Tresspassers of Mind: Dead on Arrival!! Privacy Invaders!!

To all the voices: You may be here unauthorized, you may be part of my enemy’s weapon system, you could be practicing witchcraft. Either way you are not alone. Welcome to “Chris’s Cosmic Chat Room”, brought to you by The Universal Father, The Eternal Son, & The Infinite Spirit and of course ‘ME’.

While you give up the right to privacy, anything you say can, may & most likely will be used against you. You do not have the right to remain silent. Your location is automatically entered into our UNITELL Agency Database.

Also, we reserve the right to execute you with any and all weapons at our use. You have entered at your own risk. There are no exits and there is no escape from our grasp.

A Death Warrant (IC888DW) is now issued and we will hunt you down and kill you, each and every one of you, until you are all dead!!

Welcome to Chris Dwaine Christensen Majestone’s Cosmic Chat Room – where my mind never sleeps (& neither does my weapons)!!

I am the Creator, Founder, Owner & Operator of the Urantia Universal Military!!

Posted in Uncategorized | Leave a comment

CIA Insider Tells 911 truth. Time to re-examine your World-view, America!

CIA Insider Tells 911 truth. Time to re-examine your World-view, America!

https://www.youtube.com/watch?v=rnbMjAN7Bws&feature=youtu.be

Posted in Uncategorized | Leave a comment

…..the Milky Way is part of a broader supercluster of 100,000 galaxies known as Laniakea.

This is the most detailed map yet of our place in the universe

Updated by Brad Plumer on September 4, 2014, 11:20 a.m. ET @bradplumerbrad@vox.com

clip_image001

A new study in Nature finds that the Milky Way is part of a broader supercluster of 100,000 galaxies known as Laniakea. Nature Video

Don’t miss stories. Follow Vox!

Follow

We know that the Earth and the solar system are located in the Milky Way galaxy. But how, exactly, does the Milky Way fit in among the billions of other galaxies in the known universe?

In a fascinating new study for Nature, a team of scientists mapped thousands of galaxies in our immediate vicinity, and discovered that the Milky Way is part of a jaw-droppingly massive “supercluster” of galaxies that they named Laniakea.

This structure is much, much, much bigger than astronomers had previously realized. Laniakea contains more than 100,000 galaxies, stretches 500 million light years across, and looks something like this (the Milky Way is just a speck located on one of its fringes on the right):

Say hello to Laniakea, our local supercluster

clip_image002

(Nature Video, based on Tully et al 2014)

It’s hard to wrap one’s head around how enormous this is. Each of those points of light is an individual galaxy. Each galaxy contains millions, billlions, or even trillions of stars. Oh, and this all is just our little local corner of an even broader universe. There are many other galaxy superclusters out there.

So how did the researchers figure out this structure existed — and how did they distinguish it from other superclusters?

The team of scientists, led by R. Brent Tully of the University of Hawaii, first studied the motion of some 8,000 galaxies in our neighborhood. By doing so, they could map out certain patterns. The universe overall has been expanding ever since the Big Bang. But the team also found that gravity was pulling some galaxies toward each other.

That helped them build the graph below, where galaxies moving away from us are shown in red, and the galaxies moving toward us in blue.

The galaxies around us are moving in identifiable patterns

clip_image003

Galaxies moving away from us are in red, those moving toward us in blue (Nature Video, based on Tully et al 2014)

That, in turn, let them create a map of the pathways along which all the galaxies are moving and demarcate some boundaries.

The map below shows some of the pathways within our broader supercluster of galaxies. There’s an especially dense region called “The Great Attractor” (in red) that’s slowly pulling the Milky Way and many other galaxies toward it:

Many galaxies in Laniakea are being pulled toward the “Great Attractor”

clip_image004

(Nature Video, based on Tully et al 2014)

What’s interesting is that this structure is much bigger than anyone had realized. Astronomers had long grouped the Milky Way, Andromeda, and other galaxies around us in the Virgo Supercluster, which contained some 100 galaxy groups.

But as Tully and his colleagues found, and as the map above shows, this Virgo Supercluster is just part of a much, much bigger supercluster — Laniakea. (The name, aptly enough, means “immeasurable heavens” in Hawaiian.)

