ramanan50

Posts Tagged ‘videos’

California Crop Circle Binary Code

In Astrophysics, videos on January 4, 2014 at 08:48

There have been reports of Crop Circles in California,US.

I have posted on this.

The Crop Circle seems to have a Computer Chip like image.

Many Ufologists have been maintaining that messages are being left by Aliens in Binary in these Crop Circles.

Sometime back a Binary Code in an Italian Crop Circle was reported to have been found.

Crop Circle has Binary Codes.

Binary Code in Crop Circle. Image source. http://www.cropcircleconnector.com/anasazi/time2007n.html

The earlier deciphered Code from Crabwood, UK is as follows.

START OF THE CRABWOOD 2002 MESSAGE

 

01

01000010S

01100101S

01110111S

01100001S

01110010S

01100101S

00100000S

01110100S

011010000S

01100101S

00100000S

01100010S

01100101S

01100001S

01110010S

01100101S

01110010S

01110011S

00100000S

01101111S

01100110S

00100000S

01000110S

01000001S

01001100S

01010011S

01000101S

00100000S

01100111S

01101001S

01100110S

01110100S

01110011S

00100000S

00100110S

00100000S

01110100S

01101000S

01100101S

01101001S

01110010S

00100000S

01000010S

01010010S

01001111S

01001011S

01000101S

01001110S

00100000S

01010000S

01010010S

01001111S

01001101S

01001001S

01010011S

01000101S

01010011S

00101110S

01001101S

01110101S

01100011S

01101000S

00100000S

01010000S

01000001S

01001001S

01001110S

00100000S

01100010S

01110101S

01110100S`

00100000S

01110011S

01110100S

01101001S

01101100S

01101100S

00100000S

01110100S

01101001S

01101101S

01100101S

00101110S

010000101S

01000101S

01001100S

01001001S

01000101S

0101

01010110S

01000101S

00101110S

01010100S

01101000S

01100101S

01110010S

01100101S

00100000S

01101001S

01110011S

00100000S

01000111S

01001111S

01001111S

01000100S

00100000S

01101111S

01110101S

01110100S

00100000S

01110100S

01101000S

01100101S

01110010S

01100101S

00101110S

01010111S

01100101S

00100000S

01101111S

01010000S

01110000S

01101111S

01110011S

01100101S

00100000S

01000100S

01000101S

01000011S

01000101S

01010000S

01010100S

01001001S

01001111S

01001110S

00101110S

01000011S

01001111S

01101110S

01100100S

01110101S

01101001S

01110100S

00100000S

01000011S

01001100S

01001111S

01010011S

01001001S

01001110S

01000111S

01011100S

0

 

END OF THE CRABWOOD 2002 MESSAGE

 

 

Decoded Salinas Crop Circle Message?

Russian Scientists decoded the messages and their information.

The Earth is in the final stages in a cycle of development of human consciousness and the organic world. A critical decrease in the Earth’s magnetic field will cause global cataclysmic events. Extraterrestrial civilizations (ETC) have offered humanity the only avenue for escape on the eve of these predicted global cataclysms. This is the claim of two Russian scientists Victoria Popova, Dr. Sc., Ph.D., and Lidia Andrianova Ph.D. They have authored over two hundred publications and nineteen patents. www.ourtransition.info and series of 15 video on youtube: 2012. Our Transition.

 

During fifteen years of research they discovered two keys – analog and digital – for decoding crop circles and others extraterrestrials’ pictograms in stone. Among them are Stonehenge and Avebury stone circles in the UK, Machu Picchu, Chavin de Huantar and the Nazca Lines in Peru, the pyramid of Chichen-Itza and the pyramids of the moon and the sun in Mexico and the Moai of Easter Island and others. All extraterrestrials’ pictograms in stone transmit preliminary information about the development of consciousness. Crop circles transfer the emergency information and instructions for salvation. Unfortunately, there are many hoaxes that can ruin our future.”

 

 

Source:

http://www.ourtransition.info/index.php?option=com_content&view=article&id=134&Itemid=7&lang=en

http://www.cropcircleconnector.com/anasazi/time2007n.html

Enhanced by Zemanta

Rapes Torture Continue Sri Lanka India Attend CHOGM

In Sri Lanka, SriLanka on November 10, 2013 at 09:50

 

Rape,Torture,Pain and Death continue to haunt the Tamils of Sri Lanka.

