Posts Tagged With: computers

EMP..ElectroMagnetic Pulse..what it means for You


nuclear-explosions_047
What will it mean for you? EVERY Nuclear explosion creates EMP, on the surface of the earth OR a high altitude burst. Every bomb makes EMP.

So that means you can’t hide from it. It will NOT hurt the human body, but the effects will cause great hardship for millions. EMP creates 50,000 volts of charge PER meter. About the same as a yard. That charge will “FRY” all the computer chips in things not protected. The largest radio stations at 50,000 watts, only produce about 10 volts per meter. Cars with ignition chips won’t run. Your PC System will be damaged, “unless” you do the things to protect it.  The entire power grid in the USA will be damaged from a very high Nuclear Bomb somewhere over the central USA. A very high bomb (about 200 miles high) its sole purpose is to wipe out the power grid and communications coast to coast. Radios, TV, computers, any thing built in the past couple of decades will probably not work. There will be some exceptions. When atom bomb tests were done in the South Pacific during the 1950’s the EMP damaged stuff in Hawaii about 800 miles away. And those were low surface bursts.

Most of the EMP energy lies in the “radio frequency spectrum” ranging from power lines to radar systems, AND everything in between, which means all kinds of computer chips.

EMP happens to fast for a lightening pole or rod arrestors, to protect the equipment. Though it is faster than lightening, it does the same kind of damage to electrical grids, small OR large. It just melts the circuit.

Typical collectors of EMP are long wire runs. Antennas, telephone lines, power lines, barbed wire fences, sprinkler lines, metal buildings, buried metal pipes, railroad tracks, great amounts of metal objects. Even the mass of electrical wiring in your own home will collect the EMP. The metal pipes in your home plumbing for water will collect EMP. In some rare cases just unplugging a radio or TV “MAY” be enough to protect it. USUALLY NOT! NOT! !

The radiated electromagnetic fields from a high altitude nuclear detonation are probably going to do the first damage coast to coast. The first 1st. Sign of the attack will be the power failure, everywhere. You won’t even get emergency broadcasts. SO unless you have read my information you won’t even know what is happening UNTIL it is too late, and you begin to see the flashes of light from the nuclear detonations. The only way to protect your computer is to enclose it entirely within “a metal” box that is large enough to encase it “with no exposed openings.” I bought a metal trashcan and put cardboard two layers thick in the bottom and around the inside. With the metal LID put on it I do have a place to put the things with “chips” that I need to protect. Quickly some winter evening “after” MID December, as I watch the signs of the times, I will not let the sun go down unless I put My Laptop Computer, Short-wave Radio, CD player, and a few other things in that “metal” trashcan. WITH the lid put on. NO wires can hang out or protrude out of the can. And the lid must be down tight, to protect the stuff inside. After the attack begins and I am sheltered, then I can still have some music, listen to my battery short-wave radio, that will have international broadcasts, and with my power inverter I can use my 12-Volt car battery to run my Laptop. Snug as a bug in a rug.  So that you can have some chance to hear some radio broadcasts WHEN a few stations do get back on the airwaves, you should buy a small hand held radio and extra batteries. They are “small” enough that they can survive EMP. AM 640 and AM 1240 will be the first emergency frequencies to operate Just to be sure it will work, keep it wrapped in aluminum foil when you are NOT listening to the radio.

You can put your $15 or $20 radio in a coat pocket, and listen around “noon” each day to the emergency broadcasts. Just think of the Nation without any power. Traffic lights go out, elevators stop, cars quit running, telephones go dead, gas pumps won’t work for weeks. Looters begin to scavenge anything, and everything. City water pressure pumps are shutdown for months. Thirst will force some people to melt snow with fallout in it, and they will just poison their own insides with a deadly dose of radiation. The functional damage burnout, of chips that control everything today will put us back into the last century. EMP will wipe out the memory of most computers, OR at the least scramble it into a gazillion bits of birthday funeral TV walks glass horsehair flights a hundred and fifty eleven times dung.

