Most Canadians had never heard of the Communications Security Establishment (CSEC), the Canadian counterpart of the US National Security Agency (NSA), prior to last month’s Globe and Mail report that CSEC has been metadata mining Canadians’ electronic communications since 2005.
And Canada’s elite is determined to keep it that way—to ensure that the public knows as little as possible about the activities of CSEC.
The Conservative government and CSEC have responded with a series of lies, half-truths and disingenuous statements to the revelation that Canada’s signal intelligence agency has been collecting Canadians’ metadata. Peter MacKay, who until last week’s cabinet shuffle was the minister in charge of CSEC, lied repeatedly and brazenly in the days following the exposure of CSEC’s metadata mining, declaring that CSEC is only involved with “foreign threats.” A former CSEC deputy director, meanwhile, termed the exposure a “manufactured” story. Yet, the Supreme Court Justice who served as the government-appointed “watchdog” on CSEC’s activities from August 2006 until his death in July 2009 repeatedly raised concerns that the program violated the agency’s mandate and Canadians’ rights.
The government’s aim is to cover up the fact that the CSEC is systematically spying on Canadians and collecting information that can be—and undoubtedly is being—used by Canada’s national security apparatus to identify and develop intimate portraits of the views, habits and connections of individuals and groups that it deems hostile to the interests of Canadian big business and its state.
The press and opposition parties, for their part, quickly dropped discussion of CSEC’s activities.
The reality is that CSEC functions as part of a burgeoning state-within-the-state: a network of national intelligence, military and police agencies that are armed with draconian powers, subject to little and ever-shrinking judicial and parliamentary oversight, and shielded from public scrutiny.
CSEC is, as far as we know, the most secretive part of this network. It functions under secret ministerial directives issued by the Defence Minister. Not only are the directives’ contents shrouded in secrecy, even their topics are kept secret from the public, opposition and government parliamentarians, and almost all ministers.
CSEC does not report directly to parliament and its activities are not subject to the oversight of a parliamentary committee. Until 2011 it released annual reports through the Ministry of Defence that were tailored to obfuscate its activities. Since then, it is no longer obliged to publicly issue any annual report or document outlining its plans, priorities and performance.
Hugh Segal—the Conservative Senator who heads the Senate’s Special Committee on Anti-Terrorism—admitted that he first learned that CSEC is metadata mining Canadians’ electronic communication through the Globe and Mail ’s June 10 report.
The government has sought to calm public concern about CSEC by claiming that it is legally barred from spying on Canadians and that there is a “legal wall” between its activities and those of the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP).
This is quite simply an untruth.
One of CSEC’s main functions is to assist CSIS and RCMP in upholding national security.
Also, it can investigate Canadians’ communications if it deems that they are relevant to any investigation it is carrying out of “foreign threats.”
Third, we now know that since 2005, and under Liberal and Conservative governments alike, CSEC has been mining the metadata of Canadians’ electronic communications. The government has refused to provide any details of this program, but the US NSA—with which it has closely collaborated for more than six decades—is known to systematically collect and analyze the metadata of all Internet, telephone and cellphone communications.
In 2007, CSEC’s then head, John Adams, declared that his agency’s ambition was to “master the Internet.” “Our vision,” Adams told the Standing Senate Committee on National Security and Defence, “is security through information superiority. We want to master the Internet. That is a challenge that no one institution—be it ours or the National Security Agency, NSA, for that matter—can manage on their own. We try to do that in conjunction with our allies.”
To square their claim that CSEC is not spying on Canadians with CSEC’s mining of the metadata of Canadians’ electronic communications, CSEC and the government have advanced the spurious claim that metadata is “not communication” and therefore can be accessed without having to seek approval from the courts.
Significantly, the ministerial directive MacKay issued in 2011 authorizing the continuation of CSEC’s metadata mining program invokes this subterfuge. According to the Globe and Mail, which has seen a heavily redacted version of the directive, it declares, “Metadata is information associated with a telecommunication…and not a communication.”
Fourth and finally, although CSEC is legally barred from requesting its partners to spy on Canadians, nothing prohibits it and other Canadian intelligence agencies from accepting intelligence offered it by the NSA and other allied agencies. In a revealing interview with the Toronto Star, Wayne Easter—the minister responsible for CSIS in 2002-3—said that it was de rigueur for the NSA to pass on intelligence about Canadians and for CSIS to accept it. Further confirmation of this practice comes from Britain. David Blunkett, British Home Secretary from 2001-4, told that country’s parliament last month that the NSA routinely “offers intelligence” to Britain’s signal intelligence agency, GCHQ, so as to enable it to circumvent the restrictions on its spying on Britons without ministerial authorization.
The government and CSEC have denied that anything comparable to the NSA’s PRISM program, under which the US agency has had unfettered access to the servers of major computer and Internet corporations like Apple, Google and Facebook, exists in Canada. But both the NSA and the corporations involved denied they were collaborators in any such scheme until they were unmasked thanks to the efforts of whistleblower Edward Snowden.
According to Tamir Israel, a staff lawyer with the Canadian Internet Policy and Public Interest Clinic, were Internet and phone providers being ordered by the Canadian government to provide information, the order would invariably include nondisclosure conditions.
The big corporations that control the country’s telecommunications have, it should be added, a clear record of collaborating with the state. 95 percent of all requests by local police, the RCMP and CSIS for subscriber information are offered voluntarily without recourse to a warrant.
The little we do know of CSEC’s activities indicates that its operations are closely integrated with those of the NSA and that the NSA views it as one its most trusted partners. CSEC, for instance, assisted the United States and Britain in spying on participants at the London G20 summit in 2009—a highly sensitive operation.
Documents leaked by Edward Snowden and published by The Guardiandetail how CSEC, the NSA and GCHQ monitored the phone calls and computer usage of foreign politicians and officials, including those of NATO allies such as France and Germany.
CSEC is also deeply involved in the Canadian elite’s predatory wars. In 2010, the then CSEC chief, retired CAF General John Adams, boasted, “If you were to ask the Canadian Forces if there is anyone that has saved Canadian lives in Afghanistan, they would point to us.” He claimed that over half of the “actionable intelligence” that Canadian soldiers use in prosecuting the Afghan War came from CSEC.
As around the world, the Canadian elite has used the bogus “war on terror” to justify an assault on democratic rights and to develop the veritable infrastructure for a police state. CSEC has been front and center in these developments. First Liberal and now Conservative governments have lavished resources on it. CSEC’s staff has doubled in the past decade and now numbers more than 2,000, while its annual budget has mushroomed to about $400 million.
Currently under construction is a new nearly $1 billion headquarters. The enormous new CSEC complex will be located next to CSIS’s headquarters. That a bridge is being built between the two headquarters further underlines the close working relationship between the two spying agencies and puts the lie to the government’s claim that “legal” walls separate their operations and confine them to distinct domains.
Source: Ed Patrick and Keith Jones | WSWS
A previous article discussed Stasi. It was East Germany’s secret police. It was one of the most repressive state apparatuses in modern times.
Its infamous reputation speaks for itself. It’s reincarnated in new form. Given today’s state-of-the-art technology. It’s worse now than then. The previous article said the following:
On July 7, Der Spiegel headlined “Snowden claims: NSA Ties Put German Intelligence in Tight Spot.”
“They’re in bed together,” said Snowden. NSA partners with foreign intelligence in other countries. Its “Foreign Affairs Directorate (BND)” does so.
It’s done in ways to “insulate their political leaders from the backlash.” It’s precautionary in case people learn “how grievously they’re violating global privacy.”
BND/NSA cooperation is far greater than previously known. At issue are serious violations of Germany’s privacy laws. According to Der Spiegel, NSA provides “analysis tools.”
They’re for “BND’s signals monitoring of foreign data streams that travel through Germany.”
Besides other areas, BND focuses on “the Middle East route through which data packets from crisis regions travel.”
Der Spiegel said “BND pulls data from five different nodes that are then analyzed at the foreign intelligence service’s headquarters in Pullach near Munich.”
Gerhard Schindler heads it. He “confirmed the partnership during a meeting with members of the German parliament’s control committee for intelligence issues.”
Snowden told Der Spiegel that German outrage over NSA spying was pretense. Both countries work closely together. Relations are longstanding.
Current operations far exceed Stasi’s. They’re conducted with technological ease. Decades earlier spying was crude compared to today’s.
Modern methods operate in unprecedented ways. Virtually everyone can be monitored everywhere at all times. Nearly everything about targets is known.
Almost nothing’s too secret to escape scrutiny. There’s no way to hide. There’s no place to do it.
On July 20, Der Spiegel headlined ” ‘Prolific Partner:’ German Intelligence Used NSA Spying Program,” saying:
Chancellor Merkel lied. It didn’t surprise. She does it repeatedly. She “and her ministers claim they first learned about the US government’s comprehensive spying programs from press reports.”
“But SPIEGEL has learned that German intelligence services themselves use one of the NSA’s most valuable tools.”
BND and its Federal Office for the Protection of the Constitution (BfV) intelligence agency collaborated with NSA. Secret documents reveal it.
They show BfV “was equipped with a program called XKeyScore intended to ‘expand their ability to support NSA as we jointly prosecute CT (counterterrorism) targets.’ ”
“The BND is tasked with instructing the domestic intelligence agency on how to use the program, the documents say.”
It’s a “productive espionage tool.” It’s able to “retroactively reveal any terms” targeted persons type into search engines.
It’s able to receive “full takeâ¤|unfiltered dataâ¤|including” communications content. It can do so over a period of days.
Documents show up to “500 million (monthly) data connections from Germany accessed by the NSA.” XKeyScore collects much of it.
German/NSA cooperation “recently intensified.” BND’s Schindler expressed an “eagerness and desire” to do so. According to NSA:
“The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing.”
In 2012, Germany showed a “willingness to take risks and to pursue new opportunities for cooperation with the US.”
In Afghanistan, BND was NSA’s “most prolific partner.” The relationship is longstanding. It’s hard-wired. Merkel lied. Anger expressed over US spying was fake.
She knows what’s going on. She’s involved. On September 22, German federal elections are scheduled. Voters will choose Bundestag representatives.
Merkel’s coalition needs up to 300 or more seats to retain power. Until NSA spying and Germany’s involvement were revealed, easy reelection was expected.
She’s seeking a third term. Perhaps she won’t get it. Earlier polls showed her ahead. Voters may have second thoughts. They’ll decide if she’s a spent force. In weeks we’ll know.
In the meantime, expect more revelations. On July 19, Der Spiegel headlined “Greenwald: ‘Explosive’ NSA Spying Reports Are Imminent,” saying:
Expect them in a few days. They’ll be the next shoe to drop. They’ll be “more explosive in Germany” than previous reports.
They’ll tell more about BND/NSA cooperation. Greenwald said he’s got around 9,000 to 10,000 top secret documents. He’s had them for weeks.
He’s been analyzing them. Some documents are “extremely complicated.” He’s living in Rio de Janeiro. CIA has a “robust” presence there.
He’s worried about his safety. He feels “threatened in the sense that there are very prominent American politicians and even American journalists who have called for (his) arrest, who have called (him) a criminal.”
Possession of top secret US documents jeopardizes his safety. He’s got multiple copies. He maintains regular contact with Snowden. They use “encrypted chat technologies.”
German/NSA cooperation isn’t at the same level as Britain, Australia, Canada or New Zealand. It’s the “next tier where they exchange information all the time.”
It’s intensifying. BND’s Schindler’s eager to do so. Perhaps Germany’s heading for joint NSA cooperation matching any other country.
A Final Comment
On July 18, the Electronic Frontier Foundation headlined “House Judiciary Committee Rails Against Domestic Spying,” saying:
House Judiciary Committee members “grilled” government witnesses. It was more show than tell. Obama officials “hid behind secrecy.”
Grilling belies congressional sincerity. Congress, the courts, Obama, and administration officials are co-conspirators. It shows in legislation enacted.
It shows in court decisions. It shows America’s current state. Washington’s criminal class is bipartisan. It includes High Court justices.
Police state lawlessness replaced constitutional law. Full-blown tyranny’s a hair’s breadth away. America’s no longer safe to live in. Universal monitoring persists.
It’s official policy. Corporate bosses are complicit. Democracy’s a convenient illusion. So is freedom. It’s on the chopping block for elimination. It’s practically gone already.
