How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

We have decided to implement Roberts Rules of order bringing order out of the chaos to our Meet and Greet Round Table Broadcast.

During our weekly meeting we will now start to use a simple form of Roberts Rules to keep our meeting orderly so that we don’t waste our time . http://www.robertsrules.org/

We are tired of meetings that waste our time? That is why we have decided to implement a simple form of Roberts Rules in our live Meet and Greet Round Table Broadcast !  For me bringing order out of the chaos started with a very personal mission. Our mission is simple We are dedicated to using  Roberts Rules by helping our members understand how to use Robert’s Rules of Order to get more work done!  Remember, these processes are designed to ensure that everyone has a chance to participate and to share ideas in an orderly manner. Parliamentary procedure should not be used to prevent discussion of important issues This blog post is an overview of Roberts Rules of order. Follow through this presentation to learn the basic process that you will need to be successful in our meetings or convention by using the rules.

Click to listen to our live broadcast.

BTR

Check Out Current Events Podcasts at Blog Talk Radio with AntiNewWorldOrderParty on BlogTalkRadio
Check Out Current Events Podcasts at Blog Talk Radio with AntiNewWorldOrderParty on BlogTalkRadio

Roberts Rules

July 8, 2014 at 4:22pm

 Guidelines

 

 

Obtain the floor (the right to speak) by being the first to stand when the person speaking has finished; state Mr./Madam Chairman. Raising your hand means nothing, and standing while another has the floor is out of order! Must be recognized by the Chair before speaking!Debate can not begin until the Chair has stated the motion or resolution and asked “are you ready for the question?” If no one rises, the chair calls for the vote!Before the motion is stated by the Chair (the question) members may suggest modification of the motion; the mover can modify as he pleases, or even withdraw the motion without consent of the seconder; if mover modifies, the seconder can withdraw the second.The “immediately pending question” is the last question stated by the Chair! Motion/Resolution – Amendment – Motion to PostponeThe member moving the “immediately pending question” is entitled to preference to the floor!No member can speak twice to the same issue until everyone else wishing to speak has spoken to it once!All remarks must be directed to the Chair. Remarks must be courteous in language and deportment – avoid all personalities, never allude to others by name or to motives!The agenda and all committee reports are merely recommendations! When presented to the assembly and the question is stated, debate begins and changes occur!The Rules

 

 

Point of Privilege: Pertains to noise, personal comfort, etc. – may interrupt only if necessary!Parliamentary Inquiry: Inquire as to the correct motion – to accomplish a desired result, or raise a point of orderPoint of Information: Generally applies to information desired from the speaker: “I should like to ask the (speaker) a question.”Orders of the Day (Agenda): A call to adhere to the agenda (a deviation from the agenda requires Suspending the Rules)Point of Order: Infraction of the rules, or improper decorum in speaking. Must be raised immediately after the error is madeMain Motion: Brings new business (the next item on the agenda) before the assemblyDivide the Question: Divides a motion into two or more separate motions (must be able to stand on their own)Consider by Paragraph: Adoption of paper is held until all paragraphs are debated and amended and entire paper is satisfactory; after all paragraphs are considered, the entire paper is then open to amendment, and paragraphs may be further amended. Any Preamble can not be considered until debate on the body of the paper has ceased.Amend: Inserting or striking out words or paragraphs, or substituting whole paragraphs or resolutionsWithdraw/Modify Motion: Applies only after question is stated; mover can accept an amendment without obtaining the floorCommit /Refer/Recommit to Committee: State the committee to receive the question or resolution; if no committee exists include size of committee desired and method of selecting the members (election or appointment).Extend Debate: Applies only to the immediately pending question; extends until a certain time or for a certain period of timeLimit Debate: Closing debate at a certain time, or limiting to a certain period of timePostpone to a Certain Time: State the time the motion or agenda item will be resumedObject to Consideration: Objection must be stated before discussion or another motion is statedLay on the Table: Temporarily suspends further consideration/action on pending question; may be made after motion to close debate has carried or is pendingTake from the Table: Resumes consideration of item previously “laid on the table” – state the motion to take from the tableReconsider: Can be made only by one on the prevailing side who has changed position or viewPostpone Indefinitely: Kills the question/resolution for this session – exception: the motion to reconsider can be made this sessionPrevious Question: Closes debate if successful – may be moved to “Close Debate” if preferredInformal Consideration: Move that the assembly go into “Committee of the Whole” – informal debate as if in committee; this committee may limit number or length of speeches or close debate by other means by a 2/3 vote. All votes, however, are formal.Appeal Decision of the Chair: Appeal for the assembly to decide – must be made before other business is resumed; NOT debatable if relates to decorum, violation of rules or order of businessSuspend the Rules: Allows a violation of the assembly’s own rules (except Constitution); the object of the suspension must be specified