Categories: Uncategorized | Tags: , , , , , , , , , , , , | 1 Comment

North Korea EMP attack could destroy U.S. – right now!!….


‘Red Dawn’ scenario is kid’s play compared with this scenario.

North Korea now has an intercontinental ballistic missile (ICBM) capable of delivering a nuclear weapon to the United States, as demonstrated by their successful launch and orbiting of a satellite on Dec. 12, the Washington Times reports.

In fact, the Times report says, “North Korea is a mortal nuclear threat to the United States – right now.”

It’s not just the threat of conventional nuclear attack that has experts worried. Nor is the North Korea invasion scenario in the new remake of “Red Dawn” a realistic risk.
The real concern is that North Korea now has miniaturized nuclear weapons for ballistic missile delivery and armed missiles with nuclear warheads that could destroy the U.S. in a single blow with an EMP attack that would send the U.S. back to 19th century technology a la the NBC TV show “Revolution.”

And North Korea is hardly the only threat to destroy what some other nations and rogue players call “the Great Satan.”

Imagine if all the lights in America went off – never to come back on again.

Imagine if all the computers in America got fried – never to come back on again.

Imagine if all the cars in America dependent on fancy circuitry wouldn’t start – ever again.

Imagine if the grocery stores and the gas stations had to close up – for good.

That’s the kind of scenario an EMP attack can cause. The scenarios suggest massive starvation, lawlessness and chaos beyond anything Americans can imagine.
Scientists and other experts have warned for years that the nation’s electrical grid system, together with other critical infrastructures that have an almost complete dependency on electricity and electronic components, are highly vulnerable to an electromagnetic pulse event, either from natural or man-made causes.

However, Congress and the administrations of previous and current presidents largely have ignored those warnings.

Events such as the September 11, 2001, terrorist attack on the United States, then the devastating Hurricane Katrina and more recently Hurricane Sandy revealed vulnerabilities to those infrastructures, for a time heightened that concern.

Nevertheless, none of this was enough to awaken policymakers who seem more preoccupied with making you less safe by restricting your ability to get firearms.

Make no mistake about it: An EMP attack poses the biggest threat to U.S. national and economic security in our lifetime.
An electromagnetic pulse attack on our critical infrastructures, either from an impending solar storm of serious intensity expected between 2012 and 2014 or from a high-altitude nuclear explosion, could have long-term catastrophic consequences for our society and our way of life.

A few years ago, a congressional commission went into considerable depth on those consequences to our electricity-dependent infrastructures that include not only the power grid itself but also telecommunications, our banking and finance system, our transportation system that delivers the very food and water on which our society depends on a daily basis, and the fuel needed to keep our houses warm in the winter and air-conditioned during the summer.

While these critical infrastructures continue to face such an impending crisis, Congress basically has ignored its own commission report and instead has treated the threat of an electromagnetic pulse event as a political football to be weighed against the need to establish an antiballistic missile system. Out of the debate, nothing has happened in either direction.

Categories: Politics | Tags: , , , , , , , , , , , , , | Leave a comment

FCC plans to free up large block of prime spectrum for Wi-Fi…..


Good news for everyone who’s tired of shoddy Wi-Fi connectivity in crowded cafes: the Federal Communications Commission is here to help. As CNET reports, FCC chairman Julius Genachowski made an important announcement at the Consumer Electronics Show on Wednesday when he discussed plans to free up 195MHz of spectrum on the 5GHz band, a move that will significantly boost Wi-Fi performance and ease congestion on crowded networks. The reallocation of spectrum on the 5GHz band would also represent “the largest block of unlicensed spectrum that has been made available for expansion of Wi-Fi since 2003,” CNET writes. The 5GHz band is currently being used by numerous federal government agencies, although Genachowski expressed confidence that the FCC can work with others in the government to get the spectrum free for unlicensed use.

