tag:blogger.com,1999:blog-76067289893369755352024-02-20T04:18:07.669-08:00NewsPingsNewsPings composes a brief outline from current and breaking news events, health matters, social subjects, political developments, security issues, trivia, money savers, and other relevant and pertinent information solely for the benefit and enrichment of NewsPings viewers………………….Scroll to view archives.LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.comBlogger105125tag:blogger.com,1999:blog-7606728989336975535.post-33000265576175210432017-01-05T12:00:00.001-08:002017-01-05T12:00:22.155-08:00<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: large;"><span class="Apple-style-span" style="color: orange;">Think Swiss Annuities Are Safe?</span></span></b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;"> <o:p></o:p></span></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">
</span></span></span><b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Think again!</span></span></span><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">For
countless decades the Swiss Banking and Insurance industry has celebrated a
sparkling and sterling image. </span></span><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">But
that image has recently been severely tarnished and badly shattered? Discover the
startling and unsavory dilema of my true story.</span></span></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">What
is an annuity?</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">An
insurance company issued annuity is a financial investment that creates some retirement
security as the policy matures, and as designed, is structured to return
monthly retirement payments to the holder or designated heirs over a period of time as
described at the policy’s conception.</span></span><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> </span></span><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Annuity Insurance policy funds
may be borrowed against, and can be fully redeemable by the policy holder as sated
within.</span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> ________________ . _________________<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">
<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">
</span></span><b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">A Safe Investment?</span></span></span></b></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">T</span></span></b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">hat was a simple given as
initially agreed. As time passed all was in order, or at least it appeared to
be.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">But,
during the coarse of my active policy maturing period, a </span></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: medium;">Swiss
administrator contacted myself and arranged a meeting with me here in the U.S.
I was quite impressed that my policy investment of $70,000 was important enough that a
high ranking member (V.P.) of the management company would travel to the United
States to confer with myself regarding my policy.</span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> <o:p></o:p></span></span></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">The
Bait & Switch:</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Out of sheer curiosity I agreed to meet with the insurance companies (CapitalLiban) Swiss
Representative, and following lengthy discussion, was prompted to change
my supposedly outdated standard
annuity policy to a multi-asset policy configuration that would be of greater
value with greater financial yield at maturity. I was compassionately assured that this
change was a safe and sane direction, and the accompanying literature supplied
by my Swiss Rep. boasted of its
Asset Protection and Swiss Safety Guarantees. With the reputation and strength
that Swiss investments enjoyed, I felt quite assured this was a safe and
protected upgraded move. <o:p></o:p></span></span></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">All
seemed
in order after this change of policy occurred. And, as the years passed
and the policy matured as intended to allocate monthly payments to
myself upon
retirement at age 72, nothing seemed out of order. After all, as a
disabled veteran needing some favorable return, it’s a basic insurance
investment providing a typical return on investment at a given age for
income
supplement.<o:p></o:p></span></span></div>
<div class="MsoNormal">
</div>
<div class="MsoBodyText">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Troubling signals:</span><o:p></o:p></span></span></b></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">However, approaching policy maturity, 3-4 years ago, I
began receiving strange messages from a new policy administration management
team. <o:p></o:p></span></span></div>
<div class="MsoNormal">
</div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Enter this new Swiss Financial Group <u>POM</u> (Portfolio
Management Team Ltd.), or personally referred to as POMM, the (<u>Portfolio
Mis-Management Team Ltd).</u><o:p></o:p></span></span></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Suspicion
begins to surface:</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">As
several
months passed, I became more and more suspicious of POM as reports of
wrong doing within the management team itself surfaced. In addition more
disturbing signals arose from various Swiss financial sources that all
was not
well within this new management group.</span></span><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">After
several stressful communications with POMM, I began feeling they exhibited a
lack of client concern, one that made me quite suspicious of their competency
and integrity.<o:p></o:p></span></span></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">A
frightful decision:</span><o:p></o:p></span></span></b></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">At
this point I had a lot at stake over the many years of
accumulated financial maturity with my annuity retirement supplement.
However, I felt that it would be prudent to surrender my Swiss policy
and invest in
something more manageable and closer to home. </span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><br /></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">My decision prompted anger within
the POM Mis-Management group and they soon ordered me to immediately return my
original policy before they would consider returning my full investment. I
immediately complied, and without any benefit of interest nor dividends
distribution from my lengthy monetary pledge, that of which I entered into in
good faith and trust. I unfortunately uncovered a scheme of many years in the making as they operated with my
money without any compensation to myself whatsoever. <o:p></o:p></span></span></div>
<div class="MsoBodyText">
</div>
<div class="MsoBodyText">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">What a shocker</span></span></span></b><span style="font-weight: normal;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">:</span><o:p></o:p></span></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: 5px;"><span class="Apple-style-span" style="font-size: medium;">During
my lengthy wait time to be fully reimbursed, I received communications
from the POM Mis-Management Team that they would no longer represent me
since I surrendered my policy and they were now waiving any responsible
nor help for recovering any financial transactions between us. This was a
shocker to say the least. </span></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: medium;"><br /></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: medium;">Eventually,
after several more long months, POMM contacted me and asked for my bank acct.,
and routing number. Shortly afterwards, I received a bank notice that a deposit
was recorded I my account from a Swiss Bank. I was overjoyed only to
discover that only one-half of my investment had been </span></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: medium;">returned, and without any </span></span><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">accounting of the remaining balance, nor interest or dividends for 13 years use of my investment money.</span><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> </span></span></div>
<div class="MsoBodyText">
</div>
<div class="MsoBodyText">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">It became quite clear:</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Since
it’s
now obvious that this policy change was a flawed strategy and largely
responsible for providing me with a sense of false security and safety
while prompting
me into a questionable and destructive policy. We all know the scheme as
Bait & Switch that they now claim was not safe and sane as boldly
stated in their multi-asset policy literature.<o:p></o:p></span></span></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">The
fraud, theft, and co-conspiracy:</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">For
instance, POM’s recent 2012 refusal to honor my request to disclose and inform
me of where my remaining funds (appox. $40,000) were being held, and refusal to
fulfill my 2012, & 2013 request for mandatory disclosure of these funds for
IRS tax reporting purposes triggering an IRS non-compliance situation for
myself. <o:p></o:p></span></span></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">This
alone
is self-incrimination of the conspiracy that the POM Mis-Management and
theft Team has been engaged in for several years now. And, all the while
claiming my remaining funds were non-liquidable. This non-liquid fraud
has spanned several years and has taken my retirement investment and
rendered this
occasion as a dilemma instead of a welcomed return on investment.</span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">After
many years of receiving fictitious end-of-year financial statements from POM
describing my investment in full, I no longer receive statements and
they claim the balance due of my remaining money has disappeared, and vanished.<o:p></o:p></span></span><br />
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"></span></span><br />
<div class="MsoNormal" style="font-family: Times; font-size: medium;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
</div>
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Were my investment </span></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: medium;">funds
lost in bad investments or were they just appropriated by members of
the Swiss cartel? There has never been an accounting of these
mis-appropriated funds offered by POM to date.</span></span></span></div>
</div>
<div class="MsoNormal" style="font-family: Times; font-size: medium;">
</div>
</div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Others
are involved:</span><o:p></o:p></span></span></b></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">My policy has transferred within several banks and
Insurance companies since inception. And, now after all this time I’m casually
informed half my investment has evaporated in thin air while all along playing
and baiting me into belief all is well and my retirement is in place and safe.
So far I’ve been able to determine that multiple Swiss companies are party to
this overreaching theft of client funds. And, my investment has been well
masked and well hidden under the veil of deceit, lies, phony financial
statements, half-truths, a possible criminal co-conspiracy, and now possibly
embezzlement of client funds. <o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: medium;"> <o:p></o:p></span></span></div>
<div class="MsoBodyText">
<b><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">I want to hear your story:</span></span></span></b><span style="font-weight: normal;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><o:p></o:p></span></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">If you have been victimized in the same or similar manor, </span></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: medium;">please contact me by email at ...... <a href="mailto:pdisme@yahoo.com">pdisme@yahoo.com</a></span></div>
<div class="MsoBodyText">
</div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">I am at this time seeking help identifying a Swiss Govt.
Regulatory Agency to file a criminal complaint with, or possible a class action
law-suit may be in order if others will step forward. This theft will not go
unnoticed, and I encourage anyone that has similar harm to please republish my
true story throughout the internet and internationally to anyone and everyone
in the worldwide investment, financial, private, or business sector to alert
their clients, family and friends of these developing wrong doings, and or
possible criminal activities.<o:p></o:p></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><br /></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">If you seek a safe investment haven, keep it within your
borders as there is little safety from beyond. Especially not
Switzerland with the recent Swiss Banking scandal regarding money laundering and Ponzi activity.</span></span></div>
<a href="">
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-75624527225772955672014-03-09T17:21:00.001-07:002014-04-24T14:15:28.388-07:00<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> </span></span><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Think Swiss Annuities Are Safe?</span></span></span></b><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;"> <o:p></o:p></span></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">
</span></span></span><b><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Think again!</span></span></span><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">For
countless decades the Swiss Banking and Insurance industry has celebrated a
sparkling and sterling image. </span></span><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">But
that image has recently been severely tarnished and badly shattered? Discover the
startling and unsavory dilema of my true story.</span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">What
is an annuity?</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">An
insurance company issued annuity is a financial investment that creates some retirement
security as the policy matures, and as designed, is structured to return
monthly retirement payments to the holder or designated heirs over a period of time as
described at the policy’s conception.</span></span><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> </span></span><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Annuity Insurance policy funds
may be borrowed against, and can be fully redeemable by the policy holder as sated
within.</span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> ________________ . _________________<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">
<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">
</span></span><b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">A Safe Investment?</span></span></span></b></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">T</span></span></b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">hat was a simple given as
initially agreed. As time passed all was in order, or at least it appeared to
be.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">But,
during the coarse of my active policy maturing period, a </span></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: large;">Swiss
administrator contacted myself and arranged a meeting with me here in the U.S.
