Women make the best spies, MI5's Dame Stella Rimington says. Dame Stella Rimington said women make some of the best spies because they are better listeners than men and instil confidence in their sources Women make some of the best spies because they can combine sympathy and persuasiveness with a ruthless streak, according to the former head of MI5. Dame Stella Rimington said female agent runners who recruit targets from terrorist organisations or other intelligence services can be more successful than their male counterparts. This is because they're often better at listening and instilling confidence in their intelligence sources by keeping calm and putting them at their ease. The bestselling novelist, who was the first female director general of MI5 between 1. She told the Sunday Times Festival of Education at Wellington College, Crowthorne, Berkshire, that when she joined MI5 in the 1. She said: 'If your object is to recruit someone who is in a place to know what you want to know and to persuade them to work for you in the first place and then also to persuade them to stay where they are so you have a long term source of information coming in from the centre, doing that requires, I think some of the skills, that we regard now as the female skills.'Because it's about persuasion, it's about sympathy, it's about listening, it's about giving an air of confidence, a calm confidence.'All these, I think are female skills, and there's also a need for a degree of ruthlessness which I think is also a female skill as well, although perhaps, it's not necessarily always wise to say that.'Speaking afterwards, Dame Stella said: 'I don't think women make better spies but I do think it's very important to have diversity so that you have different approaches and different personalities involved.'So, it depends not really on your sex but on your personality. You do need both in any well run intelligence organisation.'However Dame Stella said that women 'obviously have certain different characteristics from men', which can work to their advantage. Referring to women agent runners, she said: 'They are often better at listening, for sort of quiet support that somebody in a difficult, dangerous situation needs - instilling confidence.'They're not always quite so intense as a young man might be, desperate to get the information.'A woman might be able to be just slightly more relaxed.'But you know, again, I find it very difficult to say all women are this or that and all men are this and that because they're not. We know they come in all different shapes and sizes.'That's why I always go back to this important thing about diversity in any organisation or company.'Scroll down to video. Dame Stella said that women 'obviously have certain different characteristics from men', which can work to their advantage. Earlier this year, a parliamentary Intelligence and Security Committee (ISC) report said that women make up just over a third of Britain's spies and fewer than one in five are in senior ranks. Labour MP Hazel Blears, a member of the ISC, warned of a 'permafrost' of men with traditional male mentality and outlook - all from similar backgrounds.
Christopher Bollyn is a well-travelled writer and an investigative journalist who has done extensive research into the events of September 11, 2001, the conflict in. ONLY FOR THOSE AS YET TO WAKEN UP. Do you think the cops are there to protect you from criminals? Do you think judges are there to give you justice? But Dame Stella said she didn't think there's 'a permafrost at all'. She said: 'I can only speak obviously from my former service - it's not about whether you're male or female, it's whether you're good at the job.'Whether you work hard, whether you're successful, whether you're committed and whether you've got the skills to do the job.'She added: 'I think there are a lot of things in place now that certainly weren't in place when I was working.'For example, I know that now there are, not only for women but probably for men as well, part time jobs, there are job shares, there are people who work only during the school terms so there's a great deal of flexibility now, which there certainly never was in my day.'That must have made it that much easier for men and women running families.'. Renowned American academic Noam Chomsky says the United States would be recognized as a leading terrorist state if international law is applied. Etimologia del termine. La parola italiana libro deriva dal latino liber. Il vocabolo originariamente significava anche "corteccia", ma visto che era un materiale. This is a WHISTLEBLOWER WEBSITE to let every citizen in the US know that they and their families lives are in grave danger of mass slaughter by our TOTALLY ROGUE. Table of Contents Solving 9-11: The Deception that Changed the World. By Christopher Bollyn Table of Contents Updated June 2011 (The bold blue titles of the chapters. Shalev was not alone in his journey of discovering the new chapters of Hitler’s life after the war. Initially, researcher Pablo Weschler came to him with this idea. Historian - . Noted for his breadth of knowledge on World Wars I and II and its prominent figures, German historian Reuth has enjoyed much acclaim for his numerous books covering the World Wars era. In his new 2. 00. Hitler’s Jewish Hatred - Cliche and Reality, Ralf Georg Reuth recounts that Hitler blamed the Jews for both the collapse of the German economy and the Russian revolution. Of particular note is one of the comments attached to the article made by a British subscriber regarding Jewish influence in Pre- WWII Germany: “I thought this was all fairly obvious.” Indeed, Jewish control of the banks, the stockmarket, the press and commerce, is “fairly obvious” - BUT - to state this obvious fact OUT LOUD will have all the Jews breathing down our necks crying, “Anti- Semitism!” Thank God that finally a historian with repute among the general public has no fear of Jewish attempts to censor the truth. HITLER & THE JEWISH . Hitler would later blame Jewish journalists who fled Nazi Germany for inciting belligerence against Germany leading to WWII. To Hitler and many others, it was left liberal politicians and supporters, (German Jewish bankers and their international Jewish network), of the Weimar Republic who . They would soon become known as the November Criminals. HITLER INCLUDED IN HIS LISTof November Criminals, the international Jewish bankers who financed and controlled the Weimar Republic. These Jewish bankers operated both out of Frankfort, (known as the . Frankfort produced its Rothschilds, Lazards, Warburgs, Dreyfuses, Seifs, as well as sending to New York, Jacob Schiff, an agent for Walter Rothschild. During the war, Adolf Hitler became obsessed with this idea, especially laying blame on Jews and Marxists in Germany for undermining the war effort. HITLER AND THE JEWISH COMMUNISTS“WITH WORLD WAR ONE LOSTand Germany in financial ruin, Hitler came to view the Jews as solely responsible for the growth of Bolshevism,” writes Reuth. In his book, Reuth quotes Nobel prize- winning novelist, Thomas Mann, who equated the Bolshevik revolution in Russia with the Jews. Continuing, Reuth writes: “When a Soviet Republic (Munchner Raterepublik) was declared briefly in Munich in 1. Hitler to point to the Jews as bearing responsibility for the nation’s ills. Hitler saw that many German Jews played prominent roles in the growing communist movement, which was against everything Hitler the nationalist stood for. Two events - Germany’s defeat of the war due to Jewish financial intrigues together with the Russian revolution and its threat to Germany - shaped Hitler’s views of Jews and his subsequent plan to rid Germany of them all.”View Entire Story. Here. A defining moment in the political formation of Adolf Hitler, was the January 1. Spartacus Uprising (Spartakusaufstand) in Berlin. The prominent figure in the uprising was the communist Jew, Rosa Luxemburg. Luxemburg, along with other left- wing Jews including Karl Liebknecht, founded the socialist Spartacus League (Spartakusbund) in 1. During the war, Luxemburg drafted the Spartacus programme, Leitsatze, which called upon socialists to turn the nationalist conflict in Germany into a revolutionary war with international consequences. View Entire Story. Here & Here. THE LESSON FOR TODAYWHILE NOT ADVOCATING VIOLENCE against any specific group, a solution to the “Jewish Question” must be arrived at. For as Reuth points out, and it is certainly applicable today, Pre- WWII Germany saw a tremendous rise of Jewish influence in every sphere of its societal infrastructure. This overwhelming Jewish influence is indeed the situation we now find ourselves in today - both in America and in Europe. The question remains, “What can we do about this preponderance of Jewish influence?”Jews are the most organized power bloc in the world. Thus, to combat Jewish supremacy, Gentiles must ALSO become an organized power bloc. The Jewish- occupied media have convinced the Gentiles that the one organization that can oppose them, the historic Christian Church, (not the Zionist- Protestant innovation), is an institution to be shunned. Thus, many Gentiles will say, “I don’t believe in organized religion.” This is a piece of Jewish brainwashing - exactly what the Protocols Of The Elders Of Zion planned. But Jews do believe in organized religion, their own synagogue. The synagogue of the Jews is called in the Bible, “The Synagogue of Satan.” The Church, however, the Bible calls, “The New Jerusalem,” that is, “The City of Peace.” Thus, if Gentiles, who once loved going to Church, can get organized, whether in Church buildings, home groups, or foundations, they can STOP the Jews from taking over America and all the nations that host them.! Street Evangelist! Please Help Support This Site! Or Send Your Contribution To: Brother Nathanael Kapner; PO Box 5. Priest River ID 8. E- mail: bronathanael@yahoo. Brother Nathanael @ July 5, 2. Flame Virus Attacks the Internet. By Dr. Mercola. Big Brother is watching. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related to the recent discovery of the data- mining virus named “Flame.” In a June 3 New York Times article, Andrew Kramer and Nicole Perlroth write. When Eugene Kaspersky, the founder of Europe’s largest antivirus company, discovered the Flame virus that is afflicting computers in Iran and the Middle East, he recognized it as a technologically sophisticated virus that only a government could create. He also recognized that the virus, which he compares to the Stuxnet virus built by programmers employed by the United States and Israel, adds weight to his warnings of the grave dangers posed by governments that manufacture and release viruses on the internet. While the United States and Israel are using the weapons to slow the nuclear bomb- making abilities of Iran, they could also be used to disrupt power grids and financial systems or even wreak havoc with military defenses.” Mr. Kaspersky claims he was called in to investigate the new virus on behalf of the International Telecommunication Union, an agency of the United Nations. The virus was allegedly erasing files on computers belonging to the Iranian oil ministry. This, clearly, has huge privacy implications were it to be deployed against civilian populations. The module in question.. But researchers also say that the Flame platform pre- dated Stuxnet and its sister, Duqu, and was likely built in the Summer of 2. Information. Week Security recently offered the following advice. Microsoft has been working quickly to patch the certificate bug exploited by Flame. Notably, Microsoft released an update Friday . Security experts are recommending that all users install the update as soon as possible, since attackers will likely attempt to use the certificate vulnerability before it becomes widely patched. Ullrich in a blog post. Patch Tuesday is one of the best dates to launch such an attack, as you do expect patches anyway. According to Wired Magazine: “Under construction by contractors with top- secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2. Flowing through its servers and routers and stored in near- bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2. Americans’ privacy. But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. And code- breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”. And for those of you still under the mistaken belief that the US government does not have the authority to spy on its citizens, consider the following: “.. The broad outlines of the so- called warrantless- wiretapping program have long been exposed.. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. As chief and one of the two cofounders of the agency’s Signals Intelligence Automation Research Center, . He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber- optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country.. The network of intercept stations goes far beyond the single room in an AT& T building in San Francisco exposed by a whistle- blower in 2. The eavesdropping on Americans doesn’t stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT& T’s powerful earth stations.. Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything..”. To learn more, I highly recommend reading the featured Wired article. It’s a fascinating read, but it will not likely make you sleep better at night. The full article is available on their website and is free to view. Google won’t say how it figured out that state- sponsored attackers may be attempting to compromise your account or computer. But it’s promised to let you know if it thinks Big Brother is tuned in to what you’re doing. As recently reported on the New York Times’ blog. Gmail inbox, Google home page, or Chrome browser, stating: “Warning: We believe state- sponsored attackers may be attempting to compromise your account or computer.”. According to a Google blog post by Eric Grosse, VP of Security Engineering at Google. If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account. Here are some things you should do immediately: create a unique password that has a good mix of capital and lowercase letters, as well punctuation marks and numbers; enable 2- step verification as additional security; and update your browser, operating system, plugins, and document editors. Attackers often send links to fake sign- in pages to try to steal your password, so be careful about where you sign in to Google and look for https: //accounts. These warnings are not being shown because Google’s internal systems have been compromised or because of a particular attack.”. The Next Big War Zone = the Internet. Unless you’ve been living under a rock this past year, you’ve surely heard about the repeated attempts to restrict your online freedom and grant government near limitless control over the internet and its content. It began in January with the introduction of two proposed laws in US Congress: the Stop Online Piracy Act (SOPA), and the Protect IP Act (PIPA). While “sold” as laws to address online copyright infringement, most of which allegedly arise from outside the US, both laws contained measures capable of severely restricting online freedom of speech and harm web sites and online communities of all kinds, including this one. After tens of millions of people rose up in various protests, both online and by hitting the pavement, both bills were “indefinitely postponed.” Many have warned, however, that the bills are not “dead” and are likely to return. It didn’t take long for the next round. In April, the Cyber Intelligence Sharing and Protection Act (CISPA) was brought forth, and quickly became described by opponents as an even greater threat to internet freedom than SOPA and PIPA. I won’t go into any detailed discussion on these bills here, but simply want to bring your attention to the fact that bills such as these three, while dressed up as laws that will protect you and save you money, are poorly guised attempts to gut privacy laws and open the door for a totalitarian takeover of the internet and its content. Campaign for Liberty. December, the United Nations will also be meeting to compile even more recommendations for international internet regulations. While it may seem hopeless at times, I urge you to take an active role anytime the opportunity presents itself to take a stand. I personally believe internet freedom and health freedom go hand in hand these days, as a majority of people get a majority of their health information from freely available web sites such as mine. Right now, you can sign the Campaign for Liberty Protect Internet Freedom Mandate. Department of Homeland Security gets some new gadgets next year that will allow them to instantly know everything about your body, clothes, and luggage with a new laser- based molecular scanner . Not only that, they can do it anywhere, including sports events and even while you're stopped at a traffic light. It's supposed to be good for you in that it might help you stay on track for your health- -but the question is, do you want to just give your privacy away?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |