Changing Fantasies Part 99

A personal superior relationship standard is naturally and historically set and unless the latest champion on the field has his/her entire act together or at least most of it, why bother? We are creatures of habits and once we live inside an incredible connection with another, we expect nothing less. I am a ranting optimist – into fairness and justice for most – but I am also a practical human being. Time has shortened and is speeding up so why waste what remains musing around or quasi-involved with those who do not measure up?

Fedbook pals, Vickie and Jane (well, Jane and I are also friends in real life for the last 20+ years), get this because they too knew a mega-love. Prof A, another FB pal and neo-mentor, and his glorious life-long loved one are another truly special case of human love involvement. My bro and his wife of forty years qualify, as do my nieces and their marriages – as members of this unique lot. There are others, I pray. If the axiom – we marry one parent and become another is true – you can fill in the blanks. We parrot and practice mime what we see and hear as role models?

When i write about love between men and women (I am not gay, so I can’t write about their version, or other combos) it is not an illusion or a fantasy. What is mind blowing is how few folks actually experience solar system shaking love.

I knew within a short period if Arthur was the guy for moi and he knew if i was for him (although as a man it was his secret for years) long before he made his approach. His following from afar was not stalking, rather an intellectual’s period of evaluation and consideration for comparison and emotional cost-effectiveness. Witty articulate Capt. Arthur was a brilliant private attorney and superior human being who was communitarian compassionate by nature with a happy go lucky intimidating personality – not regular style in any regard. It may also have been his #recovery program at the time required him to not fall for a ‘slip under a skirt’.

Capt. Arthur waited for a jelled opportunity and the shifting and sifting in his life to then wing-in over my intersection and perform aerial loop-de-loops. His outfit was self-appointed. He dressed in a camel hair blazer, light wool designer dress slacks, a commercially pressed tattersall shirt, silk Argyle socks (paying homage to the Scottish lass thing) and suede boat shoes. I was oblivious as my goal at the time was to not remain on the edge of the #Hamptons, NY, but to return to my home place, the golden state of #California.

Love Hints #1 thru #8: Letting go is not about denial. It is the exact opposite. It is #freedom. It is #openness. It is #generosity grown and idee fixe shed to be packaged and presented with modernity and tradition.

As the play of amour unfolds it is a matter of the fearless #heart to NOT let the inhibited complex brain jump the gun or let the lug of baggage cargo f*ck it up by putting pedal to the metal or acting nonchalant – what I call ‘the get away closer syndrome’. Yet, potentiality must flow beyond maybe, might, and a #relationship composed of absentee pledges and being palish “walish” via tiny white electronic screens. Having a bee in one’s bonnet or a wild hair up your arse are phobias manifested to take the focus off hidden emotional problems. Standing naked in the luminescence with no projections, no judgment, and no phony filtration is naturally earned endearment not slanted infatuations on a string of changing fantasies.

#Love, the zesty, delightful, deep feeling radiant kind is also as far removed from co-dependency as one can paddle in front of a surging incoming tide. Appreciation, an in-love disposition, a soft spot, a weakness for, and so forth are best wishes and affections to convey garden variety love. What I am confessing is something in the grand arena of cosmic oneness and spiritual mutualism fulfilled. The luster and locale is not searchable on #Goggle Earth. It is a birdy place where dreams are not cajoled and confidence is not propped up with agendas and wobbly values.

To inveigle another (sweet-talk) is part of the glowy intro, yet to expect this chatter to forever be the exclusive underwriting to an epic relationship is maya. Further, never give-up on the sweet talk or spontaneous eruptions of subtle dazzle -directed at your s.o (significant other), or all becomes gaudy interpretation rather than classic world view.

Are you beginning to get the jest and the gist of this?

Long distance couplings are tough. Twenty-first century love affairs established #on-line are hampered and kickstarted by promises. These couplings at times degrade into mini-bouts of paranoia because the two want to be together as one then they don’t then they do. Many blaze out in a fresh form of no-go for man and woman – i call it reciprocal unrequited love.

