In Clinton era 1990s a joke circulated about AL GORE being FATHER OF INTERNET--------while CLINTON was sold as KING of gathering 5% freemason/Greek players to be those ROBBER BARON PLAYERS. GORE of course was tied to building that DARK WEB ---while CLINTON was recruiting from all those US IVY LEAGUES what would be these few decades of ROBBER BARON frauds.
AL GORE having that far-right wing global banking OLD WORLD PRE-CHRISTIAN NERO/CATO/SENECA stoicism was of course tied to DARPA unrolling of DARK WEB----while CLINTON being the CHARMER moving our 99% WE THE PEOPLE community leaders into being DR NO/GOODTIMES -----rather than being local DR GOODS.
'As a Senator in the 1980s Gore urged government agencies to consolidate what at the time were several dozen different and unconnected networks into an “Interagency Network.” '
Of course GORE didn't invent the internet nor was he an INNOVATOR. DARPA tied to global MITRE CORPORATION KNIGHTS OF MALTA was always a global banking 1% military junta goal. GORE was simply that BEOWULF figurehead. It was these 1990s DARPA internet developments that allowed for CLINTON/BUSH/OBAMA electronic ballot box ELECTION FRAUDS.
SNOPES being that RIGHT WING FAKE populist media outlet pretending to fight for TRUTH ----of course never mentioning GORE and ties to DARPA and goals of global military control of energy/technology/communications.
Al Gore: ‘I Invented the Internet’
1.2.3 Email providers'
Vice-President Al Gore claimed during a news interview that he "invented" the Internet.
False About this rating
Despite the multitudinous derisive references to the supposed quote that continue to be proffered even today, former U.S. vice president Al Gore never claimed that he “invented” the Internet, nor did he say anything that could reasonably be interpreted that way. The legend arose from critics and pundits who plucked a relatively credible statement Gore made during the course of an interview, altered its wording, and stripped it of context to make it seem a ridiculously self-serving falsehood.
The “Al Gore claimed he ‘invented’ the Internet” put-downs were misleading distortions that originated wjth a campaign interview conducted by Wolf Blitzer on CNN’s “Late Edition” program on 9 March 1999. (Gore, then the sitting Vice President, was seeking the 2000 Democratic presidential nomination.)
When asked to describe what distinguished him from his challenger for the Democratic presidential nomination, Senator Bill Bradley of New Jersey, Gore replied (in part):
During my service in the United States Congress, I took the initiative in creating the Internet. I took the initiative in moving forward a whole range of initiatives that have proven to be important to our country’s economic growth and environmental protection, improvements in our educational system.
In context, Gore’s response (which employed the word “created,” not “invented”) was clear in meaning:
the vice president was not claiming that he “invented” the Internet in the sense of having designed or implemented it, but rather that he was one of the visionaries responsible for helping to bring it into being by fostering its development in an economic and legislative sense,
To claim that Gore was seriously trying to take credit for the “invention” of the Internet is, frankly, just silly political posturing that arose out of a close presidential campaign. If, for example, President Eisenhower had said in the mid-1960s that he, while president, “took the initiative in creating the Interstate Highway System,” he would not have been the subject of dozens and dozens of editorials lampooning him for claiming he “invented” the concept of highways or implying that he personally went out and dug ditches across the country to help build the roadway. Everyone would have understood that Eisenhower meant he was a driving force behind the legislation that created the highway system, and this was the very same concept Al Gore was expressing about himself with interview remarks about the Internet.
How justified Gore’s statement that he “took the initiative in creating the Internet” might be can be a subject of debate, as statements about the “creation” or “beginning” of the Internet are difficult to evaluate because the Internet is not a homogeneous entity (it’s a collection of computers, networks, protocols, standards, and application programs), nor did it all spring into being at once (the components that comprise the Internet were developed in various places at different times and are continually being modified, improved, and expanded).
But a spirited defense of Gore’s statement penned by Internet pioneers Robert Kahn and Vinton Cerf (the latter often referred to as the “father of the Internet”) in 2000 noted that “Al Gore was the first political leader to recognize the importance of the Internet and to promote and support its development” and that “No other elected official, to our knowledge, has made a greater contribution [to the Internet] over a longer period of time”:
Al Gore was the first political leader to recognize the importance of the Internet and to promote and support its development.
No one person or even small group of persons exclusively “invented” the Internet. It is the result of many years of ongoing collaboration among people in government and the university community. But as the two people who designed the basic architecture and the core protocols that make the Internet work, we would like to acknowledge VP Gore’s contributions as a Congressman, Senator and as Vice President. No other elected official, to our knowledge, has made a greater contribution over a longer period of time.
Last year the Vice President made a straightforward statement on his role. He said: “During my service in the United States Congress I took the initiative in creating the Internet.” We don’t think, as some people have argued, that Gore intended to claim he “invented” the Internet. Moreover, there is no question in our minds that while serving as Senator, Gore’s initiatives had a significant and beneficial effect on the still-evolving Internet. The fact of the matter is that Gore was talking about and promoting the Internet long before most people were listening. We feel it is timely to offer our perspective.
As far back as the 1970s Congressman Gore promoted the idea of high speed telecommunications as an engine for both economic growth and the improvement of our educational system. He was the first elected official to grasp the potential of computer communications to have a broader impact than just improving the conduct of science and scholarship. Though easily forgotten, now, at the time this was an unproven and controversial concept. Our work on the Internet started in 1973 and was based on even earlier work that took place in the mid-late 1960s. But the Internet, as we know it today, was not deployed until 1983. When the Internet was still in the early stages of its deployment, Congressman Gore provided intellectual leadership by helping create the vision of the potential benefits of high speed computing and communication. As an example, he sponsored hearings on how advanced technologies might be put to use in areas like coordinating the response of government agencies to natural disasters and other crises.
As a Senator in the 1980s Gore urged government agencies to consolidate what at the time were several dozen different and unconnected networks into an “Interagency Network.”
Working in a bi-partisan manner with officials in Ronald Reagan and George Bush’s administrations, Gore secured the passage of the High Performance Computing and Communications Act in 1991. This “Gore Act” supported the National Research and Education Network (NREN) initiative that became one of the major vehicles for the spread of the Internet beyond the field of computer science.