Doing the right thing is criminalized. Press freedom’s up for grabs. On July 19, The New York Times headlined “Court Tells Reporter to Testify in Case of Leaked CIA Data,” saying:
The US Fourth Circuit Court of Appeals ruled Times writer James Risen must do so. It said First Amendment protections don’t cover “unauthorized leaks.”
Federal District court Judge Leonie Brinkema held otherwise. She got it right. She supported press freedom. She called it First Amendment “reporter’s privilege.” Obama’s DOJ claims it doesn’t exist.
Appeals Court Chief Judge William Byrd Traxler wrote the majority (two/one) ruling, saying:
“Clearly, Risen’s direct, firsthand account of the criminal conduct indicted by the grand jury cannot be obtained by alternative means, as Risen is without dispute the only witness who can offer this critical testimony.”
“There is no First Amendment testimonial privilege, absolute or qualified, that protects a reporter from being compelled to testify by the prosecution or the defense in criminal proceedings about criminal conduct that the reporter personally witnessed or participated in, absent a showing of bad faith, harassment, or other such non-legitimate motive, even though the reporter promised confidentiality to his source.”
Risen vowed to go to prison rather than testify. He may end up there. He’ll appeal to the Supreme Court. Odds of winning are slim.
The Court’s stacked with right wing extremists. They’re largely comfortable with police state lawlessness. It shows in their rulings.
Risen may first ask for a full Fourth Circuit ruling. His lawyer Joel Kurtzberg said:
“We are disappointed by and disagree with the court’s decision. We are currently evaluating our next steps.”
Fourth Circuit’s Judge Roger Gregory “vigorous(ly) dissent(ed).” He called the ruling a threat to investigative journalism, saying:
“Under the majority’s articulation of the reporter’s privilege, or lack thereof, absent a showing of bad faith by the government, a reporter can always be compelled against her will to reveal her confidential sources in a criminal trial.”
“Whatever the limits of who may claim reporter’s privilege, it is clear that Risen – a full-time reporter for a national news publication, The New York Times – falls into the category of people who should be eligible to invoke the privilege.”
“The majority exalts the interests of the government while unduly trampling those of the press, and in doing so, severely impinges on the press and the free flow of information in our society.”
Friday’s ruling set a precedent. It applies only to the Fourth Circuit. It’s important. It includes Maryland and Virginia. It’s Pentagon, CIA and NSA headquarters.
Risen’s case pertains to information in his 2006 book, “State of War: The Secret History of the CIA and the Bush Administration.” It’s about Bush era CIA tactics. Clinton also.
It involves “trick(ing) Iranian scientists by having a Russian defector give them blueprints for a nuclear triggering device that had been altered with an error.”
It “portrays the operation as reckless and botched in a way that could have helped the Iranians gain accurate information.”
In December 2010, former CIA officer Jeffrey Sterling was called Risen’s source. He was indicted on Espionage Act charges.
According to Reporters Committee for Freedom of the Press, since 1984, 17 journalists were jailed for refusing to testify or disclose sources.
Police states operate this way. America’s by far the worst. For sure it’s the most reckless, outlandish and dangerous.
Stephen Lendman lives in Chicago. He can be reached at firstname.lastname@example.org.
His new book is titled “Banker Occupation: Waging Financial War on Humanity.”
Visit his blog site at sjlendman.blogspot.com.
The American family is at its worst state in the history of the country. The intelligent and informed readership of Off The Grid News likely did not need a Pew Research Center report to alert them to the nationwide decline of the family unit. While the revelation is far from shocking, the statistics relating to the crumbling of the family are fairly startling.
As Libertarian author Charles Murray’s controversial best-sellers have aptly noted, the cultural decline and societal norms in America are directly related to the state of the American family. The new Pew Research Center family study at least inadvertently supports Murray’s decades of research on the topic. The family represents not only the backbone of the nation, but the building blocks of the community.
Since the 1960s, the American family has been on a downward spiral, according to the statistics noted by both Pew and Murray. The Norman Rockwell depiction of bygone eras might have glossed over some problems of the time, but did accurately illustrate the level of priority the family unit held. When we wax nostalgic, imperfections of a given decade are sometimes cast aside. The Civil Rights movement and a host of other equally Constitution-minded changes improved our nation over the course of the 1950s and early 1960s, but when the family unit started to decline in the following years, so did our society as a whole.
The marriage rate in America has fallen to an all-time low, according to the Pew Research Center study. There are now approximately 6.8 marriages per every 1,000 people on average each year. Only about 51 percent of adults are presently married. In 1960, about 72 percent of adults in the United States were married. In 1950, a total of about 78 percent of American adults were married.
Charles Murray had this to say about the state of marriage in America:
“Starting in 1970, marriage took a nosedive that lasted for nearly twenty years. Among all whites ages 30-49, only 13 percent were not living with spouses as of 1970, Twenty years later, that proportion had more than doubled, to 27 percent — a change in a core social institution that has few precedents for magnitude and speed. From the founding until well into the twentieth century, it was unquestioned that children should be born only within marriage and that failure to maintain that state of affairs would produce catastrophic consequences for society.”
While the marriage rate has significantly declined, the birth rate has not. America now has the highest percentage of one-adult households in the entire world. More than half of all babies born to American women under the age of 30 are done so out of wedlock. Today, one out of every three children in the United States lives in a home without a father. A total of 42 percent of single mothers in American are on food stamps.
As previously reported by Off The Grid News, there are now 100 million citizens on food stamps and other forms of taxpayer-funded assistance. There are currently only about 97 million full-time workers in the country. Full-time workers in low-paying positions often do not pay taxes but garner refunds, making the pool of available citizens to fund the entitlement programs quite shallow.
Charles Murray shared this astute observation about how providing for the family was once considered a duty of extreme importance:
“A man who is holding down a menial job and thereby supporting a wife and children is doing something authentically important with his life. He should take deep satisfaction from that and be praised by his community for doing so. If that same man lives under a system that says the children of the woman he sleeps with will be taken care of whether or not he contributes, then that status goes away. I am not describing a theoretical outcome, but American neighborhoods where once working at a menial job to provide for his family made a man proud and gave him status in his community, and where now it doesn’t. Taking the trouble out of life strips people in major ways in which human beings can look back on their lives and say, “I made a difference.”
Living in the most impoverished county in Ohio and having worked with youth and parents for more than a decade, I have witnessed the change in perspective Murray described. An entitlement mindset is overwhelming not just an entire generation of American parents, it is being handed down to their children and grandchildren.
The United States also holds yet another dubious world record—it has the highest divorce rate on the planet. The study also noted that more than one million public school students are homeless, also a first in the history in the United States. The teen pregnancy rate in America is twice as high as Canada, three times are large as France, and more than seven times as high as Japan. Yes, dear readers, the list of titles bestowed upon our beloved country also include the “Highest Teen Pregnancy Rate in the World” status.
One in every four American teenage girls have had at least one type of a sexually transmitted disease. A total of 47 percent of high school students in the United States have had sex, and more often than not, at an age far younger than we want to imagine.
The land of the free and the home of the brave has the highest rate of child abuse deaths around the globe. About three million child abuse reports are filed around the country each year. Approximately 20 percent of child sexual abuse victims are younger than eight years of age. According to the statistics cited in the study, approximately one in every four American girls will be sexually abused before their eighteenth birthday.
The fiscal and family trends which have been mounting in America, especially under the Obama administration, make an economic meltdown and civil unrest far more likely. The Pew study estimates that about 50 percent of all American children will be on food stamps at some point before they reach adulthood. The once most prosperous nation in the world has turned into a land mass filled with people who cannot support themselves and rely on the government to fund their very survival from the cradle to the grave. Young adults will have to grab quickly to keep the American dream from slipping out of their grasp entirely.
Source: Off The Grid News
Children of God for Life is calling on the public to boycott products of major food companies that are partnering with Senomyx, a biotech company that produces artificial flavor enhancers, unless the company stops using aborted fetal cell lines to test their products.
In 2010, the pro-life organization wrote to Senomyx CEO Kent Snyder, pointing out that moral options for testing their food additives could and should be used.
But when Senomyx ignored their letter, they wrote to the companies Senomyx listed on their website as “collaborators” warning them of public backlash and threatened boycott. Food giants Pepsico, Kraft Foods, Campbell Soup, Solae and Nestlé are the primary targets of the boycott, though Senomyx boasts other international partners on their website.
Senomyx website states that “The company’s key flavor programs focus on the discovery and development of savory, sweet and salt flavor ingredients that are intended to allow for the reduction of MSG, sugar and salt in food and beverage products.…Using isolated human taste receptors, we created proprietary taste receptor-based assay systems that provide a biochemical or electronic readout when a flavor ingredient interacts with the receptor.”
Senomyx notes their collaborators provide them research and development funding plus royalties on sales of products using their flavor ingredients.
“What they do not tell the public is that they are using HEK 293 – human embryonic kidney cells taken from an electively aborted baby to produce those receptors”, stated Debi Vinnedge, Executive Director for Children of God for Life, a pro-life watch dog group that has been monitoring the use of aborted fetal material in medical products and cosmetics for years.
“They could have easily chosen COS (monkey) cells, Chinese Hamster Ovary cells, insect cells or other morally obtained human cells expressing the G protein for taste receptors”, Vinnedge added.
In writing to their collaborators, it took three letters before Nestlé finally admitted the truth about their relationship with Senomyx, noting the cell line was “well established in scientific research”.
After hearing Ms Vinnedge speak publicly on the problem, angry consumers began writing the companies. Both Pepsico and Campbell Soup immediately responded.
Shockingly, Pepsico wrote: “We hope you are reassured to learn that our collaboration with Senomyx is strictly limited to creating lower-calorie, great-tasting beverages for consumers. This will help us achieve our commitment to reduce added sugar per serving by 25% in key brands in key markets over the next decade and ultimately help people live healthier lives.”
Campbell Soup was more concerned in their response: “Every effort is made to use the finest ingredients and develop the greatest selection of products, all at a great value. With this in mind, it must be said that the trust we have cultivated and developed over the years with our consumers is not worth compromising to cut costs or increase profit margins.”
While Campbell did not state they would change their methods, still their response, gave Vinnedge hope.
“If enough people voice their outrage and intent to boycott these consumer products, it can be highly effective in convincing Senomyx to change their methods”, she noted.
Need proof of Senomyx use of aborted fetal cell lines?
Following is the link to the on-line article for their patent on sweet receptors (they filed several separate patents for each of the different taste receptors): http://www.ncbi.nlm.nih.gov/pmc/articles/PMC123709/
As it is lengthy and technical, we recommend you simply do a search in the document for HEK-293.
HEK CELL (Human Embryonic Kidney 293 cells), also often referred to as HEK 293, 293 cells, or less precisely as HEK cells are a specific cell line originally derived from human embryonic kidney cells grown in tissue culture. HEK 293 cells are very easy to grow and transfect very readily and have been widely-used in cell biology research for many years. They are also used by the biotechnology industry to produce therapeutic proteins and viruses for gene therapy.
Below is a list of products that contain HEK cells.
HEK cell Products; http://www.cogforlife.org/fetalproductsall.pdf
Pepsi Beverages on the Boycott
• All Pepsi soft drinks
• Sierra Mist soft drinks
• Mountain Dew soft drinks
• Mug root beer and other soft drinks
• No Fear beverages
• Ocean Spray beverages
• Seattle’s Best Coffee
• Tazo beverages
• AMP Energy beverages
• Aquafina water
• Aquafina flavored beverages
• DoubleShot energy beverages
• Frappuccino beverages
• Lipton tea and other beverages
• Propel beverages
• SoBe beverages
• Gatorade beverages
• Fiesta Miranda beverages
• Tropicana juices and beverages
Other Senomyx Partner Products
- At this time we are formally boycotting PepsiCo products, however many have asked us for lists of the other companies involved with Senomyx and what products are involved.
Unless we know a certain product or brand name specifically, we intend to boycott all of the company’s products.
• All coffee creamers
• Maggi Brand instant soups, bouillon cubes, ketchups, sauces, seasoning, instant noodles
Kraft – Cadbury Adams LLC Products:
• Black Jack chewing gum
• Bubbaloo bubble gum
• Bubblicious bubble gum
• Freshen Up Gum
• Sour Cherry Gum (Limited)
• Sour Apple Gum (Limited)
Cadbury Adams LLC Candies
• Sour Cherry Blasters
• Fruit Mania
• Bassett’s Liquorice All sorts
• Maynards Wine Gum
• Swedish Fish
• Swedish Berries
• Juicy Squirts
• Original Gummies
• Fuzzy Peach
• Sour Chillers
• Sour Patch Kids
• Mini Fruit Gums
Other Cadbury Adams LLC Products
• Certs breath mints
• Halls Cough Drops
Not part of Senomyx – N eocutis Products
This company produces anti wrinkle creams that contain cells from a 14 week gestation aborted malebaby. Following is the list of the creams, but we recommend a full boycott of all Neocutis Products.