The Peaceful Nuclear Explosions Treaty

Peaceful nuclear explosions
From Wikipedia, the free encyclopedia
Peaceful nuclear explosions (PNEs) are nuclear explosions conducted for non-military purposes, such as activities related to economic development including the creation of canals. During the 1960s and 1970s, both the United States and the Soviet Union conducted a number of PNEs.
Six of the explosions by the Soviet Union are considered to have been of an applied nature, not just tests.
Subsequently the United States and the Soviet Union halted their programs. Definitions and limits are covered in the Peaceful Nuclear Explosions Treaty of 1976. The Comprehensive Nuclear-Test-Ban Treaty of 1996 prohibits all nuclear explosions, regardless of whether they are for peaceful purposes or not.
Contents [hide]
1 The Peaceful Nuclear Explosions Treaty
2 United States: Operation Plowshare
3 Soviet Union: Nuclear Explosions for the National Economy
4 Other nations
5 Spaceflight Applications
6 See also
7 References
8 External links
[edit]The Peaceful Nuclear Explosions Treaty

In the PNE Treaty the signatories agreed: not to carry out any individual nuclear explosions having a yield exceeding 150 kilotons; not to carry out any group explosion (consisting of a number of individual explosions) having an aggregate yield exceeding 1,500 kilotons; and not to carry out any group explosion having an aggregate yield exceeding 150 kilotons unless the individual explosions in the group could be identified and measured by agreed verification procedures. The parties also reaffirmed their obligations to comply fully with the Limited Test Ban Treaty of 1963.
The parties reserve the right to carry out nuclear explosions for peaceful purposes in the territory of another country if requested to do so, but only in full compliance with the yield limitations and other provisions of the PNE Treaty and in accord with the Non-Proliferation Treaty.
Articles IV and V of the PNE Treaty set forth the agreed verification arrangements. In addition to the use of national technical means, the Treaty states that information and access to sites of explosions will be provided by each side, and includes a commitment not to interfere with verification means and procedures.
The protocol to the PNE Treaty sets forth the specific agreed arrangements for ensuring that no weapon-related benefits precluded by the Threshold Test Ban Treaty are derived by carrying out a nuclear explosion used for peaceful purposes, including provisions for use of the hydrodynamic yield measurement method, seismic monitoring and on-site inspection.
The agreed statement that accompanies the Treaty specifies that a “peaceful application” of an underground nuclear explosion would not include the developmental testing of any nuclear explosive.
[edit]United States: Operation Plowshare

One of the Chariot schemes involved chaining five thermonuclear devices to create the artificial harbor.
Operation Plowshare was the name of the U.S. program for the development of techniques to use nuclear explosives for peaceful purposes. The name was coined in 1961, taken from Micah 4:3 (“And he shall judge among the nations, and shall rebuke many people: and they shall beat their swords into plowshares, and their spears into pruning hooks: nation shall not lift up sword against nation, neither shall they learn war any more”). Twenty-eight nuclear blasts were detonated between 1961 and 1973.
One of the first U.S. proposals for peaceful nuclear explosions that came close to being carried out was Project Chariot, which would have used several hydrogen bombs to create an artificial harbor at Cape Thompson, Alaska. It was never carried out due to concerns for the native populations and the fact that there was little potential use for the harbor to justify its risk and expense. There was also talk of using nuclear explosions to excavate a second Panama Canal.[1]
The largest excavation experiment took place in 1962 at the Department of Energy’s Nevada Test Site. The Sedan nuclear test carried out as part of Operation Storax displaced 12 million tons of earth, creating the largest man-made crater in the world, generating a large nuclear fallout over Nevada and Utah. Three tests were conducted in order to stimulate natural gas production, but the effort was abandoned as impractical because of cost and radioactive contamination of the gas.[2][3]
There were many negative impacts from Project Plowshare’s 27 nuclear explosions. For example, the Gasbuggy site,[3] located 55 miles east of Farmington, New Mexico, still contains nuclear contamination from a single subsurface blast in 1967.[4] Other consequences included blighted land, relocated communities, tritium-contaminated water, radioactivity, and fallout from debris being hurled high into the atmosphere. These were ignored and downplayed until the program was terminated in 1977, due in large part to public opposition, after $770 million had been spent on the project.[5]
[edit]Soviet Union: Nuclear Explosions for the National Economy

