Faux Security: @JosephKBlack, @ElyssaD, BlackBerg Security, and Shades of Project Viglio | @Krypt3ia

Faux Security: @JosephKBlack, @ElyssaD, BlackBerg Security, and Shades of Project Viglio

Blackberg & ElyssaD:

A while back, I ran across ElyssaD and her whack ass site which was scraping my content from Infosecisland. I later read  Jaded Security’s post filling in the gaps that I had given up on in my searches on her digital rats warren of sites and chalked it up to fucktards at play. However, since then, she has failed to remove my content from her sites, her ersatz ‘employer’ Joe Black, has called me out as a supporter of Anonymous and LulzSec, and still, my content is on her frantically moronic sites.

Softly Softly Catch a Monkey « by @th3j35t3r on SABU || WTG JESTER!

BREAKING UPDATE: Suspicious Behavior in Tennessee

BREAKING UPDATE: Suspicious Behavior in Tennessee

Uploaded by elyssadurant on Feb 20, 2012

Most have no tags or temporary tags… But the latest weapon of mass deception are vehicles that have TWO tags from different states!

Specifically Tennessee and Kentucky.

Black Army? Heroes? Hell NO!

Only cowards have to hide behind bullet proof glass and opaque black tinted windows.

Go USA! God bless America!

This is some of the creepiest shit I have ever seen but was unable to upload live footage since my internet suddenly got disconnected.

Garbage Trucks with liquid tanks using hoses and flashlights in back alleys; hiding behind dumpsters; turning off headlights to avoid detection?

THAT’S FUCKING SUSPICIOUS

School busses and taxis parked for hours with strobe lights using GPS 4D technology for surveillance — that is fed to four separate locations and stored on USB!

All utility companies now have sub-contractors rewiring shit without any ID, temporary tags and plates from multiple states… No way to verify identity workers caught on film jumping out of running vehicles and cutting wires at utility poles?

THAT’S FUCKING SUSPICIOUS!
Category:
News & Politics
Tags:
Military USA TN Black
VIPR
TSA

DISCOVERY!

ELyssa Durant (me?) on “THE” watch List???

Protests in Egypt: A Sign of the Times

Why does Egypt matter?

 

Watch closely and reflect on what is happening in Egypt.
I use the internet as my primary source of communications. I have 13 gigs of spyware, malware and other junk that somehow found it’s why onto my hard drive in less than 63 days!

 

I didn’t have broadband until last month! I have no cable television and I can barely get a signal on my TV— not that there is much worth watching— but I would like to see the news and see WTH is going on in the world.
But you grow used to the silence— I did not even own a television until a few months ago.

 

I have had more than a dozen cell phones in less than one year because the damn things keep freezing on me. App Error 200. I shit you not— coincidence? Maybe. But anyone who purchases more than 3 cell phones in one year is automatically placed on the terrorist watch list. Then again, I live in a state where the ACLU is on the watch list!
Sound bizarre? I hope so, cause it certainly does sound “normal” to me!

 

Welcome to my life.
The United States has long had the capability to monitor, jam, and cut communications at will. Without cause or justification.

 

I live in the United States of America. I care what is happening in Egypt because I know it could happen here.

Am I a whistleblower? Yes, I am.
Am I anonymous? Not so much.
Am I a terrorist? Hell, no.

Am I on the watch list? You bet your sweet ass I am!

IN MY COUNTRY?

“First they came for the communists,
and I didn’t speak out because I wasn’t a communist.


Then they came for the trade unionists,
and I didn’t speak out because I wasn’t a trade unionist.


Then they came for the Jews,
and I didn’t speak out because I wasn’t a Jew.


Then they came for me
and there was no one left to speak out for me.”

Friedrich Gustav Emil Martin Niemöller
(14 January 1892 – 6 March 1984)


“Somewhere to run, Nowhere to hide?”
~Cathy O’Brien, The Trance-formation of America

ACCESS DENIED: For Reason of National Security

#USA #TN05 #JAN25 #EGYPT

you bet your sweet ass I am!

^ed

ELyssa Durant © 2012 || The Powers That Beat
All Rights Reserved || DailyDDoSe™ registered @ELyssaD™

ps ALL LINKS CLICKABLE: EVERYTHING YOU NEVER WANTED TO KNOW ABOUT HOMELAND IN-SECURITY AND MORE!