Bio-Gel Prevedem Journee
Bio Restorative Skin Cream
Vaccines Containing HEK Cells And the Manufacturers:
MMR II (Merck)
ProQuad (MMR + Chickenpox – Merck)
Varivax (Chickenpox – Merck)
Pentacel (Polio + DTaP + HiB – Sanofi Pasteur)
Vaqta (Hepatitis-A – Merck)
Havrix (Hepatitis-A – Glaxo SmithKline)
Twinrix (Hepatitis-A and B combo – Glaxo)
Zostavax (Shingles – Merck)
Imovax (Rabies – Sanofi Pasteur)
Pulmozyme (Cystic Fibrosis – Genetech)
Enbrel (Rheumatoid Arthritis – Amgen)
Note: Moral options exist for Rabies, Polio,
Rheumatoid Arthritis. Separate moral options
currently not available for Measles and Mumps.
Back in January, Oklahoma Senator Ralph Shortey proposed legislation to ban the production of aborted fetal cell-derived flavor chemicals in his home state. If passed, S.B. 1418 would also reportedly ban the sale of any products that contain flavor chemicals derived from human fetal tissue, which includes Pepsi products as well as products produced by Kraft and Nestle (http://www.naturalnews.com)
.Biotech company using cell lines from aborted babies in food enhancement testing http://www.lifesitenews.com/news/biotech-company-using-cell-lines-from-aborted-babies-in-food-enhancement-te
Pro-life groups call for Pepsi boycott over aborted fetal cell lines
Oklahoma lawmaker wants to stop Pepsi from using aborted fetus cells in soda flavoring research (NaturalNews)
To Contact PepsiCo:
Jamie Caulfield, Sr. VP
700 Anderson Hill Road
Purchase, NY 10577
Edmund M. Carpenter, Chair, Corporate Development
1 Campbell Place
Camden, NJ 08103-1701
Pro-life groups joining CGL in the boycott to date are: Life Issues Institute, American Life League, Colorado Right to Life, American Right to Life, Sound Choice Pharmaceutical Institute, ALL Arizona, Central Nebraskans for Life, Pro-Life Waco, Houston Coalition for Life, Mother and Unborn Baby Fox Valley, Womankind, Billboards for Life, Movement for a Better America, Defenders of the Unborn, Focus Pregnancy Help Center, Idaho Chooses Life, EMC Frontline Pregnancy Centers of NY, Four Seasons for Life, CREDO, Life Choices, STOPP Dallas, CA Right To Life, Human Life Alliance, International Right to Life Federation, Operation Rescue, Pro-Life Nation, LifeNews.com, and Mary’s Outreach for Women.
To be clear, the aborted fetal tissue used to make Pepsi’s flavor chemicals does not end up in the final product sold to customers, according to reports — it is used, instead, to evaluate how actual human taste receptors respond to these chemical flavorings. But the fact that Pepsi uses them at all when viable, non-human alternatives are available illustrates the company’s blatant disregard for ethical and moral concerns in the matter.
HEK 293 cells were generated in the early 70s by transformation of cultures of normal human embryonic kidney cells with sheared adenovirus 5 DNA in Alex Van der Eb’s laboratory in Leiden, The Netherlands.
The human embryonic kidney cells were obtained from an aborted fetus and originally cultured by Van der Eb himself; the transformation by adenovirus was performed by Frank Graham who published his findings in the late 1970s after he left Leiden for McMaster University in Canada.
They are called HEK for human embryonic kidney, while the number 293 comes from Graham’s habit of numbering his experiments; the original HEK 293 cell clone was simply the product of his 293rd experiment.
Millions of honeybees are dead in a new colony collapse disorder crisis being reported from Ontario, Canada. And that’s on a single farm in Elmwood, Canada.
Depending on the reports you read, 30 million, 37 million, or even 40 million honeybees may already be dead — a reflection of the expanding numbers as the crisis continues.
According to MSN Living, Elmwood beekeeper Dave Schuit has lost at least 600 hives representing 37 million honeybees — and he’s pointing the finger squarely at neonicotinoid pesticides.
It’s a logical argument. The pesticides are popular for a reason: They’re an efficient way to kill insects. Unfortunately, they can’t discriminate between beneficial insects like bees and harmful pests like aphids.
The debate is already over in the European Union, which recently banned a large number of pesticides including neonicotinoids.
However, they are still used in both the United States and Canada.
The deaths at Dave and Erika Schuet’s Saugeen Honey operation in Elmwood reportedly occurred shortly after the local corn and canola crops were sprayed with two neonicotinoid insecticides known as Poncho 600 and Matador 120. “I guess you could call this a bee holocaust,” an upset Erika Schuet said when reporting on the disaster at a local meeting afterwards.
The Schuet bees are now being tested to see if they can confirm the cause of the mass bee deaths.
In mid-June, 25,000 bumblebees were found dead or dying in a Wilsonville, Oregon parking lot after flowering linden trees were sprayed with an insecticide called Safari. Landscapers had apparently ignored the manufacturer’s instructions that said it couldn’t be applied in areas where bees were present.
With some reports putting the total number of bumblebees dead as high as 50,000, that bee die-off represented one of the largest mass deaths of bumblebees known in the United States.
Honeybees, a smaller and more numerous species, are apparently even more vulnerable.
A recent report from Canada’s The Post said that almost 40 million honeybees were dead on the Elmwood farm.
Source: Elaine Radford | The Inquisitr
Ice cream recipes have changed considerably since the days of old fashioned ice cream parlors. We’re now subjected to a slew of toxic ingredients in almost every type of ice cream found in parlors, restaurants and grocery stores. From economy to premium brands, there is often no escape from the chemical concoctions in our favorite frozen treats. So what ingredients should you avoid and why are they so deadly?
By weight, ice cream is primarily composed of water (from milk and cream). The lethality of current formulations don’t come from these basic constituents, but from the gamut of sweetners, flavorings, emulsifiers and stabilizers. After all, the industry relies on increasing shelf life and having the most smooth or creamy ice cream over time, so preserving these consistencies is the key to sales.
By volume, 30% to 50% of ice cream is air whipped into the mix during the early stages of the freezing process. “There are no real chemical reactions that take place when you make ice cream,” says H. Douglas Goff, an ice-cream expert and professor in the department of food science at the University of Guelph, in Ontario, “but that doesn’t mean there isn’t plenty of chemistry.”
Richard W. Hartel, professor of food engineering at the University of Wisconsin, Madison, explains that “when you bite into ice cream, how the flavor is released into the mouth probably is a function of structure.” Initially, the milk fat exists as tiny globules in the milky starting mixture. Milk proteins on the globules’ surface work as an emulsifier to keep the fat in solution. To make the ice-cream structure, these fats need to be destabilized so that they coalesce into larger networks. “When two partially crystallized fat globules come together, like in ice cream, they form a partially coalesced structure,” Hartel explains. “We sort of envision them as grape clusters, with some connectivity, but the crystalline fat prevents complete coalescence.”
Ice-cream makers use an emulsifier that replaces the surface proteins and aids in forming the network. Egg yolks were originally used as this destabilizing emulsifier, but now, ice-cream manufacturers use toxic substances such as mono- and diglycerides as well as the sorbitan ester Polysorbate 80.
Polysorbate 80 has been found to negatively affect the immune system and cause severe anaphylactic shock which can kill. According to Annals of Allergy, Asthma and Immunology, Volume 95, Number 6, December 2005 , pp. 593-599(7), “it is of current relevance as a ‘hidden’ inductor of anaphylactoid reactions”, and “Polysorbate 80 was identified as the causative agent for the anaphylactoid reaction of nonimmunologic origin in the patient. The study included a pregnant woman who suffered anaphylactic shock after being given a IV drip of multi-vitamins containing polysorbate 80.
In addition to this, there have been studies in Food and Chemical Toxicology which showed that Polysorbate 80 causes infertility. Baby female rats were injected with polysorbate 80 at days 4-7 after birth. It accelerated the maturing of the rats and caused changes to the vagina and womb lining, hormonal changes, ovary deformities and degenerative follicles.
According to the World Intellectual Property Organization, which is part of the United Nations, scientists from the organization are developing vaccines specifically to damage fertility as a method of contraception. A suggested ingredient for the vaccine is Polysorbate 80 (also known as tween 80). As it is a preferred ingredient, scientists are obviously aware of its ability to cause infertility.
Mono- and Diglycerides
We recently reported on the irresponsible actions of supplement companies who continue to use hydrogenated oils and magnesium stearate as flowing agents. It seems that ice cream manufacturers are just as careless in their use of hydrogenated oils.
Mono-diglycerides remain the most widely used emulsifiers in food production. They are called mono-digylcerides because they are made from oils that have a high mono saturated fat content, but they are still hydrogenated. They are hidden trans fats where an alcohol (in this case glycerol) has been combined to form an emulsifying agent.
One of the largest food oil producing companies worldwide is Gillco. With the exception of their distilled non-hydrogenated monoglycerides (not incorporated in ice cream applications), a large variety of their emulsifiers are hydrogenated and this is stipulated on the company’s fact sheet for each product.
Make no mistake, mono-diglycerides are not nutritious in anyway. Their only purpose is to improve volume, uniform structure and develop the right meltdown characteristics. Regardless of their quantity, the inclusion of hydrogenated oils in any food product is only detrimental to our health and their adverse effects are well documented. Avoid any ice creams (or any food products for that matter) with mono-diglycerides.
As one of the most prolific preservatives in the food industry, it is difficult to find an ice cream without potassium sorbate. However, it is not only recommended to avoid this chemical, it’s a necessity to eliminate it from our foods. The food industry and its scientists will parrot endless myths that potassium sorbate is not a health threat because of its safety record and non-toxic profile. This could not be further from the truth.
Food and chemical toxicology reports have labeled potassium sorbate as a carcinogen, showing postive mutation results in the cells of mammals. Other studies have shown broad systemic and toxic effects on non-reproductive organs in animals. No long term studies have ever been initiated on either animals or humans, so there is simply not enough evidence to theorize what could happen after years of ingesting this preservative. However, based on short-term carcinogenic and toxic effects, is it worth the risk to find out?
There are a plethora of serious concerns with sodium benzoate. It can convert into lethal carcinogenic poison when combined with absorbic acid. Professor Peter Piper, a professor of molecular biology and biotechnology, tested the impact of sodium benzoate on living yeast cells in his laboratory. What he found alarmed him: the benzoate was damaging an important area of DNA in the “power station” of cells known as the mitochondria. “These chemicals have the ability to cause severe damage to DNA in the mitochondria to the point that they totally inactivate it: they knock it out altogether.” he stated.
“The food industry will say these compounds have been tested and they are complete safe,” he said. “By the criteria of modern safety testing, the safety tests were inadequate. Like all things, safety testing moves forward and you can conduct a much more rigorous safety test than you could 50 years ago.”
Sodium Benzoate, as most other preservatives, should not be ingested in any quantity. This toxin is banned from all foods and drinks for children under three, and is currently being phased out of all Coca-Cola products.
Artificial colors and flavors such and blue 1, blue 2, yellow 5, yellow 6, red 3, red 40, and others are found in many types of ice cream, especially commerical varities. Artificial flavor means it is derived from a chemical made in a laboratory and has no nutritional value. Researchers have determined that artificial colors (especially when paired with sodium benzoate) increase levels of hyperactivity in preschool and older children within the general population. They have also been found to provoke asthma attacks and have links to thyroid tumours. Coincidently, artificial colors are very prevalent in ice cream products which are directly marketed to children.
Every single artifical color in the food industry has some kind of detrimental health effect. These include neurotoxicity, organ, developmental, and reproductive toxicity and cancer.
Carrageenan is another emulsifier and stabilizer. It comes from algae or seaweed extract common in the Atlantic Ocean. It is typically extracted from natural sources using powerful alkaline solvents. Carrageenan is often touted as 100% vegetarian and natural. So does that mean it’s safe? Just because something comes from a natural source does not mean that it is safe. There are also natural sources of MSG and Aspartame which are chemically identical to the artificial brands. These are equally poisonous to humans as those marketed in the food industry.
