I feel a bit like Lucille Ball in that now famous "Vitameatavegamin" commercial from I Love Lucy: "Does your computer run slow? Internet connection slower than evolution, when it's not altogether spotty? Even after several Virus scans? Is your computer listless, shifty, unstable or otherwise sociopathic and untrustworthy even though it's brand new out of the box? Does it still skip keystrokes? or add a few, even after you've given it an injection of Cybermeatasecuriscan?"

Like Lucy, you might feel after such an exhausting day wrestling with such issues, that you should pop out at parties and that all your answers are in "this bittle lottle" which "taste like candy".

But we could get more serious. Have you ever noticed any of the following symptoms: destroyed data, denials of service for no apparent reason, degraded capability or internet connections? endless small interruptions of service, corruptions of other sorts, or even complete unresponsiveness as you watch someone else typing on your computer?

Well, if so, it might be "your" government "protecting" you:

"General Keith Alexander, director of the National Security Agency and commander of the U.S. Cyber Command, told a symposium in Washington last October that the United States is prepared to do more than just block computer attacks. “Part of our defense has to consider offensive measures,” he said, making him one of the most senior officials to admit that the government will make use of malware. Earlier in 2012 the U.S. Air Force invited proposals for developing “Cyberspace Warfare Attack capabilities” that could “destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the adversaries [sic] ability to use the cyberspace domain for his advantage.” And in November, Regina Dugan, the head of the Defense Advanced Research Projects Agency, delivered another clear signal about the direction U.S. defense technology is heading. “In the coming years we will focus an increasing portion of our cyber research on the investigation of offensive capabilities to address military-specific needs,” she said, announcing that the agency expected to expand cyber-security research from 8 percent of its budget to 12 percent." (Welcome to the Malware-Industrial Complex)

Now, note it's not just the USA doing this, but just about every other country and quite a few private corporations.

But even now, as I am attempting after HOURS of of wrestling with such issues, I cannot help but think that My tax dollars are at work again, after all, this is the same government that denies that it ever practices on its on population...

See you on the  flip side.

Posted in

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".


  1. paul de gagne on March 13, 2013 at 10:30 am

    I like to add this footnote I found to the conversation while reading Covert wars…!

    It’s on page 217, footnote 11…

    Rosalie Bertell, in her Planet Earth: the Latest Weapon of War (the women’s press, 2000), p.103 notes that during a press release given on 30 May 2000, US Joint Chiefs of Staff Chairman General Henry H. Shelton stated that one crucial component of the doctrine of full spectrum dominance includes the use of “deception to ‘defend decision-making processes by neutralizing an adversary’s perception management and intelligence collection efforts.’ Faced with such obscure language, the lay reader can only speculate as to what this might entail. The press release concluded that information warfare will become as important as ‘that conducted in the domains of land, air and space.’ China’s military also has stated that it intends to make information warfare a capability equal in stature to its army, navy and air forces.”


    Interesting little footnote. Especially about speculation by lay persons? I conject that all these interruptions in the flow or use on our computers may be by design rather than by some defect or faulty programing or just ‘it’s a bum lemon of a computer’ which can be true but its not all that…!.”

    Most of us like our information (data) to come in a fast, easy flow that seems natural. I do at least. Now we have all these stops or sudden, unexpected roadblocks (gatekeepers/border guards in virtual reality anyone?) slowing us down perhaps in the intention of our missing some vital, lightening flash across the screens in our brain’s like kind of ideas that just pop up out of nowhere but give us clues or at least synchronic symbols that seem to align all those magnetic particles in a pattern we can now begin to see where once before it was just mass-confusion or traffic jams in our nerons!

    Stop the flow and often enough for people who are ‘turtles’ like me or are a bit slow catching on to the obvious (maybe the obvious isn’t as obvious as someone would like us to believe, ha, ha!) and the idea escapes us like last night’s dreams.

    So that would be a form of ‘perception management’ if say, “we operate cognitively at such and such speed but are constantly forced to slow down for border-checks ( adjustments on the comp-keyboards.)”

    I can see some readers getting a little perturbed reading Farrell’s ‘Covert Wars and Breakaway Civilization?” I’m on page 218 and I must admit it is not 4th grade level reading like most of the mass medium call daily newspapers.

