Archives for April 6, 2012
Please be aware that this book is written in a writing style that some have not seen before: Direct and to the Point. If you are more concerned about grammar and prose rather than the story, please move on- as this book may not be for you. However, if you are more interested in revealing the truth hidden in the works of a great story, then in this book may lie your answers… Illuminati 2012 – What if everything you have been taught to trust and believe is a lie? What if there is a secret government within our own that has been in place for centuries? What if that organization is using its unimaginable wealth, immense power, and the fervent worship of their god to bring about the end of times? Illuminati – 2012 will take you into the very depths of human corruption and wickedness while it enlightens you to the true meaning of good versus evil and the power of faith that is in all of us. The main character, Ethan Swan is enormously seductive; a young man who is thrust into a surreal world of darkness, lies, and a horrifying truth. “The only question you will be asking yourself upon reading this book, is if this is simply just a work of fiction…or is it something more?” ‘The Truth Awaits For Those Who Seek It…’ www.morningson.info
List price: $9.95
All of this was so disconcerting that the Defense Department hired Cardinalli,a social scientist, to examine this mystery. Her report, “PashtunSexuality,” startled not even one Afghan. But Western forces were shocked ~and repulsed.
For centuries, Afghan men have taken boys, roughly 9 to 15 years old, aslovers. Some research suggests that half the Pashtun tribal members in Kandaharand other southern towns are bacha baz, the term for an older man with a boylover. Literally it means “boy player.” The men like to boast aboutit.
“Having a boy has become a custom for us,” Enayatullah, a 42-year-oldin Baghlan province, told a Reuters reporter. “Whoever wants to show offshould have a boy.”
Baghlan province is in the northeast, but Afghans say pedophilia is mostprevalent among Pashtun men in the south. The Pashtun are Afghanistan’s mostimportant tribe. For centuries, the nation’s leaders have been Pashtun.
President Hamid Karzai is Pashtun, from a village near Kandahar, and he has sixbrothers. So the natural question arises: Has anyone in the Karzai family beenbacha baz? Two Afghans with close connections to the Karzai family told me theyknow that at least one family member and perhaps two were bacha baz. Afraid ofretribution, both declined to be identified and would not be more specific forpublication.
As for Karzai, an American who worked in and around his palace in an officialcapacity for many months told me that homosexual behavior “wasrampant” among “soldiers and guys on the security detail. They talkedabout boys all the time.”
He added, “I didn’t see Karzai with anyone. He was in his palace most ofthe time.” He, too, declined to be identified.
In Kandahar, population about 500,000, and other towns, dance parties are apopular, often weekly, pastime. Young boys dress up as girls, wearing makeupand bells on their feet, and dance for a dozen or more leering middle-aged menwho throw money at them and then take them home. A recent State Departmentreport called “dancing boys” a “widespread, culturallysanctioned form of male rape.”
So, why are American and NATO forces fighting and dying to defend tens ofthousands of proud pedophiles, certainly more per capita than any other placeon Earth? And how did Afghanistan become the pedophilia capital of Asia?
Sociologists and anthropologists say the problem results from perverseinterpretation of Islamic law. Women are simply unapproachable. Afghan mencannot talk to an unrelated woman until after proposing marriage. Before then,they can’t even look at a woman, except perhaps her feet. Otherwise she iscovered, head to ankle.
“How can you fall in love if you can’t see her face,” 29-year-oldMohammed Daud told reporters. “We can see the boys, so we can tell whichare beautiful.”
Even after marriage, many men keep their boys, suggesting a loveless life athome. A favored Afghan expression goes: “Women are for children, boys arefor pleasure.” Fundamentalist imams, exaggerating a biblical passage onmenstruation, teach that women are “unclean” and thereforedistasteful. One married man even asked Cardinalli’s team “how his wifecould become pregnant,” her report said. When that was explained, he”reacted with disgust” and asked, “How could one feel desire tobe with a woman, who God has made unclean?”
That helps explain why women are hidden away ~ and stoned to death if they areperceived to have misbehaved. Islamic law also forbids homosexuality. But thepedophiles explain that away. It’s not homosexuality, they aver, because theyaren’t in love with their boys.
Addressing the loathsome mistreatment of Afghan women remains a primary goalfor coalition governments, as it should be.
But what about the boys, thousands upon thousands of little boys who arevictims of serial rape over many years, destroying their lives ~ and Afghansociety.
“There’s no issue more horrifying and more deserving of our attention thanthis,” Cardinalli said. “I’m continually haunted by what I saw.”
As one boy, in tow of a man he called “my lord,” told the Reutersreporter: “Once I grow up, I will be an owner, and I will have my ownboys.”
