Seth Rich

Exploration of Conspiracy Theories from Perspective of Esoteric Traditions

Moderator: yorick

Re: Seth Rich

Postby Kurt » Fri Dec 07, 2018 1:48 pm

I am reading some works with the theme of "how people in charge of stuff dont know how the stuff they are in charge of works" People in denial of reality and their environment is fine. Asside from a few accidental deaths the consequences are usually contained (Like JFK Junior flying kills only four people is contained but JFK Junior in charge of designing passenger jets would be a problem). But others like FEMA not having anyone skilled at logistics who is in charge of making plans requiring logistics can have fatal consequences.

As far as a DNA test goes to clear up the whole thing. You still seem to think there is something to clear up. And lets face it, if Caroline did say "You know, I am going to do this, for the conspiracy nuts and show them the truth so maybe they can do something else" and dug up her brother, confirmed it was him and he did die from lack of piloting skill, people who believe he is still alive would still believe he was alive and that Caroline is part of the cover-up.

My theory on where all this will eventually lead is to where all terrorist attacks eventually lead, to target office workers. On 9/11 the Terries believed that the Pentagon was the seat of the US military and they could take it out and that the WTC was the seat of US capitalism and they could take it out, and all they did was kill office workers.

So these Deep State believers who think Hillary Clinton chomps on kids in a ritual satantic mass will one day get frustrated that none of what they thought would happen has happened and they age gonna rampage. If one goes after Clintons, Obamas and Soros or whomever they have the means and some have the Secret Service at their disposal so no one is going to be able to get to them. But office workers...somewhere in DC where they believe the Deep State functions those will be the people who are killed. Of course the Deep Staters will join with the False Flaggers and believe it was a drill and, again, demand that bodies be dug up to "prove" their stupid and dangerous delusions are wrong.
User avatar
In Manus Manus
Posts: 20666
Joined: Mon Mar 08, 2004 6:29 am
Location: New York City

Re: Seth Rich

Postby kinderdigi » Thu Dec 13, 2018 6:16 pm

"9/11 the Terries believed that the Pentagon was the seat of the US military and they could take it out and that the WTC was the seat of US capitalism and they could take it out.."

I'm not sure what they believed but, I would say symbolic fixtures was/is their target.

I was in San Francisco for some work a couple of years back. The work involved coordinating with a big city agency. The agency, who oversaw the project, wanted me cleared and in contact with, the FBI, the Coast Guard, and the Longshoreman's Union. I ignored the FBI but, set up meetings with the CG and a Union guy. Those two organizations were both very friendly and helpful with info and clearances.

In working with the CG, the local Commander became my contact. Over time our conversations became casual and non official. I was working both near and on the water for the project. We set up a list of proceedures that I followed. As an example, if I was to be within a few hundred feet of a bridge anchor point, I would give the CG 24 hours notice, stuff like that. As we were friendly, he asked a favor, he wanted me to record the response time of my first CG visit. I would be checked on quickly if near a bridge..Golden Gate or SF Bay. If i wasn't visited within 15 minutes, he wanted a phone call.

He told me a large number of "attempts" had been prevented on the GG Bridge. The most recent (old news) was a Bobtail Truck loaded with explosives. This truck was stopped on the highway just north of the bridge.

The other big target in SF is The Trans-America Building. It's unique architecture makes it a target. These are symbols, not the seats of functioning government. The Pentigon certainly houses a lot of Mil stuff. And the Twin Towers had lots of money people working in them, but they are valued by the bad guys as symbols i think. That's why they destroy monasterys and churches and break-up statues of religious significance. If hindering the money world was their want, the Federal Reserve or Stock Exchanges would be targeted.
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Fri Dec 14, 2018 12:02 pm

Now Massive Plumes Of Chaff Are Lighting Up Radar Over Maine and Florida Too
The clouds of radar-reflective countermeasures appeared over the states just two days after a similar mysterious incident occurred in the Midwest.
By Joseph TrevithickDecember 12, 2018

Two days after a huge cloud of chaff lit up weather radar covering portions Illinois, Indiana, and Kentucky, as well as social media, more plumes have now appeared over Maine and Florida. We have no official confirmation as of yet, but the formations look very similar in composition to the one that developed in the Midwest.The first reports of the apparent chaff plumes in Maine began to appear on social media around 5:30 PM EST on Dec. 12, 2018. Early on, four distinct clouds were visible, but these had blended together into a larger blob with a peak length of more than 100 miles by 7:45 PM. The huge cloud was moving southwest and looked like it could easily drift into New Hampshire and beyond.

So far, there are next to no other details available for any of these new incidents. The official Twitter account for the National Weather Service station between Gray and Portland, Maine issued an assessment that the formations in that area on the radar were very likely chaff, but there have been no reports as to what type of aircraft might have been involved.

The Maine Air National Guard has just one flying unit, the 101st Air Refueling Wing, which flies KC-135R Stratotankers and is based at Bangor Air National Guard Base in the city of the same name, situated to the northeast of where the plumes first developed. However, the KC-135Rs are not equipped to dispense chaff.
As such, another type of aircraft from another state's Air National Guard, or an active U.S. military unit, released the chaff over Maine. This was the case in with the chaff cloud that first appeared over Illinois on Dec. 10, 2018, and later drifted into Indiana and Kentucky. As it turned out, a West Virginia Air National Guard C-130H Hercules airlifter flying through the area was responsible.
In that case, the initial release was over a Military Operations Area (MOA), a piece of airspace U.S. military aircraft can set aside for training purposes. This appears to have been the case again in Maine, with the chaff seeming to develop first over the Condor 1 and 2 MOAs.
Southern Florida and the Florida Keys are full of various active and reserve component units that conduct regular training exercises in the area, so plumes in this region are not particularly uncommon. The Gulf of Mexico is also a massive playground for military combat aircraft to conduct air training events and has some of the biggest MOAs anywhere in the country. Another set of chaff clouds were recently visible in the same general area on Nov. 28, 2018, as seen below.
Still, it seems unusual for so many large chaff clouds to keep popping up in so many places around the country in such a short timespan. They've all generally been unusually persistent, too, typically lasting multiple hours, before finally disappearing from the radar screens.
We have already reached out to the National Guard Bureau, but at the time of writing, we have not received any additional information about this new incident over Maine. We're reaching out to additional commands regarding the plume in Florida, as well.
We will be sure to update this story if and when new details become available.
Contact the author: ... lorida-too ... 0003898369 ... 7450818560
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Fri Dec 14, 2018 12:20 pm

