Step one, outsource everything
Several things explain an 18 yr old in leadership position quite adequately.
1. "Broken oath of office." (FIOS Splitters, Failure to regulate the monetary sys, Torture, Spying, data hacking, fucking bs, hell on earth pain weapons, and abuse of electronics and physics, or training young minds with unconstitutional bullshit)
2. "Brainwashed Propaganda Replacing the United States Constitution and Bill of Rights" (MIAC REPORT, UN, UNEP, IMF, IPCC, TC, PNAC, AIPAC, CFR, CARBON TAX/POPULATION CONTROL (un/unep/ipcc/imf), FLORIDE(local), VACCINES(cdc/who/local), AND A ZILLION OTHER CORPORATIONS YOU'D BEST MAKE SURE YOUR FUCKIN CANDIDATE ISN'T AFFILIATED WITH, ALONG WITH THE DANGEROUS CORPORATE MEDIA CULT OWNING 90% OF THE FUCKING PUBLIC SPECTRUM-SHITTING ON YOUR INTELLIGENCE)
3. "Corruption protected by State Secrets" catch 22, and "No Expedited, Clearly Written Procedures, for taking out a Oath Breaker" (not to be confused with this never-ending-unconstitutional-undeclared-fucking-invisible-war-on-terror)
Authority is actually what's being used to destroy the Constitution.
Frankly in the current discussion we are obviously talking about video. From the patents on the MPEG to everything else and now we need to fight this fight.
So, why hasn't video bandwidth been made cheap enough for Mr. Miller, or anyone else then? Why isn't the speed flying? You've dug up our streets, and made them crap fun for bicycles, your easement to every frigging private property sign already exists!
Why is there still dark fiber?
I'll allow you to separate "internet" from "web."
As long as we understand Paid, "Internet access" is all 64K ports available on TCPIP/UDP/IPX and all the other net protocols connected to others of like kind at a given rate of speed. Otherwise your telling me I am getting a bunch of extra packets for free, which is of course complete horse-pucky.
Then again you'll probably mark me troll.
just so we're clear first, myspace-cn was the account I chose (After my much older account got the password lost) and at the time the reason was because of the hypocrisy over myspace creating myspace-cn (which is now myspace.cn) and no I didn't forget the death threats from china.
I don't want "premium services" with high cost having authority over the internet, or a death spiral TOS/AUP
AND
I don't want FCC mission creep, destroying everything in the end by having authority over the internet, and then passing even more authority based on some BS cyber (sic) war.
Points
1._ Keep in mind the FCC has failed their existing mission, and indeed has removed their original mission statement. Why trust them to take more, when they already ignore their engineers working in the public interest, in leiu of selling frequencies willy-nilly regardless of health or safety and instead embrace the back door deal making to set the positions to screw the public. They have FAILED to manage the spectrum in the public interest as it exists NOW.. Until they prove what they have I say no more authority over your and my networks. They already screwed up your and my spectrum.
2._ Keep in mind it's been awhile since my ISP +Domains +Hosting bills increased. You and I know they will have too with this bankster monetary terrorism destroying us all, ISP and user alike.
Secrets with no accountability, no oversight, being hidden by oath breakers to hide crime, murder, and theft, is tyranny.
There should be an argument that the original docs which were leaked were in fact the soldier/leak was simply upholding his oath, by exposing unconstitutional corruption by oath breakers.
Nobody has clarified the consequences of breaking their oath, and they sure the fuck haven't made it have consequences have any teeth, even when it's clear a leader breaks it, and they haven't given soldiers the tools needed to uphold their sworn oath. Perhaps then we could get the oath's consequences clarified, and some real criminals arrested instead of state secrets being used to hide nasty shit?
You nailed that MF.
Public spectrum vs paid for cable
In the grand poo bagh of things I have to admit it, when stuck in some dusty garage!
(I'm trying for some karma back...lol)
The end game is to eliminate the anonymous. No more whistle blowers because nobody can be anonymous.
Oh you think I am full of conspiracy?
National Strategy for Trusted IDs in Cyberspace (NSTIC) (June 25, 2010 draft)
Goal 1: Develop a comprehensive Identity Ecosystem Framework
Goal 2: Build and implement an interoperable identity infrastructure aligned with the
Identity Ecosystem Framework
Goal 3: Enhance confidence and willingness to participate in the Identity Ecosystem
Goal 4: Ensure the long-term success of the Identity Ecosystem
Action 1: Designate a Federal Agency to Lead the Public/Private Sector Efforts Associated
with Achieving the Goals of the Strategy
Action 2: Develop a Shared, Comprehensive Public/Private Sector Implementation Plan
Action 3: Accelerate the Expansion of Federal Services, Pilots, and Policies that Align with
the Identity Ecosystem
Action 4: Work Among the Public/Private Sectors to Implement Enhanced Privacy
Protections
Action 5: Coordinate the Development and Refinement of Risk Models and Interoperability
Standards
Action 6: Address the Liability Concerns of Service Providers and Individuals
Action 7: Perform Outreach and Awareness Across all Stakeholders
Action 8: Continue Collaborating in International Efforts
Action 9: Identify Other Means to Drive Adoption of the Identity Ecosystem across the
Nation
Envision It!
An individual voluntarily requests a smart identity card from her home state. The individual chooses to use the card to authenticate herself for a variety of online services, including:
Credit card purchases,
Online banking,
Accessing electronic health care records,
Securely accessing her personal laptop computer,
Anonymously posting blog entries, and
Logging onto Internet email services using a
pseudonym.
Yeah, I am talking conspiracy, conspiracy fact.
Envision It!
A power utility remotely manages Smart Grid software
deployed on an electricity meter. Trusted hardware
modules and secure authentication between the power
company and the meter prevent deploying fraudulent
meters as a way to steal electricity; ensure that the
hardware and software configurations are correct; and
restrict meter software to only run on authorized meters.
Likewise, the meter trusts that instructions and periodic
software upgrades come from the power company.
These trusted interactions reduce the threat of fraudulent
activity and deployment of malware within the Smart Grid.
The Identity Ecosystem is composed of three layers:
Execution Layer – Conducts transactions in accordance with the rules of the Identity
Ecosystem.
Management Layer – Applies and enforces the rules for participants in the Identity
Ecosystem.
Governance Layer – Establishes the rules required to function within the Identity
Ecosystem.
So the system will not be for Truth, Free Speech, Whistle Blowing, it is designed for
Validated attributes
Validated Identity
Certified Credentials
Perhaps it's now time to say fuck it all, and stop buying computers, stop building websites, stop shopping online, and go back to being quiet like the 1970's.
That's the endgame. Fuck off if you can't swallow it.
All this is is an example. They can' get a false flag, so they have to set an example because they can't let all that money go to waste without cracking down on something new.
"Who's to say this wasn't just a fuckup"
I've been saying it. But you fuckers mark me as Troll
Actually it's time to start attributing to malice.
A Conspiracy
Your h4lons raz0r full of poo
"Ninety percent of baseball is half mental." -- Yogi Berra