As Vice President Gore promoted building the Internet both up and out, as well as releasing the Internet from the control of the government agencies that spawned it. He served as the major administration proponent for continued investment in advanced computing and networking and private sector initiatives such as Net Day. He was and is a strong proponent of extending access to the network to schools and libraries. Today, approximately 95% of our nation’s schools are on the Internet. Gore provided much-needed political support for the speedy privatization of the Internet when the time arrived for it to become a commercially-driven operation.
There are many factors that have contributed to the Internet’s rapid growth since the later 1980s, not the least of which has been political support for its privatization and continued support for research in advanced networking technology. No one in public life has been more intellectually engaged in helping to create the climate for a thriving Internet than the Vice President. Gore has been a clear champion of this effort, both in the councils of government and with the public at large.
The Vice President deserves credit for his early recognition of the value of high speed computing and communication and for his long-term and consistent articulation of the potential value of the Internet to American citizens and industry and, indeed, to the rest of the world.
It is certainly true that Gore was popularizing the term “information superhighway” in the early 1990s (although he did not, as is often claimed by others, coin the phrase himself) when few people outside academia or the computer and defense industries had heard of the Internet, and he sponsored legislation that included efforts to establish a national computing plan, to help link universities and libraries via a shared network, and to open the Internet to commercial traffic.
In May 2005, the organizers of the Webby Awards for online achievements honored Al Gore with a lifetime achievement award for three decades of contributions to the Internet. “He is indeed due some thanks and consideration for his early contributions,” said Vint Cerf.
We are very sad for today's US 99% of WE THE STUDENTS being forced into global NGOS that require pledging away their CITIZENSHIP RIGHTS while made to feel they are WINNERS in MOVING FORWARD 3000BC HINDI-BRAHMIN. If you GOOGLE this article you will see a photo of our young adults FLASHING ALL THOSE FREEMASON/GREEK signs.
We discuss often that MOVING FORWARD 3000 BC HINDI BRAHMIN of course has a goal of ending all that WESTERN GREEK AND FREEMASON culture developed over a few thousand years. There will be no 5% FREEMASON/GREEK PLAYER winners in a land of ZEUS AND HERA where these gods and goddesses do not want those 99% of HUMANS to have all those great INVENTIONS.
As global banking 1% MOVE FORWARD FOREIGN ECONOMIC ZONE DEEP, DEEP, REALLY DEEP STATE killing all ability for our US 99% WE THE PEOPLE black, white, and brown citizens to OWN A PHONE or access a PHONE for communications-----we hear our 5% freemason/Greek players saying DON'T WORRY-----we have access on the DARK WEB ---global banking 1% are not taking that away from US.
1.2.3 Email providers'
So, global banking 1% CLINTON NEO-LIBERAL claim to fame was building this network of GREEKS AND FREEMASON players globally----each working from their nation in THE DARK WEB to sack and loot each nation helping our CLINTON/BUSH/OBAMA especially move hundred trillion of US WEALTH -----
MOVING FORWARD ONE WORLD ONE GOVERNANCE FOR ONLY THE GLOBAL 1% HINDI BRAHMIN OLD WORLD KINGS AND QUEENS-----NO GREEKS OR FREEMASONS TO BE SEEN.
We encourage our global 99% of WE THE GREEKS and FREEMASONS tied to global banking 1% OLD WORLD KINGS AND QUEENS KNIGHTS OF MALTA TRIBE OF JUDAH to watch out-----IT'S A TRAP.
The Global Greeks Program is designed to allow undergraduate international students and Greek students on campus to interact and form networks with each other.
Who are these International Students?
The students who may be adopted by your organization for this semester are undergraduate international students from many different countries. Some are new to the United States and would like to meet people, make new friends and know more about the American culture.
Who are the Greek Students?
The Greeks are male and female students who are members of a sorority or fraternity on campus. Sororities (for women) and fraternities (for men) are organizations that focus on community service, leadership, academics and social networking. Greek students become lifelong members of these organizations and pledge to live by the philosophies of the organization.
Are you an international student?
As an international student, you will be “adopted” by a Greek organization. You will have one primary person of contact in the organization, and you can attend different programs and functions in your host organization. You will have the opportunity to meet people, attend events and make new friends!
Are you a Greek student?
As a Greek Organization, you will “adopt” an international student. One member of your chapter will be the primary person of contact for the international student. You can invite the student to attend different programs and functions in your organization. You will have the opportunity to meet new people and learn about different cultures!
Please note that this program is for undergraduate international students with priority going to new international freshmen.
Fall 2017 Application will start in September 2017. Please check your UARK email.
- International students: Please contact ISS Retention Programs at email@example.com.
- Greek students: Please contact Jackson Tidwell in Greek Life at firstname.lastname@example.org
Our US national FAKE NEWS media these several years have reported two breaches in HILLARY'S EMAIL account on DARK WEB-----first, as 'US' Secretary of State----then as a candidate for 2016 US ELECTIONS.
What does global banking 1% do over and over and over to MOVE FORWARD its policies? It makes what is WORKING------become corrupted and dysfunctional. The controversy over DIPLOMATIC EMAILS being leaked---with global 1% communicating on DARK WEB accounts was simply that WEAKENING ---CORRUPTION we knew was advancing the CLOSING OF DARK WEB.
So, both global banking 1% CHINESE OLD WORLD KINGS and Eastern Europe RUSSIAN OLD WORLD KINGS are BFF with global banking 1% KNIGHTS OF MALTA OLD WORLD KINGS ---CLINTON/BUSH/OBAMA.... now TRUMP.
THE HACK------is a QUACK-------QUACK QUACK QUACK----creating reasons to REGULATE THE DARK WEB.
Did The FBI Cover Up Evidence That China Hacked Clinton's State Dept. Emails?
Accountability: More than three years after Hillary Clinton admitted that she'd used an unsecured private email server to handle classified emails while secretary of State, and two years after the FBI exonerated her, we finally learn what we should have known all along. That China apparently had unfettered access to all her emails, including many that were highly classified.
According to the Daily Caller, the only news site that has continued to pursue this story, a Chinese-owned company gained access to Clinton's unsecured private server, and embedded code that then sent them copies of every email she sent.
The story goes to note that the FBI knew about this, even as then FBI-Director James Comey was drafting Clinton's get-out-of-jail free statement.
Two officials from the Intelligence Community Inspector General's office discovered the code, and "met repeatedly with FBI officials to warn them of the Chinese intrusion," the Daily Caller's Frank Pollock reports.
The ICIG discovered the "anomaly" in early 2015, Pollock says, soon after the FBI started its investigation.