A West Virginia Air Guard C-130H Was Responsible For Massive Chaff Cloud Over Midwest
The crew released all of the chaff cartridges on board as they returned to base from a training exercise on the West Coast as a safety precaution.
By Joseph Trevithick and Tyler RogowayDecember 12, 2018

A West Virginia Air Guard C-130H Was Responsible For Massive Chaff Cloud Over Midwest
The crew released all of the chaff cartridges on board as they returned to base from a training exercise on the West Coast as a safety precaution.
By Joseph Trevithick and Tyler RogowayDecember 12, 2018
The War Zone130th Airlift WingC-130chaffCountermeasuresIllinoisIndianaKentuckymysteriesnational guardRed Hills MOAtrainingUSAFWest VirginiaWest Virginia Air National Guard

A search for more information about a massive cloud of chaff that recently appeared over southern Illinois before drifting into Indiana and Kentucky has led The War Zone to speak with Air National Guard public affairs officers across four states, as well as the National Guard Bureau headquarters in Washington, D.C. We can now confirm that a C-130H Hercules from the West Virginia Air National Guard was behind the mysterious incident.
On Dec. 10, 2018, the C-130H from West Virginia's 130th Airlift Wing was returning to its home station at McLaughlin Air National Guard Base in Charleston after taking part in a training exercise at an unspecified location on the "West Coast," according to Captain Holli Nelson of the West Virginia Air National Guard. The plane needed to dump the excess chaff in its countermeasures dispensers before landing as a safety precaution.

Huge Chaff Cloud That Lit Up Radars As It Drifted Across The Midwest Remains A Mystery
By Joseph Trevithick and Tyler Rogoway
Posted in The War Zone
NKC-135R Tanker From Edwards AFB Flew This Peculiar Night Mission Over Area 51
By Tyler Rogoway
Posted in The War Zone
We don't know what drill the Hercules had participated in, but it may have been coming back from a recent Joint Forcible Entry Exercise (JFEX). This is a regularly scheduled large force employment exercise that brings dozens of airlifters and other aircraft together over the sprawling Nevada Test and Training Range (NTTR) in support of the U.S. Air Force Weapons School at Nellis Air Force Base.

Regardless, as it passed over the Red Hills Military Operations Area (MOA), the crew requested and received permission from air traffic controllers at Indianapolis Center to drop the chaff. MOAs are specially designated pieces of airspace across the United States that U.S. military units can activate in order to conduct training and other activities.

Even within MOAs, the Federal Aviation Administration does put restrictions on the use of chaff because of the potential, albeit relatively low risk that it could interfere with civil and commercial air traffic control and weather radars. There is no indication that the countermeasures the C-130 released over Red Hills interfered in any way with other aviation activities in the region. The Hercules itself continued on to McLaughlin without incident.

A map showing the boundaries of the Red Hills Military Operations Area.
At the time of writing, the West Virginia Air National Guard had not yet been able to confirm exactly how many chaff cartridges the C-130H employed in total. C-130 types carry multiple countermeasures dispensers, depending on their exact configuration, each of which can hold dozens of individual cartridges. On an actual operation, the aircraft can carry a mix of flares and chaff in order to best defend against infrared-homing and radar-seeking missiles depending on the expected threats.
The large-scale release could help explain why the resulting plume was so dense and long and maybe why it persisted for more than 10 hours. Specific weather conditions would have also been necessary to keep the material airborne as it floated into Indiana and Kentucky.
We also don't know exactly why the plane needed to jettison the chaff. There may not have been a de-arm crew available for when the C-130 was scheduled to arrive at McLaughlin or there might have been an indication of a technical fault in the countermeasures system. In addition, releasing it at 10,000 feet, well below the C-130's cruising altitude also seems odd. Maybe the crew descended to a lower altitude for the operation in hopes the chaff would make it to the ground faster.

Countermeasures dispensers on a U.S. Air Force C-130 aircraft.
It's also unclear clear why the crew chose Red Hills as the drop site, either, if the C-130 was traveling all the way from the western United States. There are many of other MOAs in the nearly 2,000 intervening miles between the Pacific Ocean and this patch airspace over Illinois and Indiana.
We will continue to keep you updated as more details about this incident become available.
Contact the author:

USAF Is Jamming GPS In The Western U.S. For Largest Ever Red Flag Air War Exercise
The use of the mysterious jamming technology will impact the navigation of aircraft operating as far away from Nevada as Colorado. ... er-midwest
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Sun Dec 23, 2018 5:46 am

BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Sat Dec 29, 2018 4:03 am

Soldiers In Texas Are Putting The Army's Newest Marksman Rifle Through Its Paces
The new weapons reflect the service's latest attempt to help infantry squads and other small units take on the enemy at longer ranges.
By Joseph TrevithickDecember 27, 2018
The War Zone5.56x45mm7.62x51mmbattle riflescarbinesCSASSHeckler and KochHK417intermediate cartridgesM110A1M4 CarbineNext Generation Squad WeaponRiflesSDM-RSmall Armssound suppressorsSquad Designated Marksman RifleUS ArmyXM1158

US Army

U.S. Army personnel at Fort Bliss in Texas are conducting a limited user trial of the service’s new 7.62x51mm Squad Designated Marksman Rifle, or SDM-R. This is the latest in a series of efforts to give individual infantry squads, as well as scout and combat engineering units, the ability to more precisely engage targets at longer distances.
The service revealed the ongoing evaluations on Dec. 27, 2018, in a year-end wrap-up of developments associated with its new Futures Command, which includes a team dedicated to improving the lethality of individual soldiers. The first batch of nearly 120 rifles had gone to the 82nd Airborne Division and other select units in September 2018.