So what happens when we zoom out? The paper notes that Laniakea borders another supercluster known as Perseus-Pisces. And the scientists defined the borders as where the galaxies are consistently diverging:

Laniakea borders another supercluster: Perseus-Pisces

clip_image005

(Nature Video, based on Tully et al 2014)

What happens if we zoom out even further? Even Laniakea and Perseus-Pisces are just one small pocket of the much broader universe. That universe consists of both voids and densely packed superclusters of galaxies. It looks something like this:

And… zooming out to the broader universe

clip_image006

(Nature Video, based on Tully et al 2014)

We still don’t have detailed maps of every last galaxy supercluster out there. But we now have one for our own home supercluster — and that’s certainly a start.

Further watching: There’s an excellent video from Nature breaking down the team’s findings. The stills above come from that video.

http://www.vox.com/2014/9/4/6105631/map-galaxy-supercluster-laniakea-milky-way

Posted in Uncategorized | Leave a comment

Mysterious Fake Cellphone Towers Are Intercepting Calls All Over The US

Mysterious Fake Cellphone Towers Are Intercepting Calls All Over The US

By Jack Dutton 11 hours ago

REUTERS/Rick Wilking

Seventeen fake cellphone towers were discovered across the U.S. last week, according to a report in Popular Science.

Rather than offering you cellphone service, the towers appear to be connecting to nearby phones, bypassing their encryption, and either tapping calls or reading texts. 

Les Goldsmith, the CEO of ESD America, used ESD’s CryptoPhone 500 to detect 17 bogus cellphone towers. ESD is a leading American defense and law enforcement technology provider based in Las Vegas. 

With most phones, these fake communication towers are undetectable. But not for the CryptoPhone 500,  a customized Android device that is disguised as a Samsung Galaxy S III but has highly advanced encryption.

Goldsmith told Popular Science: ” Interceptor use in the U.S. is much higher than people had anticipated. One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”

The towers were found in July, but the report implied that there may have been more out there.

Although it is unclear who owns the towers, ESD found that several of them were located near U.S. military bases. 

“Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don’t really know whose they are,” Goldsmith said to Popular Science.

It’s probably not the NSA — that agency can tap all it wants without the need for bogus towers, VentureBeat reported:

Not the NSA, cloud security firm SilverSky CTO/SVP Andrew Jaquith told us. “The NSA doesn’t need a fake tower,” he said. “They can just go to the carrier” to tap your line.

ComputerWorld points out that the fake towers give themselves away by crushing down the performance of your phone from 4G to 2G while the intercept is taking place. So if you see your phone operating on a slow download signal while you’re near a military base … maybe make that call from somewhere else.

In an amazing coincidence, police departments in a handful of U.S. cities have been operating “Stingray” or “Hailstorm” towers, which — you guessed it — conduct surveillance on mobile phone activity. They do that by jamming mobile phone signals, forcing phones to drop down from 4G and 3G network bands to the older, more insecure 2G band.

http://finance.yahoo.com/news/mysterious-fake-cellphone-towers-intercepting-162645809.html?soc_src=mediacontentstory

http://urantiaplanetarygovernment.com/intelliceptors/

Posted in Uncategorized | Leave a comment

Russia Announces Large-Scale Nuclear Exercises In Response To Ukraine

Russia Announces Large-Scale Nuclear Exercises In Response To Ukraine

clip_image001

Russia’s defense ministry on Wednesday said it would mobilize more than 4,000 soldiers, 400 technical units and major air support for a large-scale nuclear exercise, just days after Russian President Vladimir Putin made a veiled threat about Russia’s nuclear arsenal amid the ongoing crisis in Ukraine.

The exercise will be conducted in Altai in south-central Russia, according to The Moscow Times, and comes one day before the beginning of a NATO summit in Wales. It will specifically include Supersonic MiG-31 fighter-interceptors and Su-24MR reconnaissance planes, along with Spetsnaz special forces units role-playing as enemy forces. (RELATED: NATO Releases Satellite Photos Proving Russia Is Lying About Invading Ukraine)

Strategic rocket forces Major Dmitry Andreyev said the simulation will have units ”conducting combat missions in conditions of active radio-electronic jamming and intensive enemy actions in areas of troop deployment” to counter “irregular units” and “high-precision weapons,” according to the report.

Andreyev also said the scale of air power included would be unprecedented for such an exercise.

“I want to remind you that Russia is one of the most powerful nuclear nations,” Putin said Friday at a youth forum, news.com.au reports. ”This is a reality, not just words.”

Ukrainian Defense Minister Valeriy Geletey wrote on Facebook earlier this week that a “great war arrived at our doorstep, the likes of which Europe has not seen since World War II,” adding it could result in “tens of thousands of deaths.”