One of the people the ICIG told about the "anomaly" was the disgraced FBI agent Peter Strzok, the agent in charge of the Clinton email investigation.
When Rep. Louie Gohmert asked Strzok about his meetings with the ICIG at a congressional hearing last month, all Strzok said was that "I remember meeting Mr. Rucker on either one or two occasions. I do not recall the specific content or discussions."
It seems unlikely that the FBI's top counterintelligence official — who was leading the investigation into Clinton's emails — wouldn't remember being told that the Chinese had unfettered access to those emails while she was secretary of State. (You can follow IBD's complete coverage of the Clinton emails scandal here.)
So, either Strzok is lying or the ICIG officials are. Our money is on Strzok.
Strzok, you may recall, is the FBI official who, in text exchanges with an FBI lawyer, expressed his desire to see Clinton elected and his hatred for Trump, at one point texting that "we'll stop" Trump from winning the election.
He's the official whose biased rants led the Justice Department inspector general to conclude that Strzok showed "a willingness to take official action to impact the presidential candidate's electoral prospects." The FBI fired Strzok two weeks ago.
Strzok also made sure to water down the section of Comey's statement exonerating Clinton, where it mentioned the possibility that "foreign actors" hacked her server.
Here's the change made in Comey's original draft memo regarding hacking of Clinton's emails.Comey's original draft said it was "reasonably likely" that a foreign government accessed Clinton's emails. The final draft said only that it was "possible" and that there was no evidence that it had happened.
Strzok was also the FBI official who sat on the bombshell discovery in late September 2016 that hundreds of thousands of Clinton emails wound up on former Rep. Anthony Weiner's laptop. (Weiner was then husband to Clinton's top aide, Huma Abedin.)
According to Real Clear Investigations, this "mother lode" of Clinton emails included classified emails the FBI hadn't seen before.
Ignoring the Mother Lode of Clinton Emails
But FBI officials were too busy investigating the bogus Trump/Russia dossier to bother with this news. And, they only acted on the discovery when they thought news about the Weiner laptop emails might leak, Real Clear Investigation's Paul Sperry reports.
What's more, the FBI examined only a fraction of those emails, despite Comey's repeated assurances that investigators had reviewed them all, Sperry says.
All this underscores what we've pointed out in this space on numerous occasions. Namely, that the FBI's "investigation" into Clinton's criminally negligent handling of classified information was nothing more than a whitewash.
It's seems increasingly clear that the FBI had planned to exonerate Clinton all along, even if it meant burying the most damning evidence they came across.
All the national and international FAKE NEWS media surrounding the HACKER exposing all that DEPARTMENT OF DEFENSE SPENDING ------we have always known the MANNING as POPULIST hero was a FALSE FLAG----the DEPARTMENT OF DEFENSE ----as HILLARY'S DEPARTMENT OF SECRETARY OF STATE----were both to be found on THE DARK WEB---DARPA.
Army Leak Suspect Is Turned In, by Ex-Hacker
- The New York Timeswww.nytimes.com/2010/06/08/world/08leaks.html
On Monday, the Department of Defense announced that Specialist Manning, of Potomac, Md., had been arrested and was under investigation. A three-paragraph statement said that Specialist Manning ...
All that US DEPARTMENT OF DEFENSE SPENDING exposed in HACKING scheme occurred at a time today's US DEPARTMENT OF DEFENSE has been made a global private military corporation no longer US PUBLIC MILITARY------global banking 1% COULD CARE LESS if we know CLINTON/BUSH/OBAMA used our US military funding to move trillions of dollars in FRAUDS using the DARK WEB. This scheme was not exposed a few decades ago----it was exposed as PRIVATIZATION OF US MILITARY is just about complete.
Colonel Robert Manning III > U.S. DEPARTMENT OF DEFENSE ...dod.defense.gov/.../colonel-robert-manning-iii
COL Manning is a native of Manning, South Carolina and is married with three children. MISSION The mission of the Department of Defense is to provide a lethal Joint Force to defend the security of our country and sustain American influence abroad.
So, these two incidences over several years of OBAMA created the CORRUPTED AND WEAKENED DARK WEB needing to be REGULATED AWAY.
A SOVEREIGN NATION WOULD NOT HAVE NATIONAL EXECUTIVES AND VITAL AGENCIES ON THE DARK WEB.
So, MANNING was a FALSE FLAG-----5% freemason/Greek players simply MOVING FORWARD reasons for ENDING THE DARK WEB.
Pentagon Disclosed Data Breach At Department Of Defense Affecting 30,000 Workers
Pentagon’s latest revelation regarding a security breach seems rather ironic. On one hand, we see reports about the efforts by the US Defense to combat spies and hackers. On the other hand, we hear this alarming news. Recently, the Pentagon disclosed a data breach at the U.S. Department of Defense which happened earlier this month. The breach supposedly let the unknown hackers steal personal and payment card information.
Pentagon Disclosed Data Breach Affecting 30,000 Workers
Recently, the Pentagon disclosed a data breach that allegedly affected 30,000 military and civilian workers at the U.S. Department of Defense. As disclosed by Associated Press, some unknown hackers supposedly pilfered personal and card details of the DOD staff by compromising their travel records.
According to AP, Pentagon stated that DOD came to know of the breach on October 4, 2018, after their cyber team informed them. Initial investigations reveal the count of affected staff to be 30,000. Nonetheless, since the investigations are underway, one may not trust this count as final.
For the moment, the Pentagon has not revealed many details about the incident as the investigations continue. Nonetheless, they did provide a few hints. According to a Pentagon spokesperson, Lt. Col. Joseph Buccino,
However, he did not name the vendor.
DoD Not The Only Victim Of Cyber Attack
Although, one may not expect such reports of cyber attacks and data breaches to involve the Department of Defense. Still, the DOD isn’t the only victim of such an attempt recently. Recalling the data breach incident happened last month at the Department of State which seems to be an addition to the trail.
Since the Pentagon has not disclosed details regarding how the breach occurred and who the hackers accessed the information, we shall look forward to finding out more as the investigations proceed.
Take your time to comment on this article.
We have NO SYMPATHY for anyone investing on THE DARK WEB. The entire intent of these DARPA structures being sacking and looting and money-laundering ------as we KNOW------there is no HONOR AMONG THIEVES.
BITCOIN is simply global banking 1% WORLD BANK MOVING FORWARD the end our our US 99% WE THE PEOPLE and global citizens away from having ANY ACCESS TO MONEY. We discuss this under FINANCIAL PUBLIC POLICY----but this week we use it to show COMMUNICATIONS tied to DARK WEB are going to disappear for global banking 5% freemason/Greek players as well as all our US 99% WE THE PEOPLE. There will be no FREEMASON/GREEK PHONES to be handed out connected to a DARK WEB.
This BITCOIN scam was a deliberate setup staged just to provide a reason to REGULATE THE DARK WEB AWAY.
All this called SILK ROAD is appropriate because of the FLIPPING OF EARTH'S ECONOMIC AXIS to 3000BC SILK TRADE ROUTES----but as important our new MERELY RICH ASIAN CITIZENS are being PLAYED by global banking 1% just as our US 99% WE THE PEOPLE black, white, and brown citizens.
We are discussing this not as financial public policy---but to show the DARK WEB COMMUNICATIONS networks are going to DISAPPEAR.
Our global 99% ASIAN, ARABIC, AFRICAN, EASTERN EUROPEAN better WATCH OUT at thinking you are a WINNER because you are made a 5% freemason/Greek player using the DARK WEB.
The Illicit World of Bitcoin and the Dark Web
By Danny Bradbury
Updated July 01, 2018
Two words will be indelibly etched on the minds of many people following bitcoin: Silk Road. This was the original dark market, and it became notorious for enabling people to sell drugs and other illegal items online. But, what is a dark market, and how does one work?
By themselves, dark markets aren’t necessarily illegal. They are simply digital marketplaces, created using the same kinds of technologies that typically underpin bitcoin. At the very least, they will accept bitcoin as a method of payment because of its quasi-anonymous characteristics.
Having said that, most dark markets quickly become illegal because of the kinds of products that they allow vendors to sell. As soon as a digital marketplace allows for the trafficking of drugs, weapons, or other illegal items, then it is breaking the law, and law enforcement officials will quickly get interested.
That’s what happened with Silk Road, which was one of the first – if not the first – dark market on the web. Created by Ross Ulbricht, it was a digital marketplace that connected vendors of illegal drugs with potential buyers. Vendors would advertise their wares on listings maintained by Silk Road, which was similar to the kinds of listings you might find on any legitimate e-commerce marketplace.
When someone decided to buy drugs via the website, they generally wouldn’t want to send money directly to that person. Drug peddling isn’t exactly a trustworthy business, and everyone who advertised and purchased using Silk Road was anonymous. This would have made it very easy for crooks to make off with customers’ money without sending any goods in return.
To solve this problem, Silk Road provided an escrow service. Customers buying drugs from vendors who listed on Silk Road would send their funds to Silk Road, instead of the vendor. The website would then hold these funds until the customer confirmed that they had received what they had ordered. Then, Silk Road would release the funds to the vendor.
The funds were always sent in bitcoin, rather than fiat currency, because when used correctly, the network can provide a great degree of anonymity.
The drugs were normally sent by the Postal Service, either to PO boxes or, in the case of less paranoid customers, directly to their address. One of the first things that alerted law enforcement to the operation of Silk Road was a spike in the level of drugs being intercepted in the mail.
Silk Road wasn’t a decentralized marketplace, though. It ran on a computer controlled by Ulbricht. It was protected, though, because it ran on Tor, which is a communications protocol designed to offer anonymity to those who use it. Originally developed by the U.S. Navy, Tor has become popular among those wanting to protect their identities online.
The FBI eventually arrested Ulbricht by piecing together clues that they gathered from various places outside the Tor network. Now, though, many more dark markets have sprung up, most of them dealing in drugs.
Dark Markets Under Attack Aside from the fact that they are breaking the law, one of the biggest concerns around dark markets is trustworthiness. In several cases, dark markets have suddenly vanished with millions of dollars in escrow funds, leaving customers robbed of their funds. Law enforcement is also getting better at targeting these dark markets and taking them down. In November 2014, Operation Onymous, an international law enforcement operation, seized over 400 dark web domains. Dark markets including CannabisRoad, Blue Sky, and Hydra have been taken down.
Law enforcement says that it has found a way to target sites using Tor, although has refused to reveal how.
Dark markets continue to operate, and law enforcement continues to take them down in a continuous game of cat and mouse. Anyone considering engaging in illegal activities through these marketplaces should be aware of the risks.
THE ELECTRONIC FRONTIER ORG-------is basically those global banking 5% freemason/Greek players having spent these few decades on DARK WEB working to help global banking 1% sack and loot sovereign nations at the same time having their own shell companies filled with money-laundering and fraud. We see a Richard Esguerra looking much like that 5% player.
Throughout OBAMA era there was lots of PRETENDING over protecting the INTERNET in US for our US 99% WE THE PEOPLE when all that protesting was organized by the OUR REVOLUTION crowd----those MERELY RICH from these few decades of ROBBER BARON CLINTON/BUSH/OBAMA.
THE FCC UNDER A CLINTON/BUSH/OBAMA WAS NEVER A SOVEREIGN US AGENCY---IT WAS WORKING FOR GLOBAL BANKING 1% OLD WORLD KINGS KNIGHTS OF MALTA----
What our US 99% of WE THE PEOPLE need to be fighting for/against as regards internet and communications----is making sure our local infrastructure tied to CABLES being laid -----allow both ANALOG AND DIGITAL communications---AND designate strong local access through SEPARATE CABLE ----
STOP MOVING FORWARD GLOBAL CORPORATE CAMPUS ONLY TELECOMM CABLE INFRASTRUCTURE.
EFF Home ------ELECTRONIC FRONTIER FOUNDATION is NOT working for our US 99% WE THE PEOPLE and our communications access.
The FCC and Regulatory Capture
Commentary by Richard Esguerra
August 20, 2008
Earlier this month, Internet users welcomed the FCC's ruling against Comcast for interfering with BitTorrent uploads, celebrating the action as a victory for net neutrality. Reigning in Comcast's dishonest behavior was the right thing to do in this case, but many observers are worried that the FCC is establishing a dangerous habit of interfering with the Internet, especially since the FCC has a spotty history when it comes to serving the public.
For those looking for more background, a great panel discussion/podcast from the Technology Liberation Front explores the series of decisions that brought the FCC to the forefront of the net neutrality debate and covers why those decisions are unprecedented. Commenting on the FCC's action, law professor Susan Crawford writes:
The [FCC] is in completely uncharted waters, using this idea of 'ancillary authority' to carry out whatever it feels like. [...] Although in the short term condemning Comcast is certainly a good idea, the notion that case-by-case, wholly discretionary adjudications like this one are possibly a good idea for all aspects of internet policy is nuts.