~this is your hometown

 

BREAKING! Open Source Root Hack Discovered || Anti-Sec & LulzSec & Anonymous || HTTPS Everywhere Development @EFF

HTTPS Everywhere Development

Pointers for developers

  • License: GPL version 2+
  • Source code: Available via Git with
    git clone git://gitweb.torproject.org/https-everywhere.git or browse the source via gitweb, or just unzip the .xpi file.
  • Bug tracker: https://trac.torproject.org/projects/tor/report/19 (to submit bugs, make an account or use the anonymous one — “cypherpunks”/”writecode”)
  • Mailing lists: The https-everywhere list ( archives) is for discussing the project as a whole; the https-everywhere-rules mailing list ( archives) is for discussing the rulesets and their contents, including patches and git pull requests.
  • IRC: #https-everywhere on irc.oftc.net. If you ask a question, be sure to stay in the channel — someone may reply a few hours or a few days later.

A quick HOWTO on working with Git

You may want to also look at the Git Reference, GitHub Help Site and the Tor Project’s Git documentation to fill in the gaps here, but the below should be enough to get the basics of the workflow down.

First, tell git your name:

git config --global user.name "Your Name" git config --global user.email "you@example.com"

Then, get a copy of the ‘origin’ repository:

git clone git://git.torproject.org/https-everywhere.git cd https-everywhere

To create a test XPI, you’ll need a Cygwin environment under Windows, or a Linux or Unix install. Simply run this from the https-everywhere.git toplevel directory:

sh ./makexpi.sh

This should create an xpi file in ./pkg that you can install using a file:// url.

If you want to create new rules to submit to us, we expect them to be in the src/chrome/content/rules directory. That directory also contains a useful script, make-trivial-rule, to create a simple rule for a specified domain. There is also a script called trivial-validate.py, to check all the pending rules for several common errors and oversights. For example, if you wanted to make a rule for the example.com domain, you could run

sh ./make-trivial-rule example.com

inside the pending-rules directory. This would create Example.com.xml, which you could then take a look at and edit based on your knowledge of any specific URLs at example.com that do or don’t work in HTTPS. You could then run

python ../../../../trivial-validate.py

to make sure that your rule is free of common mistakes.

When you want to send us your work, you’ll need to add any new files to the index with git add:

git add ./src/chrome/content/rules/MyRule1.xml git add ./src/chrome/content/rules/MyRule2.xml

You can now commit your changes to the local branch. To make things easier, you should commit each xml file individually:

git commit ./src/chrome/content/rules/MyRule1.xml git commit ./src/chrome/content/rules/MyRule2.xml

Now, you need a place to publish your changes. You can create a free github account here: https://github.com/signup/free. http://help.github.com/ describes the account creation process and some other github-specific things.

Once you have created your account and added your remote in your local checkout, you want to push your branch to your github remote:

git push github my-new-rules:my-new-rules

Now, tell the https-everywhere-rules@eff.org mailing list about your changes and we will merge them in! Alternately, you can use

git format-patch

to create patch files that you can submit to us by e-mail instead of using a remote.

Periodically, you should re-fetch the master repository:

git pull master

Development discussions

If you have questions or comments about https-everywhere development, including about the user of version control, you can discuss them in the #https-everywhere IRC channel on irc.oftc.net. The IRC service at irc.oftc.net is available in an encrypted form via port 6697 if your IRC client supports it. You can also join the https-everywhere mailing list or the rulesets mailing list.

mother fuckers took open source… BLACK & BERG so we meet again?

i signed up for gitweb for #cchaiti

you fuckers ought to be ashamed of yourselves.

die. a slow and painful death.

^ed

How to Deploy HTTPS Correctly | Electronic Frontier Foundation

How to Deploy HTTPS Correctly

Chris Palmer, 15 Nov 2010

Internet technologists have long known that HTTP is insecure, causing many risks to users. The release of Firesheep made one of these risks concrete and obvious to even non-technical folks.

While HTTPS has long existed as a reasonable way to improve web security, web operators have been slow to host their applications with it. In part, this is because correctly and completely hosting an application with HTTPS takes some care.

This article is designed to help web operators get a conceptual handle on how to protect their users with HTTPS. Taking a little bit of care to protect your users is a reasonable thing for web application providers to do, and a good thing for users to demand.

Background

HTTPS provides three security guarantees:

  1. Server authentication allows the browser and the user to have some confidence that they are talking to the true application server. Without this guarantee, there can be no guarantee of confidentiality or integrity.
  2. Data confidentiality means that eavesdroppers cannot understand the communications between the user’s browser and the web server, because the data is encrypted.
  3. Data integrity means that a network attacker cannot damage or alter the content of the communications between the user’s browser and the web server, because they are validated with a cryptographic message authentication code.