I have posted quite a few posts on the War Crimes of Sri Lanka nd have provvied some links towards the end of this post.

The Atrocities are not over even after the war is Over,

The Rajapakshe Government is flouting all international norms and is conducting the CHOGM Summit in Sri Lanka.

And a shameless Indian Government is likely to be represented by its Prime Minister!

Latest news is that Salman Khurshid,The External Affairs Minister is likely to attend the CHOGM Summit,

Either you attend out of conviction and moral values. you do not deputize.

It is not Man Mohan Singh who is attending or not attending,

It is a question of India‘ anguish.

Salman Khurshid does not represent India and Indian feelings and PM does?

Classic case of The Remedy Being  worse than the Cure!

Who will bell the cat?

Story:

As Commonwealth leaders prepare to meet at a summit in the Sri Lankan capital, Colombo, allegations of rape and torture by the Sri Lankan security forces have emerged, some of them occurring four years after the civil war ended.

“When the lady left and that man closed the door, I knew what was going to happen,” says Vasantha. “They raped me.”

One evening earlier this year, Vasantha says, she was going back to her home in northern Sri Lanka when a white van drew up and two men asked for her identity card.

She says she was thrown into the back of the vehicle and blindfolded.

 

 

 

 Watch Our World: Sri Lanka’s Unfinished War on BBC World News on Saturday 9 November at 11:30 GMT and on Sunday 10 November at 17:30 GMT and 22:30 GMT or watch it later on the BBCiPlayer.

Vasantha says she realised the authorities had finally caught up with her, four years after the war and just as she was about to leave for Britain on a student visa.

Her story is one of a number given to the BBC, horrific accounts of torture carried out long after hostilities ended.

During the civil war, Vasantha had helped Tamil Tiger rebels pass messages and set up safe houses in the capital, but she says she never took part in the fighting or held a gun.

Like other women I have interviewed, Vasantha never saw the outside of the building where she was held or met another detainee, but she said she did hear female voices, screaming in Tamil.

She describes being photographed and fingerprinted and then kicked, beaten with batons and pipes, burned with hot wires and cigarettes, submerged in a barrel of water until she thought she would drown, suffocated by having a petrol-soaked plastic bag put over her head, before being repeatedly raped by men in army uniform.

http://www.bbc.co.uk/news/world-asia-24849699

Related:

http://ramanan50.wordpress.com/2013/03/29/rape-of-tamil-women-in-sri-lanka-photos/

Deep Web,The Dark Side Of Internet Details

In internet on October 26, 2013 at 17:04

All of us know Internet.

*Scroll down for Video.

The Deep Web Search browser.

What is a Tor? How to preserve the anonymity?
Tor is the acronym of “The onion router”, a system implemented to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers hiding user’s information eluding any activities of monitoring.
As usually happen, the project was born in military sector, sponsored the US Naval Research Laboratory and from 2004 to 2005 it was supported by the Electronic Frontier Foundation.
Actually the software is under development and maintenance of Tor Project. A user that navigate using Tor it’s difficult to trace ensuring his privacy because the data are encrypted multiple times passing through nodes, Tor relays, of the network.
Connecting to the Tor network
Imagine a typical scenario where Alice desire to be connected with Bob using the Tor network. Let’s see step by step how it is possible.
She makes an unencrypted connection to a centralized directory server containing the addresses of Tor nodes. After receiving the address list from the directory server the Tor client software will connect to a random node (the entry node), through an encrypted connection. The entry node would make an encrypted connection to a random second node which would in turn do the same to connect to a random third Tor node. The process goes on until it involves a node (exit node) connected to the destination.
Read more: http://thehackernews.com/2012/05/what-is-deep-web-first-trip-into-abyss.html#ixzz2ipKPzWY8
Follow us: @TheHackersNews on Twitter | TheHackerNews on Facebook

W are able to access them and the information is Indexed by Search Engines.

We can access the information by relevant queries.

This is a part of World Wide Web, www.

There is another side to the world wide web where you can not normally access the information , but is still a part of the world wide web.

This is called the Deepnet, the Invisible Web, the Undernet or the hidden Web.

Then there is the dark Internet, the computers that can no longer be reached via Internet, or with a Darknet distributed filesharing network, which could be classified as a smaller part of the Deep Web.

