Showing posts with label stealing. Show all posts
Showing posts with label stealing. Show all posts
Monday, May 14, 2018
When you steal something, you make a crime
http://marxjatalous.blogspot.fi/p/when-you-steal-something-you-make-crime.html
https://youtu.be/3cmqtm_Rfcs
Kimmo Huosionmaa
Above and below this text is very interesting "teaching video" of stealing property from some shops, and here I must say, that stealing from shops is the result of the process, where a young person has been getting in the wrong gang. Stealing is the port for making contact with criminals, and that is the mark, that somewhere in this thief's personal life is a thing, what makes believe that stealing is the right thing. That means there in the social network of the thief is somebody, what accepts that kind of things like stealing from the markets.
And this is the reason, why those crimes must be reported to the police immediately. Stealing is the gate, what sometimes cause that person would slip even in some mafia-gang. This happened to Sam Giancana, who started his career as the small thief but then raised to the leader of United States mafia. And that man made many very violent crimes in his bloody career. I don't want to support criminal activities, but if somebody has gone to make business with wrong fellows, could the results be like this. When somebody really wants to get in some social environment, this can make this person the good target for exploitation. The new fellows might say that they would be the friends for the new guy, if this would get some stuff from local shop. This stuff is something like alcohol or other things, what has the high age limit.
And this situation might turn that those friends just slip away, and the thief would stay outside the shop with stolen property. This would cause the criminal prosecution process. It's not only one time when some gang members have been instigated new face for crimes, and then inform that person to police or security guards. This has probably felt good, but that makes the person, who was busted very angrily. The kings of those gangs have an attractive way to swagger their clean criminal registers. And of course, they always are persons, who conflict every crime in the world.
Those persons who have lead criminal gangs are sometimes persons, who think that there is nothing wrong if they are giving orders to make crimes. Sometimes those gang leaders have grown very big gangsters, but the death of those people have been violent. And one reason for killing persons like Sam Giancana must be revenge. Those high-class mafia-men are sometimes sold their fellows to police, and somebody just got to an electric chair, because they are trusted Giancana, who of course sold them to police. And that caused hate in the other gangster's mind because they had not small nice house in good neighborhood and congressmen ever visited in their flats. Those kings of the gangs ever make their hands dirty in the stealing or making any other crimes.
They order other people make them. When they are elder persons, they would tell to their families stories, what kind of criminals they have known in their young ages. Of course, those persons newer drive over-speed because they just sit on the right side of the cars and someone else always drives the vehicle. And the house of those persons is always in the very expensive neighborhood, what gives those ex-kings very good social status in the eyes of other people. In the same time the person, who was sold to police sits in the home lonely, and remember the wild heydays.
Sources:
https://youtu.be/3cmqtm_Rfcs
http://marxjatalous.blogspot.fi/p/when-you-steal-something-you-make-crime.html
Tuesday, April 17, 2018
What information should not deliver to Facebook
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html
Tuesday, January 2, 2018
Kleptomaniac is the ritual thief, but the thing what drives people to those actions is often hidden in the past
![]() |
| Picture 1 |
Kimmo Huosionmaa
Kleptomania means the need to steal the stuff from shops. The purpose of that psychiatric behavior is to get something, what that person missed in the youth. Or actually, it means forcing need to steal. Some kleptomaniacs steal only from the shops and somebody are specialized stealing people property from the pockets. This behavior was born because somebody has taught that person, that if somebody leaves something in the pockets, it's right to take them from there. In some cases, in the schools, the elder pupils are ordered younger pupils to empty the pockets from the jackets, what are left in the hat rack.
Many people steal from the shops, and they are not cleptomaniacs because the reason for stealing might be the loss of money because of alcoholism and misuse of narcotics. That kind of people must steal because they don't have money for their life, and especially the drugs are very expensive for the people, who are living on the streets because of drug addiction.
