Showing posts sorted by relevance for query Security. Sort by date Show all posts
Showing posts sorted by relevance for query Security. Sort by date Show all posts

Tuesday, June 11, 2013

Edward Snowden Reveals His Motivication for Disclosing NSA's Domestic Intelligence Gathering Efforts

<< SCROLL DOWN FOR NEWS >>

Recently it has come to light that Uncle Sam is creating an audit trail of all communications in and outside of the United States.

Surprisingly, everyone acts as though this is the first time that Uncle has monitored the population's electronic communications en masse. The fact is, back in the 1990s, we learned of a SIGINT (Signal Intelligence) program called Echelon that essentially did the same thing, only using another nation's intelligence officers to do the spying.

US CIA leaker Edward Snowden, an infrastructure analyst for CIA (Central Intelligence Agency), offers some thoughts as to why a young man with so much to lose still chooses to disclose what NSA (National Security Agency) is doing by way of massive monitoring of domestic communications.

Snowden says that his worst fear is that even after disclosure, the American public will do nothing to change things--that everything will continue on as if he hadn't made this huge sacrifice. Honestly, his career is over, perhaps his very life. And yet most of us in this nation have no idea as to what the implications is of the information that Snowden has given us. Worst yet, most of us don't even know this young man's name and most of us don't even care about what he has told us.

In time, more Snowden's are going to surface, especially as NSA becomes even more power hungry and intrusive in their intelligence gathering practices.

If you are one of those people who could give a rat's rear as to what Snowden has chosen to share with the world, despite the life-changing nature of the information he's leaked, then you need to look in the mirror. You need to give some serious thought to who you are, what you are, and what you have become.


Copyright©2013/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

About the Author

Al Colombo is a former trade journalist in the physical security and life safety markets. His 28-year career includes the title of Associate Editor with Security Distributing & Marketing Magazine and Technical Editor with Security Sales & Integration. His freelance work has also appeared in Security Dealer & Integrator, Locksmith Ledger, National Locksmith, Security & Life Safety, Alarm Installing Dealer, Electrical Contractor Magazine, and The Electrical Distributor, in addition to writing promotional copy for Honeywell Life Safety, Digital Monitoring Products, Home Automation Inc., Camden Door Controls, and numerous websites throughout cyberspace. To contact Al Colombo, click here.

Saturday, July 16, 2016

Terrorism in France, and the Radicalization of the Presidency

The Weaponization of Everything Under the Sun

The localized attack on the French during one of the widely celebrated days of the year is not only heartbreaking, but it’s also shocking. In addition, it further proves that if it’s not a gun, then it will be some other type of weapon—a car, truck, a plane, a knife, a tractor, a go-cart, whatever.

Look, there’s a faction of society--the controlling class, if you will—who have targeted “guns” for extermination, not the crazed individuals who use them to create terror in our lives. And not at all surprising enough, these same controllers own and/or control the majority of news media outlets across the world.

With that media control, they have chosen to focus on “guns” and they are using that control in an integrated manner to support the thought that “guns are bad,” and “those who misuse them are simply misguided because of their past.”

All of this media control is leveraged with personal messages by President Obama, as he works to complete his last term with one or more executive orders designed to further exclude purchases and use of weapons by common, law-abiding citizens here in the States.

We all know deep in our hearts that the intention of those leaders, like Obama, who oppose common gun ownership is to create a vacuum where the only individuals who can legally have them are law enforcement, federal employees, and military. But what about Obama’s “Civilian Army,” who he sought to create when he first took office. If you recall, this Civilian Army was to be just as well armed and funded as our regular Army. Hmmm

Obama's Citizen Army

When Obama came to power, he called for the creation of a civilian security force that is as well funded and armed as our regular military. When I first heard about this, I thought to myself, "It sounds a lot like Hitler's Brown Shirts who he used to repel Communist attacks during the early years of his effort to take over the German government.

The thing that all of us need to remember here is that those who own and control the press also control what is publicly perceived as "right" and "wrong." As I attempt to envision a civilian security force, just as well armed and funded as our regular military, all under the control of President Obama and those whom he might place in power, I shudder.

So, whatever happened to his citizen army?

I found a recent call to action on the issue of the nationalization of local police by the DOJ: OBAMA'S 'NATIONAL CIVILIAN SECURITY FORCE' ENDORSED, as Sharpton calls for nationalization of cops in wake of Baltimore riots.

Editor's note on Oct. 22, 2020: the following link and the video are no longer available. Obviously someone decided that it was not  wise to either continue carrying it on their website, or perhaps someone who owns the individual it's about made that decision. In any event, here is another one about Obama's Citizen Army: click here!

Here's another reference to Obama's citizen security force: Obama Building A Civilian Army For 2015, Get Ready For War. See the video below please:

Here's another mention about Obama's civilian army: Obama’s civilian army and secret police: DHS Protective Security Service.

On June 30, 2010, the POS was at it again. Speaking at a town hall meeting, Obama declared that the military was “overburdened’ by the wars in Iraq and Afghanistan. He then resurrected his 2008 campaign idea and proposed to build a “civilian expeditionary force” that’s as large as the military, without however giving the legal basis for this “civilian expeditionary force” nor how he intends to pay for another military-sized institution when the more than $700 billion annual military budget was already choking the federal government’s budget.

Please see the associated video below:

The Radicalization of the Presidency

I don't think that ever in the history of this nation has there been a president who hates the country he lead--this nation, in fact--as much as President Obama and the First Lady. I know this is history to some, but to others--those who continue to make excuses for this president, it's not. Read the following statements and I believe you will understand why things have gone so terribly wrong in this nation over the past eight years. With that said, please understand that I believe that the last President Bush that we had works for the same controlling Elite that Obama does.

Believe me, writing about this gives me absolutely no pleasure. But, this needs to be openly discussed now, not after martial law is declared and a civil war results.

Allan Colombo

How old do you have to be to buy a gun?

