Friday, April 29, 2011

methyl iodide is "highly toxic"

In February 2010, the California Department of Pesticide Regulation (DPR) concluded that methyl iodide is "highly toxic," and that "any anticipated scenario for the agricultural or structural fumigation use of this agent would result in exposures to a large number of the public and thus would have a significant adverse impact on the public health." It also concluded that adequate control of the chemical in these circumstances would be "difficult, if not impossible."


On December 1, 2010, methyl iodide use was approved as a pesticide in the State of California.

It is now being used all over california on citrus orchards.

It's more than obvious that the FDA and government want us all dead and dying.

methyl iodide is "highly toxic"

In February 2010, the California Department of Pesticide Regulation (DPR) concluded that methyl iodide is "highly toxic," and that "any anticipated scenario for the agricultural or structural fumigation use of this agent would result in exposures to a large number of the public and thus would have a significant adverse impact on the public health." It also concluded that adequate control of the chemical in these circumstances would be "difficult, if not impossible."


On December 1, 2010, methyl iodide use was approved as a pesticide in the State of California.

It is now being used all over california on citrus orchards.

It's more than obvious that the FDA and government want us all dead and dying.

methyl iodide is "highly toxic"

In February 2010, the California Department of Pesticide Regulation (DPR) concluded that methyl iodide is "highly toxic," and that "any anticipated scenario for the agricultural or structural fumigation use of this agent would result in exposures to a large number of the public and thus would have a significant adverse impact on the public health." It also concluded that adequate control of the chemical in these circumstances would be "difficult, if not impossible."


On December 1, 2010, methyl iodide use was approved as a pesticide in the State of California.

It is now being used all over california on citrus orchards.

It's more than obvious that the FDA and government want us all dead and dying.

methyl iodide is "highly toxic"

In February 2010, the California Department of Pesticide Regulation (DPR) concluded that methyl iodide is "highly toxic," and that "any anticipated scenario for the agricultural or structural fumigation use of this agent would result in exposures to a large number of the public and thus would have a significant adverse impact on the public health." It also concluded that adequate control of the chemical in these circumstances would be "difficult, if not impossible."


On December 1, 2010, methyl iodide use was approved as a pesticide in the State of California.

It is now being used all over california on citrus orchards.

It's more than obvious that the FDA and government want us all dead and dying.

Wednesday, April 27, 2011

Apple Patent Reveals Extensive Stalking Plans

http://gawker.com/#!5795442/apple-patent-reveals-extensive-stalking-plans

The spying iPhone is no accident. A recent Apple patent application reveals that the location-tracking dossiers accumulated in iPhones are to be used in apps from Apple and any number of other companies.

Ronald Huang, an Apple senior engineering manager, filed patent application 12/553,554 last month, "Location histories for location aware devices," which explains how Apple can amass and use location data in the very ways Apple critics fear. The patent application, for example, envisions a searchable map plotting the owner's location history; tying location to financial transactions; transmitting location data over the internet to remote servers; and many other uses.

Apple has been enmeshed in controversy since computer researchers disclosed last month that the iPhone stores indefinitely data about its whereabouts gleaned from cell phone towers and wifi access points. The data collection started with the release of iOS 4 last June. The iPhone puts the location data in an easily read file called "consolidated.db," which is apparently never pruned for old entries.

Privacy advocates, politicians and the press have loudly raised concerns about how this extensive history of personal movements is going to be used. Senator Al Franken and Rep. Ed Markey, for example, both wrote letters to Apple demanding to know why the location dossiers are being created, and today the Illinois attorney general followed suit. The information is also collected even if the iPhone's "location services" preference is set to "off," the Wall Street Journal reported this morning.

Apple hasn't officially commented on why iPhones are compiling such a long history of information on their owners movements. But it does appear to be trying to quell the controversy. Apple CEO Steve Jobs recently sent an email to a concerned customer, writing, "We don't track anyone. The info circulating around is false." Apple has also done nothing to dispute a widely read report that a software bug is the likely reason so much data has been compiled on iPhones. And someone or something prompted the Journal to write an article earlier this month saying that Google's competing Android phones engage in similar behavior.

But Apple's patent application makes it seem highly unlikely the location gathering is due to a bug. Indeed, the company outlines big plans for the troves of data it has quietly created. Apple includes an illustration of a mapping app called simply "Location History" which very much resembles the "iPhone Tracker" application expressly designed to raise alarm bells about all the data being collected (see figure 3A and 3B in the PDF embedded below, page 4-5). The patent also spells out how the location database could be "correlated or related" to other personal information, including "but not limited to: Data associated with a picture taking event, data associated with a financial transaction, sensor output data, data associated with a communication event (e.g. receipt of a phone call or instant message), data associated with a network event.... etc." (sections 0020 and 0021, on page 9 in the PDF below).

Apple also says several time that the collected data will be transmitted to remote servers, including in section 0018, which discusses a "remote reference database," and section 0035, which discusses sharing location data with other wireless devices "or with a remote service (e.g., navigation services)." Apple has said before that such data is only shared with express user consent, although it clearly caught customers by surprise with the compilation of the iPhone location database.

The patent makes it clear that Apple has been planning an extensive, rather than a very limited, location database. One section, 0032, even spells out using data compression to reduce the amount of storage needed to store repeated visits to the same location. Elsewhere in the patent application, for example in section 0004, Apple describes the possibility of managing the size and "freshness" of the database by pruning older entries. This is listed as a possibility "in some implementations" but no hard, specific cap on data collection is ever suggested.

Clearly, Apple sees big potential in exploiting the iPhone's ability to record our every move. Now it just needs to explain to its users how far this practice will be taken, and how much consent it will seek before building up movement dossiers and before using them in its own software. Its track record on disclosure thus far is not encouraging.

Apple Patent Reveals Extensive Stalking Plans

http://gawker.com/#!5795442/apple-patent-reveals-extensive-stalking-plans

The spying iPhone is no accident. A recent Apple patent application reveals that the location-tracking dossiers accumulated in iPhones are to be used in apps from Apple and any number of other companies.

Ronald Huang, an Apple senior engineering manager, filed patent application 12/553,554 last month, "Location histories for location aware devices," which explains how Apple can amass and use location data in the very ways Apple critics fear. The patent application, for example, envisions a searchable map plotting the owner's location history; tying location to financial transactions; transmitting location data over the internet to remote servers; and many other uses.

Apple has been enmeshed in controversy since computer researchers disclosed last month that the iPhone stores indefinitely data about its whereabouts gleaned from cell phone towers and wifi access points. The data collection started with the release of iOS 4 last June. The iPhone puts the location data in an easily read file called "consolidated.db," which is apparently never pruned for old entries.

Privacy advocates, politicians and the press have loudly raised concerns about how this extensive history of personal movements is going to be used. Senator Al Franken and Rep. Ed Markey, for example, both wrote letters to Apple demanding to know why the location dossiers are being created, and today the Illinois attorney general followed suit. The information is also collected even if the iPhone's "location services" preference is set to "off," the Wall Street Journal reported this morning.

Apple hasn't officially commented on why iPhones are compiling such a long history of information on their owners movements. But it does appear to be trying to quell the controversy. Apple CEO Steve Jobs recently sent an email to a concerned customer, writing, "We don't track anyone. The info circulating around is false." Apple has also done nothing to dispute a widely read report that a software bug is the likely reason so much data has been compiled on iPhones. And someone or something prompted the Journal to write an article earlier this month saying that Google's competing Android phones engage in similar behavior.

But Apple's patent application makes it seem highly unlikely the location gathering is due to a bug. Indeed, the company outlines big plans for the troves of data it has quietly created. Apple includes an illustration of a mapping app called simply "Location History" which very much resembles the "iPhone Tracker" application expressly designed to raise alarm bells about all the data being collected (see figure 3A and 3B in the PDF embedded below, page 4-5). The patent also spells out how the location database could be "correlated or related" to other personal information, including "but not limited to: Data associated with a picture taking event, data associated with a financial transaction, sensor output data, data associated with a communication event (e.g. receipt of a phone call or instant message), data associated with a network event.... etc." (sections 0020 and 0021, on page 9 in the PDF below).

Apple also says several time that the collected data will be transmitted to remote servers, including in section 0018, which discusses a "remote reference database," and section 0035, which discusses sharing location data with other wireless devices "or with a remote service (e.g., navigation services)." Apple has said before that such data is only shared with express user consent, although it clearly caught customers by surprise with the compilation of the iPhone location database.

The patent makes it clear that Apple has been planning an extensive, rather than a very limited, location database. One section, 0032, even spells out using data compression to reduce the amount of storage needed to store repeated visits to the same location. Elsewhere in the patent application, for example in section 0004, Apple describes the possibility of managing the size and "freshness" of the database by pruning older entries. This is listed as a possibility "in some implementations" but no hard, specific cap on data collection is ever suggested.

Clearly, Apple sees big potential in exploiting the iPhone's ability to record our every move. Now it just needs to explain to its users how far this practice will be taken, and how much consent it will seek before building up movement dossiers and before using them in its own software. Its track record on disclosure thus far is not encouraging.

Apple Patent Reveals Extensive Stalking Plans

http://gawker.com/#!5795442/apple-patent-reveals-extensive-stalking-plans

The spying iPhone is no accident. A recent Apple patent application reveals that the location-tracking dossiers accumulated in iPhones are to be used in apps from Apple and any number of other companies.

Ronald Huang, an Apple senior engineering manager, filed patent application 12/553,554 last month, "Location histories for location aware devices," which explains how Apple can amass and use location data in the very ways Apple critics fear. The patent application, for example, envisions a searchable map plotting the owner's location history; tying location to financial transactions; transmitting location data over the internet to remote servers; and many other uses.

Apple has been enmeshed in controversy since computer researchers disclosed last month that the iPhone stores indefinitely data about its whereabouts gleaned from cell phone towers and wifi access points. The data collection started with the release of iOS 4 last June. The iPhone puts the location data in an easily read file called "consolidated.db," which is apparently never pruned for old entries.

Privacy advocates, politicians and the press have loudly raised concerns about how this extensive history of personal movements is going to be used. Senator Al Franken and Rep. Ed Markey, for example, both wrote letters to Apple demanding to know why the location dossiers are being created, and today the Illinois attorney general followed suit. The information is also collected even if the iPhone's "location services" preference is set to "off," the Wall Street Journal reported this morning.

Apple hasn't officially commented on why iPhones are compiling such a long history of information on their owners movements. But it does appear to be trying to quell the controversy. Apple CEO Steve Jobs recently sent an email to a concerned customer, writing, "We don't track anyone. The info circulating around is false." Apple has also done nothing to dispute a widely read report that a software bug is the likely reason so much data has been compiled on iPhones. And someone or something prompted the Journal to write an article earlier this month saying that Google's competing Android phones engage in similar behavior.

But Apple's patent application makes it seem highly unlikely the location gathering is due to a bug. Indeed, the company outlines big plans for the troves of data it has quietly created. Apple includes an illustration of a mapping app called simply "Location History" which very much resembles the "iPhone Tracker" application expressly designed to raise alarm bells about all the data being collected (see figure 3A and 3B in the PDF embedded below, page 4-5). The patent also spells out how the location database could be "correlated or related" to other personal information, including "but not limited to: Data associated with a picture taking event, data associated with a financial transaction, sensor output data, data associated with a communication event (e.g. receipt of a phone call or instant message), data associated with a network event.... etc." (sections 0020 and 0021, on page 9 in the PDF below).

Apple also says several time that the collected data will be transmitted to remote servers, including in section 0018, which discusses a "remote reference database," and section 0035, which discusses sharing location data with other wireless devices "or with a remote service (e.g., navigation services)." Apple has said before that such data is only shared with express user consent, although it clearly caught customers by surprise with the compilation of the iPhone location database.

The patent makes it clear that Apple has been planning an extensive, rather than a very limited, location database. One section, 0032, even spells out using data compression to reduce the amount of storage needed to store repeated visits to the same location. Elsewhere in the patent application, for example in section 0004, Apple describes the possibility of managing the size and "freshness" of the database by pruning older entries. This is listed as a possibility "in some implementations" but no hard, specific cap on data collection is ever suggested.

Clearly, Apple sees big potential in exploiting the iPhone's ability to record our every move. Now it just needs to explain to its users how far this practice will be taken, and how much consent it will seek before building up movement dossiers and before using them in its own software. Its track record on disclosure thus far is not encouraging.

Apple Patent Reveals Extensive Stalking Plans

http://gawker.com/#!5795442/apple-patent-reveals-extensive-stalking-plans

The spying iPhone is no accident. A recent Apple patent application reveals that the location-tracking dossiers accumulated in iPhones are to be used in apps from Apple and any number of other companies.

Ronald Huang, an Apple senior engineering manager, filed patent application 12/553,554 last month, "Location histories for location aware devices," which explains how Apple can amass and use location data in the very ways Apple critics fear. The patent application, for example, envisions a searchable map plotting the owner's location history; tying location to financial transactions; transmitting location data over the internet to remote servers; and many other uses.

Apple has been enmeshed in controversy since computer researchers disclosed last month that the iPhone stores indefinitely data about its whereabouts gleaned from cell phone towers and wifi access points. The data collection started with the release of iOS 4 last June. The iPhone puts the location data in an easily read file called "consolidated.db," which is apparently never pruned for old entries.

Privacy advocates, politicians and the press have loudly raised concerns about how this extensive history of personal movements is going to be used. Senator Al Franken and Rep. Ed Markey, for example, both wrote letters to Apple demanding to know why the location dossiers are being created, and today the Illinois attorney general followed suit. The information is also collected even if the iPhone's "location services" preference is set to "off," the Wall Street Journal reported this morning.

Apple hasn't officially commented on why iPhones are compiling such a long history of information on their owners movements. But it does appear to be trying to quell the controversy. Apple CEO Steve Jobs recently sent an email to a concerned customer, writing, "We don't track anyone. The info circulating around is false." Apple has also done nothing to dispute a widely read report that a software bug is the likely reason so much data has been compiled on iPhones. And someone or something prompted the Journal to write an article earlier this month saying that Google's competing Android phones engage in similar behavior.

But Apple's patent application makes it seem highly unlikely the location gathering is due to a bug. Indeed, the company outlines big plans for the troves of data it has quietly created. Apple includes an illustration of a mapping app called simply "Location History" which very much resembles the "iPhone Tracker" application expressly designed to raise alarm bells about all the data being collected (see figure 3A and 3B in the PDF embedded below, page 4-5). The patent also spells out how the location database could be "correlated or related" to other personal information, including "but not limited to: Data associated with a picture taking event, data associated with a financial transaction, sensor output data, data associated with a communication event (e.g. receipt of a phone call or instant message), data associated with a network event.... etc." (sections 0020 and 0021, on page 9 in the PDF below).

Apple also says several time that the collected data will be transmitted to remote servers, including in section 0018, which discusses a "remote reference database," and section 0035, which discusses sharing location data with other wireless devices "or with a remote service (e.g., navigation services)." Apple has said before that such data is only shared with express user consent, although it clearly caught customers by surprise with the compilation of the iPhone location database.

The patent makes it clear that Apple has been planning an extensive, rather than a very limited, location database. One section, 0032, even spells out using data compression to reduce the amount of storage needed to store repeated visits to the same location. Elsewhere in the patent application, for example in section 0004, Apple describes the possibility of managing the size and "freshness" of the database by pruning older entries. This is listed as a possibility "in some implementations" but no hard, specific cap on data collection is ever suggested.

Clearly, Apple sees big potential in exploiting the iPhone's ability to record our every move. Now it just needs to explain to its users how far this practice will be taken, and how much consent it will seek before building up movement dossiers and before using them in its own software. Its track record on disclosure thus far is not encouraging.

Tuesday, April 26, 2011

Your iPhone is Watching You! New Proof-of-Concept App Shows How Your iPhone is Tracking Your Every Movement

Alasdair Allan and Pete Warden have released a new proof-of-concept application for Mac OS X that demonstrates that your iPhone is tracking your movements and recording the information. We have tested the application and it is 100% true, Apple are watching you!

Since the release of iOS 4.0 the iPhone has started storing cell-phone tower information and this information is copied to your Mac or PC when you sync your phone with iTunes. The application that Alasdair and Pete have released searches through your old sync data on your Mac and finds this cell-phone tower information and then displays it on a map, courtesy of OpenStreetMap.

How bad is this?

Other applications on your Mac can access this data.
Apple shouldn’t be collecting this information. Mobile phone operators collect tower information as part of their operations but it is private and it normally requires a court order to gain access to it. Your iPhone tower information is available to anyone who can get their hands on your phone or computer.
By passively logging your location without your permission, Apple have made it possible for anyone from a jealous spouse to a private investigator to get a detailed picture of your movements.
If you sell or exchange your iPhone the tower data might still be on the phone. My iPhone is second-hand and I have discovered that I now have a map of the movements of its previous owner going back to October 2010.

http://www.livehacking.com/2011/04/21/your-iphone-is-watching-you-new-proof-of-concept-app-shows-how-your-iphone-is-tracking-your-every-movement/

Your iPhone is Watching You! New Proof-of-Concept App Shows How Your iPhone is Tracking Your Every Movement

Alasdair Allan and Pete Warden have released a new proof-of-concept application for Mac OS X that demonstrates that your iPhone is tracking your movements and recording the information. We have tested the application and it is 100% true, Apple are watching you!

Since the release of iOS 4.0 the iPhone has started storing cell-phone tower information and this information is copied to your Mac or PC when you sync your phone with iTunes. The application that Alasdair and Pete have released searches through your old sync data on your Mac and finds this cell-phone tower information and then displays it on a map, courtesy of OpenStreetMap.

How bad is this?

Other applications on your Mac can access this data.
Apple shouldn’t be collecting this information. Mobile phone operators collect tower information as part of their operations but it is private and it normally requires a court order to gain access to it. Your iPhone tower information is available to anyone who can get their hands on your phone or computer.
By passively logging your location without your permission, Apple have made it possible for anyone from a jealous spouse to a private investigator to get a detailed picture of your movements.
If you sell or exchange your iPhone the tower data might still be on the phone. My iPhone is second-hand and I have discovered that I now have a map of the movements of its previous owner going back to October 2010.

http://www.livehacking.com/2011/04/21/your-iphone-is-watching-you-new-proof-of-concept-app-shows-how-your-iphone-is-tracking-your-every-movement/

Your iPhone is Watching You! New Proof-of-Concept App Shows How Your iPhone is Tracking Your Every Movement

Alasdair Allan and Pete Warden have released a new proof-of-concept application for Mac OS X that demonstrates that your iPhone is tracking your movements and recording the information. We have tested the application and it is 100% true, Apple are watching you!

Since the release of iOS 4.0 the iPhone has started storing cell-phone tower information and this information is copied to your Mac or PC when you sync your phone with iTunes. The application that Alasdair and Pete have released searches through your old sync data on your Mac and finds this cell-phone tower information and then displays it on a map, courtesy of OpenStreetMap.

How bad is this?