Hundreds or thousands of miles apart is an empty desert with few oasis but aplenty with mine fields of what ifs and maybe nots. Then again, why spoil the luscious beginning by forgetting to relish each tantalizing moment. Yet, glued to this introductory joy is mutual hope for actualization or it flops faster than a Broadway play. The example I recall was with TV stars Mary Tyler Moore and Richard Chamberlain (December 1966). After four disastrous preview performances Bob Merrill, the mega-producer, pulled the clunker . . . to not, “subject the drama critics and the theater-going public – who invested one million dollars in advance sales – to an excruciatingly boring evening, I have decided to close.” The play? Breakfast at Tiffany’s. Some movies are better left in their original format and not reinvented in another medium, not unlike collector novels.

The wonder about #cyber-installed beginnings is how the pending coalition is without the full gamut of input pressure. Cyber-dating allows for untold testing with emails, video communications, and instant chats (IMs without any accountability) – along with vast swatches of downtime to consider, evaluate, and mentally masturbate about a bail out or a drop-in.

The horror about cyber affairs is how the coming together for many is based on one-sided changing fantasies (without accountability) – i.e., those constantly in love with being in love (read high). Again, these are shallow renditions and not even mirrors to what I know as true-blue love. People invest way too much via little electrified screens instead of figuring out how to meet in person and proceed normally in a full court press of potential merger or run the hell the other way. Personally, I find cyber-locus feigned alliances boring if not stupid, not unlike coal mining with a toothpick, sans a decent lantern.

The actual game plan to fit into each other’s lives is not a dramatic ordeal. Somehow, even between aging set-in-their-way brainiacs prone to project management and reams of options, the nerd bud pops open and the lotus flower of togetherness blooms. For the younger set, many choreographed couplings happened when #Anonymous took to the actual streets in protests. The vitual cyber masks were pulled down and the real Guy Fawkes plastic jobs held in place until eye locks were released.

Sterling moments of closeness originating with eye locks outweigh darkened aloneness. Two become conjoined by a golden thread. If you think a marvelous pairing ends due to eventual arse dragging familiarity you have neither experienced nor witnessed the quality of blended lives I speak from on this platform.

If you experience glimpses of eye locks and deny the authenticity you are a scared little rabbit seeking to hump, overly crusty- burned from a prior engagement, or your turpitude is beyond depraved (ex.=  seeking a western green card to escape the local horror show of drone wars; or surging the sex-trafficking channel).

It is a rarity – a communicative magical honest #union – and in my never humble opinion once accepted is the steadfast human finery of living on the blue marble. It requires fueled faith, kindly consistency, understanding loyalty, and spot on humor. Because, when Murphy’s Law steamrolls across the parallel pathways and other shit dumps on ya to test one’s guts and weigh one’s conviction and confidence the wisdom to laugh standing tall – holding hands in the wreckage – is a miracle. Togetherness wins the day, soothes the night, and pushes the hit of momentary joy back into the now.

There was a possible keeper on my horizon. He arrived on his paddle board out of the mist of the matrix. The cyber format is more ocean than conduit and too crowded with paddlers. Sincerity and enchantment will divulge themselves if any potential duo rating is high enough on the tenderness meter to meet or surpass what was . . .

Today, someone railed how can I act (read reject) based on such an old-fashioned comparative methodology, bla, bla? Aye, he is one of the truculent pretenders to the Arthur throne so his male ego is out of joint, but then again it is a valid question.

How can i apply a dearly nearly 20-year marriage to what is now a dead prince’s memory to evaluate and benchmark others in the living here and now? It is damn easy and getting more so. I can, and i do. I am not required to understand you, your predicaments, or empathize with same unless you exhibit a verifiable heart felt apodictic.

With no succulent assurances, we know. We intuitively recognize each other? Precious real gems sparkle and resonate different from artificially made or faked ones – not for a moment, but in perpetual display the tried-and-true ones are immortal. Vickie and Jane contend it is likely our ardent rich captains of love were the last of an extinct breed. I am holding out Capt. Arthur was the second to last of a dying breed.

If you sing for your soul, your family and friends, and the mothership (Earth), the drama-comedy of human life is never boring or riddled with fallacious accommodations. We each reside in a singular holy temple adorned with stark bareness for some and aesthetic jungle exuberance for others.

