Just thought I would update the cosponsors list for HR 450.
H.R. 450: Enumerated Powers Act
What I see as the Truth in my Daily Life.
‘Each Act of Congress shall contain a concise and definite statement of the constitutional authority relied upon for the enactment of each portion of that Act. The failure to comply with this section shall give rise to a point of order in either House of Congress. The availability of this point of order does not affect any other available relief.’
On the other side of the aisle, Democrats — including some reluctant Michigan lawmakers — universally praised the Obama plan and heralded the GOP split as a sign that the auto deal was working, at least politically.Politically? I thought that they were just trying to save the economy, not somehow win political brownie points, isn't that what they tell us?
"The math is compelling: if we do not make reductions approximating 25 percent of the military budget starting fairly soon, it will be impossible to continue to fund an adequate level of domestic activity even with a repeal of Bush's tax cuts for the very wealthy. I am working with a variety of thoughtful analysts to show how we can make very substantial cuts in the military budget without in any way diminishing the security we need...[American] well-being is far more endangered by a proposal for substantial reductions in Medicare, Social Security or other important domestic areas than it would be by canceling weapons systems that have no justification from any threat we are likely to face."http://www.thenation.com/doc/20090302/frank
Concerned: This has went out to all III here. I'm not posting it on ***********.
Me:This is from a blog in Aug 2007Quote:I've put alot of thought into the possible need for the use of force towards the government after all legal and constitutional avenues of redress have failed. Not every person would stand up at once to throw down the government, at least not at first. At first it would be individuals and small groups sabotaging operations and assassinating government officials. Some would be caught and others would not, but the government would start to crack down on everyone. The more arrests in the middle of the night, kangaroo courts, and people shot "Escaping" and the more people will be willing to act. With the internet and modern communications there is nothing to stop people from sharing intelligence and coordinating actions.
The hardware and software sides of the issue are easy, Firearms are plentiful, explosives are easy to make, and unbreakable encryption is easy. The hard part is personnel , as the ATF and FBI have shown. Every potential recruit is also a potential informer, the Resistance would not be one large force, but hundreds and thousands of unconnected cells formed of close friends and family members hiding among the population. Perhaps larger units could be formed but only when every single person knows that everyone else is trustworthy.
Concerned:Quote:I am concerned about this.Every potential recruit is also a potential informer, the Resistance would not be one large force, but hundreds and thousands of unconnected cells formed of close friends and family members hiding among the population. Perhaps larger units could be formed but only when every single person knows that everyone else is trustworthy.
Concerned: I know 12 here that I trust. They may know more. And you?
Me:I know 12 here that I trust. They may know more. And you?
4 maybe 5, but I am a paranoid.
I also tend to put more trust in people who have seen the elephant.Concerned wrote:Quote:I am concerned about this.Every potential recruit is also a potential informer, the Resistance would not be one large force, but hundreds and thousands of unconnected cells formed of close friends and family members hiding among the population. Perhaps larger units could be formed but only when every single person knows that everyone else is trustworthy.
There is nothing wrong with sharing information with others, as long as it is not of a tactical nature. Be careful of what you say and who you say it to and you should be okay, keep everything compartmentalized with no one person knowing more than a couple other people, and those not the same people. Keep information away from people you don't trust, and if you do trust them look closely just in case.
Don't allow criminals access to any organization at all. People breaking the law draw attention and are usually more than willing to turn states evidence. Don't be stupid and break laws from inattention, how many criminals have been caught not for the big things they did but for speeding?
So what is the modern equivalent of crates full of tea?
If it's a legal "get a permit from the city hall" protest, it really wont draw any attention unless you are the KKK or the like.
If it's an illegal"let's go vandalize the governments tea by throwing it into the bay" protest, then the media may cover it but only insofar as pointing out how 'criminal' your actions were.
There's the catch 22, if you follow the rules then no one will make a stink of it, if you don't follow the rules then you get marginalized as a criminal.
Society is starting be like a glass of water thats been microwaved, it seems on the outside to seem safe and ok, but the second something disturbs it, it will explode burning whomever disturbed it.
let's see what we can eliminate...
1. chances are it's not a simple ceasar shift. the freqs don't work out.