For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Wednesday, January 16, 2013

Crime Prevention Begins at the Front Door

I have always been big on crime prevention, especially since my father's home was broken into back in the early 1970s. That prompted he and I to install a home-brew alarm system consisting of relays, surface magnetic door switches, foil tape on his windows with butterfly transition devices, and Amprite delay devices to provide an entry/exit delay (that sure took me back a ways).

Here's the deal, crime prevention should be part of everyone's life. Every single day good people are victimized by bad guys. In most cases the victim was not aware of things going on around him/her. Because they did not practice situational awareness, they failed to see it coming.

One of the most common areas where victimization occurs is in the home. More and more we're hearing in the news of home invasions where the homeowner(s) is there when a criminal act take place. In a good number of them the homeowner him/herself unlocked and opened the door, thus allowing a bad guy to push his way into the home.

The lives of two children, ages 4 and 7, were threatened Tuesday night when four people entered a man’s apartment and told him they would shoot his children if he didn’t give them money. (read more)

You can greatly reduce your risk by simply NOT unlocking and opening the door to a caller. Instead, verify who they are and what they want before incurring a risk. One way to do this is to install a through-the-door peephole lens through which you can see people on the other side.

In most instances you can talk back and forth through the door to find out what they want. If this is not efficient, then have a small two-station, battery-operated intercom installed. They can actually be installed back to back when they are surfaced on the outside and inside walls. If feedback is an issue, install a thin piece of foam or rubber insulation on the backside of each unit to minimize the problem.

Not all home invasions happen as a due course of unlocking and opening a door.

Berndt Anderson, 63, was awakened around midnight by a man rummaging in his bedroom at 130 Arbor Drive, according to a police report. Anderson told police that he chased the man out, but was confronted by two other men in the house -- one who appeared to have a gun.(read more)

In this case it's wise to install a burglar alarm system covering at least your doors. If you are concerned enough and you have the money, include the windows. This will help to frighten off would-be criminals once the alarm sounds. You might also consider installing a single-cylinder deadbolt lock on your bedroom door so if someone does proceed to enter once the alarm sounds, you can minimize your risk and maximize your chances of successful police response by locking your door.

Although there is no sure way to stop a determined criminal from getting into your home, you can slow him down and maximize your chances of survival in an assortment of ways.


About the Author

Al Colombo is a former trade journalist in the physical security and life safety markets. His 28-year career includes the title of Associate Editor with Security Distributing & Marketing Magazine and Technical Editor with Security Sales & Integration. His freelance work has also appeared in Security Dealer & Integrator, Locksmith Ledger, National Locksmith, Security & Life Safety, Alarm Installing Dealer, Electrical Contractor Magazine, and The Electrical Distributor, in addition to writing promotional copy for Honeywell Life Safety, Digital Monitoring Products, Home Automation Inc., Camden Door Controls, and numerous websites throughout cyberspace. To contact Al Colombo, click here.

Saturday, February 23, 2013

The Banker's Conspiracy Which Started the World Crisis

SCROLL DOWN FOR NEWS >>

Those who have followed my work over the last 25 years know that I've been warning the public of a plan involving the International Bankers, a plan that will end in the U.S. Dollar (USD) becoming merely a notation in future world history.

Up until recently, my assessment of the situation has been based on research involving the Int'l Banking community, current events, and laws passed since 1900. I have listened with great interest as China has made it known that they intend for their own currency to become the generally preferred global currency in place of the USD. And to be honest with you, in the 1990s and early 2000s I received plenty of information from intelligence sources across the spectrum that point to a significant economic collapse on a global basis, all because of an out-of-control Int'l banking community hell bent on creating a single, global central bank, complete with its own one-world currency.

Several days ago I discovered a book, called The Bankers' Conspiracy, which started the world crisis, by Arthur Kitson, published in 1933. You need to read or listen to this book on audio tape. I am providing both below:

Click on the image above to view and read this book, or listen to an audio rendering of the book (below).

Arthur Kitson -- The Bankers' Conspiracy! Which Started the World Crisis (1933), Posted to YouTube by Tim Hayes.

Added 11/10/20: On Hayes' YouTube rendering of the above audio recitation, here's a short word of wisdom, and I mean utter brilliant wisdom: 

Kitson: "Money is not international, and the attempt to make it so is part of a deep-laid plot on the part of certain international financiers to control the world politically, industrially, and financially, by means of the Bank of International Settlements established recently at Bale.

"If this Conference results in the adoption of an International Money system, the masses of mankind will be enslaved to a soulless despotism, and it will result in further wars. It will compel the workers of all countries to engage in a sordid, cut-throat wage competition, which will reduce them all to the lowest level of bare existence! The World will then be engaged in a life and death scramble for money! The only alternative to this will be raising the world's tariff barriers!"

This is, in fact, directly attributable to the COVID-19 narrative that we now have before us! --Al Colombo


Copyright©2013

About the Author

Al Colombo is a trade journalist in the physical security and life safety markets. His 30-year career includes the title of Associate Editor with Security Distributing & Marketing Magazine and Technical Editor with Security Sales & Integration. His freelance work has also appeared in Security Dealer & Integrator, Locksmith Ledger, National Locksmith, Security & Life Safety, Alarm Installing Dealer, Electrical Contractor Magazine, and The Electrical Distributor, in addition to writing promotional copy for Honeywell Life Safety, Digital Monitoring Products, Home Automation Inc., Camden Door Controls, and numerous websites throughout cyberspace. To contact Al Colombo, click here.

Saturday, February 16, 2013

Facebook: Intel Gathering Effort or Social Network

SCROLL DOWN FOR NEWS >>

Please allow me to make a comment regarding Facebook's "Friending" pollicy

First, I want to say that it sucks. They want you to ONLY friend people you REALLY know. Second, this brings me to the issue of what a social website is. I would think a social website is intended to support current friends, to make new friends, and to introduce your current friends to your new friends.

Third, I have suspected for some time that Facebook (FB) is operated in part with money supplied by either our government or by a quasi-governmental agency, such as the Central Intelligence Agency (CIA). I mention this because FB's social policy sounds more like the government wanting to create a matrix of our associations than a social website.

