Home » 2011 » July (Page 8)

Chuck Missler & US Security

TX 20 May 2010 ~ Chuck Missler – well known to Christians around the world for his Koinonia House Ministry… and also to many people here in New Zealand, for his Bible teaching on New Zealand’s Rhema about the 66 books of the Bible, which were written by 40 different authors. Chuck also has an extensive knowledge of international politics, in which he maintains a close interest – stemming from his former career in military intelligence. And while he was in New Zealand recently with his wife Nancy, he stopped by to have a chat about what he sees as some of the major challenges, facing his home country, the United States, today. – The opinions expressed in this clip do not necessarily reflect that of Nzone Focus –

Follow us on Twitter: twitter.com Read Ana’s blog at: www.examiner.com Check Out TYT Interviews www.youtube.com Watch more at www.theyoungturks.com

How Many Gays Must God Create Before We Accept That He Wants Them Around?

Representative Steve Simon (DFL Hopkins/St. Louis Park) says a proposed Minnesota constitutional amendment is largely about religion. He says if sexual orientation is innate as science is showing us, and not a lifestyle choice, then God created gay people. He asks how many gay people must God create before we accept that he wants them around.
Video Rating: 4 / 5

Excepts of Congressman Ron Paul (R-TX) from the documentary “FIAT EMPIRE – Why the Federal Reserve Violates the US Constitution.” Dr. Paul discusses the origins, operations and results of the Federal Reserve System and fiat currency on the US and global economy. The entire film, Fiat Empire, can be accessed at www.FiatEmpire.com or directly at Google Video at http “This Telly Award-winning documentary on the Federal Reserve System was inspired by the well-known book, “The Creature From Jekyll Island” by G. Edward Griffin, and features presidential candidate, RON PAUL. To order a high-quality DVD or VHS tape (by mail) with up to 160-minutes of additional interviews, go to www.FiatEmpire.com To get instant downloads in a range of qualities, go to www.mecfilms.com and select from the “Documentaries” menu. Find out why some feel the Federal Reserve System is a “bunch of organized crooks” and others feel its practices “are in violation of the US Constitution.” Discover why experts agree the Fed is a banking cartel that benefits mainly bankers, their clients in need of easy money and a Congress that would rather increase the National Debt than raise taxes. Produced by William L. Van Alen, Jr., the 1-hour documentary is a co-production between Matrixx Productions and Cornerstone Entertainment and features interviews by, not only G. Edward Griffin, but Congressman Ron Paul (R-Texas); MOVIEGUIDE Founder, Ted Baehr; and constitutional attorney, Edwin Vieira (4 degrees from Harvard
Video Rating: 4 / 5

Cool Citizenship And Freedom images

Some cool Citizenship and Freedom images:

NY – Kingston – Stockade Historic District – Henry Sleight House (Wiltwych Chapter, DAR)
Citizenship and Freedom
Image by wallyg
The Henry Sleight House, at 3 Crown Street, a beautiful example of Dutch Colonial and English Colonial building styles, was built prior to 1695 on a triangular lot within the stockade district. Burned by the British along with the rest of the Stockade, the house was later rebuilt and occupied by Village President Hendricus (Henry) Sleight.

The rear of the house is the older portion and retains a bee hive oven seen in the right exterior wall. The house has a fine Federal style cornice and front entrance was with leaded glass sidelights and transom. The Dutch doors and hardware are original.

Like many of the other buildings within the Stockade District, the Sleight House has been used for many different purposes, but by 1900, the Sleight House had fallen into neglect and was in danger of being demolished. The Wiltwych Chapter of the Daughters of the American Revolution saved the building from destruction, and paid for the complete restoration of the building’s interior and exterior.

The Daughters of the American Revolution was founded in 1890 and incorporated by an Act of Congress in 1896. The DAR works today to "perpetuate the memory and spirit of the men and women who achieved American Independence" by supporting diverse avenues of knowledge–schools, scholarships and museums–and through far-reaching efforts to promote American freedom, traditions and citizenship. Historic preservation has long been a priority for the DAR and the stewardship of American history continues into the present. Offering tours by appointment and genealogical research resources, the Wiltwych Chapter’s ownership and care of the Sleight House exemplifies how preservation efforts can benefit a community.