Several studies on humans have demonstrated that digestive enzymes and bacterial action convert high weight carrageenans to dangerous low molecular weight carrageenans and poligeenans in the human gut. These carrageenans, even at low doses, have been found to destroy human cells and are linked to various human cancers and digestive disorders.
Carrageenan has also been found to impair and depress cell-mediated immunity and cause the proliferation of tumour growth. The mechanism responsible for carrageenan-induced immune suppression is believed to be its selective degenerative effect on white blood cells.
It is also important to understand how overrun calculations affect the concentration of ingredients in ice cream. This is never stated on the label of any brand. Overrun is the percentage increase in volume of ice cream greater than the amount of mix used to produce that ice cream. In other words, if you start off with 1 litre of mix and you make 1.5 litres of ice cream from that, you have increased the volume by 50%. Economy and standard brands of ice cream are the lowest quality and have the greatest percentage of overrun (greater than 100% and as high as 120%) meaning they will require an increased percentage of emulsifiers to increase their volume than higher quality brands. This keeps manufacturing costs low since there is a smaller quantity of medium to higher quality ingredients used for every litre of final product.
Premium and super-premium brands have a lower percentage of overrun (less than 90% and as low as 25%) and don’t use as many emulsifiers in their formulations. This results in the highest body and quality of ice cream. It also means that more nutritious ingredients typically make up for the volume. This increases manufacturing costs due to a greater quantity of high quality ingredients used for every litre of final product.
If your store brand or parlor ice cream melts rapidly, that’s a good sign as it likely has a low overrun and little fat destabilization, which means a lower percentage of toxic emulsifiers and stabilizers. When made with wholesome and natural ingredients, homemade ice cream will always melt quickly. There is simply no healthy way to keep the fat from destabilizing naturally.
Keep in mind that any frozen treats that are made with dairy products and engineered to be low fat (i.e. frozen yogurt, low-fat ice cream) will typically have the highest overrun and emulsifier/stabilizer percentages. Here’s a breakdown of brands, fat content, solids, overrun and cost:
* Fat content: usually legal minimum, e.g., 10%
* Total solids: usually legal minimum, e.g., 36%
* Overrun: usually legal maximum, ~120%
* Cost: low
* Fat content: 10-12%
* Total solids: 36-38%
* Overrun: 100-120%
* Cost: average
* Fat content: 12-15%
* Total solids: 38-40%
* Overrun: 60-90%
* Cost: higher than average
* Fat content: 15-18%
* Total solids: >40%
* Overrun: 25-50%
* Cost: high
The highest overrun percentages are found in ice creams that use guar gum and xanthan gum, typically in a 3:1 ratio respectively.
Xanthan gum is produced by fermentation of glucose or sucrose by the Xanthomonas campestris bacterium. One of its most remarkable properties of is its capability of producing a large increase in the viscosity of any liquid by adding a very small quantity of gum, usually less than one percent. For this reason, it is used as an emulsifier in a very large percentage of ice creams around the world.
As a polysaccharide, one of the problems with this food additive is that it is typically made from corn. People who have corn allergies may not be aware that these additives can cause diverse reactions when consumed. Moreover, a very large percentage of corn around the world is now genetically modified (GM) which is then reflected in the production of many types of xanthan gum. GM foods are a cause for great concern.
Some people develop an allergy to conventional xanthan gum, with various gastrointestinal symptoms such as bloating, gas, and diarrhea. Even consumption of a very minor amount can lead to days and days of recovery and many trips to the bathroom. For others a xanthan reaction can also precipitate migraine headaches and skin itchiness.
Plant sourced organic xanthan gum is non GM and non corn-derived without any chemical reproduction in a laboratory. Some people who develop reactions to synthetic xanthan sources and then consume organic sources experience no symptoms at all. If the xanthan gum is not labeled as organic, avoid the product.
Guar gum is an emulsifier, a firming agent, a formulation aid, stabiliser, a thickener and even a plasticizer. It is a natural hydrocolloid that is obtained from the ground endosperm of the guar plant. When untreated ice cream melts and refreezes, grainy ice crystals often form. Guar gum has the natural ability to bind with water molecules, preventing them from forming the unwanted crystals. The gum functions dynamically and synergistically with xanthan gum by increasing the viscosity of ice cream.
The use of conventional guar gum as an ingredient in non-prescription diet aids was officially banned in the early 1990s in Canada and the U.S. The guar gum would bind with liquids in the stomach and swell, causing a feeling of satisfying fullness.
However, this mass of swollen guar gum would also cause dangerous intestinal and duodenal blockages, as well as abdominal cramps, nausea, flatulence and diarrhea. Guar gum was declared unsafe and ineffective for use as a non- prescription diet aid, but then allowed in small doses in the food supply.
Conventional and synthetic guar gum has been linked through studies to a high molecular weight agent that can cause occupational rhinitis and asthma. Its ingestion may also cause a significant reduction in the absorption and bioavailability of calcium, iron, and zinc.
Organic guar gum containing a high quantity of soluble fiber can be a very good aid to both irritable bowel syndrome and diarrhea. The soluble fiber present in organic guar gum dissolves in water though it is not digested. Moreover, when fully organic, this natural laxative contains no harmful chemicals as found in synthetic and conventional versions and thus has no side effects.
If the guar gum is not labeled as organic, avoid the product.
Soy Lecithin or Soya Lecithin
Healthy sources of soy lecithin have many benefits and are a source of choline. It helps dissolve fat and cholesterol and can help regulate your kidney, liver and gallbladder function.
The problem is, just as corn, a very large percentage of soy lecithin is produced from soy which is GM and unfermented. Fermented soy is the only soy fit for human consumption. Unfermented soy has been linked to digestive distress, immune system breakdown, PMS, endometriosis, reproductive problems for men and women, allergies, ADD and ADHD, higher risk of heart disease and cancer, malnutrition, and loss of libido.
If you can contact the food manufacturer and firmly source the soy lecithin and confirm it’s non GM and fermented …fantastic, otherwise stay away from any food product with this additive.
Commerical Varieties and Making Your Own
Some of the largest ice cream chains in the world such as Baskin-Robbins, Ben & Jerry’s, Dairy Queen and Häagen-Dazs all use the above toxic ingredients in their flavours. All local ice cream parlors also include them in their formulations. There are literally hundreds of other conventional ice cream manufacturers and brands around the world. With the exception of companies that emphasize organic all-natural products (i.e. Mapleton’s), we have yet to find one ice cream producer that does not use any of the above ingredients in their manufacturing process.
These days, there is only one way to eat healthy ice cream….make it yourself. Here’s how:
Borrowed from “Nourishing Traditions” by Sally Fallon:
* 3 egg yolks
* 1/2 cup maple syrup
* 1 tablespoon vanilla extract
* 1 tablespoon arrowroot
* 3 cups heavy cream, preferably raw, not ultrapasteurized
Beat egg yolks and blend in remaining ingredients. Pour into an ice cream maker and process according to instructions. (Remember to choose the highest quality ingredients you can find like raw cream, eggs from pastured chickens, or at least organic eggs, and organic (grade B, if you can find it) maple syrup. Pure vanilla extract and arrowroot powder or flour can be found in most health food stores.)
Let’s do a little thought exercise here. Imagine that some force was flooding an indigenous people’s lands with millions of unassimilable foreigners, and it was understood that this influx would irretrievably change that land’s culture and replace the population. What would anthropologists call this phenomenon? Cultural genocide comes to mind.
Of course, in America we call it “immigration policy.”
Now, when King Edward I “Longshanks” said about dominating the Scots in the film Braveheart, “If we can’t get them out, we’ll breed them out,” it was to be expected from an enemy of Scotland. And how should we characterize America’s immigrationists, who have long been washing American culture away with endless waves of unassimilable foreigners?
Before answering, let’s first consider the testimony of Fredo Arias-King, ex-aide to former Mexican president-elect Vicente Fox (hat tip: Timothy Birdnow). About how he and his colleagues spoke to 50 US congressmen and senators back in 1999 and 2000 he writes:
Of those 50 legislators, 45 were unambiguously pro-immigration, even asking us at times to “send more.” This was true of both Democrats and Republicans.
…[Moreover] [m]ost of them seemed to be aware of the negative or at least doubtful consequences of mass immigration from Latin America, while still advocating mass immigration.
… [The Democrat legislators] seemed more interested in those immigrants and their offspring as a tool to increase the role of the government in society and the economy. Several of them tended to see Latin American immigrants and even Latino constituents as both more dependent on and accepting of active government programs and the political class guaranteeing those programs, a point they emphasized more than the voting per se. Moreover, they saw Latinos as more loyal and “dependable” in supporting a patron-client system and in building reliable patronage networks to circumvent the exigencies of political life as devised by the Founding Fathers….
Republican lawmakers we spoke with knew…that they may not now receive their [the naturalized Mexicans’] votes, [but] they believed that these immigrants are more malleable than the existing American: That with enough care, convincing, and “teaching,” they could be converted, be grateful, and become dependent on them. Republicans seemed to idealize the patron-client relation with Hispanics as much as their Democratic competitors did.
…Also curiously, the Republican enthusiasm for increased immigration also was not so much about voting in the end, even with “converted” Latinos. Instead, these legislators seemingly believed that they could weaken the restraining and frustrating straightjacket devised by the Founding Fathers and abetted by American norms. In that idealized “new” United States, political uncertainty, demanding constituents, difficult elections, and accountability in general would “go away” after tinkering with the People….
…I remember few instances when a legislator spoke well of his or her white constituents. One even called them “rednecks,” and apologized to us on their behalf for their incorrect attitude on immigration. Most of them seemed to advocate changing the ethnic composition of the United Statesas an end in itself.
This isn’t unusual in the West, either. In fact, it was revealed in 2009 that the UK’s immigrationists sought to socially engineer a “multicultural” Britain because they wanted to “rub the Right’s nose in diversity and render their arguments out of date” but didn’t want to divulge the scheme lest they lose their “core working class vote.” With friends like that….
Now, what would you call people who visit such a thing upon their own culture solely to gain power? And what fate do they deserve?
G.K. Chesterton’s comment, “It is terrible to contemplate how few politicians are hanged,” comes to mind.
In fairness, Mr. Arias-King’s experiences predate the Tea Party revolution, and the House GOP did defeat John McCain’s shamnesty bill in 2007. I also suspect that it was legislators partial to immigration who were inclined to meet with him in the first place. And while I don’t doubt that closeted culturally genocidal maniacs still exist (in abundance), there are also those who genuinely believe that diversity should be “an end in itself.” Unfortunately, bad policy is equally destructive whether implemented out of malice or stupidity.
Speaking of which, multiculturalism can only ever be what it is, an ideology; it can never be a workable reality. Having many different cultures within the same borders is actually called balkanization, and its consequences have been repeatedly observed throughout history. If the differences among the disparate peoples become great enough, the nation may be partitioned so they can go their separate ways. And there are only two possibilities for avoiding this. One is if an iron fist of tyranny holds the competing cultures together, as Marshall Tito did in the former Yugoslavia (and we all know why it’s “former”); the other is if one group prevails over and subsumes the rest, as the Japanese have largely done with the Ainus, an aboriginal people who once dominated the island of Hokkaido.
This is absolutely the norm. Do the names, Saxons, Alans, Franks, Visigoths, Vandals, Avars, Alemanni and Frisians sound at all familiar? They were once distinct groups that occupied early medieval Europe, but they are no more, having been subsumed into a wider culture. This may be good thing if it’s a superior culture, it may be a bad thing if beauty was lost, or it may be a mixed bag. But it is an undeniable thing.
This brings us to the myth of diversity. All it can ever be is a liability to, hopefully, be overcome; it can never be the “strength” it’s billed as (without even a shred of evidence in support of the notion). And, interestingly, here’s what the Online Etymology Dictionary tells us about the origin of the term “diversity”: “mid-14c., from O.Fr. diversité (12c.) ‘difference, oddness, wickedness, perversity,’ from L. diversitatem ‘contrariety, disagreement, difference . . . .’” “Contrariety” and “disagreement”…. It certainly worked out that way in Yugoslavia, in the Soviet Union, in Czechoslovakia, in India (when two regions broke away and became Pakistan and Bangladesh). Why, even in Canada, where Quebecois and other Canadians are racially identical, there has often been talk of secession.