I prefer dependable orchestrations of honesty, allegiant ethics, Highlander honor, generosity, density of light, kindness of paying it forward, bigga brains, classy demeanor, political savvy, bravery, provocativeness, mystery, and ripe romantic events. And, no i do not need to open a space on airbnb.com to find interesting people. The expats of Costa Rica are already filtered by the country’s own reality of no military since 1948, no nukes, and a socialistic democracy’s gigantic commitment to environmental stewardship. The fact CR arrests and convicts its presidents for corruption is another portent plus.

Why is it so hard-core difficult for imaginative over-educated men to understand a woman of my rank is not looking for golden pots and inbred independence to steal? What prevents one from risking to uncover the profundity of improved wholeness?

Fear – fear of  . . . heartbreak, intimacy, death, illness, getting out of one’s comfort zone, commitment, exposure, success, performance (anxiety), failure, losing independence, and, the list bleats on. Sixty-six percent of single people admit to Fedbook-stalking their dates. Fear acting out in social media – a very new techno venue for a very ancient human core concern = love with another.

In my case, I spend the majority of time as related to men warding them off on-line and sending out this IM to overtures, “I am sorry. I do not do on-line relationships. I am a quasi-public figure and have little time.” But men are men, and most continue to send outreach wanting to be “friends” (certainly, some are romance scammers, this is a given). It is when they chat I am beautiful (read super shallow on their part) and ask ,”tell me about yourself,” my brain cross-wires with my internal female anti-match maker. Then the response from me is curt, “Ya, wanna know who I am? Read my work.” What is unwritten is me ending with “ya, dunderhead,” because i subscribe to civility in all instances. Yet, the balloon out of my head says this snotty sayonara.

Any man I spend ANY time emailing or having a vid chat with (other than political/work related) means i am on a mission of exploration not an adventure looking for sexting or on-line fun. Most of these scenarios morph into lasting friendships and for this I am grateful. I do not participate in the protracted adolescence of changing fantasies (read my first paragraph, again). If you are reading this and we shared good conversation, you made it through the first set of hurdles but have yet to reach the hoops. But, for God’s sake do not consider there is a finish line, because there isn’t a track built, yet, plus none to date are in a permit application.

Keepers? One was a possibility, but he is currently a poetic long shot, as he either never saw the gate or faded around the first turn (his own volition). It is difficult to tell from the Tule fog on the grassy course.

Consternation is intended sabotage or subliminal pent-up anger acting out. The region of bonded or unbounded love is an outlet and an inlet for a vast set of human complexities.

Now, if you care to, please go look up the difference between apodictic or apodicticity and assertoric and while you are at it read Kant’s Critique of Pure Reason and Dee Brown’s Bury My Heart at Wounded Knee. If you discern why these are linked in my brain and heart, then you entered an arena of Magna Moralia where I wander around – if you possess decent optics, you get points.

Good birding ?

 

 

#Feds Are the Cyber-Terrorists?

The National Defense Magazine (USA) issued an article dated July 2007[1] quoting Dorothy Denning, noted cyber security expert at the Naval Postgraduate School. Denning reviewed the 2000, Sunshine Coast of Australia incident[2] where a disgruntled politico (Vitek Boden) hacked into a waste management computer system and altered pump station operations releasing 264,000 gallons of raw sewage killing marine life, contaminating water, and stinking up the region. Denning[3] claims this incident was not motivated for political reasons or to instill fear so it is not cyber terrorism. I contend she is dead wrong leading the parade of ignorance setting up a blinded pace of cyber terrorism and cyber warfare. We are in an ongoing cyber terrorist circumstance, at this very moment. Who told me? Ed #Snowden, a former US intelligence contractor who understands free expression and the meaning of watchdog like none other, except maybe Julian Assange.

#Cyber #terrorism is a hot button buzzword, debated[4] across the venues of #hactivism, security expertise enclaves, and govt. counter-terrorism units. For those of us who report on cyber terrorism and are familiar with cyber attacks, breaches, #Anonymous, #WikiLeaks, and others who are whistleblowers, hackers, and crackers the debate needs to conclude. It can if we open our eyes and see, not merely look.

To assume cyber terrorism is not real is a lethal falsehood buried in propagandizing. Cyberspace threats taken to the actuality (tender to extreme) are capable of disarming or arming comprehensive computer systems used to fire nuclear missiles, or to destroy international linked communications systems (read satellites), or eliminate like dominoes the usefulness of life-giving infrastructure millions are dependent upon. To argue Boden (the guy in the first paragraph) was not politically motivated is duplicitous and smacks of both denial and orchestrated mis-information.

