Deutschland eine amerikanische MilitärDiktatur ?

//Selten genug findet man neue Arbeit. Viele Arbeitslose erleben dies übrigens als einen Wink des Schicksals, sich über ihre Berufung Gedanken zu machen – und dies ist das Beste, was sie tun können!//

Das ist die gute Herausforderung im Unerträgliche!
Danke Reiner!

Black Hawk über Somalia: Das ERBE der US-Einmischung – ein Horror wo man hin sieht

Demokratisierung

Immer wieder das gleiche Bild, in den USA ausgebildet und zurück um das eigene Land zu erstören 😦
Manche wehren sich, andere glauben Konspiration wäre der Weg 😦

The True Story of Black Hawk Down

Published on Jun 15, 2015

It was the biggest US firefight since Vietnam. The incredible fight between American troops and Mohamed Farrah Aidid, a Somali Warlord was the inspiration for the blockbuster movie ‚Black Hawk Down,‘ and the truth is no less amazing than the story.

Published on Jan 4, 2015 – gelöscht

A battle between forces of the United States and Somalia militia fighters.

Please Like, Share and Subscribe 🙂 ..

CCC – Appelbaum Angriffsarten des US-Geheimdienstes NSA // NEU: staatlich geschütze Freizone = Funklöcher // Abschirmmaßnahmen

Informations Überangebot > Information = in Form bringen
Informations Überangebot > Verformung durch Überangebot
Verformung = Tod
Informationszeitalter

~~~~~

“Searching for a Golden Cage” film about electromagnetic hypersensitivity

Published on Apr 19, 2015

Dieser Film stellt Menschen vor, welche sich auf Grund von Ihrer Elektrohypersensibilität (EHS) in das bisher einzig staatlich geschützte Funkloch, bei Green Bank (USA) zurück gezogen haben.

gefunden bei Uli Weiner: http://ul-we.de/

US-Dorf Green Bank – Erstes staatlich geschütztes Funkloch

Plädoyer für Funklöcher in Frankreich

Zivilschutz soll für einen möglichen Verteidigungsfall wieder aufgerüstet werden

~~~~~~

Chaos Communication Congress

Thema Überwachung – Angriffe auf Computer und Internet – CyberSpace – MindControl – Strahlenbelastung – der unsichtbare Strahlen-Krieg gegen die Völker der Welt – Militärzone Internet

To Protect And Infect – The militarization of the Internet [30c3]

 

Published on Jan 19, 2014

To Protect And Infect
The militarization of the Internet

2013 will be remembered as the year that the Internet lost its innocence for nearly everyone as light was shed on the widespread use of dragnet surveillance by the NSA and intelligence agencies globally. With the uprisings of the Arab Spring where people raided the offices of their regimes to bring evidence to light, we’ve seen a tremendous phenomenon: a large numbers of whistleblowers have taken action to inform the public about important details. The WikiLeaks SpyFiles series also shows us important details to corroborate these claims. There is ample evidence about the use and abuses of a multi-billion dollar industry that have now come to light. This evidence includes increasing use of targeted attacks to establish even more invasive control over corporate, government or other so-called legitimate targets.
Everything transiting our network connections is under surveillance to some degree. It’s also common for law enforcement and intelligence agencies to use exploits and malware to infect and monitor computers, mobile devices and to spy on networks. They’re able to bug our rooms with our own telephones, read encrypted emails, log keystrokes – they invade the most personal spaces in the very core of a person’s life with minimal economic impact to their budget. In this talk we’ll discuss the nature of targeted and untargeted surveillance, exploitation and intelligence gathering. This active surveillance is produced and operated not only by governments but by corporations and mercenaries that provide their intrusion services to the highest bidders who often have the lowest respect for human rights. We’ll introduce you to the players in the business of active, passive, tactical and strategic surveillance and the products they provide. We’ll also discuss examples of specific attacks on journalists and human rights activists worldwide in the last couple of years. Surprises won’t be missing.

