Friday, December 14, 2018

December 14, 2018 -- A Quick Run Around the Web

Some tips, including use a sling. Cleckner uses a hasty sling technique.

            Two days before I left to come back to the states, some of the gang members on the corner in front of my brother’s house saw a cat in the window of a single elderly lady across the street. From my brother’s broken window, we could hear the gang members discussing how she must have food and lots of other valuable stuff. Later that evening, we heard them discuss how they were going to break into the lady’s house later that night.
              At about midnight, my brother and his wife woke me up because there was a gang of about fifty people outside their house. As we lifted the shades to see outside in the dark, the moon was bright enough to watch those fifty or more people descend on the elderly woman’s house. In less than five minutes, every window had been broken, every door had been kicked in and the house entirely ransacked. We watched a person in front of the house cut the still living cat in half and share it with another hooded person who ran off with it.
               Five minutes after the break-in, another twenty people from the neighborhood entered the house. The woman screaming is all you could hear. About ten minutes after it all started, everyone in the house exited in a hurry and ran away as flames could be seen in the windows. The nude elderly woman who owned the house stumbled out of the front door and fell to the ground just two feet away from the house. My brother’s wife, my brother and I ran out to try and help the elderly woman. But when we got there, we could see it was hopeless. She was bleeding from every orifice. Blood was running down her pubic area, chest, legs, nose, mouth, and even out of her ears. She struggled to breathe for about two minutes before the breathing stopped. My brother’s wife held her hand until it was clear she was gone and then my brother pulled her away as she cried.
                 The house burned to the ground within an hour. Not a single fire truck came. An armored police truck with a 20MM machine gun on the top showed up for less than five minutes about nine that morning. They spent less than five minutes looking at the smoldering ruins, threw the body in the back of the truck and left.
            Studies by the military in the 1980’s concluded what we all probably already know. Natural colors, earth tones, hide better than non-natural reds and blues. Some of the most visible colors in almost any condition is blue. Even in urban settings blue is not a natural color. Blue denim is such a prevalent shade used in clothing all over the world. This should be avoided. Obviously bright shades of any color are not desired. Subdued colors will camouflage. 
              I want to add a bit to this. Years ago (but not too many) when some of the all-purpose photo realistic camouflage patterns came out that were browns and tans, I was excited because they seemed like they would match the high mountain desert vegetation better than the typical green and brown that you normally saw for sale. What I soon realized, though, is that these types of camo often incorporated white, or at least very pale tans, which might not matter if you stayed still, but caught the eye when moving around. Moreover, testing different camouflage in dim light and moonlight, these same whites and light colors showed up easily in indirect light or moonlight. Just something to think about.
              • "The Orion Road Flare | A Survival Resource"--The Loadout Room. The article links to an embedded video showing how a road flare can be used to start a fire, extinguished to conserve the remaining flare and then re-ignited again. The article also notes that the flare can be used to signal to aircraft.
              • From Rory Miller's blog: "Logic of Violence Steps 1-3 of 6" and "Logic of Violence Steps 4-6." These are three questions from the criminal's point of view on deciding on a victim and three steps to carry out the attack. An excerpt:
                Question 1: Who? Certain people make better targets for certain types of crime than others. If it's about money, out-of-town business men and tourists tend to carry cash and equipment and generally won't fly back to testify. Before direct deposit, the day the social security checks arrived each month was hunting season on the elderly. If the motivation is rape, it varies. For some it's people who remind the perpetrator of someone in the past. Or it could be any target of opportunity. Or a specific type (one of the reasons why dressing down or trying to appear unattractive isn't a successful strategy). If the goal is simple bullying, the threat seeks out emotionally labile victims. Etc.
                  Question 2 is "Where?" and Question 3 is "Ripeness?" which refers to "all the behavioral clues that indicate which of your preferred targets will be easiest to take." Moving on to the steps, Step 4 is the isolation of the target, which may be as simple as waiting for a target to move to (or come into) an isolated area, or may take some work on the part of the criminal; Step 5 is exercising psychological control over the intended target, and Step 6 is "physical destruction," i.e., the actual assault or attack.

                    "How Water Towers Work"--Practical Engineering (11 min.)
                    A brief overview of municipal water distribution systems.
                    The department discovered a five-month gap in which the FBI’s automated collection tool did not sweep up any texts from the phones both of Page and Strzok, coinciding with their time on special counsel Robert Mueller’s team looking into Russian interference in the 2016 election.
                    How convenient.
                             The 48-page submission, dated Aug. 11, 2017, supports its claims with 95 exhibits, including internal legal reviews that the foundation conducted on itself in 2008 and 2011.
                                Those reviews flagged serious concerns about legal compliance, improper commingling of personal and charity business and “quid pro quo” promises made to donors while Hillary Clinton was secretary of State.
                                  The submission also cites an interview its investigators conducted with Andrew Kessel that quotes the foundation’s longtime chief financial officer as saying he was unable to stop former President Clinton from “commingling” personal business and charitable activities inside the foundation and that he “knows where all the bodies are buried.”
                                     “There is probable cause that the Clinton Foundation has run afoul of IRS rules regarding tax-exempt charitable organizations and has acted inconsistently with its stated purpose,” MDA Analytics alleged in its submission. “The Foundation should be investigated for all of the above-mentioned improprieties. The tax rules, codes, statutes and the rule of law should and must be applied in this case.”
                                       US Navy defense contractors and subcontractors have reportedly suffered "more than a handful" of disconcerting security breaches at the hands of Chinese hackers over the past year and a half.
                                        "Attacks on our networks are not new, but attempts to steal critical information are increasing in both severity and sophistication," Secretary of the Navy Richard Spencer said in an internal memo in October, The Wall Street Journal, which reviewed the memo, reported Friday.
                                          "We must act decisively to fully understand both the nature of these attacks and how to prevent further loss of vital military information," he added.
                                            Although the secretary did not mention China specifically, evidence indicates that Beijing is responsible for what is considered a debilitating cyber campaign against the US.
                                             Earlier this year, Chinese government hackers stole important data on US Navy undersea warfare programs from an unidentified contractor. Among the stolen information were plans for a new supersonic anti-ship missile, The Washington Post, citing US officials, reported in June.
                                               China has been striving to boost its naval warfighting capabilities, and there is evidence that it is relying on stolen technology to do so.
                                                 And it's not just the US Navy. Adm. Philip Davidson, the head of US Indo-Pacific Command, told the Senate Armed Services Committee in April that Beijing is "stealing technology in just about every domain and trying to use it to their advantage."
                                                  China is believed to have been behind multiple cybersecurity breaches that facilitated the theft of significant amounts of data on the F-22 and F-35, among other aircraft. That information is suspected to have played a role in the development of China's new fifth-generation stealth fighters.
                                              Fortunately, China is not able to build as high performance jet turbines as the U.S., so their fighters remain less capable.
                                              •  "The complex history of Earth's magnetic reversals"--Archaeology News Network. Data from deep sea cores "indicate that over the last 160 million years, the magnetic pole has reversed its polarity at least several hundred times." The article also indicates that the magnetic poles can undergo "excursions," during which "the earth’s magnetic field weakens and begins to drift but does not reverse itself. The field re-strengthens and the poles finally return to their initial position." Interestingly, and ominously, the research shows that a complete reversal can happen in less than 100 years. The article also notes:
                                                Scientists have also debated whether a reversal can cause major hazards, especially to technology. Some have argued that a reversal would cause the failure of the worldwide electronic and communication systems. The question, however, is controversial and remains unanswered.
                                                  The airburst “in an instant, devastated approximately 500 km2 [about 200 square miles] immediately north of the Dead Sea, not only wiping out 100 percent of the [cities] and towns, but also stripping agricultural soils from once-fertile fields and covering the eastern Middle Ghor with a super-heated brine of Dead Sea anhydride salts pushed over the landscape by the event’s frontal shock waves,” the researchers wrote in the abstract for a paper that was presented at the American Schools of Oriental Research annual meeting held in Denver Nov. 14 to 17. Anhydride salts are a mix of salt and sulfates.
                                                  (Underline added).

                                                  No comments:

                                                  Post a Comment

                                                  VIDEO: Largest Prehistoric Copper Mine

                                                   The world's largest prehistoric copper mine was at a place called Kargaly, northeast of Caspian Sea. VIDEO: " The Largest Prehisto...