SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Clinton -- doomed & wagging, Japan collapses, Y2K bug, etc -- Ignore unavailable to you. Want to Upgrade?


To: Sidney Reilly who wrote (774)11/15/1998 8:58:00 AM
From: Emile Vidrine  Read Replies (2) | Respond to of 1151
 
The Church, modern pseudo-Judaism and Daniel...

These antichristian elements rejoice with wild exaltation at the cesspool they have created
in this once Christian nation. They, with their pagan compatriots, rejoice at the removal of
Jesus and the Word of God from our public schools. They rejoice at the removal of Christ
and the Gospels from our government. They rejoice at the perversion of Hollwood and
network TV. They rejoice at an American foreign policy that has become antichristian
and essentially Jewish in character. They rejoice that their antichrist star of David has
been exalted above the Cross of Christ in this once Christian nation.
Satan is fulfilling Daniel Ch. 7 and 8 beofore our eyes. Satan has used the antichrist little
horn of modern Judaism to subdued the three major horns of Christinadom in the last
hundred years. The antichrist are approaching the end of their reign. The fullness of their
iniquity is near.

Daniel 7 captures our modern historical scene and the little horn's(modern antichrist
Judaism's) conquest of the third horn in the Fourth Beast. Modern antichrist Judaism now
possesses the military and economic powers of the three major horns of the ten horned
Fourth Beast and are now using this power to organized the world against Christ and
Christianity:

1. Daniel prophecies about the antichrist little horn's captures of the worldly
economic and miliatry powers.

Dan. 7:8
8: I considered the horns, and, behold, there came up among them another little
horn, before whom there were three of the first horns plucked up by the roots: and,
behold, in this horn were eyes like the eyes of man, and a mouth speaking great
things.


2. The antichrist little horn tramples the earth using the military and economic
power of the three horns that were subdued, and then makes war with the saints
and prevails against them for a short time.

Dan. 7:21
21: I beheld, and the same horn made war with the saints, and prevailed against
them;
22: Until the Ancient of days came, and judgment was given to the saints of the most
High; and the time came that the saints possessed the kingdom.

3. The antichrist little horn shall speak great words against Jesus and shall wear
out the saints (Christians) of the most High. There is no system or religious
organization today who works more to defame Jesus and destroy the Gospel than
modern Judaism and the antichrist state of modern Zionist Israel.


Dan. 7:25
25: And he shall speak great words against the most High, and shall wear out the
saints of themost High, and think to change times and laws.
(The constant antichrist
campaign to remove Christ and Christian holidays and teachings from our schools
and nation): and they shall be given into his hand until a time and times and the
dividing of time. We have already entered this period and the persecuation are
just beginning.

4. Praise the Lord that these developments tell us that there will be great troubles
and tribulations ahead for Christians as the antichrist forces unleash world-hatred
against Christians but the troubles will last for a short season and then Christ will
destroy the antichrist forces according to Daniel.


Dan. 7:27
27: And the kingdom and dominion, and the greatness of the kingdom under the
whole heaven, shall be given to the people of the saints of the most High, whose
kingdom is an everlasting kingdom, and all dominions shall serve and obey him.
This is the return of Christ and rescue and exaltation of his Christian people
from the forces of the antichrist.


The Lord Jesus and his Church shall be victorious and reign eternally.
The days of the antichrist forces are numbered.

Emile



To: Sidney Reilly who wrote (774)11/15/1998 11:01:00 AM
From: SOROS  Respond to of 1151
 
USA Today - 11/13/98

The first radio signals from Sputnik 41 years ago helped redefine American national security, just as the so-called Year 2000
computer bug is underscoring the latest risks to a nation built on technology.

"The Year 2000 problem could be an event equivalent to the launching of Sputnik, (which) raised the awareness about the
vulnerabilities of the United States," says Marvin Langston, deputy chief information officer for the Department of Defense.

The Year 2000 problem, or Y2K as it is commonly known, has riveted attention on what may happen when computers fail to
recognize the year 2000, disrupting internal clocks and causing system shutdowns and crashes.

Governments and corporations here and abroad are allowing unprecedented access to computers as programmers look to fix the
Year 2000 bug. That's raising concerns about potential security compromises, industrial espionage, even sabotage. And as in the
days following Sputnik, analysts see a need for more domestic talent to keep U.S. technology on the cutting edge.

A serious re-evaluation of security issues has been under way since last year, when a presidential panel warned that the nation's
economy and vital services were vulnerable to hacker-style attacks.