Sometimes the persons steal from the shops because they don't have age to buy some stuff like alcohol or tobacco, and they wanted to test those things. And those unthinkable actions might cause very many problems for those people especially if they attended to serve in law enforcement jobs. The stealing is a crime, and there are also people, who will start to blackmail the persons who have stolen property and steal the stuff from markets might cause that the person will go to the violent gangs and that is the very bad thing.
Those gangs, what are made even the brutal murders are hunting for the thieves and other small criminals, and then they will start to ask the "tax" from other people, who are hanging on their area. And those gangs might even force the other people to use and sell drugs in their neighborhood. But when we are talking about the kleptomaniac, we mean the person who steals the things what even this person doesn't need. In the departments of the kleptomaniacs is founded even thousands of stolen drill machines, what are still in unopened packages.
And also the magazines were in unopened cellophane cores. The kleptomania is the symptom, what conducts from the younghood. The nucleus of this syndrome is that person will not open the products, what has been stolen from the shops. In some cases, the person who has this symptom have ever got anything in the childhood, and then there have created the need to get the products or their packages as the "gift". Another reason why kleptomaniacs steal from the shop is that they will get attention from another person when they are been busted by stealing.
Human been is a social species, who needs another person around individuals, and if the person's only social contact is some security guard, will that person start to like them, even if they are busted the person. In this kind of cases, the security guards or the law enforcement are only persons, who will not yell at that person. The humans are made of the social individuals, and we have to need to get another people around us, who accepts us. And this need drives persons to the gangs and violence. In some cases, the kleptomania is the reason for the bad conscience. This behavior is sometimes the reason for betraying some younghood friend, and the betraying was very nasty in some of those cases.
When the person wanted to get out of the gangs and start the career as some trusted profession, the way might be, that the person sets up the gangmate for stolen property, and then the friend will get very much worse things in the life. And in those cases, the person, who was sat up, was sometimes very close friend, and then kleptomania will be like the signal of bad feeling about this action, what might give the informer even the way to some elitist clubs.
Those trials might be very traumatic experience because in those cases very close friend testifies against the person, who might be the friend of that individual from the childhood. And then the parents of that informer might be behind this thing. Sometimes people think, that if they are working as the informer for the police, will they get mercy from the judge. This is the reason why some drug addicts are so willing to share their information with police. They believe that if they will tell that somebody stole the box of cigarettes in about ten years ago in the age of 14 from the shop, will that information so hardcore, that those narcomaniacs will be released from gang violence and drug smuggling. This is the thing, what some of those people will think when they will come to the police station to sell their friends to the officers of the law.
Sources
Picture 1
https://wordsmith.org/words/images/kleptomania_large.jpg
https://en.wikipedia.org/wiki/Kleptomania
Monday, December 4, 2017
Why are hackers so unusual criminals?
![]() |
| (Source Internet) |
Kimmo Huosionmaa
People always talking about hackers and the threats what those people cause for the national security. Normally the talking is turning the thing, why those people are not able to locate using the standard police methodology? The problem with the hackers is normally that those people will not hang in the shopping centers or bubs like normal criminals. Normal police methodology is meant for tracking the drug dealers, who normally operate in the streets.
The tracking the hackers is difficult because the tracker must go inside hackers residency. Many hackers actually work from home, and that makes the tracking of them very difficult because if the hackers don't want to be tracked, and they have right financial resources, they will be very difficult to track by the net.
The problem is that those people can make series of the computers, what they can remote use, and that makes the tracking those persons very difficult. If the hacker uses series of many computers remotely before this person attacks against the target, will the tracking very difficult. But for this action, the hacker needs comrades, who will take the remotely used computers in the right places. And then the hacker can jump to those computers, and then makes the strike against the interesting target.
But this action needs resources and the problem with the other method, what is infect some computers with the virus, what opens the computer for remote use, is that the person whose computer is infected can just shut the computer because the workstation is not working correctly, and remove the virus by just re-installing the operating system. The hacker needs the trusted platform for the work. And that kind of platform, where is series of the computer located all over the world needs very much financial and social relationship for this kind of action.
