above list that is much closer to foul fruition is Rollerball, another priceless classic that is so close to home that it is uncomfortable to watch. The best part is the debate between Jo..but wait, you have to see this film!.
It was very hard for people of the 70’s to imagine that a corporate controlled world was possible, because people of that generation were the ones who had ‘Social Studies’ class that taught them about The Constitution, The Bill of Rights and the Founding Fathers.
Now that the young people are deliberately NOT instructed about freedom, this Rollerball world may yet come into being. All it takes is the wiping out or dumbing down of one generation to destroy everything and return to the feudal system.
I haven’t felt myself for about 2 weeks, directly corresponding with my last round of shots. I received my second Guardasil injection the same time as my Depo-Provera, and am also taking Lexapro on a daily basis. I’ve been on Depo for just over 2 years, and it appears that the pain of the shot itself is worsening each time, and it is taking longer for the bruising to fade – 2 full weeks this last time, and I still have a faint mark.
There has been no research done on the effects of Guardasil when injected with other vaccines, and I could find nothing about my trio of drugs in relation to each other. Psychologically I feel as I did when I was 18; troubled, easily agitated, and indecisive. My moods have been all over the board, and several hours of each day every external stimuli irritates me to the point of brief, explosive anger. I’ve lost my work ethic, and find myself expending my energies to shirk work and connive my way out of key responsibilities; this may be burnout, no way to tell. I’ve lost my interest in all activities, and have not ‘felt’ emotion about recent good and bad events, which causes me to wonder if I might be depressed as well. I’ve been having a string of dreams and unprovoked thoughts that seem completely foreign as well, and 100% atypical of my usual personality. These thoughts feel “male” in that they stem solely from visual stimulations and have no emotional bearing. I’ve also noticed mild neuorological oddities, and have odd facial twitches.
I may try to talk to the pharmacist at WalMart today or tomorrow. Currently I should feel apprehensive about the fact that we pissed off a lot of family with our decision to elope, and I should feel ecstatic that I was promoted this week and that $1100 on car maintenance was well worth the expense.
Thank the gods for alcohol.
The new film ‘Taking Liberties‘ is all about everything anyone with a brain-cell has understood for years. What is interesting is that on its weblog, when you want to publish a comment it is set to:
“This blog does not allow anonymous comments.”
Nice one. Anonymity and the ability to publish anonymously is an important right:
In the legal tradition, the right to anonymity is integrally related to an individual’s freedom of expression guarantees. Historically, many authors publish anonymously because their message is too controversial and they risk persecution or social ostracization for the content of their speech. Fundamental principles upon which the US Constitution is grounded were first espoused in The Federalist Papers , by “Publius”, the famous moniker used by James Madison and Alexander Hamilton when they wished to publish anonymously. Ironically, George Orwell, author of 1984 and Animal Farm , concealed his name and identity, Eric Blair, out of fear of political backlash for his views. The historical and political use of anonymous speech demonstrates that it is a vital part of freedom of expression and freedom of the press.
Like the right to distribute thoughts and ideas, the right to anonymous publishing is an essential component to freedom of expression guarantees. It protects the most valuable speech in a free society: the views that challenge the status quo, the majority, or government.
The US Supreme Court has historically recognized that the constitution’s freedom of expression guarantees protects a publisher’s right to anonymity. According to the US Supreme Court, the right to speak anonymously, “exemplifies the purpose behind the Bill of Rights, and the First Amendment in particular.” ( McIntyre v. Ohio Elections Comm ., 514 U.S. 334 (1995). According to Justice Stevens, anonymity is a prerequisite for speech in some cases. He pointed out that the motivation for anonymous publication may be to avoid social ostracism, to prevent retaliation, or to protect privacy. It is anonymous speech that shields individuals “from the tyranny of the majority … [It] protects unpopular individuals from retaliation – and their ideas from suppression – a the hand of an intolerant society.” Id.
In Watchtower Bible & Tract Society of New York, Inc. v. Village of Stratton , 122 S. Ct. 2080, 2090 (2002), the US Supreme Court ruled that a municipal ordinance requiring pamphleteers to disclose names implicates “anonymity interests” rooted in the First Amendment’s freedom of expression guarantees. The US Supreme Court also struck down a law requiring citizens to wear identification badges because it violated citizens’ First Amendment right to anonymity. ( Buckley v. Am. Constitutional Law Foun., Inc. , 525 U.S. 182 (1992).
Lower federal courts have specifically extended the right to publish anonymously to the Internet, ruling that “the constitutional rights of Internet users, including the right to speak anonymously, must be carefully safeguarded,” ( Doe v. 2TheMart.com, Inc ., 140 F. Supp.2d at 1097). The First Amendment right communicate anonymously over the Internet was also upheld in ACLU v. Johnson , 4 F. Supp.2d 1029, 1033 (D.N.M. 1998), aff’d, 194 F.3d 1149 (10 th Cir. 1999) and in ACLU of Georgia v. Miller , 977 F. Supp. 1228, 1230 (N.D. Ga 1997), which additionally recognized the constitutional right to communicate pseudonymously on the Internet.
