Wednesday, January 1, 2014

The Event Puzzle



There is not a thing to do, there are many things, collective things, in unison, that are necessary to initiate and push forward massive change for humanity.  This event we are all anticipating is a moment, a “reward”, a great and powerful shift within – a return, not to innocence, but to truth.

In fact it is very much a reality; a magnificent moment in which each aspect of creation will understand, comprehend, appreciate and participate in life as they intended to before their emergence onto the physical plane.  It is such a grand moment, that we cannot avoid the energy of it.  It is simultaneously felt and created by One – which includes every part of life.

This event will happen when all pieces of the puzzle are inserted.  As we all know major change cannot be planned.  There is a moment when you physically move out of your home of origin and another moment altogether when you emotionally separate.

The event is much the same.  We are feeling, sensing, anticipating, and even wishing for something that cannot be predicted.  There is no way to know just when the final puzzle piece will drop into place.  We can only set ourselves up emotionally and physically, and remain aware. 

Also, keep putting every stray piece back where it belongs. Relentlessly, consistently, piece the puzzle together.  We’ll all know when it is complete – the whole fabric of what we are looking at will alter – it will become One.

It will be the thing we’ve been seeing in our minds eye all along, while we were focusing on finding that one piece necessary for completion.

Blessings and love for this New year – 2014.  This post was written earlier today.  Just now this message was received, another piece of the puzzle: Click here.

I love you.  You are the One you’ve been waiting for.

How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks - It's not as bad as you thought - it's much worse



How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks - It's not as bad as you thought - it's much worse
http://www.theregister.co.uk/2013/12/31/nsa_weapons_catalogue_promises_pwnage_at_the_speed_of_light/
By Iain Thomson, 31st December 2013

Analysis A leaked NSA cyber-arms catalog has shed light on the technologies US and UK spies use to infiltrate and remotely control PCs, routers, firewalls, phones and software from some of the biggest names in IT.

The exploits, often delivered via the web, provide clandestine backdoor access across networks, allowing the intelligence services to carry out man-in-the-middle attacks that conventional security software has no chance of stopping.


And if that fails, agents can simply intercept your hardware deliveries from Amazon to install hidden gadgets that rat you out via radio communications.

The 50-page top-secret document, written by an NSA division called ANT, is part of an information dump sent to German magazine Der Spiegel, and expounded upon by journalist Jacob Appelbaum in his keynote to the 30th Chaos Communication Congress in Germany on Monday. You can watch a clearly furious Appelbaum in the video below.



The dossier is a glorified shopping catalog of technology for spies in the so-called "Five Eyes" alliance of the UK, the US, Canada, Australia, and New Zealand. It gives the clearest view yet of what the NSA, GCHQ and associated intelligence agencies can do with your private data, and how they manage it. Here's an easy-to-digest roundup of what was discussed.

Satellite and optic-fiber communications stored
According to Appelbaum, the NSA is running a two-stage data dragnet operation. The first stage is TURMOIL, which collects data traffic passively via satellite and cable taps and stores it – in some cases for up to 15 years – for future reference. The NSA does not consider this surveillance because no human operator is involved, just automatic systems.

Der Spiegel gave the example of the SEA-ME-WE-4 underwater cable system, which runs from Europe to North Africa, then on to the Gulf states to Pakistan and India before terminating in the Far East. The documents show that on February 13 this year a tap was installed on the line by the NSA that gave layer-two access to all internet traffic flowing through that busy route.

This blog is supported by ads and donations. If you enjoy this blog please consider supporting it with a contribution via PayPal.