In the case the hackers have got the passwords of the target system by using the sodium pentothal or stealing the password by photographing the screens, they must hide their position, even they are sitting opposite the target. The hackers can use UAV:s to surveillance the offices and those vehicles can also equip with laser microphones to record the competitions in the office. And they might able to get the passwords in their hands. In that case, they must route their signal around the world, because that will hide their real location.
Even if the passwords are stolen, and the target organization gets the information about it, they might use the passwords as the "honeypots", what means that every user, who uses those passwords will be tracked by IP-addresses and the "trap server" also tries to get the mac-address of the WLAN-card. Because that information might use to track the model of the device, what is used by the hackers.
If the trackers will get the mark of the WLAN-card, they might get the model of the computer, and by using the payment information, they might track those hackers. Some computers are sold very small numbers, and if the hackers are used their credit cards or fill the guarantee card, they might track by using that information.
Saturday, December 2, 2017
People have right to be weird if they want
Kimmo Huosionmaa
When we are thinking about geniuses like Albert Einstein, we must say that they might be the little bit weird. And it is true that if the person thinks loudly and speaks to self that might clear this person’s thinking or how we must talk about that thing. People have right to be little abnormal if they want. And when we are talking about, talking or languages writing is also one way to communicate. The difference between talking and writing is that writing is making the kinetic worlds to the paper or in the screen of the computer. So the writing is one way to talk.
Why the thing that the person will talk alone is so negative, that this person must send to the psychiatrists? If somebody writes diaries, they don’t speak alone. They are writing the diary, what is full of the things, what might interest also somebody else and if that person who speaks alone writes the public diary on the Internet, would somebody think that this person is some kind of interesting or even intelligent person.
If somebody wants to read the diary, that person does that, if the reason to read is that writing is some kind of dangerous. Then the judge will give the permission to take the diary to the hands of the law. And the reason for that is the diary can involve the texts what shows that the writer is dangerous for other people. Of course, those things might be that person’s own. And if I will kick off the job, what I liked I would say that I could be very angry about it. In some courses of the psychology is the key element, that person writes the ideas to the memory. And that thing is very dangerous because the diaries are very wanted material for blackmailing.
If you write when you are angry, you might write something that makes other people scary, and in that case is the best way to keep the open diary. If somebody reads the open diary, will that person seem that this text is mentioned for public use? If I write something I will not usually try to prove anything. But when you, my dear friends are reading these texts, you might understand that I will not always write absolute truth. There is no absolute truth exist. The question about writing is that would be the very good way to let other people know what kind of person you are. In the closed diaries is the only question that how many pages have had been removed, when this diary will get to the hands of the judge.
Nobody ever tried to blackmail me by these texts, and I would not care how many times you, will share this material. I don’t hide anything, and I will not care what other people think about me. I don’t clear my blogs because I write something strange or the things what might look like weird. This is the thing what I like, and if you really want to know something about how I spend my working time, I must say that I sometimes write this kind of texts in the evening and publish them by the timer during my working day. Or did I lie to you, and do I even have a work? Or does my boss know about this and lets this action continue? Or am I sitting in some mental institute
Or am I just an ordinary unemployed who have lots of time to write texts on the internet? I ever wrote the diary, but why those texts what somebody writes to the paper are so interesting? If somebody will steal my diary, I would ask this person one question. If I’m not the interesting person or my opinions and thoughts are not interested other people, why they even read this text? How many times more interesting could be some diary, what you might find under my bed? That would be very nice to read, that you could steal my diary from my home and show that to your friends, and then you made a decision to get me to the custody and mental institute.
But why did you read only two worlds of that diary? Did somebody else even saw that fictional diary, and the inscription inside it? How could they be sure in that fictional situation, that this particular diary was even mine? In this case, I will write about the situation, what could happen to anybody. In this text, the person whose diary was stolen is me myself and I. This ever happened to me, because I ever kept diaries, because I didn’t want to remember yesterday.
Http://ewao.com/2017/08/11/according-to-psychology-talking-to-yourself-is-a-sign-of-higher-intellect/
Friday, December 1, 2017
Why somebody steals the national art?
