Alternative Media
Benjamin Fulford – July 29, 2013: Actual encounters with female spies and agents Tags: Benjamin Fulford

Actual encounters with female spies and agents

Notice to readers. This month I will be on sabbatical away from the internet and so have prepared the next few newsletters based on topics that are not time sensitive.

Female agents have long been a key source of power. The Jews celebrate Purim based on the tale of the wife of a king who saved her people by persuading him not to persecute them. The ruling bloodlines of Europe claim descent from Kind David of Judea. According to their legend, when Judea fell to the Babylonians all of David’s male descendants were killed. To protect the bloodline of David, his elite guards began to protect his female descendants. Their modus operandi was simple, marry on of the female descendants to a king and have her educate his children and heirs. In this manner, female agents secretly usurped power in the West from traditional kingly bloodlines. This tale, told to me in person by representatives of the current ruling bloodlines of the West illustrates, just how important female operatives can be.

In Asia as well female agents can have a decisive impact. In Japan, for example, it was recently discovered that a very large percentage of graduates from Japan’s elite military academies had married Chinese agents. Then of course there is the well-known story about former Prime Minister Ryutaro Hashimoto and his Chinese spy girlfriend. I actually met her once and can say she seemed charming and attractive. Of course Hashimoto died from a poison that was inserted into his anus, although it is not believed his Chinese girlfriend was the one who administered it.

That is not the case, however, with Kim Jong Il, who was killed, according to several different sources, by a stroke inducing poison administered to him anally by a Swedish female agent. In any case, all I can say is that when dealing in bed with such agents, is to watch your ass.

My personal encounters with female agents have been very educational, to say the least.

First of all, I must admit that for much of my reporting career, the thought of female agents never really crossed my mind as something that really existed. However, now that I think about it, when I was working with Forbes one of my scoops was to report that North Korea had an atomic bomb. Shortly after writing about this, a former Miss North Korea began approaching me and tried to become my lover. It never occurred to me at the time that our encounter may not have been a coincidence.

By now, though, I have learned to be thoroughly suspicious of rare beauties who throw themselves upon me.

Once my colleagues started being murdered and I became involved in secret societies who offered me protection, I started to wise up about female agents too.

In one case, after making a lecture in Japan, a man with a beautiful woman at his side approached me telling me he was friends with Adnan Khashoggi, the arms dealer. He gave me a book in French called “The Egyptian Origin of the Jews.”

In any case, his gorgeous female companion started making moves on me. Once she lured me into an apartment where she got totally naked in front of me. Now, I am not so naïve as to believe a beautiful woman associated with a major arms dealer suddenly fell in love with me and got her dressed again by telling her that I had herpes and do not use condoms. In any case, she told me an unusual tale that I will pass on here without judgement. She claims to have been kidnapped by giants who carried out experiments on her womb. Her descriptions of these giants were very close to descriptions of the Annunaki reported on occult web sites.

In another case, the daughter of Masaru Takumi, the former number 2 boss and head of financial affairs for the Yamaguchi Gumi yakuza syndicate approached me, also after a public speaking engagement. She had knowledge of my sexual preferences that could only have been gleaned by somebody eavesdropping on my most intimate moments. I declined her offers of intimacy but, curious, I spent time with her socially. What stands out the most about my meeting with her is the fact that she insisted on meeting with me on the evening of March 10th, 2011. She said she wanted to take me to a special Japanese style chiropractor. The man we went to see was not the one she expected. He introduced himself as a ninja and wrapped a long piece of cloth covered in black powder around my lower back, telling me it was a herbal preparation and that I was to leave it on all night. It felt bad and I took it off as soon as I got home. Also that evening, Takumi’s daughter told me that she had to set the alarm on my mobile phone to ring at 11 AM on March 11. That was the day of the nuclear and tsunami terror attack against Japan. I am pretty sure she was hired by J. Rockefeller.

The most memorable of all the female agents, however, has to be the North Korean woman I will refer to as T. She also showed up at my speaking engagements on multiple occasions and we became friends after I sat beside her on a train on my way home from such an engagement (it turns out she was sent to live at the next stop from mine to make such a train ride possible).