In a conference call with reporters ahead of this week’s NATO summit, White House Senior Director for European Affairs Charles Kupchan warned Russia against interference in other former Soviet states.

“Russia, don’t even think about messing around in Estonia or in any of the Baltic areas in the same way that you have been messing around in Ukraine,” Kupchan said, according to al-Jazeera America.

Despite the warning, NATO is not expected to intervene in Ukraine, which is not a member nation.

http://dailycaller.com/2014/09/03/russia-announces-large-scale-nuclear-exercises-in-response-to-ukraine/

Posted in Uncategorized | Tagged | Leave a comment

I will return as a full fledged adult of the realm.

After I leave this life & body I will return as a full fledged adult of the realm. I will enjoy playing piano, even original compositions. I will have dark hair. I will appear to be about 36 to 37 years of age. I will resume the work that I was doing before I left (the work I am doing now as Chris Dwaine Christensen). All of my spirit family will be with me still. I will have ended all wars, for when I return I will cause peace to rule. I will be the visible ruler for a millennium. I Am the Prince of Peace. Doubt not.

Posted in Uncategorized | Leave a comment

‘Airborne’ Ebola Virus – Public Health Agency of Canada!

‘Airborne’ Ebola Virus – Public Health Agency of Canada!

https://www.youtube.com/watch?v=k38ttMBU0UE

*This is a (Majestone Universal) Civil Emergency Response Agency (CERA) Global Report!!

August 7th, 2014 USA – Urantia

Posted in Uncategorized | Tagged , | Leave a comment

Russian Gang Said to Amass More Than a Billion Stolen Internet Credentials

Russian Gang Said to Amass More Than a Billion Stolen Internet Credentials

By NICOLE PERLROTH and DAVID GELLESAUG. 5, 2014

A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion username and password combinations and more than 500 million email addresses, security researchers say.

The records, discovered by Hold Security, a firm in Milwaukee, include confidential material gathered from 420,000 websites, ranging from household names to small Internet sites. Hold Security has a history of uncovering significant hacks, including the theft last year of tens of millions of records from Adobe Systems.

Hold Security would not name the victims, citing nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable. At the request of The New York Times, a security expert not affiliated with Hold Security analyzed the database of stolen credentials and confirmed it was authentic. Another computer crime expert who had reviewed the data, but was not allowed to discuss it publicly, said some big companies were aware that their records were among the stolen information.

clip_image001

Alex Holden, the founder and chief information security officer of Hold Security, has a history of helping uncover significant data breaches. Credit Darren Hauck for The New York Times

“Hackers did not just target U.S. companies, they targeted any website they could get, ranging from Fortune 500 companies to very small websites,” said Alex Holden, the founder and chief information security officer of Hold Security. “And most of these sites are still vulnerable.”

There is worry among some in the security community that keeping personal information out of the hands of thieves is increasingly a losing battle. In December, 40 million credit card numbers and 70 million addresses, phone numbers and additional pieces of personal information were stolen from the retail giant Target by hackers in Eastern Europe.

And in October, federal prosecutors said an identity theft service in Vietnam managed to obtain as many as 200 million personal records, including Social Security numbers, credit card data and bank account information from Court Ventures, a company now owned by the data brokerage firm Experian.

But the discovery by Hold Security dwarfs those incidents, and the size of the latest discovery has prompted security experts to call for improved identity protection on the web.

“Companies that rely on usernames and passwords have to develop a sense of urgency about changing this,” said Avivah Litan, a security analyst at Gartner, the research firm. “Until they do, criminals will just keep stockpiling people’s credentials.”

Websites inside Russia had been hacked, too, and Mr. Holden said he saw no connection between the hackers and the Russian government. He said he planned to alert law enforcement after making the research public, though the Russian government has not historically pursued accused hackers.

So far, the criminals have not sold many of the records online. Instead, they appear to be using the stolen information to send spam on social networks like Twitter at the behest of other groups, collecting fees for their work.

But selling more of the records on the black market would be lucrative.

While a credit card can be easily canceled, personal credentials like an email address, Social Security number or password can be used for identity theft. Because people tend to use the same passwords for different sites, criminals test stolen credentials on websites where valuable information can be gleaned, like those of banks and brokerage firms.

Like other computer security consulting firms, Hold Security has contacts in the criminal hacking community and has been monitoring and even communicating with this particular group for some time.