So how much more of a problem it is when a group not only has a different language, but is different racially, economically, culturally and ideologically? And what about when that group of diversifiers supposes it has a rightful claim to your territory (a poll showed a majority of Mexicans believing that the Southwest belongs to Mexico and that they have a “right to enter the U.S. without U.S. permission”)? What about when you try to teach these newcomers American history and they say, as a teacher respondent reported to me some years ago, “We don’t care about this — we’re Mexican.” When people have come to your land mainly to make money and have loyalty lying elsewhere, it doesn’t bode well for assimilation.
The kicker here is that flooding a nation with unassimilable foreigners may do no more for diversity over the long term than pythons in the Everglades. Sure, the swamp is currently more diverse — with tens of thousands of fascinating non-indigenous creatures added to the mix — but how diverse will the ecosystem be when they decimate native species? Thus have Florida authorities decided that amnesty for the snakes probably isn’t the best idea.
So it is with a cultural ecosystem. Harking back to my earlier point, the introduction of new cultural elements isn’t always just a matter of simple addition; subtraction and division can be factors as well. When worlds collide, when there is an incongruence of cultural elements, there may be mixing as with the wolf and coyote. Or there may be an extinction, as with how the Dodo on Mauritius was wiped out by rats. Of course, a new equilibrium is always established, but it may very well be less diverse. And, for sure, it will be different.
The good news here, if one can call it that, is embedded within the bad. The history of social engineers is that they possess no clearer a crystal ball than do futurists or science-fiction writers. If the immigrationist traitors simply want to destroy America, they will certainly get their way. But they will never have Mexico Norte, a republic they can comfortably rule as patrons of complacent clients. Because nature — in this case man’s — takes it course, and some people will likely realize that less is more — and that only divided we stand.
Editors Note: Fascism is alive and well in Canada.
RCMP revealed Thursday that officers have seized a “substantial amount” of firearms from homes in the evacuated town of High River.
“We just want to make sure that all of those things are in a spot that we control, simply because of what they are,” said Sgt. Brian Topham.
“People have a significant amount of money invested in firearms … so we put them in a place that we control and that they’re safe.”
That news didn’t sit well with a crowd of frustrated residents who had planned to breach a police checkpoint northwest of the town as an evacuation order stretched into its eighth day.
“I find that absolutely incredible that they have the right to go into a person’s belongings out of their home,” said resident Brenda Lackey, after learning Mounties have been taking residents’ guns. “When people find out about this there’s going to be untold hell to pay.”
About 30 RCMP officers set up a blockade at the checkpoint, preventing 50 residents from walking into the town. Dozens more police cars, lights on, could be seen lining streets in the town on standby.
Officers laid down a spike belt to stop anyone from attempting to drive past the blockade. That action sent the crowd of residents into a rage.
“What’s next? Tear gas?” shouted one resident.
“It’s just like Nazi Germany, just taking orders,” shouted another.
“This is the reason the U.S. has the right to bear arms,” said Charles Timpano, pointing to the group of Mounties.
Officers were ordered to fall back about an hour into the standoff in order to diffuse the situation and listen to residents’ concerns.
“We don’t want our town to turn into another New Orleans,” said resident Jeff Langford. “The longer that the water stays in our houses the worse it’s going to be. We’ll either be bulldozing them or burning them down because we’ve got an incompetent government.”
Speaking at the end of the meeting of the EU-Ukraine Cooperation Council in Luxembourg on June 24, European Enlargement Commissioner Štefan Füle warned Ukraine that “time is running preciously short” for the government in Kiev to meet all European Union conditions in time to sign a free trade and association agreement in November. “Ukraine has made good progress in some areas,” Füle said, but added that “more needs to be done for Ukraine to achieve tangible progress on all the benchmarks,” including “increased determination and reinforced action”—an obvious reference to the case of Yulia Tymoshenko.
While stressing that closer links with the EU remain its priority, in recent weeks the Ukrainian government has also probed the possibilities of strengthening its ties with the Customs Union formed in 2010 by Russia, Belarus and Kazakhstan. Moscow would like to see Ukraine in the “Common Economic Space,” but it is reluctant to grant it a half-way status that would fall short of full membership. Kiev would prefer that option in order not to sever its EU connection.
The dilemma has received scant attention in the Western media. Considering its size and strategic importance, it is curious how underreported Ukraine remains 22 years after independence. The second largest country in Europe—the true link (and a key energy corridor) between Russia and the Old Continent’s heartland west of the Carpathian Mountains—has just under fifty million people, a rich agricultural base, and a long Black Sea shoreline which includes the all-important naval bases in the Crimea. Its geopolitical significance cannot be overstated.
Kiev’s current quandary is real, but it should not overshadow Ukraine’s promise as a pivotal player in the development of regional cooperation with its EU neighbors to the West, former CIS countries to the north and east, and emerging regional powers further afield. On my recent visits to Ukraine—most recently as an election observer last October – I was struck by the tendency of some local analysts to focus on the role of their country as an object of geopolitical rivalry of others, and to neglect its potential as a significant actor in its own right.
That potential is real. The importance of food as a key strategic commodity will continue to grow in the decades ahead, and Ukraine has an enormous, still untapped capability to become a global-scale producer. In 2012 Ukrainian agricultural sector raised $2bn in capital investments, which is 11 percent higher than in 2011 but still short of what is needed to unleash its potential. If and when Ukraine’s farmers gain reliable and affordable access to finance, they will be able to compete with, and perhaps out-produce, their peers in the American Midwest or Canada. Cooperation with key EU agricultural producers, such as France, is proceeding apace and should continue regardless of what happens in Vilnius next November. The same applies to Kiev’s cooperation with the EU in the energy sector in 2013—an important step in making Ukraine’s role as a key energy conduit more stable, predictable and transparent.
Bilateral cooperation can flourish even in the absence of speedy integrations, as recent experience suggests. Ukraine’s merchandise trade deficit narrowed to $608.5 million in April, which is markedly less than a year ago. Exports increased 4.7% year-on-year, while imports declined 8.1%. Most of its minerals, steel, coal, petroleum products and grains go to other former Soviet republics, but Germany and Poland have been gaining importance in recent years. Trade with Hungary, Sweden, and other smaller EU members has also recorded significant increases. Outside the EU and the former Soviet Union, Ukraine’s key partners are Turkey (second-largest overall, after Russia) and China. Ukraine will sign an agreement on a free tradearea (FTA) with Turkey in October, and its trade with China is expected to double to $20bn in the next few years.
Regardless of its hoped-for integrations, Ukraine can and should project more resolutely its “soft power” in the region. Its rich cultural heritage and still underdeveloped tourist industry are by no means the only assets. The 2012 UEFA European Football Championship, commonly referred to as Euro 2012—jointly hosted by Poland and Ukraine—was an expensive but useful step in the right direction. There are still too few foreign students, researchers and guest-lecturers in Kiev, Kharkov, Lvov or Odessa, considering the quality of their institutions of higher learning.
The perennial issue of Ukraine’s geopolitical strategy—should it lean to the East or to the West—is on the whole somewhat artificial. Experts note that recent trends in the country’s foreign trade have created preconditions for growth even if it joins neither the European Union nor the Moscow-led customs union. It is noteworthy that even some EU leaders take the view that Ukraine should follow a two-track approach.
Stability in Europe and the continent’s long-term integration devoid of the Cold War, zero-sum-game mentality, requires a new paradigm in Kiev. It should be based on further diversification of political and economic options, which is not incompatible with Ukraine’s quest for optimal forms of association with its eastern and western neighbors.
I write a lot about the dangers of processed foods when it comes to wreaking havoc on our health, but even I was surprised to find that 80% of pre-packaged foods sold in the United States are actually banned in other nations. And for good reason.
Whether it’s toxic soda brands like Mountain Dew, or sugary artificial cereals and carcinogenic ‘potato’ chips, around 80% of the processed food variety within the US actually contains ingredients that are banned around the world in countries like Canada and the United Kingdom. As a matter of fact, sometimes they’re banned throughout the entire European Union. The FDA, however, seems quite alright with these disease-linked substances lurking within the food supply.
And the USDA? Oh, well they also went ahead and approved the very same toxic pesticide that the EU banned just days earlier over significant health concerns and links to the destruction of the bee population — a population which we need in order to generate a staple crop supply for the entire globe.
Banned Ingredients In Your Food
According to a report in Yahoo Sunshine, a team of researchers actually went in and discovered the percentage of items banned based on the examination of ingredients the products contain that were banned across the globe.
From substances like Olestra (used in low fat products and linked to gastrointestinal disorders and of course increased weight gain ironically enough) to thyroid-decimating brominated vegetable oil, hundreds of thousands of products were found to be utilizing these disease-riddled ingredients that the rest of the world shuns due to health concerns.
Meanwhile, Americans are being sold these ‘food’ products throughout the nation via deep discounts and heavy promotions through their local grocery stores. And what does the government have to say?
The same government that cracks down on raw milk and natural supplements. Well, the US government goes ahead and allows for Big Food corporations to unleash their entire medley of health-crushing ingredients within the food supply, and then uses phony corporate science to say that it’s ‘unscientific’ to criticize these companies for their complete lack of concern for public safety.
The bottom line? Ditch any processed food you may be consuming, and don’t be fooled by phony Big Food corporate science. Over 80% of what’s considered food here in the US has been banned in other nations, and citizens there would never dream of eating the yoga mat chemicals that we call chicken nuggets here in the USA.
In the course of his professional life in the world of national security Edward Snowden must have gone through numerous probing interviews, lie detector examinations, and exceedingly detailed background checks, as well as filling out endless forms carefully designed to catch any kind of falsehood or inconsistency. The Washington Post (June 10) reported that “several officials said the CIA will now undoubtedly begin reviewing the process by which Snowden may have been hired, seeking to determine whether there were any missed signs that he might one day betray national secrets.”
Yes, there was a sign they missed – Edward Snowden had something inside him shaped like a conscience, just waiting for a cause.
It was the same with me. I went to work at the State Department, planning to become a Foreign Service Officer, with the best – the most patriotic – of intentions, going to do my best to slay the beast of the International Communist Conspiracy. But then the horror, on a daily basis, of what the United States was doing to the people of Vietnam was brought home to me in every form of media; it was making me sick at heart. My conscience had found its cause, and nothing that I could have been asked in a pre-employment interview would have alerted my interrogators of the possible danger I posed because I didn’t know of the danger myself. No questioning of my friends and relatives could have turned up the slightest hint of the radical anti-war activist I was to become. My friends and relatives were to be as surprised as I was to be. There was simply no way for the State Department security office to know that I should not be hired and given a Secret Clearance. 1
So what is a poor National Security State to do? Well, they might consider behaving themselves. Stop doing all the terrible things that grieve people like me and Edward Snowden and Bradley Manning and so many others. Stop the bombings, the invasions, the endless wars, the torture, the sanctions, the overthrows, the support of dictatorships, the unmitigated support of Israel; stop all the things that make the United States so hated, that create all the anti-American terrorists, that compel the National Security State – in pure self defense – to spy on the entire world.
Eavesdropping on the planet
The above is the title of an essay that I wrote in 2000 that appeared as a chapter in my book Rogue State: A Guide to the World’s Only Superpower. Here are some excerpts that may help to put the current revelations surrounding Edward Snowden into perspective …
Can people in the 21st century imagine a greater invasion of privacy on all of earth, in all of history? If so, they merely have to wait for technology to catch up with their imagination.
Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communications traffic, microwave links … voice, text, images … captured by satellites continuously orbiting the earth, then processed by high-powered computers … if it runs on electromagnetic energy, NSA is there, with high high tech. Twenty-four hours a day. Perhaps billions of messages sucked up each day. No one escapes. Not presidents, prime ministers, the UN Secretary-General, the pope, the Queen of England, embassies, transnational corporation CEOs, friend, foe, your Aunt Lena … if God has a phone, it’s being monitored … maybe your dog isn’t being tapped. The oceans will not protect you. American submarines have been attaching tapping pods to deep underwater cables for decades.
Under a system codenamed ECHELON, launched in the 1970s, the NSA and its junior partners in Britain, Australia, New Zealand, and Canada operate a network of massive, highly automated interception stations, covering the globe amongst them. Any of the partners can ask any of the others to intercept its own domestic communications. It can then truthfully say it does not spy on its own citizens.
Apart from specifically-targeted individuals and institutions, the ECHELON system works by indiscriminately intercepting huge quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. Every intercepted message – all the embassy cables, the business deals, the sex talk, the birthday greetings – is searched for keywords, which could be anything the searchers think might be of interest. All it takes to flag a communication is for one of the parties to use a couple or so of the key words in the ECHELON “dictionary” – “He lives in a lovely old white house on Bush Street, right near me. I can shoot over there in two minutes.” Within limitations, computers can “listen” to telephone calls and recognize when keywords are spoken. Those calls are extracted and recorded separately, to be listened to in full by humans. The list of specific targets at any given time is undoubtedly wide ranging, at one point including the likes of Amnesty International and Christian Aid.
ECHELON is carried out without official acknowledgment of its existence, let alone any democratic oversight or public or legislative debate as to whether it serves a decent purpose. The extensiveness of the ECHELON global network is a product of decades of intense Cold War activity. Yet with the end of the Cold War, its budget – far from being greatly reduced – was increased, and the network has grown in both power and reach; yet another piece of evidence that the Cold War was not a battle against something called “the international communist conspiracy”.
The European Parliament in the late 1990s began to wake up to this intrusion into the continent’s affairs. The parliament’s Civil Liberties Committee commissioned a report, which appeared in 1998 and recommended a variety of measures for dealing with the increasing power of the technologies of surveillance. It bluntly advised: “The European Parliament should reject proposals from the United States for making private messages via the global communications network [Internet] accessible to US intelligence agencies.” The report denounced Britain’s role as a double-agent, spying on its own European partners.
Despite these concerns the US has continued to expand ECHELON surveillance in Europe, partly because of heightened interest in commercial espionage – to uncover industrial information that would provide American corporations with an advantage over foreign rivals.
German security experts discovered several years ago that ECHELON was engaged in heavy commercial spying in Europe. Victims included such German firms as the wind generator manufacturer Enercon. In 1998, Enercon developed what it thought was a secret invention, enabling it to generate electricity from wind power at a far cheaper rate than before. However, when the company tried to market its invention in the United States, it was confronted by its American rival, Kenetech, which announced that it had already patented a near-identical development. Kenetech then brought a court order against Enercon to ban the sale of its equipment in the US. In a rare public disclosure, an NSA employee, who refused to be named, agreed to appear in silhouette on German television to reveal how he had stolen Enercon’s secrets by tapping the telephone and computer link lines that ran between Enercon’s research laboratory and its production unit some 12 miles away. Detailed plans of the company’s invention were then passed on to Kenetech.
In 1994, Thomson S.A., located in Paris, and Airbus Industrie, based in Blagnac Cedex, France, also lost lucrative contracts, snatched away by American rivals aided by information covertly collected by NSA and CIA. The same agencies also eavesdropped on Japanese representatives during negotiations with the United States in 1995 over auto parts trade.
German industry has complained that it is in a particularly vulnerable position because the government forbids its security services from conducting similar industrial espionage. “German politicians still support the rather naive idea that political allies should not spy on each other’s businesses. The Americans and the British do not have such illusions,” said journalist Udo Ulfkotte, a specialist in European industrial espionage, in 1999.
That same year, Germany demanded that the United States recall three CIA operatives for their activities in Germany involving economic espionage. The news report stated that the Germans “have long been suspicious of the eavesdropping capabilities of the enormous U.S. radar and communications complex at Bad Aibling, near Munich”, which is in fact an NSA intercept station. “The Americans tell us it is used solely to monitor communications by potential enemies, but how can we be entirely sure that they are not picking up pieces of information that we think should remain completely secret?” asked a senior German official. Japanese officials most likely have been told a similar story by Washington about the more than a dozen signals intelligence bases which Japan has allowed to be located on its territory.
In their quest to gain access to more and more private information, the NSA, the FBI, and other components of the US national security establishment have been engaged for years in a campaign to require American telecommunications manufacturers and carriers to design their equipment and networks to optimize the authorities’ wiretapping ability. Some industry insiders say they believe that some US machines approved for export contain NSA “back doors” (also called “trap doors”).
The United States has been trying to persuade European Union countries as well to allow it “back-door” access to encryption programs, claiming that this was to serve the needs of law-enforcement agencies. However, a report released by the European Parliament in May 1999 asserted that Washington’s plans for controlling encryption software in Europe had nothing to do with law enforcement and everything to do with US industrial espionage. The NSA has also dispatched FBI agents on break-in missions to snatch code books from foreign facilities in the United States, and CIA officers to recruit foreign communications clerks abroad and buy their code secrets, according to veteran intelligence officials.
For decades, beginning in the 1950s, the Swiss company Crypto AG sold the world’s most sophisticated and secure encryption technology. The firm staked its reputation and the security concerns of its clients on its neutrality in the Cold War or any other war. The purchasing nations, some 120 of them – including prime US intelligence targets such as Iran, Iraq, Libya and Yugoslavia – confident that their communications were protected, sent messages from their capitals to their embassies, military missions, trade offices, and espionage dens around the world, via telex, radio, and fax. And all the while, because of a secret agreement between the company and NSA, these governments might as well have been hand delivering the messages to Washington, uncoded. For their Crypto AG machines had been rigged before being sold to them, so that when they used them the random encryption key could be automatically and clandestinely transmitted along with the enciphered message. NSA analysts could read the messages as easily as they could the morning newspaper.
In 1986, because of US public statements concerning the La Belle disco bombing in West Berlin, the Libyans began to suspect that something was rotten with Crypto AG’s machines and switched to another Swiss firm, Gretag Data Systems AG. But it appears that NSA had that base covered as well. In 1992, after a series of suspicious circumstances over the previous few years, Iran came to a conclusion similar to Libya’s, and arrested a Crypto AG employee who was in Iran on a business trip. He was eventually ransomed, but the incident became well known and the scam began to unravel in earnest.
In September 1999 it was revealed that NSA had arranged with Microsoft to insert special “keys” into Windows software, in all versions from 95-OSR2 onwards. An American computer scientist, Andrew Fernandez of Cryptonym in North Carolina, had disassembled parts of the Windows instruction code and found the smoking gun – Microsoft’s developers had failed to remove the debugging symbols used to test this software before they released it. Inside the code were the labels for two keys. One was called “KEY”. The other was called “NSAKEY”. Fernandez presented his finding at a conference at which some Windows developers were also in attendance. The developers did not deny that the NSA key was built into their software, but they refused to talk about what the key did, or why it had been put there without users’ knowledge. Fernandez says that NSA’s “back door” in the world’s most commonly used operating system makes it “orders of magnitude easier for the US government to access your computer.”
In February 2000, it was disclosed that the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defense Ministry, had prepared a report in 1999 which also asserted that NSA had helped to install secret programs in Microsoft software. According to the DAS report, “it would seem that the creation of Microsoft was largely supported, not least financially, by the NSA, and that IBM was made to accept the [Microsoft] MS-DOS operating system by the same administration.” The report stated that there had been a “strong suspicion of a lack of security fed by insistent rumors about the existence of spy programs on Microsoft, and by the presence of NSA personnel in Bill Gates’ development teams.” The Pentagon, said the report, was Microsoft’s biggest client in the world.
Recent years have seen disclosures that in the countdown to their invasion of Iraq in 2003, the United States had listened in on UN Secretary-General Kofi Annan, UN weapons inspectors in Iraq, and all the members of the UN Security Council during a period when they were deliberating about what action to take in Iraq.
It’s as if the American national security establishment feels that it has an inalienable right to listen in; as if there had been a constitutional amendment, applicable to the entire world, stating that “Congress shall make no law abridging the freedom of the government to intercept the personal communications of anyone.” And the Fourth Amendment had been changed to read: “Persons shall be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, except in cases of national security, real or alleged.” 2
The leading whistleblower of all time: Philip Agee
Before there was Edward Snowden, William Binney and Thomas Drake … before there was Bradley Manning, Sibel Edmonds and Jesselyn Radack … there was Philip Agee. What Agee revealed is still the most startling and important information about US foreign policy that any American government whistleblower has ever revealed.
Philip Agee spent 12 years (1957-69) as a CIA case officer, most of it in Latin America. His first book, Inside the Company: CIA Diary, published in 1974 – a pioneering work on the Agency’s methods and their devastating consequences – appeared in about 30 languages around the world and was a best seller in many countries; it included a 23-page appendix with the names of hundreds of undercover Agency operatives and organizations.
Under CIA manipulation, direction and, usually, their payroll, were past and present presidents of Mexico, Colombia, Uruguay, and Costa Rica, “our minister of labor”, “our vice-president”, “my police”, journalists, labor leaders, student leaders, diplomats, and many others. If the Agency wished to disseminate anti-communist propaganda, cause dissension in leftist ranks, or have Communist embassy personnel expelled, it need only prepare some phoney documents, present them to the appropriate government ministers and journalists, and – presto! – instant scandal.
Agee’s goal in naming all these individuals, quite simply, was to make it as difficult as he could for the CIA to continue doing its dirty work.
A common Agency tactic was writing editorials and phoney news stories to be knowingly published by Latin American media with no indication of the CIA authorship or CIA payment to the media. The propaganda value of such a “news” item might be multiplied by being picked up by other CIA stations in Latin America who would disseminate it through a CIA-owned news agency or a CIA-owned radio station. Some of these stories made their way back to the United States to be read or heard by unknowing North Americans.
Wooing the working class came in for special treatment. Labor organizations by the dozen, sometimes hardly more than names on stationery, were created, altered, combined, liquidated, and new ones created again, in an almost frenzied attempt to find the right combination to compete with existing left-oriented unions and take national leadership away from them.
In 1975 these revelations were new and shocking; for many readers it was the first hint that American foreign policy was not quite what their high-school textbooks had told them nor what theNew York Times had reported.
“As complete an account of spy work as is likely to be published anywhere, an authentic account of how an ordinary American or British ‘case officer’ operates … All of it … presented with deadly accuracy,” wrote Miles Copeland, a former CIA station chief, and ardent foe of Agee. (There’s no former CIA officer more hated by members of the intelligence establishment than Agee; no one’s even close; due in part to his traveling to Cuba and having long-term contact with Cuban intelligence.)
In contrast to Agee, WikiLeaks withheld the names of hundreds of informants from the nearly 400,000 Iraq war documents it released.
In 1969, Agee resigned from the CIA (and colleagues who “long ago ceased to believe in what they are doing”).
While on the run from the CIA as he was writing Inside the Company – at times literally running for his life – Agee was expelled from, or refused admittance to, Italy, Britain, France, West Germany, the Netherlands, and Norway. (West Germany eventually gave him asylum because his wife was a leading ballerina in the country.) Agee’s account of his period on the run can be found detailed in his book On the Run (1987). It’s an exciting read.
- To read about my State Department and other adventures, see my book West-Bloc Dissident: A Cold war Memoir (2002) ↩
- See Rogue State: A Guide to the World’s Only Superpower, chapter 21, for the notes for the above. ↩
The violation of civil liberties in the name of security has had a profound impact on those who came of age after 9/11…
When Darrell Anderson, 22, joined the US military he knew there was going to be a war, and he wanted to fight it. “I thought I was going to free Iraqi people,” he told me. “I thought I was going to do a good thing.”
Until, that is, he realised precisely what he had to do. While on patrol in Baghdad, he thought: “What are we doing here? Are we looking for weapons of mass destruction? No. Are we helping the people? No, they hate us. What are we working towards, apart from just staying alive? If this was my neighbourhood and foreign soldiers were doing this then what would I be doing?” Within a few months, he says, “I was cocking my weapon at innocent civilians without any sympathy or humanity”. While home on leave he realised he was not going to be able to lead a normal life if he went back. His mum drove him to Canada, where I met him in 2006 at a picnic for war resisters in Fort Erie.
Anderson’s trajectory, from uncritical patriotism to conscious disaffection and finally to conscientious dissent, is a familiar one among a generation of Americans who came of political age after 9/11. Over time, efforts to balance the myth of American freedom on which they were raised, with the reality of American power that they have been called on to monitor or operate, causes a profound dislocation in their world view. Like a meat eater in an abattoir, they are forced to confront the brutality of the world they are implicated in and recoil at their role in it – occasionally in dramatic fashion.
It is from this generation that the most recent prominent whistleblowers have emerged: Edward Snowden, 29, the former National Security Agency contractor, now on the run after passing evidence of mass snooping to the Guardian; Bradley Manning, who at 22 gave classified diplomatic and military information to WikiLeaks and now faces a court martial; the late Aaron Swartz, who by 24 was a veteran hacker when he was arrested for illegally downloading academic articles from Massachusetts Institute of Technology and later took his own life; and Jeremy Hammond, 28, who is facing federal criminal charges for allegedly publicising the internal files of a private spying agency.
Just as America’s military record abroad, complete with torture and “collateral damage”, has helped push a section of disaffected Muslim youth across the globe towards terrorism, so the violation of civil liberties and privatisation of information has driven a number of disillusioned Americans to law-breaking dissent at home.
In a 2008 book, The Way We’ll Be, US pollster John Zogby categorised this age cohort as First Globals. Tracking everything from views on gay marriage to propensity to travel, he described young Americans aged 18-29 as “the most outward-looking and accepting generation in American history”. Unfazed by social diversity at home, they held more open attitudes towards the rest of the world. They were far more likely to travel abroad than others, have friends or family overseas, and to be aware of international politics. “[They] might not be more able than other age cohorts to point to Darfur on a map,” argued Zogby, “but they at least know there is a Darfur, and they care what’s happening there.”
The perpetual war and accompanying “anti-terror” security structure after 9/11 is all this generation has ever known. And it has had a profound impact on shaping their views on US foreign policy.
In 2007, 63% (significantly higher than any other age group) disagreed with the statement “I support my country, right or wrong”. In 2004, 86% thought “an imperialist power that acts on its own regardless of what the rest of the world thinks” was improper or somewhat improper, while just 3% thought the opposite. On the latter question, Zogby wrote: “No other group we studied, not Democrats nor self-described progressives, not readers of the New York Times, had a greater spread between the two extremes.” It is in this context that the defiance and determination of these young people must be understood.
One could make too much of their age as a unifying factor. Since these leaks demand proficiency with new technology, those involved are bound to be younger. And older people, with families, careers and pensions, are less likely to do things they know will put them in jail or force them to flee. Moreover, for all the similarities between them, there are significant differences. Snowden contributed money to Republican libertarian Ron Paul’s campaign; Hammond describes himself as an “anarchist-communist”.
Yet, while each acted separately from the other, their unrepentant justifications read as though they were unconsciously working in concert. “I believe people have a right to know what governments and corporations are doing behind closed doors,” wrote Hammond.
“We need to take information,” wrote Swartz. “Wherever it is stored, make our copies and share them with the world.”
“This is the truth. This is what is happening,” said Snowden. ”You should decide whether we need to be doing this.”
Manning said: “I want people to see the truth, because without information you cannot make informed decisions as a public.”
They seek to liberate not land or people, but information. The state seeks to criminalise them as spies. But it wasn’t treachery but patriotism (once blind, now wide-eyed, and arguably always misplaced) that brought most of them to this point. Their aim was neither to enrich themselves nor to aid a foreign power, but to make the power in which they invested much of their identity – America – more transparent, knowledgeable, accountable and honourable.
Anderson, Manning and Snowden, for example, all joined the military-security sector after Guantánamo and Abu Ghraib were in the public domain. They knew what could be done in America’s name. They just never thought they would be put in a position where they would have to choose between doing it, concealing it or exposing it. Raised in the true American ideal that an individual can make a difference, they spoke up.
Forced to choose between allegiance to the flag and uniform, and loyalty to the ideals the flag is supposed to represent and the uniform is supposed to defend, they chose the latter. Their defiance stems from the fact that, in acting as they have, they don’t believe they’ve let down America. They believe they had to act because America was letting itself down.
Source: Gary Younge | The Guardian
What makes Goldman Sachs alumni at the center of international finance? Is it pure talent and business acumen, or is there more to the equation, then grooming the best and the brightest? The answer lies in the indisputable perquisite that places Goldman Sachs Above the Law. How did this banking concern become the most powerful political influence in government policies? Well, central banking certainly is at the core of their economic clout. The ‘TC’ essay Federal Reserve is a Cache of Stolen Assetsgoes into methods that results in the financial slavery. But what makes Goldman Sachs central to their dominance of nations and so many governments?
A pursuit for answers and an explanation needs to investigate internal workings and crucial critiques that demonstrate patterns of global dominance. Former GS operative Greg Smith wrote in the New York Times, Why I Am Leaving Goldman Sachs:
“It might sound surprising to a skeptical public, but culture was always a vital part of Goldman Sachs’s success. It revolved around teamwork, integrity, a spirit of humility, and always doing right by our clients. The culture was the secret sauce that made this place great and allowed us to earn our clients’ trust for 143 years. It wasn’t just about making money; this alone will not sustain a firm for so long. It had something to do with pride and belief in the organization. I am sad to say that I look around today and see virtually no trace of the culture that made me love working for this firm for many years. I no longer have the pride, or the belief.”
Goldman Sachs reached the pinnacle of investment banking because it served the fiscal needs of its clients. When businesses profited from the relationship, all was well for the masters of the universe. The focus upon providing value to substantial businesses, that actually provided constructive products and services, was a formula that has merit and meaningful purpose. Now, essential ethic standards, has become subordinated to the practice of exerting primary political control. Designing exotic deceptive products intent upon usurious returns, betrays the very foundations of raising capital to finance legitimate business development.
The excellent analysis from The Economic Collapse site provides a list of compelling arguments in 11 Reasons Why America Would Be A Better Place Without Goldman Sachs. #9 illustrates the real aim behind the curtain. The Wizard of Oz has a Goldman address.
“Goldman Sachs has way too much influence over the federal government. There is a reason why it is commonly referred to as “Government Sachs”. No matter who is the White House, people that used to work for Goldman and other big Wall Street banks always seem to be crawling around.”
Moreover, the tentacles of international reach have extended well beyond the former bastion of American capitalism. Goldman Sachs takes over America and now Europeis all part of “gods work” . . . Since this year old arrangement was adopted the faltering EU economy intensifies, while the consolidation of political union under the GS model of financial servitude expands.
“Now, the EU has given Goldman Sachs and Co. an unlimited free hand to fleece taxpayers – through the European Stability Mechanism (ESM). It is a permanent facility to replace the temporary Financial Stability Facility and the European Financial Stabilisation Mechanism once Member States, representing 90% of capital commitments have ratified, probably in July 2012.
The ESM is a contract of debt. . . . The authorized share capital must be 700bn €. (to be increased)
[Article 9]: “… ESM members commit themselves irrevocably and unconditionally to pay on demand any capital that is demanded of them … within 7 days of receipt of the request.”.
[Article 10]: “The Council of Governors may decide to change the authorized capital and Article 8.
[Article 27, lines 2-3]: “[Article 27, line 4]: “The property, funding and assets of the ESM shall . . . be immune from every form of legal proceedings – as shall ESM property and assets, governors, deputy governors, directors and officials.
The ESM is an intergovernmental organization, not subject to laws – and not subject to reviewers.”
If you think, the UK escaped this round of exploitation, ready yourself for Mark Carney: Bank governor’s journey from wilderness to heart of the City. “The earning years were – naturally – at Goldman Sachs, where he was marked out as one of the very highest flyers while working in London, Tokyo and New York. The switch to public service – and the public profile that brings – came with a move into central banking, first as deputy and then as governor of the Bank of Canada, in a spell that included the global financial collapse.”Scott Brison, economic spokesman for the Canadian Liberal party – known as “finance critic” – and, a personal friend of Carney’s, provides this assessment.
“Mark has the economic background; but also he has personal understanding of the industry. He has peer-to-peer credibility with some of the top bankers in the world. There’s a language; there’s a cadence.”
In his international role, as chairman of the G20′s Financial Stability Board, he has not only been a strong advocate of tighter regulation, but notched up a furious shouting match with JP Morgan boss Jamie Dimon. Perhaps not surprisingly, given how fast he has risen, Carney has a steely side: several people remembered being warned off disagreeing with him. And he had that life-plan from a relatively early age. “I have heard him say ‘learn, earn, serve,’” says Brison. “He is someone who chooses public service: he is not a materialistic guy.”
First learn, then earn and serve translates into protecting the domination goals of Goldman Sachs. The new code, The Goldman Sachs Business Principles, “Our clients’ interests always come first.”, actually means that the ultimate patrons of Goldman Sachs are the owners of the international central banking system. The public show of faction dissent among banksters is simply posturing. GS only services one nefarious master.
Signals collection has a long secretive and enigmatic history. The very definition of espionage implies spying, most closely associated with foreign sources. Since the Echelon network, the unified function of data retrieval became a given during the cold war. With the revelation of Prism, advances in sophisticated electronic devices and software algorithms provide a major leap. The article, Is PRISM the US version of Echelon?, sums up the evolution. “With this kind of setup and ambition to capture and evaluate private conversations (well, not so private now), makes Echelon that much more believable, and that PRISM is a reflection of the infamous project, but focused solely on the US.”
Bankwatch takes a sanguine attitude towards Why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia. At the same time, the publication references the capacities of the original analogue technology.
“The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON Dictionary) that will prompt the computers to flag the message for recording and transcribing for future analysis. Intelligence analysts at each of the respective listening stations maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept.”
This machinery of electronic snooping has no instinctive restraint on the subject or content, when the technocratic engineers are left to design the next level of the “All Seeing Eye”. The notion that the Prism program is shocking certainly does not conform to the even increasing capacity of surveillance society that has already discarded the presumption of privacy.
The Wall Street Journal forecasts the total integration of data because Technology Emboldened the NSA, to capture all that is digital.
“At a 2009 conference on so-called cloud computing, an NSA official said the agency was developing a new system by linking its various databases and using Hadoop software to analyze them, according to comments reported by the trade publication InformationWeek.
The system would hold “essentially every kind of data there is,” said Randy Garrett, who was then director of technology for the NSA’s integrated intelligence program. “The object is to do things that were essentially impossible before.”
Nonetheless, the Director of National Intelligence issues fact sheet on PRISM in response to leaks, wants you to accept that the government is adhering to stature authority and protecting vital national security interests. “While focusing on the letter of the law and the government’s good intentions, Clapper dodges any mention of how much information (or what kind) is actually collected with the PRISM program.”
OK, only a blood brother operative of the intelligence community will challenge the proposition that the collection of electronic information is the main function of their Skynet self-aware artificial intelligence system. The true debate is whether the data collected is destined for use against targeted American citizens, for nefarious purposes.
Mashable attempts to explain the methodology of PRISM: Does the NSA Really Get Direct Access to Your Data?, and how the “so called” judicial review function of FISA Court approval is processed.
“For Ashkan Soltani, an independent privacy researcher and technologist, this is “a process for submitting [Section] 702 requests and getting responses in a machine-readable form.”
The 41-page PRISM Powerpoint presentation “could be seen as a business development deck indicating all the various providers that they currently have ‘relationships with,’” he told Mashable.
The system is “basically a data-ingestion API,” he said.
Soltani speculated that based on what we know now, PRISM is a “streamlined way” to submit Section 702 orders to the companies for them to review the requests, and it gives the NSA the ability to handle and process the response “in an automated fashion,” just like an app like TripIt, which automatically parses information from your flight reservations.”
According to the American Dream, the terminator assignment is being assembled. The disturbing use of a database maintained since the 1980s by the federal government, Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law, is the ultimate application of the individual dossiers that are generated from signals collection.
“Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database’s name derives from the fact that it contains “copies of the ‘main core’ or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community.”
Looking through the historic prism and behavioral pattern of the shadow government agencies, the lack of dramatic public outrage seems to be the only consistent factor out of the denial denizens that love to salute the flag, while willingly forfeiting their bill of right protections. This regretful conduct is seen in the example from, “Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation…”
Now we are all supposed to empathize with the hysteria of the political careerist class over the disclosures of Edward Snowden. The bipartisan spots of the carnivore leopards never change. When John Boehner Calls Snowden a Traitor, he speaks for much of the establishment and equates loyalty to the state as the very definition of nationalism.
Again, the chronicle of the military-industrial-intelligence-complex is replete with treasonous deeds against the constitutional republic. Remember the Carnivore system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications? Maybe your memory goes back to the archetype whistleblower. None other than the iconic Daniel Ellsberg speaks out on the current scandal in the Guardian letter, Edward Snowden: saving us from the United Stasi of America.
“In 1975, Senator Frank Church spoke of the National Security Agency in these terms:
“I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.”
The dangerous prospect of which he warned was that America’s intelligence gathering capability – which is today beyond any comparison with what existed in his pre-digital era – “at any time could be turned around on the American people and no American would have any privacy left.”
That has now happened. That is what Snowden has exposed, with official, secret documents. The NSA, FBI and CIA have, with the new digital technology, surveillance powers over our own citizens that the Stasi – the secret police in the former “democratic republic” of East Germany – could scarcely have dreamed of. Snowden reveals that the so-called intelligence community has become the United Stasi of America.”
Yes, Virginia our great founding fathers came from not only this old dominion, but had a state of mind that fought the revolutionary war against tyranny. The United Stasi of America is the definitive meaning of the evil empire that protects the globalist criminals that control the political apparatus, known as the federal government.
The echelon network of subversion and espying is but a rung on a ladder of a coercive control. The prism of deception is the false reality your controllers use to relinquish your will to oppose the repression. The secret intelligence agencies only serve their own bureaucratic interests as they obey their master operative superiors.
The disinformation culture is the permanent realism and the snitch society is an essential requirement necessary to keep the imperium in power. With the Americanization of domestic terrorists, Tea Party activists and the Patriotic Truth movement are in the sights of totalitarian gangsters.
Is there any doubt that the NSA, FBI and CIA act as if they are above the law and unaccountable? The great divide between legitimate authority and clandestine oppression is narrow and fragile. The essential question is who is the true enemy? As the surveillance technology perfects their reach and assimilates the application of their data assets, the military option under martial law intensifies. No one is safe. Big Brother has become the impending Terminator.
The Stasi Skynet engulfs everyone. There is no way out of the matrix as long as the globalists operate their spy network. The system is designed to eliminate any and all dissent. Overload the data collectors by intensifying the practice of liberty at every opportunity.
It is a scene out of a futuristic political thriller—the Secretary of State issues secret orders for embassy officials to collect the DNA of foreign heads of state while the President, speaking at a $1000 a plate dinner, is surrounded by a contingent of Secret Service agents wiping clean his drinking glasses and picking up stray hair follicles. They are not just protecting the President—they are protecting the President’s DNA.
If this sounds like a script treatment for a Hollywood version of a Philip K. Dick novel, consider this: The Secretary of State’s name is Hillary Clinton and her directives to embassies were uncovered in a 2010 Wikileaks cable release. The President in this scenario is Barack Obama and the Secret Service unit pledged to protect his DNA is a group of Navy stewards, as revealed in the 2009 book by Ronald Kessler, entitled “In the President’s Secret Service.”
Our government’s DNA obsession was again in the news this week as the Supreme Court handed down a decision, worthy of penning by George Orwell, that law enforcement collection of arrestees’ DNA is not an invasion of privacy. The decision likened DNA to fingerprints, neatly sidestepping the fact that a person’s complete genetic makeup is contained in those drops of blood that the police can now collect with impunity and without fear of a civil rights lawsuit.
Beyond the obvious surface concerns that this decision violates both the Fourth Amendment and the subsequent exclusionary rule (http://en.wikipedia.org/wiki/
Since we are not yet threatened with the spectre of toddlers robbing banks or committing rape, one must look further to discern what is the big deal about our DNA.
Back in 1997, Dr. Wayne Nathanson warned a meeting of the Science and Ethics Department of the Medical Society of the United Kingdom that “gene therapy” might be turned to insidious uses and result in “gene weapons,” which could be used to target specific people containing a specific genetic structure. These weapons, Nathanson warned, “could be delivered not only in the forms already seen in warfare such as gas and aerosol, but could also be added to water supplies, causing not only death but sterility and birth defects in targeted groups.” /www.projectcensored.org/top-
Decades before Dr. Nathanson’s highly publicized warning, the U.S. Government was already hard at work in scientific endeavors to find gene and ethnic specific weapons. In an article entitled “Ethnic Weapons,” published in the Military Review in 1970, the author, Dr. Carl A. Larson, was found rhapsodizing about the state of technology facilitating the targeting of ethnic groups with covert weapons. Wrote Larson: “Surrounded with clouds of secrecy, a systematic search for new incapacitating agents is going on in many laboratories. The general idea, as discussed in open literature, was originally that of minimum destruction.”
However, his tone soon changes and he writes, somewhat chillingly, that “It is quite possible to use incapacitating agents over the entire range of offensive operations, from covert activities to mass destruction.”
Larson concludes with the following stark declaration: “The enzymatic process for RNA production has been known for some years but now the factors have been revealed which regulate the initiation and specificity of enzyme production. Not only have the factors been found, but their inhibitors. Thus, the functions of life lie bare to attack.” (emphasis added)
Dr. Wouter Basson’s research for Project Coast, the biological and chemical warfare unit under the apartheid government in South Africa, was known to be focused on developing a “blacks only” bioweapon. Basson, who was tied to intelligence facilities and labs in both Great Britain and the U.S., has been reported to have been successful in his endeavors, which were taking place back in the seventies. According to sources close to Basson, his research entailed locating substances which would attach onto melanin. Melanin is present in high degrees in darker colored skin.
Since Basson’s work on the melanin project, the rates of hypertension and diabetes have skyrocketed in people of color—specifically those of African descent and also indigenous, brown skinned populations. In some communities, the incidence of these diseases is now reported as up to 50%. Consonant with the reports that this disease- producing melanin- related substance has been leaked into processed food, one finds the spiking rates of the “silent killers,” hypertension and diabetes, to be present in the developed world, where people eat more processed food. In rural Africa, for example, where the population eats food from natural sources, the rates of diabetes and hypertension have remained constant over the years.
The mapping of the human genome satisfied all the requisites for creating gene specific weapons. Geneticists have maintained that developing an ethnic weapon is actually far more difficult than creating a gene weapon to target a specific person. The differences between groups are apparently much smaller than the differences between individuals and therefore the creation of a genetic weapon to target, for example, a head of state or a President is far less challenging than creating such a weapon to target an entire race.
The FBI admits to a database of around 13 million offenders, many only arrested and never charged with a crime. According to Twila Brase, President of Citizens Council for Health Freedom, around 4 million samples (filed with the babies’ names) are collected each year by State Health Departments. Some states, such as Minnesota, have been collecting newborn DNA samples since the mid-eighties. Minnesota alone is reported to have a newborn database of over 1.5 million samples.
The delivery systems for a DNA weapon would be easy: Everything.
Because the weaponized genetic material would only affect the target, the weapon could be leaked into the food supply, the water supply or sprayed in an airborne delivery system, such as the inexplicable chemtrails that are now blanketing our skies. And should a low profile target suddenly die, who would ever know that he died of a gene based weapon? Should the target be high profile, like perhaps a Hugo Chavez or Canada’s Jack Layton, who would be able to trace a deadly disease back to a weapon targeting his DNA?
The insistence of the U.S. Government that it is only trying to protect its citizens from a terrorist threat is the perfect cover of plausible deniability. Under the mantle of “protection,” our rights have been systematically stripped away while wars abroad have been launched against the Semitic peoples of the Middle East. Genetic based weapons are another tool in the plausible deniability eugenics tool box. They may, in fact, be one of the most salient tools.
Years before Nathanson’s warning was issued, our government had already attained a significant level of ability to weaponize against ethnic groups. An article entitled Ethnic Weapons, published in the Military Review in 1970, found the author, Dr. Carl A Larson rhapsodizing about the scientific accomplishments enabling the creation and deployment of ethnic weapons. Wrote Larson: “Surrounded with clouds of secrecy, a systematic search for new incapacitating agents is going on in many laboratories. The general idea, as discussed in open literature, was originally that of minimum destruction.” However, his tone soon changes and he writes, somewhat chillingly that “It is quite possible to use incapacitating agents over the entire range of offensive operations, from covert activities to mass destruction.”
I was converted in the early 1960s through the ministry of. Bruce Larson who headed Faith at Work founded by Rev. Sam Shoemaker Shoemaker was heavily influenced by Frank Buchman’s Oxford Groups which were Humanistic, Evangelical, and Arminian.
For twenty-five years my family and I attended Charismatic churches and followed “Spirit filled” ministers. We were members of a Charismatic Presbyterian Church that was spawned by a larger church of the same denomination. Cultic sisters from Orleans on Cape Cod brought their ministry to this new church and we visited their home and sisterhood several times. New Christians seldom understand the danger of cults.
For almost a decade we attended a Charismatic Methodist Church pastured by a Princeton Graduate who, pained by a lack of church growth, attended a Charismatic home group, received the “Baptism of the Holy Spirit”, forsook the Calvinist roots of his alma mater and was rewarded by full pews. He claimed “the Baptism” freed him to preach a more attractive gospel.
His was a small country church when we began to attend. We watched it grow from less than three score to over a hundred in each of two services. It was a simple white colonial style structure with a small, narrow lobby and doors at the entrance to each pew. There was no choir but both the minister and his wife were talented musicians. She could coax angelic cords from the piano and during the collections played popular praise songs softly sung by the audience; an ineffable, heart breaking ambience often filled the sanctuary.
The minister surrounded himself with talented and loyal lay people and along with the attractive Sundayservice conducted an extensive counseling ministry.
His sermons were edifying and the service was emotionally fulfilling; though there was vague talk of obedience, God’s Commandments were omitted and the ministry was humanistic.
We attended for almost ten years and finally concluded that the fruit of behavioral change was missing and with great disappointment we stopped attending.
There were other newly formed Charismatic churches in the area and this church became one of a group that hosted an ever changing procession of Charismatic thrill seekers. There was fierce competition both within and without.
From the beginning Bob Mumford was a leader in the worldwide Charismatic revival. In the late 1960s we attended his services at Rev. John Poole’s church in Philadelphia. There was much talk about the anointing of the Holy Spirit and these services had the same aura as the Connecticut Church; a healing peaceful calm pervaded the service, the church and the surrounding area.
It seemed to us that the entire monolithic Charismatic Movement, though authentic in many ways, created lots of excitement but failed to produce an effective cohesive Christian laity. In the late 1980s I wrote a letter the Bob Mumford at Life Changers contending that in response to a massive Christian revival the Charismatic Movement had failed to produce the behavioral fruit that God demands and could therefore be under God’s judgment. Though I had supported his ministry Rev. Mumford did not answer my letter.
I was aware of the Shepherding Movement and knew people who were involved. However, I had not joined and was unaware that severe criticism had forced Rev. Mumford and four other Christian ministers to recant on some of their previously held positions. The Shepherding Movement was an attempt to create human accountability in the church. It was an incipient cult and though accountability is still a serious problem its demise was a blessing.
The theology of cults is often superior to mainline Christian churches. However, cults invariably seek to cloister and control. The cult supersedes the family and destroys God’s basic unit of government by dividing and destroying its structure.
The Reformation dealt with several evil doctrines and practices in the Catholic Church but it failed in maintaining a cohesive Christian voice. The heretical theology of Jacob Arminiius found fertile ground and set the stage for the profanity of Dispensationalism which has denuded the Protestant Church. Arminianism got a foot in the door and Dispensationalism cut the heart out of Christianity.
Heretical theologies have produced great revivals with impressive numbers of Christian converts but they rarely produce social transformation. Christians should adore, praise, and seek God and the blessing of His Holy Spirit but pietistic serendipities are ancillary to obeying God’s Commandments.
When the essential theological maxim of obedience is missing there is a strong tendency to exert human control. Cay and Judy from the Community of Jesus http://www.communityofjesus.
The Methodist Minister in Connecticut was successful in controlling a small cadre and a number of persons that received his counsel but his ministry failed to produce social change agents.
The problem is theological. Christians are commanded not to lord it over one another. (Matthew 20, Mark 10) Our leaders are supposed to be servants. The Biblical system of government begins with the family and members of the family are to obey the Father. All Christians are enjoined to obey God’s Commandments. Peace and order come from obedience to God’s Law not from the opinions and whims of sinful men.
The father is expected to be a servant leader who while leading his family is also a servant to it.
Our Savior’s ministry attracted many followers. He healed the sick and set the captives free. But when He went to the Cross the crowds disappeared. Few preachers will confront the moneychangers in the temple or personally confront the humanist leaders of our time. Jesus sought to do the Will of His Father. If contemporary Christians would do the same our nation would be growing in peace and prosperity.
The gaping hole in the theology of Dispensational Evangelical and Charismatic churches causes them to seek control over their congregations. The minister of the Charismatic Methodist set himself up as arbiter through counseling. The Shepherding movement sought accountability through obedience to other human beings. Cultic leaders set themselves up as gods to be followed and obeyed. Pietistic churches fail to teach the primary theme of God’s entire Word. The Bible demands obedience to God’s Commandments when God’s people obey His Law the blessings God promises are there for all to see and His powerful earth changing army can easily defeat the forces of Satan.
God seeks to be praised and adored but his primary desire is to be obeyed.