Categories: Strange News, Uncategorized | Tags: , , , , , , , , , | Leave a comment

Portable “Ray Gun” biggest threat…send us to the 18th Century in seconds….


The nation’s attention of late has focused on a nuclear bomb or an intense solar storm as the source of an electromagnetic pulse, or EMP, assault on the nation’s vulnerable electrical grid system that could fry our electronics and wreak havoc on critical infrastructures.

Estimates are that tens of millions of fatalities could occur in the aftermath of such an event as food, fuel and power supplies evaporate and the nation is transported instantly back to the 18th-century lifestyle without a power grid or anything else electronic.
However, a similar threat has emerged from the so-called lone-wolf terrorist who can devise a portable EMP device and aim it at computers in a building, telecommunications linkages and banking automated teller machines – all on which the society has come to rely heavily for present-day existence.

And it can be done without a trace of who did it.

Recent concerns have been raised by the Federal Bureau of Investigation that the lone wolf – someone who strikes out on his or her own without any group affiliation – is considered a larger threat than one from al-Qaida or other organized groups.

Such individuals either may see themselves as supporting the views of various terrorist groups or may have a personal grudge.

Such an individual with a penchant for electronics can pull together components from a Radio Shack or electronic store – even order the components off of selected Internet websites – and fashion a radio frequency, or RF, weapon.

As microprocessors become smaller but more sophisticated, they are even more susceptible to an RF pulse. The high power microwave from an RF weapon produces a short, very high power pulse, said to be billions of watts in a nanosecond, or billionths of a second.

This so-called burst of electromagnetic waves in the gigahertz microwave frequency band can melt electrical circuitry and damage integrated circuits, causing them to fail. Ironically, this type RF weapon won’t affect humans, although there are some forms that experts say can affect the body’s own electrical system.
The pulse from an RF weapon travels at the speed of light and can be fired without any visible emanation. These weapons can come in ultra-wideband or narrow-band, with the latter acting like a laser emitting a single frequency at very high power. This pulse then is directed at a specific electronic target.

What makes RF weapons so dangerous is their compactness and ability to be powered by hand-carried energy sources. Experts say that their range of intensity is from 200 meters to 1,000 meters, or from some 656 feet to 3,281 feet.

Concern over the effects of RF weapons has been known to the U.S. Congress since at least 1997 when retired U.S. Army Lt. Gen. Robert L. Schweitzer testified before the congressional Joint Economic Committee on RF weapons and their impact on the U.S. infrastructure.

His concern then was that readily available technology, much of it off-the- shelf, places the capability of making RF weapons in the hands of lone wolves or more organized terrorists.
Given the rush to decontrol critical technologies due to the downward spiral of Western economies, they are often available to other countries without the needed scrutiny of U.S. licensing officials and are readily available for people residing in the U.S.

When he testified, Schweitzer called for drawing up a list of those technologies needed to make RF weapons and placing them on what was then called the Militarily Critical Technologies List, or MTCL, which was developed by the U.S. Department of Defense. While the MTCL wasn’t a control list, it did show how technologies relate to the development of weapons systems.

However, many of the items listed on the MTCL were not placed on control lists of dual-use technologies administered by the U.S. Department of Commerce or the munitions list overseen by the U.S. Department of State.

Today, that list remains only as a reference and no longer is updated. Everything on the MTCL isn’t subject to export controls and isn’t referred to that often to show how certain technologies relate to developing weapons systems.

Part of the reason for virtually ignoring the MTCL today is economic, but the basis for eliminating the MTCL mostly was political, since calling them “critical” suggested that they be subject to export controls and then would interfere with the ability to conduct business in a competitive world.

At the time of Schweitzer’s testimony, however, consideration of placing certain technologies under export control was meant to deflect the ability of countries and terrorist groups from easily gaining access to those technologies.

One of the items Schweitzer gave as an example of technology that should be controlled was Reltron tubes. He said that these tubes can be small or large, generate intense radio frequency pulses and can be used as RF weapons.
While RF weapon components are on the MTCL, Schweitzer said at the time that even then there were no up-to-date guidelines or directives on limiting their access to end-users. He added that several countries have RF weapons programs and Russia admits to selling some technologies to various countries, making them readily available.

