Category: BIG BROTHER
Because NDAA has made us a de-facto police state, I wanted to obtain some realistic info on this Rogue Government’s stance on it being “ok” to kill certain individuals, without due process. This from YouTube, with Judge Napolitano.
Fema Camp Documents Leaked Published on May 13, 2013
Documents for our future home in a fema camp
Army hiring for these internment camps:
Executive Order — National Defense Resources Preparedness
Use the URL to view a plethora of links related to NDAA and some really creepy facts.
Seeds of death, [recently posted] needs to be viewed by everyone. The effects of these altered genes cannot be reversed. Reposted this; the original date is seen below.
GMOs — A Toxic Plume to Rival Your Worst Fears – FROM OFF THE GRID
We have addressed before the threats posed by genetically modified organisms (GMOs) in the food production system. We say “in the food production system” rather than “in food,” because these GMOs, once introduced into the environment, may have effects far beyond a particular genetically modified food and whether or not we eat it.
In a striking analogy, GMO researcher and activist Jeffrey Smith compares the spread of genetically modified material to BP’s massive oil leak in the Gulf of Mexico. As he points out, as devastating as the leak was, it could eventually be capped. In time physical and biological processes will break down the pollutants, however devastating a toll on wildlife is wreaked along the way. By contrast, genetic pollution not only spreads from one organism to another but, by definition, carries its own self-perpetuating mechanism. No new oil is being produced in Prince William Sound after the Exxon Valdez spill, and oil that does leave the ecosystem, as opposed to being trapped there, has moved a step toward degradation. GMOs, on the other hand, will continue to reproduce themselves and disperse until the time of their individual extinction or the end of life on Earth, whichever comes first.
Many maps of the prevalence of GM agriculture throughout the world are tied to national boundaries, since policies on GMOs are often set nationally. While useful for knowing where to apply pressure at the national level, such maps have two inherent flaws:
Global versions are less likely to account for local resistance to GM agriculture, struggles which may take place on the level of state or province, or as in Vermont, township by township.
Even more fatally, such maps fail to account for biology not generally respecting national boundaries — as Smith remarks in another context, dispersing bacteria don’t always read the signs.
One source of current (and apparently updated) dispersal data uses circular representations, good insofar as they break the connection of dispersion with national boundaries, more closely approximating how GMOs spread in nature.
To this, add the knowledge that GM agriculture acreage has increased by 10% just in the last year. Go ahead; try to visualize that. You will see a metastasizing growth at least as scary as the “plumes” from the BP oil leak or the crippled Japanese nuclear plants.
As noted, this plague of mutant foods and related organisms not only spreads beyond its theoretical boundaries, but reproduces itself throughout foreseeable time. Much of the discussion about the spread of genetically modified material focuses on plants and how their seeds and pollen are made for dispersal into all corners. Missing from any sources we were able to find online is projection of how intended dispersal of GMOs and the inevitable contamination of adjacent crops are affected by Earth’s patterns of wind and weather.
Transgenic animals are also part of the agenda of giant biotech. The latest issue to arise in the U.S. is the pending introduction of transgenic salmon. In the short term, if you are buying salmon, you probably already know that Pacific salmon, wild-caught, remains the gold standard for nutritional value and relative freedom from pollutants. For now, the new Frankenfish proposal covers only so-called “Atlantic” salmon—essentially all of which is already farmed (including regular infusion of antibiotics and dyeing its gray flesh to resemble natural salmon), and arrives at your butcher or fishmonger offering less protein per pound, along with more of the wrong kinds of fat—i.e., not the omega-3s valued in fish oil. (Hint: Practically all canned salmon is wild-caught and immediately canned at sea.)
Already on the market, of course, are dairy products from cows treated with rBGH, recombinant bovine growth hormone (it’s the recombinant part that involves genetic tinkering). In several ways the introduction of this genetically engineered hormone encapsulates the dangers of GMOs and of runaway corporatism.
Recombinant BGH is a direct threat to human health, according to the European authorities who banned it, because it increases Insulin-like Growth Factor 1 (IGF-1) in milk, posing a cancer risk increase of up to sevenfold.
