20140609

Militias in the USA

Organized militia consists of “State” (non-federal) militia forces; the “State” National Guard is a Militia.  The “State” National Guard is not to be confused with the USA (Federal) National Guard of the United States, which is a US Army reserve military force.

Reserve militia are “State” (non-federal) militia forces, unorganized militia consisting of “Every” able-bodied citizen (Men & Women) of ages 17yo to 45yo.

Unorganized militia includes all USA former members of the Federal armed forces that may be called back to Federal Service (No Age Limits).

Past “Corporate, Federal, State and local” historical tyrannical massacres in the 1900s; such as’ “Ludlow, Colorado” by the Colorado Fuel & Iron Company militia (many others in US History), Army Chief of Staff “General Douglas MacArthur” in command of US Army infantry, cavalry, and tanks despotically attacked the Bonus Army marchers with their wives and children on the Washington, DC Mall, State militia on Kent State ... just a few examples of our History [We must get better for all US!].  Militias indicate rights/laws are compliant with Corporate, Federal, State and local powers of the time and place.  A well regulated Federal “National Guard and Reserve” militia is essential to US and assures Citizens protect US Citizens from unlawful orders of elite plutocrats.

The 50 States of the USA do have the right to have a militia, but when any militia (non-LEO) organized group attacks US Citizens we are in a State of Civil War.  Federal, State, and Local controlled Law Enforcement Officer (LEO) and Emergency Responder personnel have the right to lethal force protection of life when arresting law breakers and preventing property destruction.

I would like to avoid the next massacre of USA Citizens by USA Citizens, because of foolish dogmatic agendas that you, I, or politician/cleric may espouse as some sort of personally-appropriate fact to justify a private militia.

20140603

Information security has an Open and Agile history.


Information security had four major historical events.  The first was PGP/PKI encryption, and the second was the sub-OS security hypervisor both developed in the later 20th century.  Early in the 21st century the third development was ubiquitous personal multi-factor biometric devices with Open-standards.  The fourth was the development of community keyed lockout Open-standards for all information infrastructure and personal devices.

 

The total lockdown of our personal information with MUlti-FActor BIometric (MUFABI) devices required early 21st century corporate bosses direct Congressional a/o Parliamentary ... servants to order Open-standards compliance for COmmunity KEyed LOckout (COKELO).

 

MuFaBi devices are linked to owners embedded chips, when out of range, all owner personal information, music, documents ... are wiped.  MuFaBi will reset to owner defaults (cloud services) when owner is again in range and can be MuFaBi authenticated.  Any crack attempts to access MuFaBi applications, OS, services after a wipe automatically resets the device to factory defaults removing all account identifications and functionality.  MuFaBi standards are not warrant cracking tolerant, any attempts to crack a MuFaBi device results in immediate wipe and reset assuring any search and seizures of personal information is prevented.  MuFaBi prevents personal activities tracking by generating transient avatar financial transactions, location information, digital A/V session modification and encryption.  MuFaBi devices due to cost/availability did not quickly gain global usage.  Magic is extremely well applied technology; IOW, the user does not appreciate or notice the technology (it is just a user device).

 

CoKeLo is a security model that allows communities (....Com, ....Gov, ....Mil ...) to lock all community information infrastructure and user devices to a unique spectrum of keys and key-change time/sequence.  CoKeLo security manages very frequent, complete, and fast key changes across the total community.  Malicious external attacks automatically initiates unique defensive CoKeLo managed key-spectrum jumps for external attack lockout.  Literally the attacker objective (your community) does a virtual vanishing act.  Other CoKeLo defense measures kick-in collecting forensics and preventing discovery from the malicious source.  When forensics indicates internal threats CoKeLo will manage multiple sub-communities under various key-sets until the threat can be detected and removed.  CoKeLo key changes result in network IPs, NIEM keys, MAC IP association updates ... user signatures.