Other applications on your Mac can access this data.
Apple shouldn’t be collecting this information. Mobile phone operators collect tower information as part of their operations but it is private and it normally requires a court order to gain access to it. Your iPhone tower information is available to anyone who can get their hands on your phone or computer.
By passively logging your location without your permission, Apple have made it possible for anyone from a jealous spouse to a private investigator to get a detailed picture of your movements.
If you sell or exchange your iPhone the tower data might still be on the phone. My iPhone is second-hand and I have discovered that I now have a map of the movements of its previous owner going back to October 2010.

http://www.livehacking.com/2011/04/21/your-iphone-is-watching-you-new-proof-of-concept-app-shows-how-your-iphone-is-tracking-your-every-movement/

Your iPhone is Watching You! New Proof-of-Concept App Shows How Your iPhone is Tracking Your Every Movement

Alasdair Allan and Pete Warden have released a new proof-of-concept application for Mac OS X that demonstrates that your iPhone is tracking your movements and recording the information. We have tested the application and it is 100% true, Apple are watching you!

Since the release of iOS 4.0 the iPhone has started storing cell-phone tower information and this information is copied to your Mac or PC when you sync your phone with iTunes. The application that Alasdair and Pete have released searches through your old sync data on your Mac and finds this cell-phone tower information and then displays it on a map, courtesy of OpenStreetMap.

How bad is this?

Other applications on your Mac can access this data.
Apple shouldn’t be collecting this information. Mobile phone operators collect tower information as part of their operations but it is private and it normally requires a court order to gain access to it. Your iPhone tower information is available to anyone who can get their hands on your phone or computer.
By passively logging your location without your permission, Apple have made it possible for anyone from a jealous spouse to a private investigator to get a detailed picture of your movements.
If you sell or exchange your iPhone the tower data might still be on the phone. My iPhone is second-hand and I have discovered that I now have a map of the movements of its previous owner going back to October 2010.

http://www.livehacking.com/2011/04/21/your-iphone-is-watching-you-new-proof-of-concept-app-shows-how-your-iphone-is-tracking-your-every-movement/

Saturday, April 23, 2011

State Police can suck data out of cell phones in under two minutes

You don't want to be pulled over by the police in Michigan. When law enforcement wants half a million dollars to produce documents for a FOIA request, something is not right. And since the high-tech mobile forensic device in question can grab data in one-and-a-half minutes off more than 3,000 different cell phone models, it could be used during minor traffic violations to conduct suspicionless and warrantless searches without the phone owner having any idea that all their phone data was now in the hands of authorities.

The Universal Forensic Extraction Device (UFED) made by Cellebrite can extract data off 95% of cell phones on the market. It can also grab GPS information from units in most vehicles. According the company's profile [PDF], the UFED is stand-alone gadget designed for "recovery and analysis" used by law enforcement, intelligence agencies, military and governments across the world in 60 different countries.




http://www.networkworld.com/community/blog/state-police-can-suck-data-out-cell-phones-un

State Police can suck data out of cell phones in under two minutes

You don't want to be pulled over by the police in Michigan. When law enforcement wants half a million dollars to produce documents for a FOIA request, something is not right. And since the high-tech mobile forensic device in question can grab data in one-and-a-half minutes off more than 3,000 different cell phone models, it could be used during minor traffic violations to conduct suspicionless and warrantless searches without the phone owner having any idea that all their phone data was now in the hands of authorities.

The Universal Forensic Extraction Device (UFED) made by Cellebrite can extract data off 95% of cell phones on the market. It can also grab GPS information from units in most vehicles. According the company's profile [PDF], the UFED is stand-alone gadget designed for "recovery and analysis" used by law enforcement, intelligence agencies, military and governments across the world in 60 different countries.




http://www.networkworld.com/community/blog/state-police-can-suck-data-out-cell-phones-un

State Police can suck data out of cell phones in under two minutes

You don't want to be pulled over by the police in Michigan. When law enforcement wants half a million dollars to produce documents for a FOIA request, something is not right. And since the high-tech mobile forensic device in question can grab data in one-and-a-half minutes off more than 3,000 different cell phone models, it could be used during minor traffic violations to conduct suspicionless and warrantless searches without the phone owner having any idea that all their phone data was now in the hands of authorities.

The Universal Forensic Extraction Device (UFED) made by Cellebrite can extract data off 95% of cell phones on the market. It can also grab GPS information from units in most vehicles. According the company's profile [PDF], the UFED is stand-alone gadget designed for "recovery and analysis" used by law enforcement, intelligence agencies, military and governments across the world in 60 different countries.




http://www.networkworld.com/community/blog/state-police-can-suck-data-out-cell-phones-un

State Police can suck data out of cell phones in under two minutes

You don't want to be pulled over by the police in Michigan. When law enforcement wants half a million dollars to produce documents for a FOIA request, something is not right. And since the high-tech mobile forensic device in question can grab data in one-and-a-half minutes off more than 3,000 different cell phone models, it could be used during minor traffic violations to conduct suspicionless and warrantless searches without the phone owner having any idea that all their phone data was now in the hands of authorities.

The Universal Forensic Extraction Device (UFED) made by Cellebrite can extract data off 95% of cell phones on the market. It can also grab GPS information from units in most vehicles. According the company's profile [PDF], the UFED is stand-alone gadget designed for "recovery and analysis" used by law enforcement, intelligence agencies, military and governments across the world in 60 different countries.




http://www.networkworld.com/community/blog/state-police-can-suck-data-out-cell-phones-un

Thursday, April 21, 2011

If Libya is so very bad to its people, then why does it have

ELOQUENT FACTS OF THE SOCIALIST LIBYA:

* GDP per capita - $ 14,192.
* Unemployment benefit - $ 730.
* Each family member subsidized by the state gets annually $ 1.000
* Salary for nurses - $ 1.000.
* For every newborn is paid $ 7.000.
* The bride and groom receive a $ 64 thousand to purchase flats.
* Major taxes and levies prohibited.
* To open a personal business a one-time financial assistance of $ 20.000
* Education and medicine are free.
* Educ.Internships abroad - at government expense.
* Stores for large families with symbolic prices for basic foodstuffs.
* Part of pharmacies - with free dispensing.
* Loans for buying a car and an apartment - no interest.
* Real estate services are prohibited.,

If Libya is so very bad to its people, then why does it have

ELOQUENT FACTS OF THE SOCIALIST LIBYA:

* GDP per capita - $ 14,192.
* Unemployment benefit - $ 730.
* Each family member subsidized by the state gets annually $ 1.000
* Salary for nurses - $ 1.000.
* For every newborn is paid $ 7.000.
* The bride and groom receive a $ 64 thousand to purchase flats.
* Major taxes and levies prohibited.
* To open a personal business a one-time financial assistance of $ 20.000
* Education and medicine are free.
* Educ.Internships abroad - at government expense.
* Stores for large families with symbolic prices for basic foodstuffs.
* Part of pharmacies - with free dispensing.
* Loans for buying a car and an apartment - no interest.
* Real estate services are prohibited.,

If Libya is so very bad to its people, then why does it have

ELOQUENT FACTS OF THE SOCIALIST LIBYA:

* GDP per capita - $ 14,192.
* Unemployment benefit - $ 730.
* Each family member subsidized by the state gets annually $ 1.000
* Salary for nurses - $ 1.000.
* For every newborn is paid $ 7.000.
* The bride and groom receive a $ 64 thousand to purchase flats.
* Major taxes and levies prohibited.
* To open a personal business a one-time financial assistance of $ 20.000
* Education and medicine are free.
* Educ.Internships abroad - at government expense.
* Stores for large families with symbolic prices for basic foodstuffs.
* Part of pharmacies - with free dispensing.
* Loans for buying a car and an apartment - no interest.
* Real estate services are prohibited.,

If Libya is so very bad to its people, then why does it have

ELOQUENT FACTS OF THE SOCIALIST LIBYA:

* GDP per capita - $ 14,192.
* Unemployment benefit - $ 730.
* Each family member subsidized by the state gets annually $ 1.000
* Salary for nurses - $ 1.000.
* For every newborn is paid $ 7.000.
* The bride and groom receive a $ 64 thousand to purchase flats.
* Major taxes and levies prohibited.
* To open a personal business a one-time financial assistance of $ 20.000
* Education and medicine are free.
* Educ.Internships abroad - at government expense.
* Stores for large families with symbolic prices for basic foodstuffs.
* Part of pharmacies - with free dispensing.
* Loans for buying a car and an apartment - no interest.
* Real estate services are prohibited.,

Wednesday, April 20, 2011

Staying healthy, protection against evil


Many ignorant people or those lost in dark paths mistakenly assume that pursuing a health conscious life modality is a wast of time and spirit. They feel or propagate the notion that it's who you are in spirit at the end of your life, not the condition of your body. Indeed.

However, choosing a healthy nutritional path has to do more with dealing with the intentional poisoning and attacks by those dark forces who control government and business, in addition to the condition of our spiritual estate. A wise soul understands this and makes sure that those under his care have this protection as well, so they can pursue a spiritual path that leads to our Father, with a safe, sane, and healthy body.

When our body is sick, diseased, dysfunctional, obese, and unable to do as designed, then we end up spending our time dealing with the various maladies, rather than focusing on love, virtues, and understanding the higher ways of God.

The satanic and lucifiric forces at work in our time have bombarded us with

chemtails, which poison us with varying toxins, pathogens, and heavy metals;

fluoridated water, which are loaded with pharmaceuticals and toxins, which further weaken our system;

poisoned and irradiated food stuffs, which provide zero nutrition and create severe disabling diseases which reduce us to drug dependent droids;

as well as many other attack vectors, all designed to weaken us, take us down, and keep us occupied with anything other than doing good, serving truth, and finding our way home.