Some of you will be familiar with use of IGF-1 for therapeutic purposes; without going deeper into endocrine chemistry than we are qualified to do, we’ll note that hormones are both powerful and wide in their reach, and the idea of introducing any hormonal modification into the general diet—particularly in this case as a matter of increasing yield and thus profit without regard to human health—is virtually impossible to justify by any scientific or ethical criterion. Other direct risks, including contamination of our gut flora, are detailed on Smith’s site.
Apart from direct threats, rBGH illustrates the kind of cascading effect such deep-level tinkering can have. The fiddled hormone makes cows lame and increases udder inflammation, which in turn invites infection—which are, of course, treated with increasing levels of antibiotics.
It is a system practically designed to breed antibiotic- resistant bacteria. So what arrives in the store? Milk contaminated not only with the artificial hormone and elevated IGF-1, but with pus from dairy cattle’s attempts to fight infection, plus the residue of veterinary- and industrial-strength doses of antibiotics.
This massive, uncontrolled experiment on human health comes to you courtesy of a long tradition: American industries and the government agencies that supposedly regulate them are connected by a revolving door of careerism.
In particular, Michael R. Taylor, former lawyer for and officer of one of the largest agri-giants, a global megacorporation that seeks to own the planet’s agriculture, manages to get periodically appointed to positions at the Food and Drug Administration—he’s back there now, overseeing food safety.
During his tenure from 1991-1994 he quashed all scientific opposition to approving use of rBGH in the food supply.
Consumers and producers familiar with this history may not have much hope for protection from any protective agency, certainly not at the federal level. Information, however, may be available through local agricultural extension programs, which may or may not have bought into the federal-corporate agenda.
Knowledge is probably your best ally in self-protection. We note also that both official and activist information sites on the web have been built with open-source tools. If there is a struggle or incursion going on in your area, you may be able to connect to or emulate online databases for other concerned citizens.
Sources and Resources
Non-GMO Shopping Guide is just what it says.
Mike Adams interviews Jeffrey Smith for NaturalNews.com. Smith quickly and lucidly lays out the range of currently known dangers from GMOs.
Food activist John Robbins gives more detail on the particular risks of rBGH, with research references, and expands on the sordid political history of its approval.
[a comment from this article]:
There is a food safety bill which is up for a vote, and it was originally S510 food safety bill, but now if you go to http://www.popvox.com, which is a website that will send your voice to the Senators etc.; the food safety bill is now S216 and what was originally the food safety bill under S510 is now something else.
Basically, from what I am understanding about this bill, they are trying to establish so many laws and regulations, that at any time they can stop small people from selling their food at farmers markets, and even from giving their food to neighbors, and if they so choose, to even stop people from growing their own foods.
Frankly this new legislation they are trying to set up is to pull the rug out from under the American people and force them to eat polluted foods and DNA damaging vaccines, etc. to go along with what is their “Agenda 21″ which I hope you will have someone look up.
These big multinational conglomerates need to be stopped, especially Monsanto, because they have so much money; with the economy as bad as it is, they are buying out seed companies and buying land to plant their polluted seed on, to destroy God, and what he’s created.
Please let people know they can vote on popvox.com and it will be sent to their Senator, if you want to. Thank you for all your constant awareness and warnings about what’s going on. Sincerely, Linda E.
In Google We Trust
By Geoff Thompson, Mark Gould, Mario Christodoulou
Updated September 10, 2013 10:45:00
Site has a video here that can’t be imbedded. Use URL to view:
Australians are among the most technically connected in the world, but do we know where our data goes and how it’s being used?
- Video: Interview with Danny O’Brien of Electronic Frontiers Foundation (Four Corners)
- Video: Interview with Troy Hunt, Internet Security Researcher (Four Corners)
- Video: Collusion Web Tracking Video – Popular Sites (Four Corners)
- Video: Collusion Web Tracking Video – Pappas Family (Four Corners)
In Google We Trust – Monday 9 September 2013
Every hour of every day, our digital interactions are being recorded and logged. We live in the age of ‘big data’, where seemingly mundane information about how we go about our lives has enormous value.
