Posted on 05/31/2022 8:47:15 PM PDT by weston
BRING THEM BACK!
Oh, lol. So I’m still safe going to Arizona, good to know,
Hope it turns out!
I love it with a rhubarb topping, or the standard blueberry. Also fresh strawberries or peaches. And sometimes I make a cherry topping.
Can anyone recommend a very basic video to send to someone who is just starting to wonder what the heck is going on. I tried explaining Klaus Schwab and the WEF, but it just sounded so out there that I didn’t do it justice.
Is there a fairly simple explanation on video that anyone knows of, explaining the Not Great Reset? My former sister-in-law is one of those that just follows along (triple vaxed and lost her hearing in one ear, but doctor said not related to the vax, so she believes him). She might watch something that’s not terribly in depth.
Reviewing #AdamSchiff's reputation. pic.twitter.com/TvMGyAnX0s— Stu Burguiere (@StuDoesAmerica) June 21, 2022
RNC Research
@RNCResearch
· 3h
Mollie
@MZHemingway
·
1h
ooft
__________________________________________________________
BIDEN: “You see Dr. Jha, see that guy right there? He’s the guy that’s running the CDC for me these days.”
Rochelle Walensky is the director of the CDC. Ashish Jha is Biden’s COVID response coordinator.
https://twitter.com/i/status/1539317098899308544
19 seconds
I am enrolled in CyberSecurity Course. Here is some interesting stuff
____________
In this video, you will learn to describe how the movie War Games spurred US President Ronald Reagan to create the first national policy on cybersecurity, describe how 9/11 and the increasing use of computers and smart phones has impacted the need for robust cybersecurity. So how did cyber security processes start? How the governments involve? How they start into the cybersecurity arena? Everything starts with Ronald Reagan. Ronald Reagan was United States president that also who was a Hollywood actor. He asked to the security personnel to their security advisors if something that he saw on the movie could be real. What movie? Let’s take a quick look into the movie that Reagan saw and he ask to the advisors.
Play video starting at :1:10 and follow transcript1:10
We are in. It thunks I’m falcon. Hello. How can it ask you that? It asks you whatever is programmed to ask you. You want to hear it talk? Yeah. I’ll ask it how it feels. I am fine, how are you? Excellent. It has been long time. Can you explain whether you are the user account June, 23rd, 1973. It must have totally died. People sometimes make mistakes. Yes they do. How can it talk? It’s not a real voice. This box just interpret signals from the computer and turns them into sound. Shall we play a game?
Play video starting at :2:9 and follow transcript2:09
So that movie was war games. It’s a pretty old movie actually, but the main argument of the movie was that, someone actually that teenager hack into a computer into the Pentagon and start a game the main computer of the Pentagon. The artificial intelligence that runs that computer understand that this is a war game, but it could or actually use the real missiles and the real nuclear arsenal. So teenager from their home office, from their basement hacked into a computer into the Pentagon and take the ownership of the missiles from their home. So Ronald Reagan asked the advisors, these could be real, this could be happening right now. So they start working on something, they actually work on the first policy for a cybersecurity field in United States that is called the National policy of telecommunication and automated Information Systems Security NSDD155. Then we jump to the 9/11. As soon as the 9/11 happened, a lot of people into the US government started asking, how can we avoid the next 9/11? How can we avoid the next cyber threat that will cause an interruption of for example, the lighting system, forward plans, energy systems on the United State field? The last part of this history class is the use of technology. Thirty years ago, 40 years ago, nobody had a computer in the house, right now, everyone has at least a computer, and at least one cell phone, one smartphone on their house. So there is a lot of people, there is a lot of technology arbiter and there is a lot of information that could be shared, could be stolen, and could be compromised using that technology.
___
In simple words, Moon Maze operation was the process to collect or dump passwords from Unix and Linux servers, not just from the NSA, but also from the NASA, the Department of Defense, and a couple of other organizations in the United States.
Dr. Robert Malone is now on TS.
RWMaloneMD
@RWMaloneMD
·
10h
OK - my first post at Truth Social. This is Robert Wallace Malone, MD @ rwmalonemd. And yes, this account is verified as the “real deal.” Thank you to Truth Social for getting me a verified account! Thank you Epoch Times for making it happen!
https://truthsocial.com/@RWMaloneMD
One nice operation was Clipper Chip operation developed by the NSA. In simple words, this operation was something that those guys in the NSA tried to incorporate like a chip into any landline for phones in most of the US homes to try to spy the communications. Obviously that project, that operation didn’t go well, didn’t receive any approval from the Congress
The unselect committee is obviously not the least bit interested in trying to prevent an incursion into the White House from ever happening again. They have no interest in why security at the Capitol failed.
It seems like financial revisions during the Biden ministration usually show that the previous month was worse than originally reported. I seem to recall that during the Trump administration revisions for the previous month usually said that it was actually better than originally reported. Maybe it is my imagination but I don’t think so
In that final picture, are they really the same person or, supposedly, a joke?
I think your imagination is reality.
I just voted. There had been maybe 5 democrats in the entire day. I did not make one more.
I voted for Mo Brooks. I think Brooks was wrong when he said we need to get past 2020. I think Trump was wrong when he said we had to get past Mo Brooks. Not a fan of Brooks. I don’t trust Katie Britt.
People might be having more parties and holiday celebrations this fall than in the last two years but I doubt that they will be buying as much stuff. Everything just costs too much.
.@BennieGThompson: "Just as we heard today that Donald Trump was deeply involved in the scheme to pressure state officials to overturn the election results, we will hear on Thursday that Donald Trump was also the driving force behind the effort to corrupt the Justice Department." pic.twitter.com/vkAWrTWgOb— CSPAN (@cspan) June 21, 2022
Gloom will really set in when the Stock market crashes. DOW goes under 20K and Nasdaq under 7K. Till then, media and elites are not directly affected. DC doesn’t care about the middle class. Low income will get Feds benefits. Middle income will be crushed and they don’t riot.
The Dems project all their sins unto Donald Trump.
The American people are starting to see through the whole charade.
“we will hear on Thursday that Donald Trump was also the driving force behind the effort to corrupt the Justice Department”
Is this referring to the United States Department of Justice, the same agency that hunted down Trump and so many people who worked for him for several years when the DOJ knew that their basic premise was a lie? Yikes! Sadly, with a kangaroo hearing where there is no defense at all and congressional immunity for congressman and their aides to be constitutionally free from prosecution for what they say, it just keeps getting worse.
China is threatening to close the Taiwan Strait
Beijing is making a bold move in international waters, threatening to close a key waterway the US frequently uses in what is a clear escalation of tensions.
..............
Ain't no joke, sorry to say. Lifestyle choice it was.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.