“Users of new weapons can be criminals, individuals, or organized gangs of narco or domestic terrorists – or a determined, organized, well-funded foreign adversary, either a group or nation who hates us,” Schweitzer said.
RF weapons emit a non-nuclear electromagnetic pulse, even though they project the same type of pulse that a nuclear weapon does.
“As a practical matter,” Schweitzer testified, “a piece of electronic gear on the ground, in a vehicle, ship or plane does not really care whether it is hit by a nuclear magnetic pulse or a non-nuclear one.

“The effect is the same,” he said. “It burns out the electronics. The same is true of the computers in this Senate office building, in industry, or on Wall Street.”

Schweitzer also referred to the possible existence of radio-frequency munitions which contain high explosives that produce radio frequency energy “as their primary kill mechanism.”

“Applications or potential targets would include all military computers, circuit boards or chips, of any description and include …key components of our military and national infrastructure,” he said. “They would have equal impact on civilian targets with the advantage less power would be required.”

Schweitzer pointed out that the effects of RF and EMP weapons have been known to presidential commissions, the Infrastructure Protection Task Force, a Critical Infrastructure Working Group, an Information Warfare School at National Defense University as well as divisions on the Joint Staff in the Pentagon.

At the time, Schweitzer pointed out that there were some 90 to 100 references in 26 pages of the 70-page Quadrennial Defense Review that speaks to this new threat and there were some 2,800 references “while a more thorough search found many tens of thousands of documents where the key words ‘radio frequency weapons’ appear.
“For many reasons the knowledge is diffused,” Schweitzer testified. “In the public sector the subject has yet to draw any real attention or concerted action.”

Schweitzer added that while the federal government is aware of these threats from RF weapons, “a general understanding is lacking. This is true not only of RF weapons, but of their immediate threat to our (Department of Defense) and national infrastructure.”

Nevertheless, Schweitzer said that vulnerable targets include airplanes, ships and vehicles.

“Of interest is the fact that we are doubly vulnerable because we are, and will remain, in an era of dual-use of military and civilian systems,” he said.

As an example, Schweitzer pointed to military communications.

“Our military communications now passes over civilian networks,” he said. “If an electromagnetic pulse takes out the telephone systems, we are in deep trouble because our military and non-military nets are virtually inseparable.

“It is almost equally impossible to distinguish between the U.S. national telecommunication network and the global one,” Schweitzer said. “What this means is that it is finally becoming possible to do what Sun Tzu wrote about 2,000 years ago: to conquer an enemy without fighting.

“The paradigm of war may well be changing,” Schweitzer said. “If you can take out the civilian economic infrastructure of a nation, then that nation in addition to not being able to function internally cannot deploy its military by air or sea, or supply them with any real effectiveness – if at all.”
Schweitzer warned that in addition to the advanced countries, “pariah” nations have similar interests in developing RF weapons and some have the financial resources to develop or procure them.

“Russian information on RF weapons has been moving across borders for many years,” he said. “The horse is out of the barn.”

To determine whether cheap, home-made RF weapons could be built by people with little technical know-how, the U.S. Army a few years ago conducted tests at its Aberdeen Proving Ground in Maryland.

The tests, conducted on behalf of the Department of Defense, were successful.

“The message here is that any number of groups in the U.S. or other countries can do just this, relatively easily and at relatively low cost,” said Mike Powell of Schriner Engineering in Ridgecrest, California. Schriner Engineering made the weapons.

The RF weapons were made from components readily available from electronic stores and out of catalogs. They generated an extremely short but powerful pulse of electromagnetic radio waves.

Powell said that such RF weapons also would be capable of bringing down an aircraft.

“Our whole nation is vulnerable,” said David Schriner, who helped design the RF device. “We dance along with all this high technology, and we’re very dependent on it. But if it breaks, where will we be?”