The Soviet Union conducted a much more vigorous program of 239 nuclear tests, some with multiple devices, between 1965 and 1988 under the auspices of Program No. 6 and Program No. 7-Nuclear Explosions for the National Economy. Its aims and results were similar to those of the American effort, with the exception that many of the blasts were considered applications, not tests.[6] The best known of these in the West was the Chagan test in January 1965 as radioactivity from the Chagan test was detected over Japan by both the U.S. and Japan. The United States complained to the Soviets, but the matter was dropped.
In the 1970, the Soviet Union started the “Deep Seismic Sounding” Program, that included the use of peaceful nuclear explosions to create seismic deep profiles. Compared to the usage of conventional explosives or mechanical methods, nuclear explosions allow the collection of longer seismic profiles (up to several thousand kilometers).[7]
There are proponents for continuing the PNE programs in modern Russia. They (e.g. A. Koldobsky) state that the program already paid for itself and saved the USSR billions of rubles and can save even more if continued. They also allege that the PNE is the only feasible way to put out large fountains and fires on natural gas deposits and the safest and most economically viable way to destroy chemical weapons.
Their opponents (include the academician A.V. Yablokov) [8] state that all PNE technologies have non-nuclear alternatives and that many PNEs actually caused nuclear disasters.
Reports on the successful Soviet use of nuclear explosions in extinguishing out-of-control gas well fires were widely cited in United States policy discussions of options for stopping the Deepwater Horizon oil spill.[9][10]
[edit]Other nations

This unreferenced section requires citations to ensure verifiability.
Germany at one time considered manufacturing nuclear explosives for civil engineering purposes. In the early 1970s a feasibility study was conducted for a project to build a canal from the Mediterranean Sea to the Qattara Depression in the Western Desert of Egypt using nuclear demolition. This project proposed to use 213 devices, with yields of 1 to 1.5 megatons detonated at depths of 100 to 500 m, to build this canal for the purpose of producing hydroelectric power.
The Smiling Buddha, India’s first explosive nuclear device was described by the Indian Government as a peaceful nuclear explosion.
In Australia proposed blasting was put forward as a way of mining Iron Ore in the Pilbara [11]
[edit]Spaceflight Applications

Nuclear explosions have been studied as a possible method of spacecraft propulsion. The most well known example was Project Orion, which studied the possibility of a spacecraft propelled by the detonation of nuclear devices which it released behind itself.
Another application would be for deflecting or destroying celestial objects like comets, meteors, or asteroids on a collision course with Earth that have the potential for causing destruction.
[edit]See also

Project Gnome
[edit]References

^ “US Congressional Record pg. 25747, 1968-09-05”. Retrieved 2012-01-22.
^ U.S. Department of Energy, Office of Legacy Management: Rulison, Colorado, Site. Fact Sheet [1].
^ a b Peter Metzger (February 22, 1970). Project Gasbuggy And Catch-85*: *That’s krypton-85, one of the radioactive by-products of nuclear explosions that release natural gas Project Gasbuggy and Catch-85 “It’s 95 per cent safe? We worry about the other 5”. New York Times. p. SM14.
^ “DOE Environmental Management (EM) – Gas Buggy Site”. Em.doe.gov. Retrieved 2010-09-19.
^ Benjamin K. Sovacool (2011). Contesting the Future of Nuclear Power: A Critical Global Assessment of Atomic Energy, World Scientific, pp. 171-172.
^ Nordyke, M. D. (2000-09-01). The Soviet Program for Peaceful Uses of Nuclear Explosions. Lawrence Livermore National Laboratory. pp. 34–35. DOI:10.2172/793554. Report no.: UCRL-ID-124410 Rev 2. U. S. Department of Energy contract no.: W-7405-Eng48.
^ University of Wyoming: http://w3.uwyo.edu/~seismic/dss/
^ “А. В. ЯБЛОКОВ, “ЯДЕРНАЯ МИФОЛОГИЯ КОНЦА XX ВЕКА””. Biometrica.tomsk.ru. Retrieved 2011-08-13.
^ Broad, William J. (2010-06-02). “Nuclear Option on Gulf Oil Spill? No Way, U.S. Says”. New York Times. Retrieved 2010-06-18.
^ Astrasheuskaya, Nastassia; Judah, Ben; Selyukh, Alina (2010-07-02). “Special Report: Should BP nuke its leaking well?”. Reuters. Retrieved 2010-07-08.
^ Nuclear blasting proposed for Pilbara Iron Ore Project in Industrial Reviews and Mining Year Book, 1970 pp.255-259
[edit]External links