![]() |
| Mona Lisa (Wikipedia) |
Kimmo Huosionmaa
Why somebody steals famous paintings? That is the very good question. If we think the national jewelry like Mona Lisa or some other famous paintings, we must say that there are very many things what makes this kind of actions little bit different than stealing the automobiles. When somebody steals something, that person must get something from that crime, and what that thief gets from some painting like Mona Lisa? Will this person sell it in some local bar perhaps?
Or does some art collector put it on the wall? It probably will look like nice in the movies, that some art collector will hire somebody to steal those paintings, but in real life that kind of action will make this person as a criminal. And that means banning from those societies forever. Those national artifacts and arts are very well documented, and if somebody wants the picture about them to the wall of the office, must that person only hire some painter, who will make the copy of that painting, and if that painting will be stamped as a "fake", it will be legal.
Or of course, that person might go to the supermarket and buy a poster of that painting and put it in the frames. So why somebody steals the original painting? If that painting will be damaged, that thief will get the very high bill. And of course, the man must pay all other damages and bills what his action makes. And when the painting is missing from the surveillance of the museum authorities, they must make sure, that the painting or statue what will return is the same thing what left from the museum.
That means the X-ray investigations and C-14 analyses, what is quite expensive. And also the policemen time and other expenses must be paid. But in those paintings is one very special thing. Those national galleries paintings have been taken hands to the government because there is something special about those paintings. They are so expensive because they are bought from the markets. And somebody believes that they have been markings for membership of some societies. Or maybe there are some hidden codes inside those paintings.
Those painters had made probably painted hidden landlines and other landmarks, what will lead the people to the hidden treasure. And if the person will get right map, will the treasure hunter find the right place, where is hidden gold or some other expensive artifacts, but in real life, those artifacts can be also some documents, what was awkward for even the royal persons, and those papers must be kept secret from the public, but they could give the absolute power for the person, who had those papers.
One of the documents what could be very interesting in the medieval period would be the document, that the king had the big brother. In that time the law said that the king's place was reserved for the eldest son. And if the king had the big brother, will that cause the prosecution that the crown has been taken by the illegal way. And that could cause the execution for the majesty.
Wednesday, November 29, 2017
Nanotechnology can support the fabric and be very effective against the terrorism.
![]() |
| Picture 1 |
Kimmo Huosionmaa
The nanotechnology allows us to make the new kind of microchips. Those special microchips are made with small copper or carbon bites what lies on the peptides, what will be touched on the special sheet like the velcro tape. This kind of microchip might be operating in the special chemical environment, where special chemicals make those peptides touch to the surface. And if that chemical will leak or it will be replaced, will the form what is printed on the microchip drop off. This kind of nanotechnology will be protected the microchip be stealing the industrial secrets. Nanotechnology also allows us to mark the product by the unseen printings, what is visible only by the microscope.
Those microscopical printings might help to track the persons, who copy textile trademarks and uses slave labor. The printing is so tiny, that it can be made in the all wires in the textile, and it will be unseen if the person doesn’t have the good light microscope. The miniaturizing microchips have been made possible to make extremely small size RFID-chips, what doesn’t need electricity. Those chips use radio waves what is targeted to them, and after that, they will send the coded signal to the reading device.
That makes those chips more effective, because the coded signal is not able to see my other devices, and that will make those systems STEALTH for the people, who handle those materials. The reading device can installed to the UAV-helicopters, what can do their duty without any warning or the sign, that those RFID-chips are ever read. Those helicopters can be operated over the net, and the operators can be thousands of kilometers away from the operational zone, what will protect their anonymity for other security personnel. And that little equipment can be put in the narcotics cargo.
The UAV:s can detect those RFID-chips and after that those little helicopters will stay on the drug container, or they can drop the small size GPS-system on those vehicles. In the military technology, will that kind of drone very useful to locate the underground ammunition. If those vehicles are equipped with the chemical sniffers, they can look for the ammunition and mines, what are placed underground. After they will find those chemicals they might point the place for GPS-guided bombs, what can destroy the ammo shack.
