Category Archives: Uncategorized

STOCK MARKET DROPS 350 POINTS

Visit NBCNews.com for breaking news, world news, and news about the economy

Traders work on the floor at the New York Stock Exchange June 20, the worst trading day in 2013. The Dow dropped 2.3 percent and the S&P dropped 2.5 percent.
Stocks crumpled Thursday, with the Dow shedding more than 350 points, under the weight of worries that the Federal Reserve would throttle back on easy money policies that have helped fuel the recovery.
FULL STORY:

VENEZUELA CONSIDERS BANNING BABY BOTTLE FEEDING

SOCIALISM TAX DOLLARS AT WORK…
The Venezuela congress is to discuss legislation next week that would prohibit bottle feeding of infants in an attempt to encourage breast feeding and reduce the use of baby formula.

Odalis Monzon, from Venezuela’s ruling Socialist party, said the proposal would “prohibit all types of baby bottles” as a way to improve children’s health.
“We want to increase the love (between mother and child) because this has been lost as a result of these transnational companies selling formula,” Ms Monzon said.
She said the Law for the Promotion and Support for Breast-Feeding, passed in 2007, did not establish any sanctions for using formula. However, she did not say what the sanctions might be if the proposed change to prohibit bottle feeding is passed by Congress, where the Socialist Party has a majority.
She said, however, that exceptions would be allowed, such as in the case of the death of a mother, or for women with limited breast milk production, as determined by the health ministry.
Such legislation would likely raise the ire of opposition sympathisers who say the government of the late President Hugo Chavez excessively extended the reach of the state into the lives of private citizens.
READ MORE:

SYRIAN PRESIDENT HAS USED CHEMICAL WEAPONS, CROSSING ‘RED LINE,’ US SAYS

BAIT AND SWITCH- White House under pressure because of spying on it’s own people…
Damage Control, Release the well known facts that Syria has used gas against it’s own people…
And we forget that the White House is spying on it’s own people.. like Syria… like China…

The White House announced Thursday that the Obama administration has conclusive evidence that Syrian President Bashar Assad’s regime has used chemical weapons against his opposition, killing up to 150 people in the last year and crossing what President Obama has called a “red line” that would lead to greater American involvement in the crisis.
It was not immediately clear what the next U.S. move would be, but a statement by Deputy National Security Advisor for Strategic Communications Ben Rhodes said that the use of chemical weapons by Syria has changed the President’s “calculus.”

Read more:

EDWARD SNOWDEN: US GOVERNMENT HAS BEEN HACKING HONG KONG AND CHINA FOR YEARS

Former CIA operative makes more explosive claims and says Washington is ‘bullying’ Hong Kong to extradite him

The former Central Intelligence Agency analyst also made explosive claims that the US government had been hacking into computers in Hong Kong and on the mainland for years.

A week since revelations that the US has been secretly collecting phone and online data of its citizens, he said he will stay in the city “until I am asked to leave”, adding: “I have had many opportunities to flee HK, but I would rather stay and fight the US government in the courts, because I have faith in HK’s rule of law.”

US National Security Agency’s controversial Prism programme extends to people and institutions in Hong Kong and mainland China;

Snowden said that according to unverified documents seen by the Post, the NSA had been hacking computers in Hong Kong and on the mainland since 2009.

One of the targets in the SAR, according to Snowden, was Chinese University and public officials, businesses and students in the city. The documents also point to hacking activity by the NSA against mainland targets.

Snowden believed there had been more than 61,000 NSA hacking operations globally, with hundreds of targets in Hong Kong and on the mainland.

“We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he said.

“Last week the American government happily operated in the shadows with no respect for the consent of the governed, but no longer. Every level of society is demanding accountability and oversight.”

Snowden said he was releasing the information to demonstrate “the hypocrisy of the US government when it claims that it does not target civilian infrastructure, unlike its adversaries”.