Peaceful Nuclear Explosions Comprehensive Nuclear-Test-Ban Treaty Organization Preparatory Commission
Video of the 104Kt Sedan PNE as part of Operation Plowshare.
Video of the Soviet Chagan PNE
Video of the Soviet Taiga PNE
On the Soviet nuclear program
On the Soviet program for peaceful uses of nuclear weapons, American Office of Scientific and Technical Information
United States Nuclear Tests, July 1945 through September 1992 (DOE/NV-209 [Rev.14]).
ARMS CONTROL AGREEMENTS,Federation of American Scientists
World Reaction to the Indian Nuclear Tests, Center for Nonproliferation Studies
Nuclear Files.org Treaty between the USA and USSR on underground nuclear explosions for peaceful purposes
Peter Kuran’s “Atomic Journeys” – documentary film includes tests of Peaceful nuclear Explosions.
[hide] v t e
Nuclear technology
Science
Chemistry Engineering Physics Atomic nucleus Fission Fusion Radiation ionizing
Fuel
Deuterium Fertile material Fissile Helium-3 Isotope separation Plutonium Thorium Tritium Uranium enriched depleted
Neutron
Activation Capture Cross-section Fast Fusion Generator Poison Radiation Reflector Temp Thermal
Reactors
Fission
reactors
by
primary
moderator
Water
Aqueous homogeneous reactor Boiling BWR ABWR Heavy CANDU PHWR SGHWR
Natural (NFR) Pressurized PWR VVER EPR Supercritical (SCWR)
Graphite
by coolant
Water
RBMK
Gas
Advanced gas-cooled (AGR) Magnox Pebble bed (PBMR)
UHTREX UNGG reactor Very high temperature (VHTR)
Molten Salt
FLiBe
Fuji MSR Liquid fluoride thorium reactor (LFTR)
Molten-Salt Reactor Experiment (MSRE)
Hydrocarbon
Organically moderated and cooled reactor
BeO
Aircraft Reactor Experiment (ARE)
None
(Fast)
Breeder (FBR) Integral (IFR) Liquid-metal-cooled (LMFR) SSTAR Traveling Wave (TWR)
Generation IV by coolant Gas (GFR) Lead (LFR) Sodium (SFR)
Fusion
reactors
by
confinement
Magnetic
Field-reversed configuration Levitated dipole Reversed field pinch Spheromak Stellarator Tokamak
Inertial
Bubble fusion (acoustic) Fusor electrostatic Laser-driven Magnetized target Z-pinch
Other
Dense plasma focus Migma Muon-catalyzed Polywell Pyroelectric
List of nuclear reactors
Power
Nuclear power plant By country Economics Fusion Isotope thermoelectric (RTG) Propulsion rocket Safety
Medicine
Imaging
by
radiation
Gamma camera
Scintigraphy Positron emission (PET) Single photon emission (SPECT)
X-ray
Projectional radiography Computed tomography
Therapy
Boron neutron capture (BNCT) Brachytherapy Proton Radiation Tomotherapy
Weapon
Topics
Arms race Delivery Design Explosion effects History Proliferation Testing underground Warfare Yield TNTe
Lists
Popular culture States Tests Treaties Weapon-free zones Weapons
Waste
Products
Actinide: (Reprocessed uranium Reactor-grade plutonium Minor actinide) Activation Fission LLFP
Disposal
Fuel cycle HLW LLW Repository Reprocessing Spent fuel pool cask Transmutation
Debate
Nuclear power debate Nuclear weapons debate Anti-nuclear movement Uranium mining debate Nuclear power phase-out

Be ready for the Bank Run of 2012 Global Financial Meltdown

Bank Run
Bank Run!