Canadian courts have likewise extended the right to speak anonymously to the Internet:
“Some degree of privacy or confidentiality with respect to the identity of the Internet protocol address of the originator of message has significant safety value and is in keeping with what should be perceived as being good public policy.” Wilkins J. in Irwin Toy v. Doe (2000), 12 C.P.C. (5 th ) 103 (Ont. S.C.J.) […]
But there is much worse about these people….
What is most galling about them is their ‘what you can do‘ page.
We had this debate on BLOGDIAL before the historic march organized by StopWar. Demonstrations are pointless because they do not achieve their ends, and the people who go on them are nothing more than stupid monkeys; the people who organize them are actually working for the enemy. Time and time again we have said this, (and other stuff) and had it proved, sadly.
Now the directors of this film, after everything we have said and witnessed are asking everyone to:
Visit and sign up online:
Visit and sign up online:
Email Your MP
Demand to know what they are doing about the issues raised in the film:
Join the Mass Lone Demos
Demonstrations take place 5pm to 7:30pm on the third Wednesday of every month, forms [MS WORD] [PDF] must be handed in or sent by recorded delivery 1 week beforehand.
Joining Amnesty will not cause one law to be repealed, nor will it stop new bad legislation from being enacted.
Similarly, Joining Liberty will achieve absolutely nothing at all.
Emailing the very people who pass the laws that enslave you is just STUPID.
And joining demonstrations we know about, don’t we?
Telling the truth is not enough. Acting is not enough. Correct Action is the only thing that will change what you want changed.
But you know this!
The influx of strange demos continues. This one consists of a wedge of cheese:
Closeup of the label
It came with a cardboard stiffener and a pink post it note, with some lines about beer.
Which brings us to:
Russian agents are as active in Britain now as at the height of the Cold War, senior Whitehall officials have said.
The sources told the BBC’s Frank Gardner there were more than 30 identified intelligence officers trying to get secrets by covert means.
Targets include military hardware, scientific know-how and technology, and inside tips on Westminster politics.
Businessmen who may have access to sensitive information are also of interest, as are Russian dissidents.
Such dissidents include Boris Berezovsky, friend of the murdered former KGB agent Alexander Litvinenko.
Sir Paul Lever, a former member of the Joint Intelligence Committee, said: “Russian espionage activity in Britain is very extensive.
“In scale it’s probably pretty much as it was at the height of the Cold War.”
“Russians fighting Russians is bad for Russia”.
I wish I could attribute that quote to Roman Abramovich, but it’s mine.
More on the demos; we received this VERY interesting one in the last seven days, from Ljubljana in Slovenia, which arrived with some patent application diagrams for a novel guitar pitch-bending arrangement (foot controlled) a CDR of movies featuring it and its inventor in action, a contract proposal and a nice letter. Yes, ‘nice’.
Excerpt from the patent application
“But what did it sound like?”, I hear you cry.
Like Brij Bhushan Kabra on Crystal Meth.
Looking for a Walter Nurnberg book on ebay… came across this… do these THINGS get everywhere, everytime?
Now you’re going to tell me that’s religious imagery, aren’t you?
It’s been a long time. I shouldn’t have left you… I’ve been reading from afar, but haven’t really had much to say, as you all say it much better. I just came across this though:
[S]till they keep coming, those hubristic monuments to big government,
the living dead that walk the well-trodden path from Downing Street and
the Treasury to New Labour’s graveyard of initiatives.
The NHS computer: delayed, disorganised, a £20 billion shambles.
Forced police mergers: the direct opposite of the community policing we
And then the perfect example.
When a half-way competent government would be protecting our security by
controlling our borders…
…these Labour ministers are pressing ahead with their vast white
elephant, their plastic poll tax, twenty Millennium Domes rolled into
one giant catastrophe in the making.
They’ve given up trying to find a good reason for it.
Last week Tony Blair said that ID cards would help control immigration,
when new immigrants won’t even have them.
Does he even know what’s going on in his Government?
ID cards are wrong, they’re a waste of money, and we will abolish them. […]
Well, it looks like Tories are the only way to go next time, if only for this single reason; jettisoning the ID card and the NIR. I am sure that many people will not be for the Tories, but will be against the ID card, against the warmongering, against the sweaty, stocky, unctuous, murdering ‘grotesque’ Brown. For whatever reason, the ID card is so central to complete tyrrany, the first and absolutely essential step, the key to lock you and your children up forever – it alone is reason to abandon all your previous loyalties and support the Tories, because if they lose and ID cards and the NIR are introduced, it is THE END of Britain on a level and at a depth that few people can imagine.
You think that shouting CCTV cameras are bad? Imagine a shouting CCTV system that shouts your NAME OUT as it tells you to ‘move along you are not allowed to gather here’…or… ‘stop kissing your secretary JANE, MR. THOMPSON, your wife PEG has been informed’.
Yes, that will happen. They will be able to access the NIR automagically and correlate your CCTV image with your NIR entry, which will pull up your name, address, marital status, workplace, EVERYTHING, all in the name of ‘stopping crime’ or ‘security’.