If those drones are equipped with Geiger-counters, the drones might look for underground missile bases, what can be bombarded with conventional or nuclear bunker buster weapons. Those UAV:s are the same, what is sold in the supermarket, but they operate with different kind of systems. And they could be effective in that kind of operations, where will be destroyed underground military installations like hidden missile silos or dug ammunition dumps.
Sources
Picture 1. http://dronesworld.net/reviews/cheerson-cx-10w
The high-tech allows stealing even the most modern automobiles.
![]() |
| Shelby cobra (Picture 1) |
The problem of the high-tech hackers is that that equipment can be bought from anywhere. There are no special permissions needed for buying the computer or WLAN equipment. The hacking of the automobiles and other remote-controlled vehicles is basically the same thing as the wardriving. The data transmission from the electronic key will route to go via hackers laptop computer, and the hacker can use that signal to open the cars and even use their motor.
The equipment what is needed is simply the WLAN card of the computer. Also, the car thieves might use ECM-transmission to avoid the electronic signal pass to the car, and then the doors will be open. ECM-transmission is the simply radio signal what will disturb the signal of the electronic key, and then the computer doesn’t know that the doors will not be closed, and the alarm system will not be activated. The thieves need only the radio transmitter, that operates at the same frequency than those car keys.
Then they must be sharp and then activate that system when somebody comes out the car, what is interested in the thieves. When the hackers want to operate undercover, they might use normal WLAN-boosters, what can get to the right points with remote-controlled helicopters, and if those booster-stations are properly set up and use batteries, can the hackers operate from the very long distances.
And that will help them to avoid the law. By using UAV-helicopters can the hidden hackers also activate their ECM-radio at the right time. After that, they can get in the open car and transfer it to the back of the truck, and flee away, with the stolen car in the container. After that, the car might sell in the dark markets for some toy of some gang members or people, who uses them illegal car races or even the escape vehicles for some criminal activities like robberies.
Wtach this movies
1. https://www.youtube.com/watch?v=ARrlhlQiFzM
2. https://www.youtube.com/watch?v=MeXfCNwMG64
Sources
Picture 1. https://www.cargurus.com/Cars/1968-Shelby-Cobra-Pictures-c11681
Tuesday, October 17, 2017
Every encryption have vulnerabilities and now WPA2 (WiFi Protecting Access 2) algorithm has vulnerabilities
Kimmo Huosionmaa
Again hackers have made a good job and broke secrecy of the WPA2 (WiFi Protecting Access 2) algorithm. What made this good work, is that they published that data so all Internet community can begin to create new kind of secrecy, or prepare themselves that their private data can be stolen from their secured WEB-drives. That action shows that we must keep going with creating new methods of encrypting data and keep our privacy so strong, that nobody sees our private data what is sent over the net. But as you might know, real-life hacking is more difficult than something that happens in media. Almost every kind of encryption has weakened, and one thing what creates much more vulnerabilities is human. If a person uses too difficult passwords he or she might need to write it down or in worst case use a text file, where that person copy-pastes those marks to password line.
And what makes that thing vulnerable for the system, is that somebody might take the only photograph from the screen, when that person opens his or her text file. And the question is did he or she remember to shut down the big screen if that person is giving training lessons to some audience. In that case, could the hacker get password very easily, only thing what that person need is taken photograph in the right moment, and after that hacker could slip in the system. Worst hacker-style is social hacking. The simplest way is just to find a boss of that target company and pump that person full of sodium-Amytal when those attackers are only asked for the password from that man or woman.
In that method hackers just get one director's phone in their hands, and simply ask people passwords from the telephone, and if people won't warned about that kind of hacking, could hackers steal very much information from their target system. Sometimes users of the system ask micro support to install some programs on their workstations, and that could cause terrible situation if a hacker is a member of the micro support team. That could cause information leak where hacker simply copies hard disks information to their USB-memories, and that could be very harmful to business secrets.