T was a remarkable but troubled young woman. She had been beaten so badly by an uncle during her childhood that she required reconstructive plastic surgery on her face twice. Her former lover was a professional killer who had killed over 80 people and she told me enough inside detail (which I passed on to the police) about famous unsolved murders for me to believe this was true. She ended up telling me a lot about the people who were operating against me. She says she had been shown a file about me that was as thick as a phone book that tried to portray me as a drug addled, insane pervert (if only my private life were so interesting). According to her, after the cabal failed to murder me, they had planned to bankrupt me and drive me into suicide. Her job had been to chase away all my close associates and then abandon me, leaving me friendless.

She also introduced me to a supposed family of hers that turns out to have been a bunch of actors playing the role of her family.

One time I got her pregnant and we were planning to marry and have the child. She was 5 months pregnant when she was called suddenly to Nepal to stay at the house of a close associate of the Dalai Lama. There she was drugged, started bleeding intensely from her womb and woke up in a hospital after being unconscious for 24 hours. She was no longer pregnant. There is a whole book to be written about this young lady but suffice it to say I realized we would both remain in danger if we kept seeing each other. When this is all over, I will find her again. I will also personally seek out the Dalai Lama and seek a full explanation for why his thugs in Nepal did what they did. The man is a criminal pretending to be a great religious figure. He will get his justice.

All I can say is that love and international intrigue do not mix well.

Source:
http://benjaminfulford.net/2013/07/29/actual-encounters-with-female-spies-and-agents/

Erasing Your Digital Footprint By Jeffrey A Lambert Tags: Digital Footprint Privacy Internet Facebook Twitter NSA Social Networking

Think about all the things you’ve used your Internet for in the past 24 hours. You’ve probably checked your email, updated your Facebook status, paid some bills through online banking, read up on the latest news, and took the time before bed to video chat with a far-flung childhood friend. Even after logging out and turning off your computer, the information you’ve just accessed or created continues to wander the great plains of the World Wide Web.  This information that we leave behind about ourselves on a daily basis is known as our digital footprint.

Like stepping in wet concrete, these trails we unwittingly leave behind can be tough to erase. With the rise of identity theft, corporate tracking, and the ability of “Big Brother” to access our private data, it is more important than ever for Internet users to be aware of how past and future data can be erased and controlled more effectively.

 

 

How Big is My Digital Footprint?

To truly understand just how big your digital footprint is, there are several tools available that can be easily accessed and added to your computer for constant monitoring and control.

Google is one of the most commonly accused mediums for collecting our data, and rightfully so. That ad that just popped up on your GMail page for cookbooks does indeed have something to do with your search for a killer Spam recipe for last Sunday’s tailgate party.

 

On a daily basis Google pings your browser for information about browsing history, allowing the search giant to improve their search algorithms and target advertising. Interested in seeing just how often this is happening? Download the free software offering Google Alarm, created by F.A.T. Labs, which is available for both Firefox and Chrome browsers. This add-on will notify you each time you are sending data to Google. Just make sure you disable the sound option for this. I jumped out of my chair the first time the (very loud) alarm went off, and kept going off almost every time I visited a new site.  Unless you have a serious love for air horns or are trying to induce a heart attack don’t forget to do this!

Another way to measure your digital footprint is to see how much advertising companies have been allowed to track your browsing habits. “But I never gave any companies permission to know about sites I visit” you insist. The sad reality is that simply visiting certain sites allows advertising companies to place what are known as “tracking cookies” on your computer. Cookies are small chunks of data created by web servers that are delivered through a web browser and stored on your computer. They allow websites that you often frequent to keep track of your online patterns and preferences, creating a personalized experience.

Leading the fight to raise awareness and provide solutions to this issue is the Network Advertising Initiative, a coalition of cooperative of online marketing and analytics companies committed to “building consumer awareness and establishing responsible business and data management practices and standards.”

According to the NAI, “Most of the advertising online today is provided by 3rd party ad networks. These networks use tools such as cookies to track your Web preferences and usage patterns in order to tailor advertising content to your interests. What you may not realize is that information gathered at one website may be used to direct ad content at another site.”

To combat this, the NAI has created a service that scans your computer to identify those member companies that have placed an advertising cookie file on your computer. The results from running this simple diagnostic can be eye-opening about how much your internet habits are being monitored.