“Not only does it do so, but it is so afraid of this being known that it is willing to use any means, such as diplomatic intimidation, to prevent this information from becoming public.”

Since the shocking revelations a week ago, Snowden has been vilified as a defector but also hailed by supporters such as WikiLeaks’ Julian Assange.

The interview comes on the same day NSA chief General Keith Alexander appeared before Congress to defend his agency over the leaks.

Snowden’s revelations threaten to test new attempts to build US-Sino bridges after a weekend summit in California between the nations’ presidents, Barack Obama and Xi Jinping.

If true, Snowden’s allegations lend credence to China’s longstanding position that it is as much a victim of hacking as a perpetrator, after Obama pressed Xi to rein in cyber-espionage by the Chinese military.

FULL ARTICLE HERE:

OKLAHOMA TORNADO VIDEO SHOWS STORM CHASERS CAUGHT IN POWERFUL TWISTER


5/31/2013 CLOSE RANGE Union City, Oklahoma Tornado – INSANE Video
A dramatic video of a tornado near Oklahoma City on Friday shows a group of storm chasers racing to escape the twister.

In the video, Oklahoma University meteorology student Brandon Sullivan and fellow storm chaser Brett Wright speed down a rural road dangerously close to one of the 17 tornadoes reported in the Midwest on Friday.

Their car is pummeled by debris, smashing the windshield at one point. “The team is very fortunate to live to chase another day,” Sullivan wrote on his YouTube page.

Nine people died in the Oklahoma City area on Friday, including two children, according to the medical examiner’s office. The storm also caused flooding and tipped over trucks on the highway.

The storm touched down mostly in rural areas and missed central Oklahoma City, according to The Associated Press.

On May 20, an EF-5 tornado that hit the town of Moore, Okla., killed 24 people and injured hundreds.
READ MORE

NORMAN

TIBETAN RITUALS BRING DESTRUCTION BECAUSE OF THE GODS THEY CALL UPON

TEXAS

CALIFORNIA

NEW YORK

MARINA DEL REY

Search the Prophecy Chronicles for more information

TURKISH POLICE FIRE TEAR GAS IN WORST PROTESTS IN YEARS

(Reuters) – Turkish police fired tear gas and water cannon on Friday at demonstrators in central Istanbul, wounding scores of people and prompting rallies in other cities in the fiercest anti-government protests in years.

Thousands of demonstrators massed on streets surrounding Istanbul’s central Taksim Square, long a venue for political unrest, while protests erupted in the capital, Ankara, and the Aegean coastal city of Izmir.

Broken glass and rocks were strewn across a main shopping street near Taksim. Primary school children ran crying from the clouds of tear gas, while tourists caught by surprise scurried to get back to luxury hotels lining the square.

The unrest reflects growing disquiet at the authoritarianism of Prime Minister Tayyip Erdogan and his Islamist-rooted Justice and Development Party (AKP).

Riot police clashed with tens of thousands of May Day protesters in Istanbul this month. There have also been protests against the government’s stance on the conflict in neighboring Syria, a tightening of restrictions on alcohol sales and warnings against public displays of affection.

READ MORE:

HOW APPLE AND AMAZON SECURITY FLAWS LED TO MY EPIC HACKING

In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.

In many ways, this was all my fault. My accounts were daisy-chained together. Getting into Amazon let my hackers get into my Apple ID account, which helped them get into Gmail, which gave them access to Twitter. Had I used two-factor authentication for my Google account, it’s possible that none of this would have happened, because their ultimate goal was always to take over my Twitter account and wreak havoc. Lulz.

Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location.

Those security lapses are my fault, and I deeply, deeply regret them.

But what happened to me exposes vital security flaws in several customer service systems, most notably Apple’s and Amazon’s. Apple tech support gave the hackers access to my iCloud account. Amazon tech support gave them the ability to see a piece of information — a partial credit card number — that Apple used to release information. In short, the very four digits that Amazon considers unimportant enough to display in the clear on the web are precisely the same ones that Apple considers secure enough to perform identity verification. The disconnect exposes flaws in data management policies endemic to the entire technology industry, and points to a looming nightmare as we enter the era of cloud computing and connected devices.