Be wary of darksiders who attack your striving towards good heath, a clear mind, and a vibrant physical existence. Because they hate God, they also hate you, his creation. This self-loathing projected upon those who are inspired to take care of the Temple given to us by God so He can write his laws in our minds and hearts, is merely a low-grade and pathetic attack on your achieving the very goal of salvation, service, and living a healthy and loving life.

Beware of these wolves. Ignore them. See what they are.

Stay healthy. Take care of the Temple of God. And find your way home.

Staying healthy, protection against evil


Many ignorant people or those lost in dark paths mistakenly assume that pursuing a health conscious life modality is a wast of time and spirit. They feel or propagate the notion that it's who you are in spirit at the end of your life, not the condition of your body. Indeed.

However, choosing a healthy nutritional path has to do more with dealing with the intentional poisoning and attacks by those dark forces who control government and business, in addition to the condition of our spiritual estate. A wise soul understands this and makes sure that those under his care have this protection as well, so they can pursue a spiritual path that leads to our Father, with a safe, sane, and healthy body.

When our body is sick, diseased, dysfunctional, obese, and unable to do as designed, then we end up spending our time dealing with the various maladies, rather than focusing on love, virtues, and understanding the higher ways of God.

The satanic and lucifiric forces at work in our time have bombarded us with

chemtails, which poison us with varying toxins, pathogens, and heavy metals;

fluoridated water, which are loaded with pharmaceuticals and toxins, which further weaken our system;

poisoned and irradiated food stuffs, which provide zero nutrition and create severe disabling diseases which reduce us to drug dependent droids;

as well as many other attack vectors, all designed to weaken us, take us down, and keep us occupied with anything other than doing good, serving truth, and finding our way home.

Be wary of darksiders who attack your striving towards good heath, a clear mind, and a vibrant physical existence. Because they hate God, they also hate you, his creation. This self-loathing projected upon those who are inspired to take care of the Temple given to us by God so He can write his laws in our minds and hearts, is merely a low-grade and pathetic attack on your achieving the very goal of salvation, service, and living a healthy and loving life.

Beware of these wolves. Ignore them. See what they are.

Stay healthy. Take care of the Temple of God. And find your way home.

Staying healthy, protection against evil


Many ignorant people or those lost in dark paths mistakenly assume that pursuing a health conscious life modality is a wast of time and spirit. They feel or propagate the notion that it's who you are in spirit at the end of your life, not the condition of your body. Indeed.

However, choosing a healthy nutritional path has to do more with dealing with the intentional poisoning and attacks by those dark forces who control government and business, in addition to the condition of our spiritual estate. A wise soul understands this and makes sure that those under his care have this protection as well, so they can pursue a spiritual path that leads to our Father, with a safe, sane, and healthy body.

When our body is sick, diseased, dysfunctional, obese, and unable to do as designed, then we end up spending our time dealing with the various maladies, rather than focusing on love, virtues, and understanding the higher ways of God.

The satanic and lucifiric forces at work in our time have bombarded us with

chemtails, which poison us with varying toxins, pathogens, and heavy metals;

fluoridated water, which are loaded with pharmaceuticals and toxins, which further weaken our system;

poisoned and irradiated food stuffs, which provide zero nutrition and create severe disabling diseases which reduce us to drug dependent droids;

as well as many other attack vectors, all designed to weaken us, take us down, and keep us occupied with anything other than doing good, serving truth, and finding our way home.

Be wary of darksiders who attack your striving towards good heath, a clear mind, and a vibrant physical existence. Because they hate God, they also hate you, his creation. This self-loathing projected upon those who are inspired to take care of the Temple given to us by God so He can write his laws in our minds and hearts, is merely a low-grade and pathetic attack on your achieving the very goal of salvation, service, and living a healthy and loving life.

Beware of these wolves. Ignore them. See what they are.

Stay healthy. Take care of the Temple of God. And find your way home.

Staying healthy, protection against evil


Many ignorant people or those lost in dark paths mistakenly assume that pursuing a health conscious life modality is a wast of time and spirit. They feel or propagate the notion that it's who you are in spirit at the end of your life, not the condition of your body. Indeed.

However, choosing a healthy nutritional path has to do more with dealing with the intentional poisoning and attacks by those dark forces who control government and business, in addition to the condition of our spiritual estate. A wise soul understands this and makes sure that those under his care have this protection as well, so they can pursue a spiritual path that leads to our Father, with a safe, sane, and healthy body.

When our body is sick, diseased, dysfunctional, obese, and unable to do as designed, then we end up spending our time dealing with the various maladies, rather than focusing on love, virtues, and understanding the higher ways of God.

The satanic and lucifiric forces at work in our time have bombarded us with

chemtails, which poison us with varying toxins, pathogens, and heavy metals;

fluoridated water, which are loaded with pharmaceuticals and toxins, which further weaken our system;

poisoned and irradiated food stuffs, which provide zero nutrition and create severe disabling diseases which reduce us to drug dependent droids;

as well as many other attack vectors, all designed to weaken us, take us down, and keep us occupied with anything other than doing good, serving truth, and finding our way home.

Be wary of darksiders who attack your striving towards good heath, a clear mind, and a vibrant physical existence. Because they hate God, they also hate you, his creation. This self-loathing projected upon those who are inspired to take care of the Temple given to us by God so He can write his laws in our minds and hearts, is merely a low-grade and pathetic attack on your achieving the very goal of salvation, service, and living a healthy and loving life.

Beware of these wolves. Ignore them. See what they are.

Stay healthy. Take care of the Temple of God. And find your way home.

Oil and gas companies pumped millions of gallons of carcinogenic chemicals into U.S. water supply

Millions of gallons of potentially cancer-inducing chemicals have been pumped into the U.S. water supply by leading gas and oil companies, an investigation has revealed.

The chemicals were pumped into wells as part of a process called hydraulic fracturing to access natural gas, which needs large amounts of water and fluids injected underground at high volumes and pressure.
A report quizzed 14 different companies about the chemicals used in the process and found 29 chemicals were known or suspected human carcinogens.
They were either regulated under the Safe Drinking Water Act as risks to human health, or listed as hazardous air pollutants under the Clean Air Act.


http://www.dailymail.co.uk/news/article-1378039/Leading-oil-gas-companies-pumped-millions-litres-carcinogenic-chemicals-water-system.html#ixzz1JtgAeG4v

Oil and gas companies pumped millions of gallons of carcinogenic chemicals into U.S. water supply

Millions of gallons of potentially cancer-inducing chemicals have been pumped into the U.S. water supply by leading gas and oil companies, an investigation has revealed.

The chemicals were pumped into wells as part of a process called hydraulic fracturing to access natural gas, which needs large amounts of water and fluids injected underground at high volumes and pressure.
A report quizzed 14 different companies about the chemicals used in the process and found 29 chemicals were known or suspected human carcinogens.
They were either regulated under the Safe Drinking Water Act as risks to human health, or listed as hazardous air pollutants under the Clean Air Act.


http://www.dailymail.co.uk/news/article-1378039/Leading-oil-gas-companies-pumped-millions-litres-carcinogenic-chemicals-water-system.html#ixzz1JtgAeG4v

Oil and gas companies pumped millions of gallons of carcinogenic chemicals into U.S. water supply

Millions of gallons of potentially cancer-inducing chemicals have been pumped into the U.S. water supply by leading gas and oil companies, an investigation has revealed.

The chemicals were pumped into wells as part of a process called hydraulic fracturing to access natural gas, which needs large amounts of water and fluids injected underground at high volumes and pressure.
A report quizzed 14 different companies about the chemicals used in the process and found 29 chemicals were known or suspected human carcinogens.
They were either regulated under the Safe Drinking Water Act as risks to human health, or listed as hazardous air pollutants under the Clean Air Act.


http://www.dailymail.co.uk/news/article-1378039/Leading-oil-gas-companies-pumped-millions-litres-carcinogenic-chemicals-water-system.html#ixzz1JtgAeG4v

Oil and gas companies pumped millions of gallons of carcinogenic chemicals into U.S. water supply

Millions of gallons of potentially cancer-inducing chemicals have been pumped into the U.S. water supply by leading gas and oil companies, an investigation has revealed.

The chemicals were pumped into wells as part of a process called hydraulic fracturing to access natural gas, which needs large amounts of water and fluids injected underground at high volumes and pressure.
A report quizzed 14 different companies about the chemicals used in the process and found 29 chemicals were known or suspected human carcinogens.
They were either regulated under the Safe Drinking Water Act as risks to human health, or listed as hazardous air pollutants under the Clean Air Act.


http://www.dailymail.co.uk/news/article-1378039/Leading-oil-gas-companies-pumped-millions-litres-carcinogenic-chemicals-water-system.html#ixzz1JtgAeG4v

iPhone keeps record of everywhere you go

Security researchers have discovered that Apple's iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner's computer when the two are synchronised.

The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program.

For some phones, there could be almost a year's worth of data stored, as the recording of data seems to have started with Apple's iOS 4 update to the phone's operating system, released in June 2010.

http://www.guardian.co.uk/technology/2011/apr/20/iphone-tracking-prompts-privacy-fears

iPhone keeps record of everywhere you go

Security researchers have discovered that Apple's iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner's computer when the two are synchronised.

The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program.

For some phones, there could be almost a year's worth of data stored, as the recording of data seems to have started with Apple's iOS 4 update to the phone's operating system, released in June 2010.

http://www.guardian.co.uk/technology/2011/apr/20/iphone-tracking-prompts-privacy-fears

iPhone keeps record of everywhere you go

Security researchers have discovered that Apple's iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner's computer when the two are synchronised.

The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program.