Outside the front door is a memorial tablet in honor of the Kingston Fire.

Stockade Historic District National Register #75001231 (1975)

Congressman Calls For Removal Of Cemetery Director

Congressman Calls For Removal Of Cemetery Director
More than a thousand people rally for religious freedom at the Houston National Cemetery, and a congressman is calling for the cemetery’s director to be removed.
Read more on KSAT San Antonio

ACLU letter to Fort Bragg criticizes Christian concert
A letter sent to Army leaders from three civil liberties groups criticizes Fort Bragg for hosting a Christian rock concert last fall.
Read more on The Fayetteville Observer

TDSB defends hosting Muslim prayer sessions
Superintendent responds to criticism from Hindu group, says services are run and financed by community, not board
Read more on The Globe and Mail

Project Camelot interviews Dan Burisch – Part 4

Stargate Secrets: Dan Burisch revisited – Part 1 Las Vegas, June 2007 Those familiar with Project Camelot’s work will need no further introduction to Dan Burisch. In this second in-depth interview, which arose from our having presented him with a long list of questions of our own, Dan goes into great detail about both the technology and the politics of the Stargates and the Looking Glass. He also discusses the “Cube”, which may or may not be the same device as the famed ‘Yellow Book’ or the ‘Black Box’ reported by the Project Camelot witness Henry Deacon. In this fascinating interview we found Dan once more to be outspoken, challenging, informed, values-driven, mischievous, humorous, human and likeable. We also want to take this opportunity to publish an announcement, as supplied by Marci McDowell, who works closely with Dan. Marci asked us to make the following formal statement on Dan’s behalf: “Dr. Dan Burisch is on a necessary hiatus from official public contact until later this year. Unfortunately, there is very little that I am allowed to say, regarding what Dan is doing. We have informed the public that he is NOT working for Majestic. Majestic no longer exists. Dan retired from that group in September, 2006. Majestic sat formally adjourned in October, 2005. I can say that Dan’s present activities are so important, pressing and secret that those in the new group, the group which took over for Majestic at the end of 2006, the group for whom he has agreed to make
Video Rating: 4 / 5

DOWNLOAD SHARE FAVOURITE * GET THIS OUT TO AS MANY PEOPLE AS POSSIBLE ! * National Security Study Memorandum 200 cover letter- worldchinesecongress.org and www.population-security.org FERTILITY IMPAIRING VACCINE AND METHOD OF USE- www.wipo.int Are New Vaccines Laced with Birth-Control Drugs?- www.missionislam.com Phase I clinical trial of a World Health Organisation birth control vaccine 1988 PubMed- www.ncbi.nlm.nih.gov Frequently Asked Questions on IMMUNOCONTRACEPTION- www.pzpinfo.org Study on high level expression Porcine Zona Pellucida-4 in e-Coli- journal.shouxi.net Monoclonal Antibody PZP-4 blocks fertilisation- www.reproduction-online.org Specific Binding of 17D3 Anti-pZP mAb to Porcine and Human Zona Pellucida but not to Other Tissue Antigens- www.randc.cn Mammalian zona pellucida is an attractive target for developing a contraceptive vaccine- www.reproduction-online.org CONTRACEPTIVE VACCINES by WHO – www.gfmer.ch The WHO Task Force on Vaccines for Fertility Regulation- db.jhuccp.org CDC inoculations of Death: VACCINE INFO- www.scribd.com Innoculations the True Weapons of Mass Destruction- www.scribd.com Can the Flu Vaccine Cause Cancer or Fertility Problems, Harm Your Unborn Child, or Show Up In Your Milk?- www.vaclib.org Are New Vaccines Laced With Birth-Control Drugs?- www.whale.to PATENT Sperm antigen corresponding to a sperm zona binding protein autoantigenic epitope- www.freepatentsonline.com IMPROVED AEROSOL METHODOLOGY FOR APPLYING CPT TO CONTROL ROOSTING