2. chances are the PT alphabet is spread across the whole range of 00-99, and not rotated (i.e. 00-25, then 26-51, etc). still could be simple substitution cipher.
3. it's not viginere, as it requires a key and he said there was none.
4. it's not playfair or any other polygraphic, as he said 2 digits = 1 PT character
I recently posed a riddle to some forum people on one of the forums I frequent.
I made it easy and didn't use any Encryption Keys or initialization vectors.
The basic idea is as follows
Draw a square 11 boxes to a side, now block out the top left square, it won't be used.
Next fill in the top row and left column with the numbers 1-0
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 0 | |
1 | ||||||||||
2 | ||||||||||
3 | ||||||||||
4 | ||||||||||
5 | ||||||||||
6 | ||||||||||
7 | ||||||||||
8 | ||||||||||
9 | ||||||||||
0 |
Next you would fill in the blocks using your encryption key, the key can be as long as you want it, the only real rules are to not repeat any letter more than 4 times and I and J are for our purposes the same letter, I didn't use an Encryption key to make it easier to decode, but I'll use "Verum Est a Tellum" here in this example.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 0 | |
1 | V | E | R | U | M | E | S | T | A | T |
2 | E | L | L | U | M | |||||
3 | ||||||||||
4 | ||||||||||
5 | ||||||||||
6 | ||||||||||
7 | ||||||||||
8 | ||||||||||
9 | ||||||||||
0 |
So now that we have our Key in place we fill in the rest of the blanks using the alphabet remembering to make sure that each letter only shows up 4 times in the table.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 0 | |
1 | V | E | R | U | M | E | S | T | A | T |
2 | E | L | L | U | M | B | C | D | F | G |
3 | H | I/J | K | N | O | P | Q | W | X | Y |
4 | Z | A | B | C | D | F | G | H | I/J | K |
5 | N | O | P | Q | R | S | V | W | X | Y |
6 | Z | A | B | C | D | F | G | H | I/J | K |
7 | L | M | N | O | P | Q | R | S | T | U |
8 | V | W | X | Y | Z | A | B | C | D | E |
9 | F | G | H | I/J | K | L | M | N | O | P |
0 | Q | R | S | T | U | V | W | X | Y | Z |
I know it looks a bit confusing but all I do is count how many of each letter I have and then skip that letter for that many repetions of the alphabet.
V=1 E=3 R=1U=2 M=2 S=1 T=2 L=2
So the first repetion I skip all the letters of the key, the second only the letters with 2 or more, the third only those with 3 or more, and forth would be any letters that are repeated 4 times.
Next we take our plain text and convert it to the cipher.
For this example we will use "Cyphers are fun" as our plain text.
First letter is "C" so we find the letter "c" in the table and look to see which numeric characters coincide with "c"
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 0 | |
1 | V | E | R | U | M | E | S | T | A | T |
2 | E | L | L | U | M | B | C | D | F | G |
3 | H | I/J | K | N | O | P | Q | W | X | Y |
4 | Z | A | B | C | D | F | G | H | I/J | K |
5 | N | O | P | Q | R | S | V | W | X | Y |
6 | Z | A | B | C | D | F | G | H | I/J | K |
7 | L | M | N | O | P | Q | R | S | T | U |
8 | V | W | X | Y | Z | A | B | C | D | E |
9 | F | G | H | I/J | K | L | M | N | O | P |
0 | Q | R | S | T | U | V | W | X | Y | Z |
In this example the numbers 2 and 7 coincide with the first "c" and we always use the number from the left column before we use the number for the top row, so our first number pair is 27. Other letter "c" number pairs are 44, 64, and 88.
Our next letter is y; its number pairs are 30, 50, 84, and 09. We continue assigning one number pair to each plaintext character until the entire message is encrypted.
27 30 36 48 80 02 03 = Cyphers
19 55 80 = Are
91 05 34 =Fun.
Next to defeat people figuring word groups from length of words we remove the spaces and break the number pairs into even sized groups.
27303648 80020319 55809105 34
The advantage to using this key is that even if they decide to do a frequency check it will not give a correct frequency because each letter can be one of 4 different code groups, thats 100 different number pairs for 25 letters.