For some phones, there could be almost a year's worth of data stored, as the recording of data seems to have started with Apple's iOS 4 update to the phone's operating system, released in June 2010.

http://www.guardian.co.uk/technology/2011/apr/20/iphone-tracking-prompts-privacy-fears

iPhone keeps record of everywhere you go

Security researchers have discovered that Apple's iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner's computer when the two are synchronised.

The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program.

For some phones, there could be almost a year's worth of data stored, as the recording of data seems to have started with Apple's iOS 4 update to the phone's operating system, released in June 2010.

http://www.guardian.co.uk/technology/2011/apr/20/iphone-tracking-prompts-privacy-fears

keeping the fear pumped up - DHS

The Department of Homeland Security is dumping its often-maligned and complicated color-coded terror alert system in favor of a simpler model that enlists the social media: People sometimes will be able to get alerts on Facebook and Twitter.

Homeland Security Secretary Janet Napolitano will unveil the new National Terrorism Advisory System, featuring warning levels of just "imminent" and "elevated," in New York City today.


Read more on Newsmax.com: Homeland Security Abandons Color-Coded Terror Alerts
Important: Do You Support Pres. Obama's Re-Election? Vote Here Now!

she complained that the usual fear-mongering on TV wasn't hyping their agenda enough, so they've decided to use facebook, skype, and twitter to send out alerts. In this way, she explained, they can interrupt people's lives at the right time and get their conversations changed to that of reactive fear, a controlling frequency that shrinks the heart, causes adrenalin to pump faster, and causes people to make poor judgment choices.

keeping the fear pumped up - DHS

The Department of Homeland Security is dumping its often-maligned and complicated color-coded terror alert system in favor of a simpler model that enlists the social media: People sometimes will be able to get alerts on Facebook and Twitter.

Homeland Security Secretary Janet Napolitano will unveil the new National Terrorism Advisory System, featuring warning levels of just "imminent" and "elevated," in New York City today.


Read more on Newsmax.com: Homeland Security Abandons Color-Coded Terror Alerts
Important: Do You Support Pres. Obama's Re-Election? Vote Here Now!

she complained that the usual fear-mongering on TV wasn't hyping their agenda enough, so they've decided to use facebook, skype, and twitter to send out alerts. In this way, she explained, they can interrupt people's lives at the right time and get their conversations changed to that of reactive fear, a controlling frequency that shrinks the heart, causes adrenalin to pump faster, and causes people to make poor judgment choices.

keeping the fear pumped up - DHS

The Department of Homeland Security is dumping its often-maligned and complicated color-coded terror alert system in favor of a simpler model that enlists the social media: People sometimes will be able to get alerts on Facebook and Twitter.

Homeland Security Secretary Janet Napolitano will unveil the new National Terrorism Advisory System, featuring warning levels of just "imminent" and "elevated," in New York City today.


Read more on Newsmax.com: Homeland Security Abandons Color-Coded Terror Alerts
Important: Do You Support Pres. Obama's Re-Election? Vote Here Now!

she complained that the usual fear-mongering on TV wasn't hyping their agenda enough, so they've decided to use facebook, skype, and twitter to send out alerts. In this way, she explained, they can interrupt people's lives at the right time and get their conversations changed to that of reactive fear, a controlling frequency that shrinks the heart, causes adrenalin to pump faster, and causes people to make poor judgment choices.

keeping the fear pumped up - DHS

The Department of Homeland Security is dumping its often-maligned and complicated color-coded terror alert system in favor of a simpler model that enlists the social media: People sometimes will be able to get alerts on Facebook and Twitter.

Homeland Security Secretary Janet Napolitano will unveil the new National Terrorism Advisory System, featuring warning levels of just "imminent" and "elevated," in New York City today.


Read more on Newsmax.com: Homeland Security Abandons Color-Coded Terror Alerts
Important: Do You Support Pres. Obama's Re-Election? Vote Here Now!

she complained that the usual fear-mongering on TV wasn't hyping their agenda enough, so they've decided to use facebook, skype, and twitter to send out alerts. In this way, she explained, they can interrupt people's lives at the right time and get their conversations changed to that of reactive fear, a controlling frequency that shrinks the heart, causes adrenalin to pump faster, and causes people to make poor judgment choices.

Tuesday, April 19, 2011

U.S. Government Printing Office Needs 350,934 National Detainee Handbooks printed and delivered by 5/20/11

U.S. Government Printing Office Needs 350,934 National Detainee Handbooks printed and delivered by 5/20/11

This is a time-critical order. For the purpose of this contract, the provision in GPO Contract Terms Pub. 310.2 (Rev. 6-01) for schedule extensions does not apply. No automatic extensions of schedules will be made. All interested contractors must commit to the original schedule. Shipments must be made by a carrier that will guarantee delivery at destination within the specified schedule. Carrier’s “targets” in lieu of “guaranteed” deliveries will not be acceptable.

U.S. Government Printing Office Needs 350,934 National Detainee Handbooks printed and delivered by 5/20/11

U.S. Government Printing Office Needs 350,934 National Detainee Handbooks printed and delivered by 5/20/11

This is a time-critical order. For the purpose of this contract, the provision in GPO Contract Terms Pub. 310.2 (Rev. 6-01) for schedule extensions does not apply. No automatic extensions of schedules will be made. All interested contractors must commit to the original schedule. Shipments must be made by a carrier that will guarantee delivery at destination within the specified schedule. Carrier’s “targets” in lieu of “guaranteed” deliveries will not be acceptable.

U.S. Government Printing Office Needs 350,934 National Detainee Handbooks printed and delivered by 5/20/11

U.S. Government Printing Office Needs 350,934 National Detainee Handbooks printed and delivered by 5/20/11

This is a time-critical order. For the purpose of this contract, the provision in GPO Contract Terms Pub. 310.2 (Rev. 6-01) for schedule extensions does not apply. No automatic extensions of schedules will be made. All interested contractors must commit to the original schedule. Shipments must be made by a carrier that will guarantee delivery at destination within the specified schedule. Carrier’s “targets” in lieu of “guaranteed” deliveries will not be acceptable.

U.S. Government Printing Office Needs 350,934 National Detainee Handbooks printed and delivered by 5/20/11

U.S. Government Printing Office Needs 350,934 National Detainee Handbooks printed and delivered by 5/20/11

This is a time-critical order. For the purpose of this contract, the provision in GPO Contract Terms Pub. 310.2 (Rev. 6-01) for schedule extensions does not apply. No automatic extensions of schedules will be made. All interested contractors must commit to the original schedule. Shipments must be made by a carrier that will guarantee delivery at destination within the specified schedule. Carrier’s “targets” in lieu of “guaranteed” deliveries will not be acceptable.

Monday, April 18, 2011

The Pagan Origin Of Easter

The Pagan Origin Of Easter


--------------------------------------------------------------------------------

Easter is a day that is honered by nearly all of contemporary Christianity and is used to celebrate the resurrection of Jesus Christ.
The holiday often involves a church service at sunrise, a feast which includes an "Easter Ham", decorated eggs and stories about rabbits.

Those who love truth learn to ask questions, and many questions must be asked regarding the holiday of Easter.

Is it truly the day when Jesus arose from the dead? Where did all of the strange customs come from, which have nothing to do with the resurrection of our Saviour?

The purpose of this tract is to help answer those questions, and to help those who seek truth to draw their own conclusions.

The first thing we must understand is that professing Christians were not the only ones who celebrated a festival called "Easter."

"Ishtar", which is pronounced "Easter" was a day that commemorated the resurrection of one of their gods that they called "Tammuz", who was believed to be the only begotten son of the moon-goddess and the sun-god.

In those ancient times, there was a man named Nimrod, who was the grandson of one of Noah's son named Ham.

Ham had a son named Cush who married a woman named Semiramis.Cush and Semiramis then had a son named him "Nimrod."

After the death of his father, Nimrod married his own mother and became a powerful King.

The Bible tells of of this man, Nimrod, in Genesis 10:8-10 as follows: "And Cush begat Nimrod: he began to be a mighty one in the earth. He was a mighty hunter before the Lord: wherefore it is said, even as Nimrod the mighty hunter before the Lord. And the beginning of his kingdom was Babel, and Erech, and Accad,and Calneh, in the land of Shinar."

Nimrod became a god-man to the people and Semiramis, his wife and mother, became the powerful Queen of ancient Babylon.

Nimrod was eventually killed by an enemy, and his body was cut in pieces and sent to various parts of his kingdom.

Semiramis had all of the parts gathered, except for one part that could not be found.

That missing part was his reproductive organ. Semiramis claimed that Nimrod could not come back to life without it and told the people of Babylon that Nimrod had ascended to the sun and was now to be called "Baal", the sun god.

Queen Semiramis also proclaimed that Baal would be present on earth in the form of a flame, whether candle or lamp, when used in worship.

Semiramis was creating a mystery religion, and with the help of Satan, she set herself up as a goddess.

Semiramis claimed that she was immaculately conceived.

She taught that the moon was a goddess that went through a 28 day cycle and ovulated when full.

She further claimed that she came down from the moon in a giant moon egg that fell into the Euphrates River.

This was to have happened at the time of the first full moon after the spring equinox.

Semiramis became known as "Ishtar" which is pronounced "Easter", and her moon egg became known as "Ishtar's" egg."

Ishtar soon became pregnant and claimed that it was the rays of the sun-god Baal that caused her to conceive.

The son that she brought forth was named Tammuz.

Tammuz was noted to be especially fond of rabbits, and they became sacred in the ancient religion, because Tammuz was believed to be the son of the sun-god, Baal. Tammuz, like his supposed father, became a hunter.

The day came when Tammuz was killed by a wild pig.

Queen Ishtar told the people that Tammuz was now ascended to his father, Baal, and that the two of them would be with the worshippers in the sacred candle or lamp flame as Father, Son and Spirit.