Mike Bergman, founder of BrightPlanet coined the phrase.

He explained searching on the Internet today can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed.

Most of the Web’s information is buried far down on dynamically generated sites, and standard search engines do not find it.

Traditional search engines cannot “see” or retrieve content in the deep Web—those pages do not exist until they are created dynamically as the result of a specific search. As of 2001, the deep Web was several orders of magnitude larger than the surface Web.

What the Deep Web is generally used for?

1.For Drug Sales.

2.For Hiring Contract Killers.

3.Seeking Contract Killers.

3.Sexual perversions.

4.Drug Trafficking, Money Transfers.

5.Child Trafficking.

6.Human Trafficking.

7.Mercenaries  recruitment and Advertisement.

8,Also being used by some Intelligence Agencies for Dark Operations.

Story:

Hiring a hitman has never been easier. Nor has purchasing cocaine or heroin, nor even viewing horrific child pornography.

Such purchases are now so easy, in fact, that they can all be done from the comfort of one’s home at the click of a button… and there’s almost nothing the police can do about it.

This worrying development of the criminal black market is down entirely to the Deep Web – a seething matrix of encrypted websites – also known as Tor – that allows users to surf beneath the everyday internet with complete anonymity.

And like The Silk Road, transactions are all made using the mysterious online currency Bitcoin. One site, whose name MailOnline has chosen not to publish, offers an assassination in the US or Canada for $10,000 and one in Europe for $12,000.

‘I do not know anything about you, you do not know anything about me,’ crows one self-styled assassin, according to The Daily Dot. ‘The desired victim will pass away. No one will ever know why or who did this. On top of that I always give my best to make it look like an accident or suicide.’

Deepweb is buried in the Internet where prohibited activities take place.

Ad in the Deep Web-Contract Killers.

Mercenaries advertise in the Deep Web.

DeepWeb advertisement by Mercenaries.

THE DEEP WEB: WHAT IS TOR?

Tor – short for The onion Router – is a seething matrix of encrypted websites that allows users to surf beneath the everyday internet with complete anonymity.

It uses numerous layers of security and encryption to render users anonymous online.

Normally, file sharing and internet browsing activity can be tracked by law enforcement through each user’s unique IP address that can be traced back to an individual computer.

The Tor network on the Deep Web hides the IP address and the activity of the user.

Most of the Web’s information is buried far down on dynamically generated sites, unable to be found or seen by traditional search engines – sites or pages don’t exist until created as the result of a specific search.

An Internet search is like dragging a net across the surface of the sea – a great deal of information is caught, but a majority is deep and therefore missed.

‘I have gained endless experience(s) in this [sic] 7 years,’ he goes on. ‘It has changed me a lot. I don’t have any empathy for humans anymore.

‘This makes me the perfect professional for taking care of your problems and makes me better than other hitmen. If you pay enough I’ll do ANYTHING to the desired victim. If I say anything I mean anything.’

Many of the sites even use slogans and marketing techniques that, if it weren’t for their macabre subject matter, could be as at home on the website of a legitimate retail website.

‘The best place to put your problems is in a grave,’ boasts one.

Some even seem to offer others the chance to profit from their killing by allowing users to bet on when a victim will die by putting money in a pool. The closest guess takes home the pot.

And while many appear every inch the cold-blooded killer one would expect from a gun-for-hire, there is also apparently the odd humanitarian hitman.

‘Killing is in most cases wrong, yes,’ writes one. ‘However, as this is an inevitable direction in the technological evolution, I would rather see it in the hands of me than somebody else.’

‘By providing it cheaply and accurately I hope that more immoral alternatives won’t be profitable or trusted enough. This should primarily be a tool for retribution.’

Adding that murder should always be committed for ‘good reason’, he writes: ‘Bad reasons include doctors for performing abortions and Justin Bieber for making annoying music.

How To Surf The Deepweb.

You’ll need a browser named Tor. Open that up and get a new identity around every few minutes. The rest is up to you. I’d recommend checking out the Evil Wiki and learning about onion sites and seeing if you can find some links. That’s what I did the other night at least and found a bunch of weird shit. Like this one dude was selling “sex dolls” He cuts the legs and arms off children and abuses the shit out of them so they don’t feel pain. He pulls their teeth out so they can’t bite your you know what and so much more, so if that’s what interest you then go ahead, but honestly there isn’t really any reason to go to the “deep web”.