But it is technology scholar and journalist David Robinson who reaches the root of the problem looming beyond the horizon: "[The Comcast decision] also preserves the Commission's ability to make bad choices in the future, especially if diminished public interest in the issue increases the odds of regulatory capture."
A regulatory body like the FCC is created by the government to police entities (like Comcast or AT&T) that left alone, may not be adequately answerable to the forces of market competition or interested in serving the public. But over time, companies and organizations can pry the regulatory body away from its responsibility to regulate in the public interest by exerting influence through paid lobbyists, lawyers, think tanks, and so on. This tendency on the part of bureaucracies to regulate on behalf of the industries that are supposedly being regulated, rather than on behalf of the public, is so pervasive that it has a name: regulatory capture.
Technology history wonks are well aware that the FCC has often acted as the incumbents' guard dog, tossing up barriers to new technologies at the behest of established corporations. Skeptics may dismiss these battles as inter-industry bickering, but even when the public loudly supports a particular course of action, the FCC frequently ends up unable to shake the influence of the industries it's supposed to be regulating.
For instance, consider the media consolidation battle that has raged around the FCC for the last seven years. When the FCC first loosened media ownership limits that kept corporations from dominating broadcast and print communication, the Commission was met with widespread opposition from the public, academics, and public interest non-profits (similar to today's broad coalition of net neutrality advocates). Thousands of citizens signed up to speak out against media consolidation at official FCC hearings across the country and the FCC reviewed over 167,000 comments on the issue. But instead of making efforts to preserve media diversity, the Chairman unleashed large corporations, allowing them to own both newspapers and TV stations in the same market. Opposing the Chairman's decision, FCC Commissioner Jonathan Adelstein lamented the effects of capture in a statement:
By moving forward now with relaxation of the newspaper-broadcast cross-ownership rule, the majority ignores the repeated pleas of the American people and their representatives in Congress. [...] As we solicited the views of citizens across the country, we did not hear a clamor for relaxation of the cross-ownership rules. We only hear that from media company lobbyists inside the Beltway.
Having been captured on media consolidation, the FCC would have ignored the public completely if not for the intervention of the courts in 2003's Prometheus v. FCC decision, and this years' Senate resolution. It took a stern smackdown from Congress to put the brakes on media consolidation, despite the years-long grassroots effort to address the FCC directly.
All things considered, the halls of the FCC are far from a level playing field. The FCC policy machine is led by unelected Commissioners, often able to ignore public opinion. The telephone and cable companies have deep, long-standing relationships with the FCC and lobby heavily to neuter, derail, or otherwise reverse the course of regulation that goes against their agenda. Many FCC officials treat their time at the Commission as a way station, looking forward to careers lobbying on behalf of the companies they are supposed to be regulating. Meanwhile, Internet companies have far less experience and influence; entrepreneurs and individuals essentially have none. In this environment, can the FCC be trusted to preserve the values of the Internet?
One thing is certain — the Comcast decision is just the beginning of this fight.
As our US 99% of WE THE PEOPLE know our American history -----the term WILD WEST simply means that period when East Coast expansion West opened a FRONTIER having no LAW AND ORDER.
What does opening a WILD WEST today after a few hundred years of CIVILIZED SOCIETY do to an AMERICA----it TAKES OFF THE VEILS as global banking 1% calls it ----allowing for the massive movement of US GOVERNMENT ASSETS and our 99% people's pockets disappear in a FREE-FOR-ALL with global banking 1% OLD WORLD KINGS making sure those WILD WEST 5% FREEMASON/GREEKS only get a small percentage of the LOOT.
REGULATION OF DARK WEB has nothing to do with bringing LAW AND ORDER----after all we still have the same global banking 1% CLINTON/BUSH/OBAMA players in office. What it does is indicates all that ROBBER BARON WILD WEST LOOTING is over-----all the 5% player PERKS including COMMUNICATIONS will be gone.
No matter how much a global banking 5% freemason/Greek player PRETENDS they will still be able to access PHONE COMMUNICATION on DARK WEB----they are still LYING, CHEATING, and stealing our 99% WE THE PEOPLE ability to communicate on PHONES.
REAL left social progressives have KNOWN and shouted since 1990s that these were the goals of CLINTON/GORE expanding internet all tied to global military corporations.
There is no bigger global banking 1% FAKE NEWS media outlet then ROLLING STONES. Here we see an article telling us all about what happened AFTER IT ALL HAPPENED pretending to be POPULIST because it is reporting these events AFTER THE FACT. Back in 1990s when our REAL LEFT SOCIAL PROGRESSIVE academics and media were shouting the goals of CLINTON/GORE GLOBAL MILITARY DARPA----ROLLING STONE media was touting all that INTERNET FREEDOM as GOOD FOR EVERYONE.
The Darknet: Is the Government Destroying ‘the Wild West of the Internet?’
Inside the Web’s secret space for drug dealers, arms traffickers, hackers and political dissidents
By David Kushner
On July 15th in Pittsburgh, David J. Hickton, a gray-haired U.S. attorney in a crisp dark suit, stepped out before an American flag to announce the feds’ latest victory against online crime. “We have dismantled a cyber-hornet’s nest of criminal hackers, which was believed by many to be impenetrable,” he said. “We are in the process of rounding up and charging the hornets.” By the next morning, more than 70 people across the world had been charged, arrested or searched in what the Department of Justice called “the largest coordinated international law-enforcement effort ever directed at an online cybercriminal forum.”
After an 18-month international investigation led by the FBI, known as Operation Shrouded Horizon, hackers on a site called Darkode were accused of wire fraud, money laundering and conspiring to commit computer fraud. The trail of crimes was massive, with one member compromising companies including Microsoft and Sony and another swiping data from more than 20 million victims. Hickton said Darkode posed “one of the gravest threats to the integrity of data on computers in the United States and around the world.” Its computers were considered “bulletproof” from the law by running on offshore servers — including one traced to Seychelles, the remote island nation in the Indian Ocean. “Cybercriminals should not have a safe haven to shop for the tools of their trade,” said FBI Deputy Director Mark F. Giuliano, “and Operation Shrouded Horizon shows we will do all we can to disrupt their unlawful activities.”