By Ernesto Londono
A growing number ofAfghan children are being coerced into a life of sexual abuse. The practice ofwealthy or prominent Afghans exploiting underage boys as sexual partners whoare often dressed up as women to dance at gatherings is on the rise inpost-Taliban Afghanistan, according to Afghan human rights researchers, Westernofficials and men who participate in the abuse.
Although issues such as women’s rights and moral crimes haveattracted a flood of donor aid and activism in recent years, bacha bazi remainspoorly understood.
A recent interview withMirzahan and a handful of his friends who sexually exploit boys provided a rareglimpse into the lives of men who have taken on bacha bazi.
Sitting nearby was23-year-old Assadula, who said he’s an Afghan soldier assigned to a unit in thesouthern province of Kandahar. Assadula said he has been attracted to teenagemales for as long as he can recall.
Two years ago, he took on a 16-year-old ashis bacha. The relationship will end soon, he said, sitting next to hiscompanion, Jawad, who is now 18.
The practice became rampant during the 1980s, when mujahidin commandersfighting Soviet forces became notorious for recruiting young boys while passingthrough villages. In Kandahar during the mid-1990s, the Taliban was born inpart out of public anger that local commanders had married bachas and wereengaging in other morally licentious behavior.
Cycles of Time, Ages of Humanity
2012 & the Birth of A New World Age
By Marie D. Jones
The Astrology of 2012
Forecasts for England & Australia
By Helen Sewell
“Something’s Happening Here,
But You Don’t Know What It Is, Do You, Mr. Jones?”
By Jim Dekorne
Brief Reflections on the Mayan 2012 Date
By Robert M. Schoch, Ph.D.
You Have Less Than 298 Days To Live
By Freddy Silva
2012, the Apocalypse & the End of the Age
By Mehmet Sabeheddin
2012, Galactic Maya & José Argüelles
A Profile of the Visionary Who Started It All
By Stephanie South
The Maya, Galactic Alignment & Academic Ignorance
By John Major Jenkins
Living in Our Multi-Dimensional Reality During 2012
By Jim Reed
2012 & the Psychedelic Shamans
Why Their Experiences are Key to Understanding the Message of 2012
By Thomas Razzeto
By Frank Joseph
The Agony of Our Collective Puberty
By Jay Weidner & Sharron Rose
Imperial End Times, Progress & the Water Dragon
By Reg Little
PLUS MUCH MORE….
Download your copy of this fully illustrated colour 76 page magazine
(iPad compatible e-book)
for only US$7.95
If the matter wasn’t so serious, the Globe’s characterizationwould be laughable.The Harper government (Air Canada, Postal Workers) has set aboutwrecking collective bargaining in Canada.The Harper forces admitted guilt to an attempted rig of the 2006election (which should have caused major criminal charges, and has not).
Her allegation (extending from that experience) in what isattached with this column is, in short, that Stephen Harper is cutting budgetand employees at Department of National Defense and Public Safety and isreplacing with employees from CGI. In essence he is privatizing,secretly, operations of federal government.
“The Ministry of Attorney General officials have workeddiligently to respond to requests for indemnification that require the exerciseof discretion. Using firmly established common law method, the officialscharged with exercising discretion have justified their decisions by drawingout principles present in existing cases and analogizing those principles tonew circumstances. [My capital letters.] AS FAR AS I CAN TELL FROM THEDOCUMENTS TO WHICH I HAVE HAD ACCESS, THE RESULTS TO DATE HAVE BEENPRINCIPLED….” (p. 29)
“…my view is that for criminal indemnities, conviction(including the case of a guilty plea) should trigger a claim for fullreimbursement. Guilt in a criminal case necessarily means that a publicservant was not acting in the scope of his or her duties or in the course ofemployment. No BC government employment duty can require the commissionof a criminal offence. No valid purpose articulated in any report wouldbe served by allowing indemnification in such cases, because there is no publicinterest in protecting the public servant from the full consequences (includingfinancial consequences) of criminal liability.It follows that the requirement of reimbursement in the case ofcriminal conviction should be mandatory and not the subject of the exercise ofdiscretion.”
Since the beginning of the Gordon Campbell/Christy Clark Liberalgovernment in B.C., it has been perfectly in accord with the ideology andpractice of the Stephen Harper neoliberals in Ottawa.That is why Gordon Campbell was made Canadian High Commissionerin London after he was forced out of the premiership in B.C.
Draconian Cybersecurity Bills
by Stephen Lendman
Bipartisan complicity’s involved in hyping cyber threats. At issue
is promoting draconian cybersecurity legislation.
Obama supports congressional effects. Internet freedom’s at stake.
So are other civil liberties.