As a former System Operator (SysOp) on the Compuserve network, I can tell you emphatically that these networks allow government agents to access every nook and cranny of the public portion of the network. So keep all of this in mind when you place personal information on your FB Wall. Just warning you...


There's something about a woman
with a really big gun!!


Copyright©2013

About the Author

Al Colombo is a former trade journalist in the physical security and life safety markets. His 28-year career includes the title of Associate Editor with Security Distributing & Marketing Magazine and Technical Editor with Security Sales & Integration. His freelance work has also appeared in Security Dealer & Integrator, Locksmith Ledger, National Locksmith, Security & Life Safety, Alarm Installing Dealer, Electrical Contractor Magazine, and The Electrical Distributor, in addition to writing promotional copy for Honeywell Life Safety, Digital Monitoring Products, Home Automation Inc., Camden Door Controls, and numerous websites throughout cyberspace. To contact Al Colombo, click here.

Sunday, May 17, 2015

How Alarm Systems Deter Crime

<<---------- Scroll down for news. ---------->>

In my early years in electronic security, as a technician and alarm company owner, I thought in terms of catching thieves rather than preventing crimes. My focus was clearly on technology for detection and not prevention, but over time I came to understand that I had it backwards. That lesson didn’t come soon enough though as I was in the business more than 16 years before I figured it out.

It was sometime in the early 1990s that this revelation took place, while I was an associate editor with Security Distributing & Marketing Magazine (SDM) in Chicago. I was doing research for a story on burglar alarm systems when I discovered that UL actually requires overt placement of security devices, such as bell boxes, the use of foil tape on windows, and more. The idea is simple. We want would-be criminals to see that there’s an alarm in place so they go elsewhere. Of course there are other things we need to do as well as additional items that the end user must have in place to assure prevention. Some of them I have covered in previous blog posts and articles throughout the years.

Yard Signs and Window Decals
Perhaps one of the most-simple actions that we take as alarm professionals is to install yard signs and decals on key windows outside the business or home. End users, if your installing alarm company fails to do this, you need to give them a call because chances are, the technicians who were there installing your system likely ran low on them or they forgot. In either case, you need to make the front office aware of the issue so they can send someone out to make it right. The fact is, yard signs and decals, although not the only solution to crime, do act to slow, minimize, even stop criminal action.

Keypad Visibility in Commercial
Having a keypad in the front foyer of a story may seem risky, given the fact that there are usually a host of buttons/keys on

them that a child might use to send a silent panic alarm, set the fire alarm into motion, or issue a distress or call for medical help. This is absolutely so in cases where the installing alarm company failed to deprogram those critical keys out of the system, but for alarm professionals who give all this serious thought, it’s not a problem. In most cases there’s a second keypad at a separate employee entrance or in an office in a non-public location of the store.

Multiple Siren Speaker Boxes
First, it’s always wise to install trumpet speakers, especially in commercial applications. Second, it’s also wise to place them in a metal box when these speakers are placed outside the store or in visible locations within. Perhaps even more important is to include tamper switches inside these boxes such that if someone removes or pries them from the wall, or they open the cover, the alarm system sounds off, summoning the police in the process. The visibility of multiple speakers and speaker boxes inside and outside is usually enough to unnerve even the best and most experienced of burglars.

In conclusion, there are things that can be done to enhance and equip alarm systems to suppress crime in a natural manner so the crimes we normally detect won't happen in the first place. Although the few items mentioned above are important elements in the crime prevention equation, there are many others that can be used to further deterrence.

Be sure to check back for part 2, and if you have a question, feel free to use my Comments and Questions form in the left column.

TpromoCom special offer

For the serious researcher:
ToganX.Info

Copyright©2015/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Sunday, June 29, 2014

Report Outlines Extent to Which NSA is Spying on Society

<<---------- Scroll down for news. ---------->>

Spying has never been a pretty business. Those who do it for a living eventually accept it as a necessary evil. I suppose we should also--that is if we're really concerned about terrorism on this nation's soil.

With all of that said, however, it's obvious that there must be constraints in place that seek to prevent those who actively monitor society from misusing and abusing this technological power; and might I add that this tremendous power resides with the smallest of the small among those who work in the intelligence business.

Recently a report was released by the National Security Agency (NSA) that outlines its own spying activities.

The U.S. government on Friday for the first time released data on the scope of some of its most sensitive foreign intelligence-gathering efforts, saying that it had targeted nearly 90,000 foreign persons or organizations for surveillance through U.S. companies last year.

The release of the “transparency report,” issued by the Office of the Director of National Intelligence, follows an order a year ago from President Obama to declassify and make public as much information as possible about certain sensitive surveillance programs.

Warrantless Wirepapping

One of the issues that sticks out when reading the Washington Post story is that of "warrantless" surveillance on the part of not only NSA but other intelligence-gathering entities across the board.

It was in 1952 when NSA was established. As part of the military establishment, NSA's mission then, as it still is today, is to affect surveillance against foreign targets to assure the integrity, security, and safety of these United States of America.

Limitations on how this is accomplished have been imposed on NSA over the years since its inception. This includes:

  • The Omnibus Crime Control and Safe Streets Act, passed in 1968 by the Congress.
  • Executive Order 12036, effected by President Carter in 1978 that acts to prevent "electronic surveillance directed against a United States person abroad or designed to intercept a communication sent from, or intended for receipt within, the United States except as permitted by the procedures established pursuant to section 2-201".
  • The Foreign Intelligence Surveillance Act (FISA), also passed in 1978.
  • In 2001, the passage of the Communications Assistance for Law Enforcement Act (CALEA), which established clear standards for how telecommunications providers are to provide wiretapping information to government (The Implications of the Digital Telephony Act of 1994).
  • Also in 2001, John Yoo, former George W. Bush administration official, essentially gives the president authority to approve anti-terrorism tactics, including warrantless wiretapping.
  • A year later, in 2002, President Bush authorized NSA to conduct warrantless wiretaps on both foreign concerns and U.S. citizens in country through a secret executive order.
  • About a year later President Bush disclosed the existence of his secret wiretapping program to the Congress and later in the year the New York Times publishes a story that informed the public of its existence.
  • Etc...