Daniel J Leach

I have been saying that the Global Financial Meltdown was just around the corner for years now!  It finally looks like we are on the verge of this happening this year.  I would not be surprised if this happens in October 2012!  This is a case of history repeating itself! “Those who cannot remember the past are condemned to repeat it.” George Santayana

   A bank run occurs when a large number of bank customers withdraw their deposits because they believe the bank might fail. As more people withdraw their deposits, the likelihood of default increases, and this encourages further withdrawals. This can destabilize the bank to the point where it faces bankruptcy.[1]

The stock market crash of October 1929 left the American public highly nervous and at the time, making it the largest single bank failure in American history.

In December 1931, New York’s Bank of the United States collapsed. The bank had more than $200 million in deposits at the time, making it the largest single bank failure in American history.

The bank runs of 1930 were followed by similar banking panics in the spring and fall of 1931 and the fall of 1932. In some instances, bank runs were started simply by rumors of a bank’s inability or unwillingness to pay out funds. In December 1930, the New York Times reported that a small merchant in the Bronx went to a branch of the Bank of the United States and asked to sell his stock in the institution. When told the stock was a good investment and advised not to sell, he left the bank and began spreading rumors that the bank had refused to sell his stock. Within hours, a crowd had gathered outside the bank, and that afternoon between 2,500 and 3,500 depositors withdrew a total of $2 million in funds.

 

Copied from http://blog.alexanderhiggins.com

The Global Financial Meltdown has dramatically worsened as Corporations and China Jump Aboard The “Institutional” Global Bank Run As Banks Fall Apart As Their Seams.

Earlier today the world saw a global financial meltdown as investors dumped everything from stocks to commodities and literally everything in between.

Global Financial Meltdown: Investors Dump Nearly Everything Amidst Worldwide Market Crash

Global Meltdown - Investors Are Dumping Everything

Major Stock Market Indexes, Commodities, Currencies And Everything In Between Is Being Dumped By Investors Across The Globe In The Midst Of A Global Financial Meltdown.

The financial markets across the globe are facing one of the most massive sell-offs in recent memory.

The Dow Jones Industrial average has sold off over 467 points today. When and when you add that on top of 284 point drop following yesterday’s crash FED’s statement, which announced operation ‘twist’ and warned of significant downside risk and strains in global financial markets, we have a 751 point drop in the DOW since 2:45 PM est yesterday, which is the largest 2 day slump since 2008.

There are an endless parade of economic statistics many of which are the worse since the Great Depression and World War 2 era. We have also seen 111 of the s&P 500 hit fresh 52 week lows, a drop in global currencies – beside the dollar, oil dropping into the high $70 per barrel range and gold plummeting over 5% to trade in the low $1,700 per ounce range.

Business Week points out the massive crash in U.S. stocks immediately below while CNBC points out further below that this in fact a global meltdown – investors are dumping everything.

[…]

Read The Rest…

While today’s sell off was monumental and in fact is on course for the 3rd worse week on Wall Street ever, the sell-off was on the heels of the FED’s economic outlook. Today’s Global Financial Meltdown is about to become much worse as a slew of news reports out today reveal the run on the European banks has spread to include corporations and institutions pulling their money out of banks and China finally arriving at the party.

As a backdrop, the IMF warned the entire global financial systems is more vulnerable to collapse than at any other time since the 2008 financial crisis. The alarm is being sounded with the stern warning the European debt crisis could trigger the complete collapse of the entire global financial system at any minute. On the other hand, the alternative media and independent economists warn we are in fact in of a great depression style collapse. The only difference is this time around we would be facing a global depression. But as the ship their countrymen sail on continues to sink, bureaucrats continueto play politics and put their partisan interests above the interest of their constituents.

