This is an unprofessional Collection cite. That wishes for Speech and Debate with Regards to the topics collected and Special Libraried. I wish for defense of Fair Use Doctrine, not for profit, educational collection.

"The new order was tailored to a genius who proposed to constrain the contending forces, both domestic and foreign, by manipulating their antagonisms" "As a professor, I tended to think of history as run by impersonal forces. But when you see it in practice, you see the difference personalities make." Therefore, "Whenever peace-concieved as the avoidance of war-has been the primary objective of a power or a group of powers, the international system has been at the mercy of the most ruthless member" Henry Kissinger
The World market crashed. There was complete blame from the worlds most ruthless power on the world's most protective and meditational power. So I responded with: "We must now face the harsh truth that the objectives of communism [The Communist Chinese Party's (CCP) Economic Espionage Units called the MSS] are being steadily advanced because many of us do not recognize the means used to advance them. ... The individual is handicapped by coming face to face with a Conspiracy so monstrous she or he cannot believe it exists. The American mind simply has not come to a realization of the evil which has been introduced into our midst" Therefore, like Dr. John Nash would probable think: This is because of our lost state craft of tracing scientific coding in the intelligence community of the algorithmic code of the Communist espionage agents. As "The Communist [CCP's economic espionage units called the MSS] threat from without must not blind us to the Communist [CCP's economic espionage units called the MSS] threat from within. The latter is reaching into the very heart of America through its espionage agents and a cunning, defiant, and lawless communist party, which is fanatically dedicated to the Marxist cause of world enslavement and destruction of the foundations of our Democracy/Republic." J. Edgar Hoover. Which allows the Communist to shape the future and powers that be. As "Our citizens and our future citizens cannot share properly in shaping the future unless we understand the present, for the raw material of events to come is the knowledge of the present and what we make it"
Lieutenant General Leslie R. Groves



http://rideriantieconomicwarfare.blogspot.com/

http://rideriantieconomicwarfaretrisii.blogspot.com/

http://rideriantieconomicwarfaretrisiii.blogspot.com/

http://rideriantieconomicwarfaretrisiv.blogspot.com/


If you have any problem with IP or copyright laws that you feel are in violation of the research clause that allows me to cite them as per clicking on them. Then please email me at ridereye@gmail.com
US Copy Right Office Fair Use doctrine. Special Libary community common law, and Speech and Debate Congressional research civilian assistant. All legal defenses to copy right infringement.

Wruckers room


Friday, August 17, 2012

Hacker Defense when the law is not around to help.

(I am not an attorney, this is all stories and unprofessional analizations)
In the US you have the right to defend yourself. That is a god given natural right to all human's. As in the time of need if the government or local law is not around. The human being is not forced to take a beatening, be stolen from, raped or even hurt in any manner physically. As the US we have a constitutional right to bear arms for our protection and be daily ready as per the draft that every US male and female are signed up for to defend the US against foreign and domestic enemies. This has been defined that US citizens have the right to bear arms. As it has for over 200 years. That then means that as they have the right to bear arms if an enemy is to approach in a hostile manner which requires leathal defense. The US citizens may use it.

This ancient western law of being allowed to bear arms for over 3,000 years in the West. Is now applied the computer and cyber world. Ethical hacking any good school will teach you how to down an enemy that is constantly attacking your business, person or family. In some events if the local police allow you to be deputized. You can actually go out and trace hackers that do mal ware and are attacking people to arrest their procedures and stop them. These arresting procedures much like the use of a gun are very interesting.

The US government is over run daily by cases of cyber attacks that cause billions in harm to the country, taxes, and individual citizen. Which can destroy a business, a person's life and even cause major conflicts so as to hurt others in that person's life.  In good ethical hacking programs and schools They actually teach the student how to defunct whole servers and burn hard drives. If the proof that the same entity had been attacking the institution and deadly cyber defense was called for. This extends to the privilege of ethical hacking in the better schools. To completely burning up whole computers and even servers or management boxes that are being used in that IP address network that are closely attached.

The idea of using deadly force behind a computer in my mind is the exact same thing as using deadly force in my home, or business, or if necessary person. As my computer is like my personal home, business, or person. Thus if somebody intends to inject it with a needle, which as been deemed allowance for deadly force to infect, or to shut down as to kill or burn down my home, then I have the right if the proper local force can't deal with it. To defend my computer in a necessary defensive mode. Which means to me completely burning a server that hackers usually use to hide their computer pc chips.

Rider I

No comments:

Post a Comment