Next on Four Corners, with the help of expert data trackers, we follow the information trail of an ordinary Australian family. We follow their data over a typical day, watching as it is surreptitiously recorded by government agencies and private organisations.
Who gathers the information, what are they doing with it and what are your legal rights?
The internet has brought us conveniences once unimaginable. You can shop online, diagnose illnesses, and send ‘selfies’ whenever you want. But it isn’t all one way traffic. Every time you use a search engine like Google, or access an ‘app’ on your smartphone, your activity is logged by companies around the world – many you’ve never even heard of.
That sometimes intensely personal data is either used or sold to make money.
At one level this could be to your advantage. Marketing and advertising is ever more accurately tailored to your wants and needs.
“The sort of products you’re buying can tell a marketer an awful lot about what else you’re likely to buy, you know, what model of car you’re likely to buy, the political party you’re likely to vote for, you know, what sort of job you’re likely to have.” John Ostler, Data Marketer
But where does it end, and what are the consequences? Is your information secure? Not always, Four Corners reveals.
If your user patterns are valuable and being sold on the open market, should you have a say in it? Should you be told who your data is going to, and exactly how it is being used? If your data is being matched with other data for more valuable results, should you be informed?
Four Corners’ investigation reveals that not only are we being tracked online by marketers but Australia’s own government agencies are secretly monitoring our digital travels.
On the road, devices in your car are being logged to register your movements.
When you pass by a police car you will be surprised to discover what modern technology is discovering about you.
This kind of information is already being used in court cases, but public officials can access your data without a warrant and without your knowledge:
“That is one of the areas of law reform that we have to, I think, take the greatest interest in. Which agencies can access this material? What can they do with it? And where on earth are the courts… where’s the legal oversight that applies to a regular search warrant?” Scott Ludlam, Greens Senator
The digital detectives are in shopping centres too, where your movements can be tracked to provide a physical profile of where you go and what you do. Millions of Australians hold supermarket loyalty cards. The data you give away to get them is now being cross-referenced with data from banks to better predict your behaviour.
Companies like Google and Facebook know more about you than your family or your best friends. How did we get to this point and should we care?
No political party has ever explicitly sought your permission for this to happen.
It is a situation that alarms many experts:
“I don’t think any social system, any government, can survive knowing everything about its citizens without ultimately that being corrupted.” Danny O’Brien, Privacy Advocate
“In Google We Trust”, reported by Geoff Thompson and presented by Kerry O’Brien, goes to air on Monday 9th September at 8.30pm on ABC1. It is replayed on Tuesday 10th September at 11.35pm. It can also be seen on ABC News 24 on Saturday at 8.00pm, ABC iview and at abc.net.au/4corners.
Use URL if you want to view the information trail of an ordinary Australian family.
Schneier on Security Lime color font my emphasis “X”
A blog covering security and security technology.
September 15, 2013
How to Remain Secure Against the NSA
Now that we have enough details about how the >NSA eavesdrops on the Internet, including today’s disclosures of the NSA’s deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.
For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden. I wasn’t part of today’s story — it was in process well before I showed up — but everything I read confirms what the Guardian is reporting.
At this point, I feel I can provide some advice for keeping secure against such an adversary.
The primary way the NSA eavesdrops on Internet communications is in the network. That’s where their capabilities best scale. They have invested in enormous programs to automatically collect and analyze network traffic. Anything that requires them to attack individual endpoint computers is significantly more costly and risky for them, and they will do those things carefully and sparingly.
Leveraging its secret agreements with telecommunications companies—all the US and UK ones, and many other “partners” around the world — the NSA gets access to the communications trunks that move Internet traffic. In cases where it doesn’t have that sort of friendly access, it does its best to surreptitiously monitor communications channels: tapping undersea cables, intercepting satellite communications, and so on.
That’s an enormous amount of data, and the NSA has equivalently enormous capabilities to quickly sift through it all, looking for interesting traffic. “Interesting” can be defined in many ways: by the source, the destination, the content, the individuals involved, and so on. This data is funneled into the vast NSA system for future analysis.
The NSA collects much more metadata about Internet traffic: who is talking to whom, when, how much, and by what mode of communication. Metadata is a lot easier to store and analyze than content. It can be extremely personal to the individual, and is enormously valuable intelligence.
The Systems Intelligence Directorate is in charge of data collection, and the resources it devotes to this is staggering. I read status report after status report about these programs, discussing capabilities, operational details, planned upgrades, and so on. Each individual problem — recovering electronic signals from fiber, keeping up with the terabyte streams as they go by, filtering out the interesting stuff — has its own group dedicated to solving it. Its reach is global.
The NSA also attacks network devices directly: routers, switches, firewalls, etc. Most of these devices have surveillance capabilities already built in; the trick is to surreptitiously turn them on. This is an especially fruitful avenue of attack; routers are updated less frequently, tend not to have security software installed on them, and are generally ignored as a vulnerability.
The NSA also devotes considerable resources to attacking endpoint computers. This kind of thing is done by its TAO — Tailored Access Operations — group. TAO has a menu of exploits it can serve up against your computer — whether you’re running Windows, Mac OS, Linux, iOS, or something else — and a variety of tricks to get them on to your computer. Your anti-virus software won’t detect them, and you’d have trouble finding them even if you knew where to look. These are hacker tools designed by hackers with an essentially unlimited budget. What I took away from reading the Snowden documents was that if the NSA wants in to your computer, it’s in. Period.
The NSA deals with any encrypted data it encounters more by subverting the underlying cryptography than by leveraging any secret mathematical breakthroughs. First, there’s a lot of bad cryptography out there. If it finds an Internet connection protected by MS-CHAP, for example, that’s easy to break and recover the key. It exploits poorly chosen user passwords, using the same dictionary attacks hackers use in the unclassified world.
As was revealed today, the NSA also works with security product vendors to ensure that commercial encryption products are broken in secret ways that only it knows about. We know this has happened historically: CryptoAG and Lotus Notes are the most public examples, and there is evidence of a back door in Windows. A few people have told me some recent stories about their experiences, and I plan to write about them soon. Basically, the NSA asks companies to subtly change their products in undetectable ways: making the random number generator less random, leaking the key somehow, adding a common exponent to a public-key exchange protocol, and so on. If the back door is discovered, it’s explained away as a mistake. And as we now know, the NSA has enjoyed enormous success from this program.
TAO also hacks into computers to recover long-term keys. So if you’re running a VPN [NOTE VPN= Virtual Private Network "X"] that uses a complex shared secret to protect your data and the NSA decides it cares, it might try to steal that secret. This kind of thing is only done against high-value targets.
How do you communicate securely against such an adversary? Snowden said it in an online Q&A soon after he made his first document public: “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”
I believe this is true, despite today’s revelations and tantalizing hints of “groundbreaking cryptanalytic capabilities” made by James Clapper, the director of national intelligence in another top-secret document. Those capabilities involve deliberately weakening the cryptography.
Snowden’s follow-on sentence is equally important: “Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.”
Endpoint means the software you’re using, the computer you’re using it on, and the local network you’re using it in. If the NSA can modify the encryption algorithm or drop a Trojan on your computer, all the cryptography in the world doesn’t matter at all. If you want to remain secure against the NSA, you need to do your best to ensure that the encryption can operate unimpeded.
With all this in mind, I have five pieces of advice:
Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it’s work for them. The less obvious you are, the safer you are.
Encrypt your communications. Use TLS. Use IPsec. Again, while it’s true that the NSA targets encrypted connections — and it may have explicit exploits against these protocols — you’re much better protected than if you communicate in the clear.
Assume that while your computer can be compromised, it would take work and risk on the part of the NSA — so it probably isn’t. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the Internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my Internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it’s pretty good. [X - love this idea; if you have the funds to get an additional computer, I'd hop on this idea! ]
Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It’s prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.
Try to use public-domain encryption that has to be compatible with other implementations. For example, it’s harder for the NSA to backdoor TLS than BitLocker, because any vendor’s TLS has to be compatible with every other vendor’s TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it’s far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.
Since I started working with Snowden’s documents, I have been using GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit, and a few other things I’m not going to write about. There’s an undocumented encryption feature in my Password Safe program from the command line; I’ve been using that as well.
I understand that most of this is impossible for the typical Internet user. Even I don’t use all these tools for most everything I am working on. And I’m still primarily on Windows, unfortunately. Linux would be safer.
The NSA has turned the fabric of the Internet into a vast surveillance platform, but they are not magical. They’re limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible.
Trust the math. Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That’s how you can remain secure even in the face of the NSA.
This essay previously appeared in the Guardian.
EDITED TO ADD: Reddit thread.
Someone somewhere commented that the NSA’s “groundbreaking cryptanalytic capabilities” could include a practical attack on RC4. I don’t know one way or the other, but that’s a good speculation.
To receive these entries once a month by e-mail, sign up for the Crypto-Gram Newsletter.
Several links on this subject added below this post.
Posted by Bob Lee
SPAM E-MAILS CONTINUING TO CAPITALIZE ON FBI OFFICIALS’ NAMES
The FBI continues to receive reports of spam e-mails that use FBI officials’ names and titles in online fraud schemes. Although there are different variations of these schemes, recipients are typically notified they have received a large sum of money. The latest round of e-mails uses the name of new FBI Director James B. Comey.
Some of the e-mails reported to the Internet Crime Complaint Center continue to use the alleged “Anti Terrorist & Monetary Crimes Division” of the FBI. All e-mails encourage the recipient to send money for various reasons.
Do not respond. These e-mails are a hoax.
Neither government agencies nor government officials send unsolicited e-mail to members of the public. United States government agencies use the legal process to contact individuals.
The public should not respond to any unsolicited e-mails or click on embedded links in these messages because they may contain viruses or malicious software.
If you have received a message that purports to be from the FBI, disregard its instructions and file a complaint at www.IC3.gov.
For previous IC3 alerts concerning e-mail scams targeting the FBI and other government agencies, visit: http://www.ic3.gov/media/default.aspx.
Posted by Bob Lee
Posted by Bob Lee
Posted by Bob Lee
This one in its entirety:
Posted by Bob Lee
I’ll Pay For Your First month! Plain & Simple.
Ok … so what’s up with this one … right?
We all know when something has value, we share it with others (especially when it’s something funny).
It spreads like wildfire from one person to the next.
Next thing you know, people are talking about this thing that made them smile and its on Youtube, being shared in email, tweets, facebook and what have you.
Who would’ve thunk?? And …
Even though it happens over and over again – repeatedly (especially on you-tube video’s) it still AMAZES me to no end.
I know it’s as simple as hitting the Share Button on this App – but still …
You guys are blowing me away with this!
So … Once you decide to stay onboard from the second month on … the first month is on me! (how can you pass that one up?)
Now for the Twister …
Work from Home and Other Job Scams
BBB Warns Against Twitter Money-Making Schemes Through Tweets, e-mail and web sites, job hunters are being told that they can make lots of money from the comfort of home using Twitter and Better Business Bureau warns that the large print for such offers may promise big returns but the fine print can cost them every month.
BBB Warns Job Hunters to Steer Clear of Rebate Processing Job Scams Better Business Bureau is warning job hunters to beware of opportunities to work from home processing rebates. While the job offer may claim that people can earn up to a thousand dollars a day without leaving the comfort of their home, BBB has received hundreds of complaints from victims nationwide who never earned a dime and were, in fact, ripped off for hundreds of dollars in upfront fees.
BBB Warns of Craigslist Job Scam A bogus employment opportunity scam has surfaced on Craigslist claiming to offer a job with the Better Business Bureau. Scammers are posting fake advertisements for employment opportunities for a Data Entry Clerk at Better Business Bureau in regions across North America.
Enigma for Consumers: What Mystery Shopping Jobs? An operation that told consumers they could be hired as mystery shoppers and earn a substantial income, and the telemarketing firm working for them, are facing Federal Trade Commission charges that their claims about job availability and income potential were deceptive.
How I Got Taken by a Work-at-Home Scam Work-at-home-scams are on the rise, consumer watchdog groups say. Scammers are busier than ever because tough economic times are making people more desperate to make money.
Post Office Job Offers from Classified Ads Bogus The Federal Trade Commission has charged an employment-opportunity scammer and his companies with marketing a fraudulent U.S. Postal Service (USPS) employment program. Through advertisements and telephone pitches, the defendants misrepresented that they were connected with or endorsed by USPS; that postal jobs were available; that customers would receive study materials that would help them pass the postal entrance exam; and that customers who pass that exam were assured jobs with USPS. In reality, none of these claims are true
Stay Informed …
p.s. Take a peek
A Call to Arms: It’s Pitchforks Now or Gulags and Mass Graves Later
About the author: John Kirkwood is a son of Issachar. He is a Zionist, gun-toting, cigar-smoking, incandescent light bulb-using, 3.2 gallon flushing, fur-wearing, Chinese (MSG) eating, bow-hunting, SUV driving, unhyphenated American man who loves his wife, isn’t ashamed of his country and does not apologize for his Christianity. He Pastors Grace Gospel Fellowship Bensenville, where “we the people” seek to honor “In God we Tr … [read John Kirkwood's FULL BIO]
CAVEAT EMPTOR: This column is not calling for violence, but for the capacity for violence, for righteous indignation, for the means to defend the unalienable rights that were enumerated by our fathers, passed down by our Holy Father, and now stand in jeopardy.
“Yours is the party that ‘hates’ government,” responded a rather animated critic to one of my recent lectures. “No, I don’t hate government,” I wrote in response, “I love it. I love the government that the founder’s dreamed, planted and brought to fruition. What I hate is government that is intrusive beyond its bounds and abusive above its charter. I hate government that calls good “evil” and evil “good,” and that would punish the righteous and bless the wicked. It’s quite simple friend: I hate tyranny.”
Imagine sitting on the floor of your living room watching your older brother trying to tune the Grundig into the big station from Berlin when the static breaks and you hear the serious, slightly animated voice of Dietrich Bonhoeffer. Your brother turns to you and says, “Get Dad!” A moment later the whole family rushes into the room and each one takes their place around the radio. Things have been dark lately, you can tell by the talk at the dinner table. Your father has a heavy heart, your mother smiles frequently to hide her concern, but Sunday’s after church are different, Dietrich is on.
The one voice that is unafraid. The one that stands like Gibraltar, unwavering against the momentum of the tide that is sweeping across Germany. And then he’s gone, cut off in mid sentence. You look to your father, everyone in the room, looks to him. He bows his head, he walks to the radio as the approved voice rattles inanities and he turns the knob to off. The looming darkness has enveloped the motherland. Now you know for sure, tyranny is the new normal.
When the above scenario plays out in America, you will know too. Oh, there will still be “conservative” shows on the air and many churches will go on just as they did yesterday. Krauthammer and Kristol will still be on the panel, Medved still on the air, Osteen and Warren still appearing on THE VIEW, but when Rush Limbaugh and Glenn Beck are off the air and you can’t find ClashDaily.com, you’ll know where you are, but will you know what to do?
It’s time that Americans made some tough decisions? How do you know if you’re attending the right church or supporting the right ministry? Would they still be open or allowed to operate under tyranny? If they aren’t speaking now, if they don’t “bother” with “politics,” then you’ll be just fine; you just might have to sing a little louder when the trains roll by.
In a panel discussion on religious freedom and the Supreme Court at the Religion Newswriters Association Conference in Austin, Texas, Eric Teetsal remarked in an opening statement, “Religious freedom is the right to ask questions of ultimate significance, and live in light of the answers. It consists of an unconstrained mind and unconstrained body: the freedom of orthodoxy, belief consistent with doctrine, and of orthopraxy, behavior that conforms with ones beliefs.
Conforming mind and body to ones most deeply held religious beliefs is a basic human right, worthy of utmost protection.
For this reason, religious freedom is America’s “first freedom”. Enshrined in the free exercise and establishment clauses that make up the first part of the First Amendment, freedom for religion is the foundation of all that comes after. After all, if the State can tell you what to believe, or deny your ability to live in accordance with your beliefs, what can’t it do? What’s to stop it from telling you what to read? Or what to write?”
Since Obama took office we’ve witnessed open hostility to all things sacred. The U.S. Air Force, as just one example, is now openly promoting Wicca and proselytizing homosexuality while at the same time driving out Christians and breathing out threats and destruction to those that don’t conform.
It’s shocking to me just how many otherwise intelligent people are openly mocking the Affordable Care Act as a failure. Friends, Obamacare is not a failure. It is doing exactly what it was meant to do just as a stick that is plunged into the spoke of a wheel will always have a conspicuous consequence. And the bad news is that we’ve just flown over the handlebars. The issue is not the poor implementation of the Affordable Care Act; the issue is the nearly flawless implementation of Cloward/Piven.
This country is moving at warp speed toward the tyranny and tragedy that up until now was only experienced by Americans as they read history or watched international news. Few are calling it for what it is, and even fewer are preparing to derail the train – “for the shepherds have become brutish and their flocks, scattered.”
How did we get here? We have forgotten God and we’ve forsaken our own history. Agnosticism and amnesia are a toxic combination.
The founders too once hoped that relief would come from votes in their Parliament, but there came a time when they realized that the parliament was a dead end and that they’d have to secure their own path to freedom. That time is fast approaching, again.
The best hope would be that Washington, Hollywood and New York reject their worldview and turn again to the inspiration of freedom anywhere in the world but I’m really not holding my breath for a religious revival and Ninevah like repentance from the likes of Obama, Pelosi and Reid. The next best hope is that Americans flex their freedom and continue to arm themselves to the teeth. Buy so much ammo that it makes the DHS look like Handgun Control Inc.
Let them “count the cost” of what it will take to herd the 300 into the cattle cars or let them come and take them. “When the strong man fully armed guards his own house, his goods are in peace.”
My advice to the tea party? – Save your breath, we’re beyond the time for petition and remonstrance. Order a custom made guillotine, made in America by Americans for Amerikans. Every tea-party group in the country should order one and take a group picture around it and then send it to your Cenataurs and Reprehensibles for inspiration.
Throw in a Bible and a copy of The Federalist Papers and let them contemplate their destiny.
Flabbergasted – adjective – Synonyms amazed, astonished, astounded, awestruck (also awestricken), bowled over, dumbfounded (also dumfounded), dumbstruck, flabbergasted, shocked, stunned, stupefied
My last two posts, led to this posting. The Tea Party Economist – Secession and County Rights - (Gary North of Tea Party Economist) dealt with fledgling secession movements by counties. He suggested that they use a slogan called county rights. This is about freedom at the local level. The article led me to American Vision’s county rights project - I posted several items directly from that site, which glared out at me like a neon sign.
Most of us are quite aware of the many issues we face at the national and global level. That our basic freedoms are in dire jeopardy is old news. Just as the need to correct fraudulent voting -courtesy of the digitalization of the voting process- needs to be done at the local (precinct) level, many other personal rights are under attack.
I was stunned by the Federal Government’s intrusions of other rights concerning public lands, the resultant impact of local county economies, and the negative impact on people living in the areas affected. This video is one eye-opening revelation of why we need to mobilize at the local level, and how local sheriffs can be the vanguard to reverse government tyranny.
The Travel Management Plan (watch the video) is a four letter word as far as our freedom is concerned; it exists if you have U.S. Forest Service lands or federal lands that are in the hands and managed by the Federal Government.
Bear in mind that the Federal Government owns nearly 650 million acres of land – almost 30 percent of the land area of the United States.
This hour long video is worth every second. This a great start to recovering localism. The model should be emulated and expanded upon in every county.
When the people fear the government, there is tyranny. When the government fears the people, there is liberty. Thomas Jefferson
Find the federal lands in your state and county:
Hmmm… pulling your credit report quarterly – How about only keeping ONE credit card, and perhaps a gas card in your wallet; any others to be kept in a secure place where thieves aren’t likely to look? Think “outside the box” on this one, an unconventional place that only you know about, not in the dresser drawer, or your desk. Because of technology, I purchased an RFID secure wallet. http://superstore.wnd.com/specialty-items/RFID-Blocking-Flip-Up-Wallet-Black-Leather http://superstore.wnd.com/specialty-items/RFID-Blocking-Flip-Side-Wallet-Black-Leather Also, (for those of us who can afford to travel) http://superstore.wnd.com/specialty-items/RFID-Blocking-Passport-Case-Black-Leather
Never allow your computer or services that you are using (such as Google, Internet Explorer, etc.) to “remember your user id” and/or password. Take the moments it takes to enter them yourself each time you use your computer.
The rule that you must have your registration and insurance info in the car is irksome, and another vulnerability, if it is broken into. (I don’t use a car alarm. There are simple, common sense alternatives for this issue that for obvious reasons, I won’t post).
Don’t be sucked into “going paperless” F**k that noise! Its convenience is outweighed by the common knowledge that companies, and even Gov’t systems have been hacked; figure that they employ far more sophisticated security measures than you have at your disposal. This factoid was in their comments: In 2012 over 300,000 SC citizens tax files were compromised when security measures weren’t updated by the government.
I accept e-mail notices from utilities, but pay for them at the local store, or use “snail mail” (the phone company charges a fee if you pay at your local store’s service counter).
I don’t have a laptop; however, even if I did, I wouldn’t use Wi-Fi hotspots. The need to access the Internet in a public place escapes me.
This useful item was in their comments: It probably goes without saying, but never give any information to anyone you don’t know who calls you on the phone, no matter who they claim to be. Even with caller ID, unless you positively recognize the number as belonging to an institution you do business with and trust, you have no way of knowing who is really on the other end of the line.
Lastly, -Re social sites privacy settings-, remember that Google owns YouTube, and is present in the “works” of other sites, including WP, whether they bother to acknowledge this or not. Other suggestions/comments are welcome. ”X”
Privacy is a big deal for me and my family. I need to protect our privacy AND still be visible to my customers and clients that depend on me for critical information. So I’m constantly reading up on how the scammers and government spies are stealing our information.
Of course the most common crime perpetrated by these lowlifes is identity theft. It’s a $50 billion a year industry and the most prevalent crime in America right now. There is literally an army of people across the globe trying to snatch your critical information and your money.
Here are a few steps to foil the ID thieves:
Shred everything. And I do mean everything. ID thieves, often fueled by methamphetamine drug addiction, can piece together small bits of junk mail and other information that might seem innocent to you. They can use this to pull credit in your name.
Monitor your credit. Services like Identity Guard and Lifelock are pretty good at securing your credit report and letting you know when something new pops up. But you need to stay on top of it too. Pull your report at least quarterly and note any changes that seem fishy. Dispute anything and everything that seems inaccurate or suspicious.
Create a verbal password at your bank. Most banks are adopting this security measure now, but you can insist that your bank do it now or lose your business. Create a password that you can remember and make sure that the bank asks for it before any withdrawals, wire transfers, check orders, and any personal info is given out. Scammers often call the bank and pretend they are you to get critical bank information. Make sure your bank knows that you want to be password protected and notified of any suspicious activity on your accounts.
Keep your information out of the public eye. Take your name off the mailbox. Turn on ALL of Facebook’s and Google’s privacy settings. Never make your family tree public, thieves can do a lot of damage with your mother’s maiden name. Keep your name out of Who’s Who lists, they are a detailed biography of usually pretty successful people and ID thieves farm them for names.