HTTP provides no security guarantees, and applications that use it cannot possibly provide users any security. When using a web application hosted via HTTP, people have no way of knowing whether or not they are talking to the true application server, nor can they be sure attackers have not read or modified communications between the user’s computer and the server.

Modes of Attack and Defense

However users connect to the Internet, there are a variety of people who can attack them—whether spying on them, impersonating them, tampering with their communications, or all three of these. The wifi network operator can do this; any ISP in the path between client and server can do it; anyone who can reconfigure the wifi router or another router can do it; and often, anyone else using the same network can do it, too.

Firesheep is a passive network attack: it eavesdrops on the contents of network communications between browser and server, but does not re-route or modify them.

By contrast, other freely-available tools perform active network attacks, in which the attacker does modify the contents of and/or re-route communications. These tools range from serious, such as sslstrip, to silly, like the Upside-Down-Ternet. Although Upside-Down-Ternet is a funny prank, it is technically identical to potentially more damaging attacks such as an attack that injects malicious code or incorrect information into web pages; at the same time, it shows that such attacks are easy enough to be jokes. Free wifi hotspots have been known to inject advertisements dynamically into web pages that users read—indicating that active network attacks are a viable business model. Tools like Cain and Abel enable a range of attacks, including re-routing local network traffic through the attacker’s system. (Also see Arpspoof and dsniff.)

Only a mechanism that provides (at least) authentication, confidentiality, and integrity can defend against the full range of both passive and active attacks. HTTPS is currently our best option for web applications.

However, there are some potential pitfalls that site operators must avoid.

Mixed Content

When hosting an application over HTTPS, there can be no mixed content; that is, all content in the page must be fetched via HTTPS. It is common to see partial HTTPS support on sites, in which the main pages are fetched via HTTPS but some or all of the media elements, stylesheets, and JavaScript in the page are fetched via HTTP.

This is unsafe because although the main page load is protected against active and passive network attack, none of the other resources are. If a page loads some JavaScript or CSS code via HTTP, an attacker can provide a false, malicious code file and take over the page’s DOM once it loads. Then, the user would be back to a situation of having no security. This is why all mainstream browsers warn users about pages that load mixed content. Nor is it safe to reference images via HTTP: What if the attacker swapped the Save Message and Delete Message icons in a webmail app?

You must serve the entire application domain over HTTPS. Redirect HTTP requests with HTTP 301 or 302 responses to the equivalent HTTPS resource.

Some site operators provide only the login page over HTTPS, on the theory that only the user’s password is sensitive. These sites’ users are vulnerable to passive and active attack.

Security and Cookies

As I described in a paper on secure session management for web applications, site operators must scope sensitive cookies (such as cookies used for user authentication) to the secure origin. If a cookie is broadly scoped (with the Domain attribute in the Set-Cookie: header), it may “leak” to other hosts or applications in the same domain—potentially less-secure hosts or applications.

Similarly, the application must set the Secure attribute on the cookie when setting it. This attribute instructs the browser to send the cookie only over secure (HTTPS) transport, never insecure (HTTP).

Use HTTP Strict Transport Security

HTTP Strict Transport Security (HSTS) is an HTTP protocol extension that enables site operators to instruct browsers to expect the site to use HTTPS.

Although not all browsers yet support HSTS, EFF urges those that don’t—we’re looking especially at you, Apple and Microsoft—to follow the lead Google and Mozilla have set by adopting this useful security mechanism. Indeed, ultimately we expect HTTPS (and possibly SPDY) to replace HTTP entirely, the way SSH replaced Telnet and rsh.

We recently enabled HSTS for eff.org. It took less than an hour to set up, and we found a way to do it without forcibly redirecting users to HTTPS, so we can state an unequivocal preference for HTTPS access while still making the site available in HTTP. It worked like a charm and a significant fraction of our users are now automatically accessing our site in HTTPS, perhaps without even knowing it.

Performance Concerns

Many site operators report that they can’t move to HTTPS for performance reasons. However, most people who say this have not actually measured any performance loss, may not have measured performance at all, and have not profiled and optimized their site’s behavior. Usually, sites have latency far higher and/or throughput far lower than necessary even when hosting over HTTP—indicating HTTPS is not the problem.

The crux of the performance problem is usually at the content layer, and also often at the database layer. Web applications are fundamentally I/O-bound, after all. Consider this wisdom from the Gmail developers:

First, we listed every transaction between the web browser and Google’s servers, starting with the moment the “Sign in” button is pressed. To do this, we used a lot of different web development tools, like Httpwatch, WireShark, and Fiddler, plus our own performance measuring systems. […]

We spent hours poring over these traces to see exactly what was happening between the browser and Gmail during the sign-in sequence, and we found that there were between fourteen and twenty-four HTTP requests required to load an inbox and display it. To put these numbers in perspective, a popular network news site’s home page required about a 180 requests to fully load when I checked it yesterday. But when we examined our requests, we realized that we could do better. We decided to attack the problem from several directions at once: reduce the number of overall requests, make more of the requests cacheable by the browser, and reduce the overhead of each request.

We made good progress on every front. We reduced the weight of each request itself by eliminating or narrowing the scope of some of our cookies. We made sure that all our images were cacheable by the browser, and we consolidated small icon images into single meta-images, a technique known as spriting. We combined several requests into a single combined request and response. The result is that it now takes as few as four requests from the click of the “Sign in” button to the display of your inbox.

Google’s Adam Langley provides additional detail:

In order to do this we had to deploy no additional machines and no special hardware. On our production frontend machines, SSL/TLS accounts for less than 1% of the CPU load, less than 10KB of memory per connection and less than 2% of network overhead. Many people believe that SSL takes a lot of CPU time and we hope the above numbers (public for the first time) will help to dispel that. [emphasis in original]

Is it any wonder Gmail performs well, even when using HTTPS exclusively? Site operators can realize incremental improvement by gradually tuning their web applications. I gave a presentation to this effect at Web 2.0 Expo 2009.

Conclusion

HTTPS provides the baseline of safety for web application users, and there is no performance- or cost-based reason to stick with HTTP. Web application providers undermine their business models when, by continuing to use HTTP, they enable a wide range of attackers anywhere on the internet to compromise users’ information.

More to Come

Keep an eye out for Part Two of this whitepaper, which will go into more detail about how site operators can easily and incrementally improve site efficiency, thus enabling the move to HTTPS.

FoxNews reports that the arrests were part of a multinational sting across the United Kingdom, Ireland and the United States. LulzSec leader Hector Xavier Monsegur, who operated online under the alias “Sabu,” provided the Federal Bureau of Investigation with information leading to the arrests.
“This is devastating to the organization,” said an FBI official involved with the investigation. “We’re chopping off the head of LulzSec.” LulzSec, which became part of the larger hacker collective “Anonymous Operations” last year, has launched a number of high profile cyberattacks since last summer. 

The last strong tweet by sabu was “The federal government is run by a bunch of fucking cowards. Don’t give in to these people. Fight back. Stay strong.
The Identity of Sabu is doxed as:
Hector Xavier Monsegur
90 Paladino Ave
New York, NY 10035
(212) 534-7516
Voter ID: 305168466
DOB: October 13th 1983

Fox’s report, Sabu began working for the FBI in June after they busted him it’s unclear what his fate is now. What is clear is the enormous grin of the feds. Monsegur pleaded guilty on August 15 to 12 hacking-related charges and information documenting his admissions is expected to be unsealed in court today.As a result of Monsegur’s cooperation, which was confirmed by numerous senior officials, the remaining top-ranking members of LulzSec were arrested or hit with additional charges today.
lulzsec-indictment

The five charged in the LulzSec conspiracy indictment were identified by sources as: Ryan Ackroyd, aka “Kayla” and Jake Davis, aka “Topiary,” both of London; Darren Martyn, aka “pwnsauce” and Donncha O’Cearrbhail, aka “palladium,” both of Ireland; and Jeremy Hammond aka “Anarchaos,” of Chi

Stranded in the Combat Zone

Friday night I crashed your party
Saturday I said I’m sorry
Sunday came and trashed it out again
I was only having fun
Wasn’t hurting anyone
And we all enjoyed the weekend for a change

I’ve been stranded in the combat zone
I walked through Bedford Stuy alone
Even rode my motorcycle in the rain
And you told me not to drive
But I made it home alive
So you said that only proves that I’m insane

Well, you may be right
I may be crazy
Hey!
But it just might be a lunatic you’re looking for
Turn out the light
Don’t try to save me
Well you may be wrong for all I know
But you may be right

Remember how I found you there
Alone in your electric chair
I told you dirty jokes until you smiled
You were lonely for a man
I said take me as I am
‘Cause you might enjoy some madness for a while

Now think of all the years you tried to
Find someone to satisfy you
I might be as crazy as you say
If I’m crazy then it’s true
That it’s all because of you
And you wouldn’t want me any other way

But you may be right
I may be crazy
Hey!
But it just may be a lunatic you’re looking for
It’s too late to fight
It’s too late to change me
Well you may be wrong for all I know
But you may be right

Hey!

Well you may be right
I may be crazy
Hey!
But it just may be a lunatic you’re looking for
Well turn out the light
I’m gonna watch you take me
Well you may be wrong for all I know
But you may be right

Wrong but you may be right
You may be wrong but you may be right
You may be wrong but you may be right
You may be wrong but you may Hell! be right

HACK3R WARS RAGE ON: Lulz vs. @ELyssaD™ The Greatest Gift, My Deepest Regret: Pepe’s Final Gift: The Gift of Goodbye

I wish people would care as much about their children as I do about my pets.

I never even planned to get attached to Spotty. I already had one cat and had no interest in getting another. However, I agreed to hold on to her took her for one of my clients because he was not permitted to have pets while in foster care. That was 2002.

So even though I know that child will come back for her, I do feel in someway I made a promise to a child that I can’t keep. I aide a promise to Spotty that I have already broken. So I guess this is goodbye again. And the only thing worse than saying goodbye, is having to no idea what will happen to her. Omg… this is almost too painful to write.

It has been months since I posted the first “ad?” trying to find a home for Spotty. I thought for sure somebody, anybody, would be willing to hold onto to her for a couple of months.

Yest here we are 4 months later, and I have to live with the fact that I am now “that” person. The person who abandons their own children, or leaves an animal behind when the move. I am “that” person.

I have already done the research. There are very few”low kill” shelters in Tennessee. The fact that they even classify them as “low” kill makes me want to throw up. But that’s the reality.

I really hate this world.

No one gives a shit about the kids who are already here living in poverty, foster homes, on the streets, or anyway the can to survive. So who gives a shit about a few people who at least have the luxury of a quick painless death rather than having it drained out of them day by day; tear by tear, year after year after year after year.

I don’t want to get rid of Spotty. I don’t want her euthanized when I feel her little head nuzzled against my neck. She is not sick, she is not, her only crime is belonging to me. What the fuck with this world. we can through puppies into plastic bags and freeze them to death because it is “easier” than “putting them to sleep.”

So yeah, there you have it. I fucked up again. How ironic that the one thing I don’t have is the only thing people seem to want from me. I can’t wait to hear about this one. I am 36 years old. I am not a child. I am not a criminal. I am not cruel. I have no answers for you. I do not have the resources that most people take for granted.

Why must they take the one thing I love— the one thing that loves me. Does it make it all better for everybody else? dad, I learned my lesson. I have accepted the hand I have been dealt.

I’m not stupid, and I know that I can’t blame my mom for this one since I’ll be the one to drive her to the shelter tomorrow.

What the fuck is wrong with me?

If I say I’m sorry, would that make it okay for me to keep Spotty? Will someone please tell me what I need to say because I’m not sure what I did.

I’m old enough to know that nobody is coming to save me. I don’t even brother to ask but why must an innocent animal who did not ask for this be the ultimate punishment for a sin I don’t remember committing.

So where does Spotty go? To the farm with Abby & Ollie during divorce number two and custody battle number 4? Will my father mail me some fake ashes out of the fire place. Will my mommy drive her out to Suffolk County so she can use an assumed name like “Harrison” so I can’t locate her? At least I found Pepe. I can only hope that one day I’ll find Spotty.

Special message to two “special” people: Mom, I hope some takes Ziggy from you. The same way you took Pepe to that shelter in Suffolk County during the darkest moment of my life. I remember what you said, and what you were told by 3 separate mental health professionals. In fact, they remember too, because they found the your actions to be so far beyond the scope of rational behavior, they documented the entire thing. In fact, once Pepe was located, they kept a copy of the “adoption papers” in my medical records both as a precaution and as relevant family history.

Dad? Well, whatever. I can’t think of anything care enough about to lose— so enjoy. You win. I surrender. Whatever. I guess you’ll tell what I’m supposed to do because that worked so well with my last Landlord.

Why can’t I just live a life without empathy? I guess if you don’t love anything but yourself, you will never know grief.

Well now I’m really fucked, because I’m not all fond of myself these days. Don’t worry, you don’t need to call parents, they already know, and they couldn’t care less. In fact they’ll probably bill you for wasting there time. Besides, unless you went Harvard, Yale or Princeton they don’t give a shit what you think. So join the club.

Just remember this: Spotty didn’t chose me. I chose her. So here we go again… because apparently there is not a single person I know who is willing to save Spotty.

Actually, that sounds about right. I know exactly how she feels.

Pepe’s Final Gift: The Gift of Goodbye


Many years back I had the most vivid nightmare, that 16 years later I can still remember the details of my worst nightmare:


I am standing in a sea of unfamiliar faces. There is violence everywhere. Red. Broken. Bleeding.


I am holding Pepe, and he is broken. Bleeding. Clinging to me, clinging to life. I rush through the crowd looking for safety. There is no way out. Just angry faces in a sea of violence.


In the distance, I see two police officers. I run to them believing they will help me find a way out of the madness. Believing they will bring me to safety. A safe haven. Shelter from the storm. Free from the madness. Free from the violence. Free from this sea of unfamiliar faces so I can get my bleeding, broken, suffering friend the help he needs to make him well. The help we need to be whole again.


When I reach the podium, the men were facing the crowd. They were standing there, backs to me; they just stood there to face to the crowd banging their black, wooden night sticks while on just standing there Beating their night sticks against their palms. I call out but no one listens. No one can hear me above the roar of the crowd. So I tap them on the shoulder, holding Pepe close to my heart— hoping they will instinctively see the love and fear in his yellow gold eyes. Of course, they would rescue us. Yes, they would rescue us and bring us to safety. Free from the violence, free from the madness. Free from this hell and take us somewhere safe. Somewhere far, far away from here. And then they turn. In unison, they turn around to face me, and I look at them. I am horrified. I am horrified because these are not police officers at all. They are clowns. Literally, figuratively, in every way they are simply clowns. Clowns in uniform. In unison. In unanimity. Inhumanity. My worst nightmare. The cops were clowns.


Pepe was “only” a cat, but I made him a promise that I intended to keep. I would give him everything I longed for: keep him safe, keep him fed, make him well, I would give him love. Lots and lots of love. Unconditional love. Always. Until the day my perfect little angel would return to heaven. And I did. And he did. And we did. Alone, together, Pepe gave me strength when I was too weak to care for myself. He could not talk, but he sure tried!


After seventeen years, Pepe died the other day, and my worst nightmare did not come true. I loved him until the very end. Even then he gave me the most perfect and fitting gift. He gave me freedom. He gave me comfort. He gave me hope and he gave me peace.


I know that I can love. I am capable of complete, total, unconditional love. He was like a child. Pure, innocent and completely, totally, unconditionally loved. Yes, I am capable of love. I am capable of complete, total, and unconditional love. Pepe, my precious angel, may you rest in peace… There is a better place for you now. There always was.

5 comments:

Mya said…

I lack words to make a decent comment, but I will tell you that reading this made me cry

SimonRaven said…

I’m sitting here, half-asleep, reading this, and I’m just stunned by it. Feeling the pain, hurt, the depth… I’ve been through something like that, but a dog. A smart, loving, but sadly twisted dog that my partner and I both loved dearly. Tore my heart out so completely I was broken for I don’t know how long because I still feel it.

This is how much animals can feel your pain. Walking back from the “shelter”, so many moons ago, I encountered a horse, that felt my pain so sharply, it came over from 50 m away and nuzzled me, close enough I could pet his nose. It was enough comfort that I could make it home.

To top it off, I walked by a slaughterhouse where they were killing pigs. Pigs scream like humans…. I don’t eat pork.

Not competing, but sharing. Welal’in (thank you).

Anonymous said…

This post has been removed by a blog administrator.

Anonymous said…

This post has been removed by a blog administrator.

California Fire news said…

I really did not want to cry today
But I did
I feel so bad for you and Spotty, I could never do to my dog what your being forced to do…
I can only send good thoughts and love, for I am a thousand miles away and broke too.

I hope you find your way out of the darkness

via darknightdurant.blogspot.com

retro post — see… you can hack but you can’t hide.

“I will not be ignored, I wil not be forgotten.”

~ELyssa Durant, Ed.M.
11/20/2009-2011 

Elyssa Durant || Copyright 2011 || All Rights Reserved