Ishtar, who was now worshipped as the "Mother of God and Queen of Heaven", continued to build her mystery religion.

The queen told the worshippers that when Tammuz was killed by the wild pig, some of his blood fell on the stump of an evergreen tree, and the stump grew into a full new tree overnight. This made the evergreen tree sacred by the blood of Tammuz.

She also proclaimed a forty day period of time of sorrow each year prior to the anniversary of the death of Tammuz.

During this time, no meat was to be eaten.

Worshippers were to meditate upon the sacred mysteries of Baal and Tammuz, and to make the sign of the "T" in front of their hearts as they worshipped.

They also ate sacred cakes with the marking of a "T" or cross on the top.

Every year, on the first Sunday after the first full moon after the spring equinox, a celebration was made.

It was Ishtar's Sunday and was celebrated with rabbits and eggs.

Ishtar also proclaimed that because Tammuz was killed by a pig, that a pig must be eaten on that Sunday.

By now, the readers of this tract should have made the connection that paganism has infiltrated the contemporary "Christian" churches, and further study indicates that this paganism came in by way of the Roman Catholic System.

The truth is that Easter has nothing whatsoever to do with the resurrection of our Lord Jesus Christ.

We also know that Easter can be as much as three weeks away from the Passover, because the pagan holiday is always set as the first Sunday after the first full moon after the spring equinox.

Some have wondered why the word "Easter" is in the the King James Bible.

It is because Acts, chapter 12, tells us that it was the evil King Herod, who was planning to celebrate Easter, and not the Christians.

The true Passover and pagan Easter sometimes coincide, but in some years, they are a great distance apart.

So much more could be said, and we have much more information for you, if you are a seeker of the truth.

We know that the Bible tells us in John 4:24, "God is a Spirit: and they that worship him must worship him in spirit and in truth."

The truth is that the forty days of Lent, eggs, rabbits,hot cross buns and the Easter ham have everything to do with the ancient pagan religion of Mystery Babylon.These are all antichrist activities!

Satan is a master deceiver, and has filled the lives of well-meaning, professing Christians with idolatry.

These things bring the wrath of God upon children of disobedience, who try to make pagan customs of Baal worship Christian.

You must answer for your activities and for what you teach your children.

These customs of Easter honor Baal, who is also Satan, and is still worshipped as the "Rising Sun" and his house is the "House of the Rising Sun."

How many churches have "sunrise services" on Ishtar's day and face the rising sun in the East?

How many will use colored eggs and rabbit stories, as they did in ancient Babylon.

These things are no joke, any more than Judgement day is a joke.

I pray to God that this tract will cause you to search for more truth.

We will be glad to help you by providing more information and by praying for you.

These are the last days, and it is time to repent, come out and be separate.

David J. Meyer

Last Trumpet Ministries International
PO Box 806
Beaver Dam, WI 53916

The Pagan Origin Of Easter

The Pagan Origin Of Easter


--------------------------------------------------------------------------------

Easter is a day that is honered by nearly all of contemporary Christianity and is used to celebrate the resurrection of Jesus Christ.
The holiday often involves a church service at sunrise, a feast which includes an "Easter Ham", decorated eggs and stories about rabbits.

Those who love truth learn to ask questions, and many questions must be asked regarding the holiday of Easter.

Is it truly the day when Jesus arose from the dead? Where did all of the strange customs come from, which have nothing to do with the resurrection of our Saviour?

The purpose of this tract is to help answer those questions, and to help those who seek truth to draw their own conclusions.

The first thing we must understand is that professing Christians were not the only ones who celebrated a festival called "Easter."

"Ishtar", which is pronounced "Easter" was a day that commemorated the resurrection of one of their gods that they called "Tammuz", who was believed to be the only begotten son of the moon-goddess and the sun-god.

In those ancient times, there was a man named Nimrod, who was the grandson of one of Noah's son named Ham.

Ham had a son named Cush who married a woman named Semiramis.Cush and Semiramis then had a son named him "Nimrod."

After the death of his father, Nimrod married his own mother and became a powerful King.

The Bible tells of of this man, Nimrod, in Genesis 10:8-10 as follows: "And Cush begat Nimrod: he began to be a mighty one in the earth. He was a mighty hunter before the Lord: wherefore it is said, even as Nimrod the mighty hunter before the Lord. And the beginning of his kingdom was Babel, and Erech, and Accad,and Calneh, in the land of Shinar."

Nimrod became a god-man to the people and Semiramis, his wife and mother, became the powerful Queen of ancient Babylon.

Nimrod was eventually killed by an enemy, and his body was cut in pieces and sent to various parts of his kingdom.

Semiramis had all of the parts gathered, except for one part that could not be found.

That missing part was his reproductive organ. Semiramis claimed that Nimrod could not come back to life without it and told the people of Babylon that Nimrod had ascended to the sun and was now to be called "Baal", the sun god.

Queen Semiramis also proclaimed that Baal would be present on earth in the form of a flame, whether candle or lamp, when used in worship.

Semiramis was creating a mystery religion, and with the help of Satan, she set herself up as a goddess.

Semiramis claimed that she was immaculately conceived.

She taught that the moon was a goddess that went through a 28 day cycle and ovulated when full.

She further claimed that she came down from the moon in a giant moon egg that fell into the Euphrates River.

This was to have happened at the time of the first full moon after the spring equinox.

Semiramis became known as "Ishtar" which is pronounced "Easter", and her moon egg became known as "Ishtar's" egg."

Ishtar soon became pregnant and claimed that it was the rays of the sun-god Baal that caused her to conceive.

The son that she brought forth was named Tammuz.

Tammuz was noted to be especially fond of rabbits, and they became sacred in the ancient religion, because Tammuz was believed to be the son of the sun-god, Baal. Tammuz, like his supposed father, became a hunter.

The day came when Tammuz was killed by a wild pig.

Queen Ishtar told the people that Tammuz was now ascended to his father, Baal, and that the two of them would be with the worshippers in the sacred candle or lamp flame as Father, Son and Spirit.

Ishtar, who was now worshipped as the "Mother of God and Queen of Heaven", continued to build her mystery religion.

The queen told the worshippers that when Tammuz was killed by the wild pig, some of his blood fell on the stump of an evergreen tree, and the stump grew into a full new tree overnight. This made the evergreen tree sacred by the blood of Tammuz.

She also proclaimed a forty day period of time of sorrow each year prior to the anniversary of the death of Tammuz.

During this time, no meat was to be eaten.

Worshippers were to meditate upon the sacred mysteries of Baal and Tammuz, and to make the sign of the "T" in front of their hearts as they worshipped.

They also ate sacred cakes with the marking of a "T" or cross on the top.

Every year, on the first Sunday after the first full moon after the spring equinox, a celebration was made.

It was Ishtar's Sunday and was celebrated with rabbits and eggs.

Ishtar also proclaimed that because Tammuz was killed by a pig, that a pig must be eaten on that Sunday.

By now, the readers of this tract should have made the connection that paganism has infiltrated the contemporary "Christian" churches, and further study indicates that this paganism came in by way of the Roman Catholic System.

The truth is that Easter has nothing whatsoever to do with the resurrection of our Lord Jesus Christ.

We also know that Easter can be as much as three weeks away from the Passover, because the pagan holiday is always set as the first Sunday after the first full moon after the spring equinox.

Some have wondered why the word "Easter" is in the the King James Bible.

It is because Acts, chapter 12, tells us that it was the evil King Herod, who was planning to celebrate Easter, and not the Christians.

The true Passover and pagan Easter sometimes coincide, but in some years, they are a great distance apart.

So much more could be said, and we have much more information for you, if you are a seeker of the truth.

We know that the Bible tells us in John 4:24, "God is a Spirit: and they that worship him must worship him in spirit and in truth."

The truth is that the forty days of Lent, eggs, rabbits,hot cross buns and the Easter ham have everything to do with the ancient pagan religion of Mystery Babylon.These are all antichrist activities!

Satan is a master deceiver, and has filled the lives of well-meaning, professing Christians with idolatry.

These things bring the wrath of God upon children of disobedience, who try to make pagan customs of Baal worship Christian.

You must answer for your activities and for what you teach your children.

These customs of Easter honor Baal, who is also Satan, and is still worshipped as the "Rising Sun" and his house is the "House of the Rising Sun."

How many churches have "sunrise services" on Ishtar's day and face the rising sun in the East?

How many will use colored eggs and rabbit stories, as they did in ancient Babylon.

These things are no joke, any more than Judgement day is a joke.

I pray to God that this tract will cause you to search for more truth.

We will be glad to help you by providing more information and by praying for you.

These are the last days, and it is time to repent, come out and be separate.

David J. Meyer

Last Trumpet Ministries International
PO Box 806
Beaver Dam, WI 53916

The Pagan Origin Of Easter

The Pagan Origin Of Easter


--------------------------------------------------------------------------------

Easter is a day that is honered by nearly all of contemporary Christianity and is used to celebrate the resurrection of Jesus Christ.
The holiday often involves a church service at sunrise, a feast which includes an "Easter Ham", decorated eggs and stories about rabbits.

Those who love truth learn to ask questions, and many questions must be asked regarding the holiday of Easter.

Is it truly the day when Jesus arose from the dead? Where did all of the strange customs come from, which have nothing to do with the resurrection of our Saviour?

The purpose of this tract is to help answer those questions, and to help those who seek truth to draw their own conclusions.

The first thing we must understand is that professing Christians were not the only ones who celebrated a festival called "Easter."

"Ishtar", which is pronounced "Easter" was a day that commemorated the resurrection of one of their gods that they called "Tammuz", who was believed to be the only begotten son of the moon-goddess and the sun-god.

