Podcast: Play in new window | Download (Duration: 1:59:46 — 58.3MB) | Embed
Here are the Links from this broadcast
- “Trained-Monkey Collaborators of Death” — ” The entire early narrative, which has largely stuck in the glue-like minds of most of the unquestioning masses, is built around the idea that George Zimmerman is a white racist.
But rather than being a “white racist,” George Zimmerman’s genetic make-up is actually about as “mixed” as you get, including a Peruvian mother, a white father, and a black great-grandfather. In addition, it was well established that, if anything, Zimmerman was an advocate for the black community.” - From Last Week, When Max Attacks Promoting the Race Card Meme:
- When Stupidier isn’t Stupid Enough:
- Max Keiser
@maxkeiser 3h‘Stand your ground’ laws used to be called the KKK in America.
- Despite what the LameStream Media Race-Bating Max joKeiser says:
- Behind The Woodshed
@BehindaWoodshed 2h “Stand Your Ground” is propaganda. The applicable standard is justifiable Use of Force as determined by a Jury.@maxkeiser
- Max Keiser
WE’RE ALL SLAVES 42 USC 1981: And Before;
- The Irish Slave Trade – The Forgotten “White” Slaves
The Slaves That Time Forgot
- FDA warns of steroids in vitamin B supplement
- How To Preserve Dairy Products For Emergency Situations
Detroit: The Latest Bankruptcy Lie
What does this mean?It means that the budget is merely a reflection of what I call the “creative accounting” that is applied to the audited CAFR report so as to make the budget report appear to be in a state of decay, debt, default, and loss. While the CAFR may show assets of millions or billions in cash and investments, the budget report will be creatively manipulated by this special creative accounting process to create an illusionist “balance sheet” that somehow, incredibly, and magically turns an asset into a liability.
- Jefferson Mining District Lawsuit to Stop Political and Legal Monopoly Corruption of our way of Life
Judge throws out ‘state secrets’ claim, allowing lawsuit against NSA to continue
- Police need warrants to track cell-phone data, N.J. Supreme Court rules
- How Microsoft handed the NSA access to encrypted messages
Here’s what can go wrong when the government builds a huge database about Americans
How NSA access was built into Windows 1999
Obama: If you can’t trust government, we’re going to have some problems
US government agency destroys hardware to clear malware
BKA malware shocks victims with child pornography — As Reported to the Behind The Woodshed Chat by JuleStan “**CAUTION** Beware .SU domains!! Typically sensationalistic headlines to entice you to click, but mostly malware sites!
Keep seeing people posting stories that link to a .SU domain. Highly recommend NOT clicking on them, as they are used to steal personal and financial information!
“Most of the .su sites we investigated were created for malicious purposes, not for business,” David said. “More Trojan sites are hosted on .su than phishing sites,” he told PCWorld. http://www.pcworld.com/article/2040485/cybercriminals-go-back-to-the-ussr.html“- Only NSA can listen, so that’s OK
- Obama: If you can’t trust government, we’re going to have some problems
Opt out of PRISM, the NSA’s global data surveillance program
- Stop the American government from spying on you by encrypting your communications and ending your reliance on proprietary services.
- Free Software post-PRISM
- Free and Open-Source Software (FOSS) Evaluation Center
- Dump Skype – Piss Off The NSA
- Jitsi 2.2 and stable build line
- How to stop AT&T from selling your private data to advertisers
- How To Give The NSA The Finger…Without Them Ever Noticing — Free Report.
- Overwhelm The NSA With Vice’s New Spam Generator
- JavaZone 2013: Javapocalypse SEEK THE JAVATAR
“My understanding is that espionage means giving secret or classified information to the enemy.” “the US Government views you and me as the enemy.” – Ron Paul.
Spread The Word Behind The Woodshed.
(^_^)