Speaker: Claudio Guarnieri Morgan Marquis-Boire
EventID: 5439
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany

~~~~~

Kleiner Ausschnitt – Deutsch

CCC – Appelbaum Angriffsarten des US-Geheimdienstes NSA – Mikrowellenbestrahlung / Krebs

~~~~~~

Jacob Applebaum: To Protect And Infect, Part 2 [30c3]

45:39

Chaos Communication Congress – 29/12/2013 2013 will be remembered as the year that the Internet lost its innocence for nearly

1:02:43

Security researcher Jacob Appelbaum revealed what he calls „wrist-slitting depressing“ details about the National Security Agency’s

Published on Dec 30, 2013

To Protect And Infect, Part 2
The militarization of the Internet
Speaker: Jacob Applebaum ( @ioerror )
EventID: 5713
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

~~~~~~

:Nürnberger Kodex: ALLE Experimente am Menschen – erfordern freiwillige Zustimmung desselben, ohne List oder Vortäuschung – sondern aufgrund von ausreichender Kenntnis. Der Kodex ist für alle Experimentalbereiche anwendbar!!! BITTE unbedingt überall verteilen!

~~~~~~

Wie man sich vor Bestrahlung schützt !

Published on Mar 21, 2015

Den Abschirmstoff könnt Ihr hier beziehen:
http://www.yshield.com/de/flaechenpro…

Das Buch von Wilhelm Reich könnt Ihr hier lesen oder downloaden: https://archive.org/details/DieFunkti…

Mehr Infos zum Thema „Überwachung“ findet Ihr wie immer auf gefoltert.info

~~~~~~

Hilfsmaßnahmen zur Abschirmung ungewollter Einflüsse – gesammelte Tips

~~~~~~

 

What is TOR? – Jacob Appelbaum Interview, Lead Developer on TOR Project // CCC // Überwachung CyberSpace

1:02:48

The Tor Network We’re living in interesting times Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network

35:56

Janine Römer has been working on the unfolding story of Jacob Appelbaum’s departure from the Tor Project amid rumours and

18:34

Jacob Appelbaum introduces the Tor Project and the Tor Network – an anonymity network used to protect people online. It is used by

CC

1:04:36

12:14

29 October 2012. Elevate interview Jacob Appelbaum on the Tor Project: https://vimeo.com/52372111.

Published on Nov 7, 2014 – gelöscht

What is TOR? Jacob Appelbaum Interview, Lead Developer on TOR Project

In this interview Jacob Appelbaum, lead developer at Tor project, discusses what TOR is, how it is used and how you can protect yourself online.

TOR aka „The Onion Router“ was developed in the 1990’s by the US Naval Research Lab, originally designed to protect US government and intelligence communities online by making Anonymous browsing possible, they however soon realised that to be anonymous there had to be lots of users on the network, so it was released to the public and is now open source.

TOR uses encryption, clever coding and programming to improve your anonymity, privacy and overall cyber security.

Security agencies such as the cia mi5 gchq and the nsa all use the TOR browser when communicating and those same agescies have taken part in hacking the exit nodes to try and intercept communications

TOR browser runs in firefox and allows users to access hidden darknet black markets where drugs and other illegal substances can be acquired using bitcoin.

TIP: To aid your anonymity try using a VPN (virtual private network) with TOR + use a public wifi location. We recommend CyberGhost VPN: http://bit.ly/1EBTcvS (get a VPN for less than $6/€5/£4 per

The Tor project was made famous partially by Julian Assange, the WikiLeaks founder, as a way for whistleblowers to stay anonymous online.

Please Subscribe to get more internet security videos!

Here are some useful links:

TOR: https://www.torproject.org/projects/t…
TOR Wiki: http://en.wikipedia.org/wiki/Tor_(ano…)
Article: http://www.theguardian.com/world/2013…

~~~~~~

Jacob Appelbaum, Roger Dingledine – Tor Talk Q&A @ TU Munich July 24, 2013 (improved audio)

Published on Jul 26, 2013

Tor Talk at TU München 07-24-13 with Roger Dingledine and Jacob Appelbaum.

 

~~~~~~

Informations Überangebot > Information = in Form bringen
Informations Überangebot > Verformung durch Überangebot
Informationszeitalter

~~~~~~

20 Vidoes zum Thema Überwachung – Angriffe auf Computer und Internet – CyberSpace – MindControl – Strahlenbelastung – der unsichtbare Strahlen-Krieg gegen die Völker der Welt – Militärzone Internet

Jacob Appelbaum 29C3 Keynote: Not My Department

Published on Dec 27, 2012 – gelöscht

Jacob Appelbaum’s keynote at 29C3 (29th Chaos Communication Congress), 27 December 2012.

~~~~~~