As a side note, Schriner sought to bring to the U.S. Capitol an RF weapon he made himself for display purposes when he testified before the Joint Economic Committee as far back as February 1998.
When the Sergeant-at-Arms to the U.S. House of Representatives heard what the capability of the device was – namely, capable of frying the electronics of computers that were in all the Capitol office buildings – Schriner was not allowed to bring the device into the building.
His point was to show that the low-end technolIn his testimony titled “The Design and Fabrication of a Damage Inflicting RF Weapons by ‘Back Yard’ Methods,” Schriner told of how he made one in his own garage.ogy needed to fashion together an RF weapon was readily available at very reasonable cost. In fact, his testimony went into detail on how a person can fashion such a device in his own home.

Schweitzer similarly had told the congressional Joint Economic Committee that he had challenged a group of young scientists from a national laboratory to devise an RF weapon. He testified that they had gone to a Radio Shack and bought the components needed to make the RF weapon. They then mounted it on top of a minivan.
“So, you’ve got a situation on the one hand where you could put components from Radio Shack inside of a van no bigger than a UPS (United Postal Services) truck with an antenna. And, that’s really what an RF weapon often looks like, a radar or antenna showing, and drive it around the Dirksen (Senate Office) Building, make a series of passes over the Pentagon or the White House, or the FAA (Federal Aviation Administration facility out at Langley) and pulse,” Schweitzer said.

The FAA facility at Langley, Va., just outside Washington up the George Washington Parkway shares a highly guarded campus with the Central Intelligence Agency.

With a radar loaded in the back of a van or pickup truck, it can be directed at whatever target is intended. Because the radar is directional, it won’t have any effect on the vehicle carrying the radar as long as it is pointed away from its electronics.

“You make a number of passes around the building and emit these pulses,” Schweitzer said. “They go through concrete walls. Barriers are no resistance to them. And, they will either burn out or upset all of the computers or the electronic gear in the building.”

Given such power, it may be able to penetrate the walls at CIA, even though the windows are covered with a fine copper mesh to avoid listening devices picking up on classified conversations inside the buildings.

A surplus radar which operates at a multiple Gigahertz level and capable of reaching out over a thousand kilometers easily can be fashioned into a directional RF weapon.
Schweitzer in his testimony had pointed out that a radar mounted in the back of a truck and aimed toward traffic or buildings would make a very effective RF weapon.

Open source information also has documented how an RF weapon can be used against aircraft in an Intentional Electro Magnetic Interference, or IEMI. In a 2005 technical paper titled “Potential IEMI Threats Against Civilian Air Traffic,” D. J. Serafin outlined such a scenario.

“An airport area could be a selected target for (Electro Magnetic) terrorism due to the high concentration of electronics equipment likely to be perturbed by EM threats, so producing broad chaos,” Serafin wrote.

Serafin said that the main areas for a terrorist RF attack would be the airport terminal, including registration and transit areas, the traffic control tower, the parking areas for the planes and the touch down and take-off runways.

“Potential targets inside these areas include communication and navigation systems devoted to flight aircraft and safety…as well as computer networks…”

Sarafin gave the scenarios on introducing a small RF weapon concealed inside a suitcase, placed near terminal computer networks and a truck-mounted RF weapon, which could be located near an airport with direct view of the runways with a range extended to 1,000 meters, or the length of three 100-yard football fields.
In the case of Reagan National Airport in Washington, D.C., like many airports throughout the U.S., such a van or car could park at a lot adjacent to the runway where planes take off or land. On the flight path of the aircraft flying into Reagan National Airport, they fly over the Potomac River coming from the north and either fly across or near Roosevelt Island, which is a U.S. Park Service-administered site complete with woods and deer, with a statute dedicated to the first environmental president, Theodore Roosevelt.

There are many areas on the island in which someone easily could set up a radio-frequency weapon under the cover of a canopy of trees and through the various openings aim the device at aircraft that either are making their approaches or taking off, depending on wind direction.