In those scenarios, hackers slip a man inside the system. There they can steal information for years if somebody wouldn't see what that person does. But when we are talking about cracking algorithms with the mathematical method, we must remember that modern computers speed and power have been grown from days when that WPA2 algorithm have been created. That makes that security vulnerable for modern computers when they use "brute force" attack against the system.
Sunday, October 15, 2017
Writing about assassinations with very uncommon poison.
Kimmo Huosionmaa
I often think that assassin will probably want to use common equipment in his or her work. That's why I'm wondering why somebody kills another man with Polonium. That metal is highly radioactive and that's why it is very dangerous to handle. In some books is mentioned that Polonium is the most poisonous material in the whole world, but that poisonous will cause because of this metal is highly radioactive. Polonium is one of shortest life chemical elements what finds of the earth nature and has industrial use of some metering systems. Of course, some synthetic elements exist only in a couple of nanoseconds, but Polonium is used in some technical and radio-logical instruments.
It has very short half-time is about 30-60 days. It is so poisonous, that millionth gram of that material will cause death, and one gram of Polonium can kill million people. That's why it's very difficult to handle that material, and handler needs special equipment like protective clothes and spaces that are made of highly radioactive material. And those equipment are not free to buy. But modern technology will give change to put that very highly radioactive material in somebody's coffee cup.
If assassin has got nano bug, a very small size robot, what he can use with remote control, he or she might able to handle that material. When somebody wants to steal Polonium, does that person must get access to laboratory, what has Polonium in their warehouses.After that thief must put one small piece of that element to bottle what is filled with water, and middle of that bottle is a test tube, what makes possible to put pierce of Polonium in the middle of that bottle. That guarantees that radioactive material is in the middle of protective water core what absorbers radioactive radiation. The bottle could be a modified thermos-bottle where is the rack for two small glass bottles that are put one upon the other, and the inner bottle is covered with gold.
![]() |
| Nanobug |
That absorbs radiation very effectively and makes possible to walk through radio-active detectors, but the thief must have that kind of bottle what doesn't break while dropping, because that might cause that person's death. That bottle might be made with armored glass because gold will cause highly dangerous corrosive to metal surfaces. But that means the person who stole that material should be a worker in the highly secured laboratory, and capable to handle highly radioactive material alone. Or there must be other co-operatives who worked in the same room who were silent about that kind of thief. I personally think that those murderers infused those tiny bites of Polonium inside sugar-crystals because that made them easier to handle.
And after that, they took the nanosized robot, and put that piece of highly poisonous material to their target's body or morning coffee. By the way in Jasser Arafat's body was found the higher concentration of Polonium, and I think that is there a connection between Palestinian leader Jasser Arafat's and Alexander Litvinenko's death. Of course, Polonium is not very common murder equipment, but in Arafat's case, there are only speculations of murder or other symptoms called AIDS.
Suspect of that murder was Vladimir Putin's government, and they would have good relationships to take that material from Russia's nuclear laboratories. But why Russian government would make that kind of crime with so uncommon material, what made FSB:s guiltiness to that case even too clever. Why they didn't use more common poisons like cyanide or ricin. Those chemicals could not straight to connect with the Russian government, and they are easier to handle than that radioactive material. But why those people murdered Ex KGB-agent Litvinenko in London? That kind of actions will put focus in things that Litvinenko had something to hide, but what was the thing? If he has told somebody dirty about his ex-employee the murder would be used as proof about that man's stories.
https://en.wikipedia.org/wiki/Cause_of_Yasser_Arafat%27s_death
https://en.wikipedia.org/wiki/Alexander_Litvinenko
Subscribe to:
Comments (Atom)
New autonomous task units are entering service.
"The deal will create much-needed competition for the Department of War acquisition process. (Representational image)" (Interestin...
-
Basically. The Medusa system is based on a similar concept. With the famous project Orion. The attempt to create the nuclear pulse propulsio...
-
"Schematic configuration for generation and detection of femtosecond UV-C laser pulses in free space. A message is coded by a UV-C lase...