Separate Constitutional Amendments Procedures

The Constitution
by wallyg

From a new Nation with three Regions at independence in 1960, Nigeria by the time it became a Republic in 1963  and Nnamdi Azikwe as the Ceremonial President, Nigeria under the Prime Minister of Tafawa Belewa with  a gang up of two out of three regions of North and East had the West divided into two with the Igbo speaking tribe in the new Mid-West and other minorities in the old West like the Edos, Itsekiri, urobos etc, meaning,  the first state or regional creation was to weaken the Western Region not to strengthen the group or the nation, it was  a political vendetta that marked the beginning of anarchy in Nigeria, however the rest of these political maneuver and imbroglio is now history.

The assumed union of West and East regions was prevented by the political rivalry between Nnamdi Azikwe and Chief Obafemi Awolowo the man whose political party demanded for Nigeria independence with two motions first presented by Chief Akintola which was short down and later by the youngest parliamentarian Chief Anthony Enahoro though a trace of this union could be seen with UPGA 1964, Progressives in 1979, 1983respectively, it was only a mirage in the minds and activities of the South.

However, the political superiority of North and largeness of its land mass over north of Rivers Benue and Niger has always baffled the whole nation, but in reality  the North has never totally integrated itself into what Nigeria as a country should stand for, but a group which must stand as one, to get or have it’s way in a new entity called Nigeria, or the South has despite it so called western education failed to understand what the North want but to drag on this region towards western ideas without regards for its  religion, culture and social life. All these points were raised by this writer in a similar article published this year “The Clash of Civilizations Vs West African values”

The cracks in the North however, has always been with the Christian community of the Middle Belt led by Tarka and presently by Solomon Lar and that of COR states in the East which were ignored with the first state or regional creation in 1963, a hope that was fulfilled when one of theirs became Head of State, firstly, with General Yakubu Gowon satisfied the yearnings of the minorities that was ignored with new 12 states in 1967 More States creation under Murtala Mohammed in 1976 with additional 7 new ones, between General Ibrahim Babangida and General Sanni Abacha officially from Kano but whose root was actually from Old Bornu Empire, were meant to satisfy the minorities, 17 new states were created to give the country this new 36 states.

The  North  of Nigeria despite the economic challenges and nothing on the table since groundnut pyramids like Cocoa and Palm Oil disappeared from visibility of all and replaced with Crude Oil, It however, remains the region with more states notwithstanding its thin or probably non existing population apparent to all, but  Kano State remains  the most visible area of human concentration in the North of Nigeria, the rest remain questionable as to where the population the North claim actually resides compared to the human settlement in the South of Nigeria.

In the face of the intricacies of political maneuvers, it is obvious, that the North will never move at the same speed like the Southern States in the what will be the solution to speedy growth of Nigeria i.e. if Western civilization system continue to be the yardstick for growth., while, the North consider the Islamic juncture and feudal North interest like the interest of the Mallams, Emirs and political empires set up by the Old Sokoto Caliphate, Bornu empire paramount  before adopting any decision seen  too westernized, the region view the South  as an allied of  the West led by United States of America  too close for comfort or “Karferi” in spiritual believes, in order words the North and South sees the future of Nigeria  in a different perspective.

How can these two views that affect the future of 150 million people around River Niger be conducted? Constitutional amendment can not be done correctly with this current scenarios, Nigeria must move towards dichotomy approach in constitutional amendments, 2/3 amendment approach must operate in North and South bases, separately definitely, not in Nigeria as a whole. The Northern States must find 2/3 amendment majority in all its states assembly to create a workable constitutional amendment  acceptable to its people and religion and culture and doctrine, this will put to rest the fear of invasions of Western Civilization on the North routed in Islamic and Northern interest.

The New South of Nigeria of Old West and East  will be freed to design also, like its Old Northern Region,  a workable Constitutional amendment with 2/3 amendment  mentality in all the states assembly in moving faster and speedily on all areas of western civilizations the South was forcing on the throat of the  North since 1960 without any regards for the culture and belief system of the custodians of Hausa Fulani legacies,  with this in mind,  under age marriage will not be strange to the country but the belief system of the North, when the North continue to go full blown towards Sharia nobody in the South will complain as why or how it will just be given, same for the South, that will be freed to adopt State and City police, FOI decentralization of all government activities  and other western ideas the South deem fit towards attaining it political and economic goals

The above scenario will be the solution to Nigeria political and economical problems based on respect for human dignity, hopes, religion and culture. The South must come quickly to conclusion that forces the North to adopt the western civilizations, or typical western system of Democracy on its people for it not to be a cog in the wheel of progress against South interest.

The North is and will always be a region with a proud history of Islam, routed in both Sokoto Caliphate and Bornu Empire as controlled by the Emirs, also as custodians of Islam in Africa will not only foot drag issue but will also resist it being dragged towards western interest.

Will this break Nigeria into two? No. Nigeria will still be one country with one President but with each region allowed to develop at its own pace, to continue to adopt what we have now in constitutional amendment process is to drag the country and its 150 million people on senseless Israeli journey.

With most of the Northern States leaders  in form of AREWA, Elders meeting  and governors coming together to discuss common issues to protect the North interest in a nation that is suppose to be one, the Region has made it choice clear for all who cares to know, the  North will always be one and should be allowed to growth at its own pace, not at the dictate of the South which in the opinion of the North, is considered lost to western civilizations, while the future of the South has always been championed by various leadership groups it is however, handicapped with corruption from the  Governors and government officials while that of the North is affected by religion, corruption and  reluctances in adopting anything too westernized, Nigeria must see the need to have a change of strategies in getting to the root of its problems and perhaps the lasting solution will be to adopt this two method of 2/3 constitutional amendment procedures base on North and South approach rather than the country as whole.

Zents Sowunmi is the President of the Korloki Corporation a Business Consulting, Staffing, and Training Company and Korloki Publishing Company Irving, Texas. He also runs the AHTCOM Inc based in El Paso, Texas a company that provides a market platform for African manufacturers and Hispanic companies in South America and United States Border States.

Zents holds an MBA, Post Graduate Degree of the United Kingdom based Chartered Institute of Purchasing and Supply Management, and several professional certifications.  He is the author of Before the Journey Became Home, 100 Ways to Laugh, What Happened to Our Democracy? And is also completing work on several other publications, the fear of Tomorrow, Keep Going, and Not a Stranger Any More.Some of his books are currently being translated
to Spanish and French languages.

 

Article from articlesbase.com

Related The Constitution Articles

LOKPAL BILL SHOULD BE FRAMED KEEPING IN VIEW THE CONSTITUTION AND PARLIAMENT- CONGRESS

Congress said on Saturday (June 18) that the Lokpal bill should be framed keeping in view the constitution and the Parliament. The party maintained that bringing the Prime Minister in the purview of the Lokpal would amount to the weakening of the democratic structure.

As Religions Are Man Made One Asks Who Is Their God

 

 

If you study the Book of Jonah the questions will probably flow through your mind concerning salvation and the path to Heaven and one cannot blame you. Jonah typifies the belief among religious followers that to be devoid of a religious mindset and its benefits one is lost; it is a limited theory without basis.

 

The question posed by the title asks who is their God but the real question is: where is their God if we are to believe their dictates. The reason this question comes to mind is their habits do not promote their God’s word and this is based on crime, domestic violence, human trafficking, sexual abuse, drug use, wars on all fronts and a whole plethora of actions that truly should not exist.

 

Violence is at the very core of all of us but we have to consciously work on quelling its appearance otherwise our societies would be worse than the wild west of days gone by. As humans we are all prone to imperfections but it is within our capacity to limit disasters not accentuate them.

 

To define the word violence we look at the results that deplete another person and go no further than words and actions. These encompass gossip, slander, lies and deceit plus the actions of intolerance, hatred etc and then realize the vastness encompassed by violence.

 

Violence is also depicted when we practice disloyal behaviours like infidelity and injustice with a dim light on the definition of equality. All we have to do is look at families being torn apart or someone locked up because of an inherent bias and we have cause and effect of infidelity and injustice.