In his scenario of introducing RF weapons into the area of the airport, Sarafin provided detailed descriptions of the microwave bandwidth, distance and megahertz ranges for the most effect – something which a technically competent terrorist would easily understand and duplicate.

Targets for the RF weapon would include such aircraft equipment as onboard navigation and global positioning systems. Because of the antenna on top of the aircraft’s fuselage, these systems would be vulnerable, as would the display unit or computer inside the cockpit.

While the scenario concerned aircraft, there are reports that RF weapons have been used to defeat security systems, disable police communications and disrupt bank computers.

More advanced RF weapons can jam satellites, cause aircraft to crash, create pipeline explosions and large gas spills and cause life-saving medical equipment to malfunction. They also can be used to cause public water systems to malfunction and potentially create flooding as a result.

Categories: Politics | Tags: , , , , , , , , , , , | Leave a comment

DRONE MISSILE KILLS ELECTRONICS, NOT PEOPLE…….



=================================================================================
As modern warfare continues to be fought behind key boards and monitors, last week Boeing successfully tested a missile capable of making screens go blank. Boeing says their Counter-electronics High-powered Advanced Missile Project known as CHAMP may one day change modern warfare by knocking out electronic targets with little or no collateral damage.
CHAMP approached its first target and fired a burst of High Power Microwaves at a two story building built on the test range. Inside rows of personal computers and electrical systems were turned on to gauge the effects of the powerful radio waves.

Seconds later the PC monitors went dark and cheers erupted in the conference room. CHAMP had successfully knocked out the computer and electrical systems in the target building. Even the television cameras set up to record the test were knocked off line without collateral damage. In one hour, seven test-range targets were hit and all electronics inside the buildings were degraded and defeated.
“This technology marks a new era in modern-day warfare,” said Keith Coleman, CHAMP program manager for Boeing Phantom Works. “In the near future, this technology may be used to render an enemy’s electronic and data systems useless even before the first troops or aircraft arrive.”

So, uh, al Qaeda, you know those Sexy Tanja videos you like to make and watch in your free time? Heads up.

Categories: Politics | Tags: , , , , , , , , | Leave a comment

A 30 ton computer, not your normal PC…The Year was 1946



=================================================================================
This 1946 photograph shows ENIAC (Electronic Numerical Integrator And Computer), the first general purpose electronic computer – a 30-ton machine housed at the University of Pennsylvania . Developed in secret starting in 1943, ENIAC was designed to calculate artillery firing tables for the United States Army’s Ballistic Research Laboratory. The completed machine was announced to the public on February 14, 1946. The inventors of ENIAC promoted the spread of the new technologies through a series of influential lectures on the construction of electronic digital computers at the University of Pennsylvania in 1946, known as the Moore School Lectures.

Categories: Strange News, Uncategorized | Tags: , , , , , , , , , | 1 Comment

Skype targeted by ‘worm’ malware infecting Windows PCs……


 

Skype, the internet communications platform, is being used by hackers to distribute a “worm” that infects Windows PCs.

When users click on an instant message saying “lol is this your new profile pic?” they unwittingly download a file containing a Trojan horse malware file.

This opens a backdoor allowing hackers to hijack infected PCs and recruit them into a “botnet army”.

Users can be locked out of their machines and held to ransom.

According to internet security specialist Sophos, the worm is a variant of the well-known “Dorkbot” worm which has been spread by social media platforms such as Facebook and Twitter.

When the worm infects a computer it sends out the “lol” message to the user’s contact list.

Unsuspecting recipients think the message has originated from someone they know and click on the link, thereby downloading the malware payload.

When users click on an instant message saying “lol is this your new profile pic?” they unwittingly download a file containing a Trojan horse malware file.

This opens a backdoor allowing hackers to hijack infected PCs and recruit them into a “botnet army”.

Users can be locked out of their machines and held to ransom.