In Conclusion

One of the reasons why all of this wiretapping is necessary is the openness of this nation. We let any Tom, Dick, or Mary enter through air travel and for the past two decades we're trying to affect "reasonable immigration laws" that essentially seek to negate common sense by allowing, again, every Tom, Dick, and Mary to cross the U.S./Mexican border w/o any meaningful rules and regulations.

Until this nation get serious about buttoning up our border and limiting air travel entry to only those who really need it, I won't believe for one moment that any of this makes sense. How can you seriously tell the general public with a straight face that all that can be done is being done by way of anti-terrorist tactics when you allow the Southern border to remain open?

The bottom line here is this: the Federal Gov't must enforce its own border laws before it can be taken seriously.


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Saturday, August 23, 2014

Hacking cannot be stopped. You want to know why?

<<---------- Scroll down for news. ---------->>

For many years now, I and many others in the security market as well as law enforcement have been sharing our thoughts on the issue of government placing critical infrastructure on the Internet.

Recently, on our GKO Technology Group on Facebook I featured 15 related posts for group members to ponder. I'll follow up with a few words of wisdom of my own.

Here the titles and links to these stories:

Hackers, Bots, Bluehost, and Me (Read it Now!)
US Companies Can't Protect Citizens? Chinese Hackers Steal 4.5 Million Patients Info... (Read it Now!)
Thousands of Havering residents targeted bhy Internet hackers (Read it Now!)
Marathon-style hacker competition draws 600 teams worldwide (Read it Now!)
2 Phone Hackers Out of Jail Already (Read it Now!)
Hackers hit the garden with new award-winning app that tells you what grows best in your backyard (Read it Now!)
Hackers could use smartphone gyroscopes to eavesdrop on private conversations (Read it Now!)
Hackers' bazaar raises threats to security (Read it Now!)
Protecting their (and your) data -- keeping hackers at bay (Read it Now!)
Chinese hackers targeted MH 370 investigation and appear to have stolen classified documents (Read it Now!)
Pro-Palestinian Hackers Deface Delaware State Treasury Site (Read it Now!)
Hackers Successfully Attacked U.S. Nuclear Agency Three Times in Three Years (Read it Now!)
Hospital hack 'exploited Heartbleed' (Read it Now!)

For those of you who many not know this, but there was a day before the Internet where gov't and private firms used leased telephone lines to send data back and forth between offices and the like. You had to gain access to the physical phone line or the Bell company office before you could gain access to that data.

So now, here we have a GLOBALLY CONNECTED database that ANYONE from ANYWHERE across the Earth can try their luck at penetration. ANYONE FROM ANYWHERE!!!

"At the end of 2010, the volume of stored data worldwide totaled 1.2 million petabytes (1 petabyte equals 1 million gigabytes), according to the 2010 IDC Digital Universe Study, conducted by technology researcher IDC. That's a 50 percent rise from the year before" (Source: Storage Cheat Sheet, CDW Small Business Solutions, August 2014).

Do you not get it yet? The stories above are about hackers and their efforts, successes, and the failure of governments and private sector concerns to successfully stop them. As I said yesterday, no matter how good you think you are, there's always someone better out there and they're going to kick your butt!!! If not today, perhaps tomorrow.

Putting critical infrastructure on the Internet is not only dumb, but it's plain stupid. It's like putting a sign on your back that says, "I dare you to kick me." Someone's going to do it. You can count on it!


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Monday, October 19, 2015

Why Alarm Systems and Crime Prevention Go Hand in Hand

<<---------- Scroll down for news. ---------->>

Preventing crime is what security is all about. It does little good to install an alarm system if your intent is merely to catch criminals already in the act of aggression.

The primary purpose of a video surveillance or electronic security alarm isn't any different than that of a quality deadbolt lock on all the doors--it's all about stopping a criminal before he/she commits the crime.

According to the Crime Prevention Website, "During research interviews by criminologists and post arrest interviews by me and many of my colleagues over the years most burglars (who expressed a preference) said that they were definitely put off by alarms!" (click here)

Right from the beginning, UL (Underwriters Laboratory) burglar alarm standards called for overt bell boxes, foil tape on windows, and other visible devices. This overt policy has not changed even though the tools of the trade have.

Even more importantly, the mere placement of yard signs and other visible means of protection without the actual functioning alarm system to go with it is not necessarily a wise idea either. When a crook decides to take the risk, he will enter the home or business without hesitation, in which case a working and monitored alarm system is invaluable.

If you're a home or business owner and you need advice on the type of alarm system to use, I recommend that you first talk with friends and colleagues who have an alarm system. Find out how they feel about the alarm company that did the initial installation. Did they do a good job of installing the components? Are they doing an equally good job of monitoring the system? Do they respond in a timely manner when there are problems?

Contact at least three alarm firms and have them come to your home or business for an on-sight evaluation. Don't accept a quote over the phone, and if one of them is unwilling to come to your home/business to visually evaluate the situation, say thank you and do not go any further with them--there is no one-size-fits-all alarm system.

Once you have three quotes under your belt, sit down and evaluate them.

Remember, bigger is not better. Look for longevity, quality, and long-term costs. Just because an alarm system is "free" when you get it is no indicator that you'll pay a respectable price in the long term. Weigh the entire package of each firm to assure that it's the right company, right system, and right dollars in the short as well as long term.

If you have questions, send them to me at allan@tpromo.com.


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Monday, October 1, 2018

Revealing the Hidden Things or Coming Out of the Closet

Even Plato knew the difference between
the "gods" and the "God" of all. 

image of a penny with 'In God We Trust'For a very long time I've played the game of life, working hard and doing all I could to be of help to those whom I love as well as to my friends, family, and even my fellow man in general.