"In the millennium bug, we have developed a technology equivalent to natural forces. If it is anywhere, it is everywhere," says G.K.
Jayaram, chairman of Transformation Systems of Princeton, N.J. "Nowhere at any time in human history has there existed such a
problem."

Opening 'trap doors'

One of Jayaram's clients is Provident Bank of Cincinnati, which boasts that it is "among the nation's 100 largest banks, with 72
financial centers and over $6.7 billion in total assets."

It also has about 8.5 million lines of computer code, which Jayaram's firm upgraded for Y2K using a staff of 30 people in Cincinnati
and 40 in Chennai, India, linked by satellite.

While Jayram's firm has a solid international reputation, the increasingly common practice of using overseas workers to handle U.S.
computer systems concerns some people.

"We are looking, as an intelligence priority, very carefully for people who may present a threat in this area," says Richard Clarke, a
senior National Security Council official.

"When systems are modified to be Y2K-compliant, the question remains: Do you know what was changed?" says Sam Varnado of
Sandia National Labs, which is working on system security with the federal government and private industry.

It's a simple matter for a programmer handling computer source code to install, undetected, a secret entrance, or "trap door," which
can be used to gain access to a system to read sensitive information, copy records, alter files or transfer money.

"We have seen multiple times where Y2K activity has resulted in trap doors being placed in commercial systems," says Duane
Andrews, executive vice president with SAIC.

"It's a very serious matter," says John Sarazen, director of SynComm Group, a technology consulting firm. "An unprecedented
amount of code is being opened up right now as part of Year 2000."

Foreign code-busters

Outside the USA, programmers in India, Pakistan, Ireland and the Philippines are doing most of the world's Y2K upgrades. And
each of those nations has issues with the United States or a thriving underground of anti-American terrorist groups.

Given the chilly relations between the United States and India since it and Pakistan conducted nuclear weapons tests earlier this
year, concerns are heightened by the amount of computer work done in those countries.

"Y2K remediation provides all kinds of opportunities for someone with hostile intent to understand how your computer network
works, how your business works, what your vulnerabilities are," CIA Director George Tenet testified before the Senate Special
Committee on Year 2000 in June, even before the nuclear weapons flap. "So we're watching it very, very carefully."

The Philippines was a base of operations for subordinates of Osama bin Ladin, the notorious exiled Saudi millionaire charged with
masterminding the bombing of U.S. embassies in East Africa this summer. He reportedly is highly computer-savvy.

Jayaram dismisses concerns about Indians as a threat.

"We have built in layers of safeguards, and there is an audit team from the client overseeing every step of the operation," he says.
"So even if there was a programmer who wanted to sabotage something, it would be most difficult."

While reliable estimates say less than 10% of U.S. commercial source code is being treated by foreign companies, many top U.S.
trading partner are turning to those countries in a rush to make deadlines.

And, Sarazen cautions, "It's a misperception that only foreign government's will crack our systems. Domestic, commercial
espionage is a thriving business.'

Shortage of expertise

While the USA is the world's primary consumer of computer goods, it is no longer leading the world in turning out computer
scientists.

"We're not cranking out as many technical people as we used to as a percentage of all graduates," Langston says. "And because
we're in a very technically driven world, we are setting ourselves up nationally for vulnerability (when) we have to go offshore for
technical talent."

India has exploited the U.S. shortfall, turning out more than 50,000 computer scientists in the past year, compared with 26,000 in
the USA. India has become second only to the USA in software production, with exports of $1.8 billion this year, up from $10 million
a decade ago. And it hopes to capture between 5% and 10% of what will be spent globally on Y2K.

Computerized security

Many of these problems "are going to be with us for a very long time," says Mike Vattis, chief of the National Information Protection
Center, a task force based at the FBI. "People are just now awakening to these issues."

But questions are growing about how far government can go in trying to safeguard national security while allowing relatively free
access to data.

Civil libertarians warn that some freedoms and rights may be challenged in the process of redefining national security. A presidential
commission last year proposed a regulation, which it later withdrew, requiring administrators of private computer systems to pass
an FBI background check.

"Even when an agency is charged with observing privacy and other rights, those interests eventually lose out when that agency has
a directive to protect national security," says Marc Rotenberg of the Electronic Privacy Information Center.

Says former senator Sam Nunn, chairman of a research panel at the Center for Strategic & International Studies, "Many of the
problems we are seeing have been with us for a long while, but this (Y2K) problem is exacerbating the situation."

By M.J. Zuckerman, USA TODAY