Another method of obtaining a simple estimate about your digital footprint is by using the Digital Footprint Calculator, provided as a service from the EMC Corporation. The software download, which is available for both Windows and Mac, measures user input about the frequency of emails, photo and video uploads, phone usage, web browsing, and where in the world you live. After submitting your estimates, the calculator will provide you with an actual file size of your presence on the Internet. The software also ironically provides an option of creating a ticker widget to share your results on a web page, thus expanding your footprint in the process.

Looking for a quick way to determining digital shoe size? Write down every site on the Internet you have created a user account for. Sound impossible? For most of us, we have cast such a wide personal net across the web, that it is insurmountable to go back and accurately pinpoint where we’ve left information about ourselves. Attempting to complete this exercise may bring on the realization that caging the Internet beast that is your personal information is next to impossible, and for the most part, it is. Fortunately, there are organizations and free software offerings that can help you bring your data monster into submission.

Erasing Your Digital Footprint

Now that you’ve had the chance to measure just how big your footprint is, what steps can be taken to try and erase it? Let’s start with cookies.

A simple way to ensure safe browsing without a trail is to make sure you are cleaning out your cache of cookies on your computer. Accessing the preferences option in any browser and clicking the “delete cookies” option can easily do this. A word of warning though: those users who enjoy auto-login and personal customization and personalization of sites you frequent will be deleted.

If you would like a more thorough method of cleaning up cookies, as well as Internet history and other tracking tools, there are free options available. A popular software offering (and a MaximumPC favorite) for Windows users is CCleaner. CCleaner, which is available as a free download or pay version (if you want technical support included), cleans all Internet history, cookies, auto-complete forms, and index files from your computer. Supported browsers include IE, Firefox, Chrome, Opera and Safari.

Another option to clean cookies on your computer, particularly flash cookies, is a freeware program called Flash Cookie Cleaner. Flash cookies are simply cookies created by Adobe Flash plug-ins on websites that perform the same snooping tasks as regular cookies. Flash Cookie Cleaner works to eliminate these files, but also contains options to save cookies to sites you trust and wish to keep information on.

Another easy way to erase your digital footprint is to make sure you are deleting accounts to websites you no longer frequent. Sites can often employ difficult account cancellation practices, which can discourage users from going through the trouble. Smashing Magazine writer Cameron Chapman has compiled an excellent article on how to delete your account from popular websites. This can be one of the quickest ways to erase your personal data, making it unavailable to be used by one company or sold to another. Still have your Friendster, MySpace, or Bebo account active? That data is still available for others to see!

Erasing personal information that has already been made public on the web should be the next step in your clean-out process. Do a basic search of your name on sites such as Spoke, Intelius and WhitePages to pull up what the rest of the world sees about you. From there, it becomes a tedious (but worthwhile) process of filling out online forms and making phone calls with these services to limit or remove your personal information from company databases. For more information on public data companies to check and how to remove your information from them, check out this article from Gizmodo writer Kelly Hodgkins.

If drastic measures are needed to erase your information, companies are ready and waiting to “wash out” your digital footprint: for a price.  Reputation.com offers a suite of paid services to protect, promote, and defend their customers’ personal data online. Their tagline?

“Scammers, stalkers and identity thieves prey on private data. Equally harmful are things we call negative content — a bad review of your business, a nasty comment on Facebook, an article about something from your past that’s simply irrelevant now — that could damage your personal life or your livelihood. We can help.”

If an absolute face lift or dramatic reduction of your online information is needed, pay services such as this may be your quickest way to a smaller digital shoe size.

Controlling the Size of Your Digital Footprint

Now that you’ve taken the red pill and realized the realities of living a life connected to the Internet, how can you better protect yourself in the future? There are several basic tools available for the privacy-conscious; most of them free.

Let’s start with the biggest data hog of them all: Facebook. A recent report by Nielsen found that in August 2011, the average U.S. user spent an average of seven hours and 46 minutes on Facebook, which is up from five hours and 46 minutes just a year ago.

With all of the news feeds, friend requests, photo tags, and application requests, not to mention the amount of sites that can be accessed through your Facebook account, it is easy to see how the shoe making the digital footprint is increasingly coming from Mr. Zuckerberg’s creation.