I've been known to talk about UFOs (Unidentified Flying Objects), alien abductions, the difference between that and a Contactee, and much more. Why am I willing to speak of this now? Because I'm officially retired, and although I continue to write for publications as well as perform services of various kinds for others--mostly in the electronic security and life safety markets, I'm no longer afraid to share these things with others.

Most of the time those whom I've discussed these matters with have written if off to insanity, and yet many of them have taken the time to read my technical work in the security field as well as political. My life long friends,  however, know what it's all about and they understand that insanity alone does not explain all the things I have spoken of. 

Today, I'd like to share with you what I have learned about Aum, also known as OM. The fact is, OM is a powerful force that permeates all of creation. I personally have called on OM many times, especially when I was building Alarm & Communications Company, my first alarm company in the 70s and 80s.

I honestly have been aware of OM all of my life, but in 1971, after a near brush with death (a NDE I might add), I was shown and trained as to where to look and how to to call upon its  power. In my next blog post I will share with you where to find OM and  how to "call" upon it's power.

In the meantime, please sit  for a spell and watch the following documentary on the gods. We'll talk about this movie somewhere ahead on this blog. --Al Colombo



For the serious researcher:
ToganX.Info

Copyright©2018/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!
Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Tuesday, October 9, 2012

The Chinese Intelligence Apparatus in the United States

This past Sunday many of us on Google+ discussed the issue of Chinese purchase of a wind farm near a U.S. Military base. The story, entitled Not just tilting at windmills (The Economist), provided interesting information on how the Obama administration stopped the purchase of a wind farm in Oregon.

There were those who couldn't believe that the U.S. Government would interfere with business, not to mention the act of insulting a trade partner as important as China. However, as I pointed out at the time, it's folly to even think of allowing any Chinese State-owned company to set up camp near a military base.

I stated, "Here's the primary reason why you do not want China anywhere near a military base: SIGINT. Call it paranoia if you wish, but it's NATIONAL SECURITY and I would expect nothing less from the Chinese Gov't if the roles were switched."

As a webmaster myself, I can attest to the fact that most of the hacking and spamming attempts that I see on my servers come from the Chinese and Russian Federations. There is literally no limit to which they will go to glean critical information from both military and private/public government contractors.

Here we are again, Chinese made telecommunication equipment is now suspect of providing spy potential for the Chinese Government within the U.S. and other countries.

"To the extent these companies are influenced by the state, or provide Chinese intelligence services access to telecommunication networks, the opportunity exists for further economic and foreign espionage by a foreign nation-state already known to be a major perpetrator of cyber espionage," the Committee wrote in a 52-page report.

Specifically, the committee outlined the threat of "malicious" computer technology being used to access U.S. trade secrets, research and development data and negotiating platforms "China would find useful in obtaining an unfair diplomatic or commercial advantage over the United States."

Source: House Report Flags Chinese Telecom Firms on Espionage Fears (PBS Newshour)

The moral of the lesson that our citizens should take away from this is simple: We cannot trust the Chinese. I'm not sure how many of our allies that we can truly trust, especially when the current administration fails to firmly stand behind Israel and other traditional allies.

In a word, we need to put National Security first, business second, while attending to business first to assure a strong national defense.

Monday, March 25, 2019

Some Insights Into Who I Am, Really

Do any of us truly know who we are? I think not.
But here's some additional info on who Al Colombo is.

image of a penny with 'In God We Trust' My name is Al Colombo and I'm officially a trade journalist and copywriter in the physical security and life safety markets. This WebLog, however, has very little to do with security.

What it has more to do with is a hidden life led right under the noses of many professional colleagues, some of which may have suspected that there was something different about me but could never quite put a finger on it.

I did, however, reveal myself to a select few along the way. Those individuals definitely knew there was something different. Many of them were converted into believers while others probably shook their heads and never looked back. Either way, I'm good, as I've come to realize that this stuff is not for everyone. Some of us simply prefer to live our lives oblivious to the details. Not I! I need to know as it's in my nature.

Because you'll learn enough about me by way of my writings on this blog, I'll proceed by telling you about my public life. I own a digital promotional company based in Ohio called Thunder Promotions (TpromoCom). I've owned and operated it in parallel with my writing career since 1995. One of my passions is website design, and it will continue to be into the future.

As a writer, I began writing technical copy for technical magazines in 1986 and I've been writing in print and online publications ever since. I officially retired in 2015, and now I work full time on my own business.

To read the rest of the story, I've included the above plus some additional personal information. For those of you who have known me for years, this additional information will actually fill in a few gaps where it comes to specific incidents in my life where I seemed to have foreknowledge.

For others whom I have counseled as a close friend (as you have I), it will explain the reason why you often tell others things like, "he's always been ahead of the curve," or "he's been right 90 percent of the time," where it came to my insights regarding the path you should take. I'll leave it at that, but part 3 of the OBE story is yet to come. I will write when the time is right.

--Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2019/Allan B. Colombo
www.alcolombo.us / blogger@tpromo.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!
Where and how to follow Al Colombo via TpromoCom:


To contact Al Colombo, click here.

Sunday, April 12, 2020

Prescription Drugs and the China Connection

National Security is intrinsically connected to self
reliance and an independent supply chain.
image of a penny with 'In God We Trust' The need for independence and self reliance was recently demonstrated with the public disclosure by President Trump that 90 percent of the ingredients contained in our drugs taken by U.S. citizens come from China. Suddenly I heard both Democrats and Republicans asking the question, "How could we allow this to happen?"
First, for those who did not listen to what our President said (and this likely includes most of my Liberal Comrades), here's a quote from May 8th, 2018, that should chase away any doubts:
China has exclusive manufacturing agreements for drugs for anesthesia, cancer and HIV/AIDS, along with other medicines that "we use every day, not only in hospitals but in our own medicine chests," Gibson says, adding that China is now the world's only source of antibiotics, including the main ingredient in vancomycin, a treatment of last resort that is used by patients who are suffering from infections that are resistant to other treatment.