At least for a bit. Two weeks later, “Sp3cial1st,” the main administrator of Darkode, posted a retaliatory statement on a new website — underscoring the feds’ struggle to police the Internet. “Most of the staff is intact, along with senior members,” Sp3cial1st wrote. “It appears the raids focused on newly added individuals or people that have been retired from the scene for years. The forum will be back.” He vowed the organization would regroup on the Web’s deepest, most impenetrable region, the Darknet — a space where anyone, including criminals, can remain virtually anonymous. And the Darknet could never be shut down — thanks, conveniently, to the feds, who created it and are still financing its growth.
The Darknet (sometimes called the Dark Web) works on the Tor browser, free software that masks your location and activity. Originally designed by the Naval Research Lab, Tor receives 60 percent of its backing from the State Department and the Department of Defense to act as a secure network for government agencies as well as dissidents fighting oppressive regimes. It is a privacy tool that has been used for both good and evil. Over the past decade, Tor has empowered activists to spread news during the Arab Spring; it has helped domestic-violence victims hide from online stalkers; and it has allowed ordinary citizens to surf without advertisers tracking them. But at the same time, the Darknet, which Tor enables, has become the primary cove for criminals like Ross Ulbricht, imprisoned founder of Silk Road; the hackers behind the recent Ashley Madison attacks; and the international crew busted by the feds in July. As an instrument for both activists and criminals, Tor presents an increasingly difficult problem for law enforcement to solve — exacerbating the hapless game of whack-a-mole facing those who try to bring law to the most lawless part of the Net. And the battle over the Darknet’s future could decide the fate of online privacy in the U.S. and abroad. As Hickton tells Rolling Stone, “It’s the Wild West of the Internet.”
Think of the Web as an iceberg. Most people only see the so-called Surface Web above the water: all the news and gossip and porn that’s just a Google search away. But dive below and you’ll see the vast expanse of the Deep Web: all the data that search engines can’t find, which is much larger than the Surface Web. This includes anything behind a paywall (like Netflix), a password-protected site (like your e-mail) or a Web page that requires you to do your searching there (like when you’re trying to find court records).
The Darknet lurks in the Deep Web, because the sites there can’t be found by search engines either. But here’s the big difference: The Darknet is composed of people and sites that want to remain anonymous and, unless you’re using the Tor browser, are nearly impossible to find. Tor lets you peruse the Surface Web, just as you do with Firefox or Safari, but it also allows you to surf Amazon and Silk Road. Using a regular browser like Firefox, you can be identified by your Internet Protocol (IP) address, the numerical code that can be traced to your unique device. But on the Darknet, your location — and the locations of the people overseeing the sites you search — remain hidden. Most people use Tor for law-abiding privacy purposes. In fact, according to the Tor Project — the government-funded nonprofit that maintains the browser — Darknet surfing accounts for only three percent of Tor usage. (And criminal activities are just a fraction of that.) But because the Darknet is so seemingly shadowy and mysterious, it has become ominous in the popular imagination, a creepy catchall that includes everything scary lurking online: terrorists, pedophiles, dope dealers, hackers-for-hire.
In the past year, some of those scarier elements have been surfacing. In May, the feds sentenced Ulbricht, founder of Silk Road — the online black market that generated roughly $200 million in sales — to life in prison. In August, hackers dumped the personal information of 36 million users of Ashley Madison, the cheaters’ website, on the Darknet. After ISIS claimed responsibility for a shooting outside a Prophet Mohammed cartoon contest in Texas in May, the Darknet was singled out for blame. Michael B. Steinbach, assistant director of the FBI’s counter-terrorism division, told the House Homeland Security Committee that encryption tools have given such terrorists “a free zone by which to recruit, radicalize, plot and plan.” Without the ability to adequately monitor the terrorists online, Steinbach went on, “we’re past going dark in certain instances. We are dark.”
YES, BOTH ISIS AND ARAB SPRING ARE GLOBAL BANKING 5% CIVIL UNREST CIVIL WAR OPERATIONS TIED TO DEPARTMENT OF DEFENSE.
Despite the high-profile busts of Darkode and Silk Road, the Darknet is thriving. According to an August study by researchers at Carnegie Mellon University, criminals earn an estimated $100 million a year by selling drugs and other contraband on hidden websites using the virtual currency bitcoin, the digital cash that doesn’t require a credit card or bank to process the transactions. The feds aren’t just battling bad guys adept at hiding online, they’re also facing a massive rush of ordinary people looking to score anonymously. “Given the high demand for the products being sold,” the CMU researchers conclude, “it is not clear that takedowns will be effective.”
Though a lot of people think you have to be some kind of hacker to navigate the Darknet, it’s surprisingly easy to sell or buy illegal goods and services. Click on Tor, and it looks like any other browser — complete with its own cartoonish onion logo — though it moves more slowly because of complex routing behind the scenes. Instead of ending in a .com or .org Web address, Darknet sites end in .onion and are often called onion sites. Since Google doesn’t crawl onion sites, you need to use rudimentary Darknet search engines and listings such as the Hidden Wiki or Onion Link.
Black-market Darknet sites look a lot like any other retailer, except there are categories for, say, benzos, psychedelics and used AK-47s instead of woks and lawn ornaments. On Silk Road 3, a site unaffiliated with the original one, you can search by category, or scroll down to see pictures and descriptions of bestsellers: 1 g 90 percent-purity coke, x10 methylphenidate XL 18 mg (Concerta/Ritalin), and so on. Vendors are verified and rated by the community, just as on eBay and other shopping sites.
But while navigating the Darknet seems easy enough, law enforcement has a much more difficult time busting the bad guys for one simple reason: The same tools that keep government agents and dissidents anonymous keep criminals virtually invisible too. “This is the crime scene of the 21st century, and these traffickers are finding all kinds of ways to cover their tracks,” says Karen Friedman Agnifilo, Manhattan’s chief assistant district attorney, who’s among those leading the fight against criminals online. “Law enforcement has to play catch-up.”
Paul Syverson, a 57-year-old mathematician at the U.S. Naval Research Lab, created Tor as a means for people to communicate securely online. “We certainly were aware that bad people could use it,” says Syverson, wearing an M.C. Escher T-shirt in his cluttered office in Washington, D.C., “but our goal was to have something for the honest people who need to protect themselves.”
OH, REALLY????? SOMEHOW HUNDREDS OF TRILLIONS OF DOLLARS IN GLOBAL BANKING 1% FRAUD AND MONEY-LAUNDERING ESCAPED ALL THAT HONEST--PERSON ACTIVITY?