    All the sudden the reader of Covert Wars may get side-tracted when following one of many of its developing themes or ideas. It like a dam ZIG-ZAG highway with the middle lines in the road constantly guiding us off the road we think we’re on or supposed to be reading about?

    Then, an AHA moment occurred to me? In a way this book is a bit like Kurt Voniguts (spelt wrong) writing. In the beginning so many characters totally unrelated to each other in so many different stories one says to oneself, ‘where’s the connect or ‘Where’s the Beef, as that old mad-ave commercial went. All of a sudden some sentence pops up and presto it all comes together to those who have patience or are learning Farrel’s writing style.

    Here’s I IMAGINE how this style works. He socks it to us the reader with all this DISCONSTRUCTION (called analysis) then all of a sudden we see between the lines that he actually is CONSTRUCTINg an ARTIFICE (argument-for)!

    So you heard of the Wolf in Sheep’s Clothing so Farrell is a Constructionist in Deconstructions’ clothing. OR, time to put our hard hats on and not the little beanie hats with the propeller called our thinking caps like the one’s they used in old TV show called the Romper Room. I never did end up BEEing a Good -Du-Bee no matter how hard I tried!

    Have a good day today and instead of seeing you on the flip side — Welcome back Folks, ha, ha!

    (((ah shucks — the financial vipers isn’t coming out til Oct. 15 according to big, bad Amazon! but maybe I’ll shell out the 19 bucks for that Yahwah book I keep telling my self I am going to buy soon. Jeepers, I still have 5 brand new books I haven’t read on my windowsill.

    AH, so many books and soo little time. Maybe I do need one of those Transhumanistic Eyeballs to read them all tonight but then again what would I do with all this dam TIME, Time, time?

  2. James Dempsey on March 12, 2013 at 11:48 am

    I have noticed almost every time I do a google search on just about anything comes up empty at least the first 4-5 are like broken shortcuts as in when you click it can’t or won’t open or display the page you want to look at! Sometimes you can copy and paste the address but that doesn’t work all the time either!

    So Censorship definitly seems like it is creeping in. Or vagness? “Too much freedom can make Jack ‘too intuitive” and turn him back into the uninformed dull boy they all wish us to be. I have noticed this on you-tube as well starting to creep in! That seemingly at least to some invisible hand of censorship!

  3. Yaj on March 8, 2013 at 3:02 pm


    You do realize that the main webpage of GizaDeathStar has some like 7 pieces of java script running on it? And then there are at least 3 trackers with the webpage. All of these extras raises privacy and security questions.

  4. amunaor on March 8, 2013 at 1:46 pm

    Consider the fact that the ‘Stuxnet’ virus was a DARPA contrived creature purposed to wreak havoc upon a competitor’s system not friendly to the ‘Free-Racketeers’. The creature ended up in the village instead.

    What is it here that they’ve been drooling over? Censorship!

    Watch out for more stories like this one, inculcating the population with FEAR in need of a security blanket. Since the general population is not too computer savvy, the Net is ripe for the plucking with a DARPA false-flag event, driving everyone into the snuggly arms of AUTHORITY FOR MORE SECURITY.

    Joseph, if you’ve been using Norton Utilities or any other such major security rubbish, trash it! In many respects, it’s worse than having virus plagued rig. The result is that it commandeers every nook and cranny of your system, bogging in it down.

    I speak for the Microsoft operating system only, for which the only security you’ll ever really need is that which is already built-in: the Microsoft Firewall along with a ‘free’ installation of: Microsoft Security Essentials, which has been relabeled for Windows 8 as: Windows Defender.

    Microsoft Security Essential or Windows Defender is amazingly compact and un-intrusively efficient. It can be set to quickly check for newly released viruses, worms, bots, and rootkits on a daily bases. This is one act where Bill really shines!

    What I’ve found is that the biggest magnet for attacks is if you’re running Java. Ever since I’ve uninstalled Java; nearly a year ago, the rate for attempted attacks has dropped to nearly zero, compared to half a dozen a week before that. They still try, very sporadically, to sneak in through Adobe Reader, but nothing compared to when Java was running and all attempts are immediately sequestered and alerted for your action, by Essentials.

    Joseph, to me your constipated system is displaying the symptoms of a being impregnated by Java type viruses. The attacks seem to be two pronged: the first is an opening up for a deeper invasion by a second punch. That’s my humble opinion.