"It's a huge dramatic shift and nobody knows about it," Gibson says. "And they're just ramping up. It's all part of a plan that China laid out in its 2025 initiative to become the pharmacy to the world."


China’s Lock on Drugs, US News
To make matters worse, recently China threatened to withhold these vital drugs from the U.S., I presume in retaliation of our President's intent for China to be held accountable for the current situation.

The question is, how did we come to this point? Well, that path was paved by way of a bill entitled "U.S.-China Fair Trade Agreement," passed and signed into law about 20 years ago. At the time, it set up a situation where our drug companies were persuaded to close their U.S. manufacturing facilities and set up shop in China.

Although it was a good deal for the drug companies because it lowered the cost of production, it turned out to be DOA (Dead on Arrival) for American citizens.

Shifting production to China has made millions for the companies and their shareholders but hasn't trickled down to U.S. consumers, who are still paying more than consumers anywhere else in the world for their drugs. "The drug companies don't care about the United States," Slane says. "They only care about profits."
China has had an unfair advantage over our own manufacturers. Now that the land-of-the-dragon has shown its true colors, everyone is pointing fingers at one another. In my next blog post, I'll provide some history to the situation, which may enable us to see the players in our Congress who were remiss in their "national security" duties.


I'd love to hear from you. Please tell me your thoughts about China and the fact that they've been given a free pass for more than 20 years. Please use the contact us form, go to my Contact page, or use the comment box below. Thanks! --Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2019/Allan B. Colombo
www.alcolombo.us / blogger@tpromo.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!
Where and how to follow Al Colombo via TpromoCom:


To contact Al Colombo, click here.

Monday, February 9, 2015

Smart TV or Spy TV (Dumb TV)

<<---------- Scroll down for news. ---------->>

If George Orwell hadn't died in 1950, he'd be pretty proud of television manufacturers for inventing sets that contain cameras, speakers, and now, speech recognition with the capability of converting audio speech into digital data. I'm speaking of Samsung's smart TV that has the ability to listen in and send everything you say down the wire to others via the Internet.

As far fetched as it may sound, this is only be beginning. Read it for yourself!

The potential privacy intrusion of voice-activated services is massive. Samsung, which makes a series of Internet connected TVs, has a supplementary privacy policy covering its Smart TVs which includes the following section on voice recognition (emphasis mine):

You can control your SmartTV, and use many of its features, with voice commands. If you enable Voice Recognition, you can interact with your Smart TV using your voice. To provide you the Voice Recognition feature, some voice commands may be transmitted (along with information about your device, including device identifiers) to a third-party service that converts speech to text or to the extent necessary to provide the Voice Recognition features to you. In addition, Samsung may collect and your device may capture voice commands and associated texts so that we can provide you with Voice Recognition features and evaluate and improve the features. Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition. (read it!)

Here's another headline, oddly enough from CNN: The camera in your TV is watching you.

I first became aware of this issue when reading a news item some years ago that told of China holding some kind of hack class among young teenagers where they were given an education on hacking. One of the projects was to hack the camera in an Internet-connected television.

Today's high-end televisions are almost all equipped with "smart" PC-like features, including Internet connectivity, apps, microphones and cameras. But a recently discovered security hole in some Samsung Smart TVs shows that many of those bells and whistles aren't ready for prime time.

The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs' built-in cameras without leaving any trace of it on the screen. While you're watching TV, a hacker anywhere around the world could have been watching you. Hackers also could have easily rerouted an unsuspecting user to a malicious website to steal bank account information. (read it!)

Another story, published as far back as December, 2012, speaks of the same kind of vulnerability:

Smart TVs, particularly Samsung’s (005930) last few generations of flat screens, can be hacked to give attackers remote access according to a security startup called ReVuln. The company says it discovered a “zero-day exploit” that hackers could potentially use to perform malicious activities that range from stealing accounts linked through apps to using built-in webcams and microphones to spy on unsuspecting couch potatoes. Don’t panic just yet, though. In order for the exploit to be activated, a hacker needs to plug a USB drive loaded with malicious software into the actual TV to bypass the Linux-based OS/firmware on Samsung’s Smart TVs. But, if a hacker were to pull that off, every piece of data stored on a Smart TV could theoretically be retrieved.

As if the possibility of someone stealing your information and spying on you isn’t scary enough, according to ComputerWorld, “it is also possible to copy the configuration of a TV’s remote control, which would allow a hacker to copy the remote control’s settings, and remotely change the channel.” (read it)

Not sure I want a smart TV because it sounds pretty dumb to me.

Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Saturday, March 22, 2014

US to Pull Out of ICANN

Recent news reports concerning ICANN has
caused concerns among Internet-free activists.

According to Wall Street Journal technology reporter Gauthem Nagesh, the Obama administration’s move to divorce the United States from ICAN oversight is, in part, related to the damning revelations resulting from the Edward Snowden NSA disclosures.

“The U.S. position and that of its allies is that the Internet should be free and open and the government shouldn't interfere with it. That position has been undermined by the wrath of disclosures regarding surveillance from former NSA contractor Edward Snowden. And China and Russia, who have always pushed for a more hands-on, top-down approach to the Internet that some people would label as censorship. Well, that approach has gained traction because while the U.S. has been loudly decrying this, they've also been doing a lot of stuff that people don't feel corresponds with the idea of Internet freedom,” says Nagesh (http://n.pr/1gJ3Y4N).

In an editorial penned 28 DEC 2003 (http://bit.ly/1mmEoe0), I voiced concern at that time regarding the issue of Internet freedom. The recent move by the Obama administration to divorce the US from their current oversight role should give us all concern, especially now.

Why is it so important for the Internet to remain truly free? Because there are governments, organizations, and Elitists who want to regulate it in a variety of ways for a variety of purposes, none of which are good. Although at some point in our nation’s history I would argue that the withdrawal of our government oversight is bad for a free and independent Internet, I’m not so sure that this applies today. This is because there are those in our own government who would have more regulation and government control.