On March 8, the Department of Homeland Security (DHS) conducted a
mock New York cyber attack. At issue was gaining support for pending
White House spokesperson Caitlin Hayden called the stunt a way to
give “senators….an appreciation for new legislative authorities that
would help the U.S. government prevent and more quickly respond to
DHS Secretary Janet Napolitano said:
“The fact that we could be subject to a catastrophic attack under
the right circumstances and we now know some of the things that would
help us to protect against such an attack, that’s why it’s important
now for the Congress to take this up.”
Destroying a free and open Internet and other civil liberties is no
way to do it. Power grab politics are in play. Major media scoundrels
The past decade witnessed a systematic war on freedom. It last
vestiges are being attacked. Unless stopped, tyranny will gain full
control. It practically has it now.
Bipartisan complicity’s on board to seize it. So is Obama. Bad as
things are now, the worst is yet to come.
In recent years, various cybersecurity bills were introduced. Recent
House and Senate versions are the latest threat.
On November 30, 2011, HR 3523: Cyber Intelligence Sharing and
Protection Act of 2011 was introduced. It’s pending for further
consideration. On February 14, a companion Senate version was offered –
S. 2105: Cybersecurity Act of 2012. It also awaits further
The Electronic Frontier Foundation (EFF) said the House version
gives “companies or the government free rein to bypass existing laws in
order to monitor communications, filter content, or potentially even
shut down access to online services for ‘cybersecurity purposes.’ “
Companies are urged to share information with each other and
Washington. At issue is allegedly foiling potential cyber attacks. In
fact, the bill attacks vital freedoms.
Claiming a possible cyber threat, the bill lets government and
business bypass existing laws. They include prohibiting
telecommunication companies from monitoring routine communications. The
bill permit it as long as done in “good faith.”
Likely abuse is obvious. For example, bill language says “cyber
threat intelligence” and “cybersecurity purpose” mean “theft or
misappropriation of private or government information, intellectual
property, or personally identifiable information.”
EFF calls it “a little piece of SOPA wrapped up in a bill that’s
supposedly designed to facilitate detection of and defense against
cybersecurity threats. The language is so vague that an ISP could use
it to monitor communications of subscribers for potential infringement
of intellectual property.”
As a result, ISPs could block or prevent access to accounts accused
of infringing, whether or not true. At risk are those providing vital
suppressed information everyone has a right to know.
Already severely weakened, First Amendment freedoms could erode
further or entirely disappear. Anything business or government finds
offensive could be blocked from the public domain. Online information
as we now know it could vanish.
Freedoms we take for granted are on the chopping block to eliminate.
Passage of current House and Senate bills will be a giant step toward
doing it. They provide powerful new repressive tools. Any site or blog
could be called a “cyber threat.”
Congress wants legislation passed this year. So does Obama. HR 3523
is one of the worst. The Senate version is almost as bad. Vague
language is their common denominator.
For example, the Senate bill states:
“(C)ybersecurity threat” means any action that may result in
unauthorized access to, exfiltration of, manipulation of, or impairment
to the integrity, confidentiality, or availability of an information
system or information that is stored on, processed by, or transiting an
A “cybersecurity threat indicator” is defined in hugely disjunctive
vague scenarios. They include, for example, “a method of defeating a
technical (or operational) control.” Merely using “a proxy or
anonymization service” to access sites could be called a “cybersecurity
So could using cryptography to protect personal communications or be
able to access systems securely. Nearly anything could be
misinterpreted as a threat.
Government and business could monitor online traffic and
communications without Wiretap Act or other legal restrictions.
“Effectively, the broad definitions of threats could immunize a
whole host of monitoring activities by a huge swath of different
government and non-government actors.”
In addition, S. 2105 and a newer March 1 S. 2151: SECURE IT bills
let “private entities” operate “countermeasures.” Vague language means
those allowed are open to interpretation. Abuses are certain.
Acting with “defensive intent” can also be abused. As always, the
devil’s in the details and potential latitude within them. Most
worrisome is government and business in bed against personal freedoms
for greater control.
ISPs could block all traffic on certain ports or filter out what
they don’t want the public to know. Cryptographic protocols could also
be crippled. The best defense is a strong offense, no matter how
destructive to personal freedoms.
EFF calls potential abuses worrisome. It’s not known what
countermeasures would be used. Senate and House bills give no guidance.
Government and business will decide on their own privately.
Transparency won’t exist.
Safeguarding civil liberties requires laws with “utmost
specificity.” Concrete, not vague, language is essential. Online
freedom depends on it. Cybersecurity should protect everyone equally,
not government and business alone.
A Final Comment
EFF raised four unanswered questions in both Senate bills and the
(1) Who’ll be in charge of cybersecurity?