This isn’t just my problem. Since Friday, Aug. 3, when hackers broke into my accounts, I’ve heard from other users who were compromised in the same way, at least one of whom was targeted by the same group.

‬The very four digits that Amazon considers unimportant enough to display in the clear on the Web are precisely the same ones that Apple considers secure enough to perform identity verification.‪
‬Moreover, if your computers aren’t already cloud-connected devices, they will be soon. Apple is working hard to get all of its customers to use iCloud. Google’s entire operating system is cloud-based. And Windows 8, the most cloud-centric operating system yet, will hit desktops by the tens of millions in the coming year. My experience leads me to believe that cloud-based systems need fundamentally different security measures. Password-based security mechanisms — which can be cracked, reset, and socially engineered — no longer suffice in the era of cloud computing.

A MUST READ: DON’T USE THE CLOUD

WAS THE HOLOCAUST A HOLOHOAX? 15 YEAR OLD GIRL GETS AN A

Jazzy
A 15-year-old girl from Southern California who attends a public high school tells the story of how she recently became aware of questions concerning the holocaust. After hearing the establishment’s version of the ‘shoah’ in her history class for weeks along with persistent rumors that Obamacare included provisions for microchipping all Americans, she was very upset at all the frightening and traumatizing details. But then she had an encounter which led her to question what she had been taught, and decided to conduct her own investigation.

Upon completion of her research, she decided to submit a report for a school project in an elective class she was taking for extra credit. She titled it ‘Holohoax,’ and got an A on the report! Unfortunately for the regime, the widely accepted version of the ‘holocaust’ which has been passed down for generations and constantly promoted through Hollywood propaganda films is not enough to brainwash the youth, who are increasingly thinking for themselves, outside the box.

Here is Jazzy’s report as well as a brief video introduction.
READ COMPLETE REPORT !

WOULD CANADIANS LET THIS GO DOWN ? INTERNATIONAL NEWS IS STUNNED !

The Acting IRS Commissioner, Steven Miller – who sat before a House Ways and Means hearing on Friday and answered “I don’t know” to virtually every question – is departing on schedule in June. The current head of the tax-exempt organizations department is retiring gracefully, without any hint of shame or punishment… after only one week on the job.

And his predecessor, Sarah Hall Ingram – the woman who was actually in charge of that fabulously corrupt department during years of abuse?
Why, she got promoted.

She’s going to be in charge of ObamaCare enforcement now.

CREATING THE NEWS SPIN AND SHAPING THE WORLD… YOU GO GIRL !

don_ennis-300x180

Top ABC News producer Don Ennis walked into his Manhattan office on Friday in a “little black dress” and a brunette bobbed wig and announced to colleagues that from now on, he would like to be known as Dawn.

The 49-year-old father of three said he’s splitting from his wife of 17 years to become a woman, or Dawn Stacey Ennis, as she is now known on her governmental records.

“Today I begin anew,” she wrote on her Facebook timeline, where she debuted a flirty new profile picture.

via
Read the TRUE AGENDA…
In the film business a P&A Budget (Prints and adds) is what brings public awareness that makes or breaks a film investment. The best advertising is the FREE NEWS AGENCIES, like the one in this article. Because the News “SPIN” is so very powerful. So now we find out their has been a hidden agenda all along.
Amazing, simply amazing.

FBI SECRETLY SPYING ON GOOGLE USERS, COMPANY REVEALS

The FBI used National Security Letters — a form of surveillance that privacy watchdogs call “frightening and invasive” — to surreptitiously seek information on Google users, the web giant has just revealed.