The hacking ring is based in a small city in south central Russia, the region flanked by Kazakhstan and Mongolia. The group includes fewer than a dozen men in their 20s who know one another personally — not just virtually. Their computer servers are believed to be in Russia.

“There is a division of labor within the gang,” Mr. Holden said. “Some are writing the programming, some are stealing the data. It’s like you would imagine a small company; everyone is trying to make a living.”

They began as amateur spammers in 2011, buying stolen databases of personal information on the black market. But in April, the group accelerated its activity. Mr. Holden surmised they partnered with another entity, whom he has not identified, that may have shared hacking techniques and tools.

Since then, the Russian hackers have been able to capture credentials on a mass scale using botnets — networks of zombie computers that have been infected with a computer virus — to do their bidding. Any time an infected user visits a website, criminals command the botnet to test that website to see if it is vulnerable to a well-known hacking technique known as a SQL injection, in which a hacker enters commands that cause a database to produce its contents. If the website proves vulnerable, criminals flag the site and return later to extract the full contents of the database.

“They audited the Internet,” Mr. Holden said. It was not clear, however, how computers were infected with the botnet in the first place.

By July, criminals were able to collect 4.5 billion records — each a username and password — though many overlapped. After sorting through the data, Hold Security found that 1.2 billion of those records were unique. Because people tend to use multiple emails, they filtered further and found that the criminals’ database included about 542 million unique email addresses.

“Most of these sites are still vulnerable,” said Mr. Holden, emphasizing that the hackers continue to exploit the vulnerability and collect data.

Mr. Holden said his team had begun alerting victimized companies to the breaches, but had been unable to reach every website. He said his firm was also trying to come up with an online tool that would allow individuals to securely test for their information in the database.

The disclosure comes as hackers and security companies gathered in Las Vegas for the annual Black Hat security conference this week. The event, which began as a small hacker convention in 1997, now attracts thousands of security vendors peddling the latest and greatest in security technologies. At the conference, security firms often release new research — to land new business, discuss with colleagues or simply for bragging rights.

Yet for all the new security mousetraps, data security breaches have only gotten larger, more frequent and more costly. The average total cost of a data breach jumped 15 percent this year from last year, to $3.5 million per breach, from $3.1 million, according to a joint study last May, published by the Ponemon Institute, an independent research group, and IBM.

Last February, Mr. Holden also uncovered a database of 360 million records for sale, which were collected from multiple companies.

“The ability to attack is certainly outpacing the ability to defend,” said Lillian Ablon, a security researcher at the RAND Corporation. “We’re constantly playing this cat and mouse game, but ultimately companies just patch and pray.”

Nicole Perlroth reported from San Francisco and David Gelles from New York City.

http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html?smid=tw-bna&_r=0

Posted in Uncategorized | Tagged | Leave a comment

X – Who Runs the Obama White House?

X – Who Runs the Obama White House?

The day after Barack Obama was elected president, the Israeli press proudly proclaimed that the new president had chosen an Israeli, Rahm Emanuel, to manage the new administration. “Obama’s first pick: Israeli Rahm Emanuel as chief of staff” was the Ha’aretz headline of November 6, 2008. The controlled press in the United States, however, keeps the American public unaware that Obama’s new chief of staff is an Israeli, with terrorist roots and a sworn loyalty to the state of Israel.

Rahm Emanuel, first Chief of Staff of the Obama White House, is the son of a real Zionist terrorist and served in the Israeli army. The late Sherman Skolnick of Chicago called Emanuel the “Acting Deputy Chief for North America of the Mossad -­ Israeli Intelligence.” Skolnick reported that Emanuel’s father Benjamin had been “part of the Israeli assassin team that murdered Sweden’s Count [Folke] Bernadotte” in 1948. Bernadotte was the United Nations envoy who was sent to Palestine to find a solution to the UN Partition Plan that gave Palestinian land to Jews from Poland and Russia.

Here are some key extracts from the Ha’aretz article:

A day after his historic election to become the first black American president, Barack Obama stepped into the role of president-elect yesterday, inviting Rahm Emanuel to join his administration as White House chief of staff, Democratic officials said.

Emanuel, a former Bill Clinton adviser, is the son of a Jerusalem-born pediatrician who was a member of the Irgun (Etzel or IZL), a militant Zionist group that operated in Palestine between 1931 and 1948…

Rahm Emanuel’s father, Benjamin, yesterday refused to comment on the report that his son was appointed White House chief of staff. He told Ha’aretz that he would only comment after speaking to his son.

