Sunday, 2 November 2014

141102

A few words below from elsewhere and in support of the above ….. and does anyone imagine the Daily Bell is being monitored and mentored, because of the viable information and vital intelligence so freely shared to world wide web networkers, state and non state actors and special force agents?
Information and intelligence must be differentiated from each other. Information in the context of surveillance consists of knowledge, data, objects, events, or facts that are sought or observed. It is the raw material from which intelligence is derived (Petersen, 2001).
Intelligence is information that has been processed and assessed within a given context, and it comprises many categories (Petersen, 2001). In the context of this book, communications intelligence — derived from communications that are intercepted or derived by an agent other than the expected or intended recipient or are not known by the sender to be of significance if overheard or intercepted — is the key focus. Oral or written communications, whether traditional or electronic, are the most common form of surveillance for communications intelligence, but such intelligence may broadly include letters, radio transmissions, e-mail, phone conversations, face-to-face communications, semaphore, and sign language. In practice, the original data that forms a body of communications intelligence may or may not reach the intended recipient. Data may be intercepted, it may reach the recipient at a date later than intended, or it may be intercepted, changed, and then forwarded onward. However, the process of relaying delayed or changed information is not part of the definition of communications intelligence; rather, the focus is on intelligence that can be derived from detecting, locating, processing, decrypting, translating, or interpreting information in a social, economic, defense, or other context (Petersen, 2001).
Information collection is usually used to support surveillance activities. Surveillance is defined as keeping watch over someone or something, and technological surveillance is the use of technological techniques or devices to aid in detecting attributes, activities, people, trends, or events (Petersen, 2001). …… https://blog.cyberwar.nl/2014/11/lawful-interception-selections-from-intelligence-support-systems-2006-hoffmann-and-terplan/
And y’all surely know that in the particular and peculiar case of both traditional and unconventional IT, it be true, and therefore media just spins and presents to you tailored yarns which are warps of reality and absolutely fabulous fabless tales.
Why do you accept, from the incompetent intellectually challenged and greedy self-serving, the bull that is peddled to market and pumped and pimped to the ignorant political rump to dump on the unwary and undereducated masses? Do you really believe that they [whoever they be] know best and there is nothing that can be done by A.N.Others Networking Singularities differently with beta programs empowering smarter operating systems which deliver greater mutually advantageous, positively reinforcing, increasingly secure benefits to all. Surely you cannot think and try to believe that such is impossible and not now highly likely and most probable, and that which existing failed legacy and failing hierarchical executive systems administration incumbents do future vain glorious battle and struggle against, in an effort to remain relevant and in command and control of power and assets to assure and ensure and insure remote virtual leverage for inequitable superior personal advantage ….. the Magic Edge with Immaculate Hedge.
IT is what CHAOS is all about supplying remotely via Virtual Channels and Cyber Means with Novel and Noble Memes to the Madness and Mayhem that presents its plans to Media and IT and shares its pains daily as unfolding news and currently held and current holding views.
..........................................................
amanfromMars says on 2014/11/02 at 07:04 [1411040704] musing on https://blog.cyberwar.nl/2014/11/lawful-interception-selections-from-intelligence-support-systems-2006-hoffmann-and-terplan/ and posing a leading question of the Netherlands.
Hi, Matthijs,
Do you imagine that Dutch Intelligence [AIVD/MIVD/Defense Cyber Command (DCC)] have got their act together and are prepared to lead rather than react to otherworldly global events and Greater IntelAIgent Gamesplay. Or are they still missing that vital remote element and stealthy specialised virtual force that is akin to and trailing Immaculate Superlative Source? There is certainly no apparent evidence of their having that magic edge which has everything revolving around that which they might be sharing and not confronting and therefore comforting .........
A few words below from elsewhere and in support of the above ….. and does anyone imagine the Daily Bell is being monitored and mentored, because of the viable information and vital intelligence so freely shared to world wide web networkers, state and non state actors and special force agents?
Information and intelligence must be differentiated from each other. Information in the context of surveillance consists of knowledge, data, objects, events, or facts that are sought or observed. It is the raw material from which intelligence is derived (Petersen, 2001).