The run on European banks has already began with from the customers pulling their money from banks some time ago. While the corporate media kept the run on the Greece banks on the hush the media blackout didn’t stop the run nor did it stop the run from spreading to other nations. Simply put, the public is learning they can’t trust their governments and they can’t trust the media. Indeed the withdrawal of deposits from the banks in Greece has quietly spread across the other European nations only to spread into some of the supposedly most stable banks in the Euro-zone, the French banks.

Now we have learned the run on the banks that was originally limited to customers has now spread to include corporate and institutional clients withdrawing their money from the banks. First, we caught wind of the rumor that Siemens pulled its cash from one of the French banks. Then came theconfirmation came that Siemens pulled $500 million Euros from Societe Generale. Siemens of course is a huge conglomerate. For such a huge corporation to lose trust in one of the supposedly most stable of the French banks is clearly a very significant development. To be clear, the ramification have simply rocked the markets and the many more corporations soon will follow. In fact, some corporations and nations have followed their lead.

Consider the breaking news that The Bank of China has stopped doing business with four major European banks. To be exact thy have stopped trading swaps and foreign exchange forwards with the Societe Gnerale, BNP Paribas, Credit Agricole and the Swiss banking giant UBS.

Speaking of BNP Paribas, Reggie Middleton – who long predicted the collapse of Lehman’s and Bear Stearns far ahead of anyone else because of their shady banking practices – has been warning for months BNP Paribas is ripe for a Lehman style collapse. Reggie argues that BNP Paribas is engaging in the same practices and fraud that caused Lehman’s and Bear Stearn’s to collapse.

While on the subject of China, we learn today they are not immune to the bank run either. China Securities Journal reveals that 420 billion yuan have been pulled out of the big four state-owned Chinese bank during the 15 days of September. Even bank employees are pulling their deposits from the banks as it is estimated that three trillion yuan has been diverted to illegal money lenders which pay interest rates 10 times higher than the one-year Chinese bank deposit rate.

Today we also learn that Insurer Lloyd’s of London confirmed it’s withdrawing deposits from all of the European banks for fear they may collapse. The rationalization for their withdrawal is quite simple – if world is worried about the European governments themselves collapsing then on must assume the sovereign debt collapse will also cause the banks themselves to collapse.

Still that message doesn’t seem to be reaching the retail banking client and the corporate owned media is to blame for repeatedly assuring the public there bank deposits are safe because the banks are insured by their respective European government.

When we see corporations not buying the propaganda being pushed by the media and instead withdrawing their deposits that should be a clear sign to the retail client it is time to withdraw their deposits. Unfortunately, too many people believe their governments and the media would never lie to them so some of them will unfortunately need to learn the hard way.

However, anyone keeping up with the details of latest financial news that doesn’t quite make the headlines knows that banks across the world have been hit with a parade of credit rating cuts warning of their risk of collapse. Those same cuts have been coupled with recent credit rating cuts of the sovereign of nations themselves, most notably the credit downgrades of the United States and Italy.

Adding to the bleak reality a global financial collapse may be imminent is the fact that 9 Banks failed last years EU stress test and another 16 barely passed the test. Yet instead of being proactive and shoring up capital to assure the survival of financial turmoil, we have seen many banks continue to conduct business in absolute denial they were at risk. In ignorance of reality the banks have sat around for over a year knowing they are at risk of collapse while doing little to nothing the improve their situation. Why should they act? They know when shit hits the fan taxpayers will be bent over the barrel and be forced to give the banks billions in bailouts from which the executives will collect lavish bonuses.

Now we have warnings from top economists and the FED that there is significant downside risk and strains in the global financial system that threatens the entire system. The is coupled with warnings from the IMF and EU leaders to immediately recapitalize the banks or face collapse. The calls for recapitalization have persisted for weeks with no action taken to stave off the collapse. Meanwhile, the consequences of not acting immediately continue to become more severe by the day.

The EU credit markets have frozen up and the situation is now beyond the point of dire. The question is which bank will be the first to collapse.

While all eyes seem to be focused on the Euro banks across the pond, banks back in the US are not immune from the crisis and neither are the Chinese banks.

In fact, Bank of America has been hammered by the alternative media as needing capitalization but BAC has denied those allegations and the corporate media has dismissed the alternative media reports as comments from fringe blogs. Until today that is.