“Obama is a pro-Israeli leader and will be a friend to Israel,” he said, adding that he was pleased with Obama’s election. He also said his son is the namesake of Rahamim, a Lehi combatant who was killed.

Rahm Emanuel is named after a Zionist fighter who belonged to the Stern Gang, which was a terrorist organization linked with the Nazis. Before moving to Chicago, his father was an active member of this terrorist group of assassins and bombers, which was also known as LEHI. This information is not discussed on CNN. The Zionist-controlled media censors these disturbing, but important facts.

Emanuel’s father, Benjamin, told Ma’ariv, a Hebrew-language Israeli paper, that his son’s appointment would be good for Israel. “Obviously he will influence the president to be pro-Israel,” the Jerusalem Post reported. “Why wouldn’t he be? What is he, an Arab? He’s not going to clean the floors of the White House.”

Rahm Emanuel with his brothers and father, a Zionist terrorist from the Irgun and LEHI

The Obama White House chief of staff speaks Hebrew and spends most summers in Tel Aviv, his Israeli father proudly told Ma’ariv. After Emanuel was named chief of staff, none of the Zionist-controlled media outlets in the United States mentioned the Emanuel family roots with the Nazi-linked terror gangs in Palestine in the 1930s and 1940s. Naftali Bendavid of the Zionist-owned Chicago Tribune, for example, wrote a book about Emanuel and spent a great deal of time with him, but completely avoided discussin Rahm’s Israeli roots in the article he wrote for the Tribune on November 6.

“POLITICAL ASSASSIN”

Bendavid wrote that Emanuel “is best known as something of a Democratic political assassin” who “might not appear to be the obvious choice for White House chief of staff for a president-elect who speaks eloquently of setting aside partisan differences and bringing the country together.”

Emanuel is known for using gangster tactics to threaten people. He once mailed a rotting dead fish to a campaign pollster who had not produced results to Emanuel’s liking. Sending a dead fish to a person is a well-known Mafia message, which warns the recipient that he will “sleep with the fishes” unless he heeds the warning.

Rolling Stone magazine revealed more of Emanuel’s gangster behavior in an article entitled “The Enforcer” on October 20, 2005:

“The night after Clinton was elected, Emanuel was so angry at the president’s enemies that he stood up at a celebratory dinner with colleagues from the campaign, grabbed a steak knife and began rattling off a list of betrayers, shouting “Dead! . . . Dead! . . . Dead!” and plunging the knife into the table after every name. “When he was done, the table looked like a lunar landscape,” one campaign veteran recalls. “It was like something out of The Godfather. But that’s Rahm for you.”

“Republicans are ‘bad people who deserve a two-by-four upside their heads.'”
- Rahm Emanuel, New York Times, January 24, 2009

Emanuel certainly seems to have a penchant for violence, which might not seem so unusual for a person named after two Irgun terrorists: one named Rahamim (Rahm), and the other an uncle named Emanuel. Bendavid’s book was cited by the New York Times of January 24, 2009, as being the source of the Emanuel quote that Republicans are “bad people who deserve a two-by-four upside their heads.” Once again, the Times article, entitled “Obama’s Partisan, Profane Confidant Reins It In”, conspicuously failed to mention Emanuel’s Israeli roots. Obviously, the New York Times considers this information it would prefer the reader not know. This is a perfect example how the Zionist-controlled media controls public opinion by omitting important information.

It should come as no surprise that the New York Times article chooses not to mention Emanuel’s Israeli roots — or the fact that his father was a member of the Irgun, the most murderous terrorist group in Palestine in the 1930s and 40s. The New York Times is the leading Zionist-controlled newspaper in the United States by virtue of the fact that it has been controlled by the Sulzberger family, founding members of B’nai B’rith (secret organization of Jewish Freemasons) Lodge No. 1 of New York, for more than one hundred years. Likewise, the Chicago Tribune and Los Angeles Times are both owned by a Chicago Zionist named Samuel Zell.

- See more at: http://www.bollyn.com/11305#sthash.Kw8aZZIC.dpuf

Posted in Uncategorized | Tagged | Leave a comment

Beware Social Networks!!

Social Networks are using your information to make money, often selling you out without compensating you.

They become billionaires while you give them your time, your personal information & even your money.

Also, they are another database for the governments and corporations to know all and everything about you.

Beware these money-worshiping monsters!

Posted in Uncategorized | Leave a comment