Some of the ways that more control can harm us includes:

  • Censorship of the press
  • Intelligence gathering programs on individuals and organizations
  • Elimination of domain name use by individuals and organizations who dare to speak out against certain individuals in government and elsewhere in society
  • Harassment by government hacks
  • and others

One of the fears that this writer has, with regards to the withdrawal of U.S. oversight, is that socialistic and communistic nations, such as Russia and China, will eventually wrangle control of ICANN. There are many news accounts over the past few years regarding China’s effort to censor what the Chinese people read on the Internet.

One of the foremost examples involves Google Search. “Every big American Internet company is angling for the same thing, more or less: global domination. But the one country where they have the most potential for growth also has some of the most entrenched competition and thorniest human rights issues. The battle for China’s 618 million Internet users is fraught with moral and logistical problems that have sent Twitter, Facebook and Google all packing in recent years. Now LinkedIn is making an aggressive play to enter the People’s Republic, but questions remain about just what kind of sacrifices the company will have to make to please the country’s government,” says Victor Luckerson (@VLuck, http://ti.me/Q0NVdy).

There is no crystal ball that will allow us to peer into the future-a future without the U.S. in a watchdog position in ICANN. But if the United Nations can be held up as an example of what can and will happen once this divorce is final, then we already know the answer to our concerns. -30-

About the Author:
Allan B. Colombo is a trade journalist and technical writer in the life-safety and physical security markets. His work in this venue over the past 28 years is well known across the globe. Colombo also is the publisher and administrator of www.GiantKilles.Org from 1995 through 2005. For more information, go to www.AlColombo.net. To contact him, call 330-956-9003 or email him at abc@alcolombo.us.



For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Monday, June 2, 2014

Maybe Having a Smart Home Isn't all That Smart

<<---------- Scroll down for news. ---------->>

"Network World - A year ago, people were mostly talking about the potential of the Internet of Things (IoT) — what companies and government entities might do in the future to take advantage of this widespread network of connected objects" (The Internet of Things gets real, Network World, http://bit.ly/1n6ntuC).

The fact is, people were talking about the Internet of Things (IoT) long before a year ago. In the mid- to late-1990s, for example, I was writing about this form of connectivity between machine and service provider/owner in the magazine I worked for as an associate editor (Security Distributing & Marketing).

Internet-Connected Appliances

One of the applications to which IoT lends itself well is that of maintenance updates to a variety of companies with regards to the equipment they sell. Examples include the following:
  • Refrigerators
  • Heating Plants
  • Air Conditioning Units
  • Washing Machines
  • Cloths Dryers
  • Conventional and Microwave Ovens
  • Chillers
  • Electrical Systems
  • Smart Electric Meters
..to name only a few.

A good example of what could take place when your conventional oven develops a problem is that an update of the situation is sent to either the manufacturer or the maintenance company of record over one of the in-house broadband connections. The update would provide important ID information that enables the company to generate a call ticket. You would then be notified of the problem and given an opportunity to have a repairman come to your home or business to fix it.

Back in the 90's, there was talk of including some type of infrared scanning system that would be capable of inventorying all of the foods you keep in your refrigerator. When you are running low, a notice would be sent to you in email, providing you with a shopping list of needs for your use. Or, at the same time, this list could be periodically generated and sent to the grocery store of choice for delivery to the home.

The Danger of Connected Appliances

In the 90's, when we thought of Internet-connected appliances, we thought in terms of Category 5E or Category 5e cabling. Today, all of these devices will connect to the Internet through the WiFi system in our homes and businesses.

Well, other than being irradiated by more radio waves banging around the house, we will come to the stage where your refrigerator can be hacked. We know our computers can be hacked. Recent news stories have revealed that chain stores, banks and the government can be hacked. Cellphones can be hacked, which by the way we pointed out to our readers several years ago. So now we approach the time when your Internet-connected house can be hacked. It seems silly, of course, but the reality is, if your freezer or furnace can be reached through the Internet, it may be that the device you use to control them can be hacked. Which means, as we extend this thought into total paranoia, your passwords could be as vulnerable to a meltdown as your freezer. Will hackers soon be eyeing your fridge?

As most of you know, one of the ploys used by hackers is to get you to respond to an email by clicking on a link or simply replying to an offer. The ensuing information, especially where you reply, carries valuable information that tells the hackers exactly where you are in terms of the World Wide Web. It provides the exact IP address so they can work to enter your home via the network.

Although service providers are not apt to give out your IP to those they do not know, as well to those who have no business having it, this kind of information can fall into the wrong hands by a variety of ways. Any one of these signals can draw the attention of hackers, and even though you may not think this could be destructive, think again.

Hacking Your Appliances

With all the data flowing in and out of your home between the various appliances and those responsible for their on-line care, it's even more likely that hackers can find their way to your home. Once they enter the network through your heat pump, it's possible to penetrate other devices on your network, including your computer.

For example, a hacker who gains access to your furnace could reprogram it. They might change the set points--which is the temperature it comes on and goes off. They might even alter the safety controls that safeguard your home from fire.

Hackers could also enter your refrigerator, perhaps turning it off, adjusting the temperature so it freezes all the food, or they might cause some other combination of undesirable events to take place. At the very least, they would have a complete list of everything you have in it.

Would you allow a stranger off the street to open your front door, walk in, and open your refrigerator door? I didn't think so.


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Monday, February 23, 2015

Convergence: The Inevitability Factor

<<---------- Scroll down for news. ---------->>

One of my favorite things to do for fun as well as work is watch TED Talks. Although I am a YouTube junkie, I have to say that TED has had some of the most stimulating, enjoyable "talks" on a variety of extremely interesting topics that I have ever had the pleasure of experiencing.

This morning, about 3 a.m., I couldn't sleep as the cold and sore throat my wife had has finally made its way to my side of the bed. So I got up for a drink of water and a few minutes of computer time, which will end up to be hours as I'm working on a writing project for a well known national security company.