In those ancient times, there was a man named Nimrod, who was the grandson of one of Noah's son named Ham.

Ham had a son named Cush who married a woman named Semiramis.Cush and Semiramis then had a son named him "Nimrod."

After the death of his father, Nimrod married his own mother and became a powerful King.

The Bible tells of of this man, Nimrod, in Genesis 10:8-10 as follows: "And Cush begat Nimrod: he began to be a mighty one in the earth. He was a mighty hunter before the Lord: wherefore it is said, even as Nimrod the mighty hunter before the Lord. And the beginning of his kingdom was Babel, and Erech, and Accad,and Calneh, in the land of Shinar."

Nimrod became a god-man to the people and Semiramis, his wife and mother, became the powerful Queen of ancient Babylon.

Nimrod was eventually killed by an enemy, and his body was cut in pieces and sent to various parts of his kingdom.

Semiramis had all of the parts gathered, except for one part that could not be found.

That missing part was his reproductive organ. Semiramis claimed that Nimrod could not come back to life without it and told the people of Babylon that Nimrod had ascended to the sun and was now to be called "Baal", the sun god.

Queen Semiramis also proclaimed that Baal would be present on earth in the form of a flame, whether candle or lamp, when used in worship.

Semiramis was creating a mystery religion, and with the help of Satan, she set herself up as a goddess.

Semiramis claimed that she was immaculately conceived.

She taught that the moon was a goddess that went through a 28 day cycle and ovulated when full.

She further claimed that she came down from the moon in a giant moon egg that fell into the Euphrates River.

This was to have happened at the time of the first full moon after the spring equinox.

Semiramis became known as "Ishtar" which is pronounced "Easter", and her moon egg became known as "Ishtar's" egg."

Ishtar soon became pregnant and claimed that it was the rays of the sun-god Baal that caused her to conceive.

The son that she brought forth was named Tammuz.

Tammuz was noted to be especially fond of rabbits, and they became sacred in the ancient religion, because Tammuz was believed to be the son of the sun-god, Baal. Tammuz, like his supposed father, became a hunter.

The day came when Tammuz was killed by a wild pig.

Queen Ishtar told the people that Tammuz was now ascended to his father, Baal, and that the two of them would be with the worshippers in the sacred candle or lamp flame as Father, Son and Spirit.

Ishtar, who was now worshipped as the "Mother of God and Queen of Heaven", continued to build her mystery religion.

The queen told the worshippers that when Tammuz was killed by the wild pig, some of his blood fell on the stump of an evergreen tree, and the stump grew into a full new tree overnight. This made the evergreen tree sacred by the blood of Tammuz.

She also proclaimed a forty day period of time of sorrow each year prior to the anniversary of the death of Tammuz.

During this time, no meat was to be eaten.

Worshippers were to meditate upon the sacred mysteries of Baal and Tammuz, and to make the sign of the "T" in front of their hearts as they worshipped.

They also ate sacred cakes with the marking of a "T" or cross on the top.

Every year, on the first Sunday after the first full moon after the spring equinox, a celebration was made.

It was Ishtar's Sunday and was celebrated with rabbits and eggs.

Ishtar also proclaimed that because Tammuz was killed by a pig, that a pig must be eaten on that Sunday.

By now, the readers of this tract should have made the connection that paganism has infiltrated the contemporary "Christian" churches, and further study indicates that this paganism came in by way of the Roman Catholic System.

The truth is that Easter has nothing whatsoever to do with the resurrection of our Lord Jesus Christ.

We also know that Easter can be as much as three weeks away from the Passover, because the pagan holiday is always set as the first Sunday after the first full moon after the spring equinox.

Some have wondered why the word "Easter" is in the the King James Bible.

It is because Acts, chapter 12, tells us that it was the evil King Herod, who was planning to celebrate Easter, and not the Christians.

The true Passover and pagan Easter sometimes coincide, but in some years, they are a great distance apart.

So much more could be said, and we have much more information for you, if you are a seeker of the truth.

We know that the Bible tells us in John 4:24, "God is a Spirit: and they that worship him must worship him in spirit and in truth."

The truth is that the forty days of Lent, eggs, rabbits,hot cross buns and the Easter ham have everything to do with the ancient pagan religion of Mystery Babylon.These are all antichrist activities!

Satan is a master deceiver, and has filled the lives of well-meaning, professing Christians with idolatry.

These things bring the wrath of God upon children of disobedience, who try to make pagan customs of Baal worship Christian.

You must answer for your activities and for what you teach your children.

These customs of Easter honor Baal, who is also Satan, and is still worshipped as the "Rising Sun" and his house is the "House of the Rising Sun."

How many churches have "sunrise services" on Ishtar's day and face the rising sun in the East?

How many will use colored eggs and rabbit stories, as they did in ancient Babylon.

These things are no joke, any more than Judgement day is a joke.

I pray to God that this tract will cause you to search for more truth.

We will be glad to help you by providing more information and by praying for you.

These are the last days, and it is time to repent, come out and be separate.

David J. Meyer

Last Trumpet Ministries International
PO Box 806
Beaver Dam, WI 53916

The Pagan Origin Of Easter

The Pagan Origin Of Easter


--------------------------------------------------------------------------------

Easter is a day that is honered by nearly all of contemporary Christianity and is used to celebrate the resurrection of Jesus Christ.
The holiday often involves a church service at sunrise, a feast which includes an "Easter Ham", decorated eggs and stories about rabbits.

Those who love truth learn to ask questions, and many questions must be asked regarding the holiday of Easter.

Is it truly the day when Jesus arose from the dead? Where did all of the strange customs come from, which have nothing to do with the resurrection of our Saviour?

The purpose of this tract is to help answer those questions, and to help those who seek truth to draw their own conclusions.

The first thing we must understand is that professing Christians were not the only ones who celebrated a festival called "Easter."

"Ishtar", which is pronounced "Easter" was a day that commemorated the resurrection of one of their gods that they called "Tammuz", who was believed to be the only begotten son of the moon-goddess and the sun-god.

In those ancient times, there was a man named Nimrod, who was the grandson of one of Noah's son named Ham.

Ham had a son named Cush who married a woman named Semiramis.Cush and Semiramis then had a son named him "Nimrod."

After the death of his father, Nimrod married his own mother and became a powerful King.

The Bible tells of of this man, Nimrod, in Genesis 10:8-10 as follows: "And Cush begat Nimrod: he began to be a mighty one in the earth. He was a mighty hunter before the Lord: wherefore it is said, even as Nimrod the mighty hunter before the Lord. And the beginning of his kingdom was Babel, and Erech, and Accad,and Calneh, in the land of Shinar."

Nimrod became a god-man to the people and Semiramis, his wife and mother, became the powerful Queen of ancient Babylon.

Nimrod was eventually killed by an enemy, and his body was cut in pieces and sent to various parts of his kingdom.

Semiramis had all of the parts gathered, except for one part that could not be found.

That missing part was his reproductive organ. Semiramis claimed that Nimrod could not come back to life without it and told the people of Babylon that Nimrod had ascended to the sun and was now to be called "Baal", the sun god.

Queen Semiramis also proclaimed that Baal would be present on earth in the form of a flame, whether candle or lamp, when used in worship.

Semiramis was creating a mystery religion, and with the help of Satan, she set herself up as a goddess.

Semiramis claimed that she was immaculately conceived.

She taught that the moon was a goddess that went through a 28 day cycle and ovulated when full.

She further claimed that she came down from the moon in a giant moon egg that fell into the Euphrates River.

This was to have happened at the time of the first full moon after the spring equinox.

Semiramis became known as "Ishtar" which is pronounced "Easter", and her moon egg became known as "Ishtar's" egg."

Ishtar soon became pregnant and claimed that it was the rays of the sun-god Baal that caused her to conceive.

The son that she brought forth was named Tammuz.

Tammuz was noted to be especially fond of rabbits, and they became sacred in the ancient religion, because Tammuz was believed to be the son of the sun-god, Baal. Tammuz, like his supposed father, became a hunter.

The day came when Tammuz was killed by a wild pig.

Queen Ishtar told the people that Tammuz was now ascended to his father, Baal, and that the two of them would be with the worshippers in the sacred candle or lamp flame as Father, Son and Spirit.

Ishtar, who was now worshipped as the "Mother of God and Queen of Heaven", continued to build her mystery religion.

The queen told the worshippers that when Tammuz was killed by the wild pig, some of his blood fell on the stump of an evergreen tree, and the stump grew into a full new tree overnight. This made the evergreen tree sacred by the blood of Tammuz.

She also proclaimed a forty day period of time of sorrow each year prior to the anniversary of the death of Tammuz.

During this time, no meat was to be eaten.

Worshippers were to meditate upon the sacred mysteries of Baal and Tammuz, and to make the sign of the "T" in front of their hearts as they worshipped.

They also ate sacred cakes with the marking of a "T" or cross on the top.

Every year, on the first Sunday after the first full moon after the spring equinox, a celebration was made.

It was Ishtar's Sunday and was celebrated with rabbits and eggs.

Ishtar also proclaimed that because Tammuz was killed by a pig, that a pig must be eaten on that Sunday.

By now, the readers of this tract should have made the connection that paganism has infiltrated the contemporary "Christian" churches, and further study indicates that this paganism came in by way of the Roman Catholic System.

The truth is that Easter has nothing whatsoever to do with the resurrection of our Lord Jesus Christ.

We also know that Easter can be as much as three weeks away from the Passover, because the pagan holiday is always set as the first Sunday after the first full moon after the spring equinox.

Some have wondered why the word "Easter" is in the the King James Bible.