Google’s disclosure is “an unprecedented win for transparency,” privacy experts said Wednesday. But it’s just one small step forward. “Serious concerns and questions remain about the use of NSLs,” the Electronic Frontier Foundation’s Dan Auerbach and Eva Galperin wrote. For one thing, the agency issued 16,511 National Security Letters in 2011, the last year for which data was available. But Google was gagged from saying just how many letters it received — leaving key questions unanswered. “The terrorists apparently would win if Google told you the exact number of times the Federal Bureau of Investigation invoked a secret process to extract data about the media giant’s customers,” Wired’s David Kravets wrote. He described the FBIs use of NSLs as a way of “secretly spying” on Googles customers.National Security Letters are a means for the FBI to obtain information on people from telecommunications companies, authorized by the Electronic Communications Privacy Act ECPA and expanded under the Patriot Act.

It lets the agency seek information on a subscriber to a wire or electronic communications service, although not things like the content of their emails or search queries, Google said.And thanks to secrecy constraints built into NSLs, companies that receive them usually aren’t even allowed to acknowledge the request for information. Citing such extreme secrecy, privacy experts have decried the use of these letters in the past.“Of all the dangerous government surveillance powers that were expanded by the USA PATRIOT Act, the National Security Letter NSL power … is one of the most frightening and invasive,” the EFF wrote. “These letters … allow the FBI to secretly demand data about ordinary American citizens private communications and Internet activity without any meaningful oversight or prior judicial review.”

Thanks to negotiations with the government, Google finally opened the smallest chink in the armor, allowing the search giant to reveal the fact that it had received these requests for data, as well as some general information about them.

“Visit our page on user data requests in the U.S. and you’ll see, in broad strokes, how many NSLs for user data Google receives, as well as the number of accounts in question,” Richard Salgado, Google’s legal director of law enforcement and information security, wrote in a Tuesday blog post.A new table posted to Google’s Transparency Report site outlines the details; it tabulates how many requests for information the company has received over each of the past four years: some undisclosed number between 0 and 999.

With those NSLs, the FBI sought information on somewhere between 1,000 and 1,999 users/accounts.“People don’t always use our services for good, and it’s important that law enforcement be able to investigate illegal activity,” Salgado wrote.

No other technology company presently disclose such basic information about government requests, experts noted.

more at FBI secretly spying on Google users, company reveals | Fox News.

History of Luxembourg

Luxembourg began as a hill top fortress in the AD600’s. As you can imagine it has always been a hugely strategic location, between France and Germany. Throughout European history the different countries have spent a lot of time fighting each other (from 1500 until 1800 the big European nations were at war over 50% of the time) and Luxembourg was often in the centre of all this. So Luxembourg became one of the most heavily fortified and blood stained lands in Europe.

Luxembourg has changed hands many times over the years; it has been under the rule of France, Germany, Austria, Spain and Prussia. When the Austrian’s had it, they gave it as a gift to the King of the Netherlands as well as making it a Royal Duchy. This enabled Luxembourg to build it’s own political institutions, so in 1867 it was recognised as a politically independent state. Due to it’s strategic importance it was officially declared to be neutral – so as not to cause problems between France and Germany (they have not always been as friendly as the now appear!) This neutrality was broken when Germany invaded in the first world war, and again in the second WW. Their neutrality meant Luxembourg had no army, so the German’s walked straight into Luxembourg and took it over. The bloody and infamous Battle of the Bulge was fought on Luxembourg soil. After the second world war Luxembourg relinquished neutrality and joined NATO. It was also one of the founding states of the EU.

Today it is a centre of business and banking (Paypal is one of the business’s to be registered there). It has the greatest concentration of banks within the EU, as well as many holding companies – it is a tax haven.

It is also home to some of the following EU institutions:

The Commission of the European Community, including the Statistical Office (EUROSTAT) and the Publications Office,

The Court of Justice of the European Communities

The general Secretariat of the European Parliament,

The European Investment Bank,

The European Court of Auditors.

The Official Publications Office

The Nuclear Safety Administration,

The Directorate-General of ‘Credits and Investments’

 

History of Venice

Venice was founded by refugees fleeing the Germanic tribe, the Lombards, after they invaded Italy in 568 AD. The refugees came from the town of Aquileia, traditionally believed to have been founded by St. Mark. At that time the Christian Byzantine empire spread across that area of Italy, and the islands that make up Venice were part of a defensive agreement between the Byzantine’s and the Lombard’s, and came under Byzantine control. However, as the Byzantine empire’s grip of power in the west loosened, the early Venetians found themselves largely independent. Through their skills as merchants they grew in power and wealth, and by 726 they elected their first Doge (like a Duke). The first Doge, failed in his attempt to become independent from the Byzantines.

Through time the Venetian’s ruthless diplomacy and ability to play one power against another eventually secured her independence; and Venice’s excellent location between the powers of western Europe and the east gave her the opportunity to grow increasingly wealthy via trade, and became a popular navigational route to the eastern countries from Europe.

In the early 9th century, Venice needed to improve her status, and in the Christian Middle Ages, that required a patron saint and relics. Since Venice was founded by the refugees of Aquileia they adopted St. Mark as their Saint. Legend has it that two Venetian merchants stole St. Mark’s body from a tomb in Alexandria and brought his remains back to the Basilica in Venice. Throughout the city there are depictions of winged lions, symbols of St. Mark.

In the 11th century the power of the Norman invasion in Europe threatened the Byzantines in Italy. The Venetians agreed to help the Byzantines against the Normans. In return for their help the Byzantines allowed the Venetians to trade freely with them, and not pay the same duties and customs as other nations. The start of the Crusades began to open up trading routes with the east, which Venice was uniquely placed to exploit.

However, by the 12 century the pride and wealth of the Venetians bred hostility in Constantinople (the centre of the Byzantine empire). As a result the Byzantines made new trade deals with Pisa and Genoa and they began to tax Venetian traders. Hostility between the old allies grew.

With internal power struggles in the Byzantine empire and the Fourth Crusade looming, Venice had a chance of revenge. The Catholic Church looked for financial support in the launching of a new crusade- this time against wealthily Egypt and Cairo. The Venetians offered their military support and use of their naval power and infrastructure; in return for half of any lands conquered and 85,000 silver marks. The church agreed and the fleet was due to depart June 1202. However, the Venetian diplomats immediately brokered a deal with the Sultan in Egypt, assuring him the fleet would never reach his shores, and the Doge negotiated with the deposed Byzantine emperor.

When the day of departure arrived, the church was unable to pay the full amount of money, so the Venetians offered a compromise. They would accept part payment, if the army would help them deal with a small dispute they had with the King of Hungary. This was agreed and the fleet set sail for the city of Zara, which they laid siege to and conquered. By this time it was nearly winter, so the fleet camped at Zara for the season. In the meantime, the deposed emperor of the Byzantines agreed to pay the remainder of the 85,000 silver marks to regain his throne in Constantinople. So the fleet headed off to Constantinople, where they laid siege and defeated the city. However, the emperor was unable to pay so the Venetians looted the city of her treasures in retaliation. Many of the finest treasures of Venice today, were those stolen from Constantinople.

Throughout the 15th and 16th century, Venice continued to grow in power and wealth through her trade and maritime dominance. However, tensions grew between Venice and the Papal states of Italy; as well as with France and Spain. Ceaseless war began to take its toll on the power and wealth of the republic. The Vatican believed Venice and France were the greatest threat to the power of the Papal states in central Italy. Consequently the Pope began a ruthless plan to usurp Venetian power. The political turmoil that ensued resulted in the long decline of Venice as a place of political significance, and in 1866, became part of the newly independent Kingdom of Italy.

Today, Venice’s place as a center for the arts continues; a place of pleasure and decadence, famous for it’s masked balls and the world’s first opera house and plays a major role on the world stage as a center for film, and tourism as one of the world’s most beautiful cities.

 

< previous