Has The Deep-web Closed after busting of the Silk Road by the Deep Web?

In an interesting post-mortem release by the creators of the defunct anonymous marketplaceAtlantis there is information that the former admins and users of the Silk Road are planning to resurrect the service. User RR writes: “We have SilkRoad v2.0 ready to launch and is now in its final testing stages. Our site has all the features of the original one and we have kept the same style of forum for your ease.”

The new SilkRoad will be sending out anonymous invites to former vendors and then open to the Tor-using public soon after.

The representatives of Atlantis write:

From a quick scout around I’ve counted at least 5 publicly stated projects with the said aim of replacing becoming “Silk Road 2.0″ and many many more gathering info and building alliances.
And this is what Law Enforcement is now parading as a victory? Over two years of investigation, millions of dollars spent and for what so a couple of armchair programmers can build it again in a few days while in the meantime vendors simply move to other site’s .

Users are already planning ways to keep the new site secure. This includes the creation of something called BitWasp, an “open source, anonymous bitcoin marketplace specifically built for use in conjunction with Tor or I2P via the hidden services such as .onion websites and eepsites.”

Sources:

http://techcrunch.com/2013/10/04/deep-web-users-are-ready-to-launch-silk-road-2-0/

http://www.reddit.com/r/deepweb/comments/1o7uaf/new_to_the_deepweb/

http://www.dailymail.co.uk/news/article-2454735/The-disturbing-world-Deep-Web-contract-killers-drug-dealers-ply-trade-internet.html

http://en.wikipedia.org/wiki/Deep_Web

Robotic Weapons Replace Drones? Human Rights Watch

In US, videos on October 26, 2013 at 10:48

Now that Drone attacks are drawing flak, there is a move to induct Fully Autonomous Robotic Weapons, which do not need any Human input are on the anvil.

Killer Robots to replace Drones.

Killer Robots/

“The Campaign to Stop Killer Robots is a coalition of weapons monitors and human rights groups leading an effort, formally since April, to establish an international ban on fully autonomous lethal weapons. Dubbed (by opponents) “killer robots,” it’s a technology that can kill targets (humans) without any human input. Whereas drones today have someone somewhere remotely determining where and when to fire, a fully autonomous air, land, or sea weapon could be making the decisions on its own…

It sounds like the stuff of sci-fi, but the technology is well within reach given existing weaponry. The U.S. Navy’s X-47B, a Northrop Grumman-developed drone, has taken off and landed on an aircraft carrier—one of the hardest maneuvers in aviation—entirely on its own, and it would only be a short step to add missiles to its weapons bay. In South Korea, a Samsung subsidiary designed—several years ago already—a stationary robot sentry that sits along the demilitarized zone and can identify and fire at a target on its own. It’s linked up with a human operator for now.

Human Rights Watch has called in for a Review of this development.

All governments should support international talks to address the threat posed by fully autonomous robotic weapons, Human Rights Watch said today. Human Rights Watch and the Harvard Law School International Human Rights Clinic on October 21, 2013, issued a question-and-answer document about the legal problems posed by these weapons.

Representatives from the Campaign to Stop Killer Robots, including Human Rights Watch, will present their concerns about fully autonomous weapons at a United Nations event in New York on October 21.

“Urgent international action is needed or killer robots may evolve from a science fiction nightmare to a deadly reality,” said Steve Goose, arms director at Human Rights Watch. “The US and every other country should support holding international talks aimed at ensuring that humans will retain control over decisions to target and use force against other humans.”

Fully autonomous weapons – also called “lethal autonomous robotics” or “killer robots” – have not yet been developed but technology is moving toward increasing autonomy. Such weapons would select and engage targets without further intervention by a human.

In recent months, fully autonomous weapons have gone from an obscure issue to one that is commanding the attention of many governments, international institutions, and groups around the world.”

Source:

http://world.time.com/2013/10/25/the-campaign-to-kill-killer-robots-gains-steam/

http://www.hrw.org/news/2013/10/21/un-hold-international-talks-killer-robots

Secret US Intelligence Community Not Accountable,Details

In US, videos on October 22, 2013 at 17:54

There is furor over NSA’s eavesdropping and the latest fact that France is livid with the US for listening in to about million Calls.

We know CIA,FBI, Home Land Security, NIA and may be another five or ten visible Intelligence Communities of The US.