 

Punishments are not harsh enough for lessons to be learned and when we see people commit suicide because of the depraved actions of greed and insensitive words we see other additions to the meaning of violence.

 

If we stopped looking for God through religions instead acknowledge that as he is within each of us then it shall encourage us to figure out a more compatible society. Perhaps churches could be used as community centres, homes for the homeless and as a refuge for victims of abuse; who knows as the possibilities are numerous.

 

In Richmond VA, a curious thing is being developed; a museum to the work of the Catholic Church; wow! Then ask who needs a relic to the Spanish Inquisition, or the abuses of the past one hundred years. What about the intolerance inflicted across the spectrum of society. The CC does not have a monopoly on barbarism or intolerance and within the past few weeks there was a meeting of the Churches in Britain and they want to do away with equality disallowing women to be ordained; wow!

 

Religions are causing society to regress not advance and soon, perhaps very soon they will go the way all dinosaurs have gone; become extinct! It is a stretch of the imagination and even of faith to trust in any entity whether church or government with emphasis on faith while they pander to certain interests at the expense of the populace; kind of condescending really!

 

It is humorous to find the doors of churches locked because of vandalism, which rather defeats the purpose of freedom to honour God! It is an example however of the limited reach of the arm of particular churches. Basically when we accept the existence of God as an example for all of mankind to trust in and that He is a God for all nations’ individual religions become superfluous and contrary to the intention of God.

 

Frankly it may be that religions are the instruments of the crime they are actually aiming to prevent because of their excessive rules and examples devoid of kindness, equality, love, tolerance and justice; with exceptions for certain interests like; the Mafia, the UVF and Al Qaeda to mention a few.

 

‘For it is love that I desire, not sacrifice;

it is knowledge of God, not burnt offerings.’ Hosea 6:6

 

As history is full of fallen realms, leaders and entities then we can only hope and pray for justice for all!

Tomas Coimin is a master of motivational techniques with a strong desire to help others seek greater peace through positive self-esteem. Based in Co. Tipperary Ireland. Through the years it has been very rewarding to receive acknowledgments from readers indicating the benefits of my writings and thus I pray to continue to deliver quality pieces to continue the trends of previous successes. I write and publish poetry and short stories too but my chief aim is to work towards strengthening self-esteem while eliminating the ravages caused by abuses whether financial, physical, sexual or mental.
Tomas may be reached at selfesteemawareness@gmail.com

Article from articlesbase.com

Find More Freedom Of Religion Articles

Virtualisation Security – The How To Guide – Part 1

OVERVIEW

A number of security research projects have been undertaken into gaining an insight into the security vulnerabilities associated with platform specific virtualisation technologies and / or the hosting of one operating system environment on another. There has arguably been less focused research into resource specific virtualisation issues, and the allocation of specific system resources (e.g. storage and memory areas, name spaces etc.). The race for the discovery of undisclosed security vulnerabilities and software bugs with popular platform virtualisation environments (most notably those produced by VMWare Inc.) has led to a situation whereby physical virtualised resources have been largely stricken from the collective consideration of the security research community.

 

In this series of six independent technical articles from Orthus we will present an overview of much of the platform focused research that has already been undertaken, what differentiates this from resource specific issues and considerations.  As increased numbers of enterprises move towards adoption of virtualised resource technologies, and infrastructure associated with critical national security and industrial control systems also adopt these technologies, the risk exposures increase, and it is of vital significance that security research efforts are focused upon these technologies.

 

VIRTUAL REALITY

Many modern computing environments are sufficiently powerful to support the use of platform virtualisation technologies to facilitate the deployment of virtual machine instances which utilise a separate Operating System. Depending upon deployment requirements (and indeed the hardware and software vendors selected to facilitate such deployments) a platform specific virtualised environment may consist of some (or all) of the following components: virtual machine instances, guest and host Operating Systems, virtual machine monitors (VMMs), the virtual machine environment (VME) itself, in addition to hardware.

 

A variety of protection mechanisms may also be employed which range from hypervisors to appliances.  As discussed in the abstract, a considerable amount of focused security research has been undertaken concerning platform virtualisation technologies however as of the time of writing, little attention has been directed towards virtualised resource platforms. This is not to imply that these technologies are not receiving the attentions of researcher owing to the rarity of their deployment.

 

The use of virtualised resources is a growing trend, and they can be found operating in many computing environments, including the financial, governmental, health care, and military sectors.  Additionally, popular vendors of SCADA based systems and software, PROCSYS and Wonderware allow for their technologies to be scaled and deployed within virtual resources.

 

 

A number of specific business drivers may be utilised when making the decision to deploy virtualised resources, however there is a common misconception that the deployment of such assets will lead to increased productivity and reduced costs. Regardless of deployment drivers, the use of virtualised resources and a move away from the notion of network based computing models (e.g. the computer is the network, and the network is at its best, when distributed) is a growing trend that has arguably received little attention from security researchers to date.  

 

Most technical and business staff in enterprise environments understand the difficulties inherent in securing distributed environments, however the ugly kernel remains that in relation to virtualised resources the scope and impacts of security threats are rarely fully understand and addressed.

 

SECURITY IN VIRTUALISED ENVIRONMENTS

Prior to discussing the security threats and vulnerabilities that face virtualised technologies (be they platform or resource specific) the elements that constitute a secure environment should first be considered. Virtualised technologies arguably have a number of distinct elements that need to exist for them to be classified as secure. A number of researchers have focused their attentions towards defining these, most notably, Reiner Sailer et al of IBM, in the paper ‘sHype: Secure Hypervisor Approach to Trusted Virtualized Systems’[i].

 

A number of constituent security goals are defined by Sailer at al, as forming secure virtualised environments, namely:

 

Strong isolation guarantees between multiple partitions Controlled sharing (communication and co-operation) among partitions Platform and partition integrity guarantees Platform and partition content attestation Resource accounting and control Secure services (e.g. auditing)

 

These elements are an excellent starting point however they disregard a number of key requirements from a security perspective. Although Sailer et al recognise the need for isolation and separation between virtual machine partitions this should arguably also be applied to processes and users.  From a security perspective it is also imperative to ensure that not only is controlled sharing enforced for partitions but also those resources they may access (such as memory).

 

Additionally, although the necessity of auditing is recognised, the value of virtualisation lies in its inherent flexibility and, and this too should be considered especially with regards secure and scaleable deployments. Regardless of the theory of what constitutes a secure virtual machine environment, the reality remains that at present many environments are anything but.

 

A number of security research groups and individuals are conducting research into bypassing the security restrictions in place within virtual machine environments, and as highlighted in the abstract for this paper this has proved a fertile area. A number of security vulnerabilities have been highlighted in products issued by VMware Inc over recent years, and this is a trend that doubtless will continue. The VMware product suite (i.e. VMware Server, VMware Player, VMware Workstation etc.) or elements thereof, is widely deployed in many environments, and importantly comparatively inexpensive to obtain. Regardless of the individual vendor however, virtualised platform specific vulnerabilities can loosely be classed into three major groupings, namely:

 

Virtual machine / environment detection Virtual machine / environment protection bypasses Virtual machine /environment destruction

 

NEXT TIME…

In our next and second article of six we will explore how the first of these j

Notes

[i] sHype: Secure Hypervisor Approach to Trusted Virtualized Systems; Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Roland Perez, Leendert van Doorn, John Linwood Griffin, Stefan Berger. IBM Research Division. February 2005.

 http://domino.watson.ibm.com/library/cyberdig.nsf/papers/265C8E3A6F95CA8D85256FA1005CBF0F/$ File/rc23511.pdf 

Sean Bennett is Commercial Director at Orthus, a leading professional services firm focused on helping organisations globally to manage risk and secure technical environments. If you need any advice or assistance with securing your virtualised platform visit www.orthus.com

Article from articlesbase.com

Latest Citizenship And Freedom auctions

Some recent Citizenship and Freedom auctions on eBay:

[wprebay kw=”citizenship+and+freedom” num=”0″ ebcat=”-1″]
[wprebay kw=”citizenship+and+freedom” num=”1″ ebcat=”-1″]