I was quite impressed that my policy investment of $70,000 was important enough that a
high ranking member (V.P.) of the management company would travel to the United
States to confer with myself regarding my policy.</span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> <o:p></o:p></span></span></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">The
Bait & Switch:</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Out of sheer curiosity I agreed to meet with the insurance companies (CapitalLiban) Swiss
Representative, and following lengthy discussion, was prompted to change
my supposedly outdated standard
annuity policy to a multi-asset policy configuration that would be of greater
value with greater financial yield at maturity. I was compassionately assured that this
change was a safe and sane direction, and the accompanying literature supplied
by my Swiss Rep. boasted of its
Asset Protection and Swiss Safety Guarantees. With the reputation and strength
that Swiss investments enjoyed, I felt quite assured this was a safe and
protected upgraded move. <o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">All
seemed in order after this change of policy occurred. And, as the years passed
and the policy matured as intended to allocate monthly payments to myself upon
retirement at age 72, nothing seemed out of order. After all, as a disabled veteran needing some favorable return, it’s a basic insurance
investment providing a typical return on investment at a given age for income
supplement.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoBodyText">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Troubling signals:</span><o:p></o:p></span></span></b></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">However, approaching policy maturity, 3-4 years ago, I
began receiving strange messages from a new policy administration management
team. <o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Enter this new Swiss Financial Group <u>POM</u> (Portfolio
Management Team Ltd.), or personally referred to as POMM, the (<u>Portfolio
Mis-Management Team Ltd).</u><o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Suspicion
begins to surface:</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">As
several months passed, I became more and more suspicious of POM as reports of
wrong doing within the management team itself surfaced. In addition more disturbing signals arose from various Swiss financial sources that all was not
well within this new management group.</span></span><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">After
several stressful communications with POMM, I began feeling they exhibited a
lack of client concern, one that made me quite suspicious of their competency
and integrity.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">A
frightful decision:</span><o:p></o:p></span></span></b></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">At this point I had a lot at stake over the many years of
accumulated financial maturity with my annuity retirement supplement. However, I felt that it would be prudent to surrender my Swiss policy and invest in
something more manageable and closer to home. </span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><br /></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">My decision prompted anger within
the POM Mis-Management group and they soon ordered me to immediately return my
original policy before they would consider returning my full investment. I
immediately complied, and without any benefit of interest nor dividends
distribution from my lengthy monetary pledge, that of which I entered into in
good faith and trust. I unfortunately uncovered a scheme of many years in the making as they operated with my
money without any compensation to myself whatsoever. <o:p></o:p></span></span></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">What a shocker</span></span></span></b><span style="font-weight: normal;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">:</span><o:p></o:p></span></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: 5px;"><span class="Apple-style-span" style="font-size: large;">During my lengthy wait time to be fully reimbursed, I received communications from the POM Mis-Management Team that they would no longer represent me since I surrendered my policy and they were now waiving any responsible nor help for recovering any financial transactions between us. This was a shocker to say the least. </span></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: large;">Eventually,
after several more long months, POMM contacted me and asked for my bank acct.,
and routing number. Shortly afterwards, I received a bank notice that a deposit
was recorded I my account from a Swiss Bank. I was overjoyed only to
discover that only one-half of my investment had been </span></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: large;">returned, and without any </span></span><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">accounting of the remaining balance, nor interest or dividends for 13 years use of my investment money.</span><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"> </span></span></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">It became quite clear:</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Since
it’s now obvious that this policy change was a flawed strategy and largely
responsible for providing me with a sense of false security and safety while prompting
me into a questionable and destructive policy. We all know the scheme as Bait & Switch that they now claim was not safe and sane as boldly stated in their multi-asset policy literature.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">The
fraud, theft, and co-conspiracy:</span><o:p></o:p></span></span></b></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">For
instance, POM’s recent 2012 refusal to honor my request to disclose and inform
me of where my remaining funds (appox. $40,000) were being held, and refusal to
fulfill my 2012, & 2013 request for mandatory disclosure of these funds for
IRS tax reporting purposes triggering an IRS non-compliance situation for
myself. <o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">This
alone is self-incrimination of the conspiracy that the POM Mis-Management and
theft Team has been engaged in for several years now. And, all the while
claiming my remaining funds were non-liquidable. This non-liquid fraud has spanned several years and has taken my retirement investment and rendered this
occasion as a dilemma instead of a welcomed return on investment.</span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">After
many years of receiving fictitious end-of-year financial statements from POM
describing my investment in full, I no longer receive statements and
they claim the balance due of my remaining money has disappeared, and vanished.<o:p></o:p></span></span><br />
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"></span></span><br />
<div class="MsoNormal" style="font-family: Times; font-size: medium;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<br /></div>
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">Were my investment </span></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: large;">funds lost in bad investments or were they just appropriated by members of the Swiss cartel? There has never been an accounting of these mis-appropriated funds offered by POM to date.</span></span></span></div>
</div>
<div class="MsoNormal" style="font-family: Times; font-size: medium;">
</div>
</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">Others
are involved:</span><o:p></o:p></span></span></b></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">My policy has transferred within several banks and
Insurance companies since inception. And, now after all this time I’m casually
informed half my investment has evaporated in thin air while all along playing
and baiting me into belief all is well and my retirement is in place and safe.
So far I’ve been able to determine that multiple Swiss companies are party to
this overreaching theft of client funds. And, my investment has been well
masked and well hidden under the veil of deceit, lies, phony financial
statements, half-truths, a possible criminal co-conspiracy, and now possibly
embezzlement of client funds. <o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: large;"> <o:p></o:p></span></span></div>
<div class="MsoBodyText">
<b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><span class="Apple-style-span" style="color: orange;">I want to hear your story:</span></span></span></b><span style="font-weight: normal;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><o:p></o:p></span></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">If you have been victimized in the same or similar manor, </span></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: large;">please contact me by email at ...... <a href="mailto:pdisme@yahoo.com">pdisme@yahoo.com</a></span></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">I am at this time seeking help identifying a Swiss Govt.
Regulatory Agency to file a criminal complaint with, or possible a class action
law-suit may be in order if others will step forward. This theft will not go
unnoticed, and I encourage anyone that has similar harm to please republish my
true story throughout the internet and internationally to anyone and everyone
in the worldwide investment, financial, private, or business sector to alert
their clients, family and friends of these developing wrong doings, and or
possible criminal activities.<o:p></o:p></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;"><br /></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif;">If you seek a safe investment haven, keep it within your
borders as there is little safety from beyond. Especially not
Switzerland with the recent Swiss Banking scandal regarding money laundering and Ponzi activity.</span></span></div>
<!--EndFragment--><a href="https://www.blogger.com/blogger.g?blogID=7606728989336975535">
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-47313690591629659762014-02-02T11:08:00.000-08:002014-02-02T11:08:37.250-08:00A sorry State of the Union...Judge Napolitano<br /><div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: LucidaGrande; font-size: 12.0pt;">NAPOLITANO:
A sorry State of the Union<o:p></o:p></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: LucidaGrande; font-size: 12.0pt;">Obama
has a lot to answer for<o:p></o:p></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">By
Andrew P. Napolitano<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">January
29, 2014<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the state of the union is a mess? What if the government spies on<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">all
of us all of the time and recognizes no limits to its spying? What if<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">its
appetite for acquiring personal knowledge about all Americans is<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">insatiable?
What if the government uses the microchips in our cellphones to<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">follow
us and listen to us as we move about?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the Constitution expressly prohibits the government from doing this?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the government has written laws that are interpreted in secret by<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">judges
who meet in secret and are applied by federal agents who operate in<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">secret
and their secret behavior doesn't even resemble what the laws say<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">they
can do?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the feds have seized the content of every text message, email,<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">mobile
and landline telephone call, utility bill, credit card bill and bank<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">statement
of everyone in America for the past four years? What if no law has<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">authorized
them to capture this?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if, when asked by members of Congress, in public and under oath,<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">high-ranking
officials, at least one with ribbons on his chest and stars on<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">his
shoulders, lied about what the government is doing?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the government's spies have so insinuated themselves into our<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">computers
that they can capture every keystroke we press on all of our<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">computers
before we hit "send"? What if the feds have hacked into the<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">servers
of every major computer-service provider in the country, and they<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">know
what we have typed before we even make corrections?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the feds have a copy of what we have deleted? What if our typed<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">innermost
thoughts and even second thoughts that were never sent in emails<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">nevertheless
reside in the government's data bank?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the president knows all this and supports what his spies are doing?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if he secretly authorized all this, but only admitted to some of it<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">when
he got caught? What if he uses his spies to tell him what he wants to<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">know
about those who oppose him?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the president sold Congress and the country a Trojan horse called<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">Obamacare?
What if he promised that under Obamacare you could keep the<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">health
insurance you had before Obamacare, and he lied, and he knew it? What<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">if
he promised that under Obamacare you could keep the same physicians who<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">treated
you before Obamacare, and he lied, and he knew it?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if Obamacare made insurance coverage so expensive that some people lost<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">their
jobs because their employers could not afford to pay for it? What if<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">under
Obamacare more than 6 million Americans lost their insurance coverage<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">overnight
and most haven't gotten it back yet? What if this was the<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">president's
plan all along so that he could orchestrate a government<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">takeover
of the health insurance industry?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the secretary of defense and the chairman of the Joint Chiefs of<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">Staff
told the president one night that our consulate in Benghazi was under<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">attack
by organized al Qaeda troops while the attack was taking place?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the president did nothing about it? What if the president knew the<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">truth
about the Benghazi attack, but for three weeks claimed that the attack<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">was
just an out-of-control political demonstration by fanatics who were<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">upset
about a cheap, 15-minute, low-grade movie that never made it into<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">theaters?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if our ambassador to Libya died in that attack and the president<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">covered
up the facts surrounding his death? What if the president dispatched<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">our
U.N. ambassador to all major TV networks to hide the truth? What if he<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">tried
to promote the lying U.N. ambassador to secretary of state?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if, in five years, the president has borrowed more than $6 trillion and<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">spent
it all on his favorite industries and risky bailouts and fruitless<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">wars,
and now has nothing to show for it but the debts that will one day<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">come
due? What if the government claims the unemployment rate is 6.7<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">percent,
but so many people have stopped looking for jobs that it is really<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">10.2
percent?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the president alone has increased the number of people on food<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">stamps
and increased the amount of money they each receive? What if half of<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">the
adults in the nation are now receiving material assistance from the<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">government
in the form of money the government has borrowed? What if<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">generations
of Americans as yet unborn will be obliged to pay back the money<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">the
president has borrowed and given away?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if nearly two-thirds of Americans simply don't trust the president's<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">judgment?
What if the president alone raised the minimum wage to be paid to<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">workers
on federal projects? What if the president has threatened to use his<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">pen
and his phone to operate the government in ways the Constitution<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">forbids?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the Constitution makes clear and the courts have underscored the<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">truism
that the president cannot modify or amend or postpone the effective<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">dates
of federal laws? What if the president has modified and amended and<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">postponed
federal laws so as to help his friends and wound his foes?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the president has tried to force the Little Sisters of the Poor to<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">pay
for contraceptive services that they cannot use and that are prohibited<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">by
the Roman Catholic Church? What if the Sisters sued the president and<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">asked
the court to relieve them of the burden of paying for contraception?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the president resisted the Sisters' lawsuit and questioned the<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">sincerity
of their religious beliefs? What if the Supreme Court stopped the<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">president
from forcing the nuns to pay for contraception before it even<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">heard
their case?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">What
if the president has discussed none of this in his State of the Union<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">address?
What if the president thinks that during his second term in office<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">he
answers to no one? What if the president lives and works surrounded by<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">those
who reinforce his beliefs? What if he has rejected his oath of<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">fidelity
to the Constitution? What will he do next? What will we do about<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">it?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">Andrew
P. Napolitano, a former judge of the Superior Court of New Jersey, is<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">an
analyst for the Fox News Channel. He has written seven books on the U.S.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">Constitution.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: LucidaGrande; font-size: 12.0pt;"><span class="Apple-style-span" style="color: #ffd966;">--------------------------<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<!--EndFragment--><a href="">
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-69941102602549085062014-01-23T12:19:00.000-08:002014-01-23T12:19:18.034-08:00Where Is Your Spine, America?<br /><div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"><i>Laura
Hollis is an attorney and teaches entrepreneurship and Where is your spine,
America ?<o:p></o:p></i></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana; font-size: 16.0pt;"><b>Where is your spine, America ? <i><o:p></o:p></i></b></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"><i>November
20, 2013|10:42 am</i></span><span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">The
unveiling of the dictatorial debacle that is Obamacare absolutely flabbergasts
me. It is stunning on so many levels, but the most shocking aspect of it for me
is watching millions of free Americans stand idly by while this man, his
minions in Congress and his cheerleaders in the press systematically dismantle
our Constitution, steal our money, and crush our freedoms.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">The
President, Nancy Pelosi and Harry Reid (with no small help from Justice John
Roberts) take away our health care, and we allow it. They take away our
insurance, and we allow it. They take away our doctors, and we allow it. They
charge us thousands of dollars more a year, and we allow it. They make legal
products illegal, and we allow it. They cripple our businesses, and we allow
it. They announce by fiat that we must ignore our most deeply held beliefs –
and we allow it. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">Where is
your spine, America ? <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">Yes, I know
people are complaining. I read the news on the internet. I read blogs. I have a
Twitter feed. So what? People in the Soviet Union complained. People in Cuba
complain. People in China complain (quietly). Complaining isn't the same thing
as doing anything about it. In fact, much of the complaining that we hear
sounds like resignation: Wow. This sucks. Oh well, this is the way things are.
Too bad. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">Perhaps you
need reminding of a few important facts. Here goes: <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"><b>1. The
President is not a king</b></span><span style="color: #ffff99; font-family: Verdana;">.