While in my office, I pulled up TED and watched an extremely interesting video presentation by Pranav Mistry (India) called The thrilling potential of SixthSense technology. I have not figured out how to stream video from TED, as I commonly do in conjunction with other video platforms, so you'll have to go to the TED website to watch it, but please allow me to have a few minutes of your time in which to share with you a little bit about this video, the man behind it, and his invention.

Pranav Mistry is an inventor, but even more, he's a visionary in every sense of the word. I would put him in the category of the late Steve Jobs who founded and propelled Apple into stardom. He was 28 at the time of his TED Talk, which was in 2009.

Mistry, who was practicing his wizardry at MIT at the time he made this video, invented a computer-based system that is mobile, will interact with the gestures and objects in the environment, as well as project and connect intent between digital and the real world. Mistry calls his invention SixthSense, "a wearable gestural interface."

According to Mistry, his intent was to bring the physical and digital worlds together in as intimate a manner as possible. Because people wear his invention, they can take it with them anywhere they want. I'd call this mobile computing at its best. But even more so, his invention solves several problems at the same time, which seems both efficient and sensible on its face.

First, it allows us to combine our laptop, camera, modem, cell phone, and any number of other items into a single, cohesive system. In a word, it lightens our load which can be extremely helpful to some. Secondly, it keeps us in contact with our email, cell phone, text messages, as well as our computer files and all the functionality inherent in a PC.

The Inevitability Factor
As a futurist myself, I see patterns in society and our technologies. Not only do I see patterns, but I see trends and I see something I like to call inevitability. Here's the inevitability where it relates to human-kind and our digital infatuation with technology:

One day in the future human kind has a rendezvous with these technologies as the various computerized gadgets we now commonly use migrate into the human body.

Where some might call this a marriage in heaven, others would call this convergence the work of the devil. I'm certain the truth lies somewhere between the two extremes. But for just a moment, let's project outward--let's use our ability to visualize a world where our cell phone, lap top, and a million and one other things have converged with human-kind. Are there patterns, trends, and an inevitability factor beyond this point?

To me, the answer to this question is a resounding yes.

For this moment, please take the time to watch Mistry's work via TED. Think about a world where convergence finally takes place and the inevitability of that marriage and what the implication on society might be.

Weigh everything you know about human-kind, about politicians, about rich men of great power, and think about the governments they pay big bucks to control... and we'll revisit this subject on my next weblog posting. I'll give you my thoughts on the matter, but in the mean time, please give me yours.

Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Saturday, December 12, 2020

It seems that a significant number of United States lawmakers have been working for China since 1970!

For years my friends probably thought I was nuts because of my writings on the New World Order. Now they're coming to me for more information. Now, that's nuts! 

Prologue
There's a ton of reasons for all of us to be depressed and despondent concerning a whole lot of things at this time. Not only are we fighting with those among us who have embraced this fake pandemic--masks and lockdowns alike, but we're also fighting local and State government in order to preserve "freedom" as defined and guaranteed by our Founders who, themselves, conceived, composed, and institutionalized our Constitution. 

Despite all our efforts, it appears that our tyrannical governors and state health officials have made up their minds to see the imaginary pandemic through to the bitter end, whatever that end may be. We're also embroiled in a fight at the national level with respect to voter fraud of every imaginable kind and at every imaginable level. There can be no doubt that the bad men and women who followed orders, who defrauded the American people by committing a variety of frauds during this past election, do not value truth and justice.

And finally, we now find that the Chinese Communist Party (CCP) has had any number of top United States officials in their hip pocket. We recently found this out from a professor in China who gave a talk on Chinese television concerning Donald Trump, the CCP, and our top lawmakers since 1970 to present times. To access this video, click on the image below: 

Tucker tells about China's control of the USA through traitors among us.
Click on the image to see this video.

The Past
About three years ago a good friend from abroad, the head of a global security organization no less, approached me in Skype concerning China's global agenda. At the time he was visiting in South Africa having just come from Israel. He told me that there were Chinese policing communities having assumed control of local government. He shared with me that they had taken over the diamond and gold mines, that they were bringing Chinese prisoners to work in them. For many of these poor nations, China was breathing some degree of economic life into them, while taking more in the way of natural resources than they were giving in return. 

I have many Chinese friends whom I like and cherish very much, as I do Indian (India) and many others. I hadn't honestly thought about the CCP in terms of world domination, although  President Barry Obama had told us, as a nation, that China was poised to become the world's new superpower. And quite  suddenly, I find that Joe Biden is in  a partnership with a key  player in this Communist party. 


Honestly, I hadn't really given China much thought throughout the years. My early indoctrination in Communism had been by way of the former U.S.S.R., not China (perhaps this should be on the About page). My dad helped me build my first shortwave radio in 1958 when I was 8 years old. I listened to Radio Moscow, Radio Havana Cuba, and many other Communist shortwave propaganda stations for many, many years. When  I was 14, I began sending letters to Moscow. (Not to fear, I switched sides in 1992, at the age of 42).

I knew of the New World Order (NWO) since high school  when once in awhile you'd hear one thing or another. I never took any of it serious because if any of it were really true, wouldn't our own government do something about it? I never in a million Sundays ever thought so many people in our government were actually working for the CCP (see the video below).

Today
When Donald Trump ran for President back in 2011, 2012, he talked about draining the swamp. Most of us in this nation did not  understand the true meaning of his comment. Many thought he was merely making a comment regarding simple, common corruption in gov't, but not so. Donald was referring to the New World Order--an organized global cabal whose aim is to centralize the finances and governmenetal functions of all nations into a single, centralized entity called the United Nations. 

The following video deals with just that. I suggest  you watch it all in order to get an idea just how deep that swamp is. --Al Colombo



Direct link to this page: https://bit.ly/3millmh






For the serious researcher:
ToganX.Info

Copyright©2020/Allan B. Colombo
www.alcolombo.us / blogger@tpromo.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!
Where and how to follow Al Colombo via TpromoCom:


To contact Al Colombo, click here.