“The Army's current rifle technology is most effective below the 300-meter [nearly 330 yards] range,” U.S. Army Captain Weston Goodrich, the Assistant Program Manager for Soldier Weapons at the Program Executive Office Soldier, said in an official interview in June 2018. Trained snipers, however, are not typically expected to engage targets less than 650 yards away. The SDM-R is supposed to help bridge that gap.

The rifle is a variant of the Hecker and Koch HK417, which is itself a derivative of the AR-15/M16 series that fire the 5.56x45mm round. The German-headquartered firm also makes a rifle, the increasingly popular HK416, in the smaller caliber.

Heckler and Koch
The Army's new 7.62mm SDM-R.
The German-designed weapons dispense with the direct impingement operating mechanism of the earlier rifles, wherein every shot sends propellant gas carrying unburnt gunpowder and other particulate matter into the action, in favor of a physical gas piston. This largely eliminates concerns about the buildup of debris inside the main workings of the rifle that could cause it to jam.
The SDM-Rs have an adjustable length buttstock and come standard with a Sig Sauer Tango6 scope, which adjustable from 1x "magnification," or more accurately no magnification, up to 6x. The entire rifle weighs in at just shy of 10 pounds empty. This is around two and a half pounds heavier than the Army’s standard issue 5.56mm M4 carbine with a loaded magazine, but without any other accessories.
Pictures of the SDM-R show it with two different kinds of handguards, one featuring the Magpul M-Lok accessory attachment system and another with the competing VLTOR Weapon Systems KeyMod system. Soldiers could use either type to quickly add flashlights, visible and infrared aim lasers, night vision or thermal optics, and other devices to their rifles.
The rifles will also come with suppressors and the same images show two different possible types, the OSS Suppressors Helix-series HX-QD 762 and the earlier HX 762 from the same company. OSS has discounted the latter type, suggesting that the HX-QD 762 could be the primary suppressor for the SDM-R now.

However, it’s likely that the user evaluation at Fort Bliss, as well as feedback from other units that previously received the weapons, will inform the final, standard issue configuration. The U.S. Marine Corps went through similar comparative testing of accessories in developing its new 5.56mm M38 designated marksman rifle.
The Marines actually looked at the 5.56mm version of the OSS HX suppressor and determined that it had superior performance to the existing Knight's Armament Company (KAC) QDSS-NT4, but was difficult to install and remove, as well as maintain in the field. That feedback may have contributed to OSS’ decision to develop of the new, quick-detach model.

A US Marine fires an M38 designated marksman rifle with a now-discontinued OSS Suppressors HX 556 sound suppressor during a test.
The choices the Army makes with regards to the accessories on the SDM-R could influence the final configuration of the service’s Compact Semi-Automatic Sniper System (CSASS), as well. This will also be an HK417-based rifle, but will be set up for use by actual sniper teams at longer ranges. Also known as the M110A1, the CSASS is set to begin its own limited user trials in 2019.
“The Army is working to equip each squad with a predetermined amount of marksman rifles,” Captain Goodrich said in his June 2018 interview, but did not say what that number would be. Adding one or two of the weapons to each 9-person infantry squad would improve the ability of even these small formations to respond to certain threats directly without necessarily having to call in outside support.

Joseph Trevithick
Heckler and Koch's M110A1 CSASS rifle, also equipped in this case with an OSS Suppressors HX 762, which is no longer in production.
Studies have consistently shown that Army infantry squads and other small dismounted units are often out-ranged by opponents with their own rifles and machine guns in the NATO standard 7.62x51mm and Russian 7.62x54mm calibers. A weapon such as the SDM-R would offer an additional option for engaging opponents behind cover or other barriers, such as a window or the door of a light vehicle, which might defeat smaller 5.56mm rounds, especially at extended ranges.
The 7.62mm SDM-R will also give small units added armor piercing capabilities over their existing 5.56mm weapons, ,something the Army has said it is becoming increasingly concerned about. The service canceled plans to equip some squads entirely with some form of 7.62mm rifle to address this threat earlier in 2018. Instead, the new marksman rifles will be able to use the equally new XM1158 armor-piercing round.
The Army had tried to field SDM-Rs in the past using modified M16A2 and A4 rifles equipped with new optics, as well as specially configured M4 carbines, in the mid-2000s. These weapons suffered from the limited performance of even purpose-built “long-range” 5.56mm ammunition in the designated marksman role.

US Army
US Army soldiers with M16-based 5.56mm SDM-Rs in Iraq in 2005.
The service ultimately began issuing rebuilt, modified Cold War-era 7.62mm M14 rifles. Unfortunately, those weapons proved difficult to maintain given the age of the base weapons and the lack of commonality with any other fielded small arms.
The SDM-R may not be a long-term solution to demands for increased range and armor penetration capabilities within the Army’s small units, though. The weapons are relatively lightweight for their type – about the same as that of a standard infantry M14, which had no scope or other accessories – but 7.62mm ammunition weights significantly more than 5.56mm and is physically bulkier.

US Army
A US Army soldier with a rebuilt M14 Enhanced Battle Rifle.
The Army is already investigating polymer- or partially polymer-cased ammunition to help reduce weight, but there’s no way around the size of the rounds. These factors impact how many extra rounds an individual can carry, as well as the weight and dimensional requirements for shipping larger amounts of ammunition to units in the field.
The service is separately working on a program to develop an entirely new family of small arms that all use a so-called "intermediate cartridge" in 6.8mm. The goal is to hopefully provide ballistic performance closer to 7.62mm with logistical requirements more in line with 5.56mm. But this project, known as the Next Generation Squad Weapon (NGSW) program, isn’t set to get fully funded until at least 2020.
In the meantime, the Army expects weapons like the new SDM-Rs to help give small units an added punch against better-protected opponents at longer ranges.

Photos at the website
Contact the author: ... -its-paces
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Sat Jan 05, 2019 1:01 pm

China's NYC-Sized 'Earthquake Warning System' Array Sounds More Like A Way To Talk To Submarines

With the largest submarine force on Earth, the Chinese increasingly need long-range communications options that don't require the boats to surface.

China has reportedly constructed a massive extremely low frequency, or ELF, antenna array the size of New York City, as well as a smaller system and associated data processing and signal transmission facilities at various locations throughout the country. Officially, the entire system, known as Project Wireless Electromagnetic Method or Project WEM, will support the Chinese resource extraction industry and provide early warning about potential earthquakes. However, there is significant evidence that its primary function may actually be to provide long-range communication with Chinese submarines, a critical capability to support its growing number of nuclear-armed ballistic missile boats.
The South China Morning Post provided the update on Project WEM on Dec. 31, 2018. The antenna arrays and other sites have been more than decade in the making, with the program being a major component of China’s 11th Five Year Plan, which began in 2006. However, China has been especially secretive about the project and has not officially disclosed the location of the main array. Available information points to the bulk of Project WEM being situated within the country’s central Huazhong region, according to the Post.
ELF radio waves have a proven ability to penetrate deep below water and the ground. In principle, this means that a huge antenna array could be useful in detecting natural resources underground, such as precious metals or fossil fuels. Mining companies already employ ground-penetrating radar and laser imaging systems for similar purposes.

It might also be possible to use such a system to monitor movement below the Earth’s surface. This, in turn, might provide early indications of impending earthquakes, which are not uncommon in many areas of the country. The deadliest known earthquake of all time occurred in China in the 16th century, killing between 820,000 and 830,000 people based on Ming Dynasty records.

AP Photo/Mark Schiefelbein
A worker at a Chinese coal mine in Inner Mongolia.
There is very real scholarship on ELF’s application in both of these civilian roles and Chinese researchers have published work on these topics. Project WEM’s funding also came via government budgets for civilian projects, according to the Post.
But, at the same time, there is significant information that suggests that any civilian applications may be of secondary importance to the Chinese government. The ability of ELF radio waves to penetrate hundreds of feet of water has long made them attractive as a way of communicating with submerged submarines.
By comparison, very low frequency, or VLF, waves can only make it down to around 100 feet below water at best. This means that submarines have to get relatively close to the surface or deploy a towed antenna to use these types of communications systems. There is a risk that doing so could give away their position and make them vulnerable to opposing anti-submarine forces.

A US Navy chart showing various submarine communications options and their relative risk. The "bell" icon for VLF/ELF "stealth" transmissions reflects that these are one-way only "bell ringers" typically used to alert a submarine that it needs to find a safe place to get closer to the surface to receive additional information.
One of the major benefits of modern submarines, especially nuclear-powered types and boats with advanced, non-nuclear air-independent propulsion systems, is their ability to remain largely hidden underwater for extended periods of time. This gives them inherent deterrent qualities. It also makes them well suited to covertly collecting intelligence or, in the case of subs armed with conventional land attack or nuclear-capable missiles, to quietly positioning themselves for short- or no-notice strikes during a crisis.
So, it's not necessarily surprising that China’s 724 Research Institute, part of the state-run China Shipbuilding Industry Corporation (CSIC), a major supplier of communications and other electronics to the People’s Liberation Army Navy (PLAN), has been responsible for the Project WEM construction. Lu Jianxun, the project’s chief scientist, is also publicly involved in advanced communications work for the PLAN, the Post reported.

Qiao Tianfu/Color China Photo/AP
A Chinese Type 091 nuclear-powered attack submarine.
CSIC President Hu Wenmin visited the site in May 2017. He “expressed his appreciation for the construction of the WEM project and put forward opinions and requirements for the follow-up development of the project and the technical application in related fields,” a subsequent statement from the company read.
The Post also published a translated map showing the various components of the Project WEM system, which it said came from the PLAN. In addition to the huge array in central China, there is also reportedly near the county’s South China Sea coastline, which would put it relatively close to the country’s main submarine base on Hainan Island.

PLAN via South China Morning Post
A map reportedly showing the general location over the various Project WEM components.
“Though I am involved in the project, I have no idea where it is. It should be up and running by now,” Chen Xiaobin, a researcher with the Institute of Geology, China Earthquake Administration, told the Post, indicating a level of security around the project that seems excessive for its stated civilian aims. “This facility will have important military uses if a war breaks out.”
Unfortunately, ELF systems are notoriously inefficient and require large sites in very specific positions to provide any reasonable communications capability. They are also limited in the amount of information they can carry and how fast they can send it out, transmitting text-only messages extremely slowly. Since submarines don’t have the space required for their own ELF transmitters, these one-way alerts often simply tell the boat’s crew to get safely into position to receive actual instructions.
Only three other countries – the United States, Russia, and India – have or have had ELF submarine communications sites. The U.S. Navy shut down the last of its arrays in 2004, officially because they were obsolete in light of improvements to very low frequency, or VLF, communications systems. The Navy's fleet of 16 E-6B Mercury strategic communications aircraft, together with ground-based VLF stations, presently provide the U.S. military's core means of communicating with deployed submarines.

A picture of the main building at the U.S. Navy's Clam Lake ELF transmitter facility in 1982.
The U.S. military still uses VLF waves to transmit so-called “Emergency Action Messages,” a key part of the nuclear strike process, which you can read about in more detail here. The Defense Advanced Research Project Agency (DARPA), the Pentagon’s top research and development arm, among others, has also been exploring the potential for further improved laser- and space-based communication options.
Still, for China, which has the single largest submarine force on the planet, being able to communicate with those boats without them needing to surface or almost surface is essential capability. China had previously built a super low frequency, or SLF, array in 2009 and subsequent demonstrated an initial capability to communicate with submerged submarines over long distances.
ELF offers an additional way to at least alert any boats deep below the sea that there are new orders or other information that they need to receive. It also provides an extremely long-distance communication capability, which will be valuable for the PLAN as it continues working to grow from a regional force into a global one.