Barack Obama does not behave like a President, an elected official, someone who
realizes that he works for us. He behaves like a king, a dictator – someone who
believes that his own pronouncements have the force of law, and who thinks he
can dispense with the law's enforcement when he deigns to do so. And those of
us who object? How dare we? Racists! <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">And while he
moves steadily "forward" with his plans to "fundamentally
transform" the greatest country in human history, he distracts people with
cheap, meaningless trivialities, like "free birth control pills"! (In
fact, let's face it: this administration's odd obsession with sex in general -
Birth control! Abortion! Sterilization! Gay guys who play basketball! -- is
just plain weird. Since when did the leader of the free world care so much
about how people have sex, who they have it with, and what meds they use when
they have it? Does he have nothing more important to concern himself
with?) <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"><b>2. It
isn't just a failed software program; it is a failed philosophy</b></span><span style="color: #ffff99; font-family: Verdana;">. People are marveling thatHealthcare.govwas
such a spectacular failure. Well, if one is only interested in it as a product
launch, I've explained some of the reasons for that here. But the larger
point is that it isn't a software failure, or even a product failure; it is a
philosophy failure. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">I have said
this before: Obama is not a centrist; he is a central planner. And this – all
of it: the disastrous computer program, the hundreds of millions of dollars
wasted, the lies, the manipulation of public opinion, the theft of the public's
money and property, and freedom (read insurance, and premiums, and doctors) --
IS what central planning looks like. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">The central
premise of central planning is that a handful of wunderkinds with your best
interests at heart (yeah, right) know better than you what's good for you. The
failure of such a premise and the misery it causes have been clear from the
dawn of humanity. Kings and congressmen, dictators and Dear Leaders,
potentates, princes and presidents can all fall prey to the same imperial
impulses: "we know what is good the 'the people.' <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">And they are
always wrong. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">There is a
reason that the only times communism has really been tried have been after
wars, revolutions, or coups d'état. You have to have complete chaos for people
to be willing to accept the garbage that centralized planning produces. Take
the Soviet Union , for example. After two wars, famine, and the collapse of the
Romanov dynasty, why wouldn't people wait in line for hours to buy size 10
shoes? Or settle for the gray matter that passed for meat in the grocery
stores? <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">But
communism's watered-down cousin, socialism, isn't much better. Ask the
Venezuelans who cannot get toilet paper. Toilet paper. <i>¡Viva la
Revolución</i></span><span style="color: #ffff99; font-family: Verdana;">! <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">Contrary to
what so many who believe in a "living Constitution" say, the Founding
Fathers absolutely understood this. That is why the Constitution was set up to
limit government power. (Memo to the President: the drafters of the
Constitution deliberately didn't say "what government had to do on your
behalf.") They understood that that was the path to folly, fear, and
famine.) <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"><b>3. Obama
is deceitful</b></span><span style="color: #ffff99; font-family: Verdana;">. Just
as the collapse of the computer program should not surprise anyone, neither
should we be shocked that the President lied about his healthcare plan. Have
any of you been paying attention over the past few years? Obama has made no
secret of his motivations or his methods. The philosophies which inspire him
espouse deceit and other vicious tactics. (Don't take my word for it: read Saul
Alinsky.) Obama infamouslytold reporter Richard Wolffe, "You know, I
actually believe my own bullshit." He has refused to be forthcoming about
his past (where are his academic records?). His own pastor, Rev. Jeremiah
Wright, told author Ed Klein, that Obama said to him, "You know what
your problem is? You have to tell the truth." <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">Did Obama
lie when he said dozens of times, "If you like you plan, you can keep it.
Period!"? Of course he did. That's what he does. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"><b>4. The
media is responsible</b></span><span style="color: #ffff99; font-family: Verdana;">.
And had the media been doing their jobs, we would have known a lot of this
much, much earlier. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">The press is
charged with the sacred responsibility of protecting the people from the
excesses of government. Our press has been complicit, incompetent, or corrupt.
Had they vetted this man in 2008, as they would have a Republican candidate, we
would have known far more about him than we do, even now. Had they pressed for
more details about Obamacare, Congress' feet would have been held to the fire.
Had they done their jobs about Eric Holder, Fast and Furious, Benghazi, the IRS
scandal, NSA spying - or any of the other myriad betrayals of the public trust
that this administration has committed, Obama would likely have lost his 2012
reelection campaign. (A fact that even <i>The Washington Post</i></span><span style="color: #ffff99; font-family: Verdana;">has tacitly acknowledged. Well done,
fellas! Happy now?) <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">Instead,
they turned a blind eye, even when they knew he was lying, abusing power,
disregarding the limits of the Constitution. It was only when he began to spy
on them, and when the lies were so blatant that the lowest of low-information
voters could figure it out that they realized they had to report on it. (Even
in the face of blatant, deliberate and repeated lies, <i>The New York
Times</i></span><span style="color: #ffff99; font-family: Verdana;"> has the
audacity to tell us that the President "misspoke.") They have
betrayed us, abandoned us, and deceived us. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"><b>5. Ted
Cruz was right. So was Sarah Palin</b></span><span style="color: #ffff99; font-family: Verdana;">. The computer program is a disaster. The insurance exchanges
are a disaster. What's left? The healthcare system itself. And this, of
necessity, will be a disaster, too. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">Millions of
people have lost their individual insurance plans. In 2015, millions more will
lose their employer-provided coverage (a fact which the Obama administration
also knew, and admitted elsewhere). <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">The
exorbitant additional costs that Obamacare has foisted on unsuspecting
Americans are all part of a plan of wealth confiscation and redistribution.
That is bad enough. But it will not end there. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">When the numbers
of people into the system and the corresponding demand for care vastly exceed
the cost projections (and they will, make no mistake), then the rationing will
start. Not only choice at that point, but quality and care itself will go down
the tubes. And then will come the decisions made by the Independent Payment
Advisory Board about what care will be covered (read "paid for") and
what will not. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">That's just
a death panel, put politely. In fact, progressives are already greasing the
wheels for acceptance of that miserable reality as well. They're spreading the
lie that it will be about the ability of the dying to refuse unwanted or
unhelpful care. Don't fall for that one, either. It will be about the deaths
that inevitably result from decisions made by people other than the patients,
their families, and their physicians. (Perhaps it's helpful to think of their
assurances this way: "If you like your end-of-life care, you can keep your
end-of-life-care.") <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"><b>6. We are
not SUBJECTS</b></span><span style="color: #ffff99; font-family: Verdana;">. (or,
Nice Try, the Tea Party Isn't Going Away). We have tolerated these incursions
into our lives and livelihoods too long already. There is no end to the
insatiable demand "progressives" have to remake us in their image.
Today it is our insurance, our businesses, our doctors, our health
care. Tomorrow some new crusade will be announced that enables them
to take over other aspects of our formerly free lives. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">I will say
it again:<b> WE ARE NOT SUBJECTS</b></span><span style="color: #ffff99; font-family: Verdana;">. Not only is the Tea Party right on the fiscal issues, but it
appears that they are more relevant than ever. We fought a war once to prove we
did not want to be the subjects of a king, and the Boston Tea Party was just a
taste of the larger conflict to come. If some people missed that lesson in
history class, we can give them a refresher. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">The 2014
elections are a good place to start. Call your representative, your senator,
your candidate and tell them: "We are not subjects. You work for us. And
if the word "REPEAL" isn't front and center in your campaign, we
won't vote for you. Period." <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;"> <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #ffff99; font-family: Verdana;">And this
comes from Notre Dame What a powerful and true letter! <o:p></o:p></span></div>
<!--EndFragment--><a href="">
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-45128780946869649892012-12-25T10:11:00.000-08:002012-12-25T10:28:38.856-08:00“We are no longer the land of the free”<br />
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-line-height-alt: 10.0pt; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>An
Objective Comparison of the U.S. to Regimes that Everyone Labels Repressive.<o:p></o:p></b></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-line-height-alt: 10.0pt; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">How Does America Compare to China, Iran, Saudi Arabia and Other
Repressive Regimes?<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Posted on <a href="http://www.washingtonsblog.com/2012/01/an-objective-comparison-of-the-u-s-to-regimes-that-everyone-labels-repressive.html"><span style="text-decoration: none; text-underline: none;">January 16, 2012</span></a>
by <a href="http://www.washingtonsblog.com/author/washingtonsblog">WashingtonsBlog</a><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><a href="http://www.washingtonsblog.com/2011/12/constitutional-expert-president-obama-says-that-he-can-kill-you-on-his-own-discretion-he-can-jail-you-indefinitely-on-his-own-discretion.html"><span class="Apple-style-span" style="color: white;">Top constitutional law expert</span></a></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"> Jon Turley <a href="http://www.washingtonpost.com/opinions/is-the-united-states-still-the-land-of-the-free/2012/01/04/gIQAvcD1wP_story.html">notes</a> in a must-read Washington Post article
called “We are no longer the land of the free” (I have edited slightly to
remove parentheses in several places):<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Americans
often proclaim our nation as a symbol of freedom to the world while dismissing
nations such as Cuba and China as categorically unfree. Yet, objectively, we
may be only half right. Those countries do lack basic individual rights such as
due process, placing them outside any reasonable definition of “free,” but the
United States now has much more in common with such regimes than anyone may
like to admit.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">These
countries also have constitutions that purport to guarantee freedoms and
rights. But their governments have broad discretion in denying those rights and
few real avenues for challenges by citizens — precisely the problem with the
new laws in this country.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">The list
of powers acquired by the U.S. government since 9/11 puts us in rather
troubling company.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">Assassination
of U.S. citizens</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">[The
U.S. assassinates its own citizens.]<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Nations
such as Nigeria, Iran and Syria have been routinely criticized for
extrajudicial killings of enemies of the state.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">Indefinite
detention</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">[The
U.S. has passed a law allowing indefinite detention of American citizens.]<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">China
recently codified a <b>more limited</b></span></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"> detention law for its citizens, while countries such as
Cambodia have been singled out by the United States for “prolonged detention.”<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">Arbitrary
justice</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">The
president now decides whether a person will receive a trial in the federal
courts or in a military tribunal, a system that has been ridiculed around the
world for lacking basic due process protections. Bush claimed this authority in
2001, and Obama has continued the practice. (Egypt and China have been
denounced for maintaining separate military justice systems for selected
defendants, including civilians.)<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">Warrantless
searches</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">[The
U.S. routinely conducts warrantless searches.]<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Saudi
Arabia and Pakistan operate under laws that allow the government to engage in
widespread discretionary surveillance.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">***<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">War
crimes</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">[The
U.S. has committed various war crimes, then refused to hold the actors to
account.]<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Various
nations have resisted investigations of officials accused of war crimes and
torture. Some, such as Serbia and Chile, eventually relented to comply with
international law; countries that have denied independent investigations
include Iran, Syria and China.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">Secret
court</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">[The
U.S. uses secret courts under the guise of national security.]<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Pakistan
places national security surveillance under the unchecked powers of the
military or intelligence services.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">Immunity
from judicial review</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Like the
Bush administration, the Obama administration has successfully pushed for
immunity for companies that assist in warrantless surveillance of citizens,
blocking the ability of citizens to challenge the violation of privacy.
(Similarly, China has maintained sweeping immunity claims both inside and
outside the country and routinely blocks lawsuits against private companies.)<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">Continual
monitoring of citizens</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">The Obama
administration has successfully defended its claim that it can use GPS devices
to monitor every move of targeted citizens without securing any court order or
review. It is not defending the power before the Supreme Court — <a href="http://jonathanturley.org/2011/11/13/what-much-privacy-do-you-expect-the-death-of-privacy-in-america/">a power described by Justice Anthony Kennedy as
“Orwellian.”</a> (Saudi Arabia has installed massive public surveillance
systems, while Cuba is notorious for active monitoring of selected citizens.)<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b><span class="Apple-style-span" style="color: white;">Extraordinary
renditions</span></b></span><span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">The
government now has the ability to transfer both citizens and noncitizens to
another country under a system known as extraordinary rendition, which has been
denounced as using other countries, such as Syria, Saudi Arabia, Egypt and
Pakistan, to torture suspects. The Obama administration says it is not
continuing the abuses of this practice under Bush, but it insists on the
unfettered right to order such transfers — including the possible transfer of U.S.
citizens.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Professor
Turley stresses the fact that it is the ability of powerful men to make
arbitrary decisions which defines an authoritarian country:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">An
authoritarian nation is defined not just by the use of authoritarian powers,
but by the ability to use them. If a president can take away your freedom or
your life on his own authority, all rights become little more than a
discretionary grant subject to executive will.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">The
framers lived under autocratic rule and understood this danger better than we do.