Pimco’s Mohamed El-Erian raised the alarm today about the health of French banks and went on to point out there is an institutional run on thosebanks.

CNBC, went on to use the metrics El-Erain used to measure the health of the French banks to measure the health of US banks and found US banks aren’t nearly as healthy as Wall Street would like to believe.

Could 2012 NLE Cyber Attack DRILL be the Next 911 False Flag, Will This Years Drill Go Live?

By:Daniel J Leach

Reblogged: http://theintelhub.com

NLE 2012: Will This Years Drill Go Live and Result in a False Flag Cyber Attack?

The Intel Hub
By Shepard Ambellas and Alex Thomas
April 4, 2012

The summer of 2012 is fast approaching. As it inches closer, we will start to see a major increase in US and foreign troop movements as well as military equipment movements throughout the CONUS (Continental United States).

While many of the upcoming sightings may well be normal operations as the military does like to do training in the summer, the fact is that parts of our own military, along with foreign and UN troops, are actively planning to take on the American people.

National Level Exercise drills have been in effect for years now and have been covered by many alternative news sources, including The Intel Hub through our yearly Operation Overwatch which we use to gain intel and tips from the public in order to relay them to our readers.

Over the years many people have worried about the numerous National Level Preparedness drills and, in most cases, for good reason.

In 2011, the NLE focused around an earthquake on the New Madrid Fault Zone and the year before resulted in 70 thousand people being evacuated from a Texas city after a fertilizer fire.

Interestingly enough, this years FEMA national preparedness drill is focusing on the threat of a major cyber attack on America’s infrastructure.

The last year has seen dozens of cyber attacks on government websites as well as government propagandists pushing the fear of a cyber attack on the populace. Now we have the Department of Homeland Security making cyber security the main component of their annual preparedness drill.

Although only a small amount of information has been released on NLE2012, we can see from FEMA’s own website what it primary consists of.

FEMA’s website released the following PDF;

National Level Exercise (NLE) 2012Continental

National Level Exercise (NLE) 2012 is part of a series of congressionally mandated preparedness exercises designed to educate and prepare participants for potential catastrophic events.

The NLE 2012 process will examine the nation’s ability to coordinate and implement prevention, preparedness, response and recovery plans and capabilities pertaining to a significant cyber event or a series of events.

NLE 2012 will examine national response plans and procedures, including the National Response Framework (NRF), NRF Cyber Incident Annex, Interim National Cyber Incident Response Plan (NCIRP) and the International Strategy for Cyberspace.

Unique to NLE 2012 will be an emphasis on the shared responsibility among all levels of government, the private sector and the international community to secure cyberspace and respond together to a significant cyber incident.

Obsidian Analysisthe company heading up NLE12 for the private sector, states on their website:

NLE 2012 will comprise four major exercises, including a capstone event. These exercises will share common scenario elements, planning efforts and governance structure.

Participation in each exercise will be determined respectively, but the NLE 2012 process includes the Executive Office of the President; federal, state, local, tribal and territorial department and agency officials and emergency operations elements, nongovernmental and private sector organizations and international partners. These four major exercises include:

Information Exchange: This discussion-based exercise is designed to evaluate the sharing of cyber related information among the intelligence community, law enforcement, federal, state, tribal and local governments, the private sector and international partners, as appropriate

Cyber Incident Management/Virtual Effects: This exercise will examine the coordination and communication processes between public and private stakeholders in response to a significant cyber incident. This will include examining challenges related to managing a cyber event with national security implications.

NLE Capstone/Cyber Physical Effects: This functional exercise will examine challenges related to managing a cyber event with physical consequences and national security implications. This will include addressing cyber and physical interdependencies and impacts while coordinating a Whole Community level cyber and physical response.

Continuity Exercise/Eagle Horizon: This operations-based exercise will evaluate the continuity capability of federal departments and agencies. A component will include a nationwide exercise examining communications capability of the homeland security enterprise under conditions in which critical systems have been degraded or lost.

In addition to the major exercises, the NLE 2012 process will include senior level exercises, building-block events (i.e., seminars, tabletop exercises, and training) and routine exercise planning conferences.

As more information is released on these upcoming national preparedness drills, The Intel Hub will bring them to our readers attention.

Create a website or blog at WordPress.com

Up ↑