If you would like to keep Facebook in check and minimize its invasion into your online life, check out Disconnect, a browser extension available for Firefox, Chrome, and Safari. The purpose of this extension is to “help people understand and control the data they share online.” Disconnect will disable third-party tracking, depersonalize searches, identify and block information requests from websites, and allows the user to easily unblock these requests if so chosen.

If you are a Chrome browser user, another tool available is Facebook Disconnect, created by former Google engineer Brian Kennish. Facebook Disconnect works in the background of your browser to block all traffic from third-party sites to Facebook servers, but still allowing users to access their Facebook normally.

Continuously staying on top of your online presence should become a regular routine. Again, Google (I swear they are not paying me) is the easiest avenue to accomplishing this task. Simply doing a search of your name and popular aliases on a regular basis is one easy method.

The service Google Alerts will actually send regular email updates every time your name is queried. Both of these simple steps can help you monitor the information other people are looking at pertaining to you and where they are accessing it from. Now that you have this handy guide to walk you through how to purge that data, channel your inner-Jason Bourne every so often and control your data like the secret agent you always wanted to be! Be sure to check out a related article by online privacy expert Dan Tynan for more information.

To help further minimize your digital footprint, privacy advocate Moxie Marlinspike created a service called GoogleSharing, which allows users to search through Google without being tracked. The technology scrambles search requests that are sent to Google, making it impossible to tell where or from whom the request is coming from.

Facebook is not the only site where your information is vulnerable. Virtually every site on the Internet leaves your information open to ad peddlers. Barring these companies from accessing your personal information can greatly reduce the size of your digital footprint.

In addition to their tracker cookie scanning feature, The aforementioned National Advertising Initiative has created an opt-out program for web users, which requires their more than 70 member companies to no longer deliver web ads tailored to from your usage patterns. This does not mean you will no longer see web ads on the sites you visit, but it will reduce the amount of organizations that will mine your data and generate personalized advertisements as you browse the web.

Another organization committed to protecting your personal information and reducing your footprint is PrivacyChoice, which allows users to add a bookmark to your browser that scans your history and automatically sends opt-out requests to  over 100 ad networks. No longer will your browsing habits be analyzed for profit thanks to organizations such as these.

Even with these precautions there is no absolute way to make your information available only to you. Once something is done online, expect it to be there forever. Don’t bother thinking you can hide anything online because there is nowhere to hide.

The best strategy for reducing your footprint is to remember to step back every once in awhile, and not rely on the Internet to service every facet of your life. Every picture doesn’t need to be geo-tagged; every new social media site does not have to be joined permanently. Every detail of your personal life does not have to be put on display for others to see. Just like you take steps to protect your physical information, remember to take steps to monitor and protect your digital information as well.

By Jeffrey A. Lambertmaximumpc.com 

Wake Up World

Hard Time? Manning awaits verdict as US media label him guilty Tags: Bradley Manning Trial Whistleblower

Published on 30 Jul 2013 by RussiaToday

A military judge is set to deliver the verdict on US Army whistleblower Bradley Manning later on Tuesday. He could spend the rest of his life in prison if convicted of aiding the enemy. His defense argues that Manning leaked classified documents because he wanted to expose war crimes. But when it comes to press coverage of the case in the US, innocent until proven guilty may not apply. RT's Gayane Chichakyan explains. Follow LIVE UPDATES: http://on.rt.com/0inxdj

RSS
Search a Blog

December 2014 (267)
November 2014 (524)
October 2014 (543)
September 2014 (509)
August 2014 (462)
July 2014 (447)
June 2014 (405)
May 2014 (500)
April 2014 (560)
March 2014 (540)
February 2014 (502)
January 2014 (671)
December 2013 (259)

WHO IS ONLINE
Support B.O.L.E.

Thank you for supporting the BOLE

Your support to have the B.O.L.E. (incl.all articles) open and free for everyone is much appreciated.

Products for your Wellness

Important: For all products chose at the top of the page the  language (English or German) and currency!

 click HERE to reach all products

TATWellness deliver worldwide.

In Your Service

B.O.L.E.

 

This website is powered by Spruz

Live Support