Since its inception in 1923, the NRL has been the military’s most esteemed research and development lab, inventing everything from radar to GPS. In 1995, Syverson and his colleagues conceived a way to make online communications as secure as possible. The idea was to provide a means for anyone — including government employees and agents — to share intelligence without revealing their identities or locations. With funding from the Department of Defense, Syverson brought on two scruffy graduates from the Massachusetts Institute of Technology, Roger Dingledine and Nick Mathewson, to help bring his vision to life. Like Syverson, Dingledine — a ponytailed privacy activist from Chapel Hill, North Carolina — saw the project as a way to empower everyone in the age of online surveillance. “How can we build a system that gives you privacy in the face of the large governments who are surveilling the Internet as much as they can?” Dingledine asks. “That’s a really hard research problem.”
BUT DARPA IS THE GLOBAL CORPORATE TRIBUNAL BEHIND ALL THE NSA/HOMELAND SECURITY SURVEILLANCE!
To understand how the problem was solved, imagine a spy taking a train from Paris to Berlin. If the spy travels directly, he can easily be followed. But if he takes a series of trains between several cities — Paris to Amsterdam, Amsterdam to Madrid, Madrid to Berlin — he’s harder to trace. This was essentially how Syverson and his team designed the solution. Instead of a spy in Paris directly accessing a computer in Berlin, he would be routed through a random series of computers along the way, hiding where he was based. They called the network the Onion Routing, evoking this layered means of online access.
If only military people used Tor, though, it’d be obvious that the traffic was government-related. “We wanted to have a network that would carry traffic for a variety of users,” Syverson says, “so you don’t necessarily know if this is a cancer survivor looking up information or somebody from the Navy.” In order to do that, Syverson and his team made a decision he calls “central to the security of the system”: They designed Tor to be freely available online and open-sourced, which meant it could be assessed and improved by anyone around the world.
The Tor network wasn’t just designed to hide who is accessing websites, it was created to give websites the ability to mask the locations of the servers hosting them. One of the ideas was to provide a kind of secret bunker for government websites, so that if they were under attack, agents could visit a hidden version of the site online without hackers tracing them. These were the sites that ended with .onion. The Tor creators call them “hidden services” sites — today, it’s more sensationally known as the Darknet.
In 2003, Tor software was publicly released. Word about the browser spread on forums among privacy advocates and researchers, and it soon became the most resilient and important tool for anyone seeking to preserve their anonymity online. Geeks, agents and activists formed a volunteer network of nodes that routed Tor traffic anonymously across the world. Before long, people could reliably surf the Internet without being traced — out of sight of anyone who wanted to know who they were, where they were traveling or what they intended.
Tor’s early adopters weren’t criminals — they were dissidents. One of them is Nima Fatemi, a black-clad 27-year-old Iranian who serves as a key Tor evangelist — helping others around the world use the software to fight oppressive regimes. “We needed something different to connect to the Internet safely,” he tells me. “I found Tor and thought, ‘This is the tool.’ It was peace of mind.”
WELL, WE CALL THEM CONTINUOUS WARS GLOBAL BANKING 5% FREEMASON CIVIL UNREST CIVIL WAR PLAYERS----NOT DISSIDENTS.
In the summer of 2009 in Tehran, Fatemi was running for his life from riot police after shooting photos of a protest. “I felt it a duty because so many people outside of Iran had no idea that we were protesting,” he says. “The state TV was just showing photos of flowers and stuff.” As soldiers chased him, Fatemi tore through the streets, leaping over a fallen woman, and turned into a courtyard where a sympathetic family gave him cover. “The police would attack me as if I had an RPG on my shoulder,” Fatemi says.
It’s dangerous to be a social-media activist in certain parts of the world. Recently, a blogger in Brazil was beheaded, and another in Bangladesh was killed with machetes. In Iran, blogger Soheil Arabi was sentenced by the Supreme Court to be hanged for “insulting the Prophet Mohammed” in Facebook posts. (His sentence was later commuted to two years of mandatory theology study, but he is serving a seven-and-a-half-year jail sentence for insulting the Supreme Leader.) This year, four secular bloggers were murdered in Bangladesh alone.
At the time of his near capture, Fatemi had been uploading photos that were used on Facebook and Twitter to spread breaking news of the Iranian government’s crackdown on dissidents. Under increased scrutiny, he’d turned to Tor to continue working anonymously — and to help himself and his fellow activists stay out of jail. Fatemi held private workshops in Iran, teaching friends and family how to use the software and thus strengthening the network, as more users meant more nodes with which to relay and hide the online traffic. “We spread the tool everywhere,” he says.
In the decade since the Tor software has been released, it has spread virally beyond the U.S. government and into the activist community. This is fueled in part by the Electronic Frontier Foundation, the digital-rights group which used to fund and still champions Tor as a powerful pro-democracy tool. Jacob Appelbaum, the noted activist who has worked closely with Edward Snowden and Julian Assange, calls it “surveillance resistance.” By using Tor in place of another browser, protesters and journalists can log on to Twitter or surf dissident chat rooms with far less risk of being tracked by a government that might imprison them or worse. “There are countries where browsing a political website about democracy can get you thrown in jail,” says Jeremy Gillula, a staff technologist at the EFF. “That’s the most life-and-death reason why Tor needs to exist.”
During the Arab Spring, Tor helped facilitate protests throughout the Middle East. Nasser Weddady, a 39-year-old Mauritanian-American activist, was living in the States and began promoting the underground browser — becoming one of the most influential social-media dissidents during the uprising. “There would be no access to Twitter or Facebook in some of these places if you didn’t have Tor,” he says. “All of the sudden, you had all these dissidents exploding under their noses, and then down the road you had a revolution.”
With the Tor Project still largely being financed by the DOD, Mathewson and Dingledine have kept the software and community evolving. For Mathewson, a bushy-bearded 38-year-old sci-fi fan, its continuing spread among activists throughout the world exceeded his dreams. “I’d be getting e-mails from people saying, ‘I’m pretty sure your software saved my life,’ ” he recalls. “I’d say, ‘I’m very glad you’re alive, but I’m just this person who’s been writing software — I hope I don’t screw anything up!'”
On January 27th, 2011, Ross Ulbricht, operating under the pseudonym Altoid, announced the launch of the first black-market site to exploit the cloaking powers of the Darknet. “I came across this website called Silk Road,” he posted on a drug forum called Shroomery.org, posing as a customer. “It’s a Tor hidden service that claims to allow you to buy and sell anything online anonymously.”
Ulbricht, who ran the site as Dread Pirate Roberts, was the first to fully exploit Tor’s potential for fostering a new kind of criminal enterprise. It was more of a novel idea than a technical feat. Ulbricht, or anyone running an illegal Web page, could simply create it on the Tor hidden network. This made it difficult not only to find who was hosting the address, but also who was visiting it. But Ulbricht went further by using bitcoin to make the subsequent transactions just as hard to track.
By the summer of 2011, word of the Darknet hit the press and the pols. In a July news conference about Silk Road, Sen. Chuck Schumer, of New York, demonized drug sellers and buyers who were “hiding their identities through a program that makes them virtually untraceable,” and called on the Drug Enforcement Agency to crack down. Time magazine called the Darknet “a haven for criminals….where drugs, porn and murder live online.” The Daily Mail warned that “hiring a hitman has never been easier.”
Many activists in the Tor community, however, wince when they hear the word “Darknet.” Criminal sites, they say, represent a tiny fraction of .onion traffic. For them, the focus on criminality obscures Tor’s greater intent. “I don’t think very much of the term ‘Darknet,'” Mathewson says with a groan. “I think it’s pretty much a media creation.”
Whatever it’s called, powerful agencies are still taking the Darknet seriously. According to an Edward Snowden leak in October 2013, the NSA, during a top-secret presentation in 2012, considered Tor a threat. “Tor stinks,” reads the title of one NSA slide. “We will never be able to de-anonymize all Tor users [but] we can de-anonymize a very small fraction. ” (When contacted by Rolling Stone, the NSA declined to comment.) In another of Snowden’s revelations, Britain’s intelligence agency, the Government Communications Headquarters, dismissed the democratic potential of Tor as “pseudo-legitimate uses” that paled next to the “bad people” who ruled the Darknet.
We are not going to discuss FINANCIAL public policy this week---but we do want to make sure our US 99% WE THE PEOPLE know that what is called NATIONAL DEBT----tied to US TREASURY BONDS, STATE AND LOCAL MUNICIPAL BONDS----is only debt on paper. It is not REAL DEBT----it is manufactured debt in this case all done ILLEGALLY-----it was all done violating our US CONSTITUTION----it was an attack against our US sovereignty so it can be VOIDED---EASY PEASY.
The FOREIGN INVESTORS tied to these debts are being told they can building FOREIGN GLOBAL FACTORIES with our US TREASURY BOND DEBT and our US 99% of WE THE PEOPLE taxes will pay for it. So, the costs of Chinese global factories being built in US FOREIGN ECONOMIC ZONES will be ZERO----because our BALTIMORE AND GREATER BALTIMORE 99% OF WE THE TAXPAYERS will be paying this US TREASURY debt for the next 60 years.
REMEMBER, ALL OF THIS DEBT TIED TO BUILDING GLOBAL CORPORATE CAMPUSES AND FACTORIES INSIDE US FOREIGN ECONOMIC ZONES----IS THE MONEY WE NEED TO REBUILD OUR 20TH CENTURY REAL PUBLIC UTILITY INFRASTRUCTURE WITH PLENTY OF ACCESS TO COMMUNICATIONS ----PHONES AND INTERNET MESSAGING.
It doesn't become DEBT until we allow global banking 1% SPEND IT building global corporate campuses and global factories in Baltimore City----Greater Baltimore---and of course all of MARYLAND was made a FOREIGN ECONOMIC ZONE AKA----SANCTUARY CITY------meaning
NO PHONES FOR YOU!
What our US 99% WE THE PEOPLE lost these few decades was NIXON'S FIAT MONEY-------please don't think a SHIP OF FOOLS can WIN ----
Here’s who owns a record $21.21 trillion of U.S. debt
Published: Aug 23, 2018 11:26 a.m. ET
Americans own 70% of U.S. debt, but China, Japan loom large
Who owns the huge and growing U.S. national debt?
By and large, Americans.
Some 70% of the national debt is owned by domestic government, institutions investors and the Federal Reserve. A shade under 30% is owned by foreign entities, according to the latest information from the U.S. Treasury.
The nation’s debt climbed to a record $21.21 trillion at the end of June, a 6.9% increase from a year earlier.
American institutions such as private and state pension funds as well as individual investors were the biggest holders. They owned $6.89 trillion in debt and absorbed about four-fifths of the increase over the past year.
Foreigners, led by the Chinese and Japanese, owned $6.21 trillion. Those two countries have cut their stakes since 2015, but each country still owns more than $1 trillion worth of Treasury bonds and notes.
The Chinese government or Chinese investors likely own even more U.S. debt purchased through entities in other countries such as Hong Kong, Luxembourg or the Cayman Islands, all of which are havens for tax shelters.
Notably, Russia has slashed its Treasury holdings to a mere $15 billion from a peak of $153 billion in mid-2013 amid worsening tensions with the U.S.
So far there’s little evidence that other countries will follow suit to strike back at the U.S. amid ongoing trade disputes. Many need or want Treasury bonds and notes as a safe place to park their savings.
The U.S. government, for its part, owned $5.73 trillion in debt, mostly via Social Security and federal pension funds.
The Federal Reserve owned $2.38 trillion in debt, but it trimmed its holdings by $85 billion since June 2017. The Fed last year began to partly sell off the vast hoard of Treasurys it snapped up to lower interest rates and flood the economy with cash during and immediately after the Great Recession.
REAL LEFT SOCIAL PROGRESSIVE liberal capitalism built all that PUBLIC UTILITY infrastructure bringing PHONE service to all US 99% of WE THE PEOPLE. We made sure our poor citizens not having LAND LINES could drop a DIME in a CORNER PUBLIC PHONE----we made sure a stranded citizens could CALL COLLECT to reach a family member.
THAT WAS LEFT SOCIAL PROGRESSIVE CAPITALISM-----what is MOVING FORWARD is 3000 BC HINDI-BRAHMIN where only the OLD WORLD KINGS global 1% have that INVENTION.
REMEMBER----it was a MASON ---PROMETHEUS daring to bring FIRE to our 99% WE THE PEOPLE defying all those gods and goddesses wanting those inventions just for themselves. We were reading a novel where NYC streets had a PROMETHEUS flame on early telephone poles as that FLAME became ELECTRICITY-----then became MA BELL.
Pretenders The Phone Call
Published on Jul 13, 2012 YOU TUBE