Dana Priest.

Dana Priest who exposed the Secret Intelligence Community in US.

But not this one.

You would find, towards the end of the post , a Video on  Secret White House Bank Account.

And this information is through Washington Times Advertisers and I am sure the Newspaper has published verified information.

While checking on this, I stumbled into the Intelligence Community.

“Dear Washington Times Reader,

You have to see this…

A colleague of mine has stumbled onto some rather intriguing research.

In short, it’s an account almost no one in the country has ever heard about. By one expert’s estimate, only 0.07% of Americans (one in 1,500) has one of these private accounts.

But the rich have long favored this idea…

President Roosevelt, for example, had an account.

So did Walt Disney, Ray Kroc, JFK, and even current Vice President Joe Biden.

John McCain at one time even held over $1,000,000 inside his own account!

What’s so special about this account? Well, for one, it can let you retire 100% tax-free. You can pass it along to your heirs without paying a dime to the IRS. It also grows your money 3-4 times faster than standard CDs… and, to top it off, you can access your money ANYTIME!

But here’s perhaps the best part: This account is available to nearly anyone… regardless of how much money you have or even if you don’t have any political connections!

My colleague literally invested over $100,000 of his own money into this idea once he was convinced of how good it was.”

About three years ago. Washington Post‘s Reporter,Pulitzer Prize Winner, Dana Priest, a Pulitzer Prize winner, and William Arkin wrote that they found “an alternative geography of the United States, a Top Secret America hidden from public view and lacking in thorough oversight.” After nine years of “unprecedented spending,” the intelligence community has become a sector of government so massive that oversight is next to impossible and that it is of questionable benefit to the United States’ security.

That there is even a behemoth of an Intelligence Group is tucked away behind the Public eye.

This Intelligence community is managed by ,

,271 government organizations and 1,931 private companies work on programs related to counter-terrorism, homeland security and intelligence in about 10,000 locations across the country.

– An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.

– In the Washington area, 33 building complexes for top-secret intelligence work have been built or are under construction since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings — about 17 million square feet of space.”

Worse is that it is not accountable to any one nobody knows how much Budget is allocated to it!

Interview with Dana Priest excerpts.

‘A two-time Pulitzer Prize-winning investigative reporter for The Washington Post Priest is the author, along with William Arkin, of Top Secret America: The Rise of the New American Security State. Here she takes FRONTLINE through the rapid growth of Top Secret America, which began with an impulse to secrecy and a blank check from Congress in the days after 9/11, and which now employs nearly a million people at 1,900 private companies and 1,300 federal organizations. “These are gigantic edifices that are going to stay,” she says. This is the edited transcript of an interview conducted on June 18, 2011.

 

I just think that we have accepted what it is the government says we need to do without questioning how much money it costs, without questioning whether it’s effective or not. And in part we’ve done that because we’ve accepted the secrecy that surrounds it all.

..

The reaction in Congress, which becomes so important in our story, is they really wrote a blank check. … The money flowed out. And there weren’t very many constraints on it at all. There definitely wasn’t any sort of oversight of what was going on with the money, because, again, people were worried. …

And so George Bush, for example, gave the CIA a billion dollars right off the bat, because the CIA was in the best position, not the military, to go after bin Laden and his followers in Afghanistan. And he gave them a billion dollars, and he also ordered the military to do whatever it took to support the CIA. …

They did the same thing with the NSA. Lots of money poured into the National Security Agency, which was the eavesdropper around the world. And they couldn’t grow fast enough. Not only were they asked to eavesdrop in many different places that they weren’t used to doing — not just capitals and not just leaders of countries, which is really what they were doing, mostly, prior to 9/11. They would want to know what a leader was saying or what an opposition group was saying. And they would report those conversations back.

Source:

http://www.politicsdaily.com/2010/07/19/top-secret-america-washington-post-unmasks-unwieldy-security/

http://www.pbs.org/wgbh/pages/frontline/iraq-war-on-terror/topsecretamerica/dana-priest-top-secret-america-is-here-to-stay/

The White House’s Secret Account video Link.

http://pros.palmbeachletter.com/1309PBLIFL495LEGPN/LPBLPA64/?h=true

The President’s Secret Book.

 

 

Follow

Get every new post delivered to your Inbox.

Join 2,424 other followers

%d bloggers like this: