Search Blog Posts

Wednesday, October 22, 2014

US Govt Terrorist Group - National Endowment for Democracy (NED) - Created under President Reagan

The NED being a US agency and the largest sponsor of terrorism in the world, why aren't the American people deserving of knowing its real mission - the destabilization, subversion and destruction of foreign sovereignties under the false banner of "democracy"? Why hasn't the Republican 'conservative' congress investigated its terrorist activities?


Who is Carl Gershman (CFR), where did he come from?


Carl Gershman (pictured, second from left) has been
the President of the National Endowment for Democracy
since its beginning in 1984. In this picture, he presents
the 2011 Oxi Day Award to Jamel Bettaieb for his
leadership in Tunisia's Arab Spring.(Isn't that Chris Mathews?)
Carl Gershman (wikipedia) (born July 20, 1943) has been the President of the National Endowment for Democracy since its 1984 founding. He had served as the U.S. Representative to the U.N.'s Committee on human rights during the first Reagan Administration.

HOW THE US TAXPAYER FUNDS THE ENEMIES OF AMERICA

Published by Charleston Voice, February 22, 2013

 US TAXPAYER FUNDING OF THE LEFT, Extensive List of  1,100+ Groups & How You Pay for Them
This is a remarkable site with an extensive database of groups, people, categories, and their sources of income which we pay for. It is a searchable site also. Highly recommend you save this most informative source on your hard drive or bookmark for ready reference. I have already spent several hours reviewing it! 

Also read:  The NED - A US Congress & State Dept  Conduit for Funding Subversion & Violence in Foreign Nations

US Congress & State Dept Use IRS Tax Shelters to Fund Terrorist Attacks Against Foreign Nations

Posted by Charleston Voice, staff report

The NED - A US Congress & State Dept Conduit for Funding Subversion & Violence in Foreign Nations

This betrayal of friendly nations by our own Government is disgusting.


Also:  HOW WE FUND THE ENEMIES OF AMERICA


by Michel Chossudovsky 
The cooperation of the leaders of major opposition parties and civil society organizations in anticipation of the collapse of an authoritarian puppet government is part of Washington’s design, applied in different regions of the World. link to Anarchitext

Entrepreneur Creates Super Low Cost, Cashless Grocery

This can work, but only if the government is blocked from any regulation, direct or indirectly through surrogates. We await patiently for the corporate lobbyists to get the government to come down hard on GoodWill stores. We are not optimistic state legislatures will nullify federal intrusion laws. We still have many, many miles to go before we sleep.

 

By: Joshua Cook Oct 22, 2014

 

An entrepreneur in Great Britain is creating the first cashless supermarket, appealing to people on government aid and in poorly-paid jobs.

Stelios Haji-Ioannou is the creator of easyFoodstore budget supermarket. He also created bargain airline easyJet and windowless rooms at easyHotel.

The no-frills food and service will also eventually not take cash. A spokesperson for the store told the Daily Mail that its easier to process card payments than to cash up every day and pay a security firm to bank it.

The company also said that to compete with stores like ALDI the wages will be low.

‘We are aiming to be a low-cost supermarket so we need to keep costs low, property rent has got to be low, stock prices have got to be low and, inevitably, we will be looking towards the bottom end of the salary scale for employees,” said a spokesman.

And the cost will be incredibly low.

All goods will be unbranded ‘with white labels’ and will cost an average of 50p per item.

It will sell frozen and dried food, and only a few fresh items such as milk, bread and possibly fruit.

Do you think America could use a store like this? Please comment below.

via benswann

Faith Without Works



Faith Without Works
by R. J. Rushdoony

James, the brother of our Lord, tells us very emphatically that "faith without works is dead" (James 2:26). I thought of this recently when I heard an older man speak of the "old days" when silver dollars were the only kind of money in circulation in this area, and good men refused to take paper dollars in change. Such paper money was despised as "funny money" and as likely sooner or later to lose value. This attitude was commonplace when I was a boy farmers, ranchers, and miners carried deep leather pouch purses in their jeans to hold "decent" money, silver change and silver dollars.

Then I asked my one and only question of the old man: did you save some of those silver dollars? His answer was brief: 

"Nope. Sure wish I had. They're worth a lot of money these days." 

He went on to say that he had known all along that silver dollars were real money, and paper money would "belly up." 

But did he? I thought of him two nights later, as I read James 2:26. His "faith" in silver was worthless, and his paper assets are steadily depreciating; he was grumbling about how much harder it is to make ends meet financially. Scripture is right: faith without works is dead and worthless.

To say we believe in the Lord, and to continue living as though the world is governed by statism, money, or evil, is to profess a dead faith. Too many people who profess to believe in the Lord act as though the living God does not govern the world, or that He is not both Savior and Lord.

A faith with works moves in terms of Joshua 1:2-9. In the confidence of God's word and victory, it moves out to possess the land for the Lord, in the bold confidence that His word is true, when He says, "I will never leave thee, nor forsake thee. So that we may boldly say, The Lord is my helper, and I will not fear what man shall do unto me" (Heb. 13:5-6). (May, 1981)

Taken from Roots of Reconstruction, p. 106.

Teaching Is a Dialogue Not a Monologue

Andrea Schwartz

October 20, 2014

Everyone is a teacher in some capacity in life, whether or not you get paid for your services. Whether it is parenting, tech support, customer service, counseling, medicine, law, sales, or preaching, there is some element of instruction that takes place as we interact with each other. Two-way communication is a necessity to ensure that what we want to convey is received and understood.

Whereas very few would disagree with my premise, when it comes to practice and application, people tend to engage in monologue rather than dialogue. By placing more emphasis on what they have to say, rather than striving to make sure they are understood, two-way exchange often is sacrificed. What results can be a false sense of satisfaction that our point has been made. In order to have true instruction occur, feedback from the listener is vital.

Let’s say you are eager to have some parents change their perspective when it comes to the education of their children. You could approach them armed with all the data that shows that students from Christian day schools or homeschools achieve higher test scores. Or, you could cite the crimes and anti-social behaviors that are prevalent in the state schools. After delivering your “speech” you might be dumbfounded that these parents continue to send their children to state schools. The problem, of course, is the monologue approach. Without making use of perceptive questions and listening to the answers given, it is easy to “miss the boat” when it comes to unearthing parents’ biases and presuppositions.

Or, suppose you want to convey to your children the necessity of knowing God’s law and how to apply it in their lives. You could teach or lecture them on what you want them to learn, but if they are not asking questions and discussing the material with you, you haven’t succeeded in penetrating past the most superficial layers of their understanding.

For those of us who teach as a major aspect of our daily lives, it can be a temptation to say what we wish to say and assume we have done our jobs. However, a teacher who is not open to questions will diminish the potential success of the learning experience. Some are hesitant because they might not know the answer to a specific question. Trust me, this is a good thing. You can always say in honesty, “I don’t really know, but I will do my best to find out.” This elevates the teacher in the eyes of the student rather than demeaning him.

No one knows everything, but we do know the Source who does. When we presuppose that God’s law-word speaks to every area of life and thought, there is no reason to shy away from questions or challenges. What’s more, as we grow in our sanctification, earnestly pursuing the understanding and application of God’s law, we ensure that there will be fewer times that the answers to questions posed will evade us.

Christ engaged in this kind of interchange with His disciples, being willing to receive their questions. His method of discipleship involved a steady dialogue in order to train them to be useful in His Kingdom. Even the Word of God tells us to ask, seek, and knock, inviting us to interact with the triune God. We’d do well to imitate Him as we interact with others.

via thekingdomdrivenfamily

Tuesday, October 21, 2014

If You Are Sick of Surveillance, Safeguard Your Systems

Tuesday, 21 October 2014

Written by  Mitchell Shaw

Thanks to the Snowden leaks, most people don't need to be convinced that data-mining by government agencies and irresponsible corporations is a real problem that threatens our liberties in the digital age.  Fortunately, technology is an equal-opportunity tool. Remember that Snowden was able to keep himself and his communications from prying eyes while making not just one, but a series of revelations to journalists. The technologies he used are used by millions every day. They are easily available and largely free to download. Obviously, addressing all that needs to be done and how to do it is beyond the scope of any one article. This article will give you a good place to begin closing the door on those who would violate your online privacy, but it is up to you to learn more. Do an Internet search for the tools listed here, and you will find a trove of tutorials and YouTube videos to help you along the way. Using these tools may involve an uncomfortable learning curve, but the payoff is worth the effort.

Before addressing those technologies, a look at the nature of “Open-Source” software may be helpful.  In simple terms, open-source software is licensed in such a way that its source code is available for anyone to view, audit, modify, and redistribute. Because the open-source community is so large and diverse, the likelihood of anything nefarious being hidden in the code is at or near zero. Another benefit of open-source software is that where vulnerabilities exist, they are more quickly discovered and patched as a community of thousands of people works to solve problems. That is why viruses, which are such a problem for Windows and, to a lesser degree, Mac, are unheard of for Linux.

Linux is a great alternative to Windows for those seeking a more secure and liberty-friendly "Operating System." Because it is open-source, there are many different “flavors” (called distributions) available.  Two of the most popular distributions are Ubuntu and Fedora. They can be downloaded for free from www.ubuntu.com and www.fedoraproject.org. A fairly complete list of Linux distributions can be found at www.distrowatch.com.

While replacing Windows (or Mac) with Linux is the first step in securing your information, it is by no means sufficient in itself. Encrypting your hard drive should be the next step. Encryption turns the data on your hard drive into an unintelligible string of random characters until the correct password is entered. The protection offered by encrypting your hard drive is only as strong as your password, and though the encryption cannot be broken, a weak password can be broken within minutes using a brute force attack. A good password should be long and include uppercase and lowercase letters, numbers, and symbols. All encryption is not equal, as we now know that many encryption software companies have been pressured by the NSA to provide backdoors. Because of this and the closed-source nature of many of these programs, you should only use open-source encryption. Luckily, most Linux distributions include encryption as part of the installation process.

Now that you have a secure operating system and an encrypted hard drive, it's time to look at the way you use the Internet. Never put anything on the Internet that you would not want to see on the front page of your newspaper. That applies not just to social media, but also to online backup and storage. As the recent hacking and subsequent leaking of intimate celebrity photos stored on Apple's iCloud service demonstrate, once it leaves your hands, it leaves your control. Regardless of the privacy agreements or security promises of these providers, it is up to you to protect your data. Besides, most social media and online backup and storage companies are more than willing to cooperate with government snooping.  Dropbox recently announced Condoleezza Rice as the newest member of its board. It also keeps backups of files months after you delete them and even after you close your account. One way around this is to encrypt any file you backup or store online. A good tool for this is 7zip, which is available as a free download in most any Linux distribution. Another solution is to switch your online backups to a service that offers “zero knowledge” storage. One such service is SpiderOak, which offers encryption for which only you have the password. They cannot even see your data, not to mention allow anyone else, including government agencies, to see it. If required to turn your data over to a government agency, all they would be able to turn over would be the encrypted files and folders.

E-mail is a very insecure form of communication, as it can be intercepted quite easily. It is like sending a postcard through the mail. Anyone, anywhere along the way that intercepts it can read it. The ultimate solution is to encrypt your e-mail. Open-source GPG e-mail encryption is easily installed and is fairly easy to set up. Once you have it set up and get used to using it, the process is fairly transparent. Soon enough, you will forget you are even doing it, and your e-mail becomes inaccessible to snoopers, government and otherwise. Encourage your friends and family to begin encrypting their e-mails, as well.  The more normal it becomes, the more people will do it and the more privacy we will all have.

As far as browsing the Internet, the bare minimum security would be to use a browser such as Firefox, which can be downloaded for free at www.mozilla.org. It is much more secure than Internet Explorer right out of the box, but there are some things you can do to make it even more secure. Download and install the HTTPS Everywhere plugin. This will force a secure connection on all sites that offer it. It is not perfect, but it is the same level of security/encryption used by banking websites. Disable third-party cookies and set up Flash to only run on sites you approve (a process called whitelisting). Flash is notoriously insecure and should only be used with caution.

For the ultimate security while surfing the web, you want to be completely anonymous. For that, there is Tor, which stands for The Onion Router. This service uses layers (like an onion) of security and encryption, routing your Internet traffic through a series of servers (called nodes) and creating a fake IP address at each point along the way. The result is that, when used properly, Tor creates real Internet anonymity. The websites you visit have no idea who you are and you cannot be tracked. This is the method Snowden used to contact The Guardian and leak the information on NSA spying. Tor is also available as part of a complete Linux distribution called T.A.I.L.S. (The Amnesic Incognito Live System), which runs only from a disc or USB drive. It leaves no trace of having been used and shuts down immediately if the disc or USB drive is removed.

Mobile devices are becoming easier to secure, as well. For many Android devices there are several after-market versions of Android available for those willing to root their devices. Cyanogenmod is perhaps the most popular and certainly one of the most secure. It is free to download at www.cyanogenmod.org. There are risks to rooting your device, however,  and if it is not done correctly, it can make the device unusable. In the security settings of all Android devices there is the option of full encryption. For encrypted phone calls and texts on Android, there are applications available. TextSecure and RedPhone, both by Whisper Systems, are two of the best. Apple has claimed that new iPhones are able to be encrypted in a way that puts total control in the hands of the user. Since their software is closed-source, then believing this claim is a matter of trust, and Apple does not have the best record for being trustworthy. There are applications that claim to provide encrypted calls and texts for iPhone, as well, such as Babel, iCrypter, and CoverMe. Again, it's a matter of trust as to whether these tools are effective. There is one open-source solution for encrypted calls on iPhones. It is Signal, by Whisper Systems, the developers of TextSecure and RedPhone for Android.

There are many more tools available, but if you use those listed here properly, you will go a long way toward making yourself much harder for the NSA or irresponsible corporations to track and monitor. Unless you are a specific target, the tools outlined here are probably sufficient to shut the door in their faces and regain your privacy and security.

via TNA

How the Local Police State is Caused by the Federal Government

With the sight of cops in Ferguson, Missouri and Boston resembling totalitarian warriors out of a stereotypical dystopian novel, many Americans have become alarmed at the apparent transition of law enforcement to a role as an occupation force.

They also wonder where the police got the money to pay for it.

According the Center for Investigative Reporting, the answer is that most of it comes from the federal government. In the past decade alone, police departments throughout the country have received a total of $34 billion in federal grants.

Police getting new toys on the fed’s taxpayer’s dime is nothing new. Ever since the War on Drugs was declared in the 1970s, the feds have offered equipment and resources to local law enforcement agencies to help enforce their unconstitutional laws.

SWAT-team methods converged with the drug war.

Enter the SWAT teams, once a rare sight, usually in an urban city rife with crime or civil unrest, now a staple in every community. In 1983, only 13 percent of cities with populations of 25,000-50,000 had a SWAT team. By 2005, it had reached 80 percent.

At the same time, the U.S. saw a massive increase in no-knock raids, from negligible in the early 1970’s to 70,000 in 2010. The current rate is about 150 such raids every day.

The War on Terror has only increased the flow of money, with billions of dollars since 9/11 going from the feds to local police in the form of Homeland Security grants. In 2011, the Pentagon gave away $500 million as part of a program for improving law enforcement capabilities.

Mind you, this was just one program.

DHS grants allow police in small rural towns, with virtually no crime, to obtain equipment, weapons, and vehicles more fitting for a battlefield than Main Street.

In Fargo, N.D., the police received a $256,643 armored truck with a rotating turret, kevlar helmets and assault rifles they carry with them as they patrol the streets in their squad cars.

The rationale? They needed to be prepared for a terrorist attack. Operating from a “what-if?” premise, police inevitably seek out more advanced vehicles, weaponry, and gear for what they perceive as a necessity to respond to any potential attack, no matter how unlikely it is to occur.

In fact, most of the equipment goes unused. When it is, it’s used for incidents for which they are totally unnecessary, such as a raid on an Amish farmer’s property by a SWAT team from the Food and Drug Administration property for the seemingly horrendous crime of selling raw milk.

These grants are also used to carry out surveillance. Earlier this year, the Santa Monica Police Department received nearly $800,000 from DHS to purchase an automated license plate reading system and equipment in the event of an urban riot.

Most disturbingly, the police are using the equipment to target political dissidents. Last year, Concord, N.H. police filed an application to DHS asking for over $250,000 to purchase a BearCat, an armored personnel carrier. What made it all the more disturbing was the police chief’s motives, claiming they needed it due to the perceived threat of “domestic terrorists” such as the Free State Project and Constitutionalists. Though the DHS approved the application, application was withdrawn after it was published and public outrage grew.

Then there’s the growing use of StingRays, a phone tracker that tricks a cell tower into providing information about a cell phone user. This, too, is paid for mostly by DHS grant money.

While many Americans see police militarization as a local problem, it is merely a symptom. A combination of unconstitutional laws, flawed foreign policy, and corrupt use of taxpayer dollars is the real root-cause.

While the police departments are to blame for their individual actions, one has to ask what would occur if they stopped receiving these billions of dollars from the feds. Left to local resources, the police would be at the mercy of the taxpayers who suffer the consequences when they get out of line. 

People ultimately obey those who pay them, and as long as it’s the feds funding the police, we can’t expect them to listen to us.

If we are to stop the militarization, then we have to cut off the flow of funds enabling them to amass such power. This will only happen when the money spigot in D.C. is turned off. And that will only happen when state and local governments twist the handle.

via 10thACenter