HR 3523 has the military/intelligence community running it. Still
another House bill (HR 3674 introduced last December) puts DHS in
EFF calls civilian control essential. Without it, openness,
transparency, and accountability would be entirely destroyed. It may be
either way, depending on enacted language and how it’s interpreted.
(2) What constitutes a cybersecurity threat?
House and Senate bills lack clear definitions. Potential harm is
obvious. People adopting privacy and security measures EFF recommends,
potentially could be treated like criminals.
“(L)legitimate security research would be targeted and security
researchers could find themselves under perpetual scrutiny as potential
(3) What does “information sharing” mean?
House and Senate bills mandate it in some form. They also let
government and business collude. Information sharing’s urged, including
private emails, web searches, GPS data, social networking, and other
Moreover, claiming cybersecurity threats immunizes abusers from
civil or criminal liability. Information sharing, in fact, is a
euphemism for surveillance and other countermeasures like filtering
content, blocking access to web sites, or shutting them down.
(4) Will an eventual cybersecurity law enhance or harm security?
Benefits are possible if everyone’s protected equally with no
personal freedoms infringed. Proposed House and Senate bills erode or
entirely destroy them.
Measures improving online security are laudable. Major operating
systems are vulnerable, as are various types of commercial software.
Nothing is fail-safe, but better encryption, more secure protocols, and
better authentication methods could improve things.
House and Senate bills fall short. “Instead of creating incentives
for better defensive Internet security, the proposed bills take an
offensive posture: more monitoring, more surveillance, and more
disclosure of your private information.”
Instead of improving online safety, user privacy and security more
than ever will be comprised en route to destroying them altogether and
a free and open Internet along with it. The stakes are that great.
Stephen Lendman lives in Chicago and can be reached at
Also visit his blog site at sjlendman.blogspot.com and listen to
cutting-edge discussions with distinguished guests on the Progressive
Radio News Hour on the Progressive Radio Network Thursdays at 10AM US
Central time and Saturdays and Sundays at noon. All programs are
archived for easy listening.
The way our regulatory agencies work is to keep pending approvals forgenetically modified animals on file, in secret, until a decision determines ifit’s suddenly in the stores unlabeled, or no, not yet.
“It’s clear that consumers oppose GM animals so we’re relievedthe project is being shelved. The GM pig was going to drive consumers away fromeating pork if it was ever approved for market,” said Paul Slomp, YouthVice-President of the National Farmers Union.
[When the first such pig was created in 1999] I had the feelingin seven or eight or nine years that transgenic animals probably would beacceptable. But I was wrong. It’s time to stop the program until the rest ofthe world catches up ~ and it is going tocatch up.
Mouse-pig or Franken-Swine could have been the very first GM animal forconsumption ~ bacon just wouldn’t have been the same again; and, actually, itisn’t.
It’s the Circle of Death ~ but the cycle is only beginning.
For better animal treatment, environmental healing, and human health.
Pigs need phosphorous for bone, teeth, and cell formation but their typical Bt corn and soybean dietsleave them with 80% of their phosphorous in an non-digestible form.
That and stuffing a thousand pigs into one facility is what caused thephosphorous mess.
That phosphorous manure is then heaped on the GM corn and soy as fertilizer,further increasing the indigestible phosphorous diet. The Circle of Deathcontinues.
The answer to the environmental problem caused by GMOs is not more geneticmodification!
CBAN suggested the following:
There are already many solutions to this problem includingreducing the number of pigs raised in one place, changing feed ingredients,trucking liquid manure longer distances, dry composting manure, or expandingthe area of land for spreading manure. Additionally, there is already thecost-effective, simple technological fix of a phytase supplement that can beadded to hog feed.
Former vice president of research at the University of Guelph said of theincident,
“Things you don’t expect to happen can happen.”
HOW DID ENVIRO-PIG ALMOST PASS; WHAT CHANGED?
Pork producers were afraid to associate with Enviro-pig for fear of bad publicrelations. Enviro-pig is safely off the shelf thanks to concerned farmers andactivists like you creating more awareness. Especially the tenacious efforts ofCBAN.Gratefully so ~ we get around 40% of our pork from Canada. CBAN will nowredouble their efforts of stopping GM super-growing salmon.
The media might bemoan the naysayers who tried to stop the “goodguys” who already pumped millions into a misguided “solution”for the environment. Truthfully, the pigs, environment and farming markets aremuch safer with Enviro-pig’s timely exit.
With great hope, farmers will continue to alter the structure and move towardseconomical healthy feed and confinement changes. Otherwise, consumer sway willmove to decentralize further and seek better treated pigs, leaving lots of poorfarmers undeservedly holding the GMO feed bag.