    Try the Security Essentials, but if you already have Norton, or something similar, I think you’ll need to disengage from it before Essentials can work properly. And let me worn you, uninstalling Norton is like taking a trip through hell.

    Hope this helps.

  5. DownunderET on March 8, 2013 at 1:21 pm

    I seem to be a bit confused here, in other words WHAT are they looking for?

    I also think about the people who work at these three letter departments saying to themselves, why are we following the actions of really nice people who wouldn’t hurt a fly.

    To make it plain and simple, somebody is chasing somebody, and the first somebody can’t figure out what the second somebody has to hide, and it all costs billions of tax dollars.

    GO FIGURE!!!!

  6. Charlotte Knight on March 8, 2013 at 10:23 am

    Well, yes sometimes….and I’m SO THANKFUL that the gov. possibly thinks I am important enough to “protect.” (saracasm)

    Also, especially have difficulties when trying to listen to the live vidchat!

  7. marcos toledo on March 8, 2013 at 10:21 am

    Yes I have had problems like these sending e-mail and when typing a reply to a article on certain websites like io9 and gizmo today. I couldn’t get my comment publish no matter which of my acounts I sign with. Also when I am typing in a reply it will jump up and I have to bring back with my cursor to complete my reply. AS for internet connection I have to wait minutes for the connection. Or try to reconnect to grt on the website this has been happening more of late I have notice. So I am aware of your computer problems I have them too.

  8. Robert Barricklow on March 8, 2013 at 8:59 am

    Of course the “official” version is a clue.
    It reminds of a time when a large corporate concern took over a business then fired everyone immediately. The rehired them under a new [serf]contract. The CEO, in the first mass meeting of new employees, then told everyone to write the following down(what the company was going to do for them) Everyone was writing, except myself and someone else. When finished, he told everyone to put their pens down ,as he was going to tell us what the company would not do, under any circumstances. Immediately, I took my pen & paper out, as the the other person.
    All governments lie.
    So do the Big Shots.

    Bank on it…er…,

    …maybe a Credit Union would be better.

  9. LSM on March 8, 2013 at 8:14 am

    you know it, Dr. Farrell-

    even though I’m a “nobody” here in Germany I’ve been experiencing an occaisional unexplained access (was previously not a problem) to certain sources even though I just paid for (in Jan.) a faster internet download speed which seems to be slower (no joke) than what I was able to access for less money (no joke)!- thank you, German Telekom (which is slowly but surely regaining its previous monopoly on German telecommunications)-

    not to mention any positive reference to the man with the funny litle black moustache who couldn’t keep his right arm down (not that I think his administration was 100% benevolent but that’s another chapter as we all know)-

    was it Socrates or Plato who stated the following (following is big paraphrase) “every tyrannt, every dictator, every dictatorship rises to power professing to be a protector”

  10. Yaj on March 8, 2013 at 6:21 am

    No my Windows computer does not do those things, yes sometimes there are very minor software problems, but nothing like what is described.

    Web connections, well the fast ones aren’t regulated by the government thanks to Bill Clinton’s gift to the cable companies and the Supreme Court, so there’d be many parties to blame before someone hijacking a web connection for nefarious reasons.

    So there are all sorts of fixes one can attempt before reaching that conclusion: use of proxies, better web browsers, selectively turning of java, one can even use a separate computer as a firewall between one’s computer and the the web for real security.

    Once one has a stable well functioning C drive, clone it.

    • Frankie Calcutta on March 8, 2013 at 9:20 am

      Yaj the Tedious,

      So are you suggesting that Dr. Farrell is a conspiracy kook if he suspects computer difficulties may be tied to “offensive measures” taken by the NSA as openly stated would be done by an NSA General in the above article? Considering his body of work, Dr. Farrell would be a prime candidate for this type of harassment and more:

      “Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”
      In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-’independent’ advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.
      This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here.
      Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”
      He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).
      This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”

      • Yaj on March 8, 2013 at 3:00 pm


        Given how many times you’ve launched into blame the jews here and then been caught prevaricating about things you’ve posted in the same string of comments, I’d guess that you’re an agent here to demonstrate the credibility problems inherent in the subjects you so frequently inflict on readers here. In other words, Glenn Beck lies all the time.

Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events