In June 2015 technology and national security specialists received their come-upings when the Office of Personnel Management (OPM) of millions of US Federal workers were hacked[5] into with such expertise there are virtually no footprints to track who or what perpetrated a massive infringement into govt. protected databases. While the piddle stream media reports it was the Chinese govt., there exist absolutely no facts to back up such an assertion.

Stolen data streams in this mass attack included social security numbers, employee reviews and recommendations, complaints and resolutions, home addresses, health records, and other private information for over four million USA govt. employees. Certain departments were more heavily hit including the Dept. of Commerce and Dept. of the Interior and to date the govt. is not forthcoming what exact data blocks were hacked into citing “national security protocol’. Such critical intelligence (read information) was stolen by an unknown entity using a digital back door through a subcontractor to the govt. The attack went on for at least four months and may be continuing.

The OPM second attack[6] added to the first is even more alarming since it targeted Intel gathering employees of the intelligence communities of the US govt. However, policy makers are mis-directed by arrogance and lack of understanding of computer science. Leading policy institutions[7] continue to keep their heads in the sands stuck on Muslim terrorism as not capable of cyber warfare/terrorism. These experts are not paying attention to who is competent enough to perpetrate a devastating cyber strike. It only takes one (Snowden) or a handful of adept hackers (Syria Electronic Army) to reach into the matrix and dump malware and/or retrieve enormous amounts of information.

Further, to assert a Denial of Service (DoS) is not a cyber attack is stupidity. The Syrian Electronic Army (SEA)[8] took down and defaced the US Army’s public website (www.army.mil), and they have accomplished other operations. They are a group of youth who can no longer stay silent towards massive distortion of facts about what is happening in Syria.

President O-Bomb-O gives credence to cyber terrorism in his 2015 state of the union address. “No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families, especially our kids. We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism. And tonight, I urge this Congress to finally pass the legislation we need to better meet the evolving threat of cyber-attacks, combat identity theft, and protect our children’s information. If we don’t act, we’ll leave our nation and our economy vulnerable. If we do, we can continue to protect the technologies that have unleashed untold opportunities for people around the globe.”[9]

While cyber security and cyber experts meet and present, there are evidential findings worth reviewing outlining cyber terrorism exists. They are as follows:

“Several recurrent themes emerge from the preceding summary of the seven panels:[10]

  • It is clear that cyberspace opens considerable potential opportunities for terrorist activities, including communication, fund-raising, and attacks.
  • It remains an open question whether terrorist uses of the Internet constitute an evolutionary or revolutionary dynamic. This question hinges, in part, on one’s view of how the Internet differs to earlier technologies.
  • There are multiple constraints on terrorist engagements with cyberspace. First, the feasibility of the terrorist activities listed above varies considerably with some requiring very little technical knowledge and others necessitating a high level of expertise. In addition to this are further constraints such as financing and the comparative desirability of more traditional attacks for reasons of visibility or know how.
  • A range of legal and political instruments are available within national and international bodies with which to confront the challenge of cyber terrorism. However, these instruments are limited by different factors including: different strategic cultures and capabilities across countries; the language and construction of existing legal instruments such as the ‘use of force’ requirement in international law; and, sensitivities towards sharing information and data.
  • Distinguishing between different types of cyber-threat is challenging, in part, because motives and behavior in this realm are difficult to identify and monitor.
  • The value of existing models and methods of deterrence to confront challenges such as cyber terrorism is unproved, at best.
  • Efforts to address threats such as cyber terrorism raise considerable ethical as well as political, legal, and technical challenges.
  • Cyber terrorism has a discursive existence as well as a ‘material’ one. How this phenomenon is framed or constructed in media and political language matters greatly.
  • The disciplinary backgrounds and commitments of academics are not incidental within debate on the definition of cyber terrorism. In part, this is because of different views of the purposes of definition itself: to ensure effective communication between researchers and/or policymakers; to facilitate cooperation across jurisdictional boundaries; to distinguish terrorism from crime and war; or, to impose limits on investigative and prosecutorial powers.