According to internet security specialist Sophos, the worm is a variant of the well-known “Dorkbot” worm which has been spread by social media platforms such as Facebook and Twitter.

When the worm infects a computer it sends out the “lol” message to the user’s contact list.

Unsuspecting recipients think the message has originated from someone they know and click on the link, thereby downloading the malware payload.

Hijacked computers

Skype said in a statement: “Skype takes the user experience very seriously, particularly when it comes to security. We are aware of this malicious activity and are working quickly to mitigate its impact.

“We strongly recommend upgrading to the newest Skype version and applying updated security features on your computer.

“Additionally, following links – even when from your contacts – that look strange or are unexpected is not advisable.”

Botnets are often used to mount distributed denial of service (DDoS) attacks – forcing websites offline – to run spyware or to send out spam emails.

Publicity about the threat has made many users wary of clicking on strange-looking links posted via social networks, which may have prompted the perpetrators of this latest attack to switch tactics.

“The danger is, of course, that Skype users may be less in the habit of being suspicious about links sent to them than, say, Facebook users,” said Sophos’s senior technology consultant Graham Cluley.

Categories: Strange News | Tags: , , , , , , , , | Leave a comment

Ever use a rent to own computer…they were spying on you!!


FTC settles PC spying charges with rent-to-own computers
===============================================
WASHINGTON (AP) — The Federal Trade Commission said Tuesday that seven rent-to-own companies and a software design firm have agreed to settle charges that they spied on people using the computers that consumers rented from them.

According to the FTC, the computers captured screenshots of confidential and personal information, logged computer keystrokes and took webcam pictures of people in their homes. All of these things happened without the knowledge or consent of the people who rented the computers, the FTC said.

Meanwhile, the software design firm, DesignerWare LLC, collected data that allowed rent-to-own stores to track the location of rented computers without consumers’ knowledge, the FTC said.

The settlements bar the companies from any further illegal monitoring, from activating location-tracking software without the consent of renters and from deceptively collecting and disclosing information about their customers.

In addition to North East, Pa.-based DesignerWare, the FTC said it also settled with seven companies that operate rent-to-own stores and licensed software from DesignerWare, including franchisees of Aaron’s Inc., ColorTyme and Premier Rental Purchase.

A person who answered the phone at DesignerWare said that the company doesn’t believe that it’s done anything wrong and doesn’t have any other comment. He refused to give his name.

Categories: Strange News, Uncategorized | Tags: , , , , , , | Leave a comment

Create a free website or blog at WordPress.com.

mayanexplore.com

Riviera Maya Travel Guide

Cajun Food, Louisiana History, and a Little Lagniappe

Preservation of traditional River Road cuisine, Louisiana history & architecture, and the communities between Baton Rouge & NOLA

Jali Wanders

Wondering and Wandering

Southpaw Tracks

“If ever a time should come, when vain and aspiring men shall possess the highest seats in Government, our country will stand in need of its experienced patriots to prevent its ruin.” ~Samuel Adams

Pacific Paratrooper

This WordPress.com site is Pacific War era information

what's the formula?

Nurturing awesomeness: from the parents of celebrities, heroes, trailblazers and leaders

Tarheel Red

A Voice of Conservatism Living in Carolina Blue

cancer killing recipe

Just another WordPress.com site

dreamshadow59

A great WordPress.com site

Mike's Look at Life

Photography, memoirs, random thoughts.

Belle Grove Plantation Bed and Breakfast

Birthplace of James Madison and Southern Plantation

Letters for Michael

Lessons on being gay, of love, life and lots of it

Sunny Sleevez

Sun Protection & Green Info

Backcountry Tranquility

A journal about my travels and related experiences :)

LEANNE COLE

Art and Practice

Lukas Chodorowicz

Travel, culture and lifestyle experienced on my adventures around the world. All photos taken by me. Instagram: @colorspark

BunnyandPorkBelly

life is always sweeter and yummier through a lens. bunnyandporkbelly [at] gmail [dot] com

%d bloggers like this: