GUNS/RLTD Virginia Democrats Reportedly Beginning Effort To Confiscate Lawfully Owned Firearms

Milk-maid

Girls with Guns Member
Virginia%202nd%20Amendment%20Sanctuary%20Statue.jpg
The map is incorrect according to VCDL.org
Roanoke City didn't vote against it, just decided to postpone making a decision last night (again) Sigh...
 

Sacajawea

Has No Life - Lives on TB
I see Winchester didn't follow Frederick Co's example - I guess they are going to enjoy their fencepost over the holidays watching to see which way the wind blows.
 

desertvet2

Veteran Member
In response to Polly's video...take your pick

Revelations. ...terminator...skynet....beast system...
 
Last edited:

Dennis Olson

Chief Curmudgeon
_______________
Bossman,

I was referring to the situation where people are fighting a guerilla type war. I guess I should have clearly stated that. If you want comms security and do not want to be spied on while engaging in discussions about your activities then you should get rid of those things I mentioned..The Internet of things and all ..
If it ever comes down to shtf...all of that shit gets burned at my place..
But hypocrite...ouch. reading the definition...I don't think I have ever claimed to be something that I am not. And I don't need anyones approval. Nor am I a liar or a cheat.

The telegraph would be considered HIGHLY unsecure, as all you would need to do is tap Into it, and know Morse code of course.

But I could realistically go shut off the power right now and be just fine...
Sorry, I overreacted. But if one REALLY wants to drop off the radar screen, they need to do the things I detailed. And for any face-to-face meetings discussing taking the country back, everyone must be known to at least one person in the group for a minimum of 20 years. No “new blood” that wants to “join the group.”
 
Bossman,

I was referring to the situation where people are fighting a guerilla type war. I guess I should have clearly stated that. If you want comms security and do not want to be spied on while engaging in discussions about your activities then you should get rid of those things I mentioned..The Internet of things and all ..
If it ever comes down to shtf...all of that shit gets burned at my place..
But hypocrite...ouch. reading the definition...I don't think I have ever claimed to be something that I am not. And I don't need anyones approval. Nor am I a liar or a cheat.

The telegraph would be considered HIGHLY unsecure, as all you would need to do is tap Into it, and know Morse code of course.

But I could realistically go shut off the power right now and be just fine...

I’m coming out with TOT (Tor On Telegraph) next month. Very secure, but the bandwidth really sucks.
 

Switchback

Veteran Member
And I was just pointing out that voice printing takes place and is archived for later use if need be as part of their tool kit.
Just something for folks to keep in mind. Burner phones can provide a false sense of security to the unaware. The computing powerhouse is being developed in the form of the super computers that will eventually manage the internet of things closed loop system. The telecom giants refer to them as the Global Brain. Do a search of Global Brain as it pertains to future build out plans by the telcoms, the ones who own the infrastructure to the phone 'you need'. The more info people have, the better.
 

jward

passin' thru
So what should we be doing besides reminding one another that they can and will track us on phones if and when they feel the need? Surely it cannot be a case of what starts in Virginia stays in Virginia?!
 

summerthyme

Administrator
_______________
Everyone has valid points, and anyone who is dumb enough to be talking about sedition over the phone (or 'net) is dumb enough to be a liberal.

But as some have pointed out, what's possible when investigating a local crime (tracing phone records, etc) for even half a dozen subjects isn't remotely posdible when your suspect pool consists of several million Americans.

Which -I suspect- is why they are so freaking terrified. They really believed they had us cowed and converted.

Summerthyme
 
Last edited:
track phones, cars, credit cards, bank accounts, medical records, ...cameras on roads/highways, streets, in stores, sidewalks......all powered by electricity
 

jward

passin' thru
I doubt the plan has ever been to track millions...merely to have our files on hand so those they want to see are readily available. I'm guessing too that they've done a bang up job filling in their data bases, between all those patriot act tools, and the myriad others that came before, and since?
 

Dozdoats

On TB every waking moment
I'm guessing too that they've done a bang up job filling in their data bases

One of the most effective intel ops I ever saw was run by a little E-7 with a ziplock bag of 3X5" cards and a stubby pencil. Of course, he was an instructor in O&I (Operations and Intelligence) too ...

As Awerbuck used to say - "It's the Indian, not the arrow."
 
My discussion with a phone purveyor on the subject was not HARDLY in depth. He handed me a phone, a SIM card from a rack and said all I had to do was insert the SIM chip, make a cal to the specific phone co to activate the card and I was done.

Didn't get into ARD details 'cause I was trying to NOT look like a Rube or an undercover cop (even though my silver hair is SOMEWHAT longer than shoulder length, I'm STILL a portly fat White Debil down in the 'Hood).
Thanks for your reply, Chuck - am interested in comparing current "street" burner phone realities against my distant past technical and policy knowledge before and during the cell phone commercialization phase.


intothegoodnight
 
This isn’t “NCIS”. There are 500 million cell phones (or more) in this country in use every day. While I’m confident that the government is illegally recording these calls, I’m pretty certain they there’s not enough computing resources in the world to do “comparative voiceprint analysis” of every conversation against every other conversation.
No, but there likely is enough computing power on the average smartphone to render real-time facial analysis metrics (via phone camera(s), as well as voice recognition metrics - perhaps stored locally and/or regionally - modern smart phones have a LOT of REAL-TIME onboard computing horsepower, as well as cordoned-off hardware sections that are only available to "authorized" personnel <ahem>. Such local metric derivations/computations/rendering would be easy and quick, per user, utilizing the readily available onboard smartphone computing horsepower - and with 4G bandwidths available, very quickly uploaded to appropriate "authorized" personnel for non-local database storage and/or further analysis, upon command.

TPTB could merely query said pre-created data from afar, comparing it to other data already known/of interest/already in their system - at that point, that pre-created/vetted personal facial/vocal data metrics becomes part of a simple data-mining exercise.

Don't forget how the RealID systems is designed to work; specifically in its ability to positively identify EVERY (eventually) licensed driver, their address, their physical metrics, AND their facial recognition metrics and actual (stone-faced) picture - ALL available at a mere push of a button by "authorized" Federal folks. This is ALL tied together. Count upon it.


intothegoodnight
 
Last edited:
I wonder why Russia, et al, seem fully functional today........

“Gentlemen, comrades, do not be concerned about all you hear about Glasnost and Perestroika and democracy in the coming years. They are primarily for outward consumption. There will be no significant internal changes in the Soviet Union, other than for cosmetic purposes. Our purpose is to disarm the Americans and let them fall asleep. ”

Mikhail Gorbachev
Sounds like a deep state globalist quote, if I have ever heard one . . .

Gee.


intothegoodnight
 
Last edited:

Milk-maid

Girls with Guns Member
This is a recorded phone conversation with a SGT who answered the phone at VA National Guard HQ's and a person who owns a youtube channel asking questions. Interesting take on the whole thing. Basically says that no order has been given and that most of the people he talks to, would not obey an order that goes against the Constitution.


Video at link below is 8:18 RT

View: https://youtu.be/cS1hOfPfFWs
 
But as some have pointed out, what's possible when investigating a local crime (tracing phone records, etc) for even half a dozen subjects isn't remotely posdible when your suspect pool consists of several million Americans.

Au contraire, mademoiselle - Federal high-volume data-mining was perfected at least twenty years ago - sifting through millions upon millions of data records is fairly routine for some WELL equipped federal folks - and, more than a few international sovereign entities and criminal organizations.

Recall - somebody hacked and stole (was blamed on the Chinese) TWO million accounts from the OMB database, which contained VERY sensitive personal info - SSN, credit rating, criminal and misdemeanor, ALL addresses, divorce and child custody, private/sensitive FBI and other "authorized" personal interviews of revealing admittances and opinions, birth info, investigative info of childhood, school years, college, family members, employers, neighbors, friends and BF/GF interviews, medical, pharmaceutical and surgical records, personally identifying birthmarks/biometrics/finger/facial/vocal/fingerprint infos - all wrapped in a tidy package at the OMB, just SCREAMING to be stolen - imagine the informative dossier that foreign entities could compile/data mine from that ONE hack, all about Americans who carried government issued security clearances. Recall that there are more than a few TB2K members whose personal datas were compromised/stolen in that hack.


intothegoodnight
 
Last edited:

NCGirl

Veteran Member
Richmond Jan 20th? Could be interesting. I am guessing Antifa will make an appearance.

If you buy a lot from amazon you have a profile that is amazingly correct in most cases. books? even better.

Everything from your car (unless quite old) to your toaster will tell on you. You can leave every single thing behind, cover up your face and walk down the street and if the right thing is watching you it might be able to match you up by your gait. perhaps a cane would help. perhaps not. Unless someone decides to go live in a cave with no modern conveniences and stay out of sight of satellites you are being watched. oh well.

If you want to talk secretly you can do it publicly on facebook twitter or boards. But if you want to understand each other be sure you are using the same edition...
:geek:
 

Millwright

Knuckle Dragger
_______________
The Utah, NSA data center...

(snipped)
In February 2012, Utah Governor Gary R. Herbert revealed that the Utah Data Center would be the "first facility in the world expected to gather and house a yottabyte". Since then, conflicting media reports have also estimated our storage capacity in terms of zettabytes and exabytes.

The Utah Data Center is powered by the massively parallel Cray XC30 supercomputer which is capable of scaling high performance computing (HPC) workloads of more than 100 petaflops or 100,000 trillion calculations each second.

Code-named "Cascade", this behemoth was developed in conjunction with the Defense Advanced Research Projects Agency (DARPA) to meet the demanding needs of the Intelligence Community.




Terabyte (1 000 000 000 000 bytes)

  • 1 Terabyte: An automated tape robot OR All the X-ray films in a large technological hospital OR 50000 trees made into paper and printed OR Daily rate of EOS data (1998)
  • 2 Terabytes: An academic research library OR A cabinet full of Exabyte tapes
  • 10 Terabytes: The printed collection of the US Library of Congress
  • 50 Terabytes: The contents of a large Mass Storage System
Petabyte (1 000 000 000 000 000 bytes)

  • 1 Petabyte: 5 years of EOS data (at 46 mbps)
  • 2 Petabytes: All US academic research libraries
  • 20 Petabytes: Production of hard-disk drives in 1995
  • 200 Petabytes: All printed material ORProduction of digital magnetic tape in 1995
Exabyte (1 000 000 000 000 000 000 bytes)

  • 5 Exabytes: All words ever spoken by human beings.
  • From wikipedia:
    • The world's technological capacity to store information grew from 2.6 (optimally compressed) exabytes in 1986 to 15.8 in 1993, over 54.5 in 2000, and to 295 (optimally compressed) exabytes in 2007. This is equivalent to less than one 730-MB CD-ROM per person in 1986 (539 MB per person), roughly 4 CD-ROM per person of 1993, 12 CD-ROM per person in the year 2000, and almost 61 CD-ROM per person in 2007. Piling up the imagined 404 billion CD-ROM from 2007 would create a stack from the earth to the moon and a quarter of this distance beyond (with 1.2 mm thickness per CD).
    • The world’s technological capacity to receive information through one-way broadcast networks was 432 exabytes of (optimally compressed) information in 1986, 715 (optimally compressed) exabytes in 1993, 1,200 (optimally compressed) exabytes in 2000, and 1,900 in 2007.
    • According to the CSIRO, in the next decade, astronomers expect to be processing 10 petabytes of data every hour from the Square Kilometre Array (SKA) telescope.[11] The array is thus expected to generate approximately one exabyte every four days of operation. According to IBM, the new SKA telescope initiative will generate over an exabyte of data every day. IBM is designing hardware to process this information.
Zettabyte (1 000 000 000 000 000 000 000 bytes)

  • From wikipedia:
    • The world’s technological capacity to receive information through one-way broadcast networks was 0.432 zettabytes of (optimally compressed) information in 1986, 0.715 in 1993, 1.2 in 2000, and 1.9 (optimally compressed) zettabytes in 2007 (this is the informational equivalent to every person on earth receiving 174 newspapers per day).[9][10]
    • According to International Data Corporation, the total amount of global data is expected to grow to 2.7 zettabytes during 2012. This is 48% up from 2011.[11]
    • Mark Liberman calculated the storage requirements for all human speech ever spoken at 42 zettabytes if digitized as 16 kHz 16-bit audio. This was done in response to a popular expression that states "all words ever spoken by human beings" could be stored in approximately 5 exabytes of data (see exabyte for details). Liberman did "freely confess that maybe the authors [of the exabyte estimate] were thinking about text."[12]
    • Research from the University of Southern California reports that in 2007, humankind successfully sent 1.9 zettabytes of information through broadcast technology such as televisions and GPS.[13]
    • Research from the University of California, San Diego reports that in 2008, Americans consumed 3.6 zettabytes of information.
  • Internet Traffic to Reach 1.3 Zettabytes by 2016
Yottabyte (1 000 000 000 000 000 000 000 000 bytes)

 
track phones, cars, credit cards, bank accounts, medical records, ...cameras on roads/highways, streets, in stores, sidewalks......

I doubt the plan has ever been to track millions...merely to have our files on hand so those they want to see are readily available. I'm guessing too that they've done a bang up job filling in their data bases, between all those patriot act tools, and the myriad others that came before, and since?

Yup.

Bear in mind that "they" don't need to real-time track millions at a time, per se (future pending AI implementations will likely make this practical and affordable/possible).

All they need to be able to do is real-time sift out/data mine the potential pending/future problem children and THEIR "associates" for real-time ongoing monitoring/data mining (birds of a feather, flock together . . . ).

"Minority Report," writ large. Pre-cog, seemingly, in its reach and effectiveness.


intothegoodnight
 
Last edited:

Switchback

Veteran Member
All that is needed for what I call a voice print is for a person to answer their phone with "Hello?". That's it. This is what I was told so I don't know for certain.
Use an authentic Czech military standard silent pocket for your tracking devise. It will have to be the correct size for your tracker. The rest is up to your imagination.
 

Millwright

Knuckle Dragger
_______________
Wound my heart with a monotonous languor? Clearly I have gaps in my education!

Snipped

Radio Londres ([ʁa.djo lɔ̃dʁ], French for "Radio London") was a radio station broadcast from 1940 to 1944 by the BBC in London to Nazi-occupied France. It was entirely in French and was operated by the Free French who had escaped from occupied France. It served not only to counter the propaganda broadcasts of German-controlled Radio Paris and the Vichy government's Radiodiffusion Nationale, but also to appeal to the French to rise up, as well as being used to send coded messages to the French Resistance.

Georges Bégué, an operative with the Special Operations Executive (SOE) had the idea of sending seemingly obscure personal messages to agents in the field, in order to reduce risky radio traffic.

Broadcasts would begin with "Before we begin, please listen to some personal messages." It was clear to nearly everyone that they were coded messages, often amusing, and completely without context. Representative messages include "Jean has a long mustache" and "There is a fire at the insurance agency," each one having some meaning to a certain resistance group.[2] They were used primarily to provide messages to the resistance, but also to thank their agents or simply to give the enemy the impression that something was being prepared. Because these messages were in code, not cipher, the occupiers could not hope to understand them without a codebook, so they had to focus their efforts on jamming the messages instead.

From the beginning of June 1944, the Allies inundated the network with messages. On 1 June alone, over 200 messages were sent, making it clear to those listening that something was in the works. Although in some places the Axis jamming was more effective than others, the background noise and static were not enough to drown out the sound of Beethoven's 5th Symphony, the first four notes of which correspond to the dot-dot-dot-dash of the Morse code letter V for Victory.

Shortly before the D-Day landings of 6 June 1944, Radio Londres broadcast the first stanza of Paul Verlaine's poem "Chanson d'automne" to let the resistance know that the invasion that the invasion was imminent. The first part of the stanza, Les sanglots longs des violons de l’automne ("the long sobs of the violins of autumn") indicated that the invasion would begin within 24 hours; the second, Blessent mon cœur d'une langueur monotone ("wound my heart with a monotonous languor") was the specific call to action.[3]

By late 1944, Allied victory in France sounded the end of Radio Londres.

 
Top