It is because Acts, chapter 12, tells us that it was the evil King Herod, who was planning to celebrate Easter, and not the Christians.

The true Passover and pagan Easter sometimes coincide, but in some years, they are a great distance apart.

So much more could be said, and we have much more information for you, if you are a seeker of the truth.

We know that the Bible tells us in John 4:24, "God is a Spirit: and they that worship him must worship him in spirit and in truth."

The truth is that the forty days of Lent, eggs, rabbits,hot cross buns and the Easter ham have everything to do with the ancient pagan religion of Mystery Babylon.These are all antichrist activities!

Satan is a master deceiver, and has filled the lives of well-meaning, professing Christians with idolatry.

These things bring the wrath of God upon children of disobedience, who try to make pagan customs of Baal worship Christian.

You must answer for your activities and for what you teach your children.

These customs of Easter honor Baal, who is also Satan, and is still worshipped as the "Rising Sun" and his house is the "House of the Rising Sun."

How many churches have "sunrise services" on Ishtar's day and face the rising sun in the East?

How many will use colored eggs and rabbit stories, as they did in ancient Babylon.

These things are no joke, any more than Judgement day is a joke.

I pray to God that this tract will cause you to search for more truth.

We will be glad to help you by providing more information and by praying for you.

These are the last days, and it is time to repent, come out and be separate.

David J. Meyer

Last Trumpet Ministries International
PO Box 806
Beaver Dam, WI 53916

Programmer under oath admits computers rig elections

http://www.youtube.com/watch?v=1thcO_olHas

Programmer under oath admits computers rig elections

http://www.youtube.com/watch?v=1thcO_olHas

Programmer under oath admits computers rig elections

http://www.youtube.com/watch?v=1thcO_olHas

Programmer under oath admits computers rig elections

http://www.youtube.com/watch?v=1thcO_olHas

Programmer under oath admits computers rig elections

http://www.youtube.com/watch?v=1thcO_olHas

Thursday, April 14, 2011

FBI files on Tupac Shakur murder show he received death threats from Jewish gang

Files released Thursday by the Federal Bureau of Investigation on the 1996 murder of rapper Tupac Shakur state that the star had received death threats from the Jewish Defense League, an organization that has been characterized as terrorist group.

Shakur was shot dead in Las Vegas in September 1996, in a murder case which remain unsolved.
"The JDL… have been extorting money from various rap music stars via death threats," the FBI file on the case states. The report then goes on to describe how the group would make the death threats, and then call the rap star and offer protection for a fee.

According to the documents, Shakur was a victim of this scheme, as was another late rapper, Eazy-E.

Although the documents refer to the JDL extortion scheme, they don't make a direct connection between the group and the murder of Shakur.

The FBI files were released as part of the Freedom of Information and Privacy Acts.

FBI files on Tupac Shakur murder show he received death threats from Jewish gang

Files released Thursday by the Federal Bureau of Investigation on the 1996 murder of rapper Tupac Shakur state that the star had received death threats from the Jewish Defense League, an organization that has been characterized as terrorist group.

Shakur was shot dead in Las Vegas in September 1996, in a murder case which remain unsolved.
"The JDL… have been extorting money from various rap music stars via death threats," the FBI file on the case states. The report then goes on to describe how the group would make the death threats, and then call the rap star and offer protection for a fee.

According to the documents, Shakur was a victim of this scheme, as was another late rapper, Eazy-E.

Although the documents refer to the JDL extortion scheme, they don't make a direct connection between the group and the murder of Shakur.

The FBI files were released as part of the Freedom of Information and Privacy Acts.

FBI files on Tupac Shakur murder show he received death threats from Jewish gang

Files released Thursday by the Federal Bureau of Investigation on the 1996 murder of rapper Tupac Shakur state that the star had received death threats from the Jewish Defense League, an organization that has been characterized as terrorist group.

Shakur was shot dead in Las Vegas in September 1996, in a murder case which remain unsolved.
"The JDL… have been extorting money from various rap music stars via death threats," the FBI file on the case states. The report then goes on to describe how the group would make the death threats, and then call the rap star and offer protection for a fee.

According to the documents, Shakur was a victim of this scheme, as was another late rapper, Eazy-E.

Although the documents refer to the JDL extortion scheme, they don't make a direct connection between the group and the murder of Shakur.

The FBI files were released as part of the Freedom of Information and Privacy Acts.

FBI files on Tupac Shakur murder show he received death threats from Jewish gang

Files released Thursday by the Federal Bureau of Investigation on the 1996 murder of rapper Tupac Shakur state that the star had received death threats from the Jewish Defense League, an organization that has been characterized as terrorist group.

Shakur was shot dead in Las Vegas in September 1996, in a murder case which remain unsolved.
"The JDL… have been extorting money from various rap music stars via death threats," the FBI file on the case states. The report then goes on to describe how the group would make the death threats, and then call the rap star and offer protection for a fee.

According to the documents, Shakur was a victim of this scheme, as was another late rapper, Eazy-E.

Although the documents refer to the JDL extortion scheme, they don't make a direct connection between the group and the murder of Shakur.

The FBI files were released as part of the Freedom of Information and Privacy Acts.

Wednesday, April 13, 2011

The new security friendly fascism coming to a city near you, starting in Frisco

San Francisco wants everyone who ever enters any kind of bar, pub, restuarant, club, or venue to be photographed and ID'd prior to entrance. They are PASSING THIS LAW. In addition to the obvious 4th ammendment violations, this allows bouncers and bar owners access to all your personal data in your wallet...and they must have an uplink with SFPD in real time. Is this America or the Soviet Union, because i cannot tell the difference any more. Wait...they don't do this in Russia...ah...

-----------------


Notice of Hearing on Proposed Adoption of Rules

Related to Security

at Places of Entertainment and One Time Events
These rules may cover the proposed permit conditions, summarized below, presented by the San Francisco Police Department for consideration by the Entertainment Commission.

Proposed Rules



These Conditions shall apply to all EC permitted events with an anticipated occupancy capacity of over one hundred (100) individuals.



1. (a) Security personnel shall be provided in a ratio one (1) guard for every fifty (50) patrons. (b) A security supervisor shall be provided at a ratio of one (1) supervisor for every four (4) guards.





2. All individuals entering the premises shall be scanned by a metal detector.





3. All occupants of the premises shall be ID Scanned (including patrons, promoters, and performers, etc.). ID scanning data shall be maintained on a data storage system for no less than 15 days and shall be made available to local law enforcement upon request.





4. High visibility cameras shall be located at each entrance and exit point of the premises. Said cameras shall maintain a recorded data base for no less than fifteen (15 days) and made available to local law enforcement upon request.





5. The exterior of the premises shall be equipped with lighting of sufficient power to illuminate and make easily discernible the appearance and conduct of all persons on or about the premises. Additionally, the position of such lighting shall not disturb the normal privacy and use of any neighboring residences.





6. The premises shall provide a Security Plan acceptable to the Chief of Police which includes a Security proposal and EC Best Practices, collectively referred to as a Security Plan.





7. All Security personnel that protect life and/or property shall maintain a current and valid California Department of Consumer Affairs Guard Card and shall comply with all rules and regulations governing the Card.





8. At all times the premises is open to the public a readily identifiable Manager employed by the EC permit holder shall be on-site.





9. All Federal, State, and Local permits, required posting, including but not limited to occupancy, shall be posted in a conspicuous location clearly visibly to the public. Said permits shall be maintained valid and current.

The new security friendly fascism coming to a city near you, starting in Frisco

San Francisco wants everyone who ever enters any kind of bar, pub, restuarant, club, or venue to be photographed and ID'd prior to entrance. They are PASSING THIS LAW. In addition to the obvious 4th ammendment violations, this allows bouncers and bar owners access to all your personal data in your wallet...and they must have an uplink with SFPD in real time. Is this America or the Soviet Union, because i cannot tell the difference any more. Wait...they don't do this in Russia...ah...

-----------------


Notice of Hearing on Proposed Adoption of Rules

Related to Security

at Places of Entertainment and One Time Events
These rules may cover the proposed permit conditions, summarized below, presented by the San Francisco Police Department for consideration by the Entertainment Commission.

Proposed Rules



These Conditions shall apply to all EC permitted events with an anticipated occupancy capacity of over one hundred (100) individuals.



1. (a) Security personnel shall be provided in a ratio one (1) guard for every fifty (50) patrons. (b) A security supervisor shall be provided at a ratio of one (1) supervisor for every four (4) guards.





2. All individuals entering the premises shall be scanned by a metal detector.





3. All occupants of the premises shall be ID Scanned (including patrons, promoters, and performers, etc.). ID scanning data shall be maintained on a data storage system for no less than 15 days and shall be made available to local law enforcement upon request.





4. High visibility cameras shall be located at each entrance and exit point of the premises. Said cameras shall maintain a recorded data base for no less than fifteen (15 days) and made available to local law enforcement upon request.





5. The exterior of the premises shall be equipped with lighting of sufficient power to illuminate and make easily discernible the appearance and conduct of all persons on or about the premises. Additionally, the position of such lighting shall not disturb the normal privacy and use of any neighboring residences.





6. The premises shall provide a Security Plan acceptable to the Chief of Police which includes a Security proposal and EC Best Practices, collectively referred to as a Security Plan.





7. All Security personnel that protect life and/or property shall maintain a current and valid California Department of Consumer Affairs Guard Card and shall comply with all rules and regulations governing the Card.





8. At all times the premises is open to the public a readily identifiable Manager employed by the EC permit holder shall be on-site.





9. All Federal, State, and Local permits, required posting, including but not limited to occupancy, shall be posted in a conspicuous location clearly visibly to the public. Said permits shall be maintained valid and current.