Here is a list of recent data breaches and cyber attacks, as empirical as possible, for only one month = July 2015.[11]

  • Cyber attack:

Hacking Team hacked[12] – cyber surveillance company tells customers to stop using its software.

Nursery webcam accessed by stranger to speak to parent and child. 

Coordinated cyber attack hits four New Jersey gambling sites.

Digital media streaming service Plex hacked, forum held for ransom.

Canadian Security Intelligence Service website taken offline.

Tour de France leader Chris Froome suffers alleged data hack.

  1. Data breaches:

Infidelity site Ashley Madison hacked.

Cyber attack on Edinburgh city council leaks 13,000 email addresses.

Breach affects 3,000 clients enrolled in Georgia state program.

East Sussex NHS Trust apologizes over data breach.

Personal data on laptop stolen from attorney with California law firm.

Data on 86K individuals inadvertently made accessible to Internet.

Orlando Health employee improperly accesses patient medical records.

Costco now hit by alleged PNI data breach.

  1. Payment card information breach:

Evans Hotels announces payment card incident involving malware.

Detroit Zoo, eight others across the county experience POS breach.

CVS and Wal-Mart Canada Are Investigating a Data Breach.

Clothing website Dungarees hacked – customer payment card details exposed. 

Donald Trump hotel chain hit with credit card data breach.

Fighting back against cyber crime. 

UAE busts Nigerian cyber criminal gang.

Europol knocks out mobile cyber crime gang in Spain.

Cyber crime Kingpin Pleads Guilty.

ID Theft Service Proprietor Gets 13 Years.

The Wheels of Justice Turn Slowly.

Other:

LinkedIn fixes phishing flaw.

Car entertainment systems vulnerable to cyber attack.

Banking malware targets UK high street banks.”

(Note: Going to the website will provide links to each).

In conclusion, I quote Edward Snowden, two days before he left for asylum in Russia. He probably at this state of cyber-wars, cyber-terrorism, and cyber-madness is the world’s premier expert on the subject.

“Snowden believed there had been more than 61,000 NSA hacking operations globally, with hundreds of targets in Hong Kong and on the mainland (China).

“We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he said.” [13]

What we are witnessing is a cyber war between the hackers (white hats) and the govt. surveillance apparatus. I would suggest this is the first round of what the feds will label as cyber terrorism and you and I will know as hactivism. Depending on one’s political perspective both fit every parameter of the definition of what is cyber terrorism or what is hactivism. I would additionally submit Snowden is not a terrorist he is a hactivist. He is an American hero who loves his country and its values of liberty and Bill of Rights so intensely he could no longer partake in the mass hacking (cyber terrorism) of its citizenry by the National Security Agency (NSA) of the US govt.

In reality, network backbones are exactly what was hacked into at the OPM US of govt. human resources data forks and then vacuumed up by the intruders. This factoid will not be found in the media, academia, policy maker’s white papers, or govt. reports on cyber terrorism. It was reported to me by a reliable source. A source by the way I will never reveal.

The assumption cyber terrorism does not exist is ludicrous based on playing a three card monte game on us. By railing on it does not exist there is no alarming the citizenry while the govt. is intruding into everyone’s emails, cell phones, Skype calls, Facebook posts, tweets on Twitter, GPS coordinates, ATM withdrawls, debit and credit purchases, and, so forth. It makes no difference if one is the President of France[14] or the 33 million in 46 countries committing adultery[15] via the Ashley Madison site. To continue to debate cyber terrorism’s definition and parameters is not only a waste of resources and time it is an exercise in planned mis-direction. We live during the times I label, “Why solve the problem when we can spend millions studying it?”

Finally, I submit the following report in light of the 600,000 or more refugees seeking asylum hailing from Syria, Iraq, Afghanistan, and other points in MENA, and beyond, now clogging up the roadways of Hungary hoping to cross into Germany, Scotland, and other countries willing to accept them as they literally walk away from the killing fields.

Read the following and see the graphics:

http://www.aljazeera.com/programmes/peopleandpower/2015/06/syria-electronic-armies-150617151503360.html [16]

Graphic: What the SEA hacked.