Intelligence is information that has been processed and assessed within a given context, and it comprises many categories (Petersen, 2001). In the context of this book, communications intelligence — derived from communications that are intercepted or derived by an agent other than the expected or intended recipient or are not known by the sender to be of significance if overheard or intercepted — is the key focus. Oral or written communications, whether traditional or electronic, are the most common form of surveillance for communications intelligence, but such intelligence may broadly include letters, radio transmissions, e-mail, phone conversations, face-to-face communications, semaphore, and sign language. In practice, the original data that forms a body of communications intelligence may or may not reach the intended recipient. Data may be intercepted, it may reach the recipient at a date later than intended, or it may be intercepted, changed, and then forwarded onward. However, the process of relaying delayed or changed information is not part of the definition of communications intelligence; rather, the focus is on intelligence that can be derived from detecting, locating, processing, decrypting, translating, or interpreting information in a social, economic, defense, or other context (Petersen, 2001).
Information collection is usually used to support surveillance activities. Surveillance is defined as keeping watch over someone or something, and technological surveillance is the use of technological techniques or devices to aid in detecting attributes, activities, people, trends, or events (Petersen, 2001). …… https://blog.cyberwar.nl/2014/11/lawful-interception-selections-from-intelligence-support-systems-2006-hoffmann-and-terplan/
And y’all surely know that in the particular and peculiar case of both traditional and unconventional IT, it be true, and therefore media just spins and presents to you tailored yarns which are warps of reality and absolutely fabulous fabless tales.
Why do you accept, from the incompetent intellectually challenged and greedy self-serving, the bull that is peddled to market and pumped and pimped to the ignorant political rump to dump on the unwary and undereducated masses? Do you really believe that they [whoever they be] know best and there is nothing that can be done by A.N.Others Networking Singularities differently with beta programs empowering smarter operating systems which deliver greater mutually advantageous, positively reinforcing, increasingly secure benefits to all. Surely you cannot think and try to believe that such is impossible and not now highly likely and most probable, and that which existing failed legacy and failing hierarchical executive systems administration incumbents do future vain glorious battle and struggle against, in an effort to remain relevant and in command and control of power and assets to assure and ensure and insure remote virtual leverage for inequitable superior personal advantage ….. the Magic Edge with Immaculate Hedge.
IT is what CHAOS is all about supplying remotely via Virtual Channels and Cyber Means with Novel and Noble Memes to the Madness and Mayhem that presents its plans to Media and IT and shares its pains daily as unfolding news and currently held and current holding views.
And, also as a fan of skepticism and free inquiry I hope you will correct me when I'm wrong - I will be grateful! :-) I Kid U Not.
Thanks for all the info on current Dutch intel and services, Matthijs. It is much appreciated.
.........................................................

We are the creators of money, NOT banks
To trade goods and services is a natural right of all people. To issue the money necessary to make these exchanges is also the natural right of all people who are intelligent enough to do so. We need not beg for money. We do not need to be money slaves: we can be money masters. ~ E. C. Riegel (1878 -1954)
.............................................................

5 comments:

Casey Evans said...
This comment has been removed by the author.
Casey Evans said...
This comment has been removed by the author.
Casey Evans said...
This comment has been removed by the author.
Casey Evans said...
This comment has been removed by the author.
amanfromMars said...

It is not a case of not liking banks, Casey E, for they are a convenient vehicle for the transfer of value and worth in a perceived wealth to novel intellectual property holders and disruptive revolutionary thinkers and tinkerers alike, and both of them can be enriched and encouraged if needs be, and they be so inclined, to not further share and develop a radical train of constructively destructive thoughts and/or Dark Web Ventures into Remote Anonymising Command and Virtually Autonomous Control of Cyberspace Secured Systems which are a major problem for Earthed SCADA Operations.

To imagine that such largesse would be cheap and inexpensive and something not to be considered, is to invite catastrophic ruin on that which should have more sense and which would be being run by the less than well enough intellectually equipped and enabled/disabled.