Of course, if you are not in the NIR, or even better, there is no such thing as ‘the NIR’ then none of this dystopian crap can ever happen to you. You can shag your secretary right there in the street, and no one will ever know.
You know what I mean.
You will be free from a type of insidious, invasive, unnecessary, vile, inhuman, dehumanizing, revolting, voyeuristic and monstrous surveillance, that no decent person would ever have thought was fit to roll out.
Without the NIR as the key to your activities, without that locus, that single identifier, that binding element, Oyster becomes less of a threat, Nectar becomes less of a threat, your cellphone becomes less of a threat – because you can control how you identify yourself to all of these people. They will not be able to DEMAND that you present your NIR linked ID card. The biometric net will be broken, and you will be able to protect yourself as you move freely between services by compartmentalizing your valuable personal information. The service providers will have no choice but to deal with you on your terms, or lose your money.
And they will never do that.
As they Stand They Point Everywhere:
The four large upright blocks pointing outward are oriented to the limits of the migration of the moon during the course of the year.
An eye-level, oblique hole is drilled from the South to the North side of the center, Gnomen stone, so that the North Star is always visible, symbolizing constancy and orientation with the forces of nature.
A slot is cut in the middle of the gnomon stone to form a window which aligns with the positions of the rising sun at the Summer and Winter Solstices and at the Equinox, so that the noon sun shines to indicate noon on a curved line.
The cap stone includes a calendar of sorts, where sunlight beams through a 7/8 inch hole at noon, and shines on the South face of the center stone. As the sun makes its travel cycle, the spot beamed through the hole can tell the day of the year at noon each day. Allowances are made because of variations between standard time and sun time to set the beam of sunlight at an equation of time.
The site was chosen because it commands a view to the East and to the West and is within the range of the Summer and Winter sunrises and sunsets. The stones are oriented in those directions.
The Guides Explained
A massive granite monument espousing the conservation of mankind and future generations. Sources for the sizable financing of the project choose to remain anonymous. The wording of the message proclaimed on the monument is in 12 languages, including the archaic languages of Sanskrit, Babylonian Cuneiform, Egyptian Hieroglyphics and Classical Greek, as well as English, Russian, Hebrew, Arabic, Hindi, Chinese, Spanish, and Swahili.
The guides, followed by explanatory precepts, are as follows, the words are exactly as the Sponsors provided them: […]
The Culling is Coming…
The stones say:
- Maintain humanity under 500,000,000 in perpetual balance with nature
- Guide reproduction wisely – improving fitness and diversity
- Unite humanity with a living new language.
- Rule Passion – Faith – Tradition
- Protect people and nations with fair laws and just courts.
- Let all nations rule internally resolving external disputes in a world court.
- Avoid petty laws and useless officials.
- Balance personal rights with social duties.
- Prize truth – beauty – love – seeking harmony with the infinite.
- Be not a cancer on the earth – Leave room for nature – Leave room for nature.
The Fifth Dimension
The effects of fifth-dimensional temporal phasing were first theorized by Albert Einstein in the early Twentieth Century. At that time, the effects were known as “time dilation,” and the only known way to achieve fifth-dimensional displacement was through relativistic acceleration, via either change in linear velocity or gravitational field.
Einstein’s “twin paradox” demonstrated how natural temporal phasing due to acceleration could cause two people to age at different rates. It was not until the early Twenty-second Century that researchers at Chronos Technologies were able to induce an artificial acceleration field within a specified volume, allowing them not only to slow down local time, but also to speed it up.
The uses of fifth-dimensional technology to speed up time in a particular location and to slow it down are known respectively as temporal acceleration and temporal stasis.
Both processes utilize similar fifth-dimensional phasing technology. In order to artificially phase an object out of the normal flow of time, it must be saturated by a phased antigraviton field, whose frequency and polarity determine the extent and direction of fifth-dimensional displacement, and whose saturation density determines the spherical radius of the effect from the antigraviton field generator. (See Applications of Nine-dimensional Theory for more information on fifth-dimensional displacement.)
By the mid-Twenty-second Century, the technologies of microcircuitry, nanotechnology, and new power storage techniques have allowed temporal phasing technology to become very compact and portable. It may someday be incorporated into household appliances and industrial applications, pending government approval.
Temporal phasing does not remove an object from the physical (four-dimensional) Universe; rather, it changes the relative time flow around the object. All outside physical forces still affect the phased object, and it can still interact with the outside world, but time-dependent properties — such as gravitational acceleration, momentum, inertia, force, and frequency — are distorted to the degree of relative fifth-dimensional displacement. (See below for descriptions of physical properties associated with temporal displacement.) Einstein was correct in his prediction that the velocity of light remains constant regardless of fifth-dimensional displacement.
In 2002, Gary McKinnon was arrested by the UK’s national high-tech crime unit, after being accused of hacking into Nasa and the US military computer networks.
He says he spent two years looking for photographic evidence of alien spacecraft and advanced power technology.
America now wants to put him on trial, and if tried there he could face 60 years behind bars. […]
Profile – Gary McKinnon
“I found out that the US military use Windows,” said Mr McKinnon […]
The defence rests, m’lud!
See also: Hacker fears ‘UFO cover-up’ … with video interview from today.