Screen shot 2015-09-06 at 5.28.09 PM

Screen shot 2015-09-06 at 5.28.19 PM

https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-behind-the-syria-conflict.pdf

[1] http://www.nationaldefensemagazine.org/archive/2007/July/Pages/ExpertsDownplay2581.aspx

[2] ibid

[3] Denning, Dorothy; “A View of Cyberterrorism Five Years Later”, Naval Post Graduate School, 2006

[4] http://www.cse.wustl.edu/~jain/cse571-11/ftp/terror/index.html

[5] http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/

[6] http://www.voanews.com/content/us-government-hacking/2820370.html

[7] http://www.cfr.org/terrorism-and-technology/cyberterrorism-hype-v-fact/p21434

[8] http://sea.sy/index/en

[9] https://medium.com/@WhiteHouse/president-obamas-state-of-the-union-address-remarks-as-prepared-for-delivery-55f9825449b2

[10] http://www.cyberterrorism-project.org/wp-content/uploads/2013/07/CTP-Conference-Report.pdf

[11] http://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-july-2/

[12] http://www.cbc.ca/news/technology/attack-on-hacking-team-spills-global-cyber-spying-secrets-1.3155981

[13] http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china

[14] https://wikileaks.org/nsa-france/

[15] http://www.theguardian.com/world/2015/jul/21/ashley-madison-adultery-site-hack-will-i-be-found-out-what-you-need-to-know

[16] https://www.fireeye.com/blog/threat-research/2015/02/behind_the_syrianco.html

The Slaying of a Beautiful Mind – #Aaron Swartz

Over the last several years I report about #Anonymous, hacking, and cyber war events. Dissent in the information age is evolving faster than GMO dead bees. Here is an excellent documentary (see link below) on a brilliant superior brainiac – #AaronSwartz, a nonthreatening super being who became a victim for his belief in equal access to public documents.

Every high-end hacker – read a computer programmer/developer/innovator so quick and excellent at tasks at hand – I have been honored to interview is a millennial renaissance genius. They are unique personalities centered in info, introversion, creative system design, and compulsive passions – many are seen as paranoids (but, i see them as fear-based for authentic concerns). Many demonstrate what the cookie cutter education empire calls ‘recognizable learning disabilities’ – yet, as a political Jungian therapist I perceive these obsessives are our societal docents to question ALL authority.

They are BOHO pranksters to relieve the intensity of their advanced awareness about ruling institutions – they act out in ways the govt. cannot process totally rejecting the rigged game. Many are intolerably combative in nature, yet, by the time they were 11 or 12 years old they were the most adept hacker pirates on the planet. Each possess a self-awareness with a personalized extraordinary futuristic vision of what technology on the net can do – if free – for the greater good of all of humanity. They are the civil-disobedience role models of this century.

I implore you to watch this vid (see link below) for no other common sense reason but to comprehend why the security apparatus is hell-bent on taking out these wunderkind of the Brave New World.

Vitae/legacy:
Perfectionists, polite, inclusive, relevancy junkies, FREEDOM believers, and lovers of making the world just and right they daily impact our lives dramatically without the above ground world knowing same. Geeks, nerds, and organized chaos actors with no boundaries. Inter and intra communications via on-line discussion are taken to off-world levels.

Controversy on steroids with a human to human closeness unique to on-line contact is the norm. Outfits of slouchy jeans, dark t-shirts, and tacky non-haircuts, some with more body ink than Bradbury’s illustrated man is regular style. Totally denying consumerism, in reverse mode they are incredibly optimistic about life.

ENERGY AND FOCUS are exhibited beyond human endurance.

These are practicing master mind Netizens who have ZERO tolerance for the gatekeepers (Google, Fedbook, etc.). Thus, they are 24/7 watched by the NSA, FBI, CIA, Secret Service, and other covert operators. But, again they adore challenge and ego, be it collective or individualized, is far more fake than real.

The few I know (none in the Biblical sense) are blessed and cursed in equal proportion. Most live in crystallized fear.

If there is a subset of the techno best and brightest, they reside in Anonymous, WikiLeaks, and the deep deep net. Self-impregnation, political activism, and being a rat for the man is considered an outrageous option even if faced with jail time . . . It is a full press court from the corporate state to stop cyber warriors critical analysis and data basis collection to prove how corrosive and corrupt is the system.