More importantly, though, Project WEM could be essential for the Chinese government’s development of its nuclear-armed submarine-launched ballistic missile (SLBM) deterrent capability. In that case, the ability of the ballistic missile submarines, or SSBNs, to remain underwater for long periods of time is vital to shielding them from detection and attack and ensuring they are able to carry out their mission if necessary.
At present, the Chinese military does not have anywhere near the nuclear command and control infrastructure that the United States does in the air and on the ground. One or more large ELF arrays would be a cost-effective means of expanding communications options in the near term with regards to the country's SSBN force, which is growing in size and scope.
In 2018, information emerged that pointed to China’s submarine-based nuclear deterrent being far more mature than publicly understood. In November 2018, one of the PLAN’s Type 094 Jin-class nuclear ballistic missile submarines reportedly conducted the first test flight of the solid fuel JL-3 submarine-launched ballistic missile, which has an estimated range of close to 5,600 miles. The existing JL-2 can only hit targets around 4,350 miles away.
That same month, satellite imagery appeared to show that the PLAN has four operational Type 094s and may have two more under construction. China has not publicly confirmed how many Jin-class boats it has or is expecting to produce.

“China’s four operational Jin-class SSBNs represent China’s first credible, sea-based nuclear deterrent,” the U.S. military said in the 2018 edition of its annual China Military Power report. “China’s next-generation Type 096 SSBN, reportedly to be armed with the follow-on JL-3 SLBM, will likely begin construction in the early-2020s.”
For any expanded Chinese submarine-based nuclear deterrent force to be credible, it will increasingly require sufficient communications and command and control architecture to go with it. The timeline of Project WEM, which began the same year that the first Type 094 appeared in public satellite imagery, is well in line with the kind of developments one would expect to see. Placing the main array in central China also makes it more difficult for opponents to target it during a crisis.
It remains to be seen whether or not China continues to employ ELF communications in the long run, or ultimately abandons it as the United States has done in favor of other options. But Project WEM that the country is willing to make significant investments in the technology now to improve its ability to communicate with and control its vast and growing submarines forces.
Contact the author: ... lk-to-subs
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Wed Jan 09, 2019 3:52 am


New York

El Chapo Trial: How a Colombian I.T. Guy Helped the F.B.I. Take Down the Kingpin

The trial of Joaquín Guzmán Loera, the Mexican drug lord known as El Chapo, took a turn on Tuesday when jurors heard numerous secretly recorded phone calls by the kingpin.

Stephanie Keith for The New York Times
By Alan Feuer
Jan. 8, 2019

In February 2010, an undercover F.B.I. agent met in a Manhattan hotel with a Colombian info-tech expert who had been the target of a sensitive investigation. The I.T. specialist, Cristian Rodriguez, had recently developed an extraordinary product: an encrypted communications system for Joaquín Guzmán Loera, the Mexican drug lord known as El Chapo.
Posing as a Russian mobster, the undercover agent told Mr. Rodriguez he was interested in acquiring a similar system. He wanted a way — or so he said — to talk with his associates without law enforcement listening in.
So began a remarkable clandestine operation that in a little more than a year allowed the F.B.I. to crack Mr. Guzmán’s covert network and ultimately capture as many as 200 digital phone calls of him chatting with his underlings, planning ton-sized drug deals and even discussing illicit payoffs to Mexican officials. The hours of Mr. Guzmán speaking openly about the innermost details of his empire not only represented the most damaging evidence introduced so far at his drug trial in New York, but were also one of the most extensive wiretaps of a criminal defendant since the Mafia boss John Gotti was secretly recorded in the Ravenite Social Club.
The existence of the scheme — and several of the phone calls — were revealed for the first time Tuesday as Stephen Marston, an F.B.I. agent who helped to run the operation, appeared as a witness at Mr. Guzmán’s trial. In a day of testimony, Mr. Marston told jurors that the crucial step in the probe was recruiting Mr. Rodriguez to work with the American authorities.

In a daring move that placed his life in danger, the I.T. consultant eventually gave the F.B.I. his system’s secret encryption keys in 2011 after he had moved the network’s servers from Canada to the Netherlands during what he told the cartel’s leaders was a routine upgrade.
Since the trial began in November in Federal District Court in Brooklyn, the prosecution has more or less presented typical evidence: surveillance photos, ledgers documenting drug deals and testimony from a sprawling cast of Mr. Guzmán’s former lieutenants, suppliers and distributors. But the plot to infiltrate the cartel’s communications was the first time prosecutors disclosed that they also employed high-tech cloak-and-dagger methods.

The calls themselves were devastating.
In a series of calls from April 2011, Mr. Guzmán discouraged one of his enforcers, Orso Iván Gastélum Cruz, from fighting the Mexican police. “Don’t be chasing cops,” Mr. Guzmán scolded him. “They’re the ones who help.”
Minutes later, when Mr. Cruz, known as Cholo Ivan, complained that the officers should respect him and “behave,” Mr. Guzmán tried to soothe him. “You already beat them up once,” he said. “They should listen now.”

In one secretly recorded phone call, Mr. Guzmán told an employee of his cartel, “Don’t be chasing cops. They’re the ones who help.”

United States Attorney's Office, Eastern District of New York

In one secretly recorded phone call, Mr. Guzmán told an employee of his cartel, “Don’t be chasing cops. They’re the ones who help.”
United States Attorney's Office, Eastern District of New York
“Take it easy with the police,” Mr. Guzmán counseled.
“Well,” Mr. Cruz answered, “you taught us to be like a wolf.”

In another set of calls, Mr. Guzmán discussed sending a cartel operative nicknamed Gato to bribe a new commander from the federal police.
“Is he receiving the monthly payment?” the kingpin asked.
“Yes,” said Gato, “he’s receiving the monthly payment.”
Then, in an astonishing moment, Gato handed the phone to the commander himself.
In the recording, Mr. Guzmán told the man that Gato was from “the company” and asked the commander to “take care of him.”
“Whatever we can do for you, you can count on it,” Mr. Guzmán said.
The commander responded: “You have a friend here.”
The jury has already heard some of the intercepted calls — albeit without knowing where they came from or how they were recorded. Last month, prosecutors played a call in which Mr. Guzmán was heard negotiating a six-ton cocaine deal with a representative from a left-wing Colombian guerrilla group. In the recording, Mr. Guzmán haggled over pricing and insisted on dispatching a “technician” to inspect the product’s quality before sending the guerrillas their initial payment of $50,000.
One of Mr. Guzmán’s Colombian suppliers, Jorge Cifuentes, who introduced the kingpin to the I.T. expert, testified last month that Mr. Rodriguez had promised to arrange secure communications for what amounted to the entire cartel’s leadership. His system operated on VoiP, or voice over internet protocol, Mr. Marston said on Tuesday, and was accessible only to those within the network. According to Mr. Cifuentes, Mr. Guzmán was able to sign in through Wi-Fi even from his hide-outs in the Sierra Madre mountains.
But F.B.I. agents were able to listen to calls a few days after Mr. Guzmán made them, Mr. Marston said. From April 2011 to January 2012, the American authorities captured a total of 1,500 calls with the help of Dutch officials. Those that were believed to have been placed by Mr. Guzmán were authenticated, Mr. Marston told the jurors, by comparing the high-pitched, nasal voice on the calls with other recordings of the kingpin, including a video interview he gave to Rolling Stone in October 2015.

Working undercover for nearly two years apparently took a heavy toll on Mr. Rodriguez.
Last week, prosecutors filed a motion describing how a witness in the case — likely Mr. Rodriguez — had suffered “a nervous breakdown” in 2013 because of “the stress” of working for Mr. Guzmán.
There was another reason for his mental collapse, prosecutors noted. After he left Mr. Guzmán’s employ the cartel “attempted to locate” the witness, the prosecutors wrote, suspecting him of having cooperated with American federal agents. ... trial.html
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Thu Jan 10, 2019 2:18 pm

Part 1 Organizing complexity
1 Divide and conquer 3 2 Abstraction 27
The first solution

An approximate analysis is often more useful than an exact solution! This counterintuitive thesis, the reason for this book, suggests two questions. One question is: If science and engineering are about accuracy, how can approximate models be useful? They are useful because our minds are a small part of the world itself. When we represent a piece of the world in our minds, we discard many aspects – we make a model – in order that the model fit in our limited minds. An approximate model is all that we can understand. Making useful models means discarding less important information so that our minds may grasp the important features that remain. This perhaps disappointing conclusion leads to a second question: Since every model is approximate, how do we choose useful approximations? The American psychologist William James said [10, p. 390]: ‘The art of being wise is the art of knowing what to overlook.’ This book therefore develops intelligence amplifiers: tools for discarding unimportant aspects of a problem and for selecting the important aspects. These reasoning tools are of three types: 1. Organizing complexity − Divide and conquer − Abstraction 2. Lossless compression − Symmetry and conservation − Proportional reasoning − Dimensions 3. Lossy compression
2010-05-13 00:43:32 / rev b667c9e4c1f1+
− Easy cases − Probabilistic reasoning − Lumping − Spring models The first type of tool helps manage complexity. The second type helps remove complexity that is merely apparent. The third type helps discard complexity. With these tools we explore the natural and manmade worlds, using examplesfromdiversefieldssuchasquantummechanics, generalrelativity, mechanical engineering, biophysics, recreational mathematics, and climate change. This diversity has two purposes. First, the diversity shows how a small toolbox can explain important features of the manmade and engineered worlds. The diversity provides a library of models for your own analyses.
Technique Example
Second, the diversity separates the tool from the details of its use. A tool is difficult to appreciate abstractly, without an example. However, if you see only one use of a tool, the tool is difficult to distinguish from the example. An expert, familiar with the tool, knows where the idea ends and the details begin. But when you first learn a tool, you need to learn the boundary.
Ananswerisasecondexample. Totheextentthat the second example is similar to the first, the tool plus first use overlaps the tool plus second use. Theoverlapincludesapenumbraaroundthetool. The penumbra is smaller than it is with only one example: Two uses delimit the boundaries of the tool more clearly than one example does.
7 7
7 7
Preface vii
2010-05-13 00:43:32 / rev b667c9e4c1f1+
More clarity comes using an example from a distantfield. Thepenumbrashrinks,whichseparates the tool from examples of its use. For example, using dimensional analysis in a physics problem and an economics analysis clarifies what part of the illustration is specific to physics or economics and what part is transferable to other problems. Focus on the transferable ideas; they are useful in any career! This book is designed for self study. Therefore, please try the problems. The problems are of two types. The first type are problems marked with a wedge in the margin. They are breathers during an analysis: a place to develop yourunderstanding by workingout the next steps in an analysis. Thoseproblemsareansweredinthesubsequenttextwhereyoucancheck your thinking and my analysis – please let me know of any errors! The second type of problem, the numbered problems, give practice with the tools, extend a derivation, or develop a useful or enjoyable model. Most numbered problems have answers at the end of the book. Ihopethatyoufindthetools,problems,andmodelsusefulinyourcareer. And I hope that the diversity of examples connects with and aids your curiosity about how the world is put together. Bon voyage!

file:///D:/Math%20Interrogation%20book-draft%20.pdf ... insfin.pdf
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Sun Jan 13, 2019 6:28 am

kinderdigi wrote:9-11 hijackers
Nicholas Cruz
Cesar Sayoc
Scott Israel
David Hogg
Debbie Wasserman Schultz
Brenda Snipes

Who did I forget ?

All from Boward County FL

Stoneman Douglas High School shooting ... l_shooting

WATCH LIVE: Gov. Ron DeSantis Suspends Broward County Sheriff Scott Israel
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby kinderdigi » Mon Jan 14, 2019 2:37 pm

The U.S. Government Has Amassed Terabytes of Internal WikiLeaks Data
7 mins read

Photo: Frank Augstein (AP)
Late last year, the U.S. government accidentally revealed that a sealed complaint had been filed against Julian Assange, the founder of WikiLeaks. Shortly before this was made public, the FBI reconfirmed its investigation of WikiLeaks was ongoing, and the Wall Street Journal reported that the Department of Justice was optimistic that it would be able to extradite Assange. Soon after, portions of sealed transcripts leaked that implicate WikiLeaks and Assange in directing hackers to target governments and corporations. The charges against Assange have not been officially revealed, though it’s plausible that the offenses are related to Russian hacking and the DNC emails.
The alleged offenses in the complaint notwithstanding, the government has an abundance of data to work with: over a dozen WikiLeaks’ computers, hard drives, and email accounts, including those of the organization’s current and former editors-in-chief, along with messages exchanged with alleged Russian hackers about DNC emails. Through a series of search warrants, subpoenas, equipment seizures, and cooperating witnesses, the federal government has collected internal WikiLeaks data covering the majority of the organization’s period of operations, from 2009 at least through 2017.

The filing that committed a copy and paste error revealing charges against Assange.
In some instances, the seized data has been returned and allegedly destroyed, such as in the case of David House, a technologist and friend of Chelsea Manning when she famously became a source for WikiLeaks. In others, the seized materials include communications between WikiLeaks and their sources. Some of these discussions show WikiLeaks discussing their other sources and specific identifying details about them.

A copy of a chat log between Chelsea Manning and a WikiLeaks staff member IDed as Assange by government prosecutors and witnesses.
Other seizures gave authorities a deeper view of the internal workings of WikiLeaks, including one of the earliest known seizures of WikiLeaks-related data, executed on December 14, 2010, when the messages and user information of several WikiLeaks-linked Twitter accounts were ordered. This search-and-seizure order included direct messages associated with WikiLeaks and its founder, former Army private first class and WikiLeaks source Chelsea Manning, WikiLeaks editor Rop Gongrijp, former WikiLeaks associate Jacob Appelbaum, and former WikiLeaks associate and Icelandic MP Birgitta Jonsdottir, between November 1, 2009, and the order’s execution.

A couet order for information relating to people associated with WikiLeaks.
On January 4, 2011, a sealed order filed in the Eastern District of Virginia requested all emails, address book, subscriber information, and other account information associated with Appelbaum’s email address, and another order would target his internet traffic. Appelbaum was a friend and confidant of Assange as well as a WikiLeaks volunteer. In 2010, Appelbaum was known as “the American WikiLeaks hacker,” and he was, at that time, referred to as WikiLeaks’ only known American member. In a private chat in 2015, WikiLeaks described Appelbaum as being “sort of” part of the group, though following multiple accusations of sexual abuse, the group publicly distanced itself from him. The emails obtained by the government extended from November 2010 at least through January 2011. The timing of the government’s acknowledgment of the order, along with other similar orders, suggest that the monitoring of the account may have continued through late 2014, when it and several orders were made public.

A copy of a court order for information relating to Jacob Appelbaum, a hacker who worked with WikiLeaks (now credibly accused of multiple sexual assaults).
Publicly released and leaked documents from Assange and his legal team allege that several laptops and hard drives belonging to the organization were intercepted by an intelligence agency during this time period. According to an affidavit from Assange, “three laptops ... assorted electronics [and] additional encrypted hard drives” were taken along with his suitcase in late September 2010. Assange’s legal team produced several additional affidavits and supporting documents detailing the existence and disappearance of the suitcase. The suitcase contained at least five hard drives, all of which were encrypted, according to Assange. However, the government has had eight years to guess or recover the passwords or break the encryption on the hard drives. Several other drives, numerous emails, and at least one cooperating witness may have aided in the process.

Affadavit from Julian Assange.
In mid-2011, the FBI had developed a major source who would become at least their second information with an eye into WikiLeaks’ operations. Soon after the arrest and cooperation of Hector Xavier Monsegur, a.k.a. Sabu, his hacking group (LulzSec) made contact with WikiLeaks. Sabu and LulzSec would become some of WikiLeaks’ most significant sources. The Syria files and Global Intelligence files LulzSec provided WikiLeaks increased their number of publications tenfold and still account for roughly half of their total number of publications. Communications between Sabu and WikiLeaks were monitored by the FBI. And some of the group’s communications with others were later seized in their arrest or turned over by Sigurdur Thordarson, a WikiLeaks volunteer who became an informant for the FBI that August.

A section from the sentencing document for “Sabu.” It was later ID’d by WikiLeaks as about them.
In addition to briefing the FBI in a series of meetings, Thordarson reportedly provided them with thousands of pages of WikiLeaks chat logs. Further, in March 2012, Thordarson allegedly provided the FBI with eight WikiLeaks hard drives containing up to 1020GB of data, according to a purported FBI document. Officials have not confirmed the authenticity of the document, though the amount of data provided is corroborated by additional sources. In an interview with Ars Technica, Thordarson claimed that Icelandic authorities had seized an additional 2 TB of WikiLeaks-related data from him, which he assumed was then shared with the U.S. American and Icelandic authorities had previously cooperated on Thordarson’s case and portions of the WikiLeaks investigation. According to leaked letters from WikiLeaks’ legal team, at least some of the hard drives had belonged to Assange. Thordarson’s debriefings and the hard drives of up to 3 TB of data may have contained the decryption keys or passwords needed to decrypt the hard drives Assange alleged had been seized earlier.

A receipt given to Sigurdur Thordarson from the FBI for WikiLeaks hard drives.
There are several hints as to the contents of these drives. According to the affidavit from Assange, the information on the hard drives included, in addition to the possible staff emails, “chat communications ... copies of passports [and] video footage taken in secret.” Following an Associated Press article based off of a cache of “WikiLeaks emails, chat logs, financial records, secretly recorded footage and other documents” from within the organization, WikiLeaks alleged that the cache was the same that had been provided to the FBI.
In October 2011, amidst Thordarson and Sabu’s tenure as cooperating witnesses, American authorities issued a search warrant for the contents of WikiLeaks volunteer Herbert Snorrason’s Gmail account. The warrant requested all of the account’s information, “including stored or preserved copies of e-mails sent to and from the account, draft e-mails, deleted e-mails, emails preserved pursuant to a request made under 18 U.S.C. § 2703(f), the source and destination addresses associated with each e-mail, the date and time at which each e-mail was sent, and the size and length of each e-mail.” The volunteer had helped WikiLeaks with a minor technical issue. After learning that his account’s contents had been seized by the U.S. government, Snorrason told Mother Jones that he thought “pretty much everyone with both a Google account and a WikiLeaks connection will be getting one of those notices eventually.” Snorrason was correct in that other WikiLeaks-associated Google accounts had their information seized by the government.
Six months after the order for Snorrason’s emails was issued, a trio of search orders were issued for the email accounts of senior WikiLeaks personnel. On April 5, 2012, sealed warrants were executed for the Google accounts of WikiLeaks editors Sarah Harrison and Joseph Farrell, as well as then-spokesman and future editor-in-chief Kristinn Hrafnsson on suspicion of espionage and violating the Computer Fraud and Abuse Act, as well as conspiracy and theft of government property. The warrants appear to have covered the entirety of the accounts and were disclosed by Google at the close of 2014.

A court order for information relating to Kristinn Hrafnsson, current editor in chief of WikiLeaks, on suspicion if charges including but not limited to espionage.
In late October 2017, a new government request was issued for portions of WikiLeaks’ communications. A letter from Sen. Diane Feinstein requested that Twitter provide copies of all direct messages that were over 180 days to or from the accounts belonging to WikiLeaks, the WikiLeaks Task Force, “Guccifer 2.0,” Assange, and Margaret Ratner Kunstler. As written, the request would include some of my communications with WikiLeaks and “Guccifer 2.0.” Ultimately, at least some messages between WikiLeaks and the “Guccifer 2.0” were obtained by the U.S. government, although the method of communication for those messages remains unconfirmed.

12/19/18 3:25PM
According to what’s informally known as “the GRU indictment,” WikiLeaks sent Guccifer 2.0 a message on June 22, 2016. The message instructed Guccifer 2.0, a persona the U.S. government believes was used by Russian operatives, to send new material to them so it would “have a much higher impact.” On approximately July 6, the organization sent another message encouraging Guccifer 2.0 to send “anything [H]illary related” in time for the Democratic National Convention, which WikiLeaks thought Clinton would use to solidify support. The quoted portion of the exchange ends with WikiLeaks saying they thought conflict between Sen. Bernie Sanders and Clinton would be “interesting.” These exchanges, about maximizing impact and damage, are relevant to one of the theories of Assange’s potential prosecution outlined by noted national security journalist Marcy Wheeler.

An excerpt from a Mueller indictment.
If the charges against Assange are related to Russian hacking and the Democratic National Committee email leak, this exchange could be one of the most likely pieces of evidence to be directly relevant to the initial charges against him. However, the entirety of the government’s evidence, including materials seized from alleged Vault 7 leaker Joshua Schulte and the alleged recordings of him transferring additional files to WikiLeaks regarding the organization, may be used to help make the case. Past statements and communications may be used to help establish a modus operandi, a pattern or an intent. As noted by the AP, some of the materials may point to the early beginnings of Assange’s reported relationship with Russia. Leaked copies of sealed files, statements by people familiar with the grand juries, and documents released through FOIA by independent journalist Alexa O’Brien—who also identified a number of sealed search orders—all indicate that the investigations converged and pooled evidence at times. The government’s information could be further augmented by recent surveillance of Assange in the Ecuadorian Embassy, where he has lived under asylum since 2012, the fruits of which may have reportedly been shared with the United States.
Regardless of what the charges against Assange are, the government has terabytes of data with which to try to make its case, data that’s come from WikiLeaks supporters, sources, key personnel, and Assange himself. The full depth of the government’s sources, however, have yet to be revealed.
Emma Best is a national security reporter and transparency activist. She has published millions of pages of government documents and is a member of the leak collective Distributed Denial of Secrets (DDoSecrets). ... 1831640212
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am

Re: Seth Rich

Postby nowonmai » Mon Jan 14, 2019 4:14 pm

Is it wrong to be completely bored by all this?
User avatar
BFCus Regularus
Posts: 11542
Joined: Tue Feb 08, 2005 8:52 pm

Re: Seth Rich

Postby denise » Tue Jan 15, 2019 4:18 am

Is it wrong to completely ignore all of this?

Dirty dishes don't wash themselves.
all roads lead to Christ.
BFCus Regularus
Posts: 7614
Joined: Thu Dec 29, 2005 3:25 am
Location: Home of the Wild Frontier

Re: Seth Rich

Postby Kurt » Tue Jan 15, 2019 6:08 pm

Right now it is pretty much all we have.
User avatar
In Manus Manus
Posts: 20666
Joined: Mon Mar 08, 2004 6:29 am
Location: New York City

Re: Seth Rich

Postby kinderdigi » Wed Jan 16, 2019 2:24 am

nowonmai wrote:Is it wrong to be completely bored by all this?

Surely, it's easy to ignore ?
BFCus Regularus
Posts: 559
Joined: Fri Feb 24, 2017 12:50 am


Return to Tin-Foil Hat Cafe

Who is online

Users browsing this forum: No registered users and 1 guest