James Madison famously warned that we needed a system that did not depend on
the good intentions or motivations of our rulers: “If men were angels, no
government would be necessary.”<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">In fact,
we go from the land of the free to tyranny the moment we <a href="http://www.washingtonsblog.com/2011/05/weve-gone-from-nation-of-laws-to-nation.html">go from a nation of laws to a nation of powerful men
arbitrarily making laws in secret</a>.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Indeed,
Bush and Obama have claimed some tyrannical powers that <a href="http://www.washingtonsblog.com/2011/12/obama-claims-more-tyrannical-powers-than-hitler-or-stalin.html">even Hitler and Stalin <span style="text-decoration: none; text-underline: none;"><u>never claimed</u></span></a>.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">As I <a href="http://www.washingtonsblog.com/2011/12/americas-future-russians-and-chinese-use-copyright-crusade-to-crush-government-criticism.html">pointed out</a> last month, many American leaders
appear to be consciously copying China:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">The
American copyright bill is <a href="http://www.washingtonsblog.com/2011/12/sopa-is-unconstitutional-would-criminalize-the-internet-china-is-the-model.html">modeled after the Chinese system</a>. As I noted
Monday:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Given
that Joe Lieberman said that America <a href="http://www.youtube.com/watch?v=ttvuSqaxF-c">needs
an internet kill switch like China</a>, that the U.S. economy <a href="http://www.washingtonsblog.com/2009/10/capitalism-socialism-or-fascism.html">has turned socialist</a> (at least for friends of
those with control of the money spigot), and that the U.S. government used <a href="http://www.washingtonsblog.com/2011/05/u-s-government-used-communist-torture-techniques-specifically-designed-to-produce-false-confessions.html">communist Chinese torture techniques specifically
designed to produce <span style="text-decoration: none; text-underline: none;"><b><u>false
confessions</u></b></span></a> in order to sell the Iraq war, I guess that the
bill’s Chinese-style censorship is not entirely surprising.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">---------------------------------------------------<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><span class="Apple-style-span" style="color: white;">Here's
the original Turley 1/13/12 article from the Washington Post at:</span><span class="Apple-style-span" style="color: #333333;"><o:p></o:p></span></span></div>
<div class="MsoBodyText">
<span style="font-style: normal;">http://www.washingtonpost.com/opinions/is-the-united-states-still-the-land-of-the-free/2012/01/04/gIQAvcD1wP_print.html<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>10 reasons the U.S.
is no longer the land of the free<o:p></o:p></b></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>By Jonathan Turley,
Published: January 13<o:p></o:p></b></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Every year, the State
Department issues <a href="http://www.state.gov/g/drl/rls/hrrpt/2010/index.htm"><span style="color: #0018e8;">reports on individual rights</span></a> in other
countries, monitoring the passage of restrictive laws and regulations around
the world. Iran, for example, has been criticized for denying fair public
trials and limiting privacy, while Russia has been taken to task for undermining
due process. Other countries have been condemned for the use of secret evidence
and torture.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Even as we pass
judgment on countries we consider unfree, Americans remain confident that any
definition of a free nation must include their own — the land of free. Yet, the
laws and practices of the land should shake that confidence. In the decade
since Sept. 11, 2001, this country has comprehensively reduced civil liberties
in the name of an expanded security state. The most recent example of this was <a href="http://www.washingtonpost.com/politics/obama-signs-defense-bill-pledges-to-maintain-legal-rights-of-terror-suspects/2011/12/31/gIQATzbkSP_story.html"><span style="color: #0018e8;">the National Defense Authorization Act</span></a>, signed
Dec. 31, which allows for the indefinite detention of citizens. At what point
does the reduction of individual rights in our country change how we define
ourselves?<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">While each new
national security power Washington has embraced was controversial when enacted,
they are often discussed in isolation. But they don’t operate in isolation.
They form a mosaic of powers under which our country could be considered, at
least in part, authoritarian. Americans often proclaim our nation as a symbol
of freedom to the world while dismissing nations such as Cuba and China as
categorically unfree. Yet, objectively, we may be only half right. Those
countries do lack basic individual rights such as due process, placing them
outside any reasonable definition of “free,” but the United States now has much
more in common with such regimes than anyone may like to admit.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">These countries also
have constitutions that purport to guarantee freedoms and rights. But their
governments have broad discretion in denying those rights and few real avenues
for challenges by citizens — precisely the problem with the new laws in this
country.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The list of powers
acquired by the U.S. government since 9/11 puts us in rather troubling company.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Assassination of
U.S. citizens</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">President Obama has
claimed, as President George W. Bush did before him, the <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/01/26/AR2010012604239_2.html?hpid=topnews&sid=ST2010012700394"><span style="color: #0018e8;">right to order</span></a> the killing of any citizen
considered a terrorist or an abettor of terrorism. Last year, he approved the
killing of <a href="http://www.washingtonpost.com/world/national-security/aulaqi-killing-reignites-debate-on-limits-of-executive-power/2011/09/30/gIQAx1bUAL_story.html"><span style="color: #0018e8;">U.S. citizen Anwar al-Awlaqi</span></a> and another
citizen under this claimed inherent authority. Last month, administration
officials affirmed that power, stating that the <a href="http://news.yahoo.com/obama-lawyers-citizens-targeted-war-us-154313473.html"><span style="color: #0018e8;">president can order the assassination</span></a> of any
citizen whom he considers allied with terrorists. (Nations such as Nigeria,
Iran and Syria have been routinely criticized for extrajudicial killings of
enemies of the state.)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Indefinite
detention</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Under the law signed
last month, terrorism suspects are to be held by the military; the president
also has the authority to indefinitely detain citizens accused of terrorism.
While the administration claims that this provision only codified existing law,
experts widely contest this view, and the administration has opposed efforts to
challenge such authority in federal courts. The government continues to claim
the right to strip citizens of legal protections based on its sole discretion.
(China recently codified a more limited detention law for its citizens, while
countries such as Cambodia have been singled out by the United States for
“prolonged detention.”)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Arbitrary justice</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The president now
decides whether a person will receive a trial in the federal courts or in a
military tribunal, a system that has been ridiculed around the world for
lacking basic due process protections. Bush claimed this authority in 2001, and
Obama has continued the practice. (Egypt and China have been denounced for
maintaining separate military justice systems for selected defendants,
including civilians.)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Warrantless
searches</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The president may now
order warrantless surveillance, including a new capability to force companies
and organizations to turn over information on citizens’ finances,
communications and associations. Bush acquired this sweeping power under the
Patriot Act in 2001, and in 2011, Obama <a href="http://www.washingtonpost.com/politics/patriot-act-extension-signed-into-law-despite-bipartisan-resistance-in-congress/2011/05/27/AGbVlsCH_story.html"><span style="color: #0018e8;">extended the power,</span></a> including searches of
everything from business documents to library records. The government can use <a href="http://www.washingtonpost.com/wp-dyn/content/article/2008/03/13/AR2008031302277.html"><span style="color: #0018e8;">“national security letters”</span></a> to demand, without
probable cause, that organizations turn over information on citizens — and
order them not to reveal the disclosure to the affected party. (Saudi Arabia
and Pakistan operate under laws that allow the government to engage in
widespread discretionary surveillance.)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Secret evidence</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The government now
routinely uses secret evidence to detain individuals and employs secret
evidence in federal and military courts. It also forces the dismissal of cases
against the United States by simply filing declarations that the cases would
make the government reveal classified information that would harm national
security — a claim made in a variety of privacy lawsuits and largely accepted
by federal judges without question. Even legal opinions, cited as the basis for
the government’s actions under the Bush and Obama administrations, have been
classified. This allows the government to claim secret legal arguments to
support secret proceedings using secret evidence. In addition, some cases never
make it to court at all. The federal courts routinely deny constitutional
challenges to policies and programs under a narrow definition of standing to
bring a case.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>War crimes</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The world clamored for
prosecutions of those responsible for waterboarding terrorism suspects during
the Bush administration, <a href="http://www.washingtonpost.com/wp-dyn/content/article/2009/04/16/AR2009041602768.html?hpid=topnews"><span style="color: #0018e8;">but the Obama administration said in 2009</span></a> that
it would not allow CIA employees to be investigated or prosecuted for such
actions. This gutted not just treaty obligations but the Nuremberg principles
of international law. When courts in countries such as Spain moved to
investigate Bush officials for war crimes, the Obama administration reportedly
urged foreign officials not to allow such cases to proceed, despite the fact
that the United States has long claimed the same authority with regard to
alleged war criminals in other countries. (Various nations have resisted
investigations of officials accused of war crimes and torture. Some, such as
Serbia and Chile, eventually relented to comply with international law;
countries that have denied independent investigations include Iran, Syria and
China.)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Secret court</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The government has
increased its use of the secret Foreign Intelligence Surveillance Court, which
has expanded its secret warrants to include individuals deemed to be aiding or
abetting hostile foreign governments or organizations. In 2011, Obama renewed
these powers, including allowing secret searches of individuals who are not
part of an identifiable terrorist group. The administration has asserted the
right to ignore congressional limits on such surveillance. (Pakistan places
national security surveillance under the unchecked powers of the military or
intelligence services.)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Immunity from
judicial review</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Like the Bush
administration, the Obama administration has successfully pushed for immunity
for companies that assist in warrantless surveillance of citizens, blocking the
ability of citizens to challenge the violation of privacy. (Similarly, China
has maintained sweeping immunity claims both inside and outside the country and
routinely blocks lawsuits against private companies.)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Continual
monitoring of citizens</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The Obama
administration has successfully defended its claim that <a href="http://www.washingtonpost.com/opinions/supreme-courts-gps-case-asks-how-much-privacy-do-we-expect/2011/11/10/gIQAN0RzCN_story.html"><span style="color: #0018e8;">it can use GPS devices </span></a>to monitor every move
of targeted citizens without securing any court order or review. (Saudi Arabia
has installed massive public surveillance systems, while Cuba is notorious for
active monitoring of selected citizens.)<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;"><b>Extraordinary
renditions</b></span><span style="font-size: 16.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The government now has
the ability to transfer both citizens and noncitizens to another country under
a system known as extraordinary rendition, which has been denounced as using
other countries, such as Syria, Saudi Arabia, Egypt and Pakistan, to torture
suspects. The Obama administration says it is not continuing the abuses of this
practice under Bush, but it insists on the unfettered right to order such transfers
— including the possible transfer of U.S. citizens.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">These new laws have
come with an infusion of money into <a href="http://projects.washingtonpost.com/top-secret-america/"><span style="color: #0018e8;">an expanded security system </span></a>on the state and
federal levels, including more public surveillance cameras, tens of thousands
of security personnel and a massive expansion of a terrorist-chasing
bureaucracy.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Some politicians shrug
and say these increased powers are merely a response to the times we live in.
Thus, Sen. Lindsey Graham (R-S.C.) could declare <a href="http://www.cbsnews.com/htdocs/pdf/FTN_040311.pdf?tag=contentMain;contentBody"><span style="color: #0018e8;">in an interview last spring </span></a>without objection
that “free speech is a great idea, but we’re in a war.” Of course, terrorism
will never “surrender” and end this particular “war.”<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Other politicians
rationalize that, while such powers may exist, it really comes down to how they
are used. This is a common response by liberals who cannot bring themselves to
denounce Obama as they did Bush. Sen. Carl Levin (D-Mich.), for instance, has
insisted that<a href="http://levin.senate.gov/newsroom/speeches/speech/levin-floor-statement-on-detainee-provisions-of-ndaa"><span style="color: #0018e8;"> Congress is not making any decision</span></a> on
indefinite detention: “That is a decision which we leave where it belongs — in
the executive branch.”<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">And in a signing
statement with the defense authorization bill, Obama said he does not intend to
use the latest power to indefinitely imprison citizens. Yet, he still accepted
the power as a sort of regretful autocrat.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">An authoritarian
nation is defined not just by the use of authoritarian powers, but by the
ability to use them. If a president can take away your freedom or your life on
his own authority, all rights become little more than a discretionary grant
subject to executive will.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The framers lived
under autocratic rule and understood this danger better than we do. James
Madison famously warned that we needed a system that did not depend on the good
intentions or motivations of our rulers: “If men were angels, no government
would be necessary.”<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Benjamin Franklin was
more direct. In 1787, a Mrs. Powel confronted Franklin after the signing of the
Constitution and asked, “Well, Doctor, what have we got — a republic or a
monarchy?” His response was a bit chilling: “A republic, Madam, if you can keep
it.”<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Since 9/11, we have
created the very government the framers feared: a government with sweeping and
largely unchecked powers resting on the hope that they will be used wisely.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">The
indefinite-detention provision in the defense authorization bill seemed to many
civil libertarians like a betrayal by Obama. While the president had <a href="http://www.politico.com/blogs/under-the-radar/2011/12/obama-pulls-veto-threat-on-defense-bill-107514.html"><span style="color: #0018e8;">promised to veto the law</span></a> over that provision,
Levin, a sponsor of the bill, <a href="http://www.c-spanvideo.org/appearance/600839442"><span style="color: #0018e8;">disclosed
on the Senate floor</span></a> that it was in fact the White House that
approved the removal of any exception for citizens from indefinite detention.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-size: 16.0pt;">Dishonesty from
politicians is nothing new for Americans. The real question is whether we are
lying to ourselves when we call this country the land of the free.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 4.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 16.0pt;"><b>Jonathan Turley</b></span><span style="font-size: 16.0pt;"> is the Shapiro professor of public interest law at
George Washington University.<o:p></o:p></span></div>
<!--EndFragment--><a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-70025841509192576622012-11-01T12:37:00.001-07:002012-11-14T15:29:49.523-08:00Nutrasweet and Equal, masquerading as a safe double for sugar<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:Zoom>0</w:Zoom>
<w:DisplayHorizontalDrawingGridEvery>0</w:DisplayHorizontalDrawingGridEvery>
<w:DisplayVerticalDrawingGridEvery>0</w:DisplayVerticalDrawingGridEvery>
<w:UseMarginsForDrawingGridOrigin/>
</w:WordDocument>
</xml><![endif]-->
<!--StartFragment-->
<br />
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">Nutrasweet and Equal, (aka Monsanto’s Aspartame) a dangerous chemical sugar
substitute masquerading as a safe double for sugar, is all to carelessly used in many
diet sugar-free foods and drink. Implying that this form of sweet poison is better for
your health and your weight, while in reality, nothing could be further from
the truth, and is a blatant criminal offense being perpetrated upon unsuspecting consumers. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">This continuing chemical assault on our health throughout
our food-supply may explain why this nation is alarmingly riddled in
degenerative diseases, including cancer, now in epidemic dimensions. The facts are that many dangerous additives to our food supply are being employed without our knowledge, and hidden and covered-up by our government and medical industry, who wallow in the financial rewards of sick desperate Americans reduced to disappointing dangerous radiation and chemo-therapy(chemical) cures. </span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;"><br /></span>
<span class="Apple-style-span"><span class="Apple-style-span" style="font-size: x-large;">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:Zoom>0</w:Zoom>
<w:DisplayHorizontalDrawingGridEvery>0</w:DisplayHorizontalDrawingGridEvery>
<w:DisplayVerticalDrawingGridEvery>0</w:DisplayVerticalDrawingGridEvery>
<w:UseMarginsForDrawingGridOrigin/>
</w:WordDocument>
</xml><![endif]-->
<!--StartFragment-->
</span></span><br />
<div class="MsoNormal" style="margin-right: -4.5pt;">
<span class="Apple-style-span"><span class="Apple-style-span" style="font-size: x-large;">Reports of Aspartame being
classified as a carcinogen are difficult to uncover now, and a cover-up of the
facts must be assumed. <a href="http://alturl.com/f4jhg">http://alturl.com/f4jhg</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="font-size: xx-large; margin-right: -4.5pt;">
<span class="Apple-style-span"><br /></span></div>
<span class="Apple-style-span">
<!--EndFragment--></span><br />
<span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span">Govt. intervention (aka Donald Rumsfeld, former Secy. of Defense) a major investor in Monsanto’s dangerous chemical Aspartame, was able to side-step the FDA’s initial rejection of this dangerous chemical. Aspartame </span></span><span class="Apple-style-span" style="font-size: x-large;">(aka Nutrasweet and Equal)</span><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span"> has since been unleashed upon the American population as if it were a safe and tested pixie dust.</span></span></div>
<div style="font-size: xx-large;">
<span class="Apple-style-span" style="font-size: x-large;"><br /></span></div>
<br />
<div class="MsoNormal" style="margin-right: -4.5pt;">
<span class="Apple-style-span" style="font-size: x-large;">Read bout Rumsfeld’s criminal role in
getting this poison approved within our food supply… </span><span class="Apple-style-span" style="font-size: x-large;"><a href="http://alturl.com/8ox73">http://alturl.com/8ox73</a></span></div>
<div class="MsoNormal" style="margin-right: -4.5pt;">
<o:p></o:p></div>
<div class="MsoNormal" style="margin-right: -4.5pt;">
<br /></div>
<div class="MsoNormal" style="margin-right: -4.5pt;">
<span class="Apple-style-span" style="font-size: large;"><br /></span></div>
<div class="MsoNormal" style="margin-right: -4.5pt;">
<span class="Apple-style-span" style="font-size: large;">Look for our soon to be released report and latest <u>guide to preventing disease</u> dedicated to a long and healthy life instead of the never-ending research to discover an illusive cure for the all-to-many disease stricken Americans that are literally being politicized to death. And, we’ve uncovered a cutting edge Litmus-Hydrion in-home-self-test-kit to quickly determine your immediate risk to degenerative diseases such as cancer. A true breakthrough in medical science. </span><span class="Apple-style-span" style="font-size: large;">Many alternatives will be revealed in our upcoming publication............. </span><br />
<!--EndFragment-->
</div>
<div class="MsoNormal" style="margin-right: -4.5pt;">
<span class="Apple-style-span" style="font-size: large;"> </span></div>
<div class="MsoNormal" style="margin-right: -4.5pt;">
<span class="Apple-style-span" style="font-size: large;"> </span><span class="Apple-style-span" style="color: yellow; font-size: x-large;"> "CHEATING DEATH”®</span><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:Zoom>0</w:Zoom>
<w:DisplayHorizontalDrawingGridEvery>0</w:DisplayHorizontalDrawingGridEvery>
<w:DisplayVerticalDrawingGridEvery>0</w:DisplayVerticalDrawingGridEvery>
<w:UseMarginsForDrawingGridOrigin/>
</w:WordDocument>
</xml><![endif]-->
<!--StartFragment--><!--EndFragment-->
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 14.0pt; mso-ansi-language: EN-US;"> </span><!--EndFragment-->
</span><br />
<!--EndFragment-->
</div>
<div class="MsoNormal" style="margin-right: -4.5pt;">
<span class="Apple-style-span" style="font-size: large;">It’s not a diet but a dedicated discovery to a disease-free way of life minus all the fluff and poison we’ve been receiving from unscrupulous marketers and government cronies. Our goal is the simple prevention of disease <u>before the fact</u>, rather than to suffer the indignity, pain, and health destruction, of immune depleting, death inducing so-called cures, <u>after the fact</u>. </span></div>
<!--EndFragment--><a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-74953090886936862872012-05-20T16:52:00.000-07:002012-05-20T16:52:35.358-07:00Nine Major Ways Criminals Use Facebook<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Georgia;"><b><span class="Apple-style-span" style="color: #f1c232;">1. Hacking
Account</span></b></span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Georgia;">When criminals hack
a Facebook account, they typically use one of several available “brute force”
tools, Grayson Milbourne, Webroot’s Manager of Threat Research for North
America, told 24/7 Wall St. in an interview. These tools cycle through a common
password dictionary, and try commonly used names and dates, opposite hundreds
of thousands of different email IDs. Once hacked, an account can be commande</span><span class="Apple-style-span" style="font-family: Georgia;">ered and used as a
platform to deliver spam, or — more commonly — sold. Clandestine hacker forums
are crawling with ads offering Facebook account IDs and passwords in exchange
for money. In the cyber world, information is a valuable thing.</span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Georgia;"><b><span class="Apple-style-span" style="color: #f1c232;">2. Commandeering
Accounts</span></b></span><span style="font-family: Georgia;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: Georgia;"><span class="Apple-style-span" style="font-size: large;">A more direct form
of identity theft, commandeering occurs when the criminal logs on to an
existing user account using an illegally obtained ID and password. Once they
are online, they have the victim’s entire friend list at their disposal and a
trusted cyber-identity. The impostor can use this identity for a variety of
confidence schemes, including the popular, London scam in which the fraudster
claims to be stranded overseas and in need of money to make it home. The London
scam has a far-higher success rate on Facebook — and specifically on
commandeered accounts — because there is a baseline of trust between the users
and those on their friends list. <o:p></o:p></span></span><br />
<span style="font-family: Georgia;"><span class="Apple-style-span" style="font-size: large;"><br /></span></span><br />
<span style="font-family: Georgia;"><span class="Apple-style-span" style="font-size: large;">See...<a href="http://www.amazon.com/dp/1597491144/ref=as_li_qf_sp_asin_til?tag=news0cd-20&camp=14573&creative=327641&linkCode=as1&creativeASIN=1597491144&adid=0QPA3M6Y66DTH7M9QDQ6&&ref-refURL=http://newspings.blogspot.com/">Everyone's Guide to Email, Internet, and Wireless Security</a></span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Georgia;"><b><span class="Apple-style-span" style="color: #f1c232;">3. Profile
Cloning</span></b></span><span style="font-family: Georgia;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: Georgia;"><span class="Apple-style-span" style="font-size: large;">Profile cloning is
the act of using unprotected images and information to create a Facebook
account with the same name and details of an existing user. The cloner will
then send friend requests to all of the victim’s contacts. These contacts will
likely accept the cloner as a friend since the request appears to be from
someone they’re familiar with. Once accepted, the crook has access to the
target’s personal information, which they can use to clone other profiles or to
commit fraud. As Grayson Milbourne puts it, “Exploiting a person’s account and
posturing as that person is just another clever mechanism to use to extract
information.” Perhaps what’s scariest about this kind of crime is its
simplicity. Hacking acumen is unnecessary to clone a profile; the criminal
simply needs a registered account.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Georgia;"><b><span class="Apple-style-span" style="color: #f1c232;">4.
Cross-Platform Profile Cloning</span></b></span><span style="font-family: Georgia;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: Georgia;"><span class="Apple-style-span" style="font-size: large;">Cross-platform
profile cloning is when the cyber criminal obtains information and images from
Facebook and uses them to create false profiles on another social-networking
site, or vice versa. The principle is similar to profile cloning, but this kind
of fraud can give Facebook users a false sense of security because their
profile is often cloned to a social platform that they might not use. The
result is that this kind of fraud may also take longer to notice and remedy.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Georgia;"><b><span class="Apple-style-span" style="color: #f1c232;">5. Phishing</span></b></span><span style="font-family: Georgia;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 21.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: Georgia;"><span class="Apple-style-span" style="font-size: large;">Phishing on
Facebook involves a hacker posing as a respected individual or organization and
asking for personal data, usually via a wall post or direct message. Once
clicked, the link infects the users’ computers with malware or directs them to
a website that offers a compelling reason to divulge sensitive information. A
classic example would be a site that congratulates the victims for having won
$1,000 and prompts them to fill out a form that asks for a credit card and
Social Security number. Such information can be used to perpetrate monetary and
identity fraud. Grayson Milbourne of Webroot, also explained that spearphishing
is becoming increasingly common, a practice that uses the same basic idea but
targets users through their individual interests.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;">See...<a href="http://www.amazon.com/BULLETPROOF-WIRELESS-SECURITY-Communications-Engineering/dp/0750677465/ref=sr_1_9?ie=UTF8&qid=1337557124&sr=8-9">Bulletproof Internet Security</a></span><br />
<br />
<br /></div>
<div class="MsoNormal" style="margin-bottom: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="color: #f1c232;">6. Fake Facebook</span></b></span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">A common form of
phishing is the fake Facebook scam. The scammers direct users via some sort of
clickable enticement, to a spurious Facebook log-in page designed to look like
the real thing. When the victims enter their usernames and passwords, they are
collected in a database, which the scammer often will sell. Once scammers have
purchased a user’s information, they can take advantage of their assumed ide</span></span><span class="Apple-style-span" style="font-family: ArialMS; font-size: large;">ntity through apps
like Facebook Marketplace and buy and sell a laundry list of goods and
services. Posing as a reputable user lets the scammer capitalize on the trust
that person has earned by selling fake goods and services or promoting brands
they have been paid to advertise.</span></div>
<div class="MsoNormal" style="margin-bottom: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="color: #f1c232;">7. Affinity
Fraud</span></b></span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">In cases of
affinity fraud, con artists assume the identity of individuals in order to earn
the trust of those close to them. The criminal then exploits this trust by
stealing money or information. Facebook facilitates this type of fraud because
people on the site often end up having a number of “friends” they actually do
not know personally and yet implicitly trust by dint of their Facebook
connection. Criminals can infiltrate a person’s group of friends and then offer
someone deals or investments that are part of a scheme. People can also assume
an identity by infiltrating a person’s account and asking friends for money or
sensitive information like a Social Security or credit card number.<o:p></o:p></span></span><br />
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><br /></span></span><br />
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">See....<a href="http://www.amazon.com/Network-Security-Bible-Eric-Cole/dp/0470502495/ref=sr_1_36?ie=UTF8&qid=1337557436&sr=8-36">Network Security Bible</a></span></span></div>
<div class="MsoNormal" style="margin-bottom: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="color: #f1c232;"><br /></span></b></span></span><br />
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="color: #f1c232;">8. Mining
Unprotected Info</span></b></span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">Few sites provide
an easier source of basic personal information than Facebook. While it is
possible to keep all personal information on Facebook private, users frequently
reveal their emails, phone numbers, addresses, birth dates and other pieces of
private data. As security experts and hackers know, this kind of information is
often used as passwords or as answers to secret security questions. While the
majority of unprotected information is mined for targeted advertising, it can
be a means to more pernicious ends such as profile cloning and, ultimately,
identity theft.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="color: #f1c232;">9. Spam</span></b></span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 14.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">Not all spam — the
mass sending of advertisements to users’ personal accounts — is against the
law. However, the existence of Facebook and other social sites has allowed for
a new kind of spam called clickjacking. The process of clickjacking, which is
illegal, involves the hacking of a personal account using an advertisement for
a viral video or article. Once the user clicks on this, the program sends an
advertisement to the person’s friends through their account without their
knowledge. This has become such an issue for the social media giant that
earlier this year that the company has teamed up with the U.S. Attorney General
to try to combat the issue.</span></span><br />
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">See....<a href="http://www.amazon.com/Computer-Security-Basics-Rick-Lehtinen/dp/0596006691/ref=sr_1_12?ie=UTF8&qid=1337557678&sr=8-12">Computer Security Basics</a></span></span></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
</a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-30415109154155990872012-05-01T12:46:00.001-07:002012-05-01T12:57:07.873-07:00Genetically modified crops' results raise concern.<br />
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-align: justify; text-autospace: none;">
<span class="Apple-style-span" style="font-family: ArialMS;"><b><span class="Apple-style-span" style="color: #ffe599;"><span class="Apple-style-span" style="font-size: x-large;"> <span style="font-family: ArialMS;"><b>Genetically modified crops' results
raise concern.</b></span></span></span></b></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-align: justify; text-autospace: none;">
<span class="Apple-style-span" style="font-family: ArialMS;"><b><span style="font-family: ArialMS;"><b></b></span></b></span><span class="Apple-style-span" style="font-family: ArialMS;"><b><span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="font-weight: normal;"><b><span style="font-family: ArialMS;"><b><i><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: large;">April 30, 2012, San Francisco Chronicle</span></span></i></b></span><span style="font-family: ArialMS;"><b><i><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: large;"> (San Francisco's leading newspaper)</span></span></i></b></span></b></span><span class="Apple-style-span" style="color: #2c2417;"><span class="Apple-style-span" style="font-size: large;"> </span></span></b></span></b></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-align: justify; text-autospace: none;">
<span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="color: #e69138;"><span class="Apple-style-span" style="font-size: x-large;">Biotechnology's promise to feed
the world did not anticipate "Trojan corn," "super weeds"
and the disappearance of monarch butterflies.</span></span></b></span><span style="color: #2c2417; font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"> </span></span><span style="font-family: ArialMS;"><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: large;">In the Midwest and South - blanketed
by more than 170 million acres of genetically engineered corn, soybeans and
cotton - an experiment begun in 1996 with approval of the first commercial
genetically modified organisms is producing questionable results. Those results
include vast increases in herbicide use that have created impervious weeds now
infesting millions of acres of cropland, while decimating other plants, such as
milkweeds that sustain the monarch butterflies. More than a million people have
signed a petition to the Food and Drug Administration to require labeling of
genetically engineered food. The stakes on labeling such foods are huge. </span></span><b><span class="Apple-style-span" style="color: #e69138;"><span class="Apple-style-span" style="font-size: x-large;">The
crops are so</span></span></b><b style="color: #2c2417;"><span class="Apple-style-span" style="font-size: x-large;"> </span></b><b><span class="Apple-style-span" style="color: #e69138;"><span class="Apple-style-span" style="font-size: x-large;">widespread that an estimated 70 percent of U.S. processed foods
contain engineered genes. The U.S. Department of Agriculture has approved more
than 80 genetically engineered crops while denying none.</span></span></b></span><span style="color: #2c2417; font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"> </span></span><span style="font-family: ArialMS;"><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: large;">Genetically
engineered crops ... have spawned an infestation of "super weeds" now
covering at least 13 million acres in 26 states. The crops led to a
400-million-pound net increase in herbicide applications. Dave Mortensen, a
weed ecologist at Pennsylvania State University, said the number of "super
weed" species grew from one in 1996 ... to 22 today. Last month,
scientists definitively tied heavy use of glyphosate to an 81 percent decline
in the monarch butterfly population. It turns out that the herbicide has
obliterated the milkweeds on Midwest corn farms where the monarchs lay their
eggs after migrating from Mexico. Iowa State University ecologist John
Pleasants, one of the study's authors, said the catastrophic decline in
monarchs is a consequence of the genetically engineered crops that no one
foresaw.<o:p></o:p></span></span></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-align: justify; text-autospace: none;">
<span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: large;">Note:</span></span></b></span><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"> <a href="http://www.wanttoknow.info/deception10pg"><span class="Apple-style-span" style="color: yellow;">Multiple reliable sources</span></a><span class="Apple-style-span" style="color: #f3f3f3;">
have shown that you may be eating genetically modified food daily which
scientific experiments have repeatedly demonstrated can cause sickness and even
death in lab animals. For key reports from major media sources on hidden facts
on the dangers of genetically modified food,</span><span class="Apple-style-span" style="color: yellow;"> <a href="http://www.wanttoknow.info/geneticallymodifiedorganismsnewsarticles">click
here</a>.</span><span class="Apple-style-span" style="color: #f3f3f3;"><o:p></o:p></span></span></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-align: justify; text-autospace: none;">
<span style="font-family: ArialMS; font-size: 13pt;"><span class="Apple-style-span" style="color: #f3f3f3;">S.F. Chronicle article......... </span></span><span style="color: #2c2417; font-family: ArialMS; font-size: 13pt;"> </span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-align: justify; text-autospace: none;">
<span style="font-family: ArialMS; font-size: 13pt;"></span><span class="Apple-style-span" style="font-family: ArialMS; font-size: 17px;"><a href="http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2012/04/29/MN1O1O5SS0.DTL"><span class="Apple-style-span" style="color: yellow;">http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2012/04/29/MN1O1O5SS0.DTL</span></a></span></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
</a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-52995609725513885132012-04-23T16:41:00.000-07:002012-04-30T14:33:18.058-07:00Your privacy at stake….<div class="MsoNormal">
<span class="Apple-style-span" style="font-family: Palatino;"><span class="Apple-style-span"><span style="font-family: Palatino;"><span class="Apple-style-span" style="color: orange;">April 30, 2012</span></span></span></span><br />
<span class="Apple-style-span" style="color: orange; font-family: Palatino;"><span class="Apple-style-span" style="font-size: x-large;">What Congress’ latest intrusive Internet bill would mean to you.</span></span><br />
<div class="MsoNormal">
<span class="Apple-style-span" style="font-family: Palatino; font-size: x-large;"><span class="Apple-style-span" style="font-size: 19px;"><span style="font-family: Georgia; font-size: 18pt;">The
“Cyber Intelligence Sharing and Protection Act” (CISPA)</span></span></span><br />
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: x-large;">would
usher in a new era of information sharing between companies and government
agencies — with limited oversight and privacy safeguards.<o:p></o:p></span></span></span><br />
<span class="Apple-style-span" style="color: #f3f3f3; font-family: Palatino;"><span class="Apple-style-span" style="font-size: x-large;"><br /></span></span><br />
<div class="MsoNormal">
<span style="font-family: 'New York';"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: x-large;">Rep. Ron Paul, the Texas Republican and presidential candidate,
warned on April 23 that CISPA represents the “latest assault on Internet
freedom” and was “Big Brother writ large.” And 18 Democratic House members
signed a letter the same day warning that CISPA “does not include necessary
safeguards” and that critics have raised “real and serious privacy concerns.”<o:p></o:p></span></span></span></span></div>
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">
</span></span></div>
</div>
<div class="MsoNormal" style="margin-bottom: 12.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: x-large;">In February, Facebook VP Joel Kaplan wrote an enthusiastic
letter to </span></span></span><span style="font-family: Georgia;"><b><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: x-large;">Rep. Mike
Rogers (R-Mich.), the chairman of the House Intelligence Committee</span></span></b></span><span style="font-family: ArialMS;"><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: x-large;"> to “commend”and
support them on CISPA Bill, which
he said “removes burdensome rules for online service providers that currently
can inhibit protection of the cyber ecosystem.”<o:p></o:p></span></span></span></div>
<div class="MsoNormal">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: x-large;">However, by mid-April,, Facebook had been forced on the
defensive, with Kaplan now assuring users that his employer has “no intention”
of sharing users’ personal data with the Feds and that section is “unrelated to
the things we liked” about CISPA in the first place. (A Demand Progress
campaign says: “Internet users were able to push GoDaddy to withdraw its
support of SOPA. Now it’s time to make sure Facebook knows we’re
furious.”) Read more…</span></span><span style="color: #343434;"><span class="Apple-style-span" style="font-size: x-large;"> </span></span><a href="http://alturl.com/c37jn"><span class="Apple-style-span" style="color: orange;"><span class="Apple-style-span" style="font-size: x-large;">http://alturl.com/c37jn</span></span></a><span class="Apple-style-span" style="font-size: x-large;">
<span class="Apple-style-span" style="color: #343434;"><o:p></o:p></span></span></span></div>
<span class="Apple-style-span" style="color: #f3f3f3;"><span class="Apple-style-span" style="font-size: x-large;"> </span></span><br />
<span class="Apple-style-span" style="color: #f3f3f3;"><br /></span><br />
<span class="Apple-style-span" style="color: #f3f3f3;"> <b><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: x-large;"><u>PICKING YOUR POCKET!</u></span></b></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">What began as a cleverly designed electronic chip to track
shipments and inventory control of merchandise to WalMart, and other BigBox
stores has now criminally evolved.
This same <b>R</b><span style="font-weight: normal;">adio </span><b>F</b><span style="font-weight: normal;">requency </span><b>ID</b></span><span style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-large;">entification (RFID) chip is being used to electronically pick your
pocket without ever touching or coming in contact with you and other
unsuspecting Americans as they shop, or just go about their daily
business-as-usual schedule. </span><span class="Apple-style-span" style="font-size: large;"><o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: #ffd966;"><span class="Apple-style-span" style="font-size: x-large;">Criminals are using this RFID technology to scan items we
carry on our own physical person, such as our driver’s license, credit cards,
and passport as we merely pass by.</span></span><br />
<span class="Apple-style-span" style="color: #ffd966;"><span class="Apple-style-span" style="font-size: x-large;">What you may not realize yet is that the Government has covertly embedding these </span></span><span class="Apple-style-span" style="color: #ffd966;"><span class="Apple-style-span" style="font-size: x-large;">RFID </span></span><span class="Apple-style-span" style="color: #ffd966; font-size: x-large;">microchips in these bank & government issued </span><span class="Apple-style-span" style="color: #ffd966;"><span class="Apple-style-span" style="font-size: x-large;">items</span></span><span class="Apple-style-span" style="color: #ffd966; font-size: x-large;"> in an attempt to track you, your purchases, and your habits. </span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">According to <b>RFID Journal</b><span style="font-weight: normal;"> (an industry trade magazine) <u>Radio Frequency Identification</u> is
a technology that connects RFID tagged </span></span><span class="Apple-style-span" style="font-size: x-large;">objects, and shipments to the internet, so they may be
tracked.</span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;"><br /></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">As an example, touchless credit cards are being used more
frequently by credit card companies since it makes purchases quicker. You
simply float your credit card above a touchless-equipped reader and your
payment is made. It’s faster that swiping your card. However, it also makes
theft of your most confidential information fast and easy, and without your immediate knowledge.</span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;"><br /></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">Since this technology employ’s scanning information that is
floating on radio waves, any electronic reader tuned-in, and within short range
can capture your data. That’s simply all that these touchless pickpockets really
do. A practical demonstrations by
security experts reveals how a pickpocket can connect a touchless credit-card
reader to a small notebook computer or smartphone, and easily “steal”
credit-card information right through a purse or pants-pocket by just walking
past an unsuspecting victim. Let me repeat that………. <span class="Apple-style-span" style="color: #ffd966;">”A thief can steal your most sensitive information by simply passing close by.”</span></span><span class="Apple-style-span" style="font-size: large;"><o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">Armed with your stolen information, the crook can create a fake
credit card, or easily use the information collected to make purchases
online, and in some instances, raid your bank account. </span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 22px;"><span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="color: #f1c232;">Last year identity thieves stole $18 billion from unprotected americans</span></span></span><span class="Apple-style-span" style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="color: #d9ead3;">.</span></span></span></span><br />
<span class="Apple-style-span" style="font-size: x-large;">Picture a crook going to a sports game, a movie theater, or the mall
on a busy day, he could steal thousands of credit-card’s without ever being
detected. The threat exists with your driver’s license and passport.</span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"> </span> <o:p></o:p></div>
<div class="MsoNormal">
<b> <span class="Apple-style-span" style="font-size: x-large;"> </span></b><b><span class="Apple-style-span" style="color: #e69138; font-size: x-large;">What is your best defense?</span><span class="Apple-style-span" style="font-size: 16pt;"><o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">You could attempt to destroy the RFID chip embedded within
your cards, but it’s not advisable with your government issued <b>RFID</b><span style="font-weight: normal;"> documents, because it could come with a penalty.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;"><br /></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">Your best options are to wrap the cards in aluminum foil to
block the radio signals, but it is always a hassle to keep unwrapping your
cards purchase after purchase, day after day.<o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">There are better, and much safer alternatives such as retiring your old leather wallet for one of the new stylish wallets designed to block the radio signals
from RFID chips. This will prevent theft of your sensitive information while in your
pocket or purse.</span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: #e06666; font-size: x-large;">And, the US State Department recommends using such wallets
to protect your passport information.</span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;"><br /></span></div>
<span style="font-family: Palatino; font-size: x-large;">You
can find a stylish selection, and color coordinates of economical protective "RFID" blocking
wallets and card holders available at Amazon…. <u> <a href="http://www.amazon.com/gp/search/ref=as_li_qf_sp_sr_tl?ie=UTF8&keywords=aluminum%20wallets&tag=news0cd-20&index=aps&linkCode=ur2&camp=1789&creative=9325%22%3Ealuminum%20wallets%3C/a%3E%3Cimg%20src=%22https://www.assoc-amazon.com/e/ir?t=news0cd-20&l=ur2&o=1%22%20width=%221%22%20height=%221%22%20border=%220%22%20alt=%22%22%20style=%22border:none%20!important;%20margin:0px%20!important;%22%20/%3E"><span class="Apple-style-span" style="color: yellow;">RFID PROTECTIVE CARD HOLDERS & WALLETS..</span></a></u></span>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
</a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-72770023267251998152012-04-11T10:51:00.000-07:002012-04-13T16:45:48.337-07:00Thieves love to steal smartphones.<div class="MsoNormal" style="margin-bottom: .25in; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS; font-size: 16pt;">(CBS
News) - Americans love to use smartphones, and thieves love to steal them. Why?
Because there's a growing black market for these expensive devices. But now,
cellphone carriers and the government are fighting back.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .25in; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;">Sen. Chuck Schumer, D-NY, said, "iPhone and smart
phones nowadays are like catnip for criminals. They've valuable, they're
exposed. They're easy to steal."</span></div>
<div class="MsoNormal" style="margin-bottom: .25in; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS; font-size: 16pt;">Schumer
will introduce legislation that would make it a federal crime to tamper with a
cell phone's unique identification number, punishable by up to five years in
prison.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: .25in; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS; font-size: 16pt;">Read the whole story... <a href="http://alturl.com/ov45t">http://alturl.com/ov45t</a> <o:p></o:p></span><br />
<span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="color: yellow;">Take charge of your online security with some great tips from Amazon.... </span> </span><span class="Apple-style-span" style="color: blue; font-family: 'New York'; font-size: x-large; line-height: 33px;"><a href="http://amzn.to/GIAXV1">http://amzn.to/GIAXV1</a></span><br />
<br />
<span class="Apple-style-span" style="font-size: large;">Continued……………></span></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
</a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-29098919780709423882012-03-29T13:36:00.000-07:002012-03-29T13:39:43.920-07:00NEW ONLINE SECURITY THREATS!<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><b><span class="Apple-style-span" style="color: #e69138;">NEW SECURITY THREAT!</span></b><span style="font-weight: normal;">
Is there no end? It’s reported by watchdog Katherine Hunt, that those innocent
looking QR (quick response) bar codes, the one that looks like a small square
checkerboard pattern that appear in ads, and can be scanned for text messages
with a smartphone camera, may have serious unsuspecting security consequences…<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">It seems that scammers are developing and placing QR bar
codes that steal </span><span class="Apple-style-span" style="font-size: large;">your ID information from your smartphone, and also may
urge you to call a phone number that places huge charge$ on your account. Some
cybercriminals </span><span class="Apple-style-span" style="font-size: large;">are even sticking fake QR code labels over legitimate
ones.</span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><br /></span><br />
<br />
<div class="MsoNormal">
<div style="font-size: medium; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: #e69138; font-size: x-large;"><b><u>Enhanced Online Security Has Become Mandatory!</u></b></span></span></div>
<div style="font-size: medium; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">Last year identity thieves stole $18 billion from unprotected americans, and are now hacking into, </span></span><span class="Apple-style-span" style="font-family: 'New York'; font-size: x-large;">and looting</span><span class="Apple-style-span" style="font-family: 'New York'; font-size: x-large;"> our personal bank accounts. Don’t you become a victim. There are measures you can install now. You must protect your online security at all cost. </span><span class="Apple-style-span" style="font-family: 'New York'; font-size: x-large;">Doing nothing can easily become a horrible disaster that you could have prevented.</span></div>
<div style="font-size: medium; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">Please take a moment to view the collection of great tips & references on security measures you can, and should install for your ultimate internet protection and piece of mind. Go to Internet Security at Amazon…. <a href="http://amzn.to/GIAXV1">http://amzn.to/GIAXV1</a><o:p></o:p></span></span></div>
</div>
<div class="MsoNormal" style="font-size: medium;">
</div>
</div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<span style="color: #ffd966; font-size: 16pt;"><b>Below is a very small microcosm
of scamming complaints to be aware of recently received
by the Better Business Bureau (BBB) of America.<o:p></o:p></b></span></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoNormal">
<span style="color: #e69138; font-family: ArialMS; font-size: 20pt;">AmEx's "Thanks for Updating Your Email" Messages are
Fakes</span><span style="font-family: Arial;"><b><span class="Apple-style-span" style="color: #e69138;">…….</span><u style="color: #13506d;"><o:p></o:p></u></b></span></div>
<div class="MsoNormal">
<span style="font-family: Arial;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="color: #eeeeee;">American Express
card holders beware! Scammers are using the credit card company's email address
for a phishing scam. Consumers nationwide reported receiving fake emails
informing them that their account's email address has been changed.</span><o:p></o:p></span></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><b><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="color: #e69138;">What does the email
look like? </span><o:p></o:p></span></b></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">These scam emails are
remarkably sophisticated. Not only do they use the American Express logo, they
copy the business's email design and color scheme. The fake messages even
contain footer links labeled "View Our Privacy Policy" and "Contact
Customer Service." <o:p></o:p></span></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">The message informs
recipients that the email address on their American Express account has been
changed and provides a link to where they can log in and correct the address.
The link, along with the ones in the email footer, actually leads to a
third-party website that downloads a virus on users' computers. <o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<span style="color: #e69138; font-family: ArialMS; font-size: 20pt;">Ignore that Text! You Didn't Win a Walmart Gift Card:</span><o:p></o:p></div>
<div class="MsoBodyText">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">Cell phone users across
the country are receiving suspicious text messages that claim to be from
Walmart. The texts tell consumers they won a free gift card... and all they
have to do is click a link and enter some information. Unfortunately, there
is no gift card. It's a scam to steal your credit card number and other
personal info.<o:p></o:p></span></span></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<span style="color: #e69138; font-family: ArialMS; font-size: 20pt;">Electronic Pickpocketing: Are your Credit Cards at Risk?</span><span style="font-family: ArialMS;"><o:p></o:p></span></div>
<div class="MsoBodyText">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">New technology now
allows criminals to steal your credit card information by passing an RFID
(Radio Frequency Identification) reader near your wallet or purse. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Verdana;">Stealing a physical
wallet is a thing of the past<span class="Apple-style-span" style="color: white;">-new technology
now allows</span> criminals to steal your credit card information by passing an
RFID (Radio Frequency Identification) reader near your wallet or purse.</span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Verdana;">RFID is a small
chip that contains information like the credit card number and expiration date.
These chips are used in one third of the total credit cards in the US;
consumers can wave their card in front of a RFID reader and the credit card
information is transmitted to the merchant. This makes purchasing simple,
but it also makes pick pocketing just as easy.</span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Verdana;">RFID readers are
easily purchased, so criminals have access to your credit card numbers and
expiration dates.</span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Verdana;">Using the
information they obtain from your credit card, they are able to make duplicate
cards to make other purchases.</span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Verdana;">BBB recommends the
following tips to protect yourself:</span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: 48.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none; text-indent: -34.0pt;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: TimesNewRomanMS;"> * </span><span style="font-family: Verdana;">Put some sort a metal around your card such as
aluminum foil</span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: 48.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none; text-indent: -34.0pt;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: TimesNewRomanMS;"> * </span><span style="font-family: Verdana;">Buy a protective sleeve or wallet from </span></span><span class="Apple-style-span" style="font-size: large;"><b><a href="http://www.amazon.com/gp/product/B005F28H30?ie=UTF8&tag=news0cd-20&linkCode=xm2&camp=1789&creativeASIN=B005F28H30">Amazon Security</a> link.</b></span></div>
<div class="MsoNormal" style="margin-bottom: 13.0pt; margin-left: 48.0pt; margin-right: 0in; margin-top: 0in; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none; text-indent: -34.0pt;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: TimesNewRomanMS;"> *
</span><span style="font-family: Verdana;">Ask your bank to send you a
card that does not contain an RFID chip</span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: Verdana;">If you believe you are a
victim of identity theft, contact the <span class="Apple-style-span" style="color: #e69138;"><a href="http://www.ftc.gov/">Federal Trade Commission </a>for an <a href="http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt06.pdf">Identity Theft Kit</a>.</span> You can also contact the
Better Business Bureau at 509-455-4200 if you have any questions.</span><span style="font-family: ArialMS;"><o:p></o:p></span></span></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoBodyText">
<span style="color: #e69138; font-family: ArialMS; font-size: 20pt;">Online Dating Scams:</span><span style="font-family: ArialMS;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 10.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">Are you thinking
--- who would ever do online dating? More people than you think. In fact,
millions of Americans use dating sites, social networking sites, and chat room
to meet people. It does work. In fact, one out of five relationships starts
online. I know professional people who used online dating; it resulted in
marriage. </span></span></div>
<div class="MsoNormal" style="margin-bottom: 10.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">But as with anything, you have to be careful so you are not scammed.
On the Internet, it’s easy to pretend to be someone you are not. Are you really
friends with all of your “friends” on Facebook? </span></span></div>
<div class="MsoNormal" style="margin-bottom: 10.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">Do you have a lot of personal
information on a dating site? With so much information about you online, a
scammer can sound like they know you. They create fake profiles to build
online relationships, and eventually convince people to send money in the name
of love. Some even make wedding plans before disappearing with the
money. </span></span></div>
<div class="MsoNormal" style="margin-bottom: 10.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="color: #cfe2f3; font-size: large;"><a href="http://onguardonline.gov/"><b>OnGuardOnline.gov</b></a> </span><span class="Apple-style-span" style="color: #e69138; font-size: large;"> has some great tips to help you avoid scams. Be wary
if your “sweetheart” does the following:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l0 level1 lfo1; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">Suggests leaving the dating site immediately and
use personal email<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l0 level1 lfo1; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">Moves the relationship along too quickly<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l0 level1 lfo1; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">Claims to be a U.S. citizen who travels out of the
country frequently<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l0 level1 lfo1; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">Plans to visit, but has to cancel plans due to
personal problems, including money<o:p></o:p></span></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">First and foremost do
not wire money to your newly discovered “attraction” to cover:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l1 level1 lfo2; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;"><br /></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l1 level1 lfo2; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">travel<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l1 level1 lfo2; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">medical emergencies<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l1 level1 lfo2; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">hotel bills<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l1 level1 lfo2; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">hospital bills for a child or other relative<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l1 level1 lfo2; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">visas or other official documents<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l1 level1 lfo2; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">losses from a temporary financial setback<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-layout-grid-align: none; mso-list: l1 level1 lfo2; mso-pagination: none; tab-stops: 11.0pt .5in; text-autospace: none; text-indent: -.5in;">
<span class="Apple-style-span" style="font-size: large;"><span style="font-family: ArialMS;">•<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-family: ArialMS;">losses from a mugging or robbery<o:p></o:p></span></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-family: ArialMS; font-size: large;"><br /></span></div>
<div class="MsoBodyText">
<br /></div>
<div class="MsoNormal" style="margin-right: -22.5pt;">
<br /></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
</a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-66580790530880680942012-03-21T14:11:00.001-07:002012-03-29T11:41:19.824-07:00Would you surrender your Facebook/Twitter passwords to get a job?<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;"><span style="font-family: 'New York';">Job interviews used to
mean handing over your resume. But these days, some prospective employers are
asking applicants to hand over their Facebook and Twitter passwords, so they
can scrutinize what their potential employees are really doing online. </span><span class="Apple-style-span" style="font-family: 'New York';">What could be next,
colleges, military, police etc.? </span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">CBS
reports on this issue…. <a href="http://alturl.com/jbhp9">http://alturl.com/jbhp9</a><o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;"><span style="font-family: 'New York';"><b>Is this legal?</b></span><span style="font-family: 'New York';"><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">For broader spectrum
details into the legalities of such, Fox News, (with a large contingent of their news team
sporting a legal background), presents some interesting and revealing
commentary on the subject that will ultimately affect you. Learn how to protect
your 4<sup>th</sup> Amendment Rights with some free-legal-pointers regarding
this hot-button issue. <o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">FOX reports on this issue….. <a href="http://alturl.com/bv7dg">http://alturl.com/bv7dg</a><o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;"><b><u>You have a lot to lose</u></b>
from unprotected internet use. With social media security, identity theft, and
personal account hacking taking center stage with ever increasing personal
assaults, it’s prudent to learn how to easily create some formidable firewalls to help
insure your internet integrity. </span></span><br />
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;"><br /></span></span><br />
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;"><b><u>Enhanced Online Security Has Become Mandatory!</u></b></span></span><br />
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">Last year identity thieves stole $18 billion from unprotected americans, and are now hacking into, </span></span><span class="Apple-style-span" style="font-family: 'New York'; font-size: x-large;">and looting</span><span class="Apple-style-span" style="font-family: 'New York'; font-size: x-large;"> our personal bank accounts. Do not become a victim. There are measures you can install now. You must protect your online integrity at all cost.</span><br />
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">Doing nothing can easily become a disaster that you could have prevented.</span></span><br />
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;">Please take a moment to view the collection of great tips & references on security
measures you can, and should install for your ultimate internet protection and piece of mind. Go to Internet Security at Amazon…. <a href="http://amzn.to/GIAXV1">http://amzn.to/GIAXV1</a>
<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: x-large;"><br /></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><br /></span></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
</a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-39553098182110825492012-02-09T10:05:00.000-08:002012-02-09T10:05:17.610-08:00Hanging up the keys.<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:Zoom>0</w:Zoom>
<w:DisplayHorizontalDrawingGridEvery>0</w:DisplayHorizontalDrawingGridEvery>
<w:DisplayVerticalDrawingGridEvery>0</w:DisplayVerticalDrawingGridEvery>
<w:UseMarginsForDrawingGridOrigin/>
</w:WordDocument>
</xml><![endif]-->
<!--StartFragment-->
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">What do you do when an elderly friend or family member </span><span class="Apple-style-span" style="font-size: x-large;">is reaching the point where the safe operation of a vehicle
is </span><span class="Apple-style-span" style="font-size: x-large;">wavering under the pressure of loss of reaction time,
distance equation, </span><span class="Apple-style-span" style="font-size: x-large;">and just plain old age?</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: x-large;">It’s a sensitive situation when you, for safety sake, need
to have that dreaded conversation about hanging up the keys. The loss of
independence is the first impact that is obvious, but there are many
implications that have been unraveled within the video from CBS New. It’s a
great primer for </span><span class="Apple-style-span" style="font-size: x-large;">approaching this difficult task.</span></div>
<div class="MsoNormal">
<br /></div>
<span style="font-family: Palatino; font-size: 14.0pt; mso-ansi-language: EN-US;"><a href="http://alturl.com/r7rk6">http://alturl.com/r7rk6</a></span><!--EndFragment-->
<a href="">
</a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-73854068022087130272011-12-28T12:31:00.000-08:002011-12-30T12:47:05.026-08:00Resume Tips:<br />
<br />
You’ll likely not get hired based solely on you résumé. However, since it’s main purpose is to help you gain an interview, let’s fine tune it to better highlight your assets, and include a quick-link contact to you.<br />
<br />
<br />
· Your email address, and phone number should be noticeably positioned.<br />
<div>
(If a possible employer has to search for your contact information they may instead move on to the next applicant. Place both in plain sight near the top.)<br />
<br />
· Make your email address a live link.<br />
(So a prospective employer may email you with just one click.)<br />
<br />
· Write a keyword-rich résumé.<br />
<div>
(Quite often now a computer will scam your résumé before a person does . Pertinent key words make it more likely to be tagged to go on for personal review. If the significant keywords you carefully choose reflect the industries and positions your are targeting, your chances improve dramatically.)<br />
<br />
· Include a live link to your Linkedin profile.<br />
(A Linkedin profile is a must in a professional job search, so if you fall into this category, you should update your profile and strategically position your Linkedin live link at the top of your résumé. )<br />
<div>
<br />
· Keep you résumé to one page if possible.<br />
(It’s easier to review your skills and history upon a single page document. However, it’s not written in stone that such is necessarily best if kept short, so if you have a lengthy history, include it in compressed presentation featuring your strongest assets that pertain to your target position.)<br />
<br />
· Feature achievements, not responsibilities.<br />
(Most job assignments require the same responsibilities be maintained by all employees. However, if you can site that you are better at managing job assignments by specifying past achievements be sure to highlight them, and you will certainly give yourself a competitive edge.)<br />
<br />
· Include just highlights. </div>
<div>
(Highlight honors, training sessions completed, conferences attended, and any others achievements worth mentioning. Your past endeavors may be lengthy, however it’s best to simply highlight the most meaningful to your particular targeted position. Your résumé should not become an autobiography of your entire life’s work history.)<br />
<br />
<br />
<a href="http://amzn.to/sOXJjo">For more tips on writing and designing winning resumes - click</a><br />
<br />
________________________________________________________________<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535">
</a></div>
</div>
</div><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-4058588492632995452011-11-27T15:04:00.001-08:002011-11-27T15:12:37.827-08:00Say good by to traditional household light bulbs.Its not as far fetched as it may seem.<div class="MsoNormal">
<b> <span class="Apple-style-span" style="font-size: large;"> </span><span class="Apple-style-span" style="font-size: large;">WHEN THE LIGHTS GO OUT!</span><o:p></o:p></b></div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">Say good by to traditional household light bulbs.<o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">Stocking up on conventional light bulbs (incandescent bulbs)
is something to seriously consider right now. The ability to purchase a
familiar 100 watt light bulb is coming to an abrupt end, and availability of
these type of bulbs is about to be switched off as mandated by but yet another
frivolous Government Regulation.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">The all knowing bureaucrats have enacted The federal Energy
Independence and Security Act of 2007 setting new lightbulb efficiency
standards that will soon prevent the manufacture and importation of most
incandescent bulbs. Complaints regarding the cost, possible mercury dangers,
and the unnatural harsh lighting tones have sparked an outcry from consumers
and business alike. An attempt to repeal this unpopular and costly law was itself defeated back in July of
2011. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">How this law will effect you:<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">Beginning January 1, 2012 the ax will droop on the 100
watt incandescent<o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">bulb, with the 75 watt following in 2013, and the 60- and
40- watt incandescent bulbs in 2014. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">The compact fluorescent lightbulbs (CFL’s) have been tagged
by many as emitting an unnatural harsh industrial type glow, which in some
cases have been linked to depression. Cost for CFL’s range on a average of $3
each—verses the 50 cents you pay for the familiar incandescent bulbs. CFL’s
will not work with you existing dimmer switches either. Furthermore, there are
safety concerns with CFL’s which contain </span><span class="Apple-style-span" style="font-size: large;">small amounts of Mercury. If a CFL is broken, you may be
exposed to Mercury which can cause serious health problems, including possible
nerve damage. (For emergency, disposal, and cleanup advice, go to: </span><span class="Apple-style-span" style="font-family: Palatino; font-size: 19px;"><a href="http://www.epa.gov/cfl/cflcleanup.html">www.epa.gov/cfl/cflcleanup.html</a></span></div><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-45413480820175991032011-11-05T13:55:00.000-07:002011-11-27T15:12:48.965-08:00LAWS of ATTRACTION.<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"> <span style="font-family: Palatino; font-size: 14pt;">LAWS of ATTRACTION. Your online photo speaks volumes about you. It’s your one and only chance to make a first impression. Here’s some tips:</span> </span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"><br />
</span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">In a world where we’re all connected, you have one chance to be viewed in a way that is complementary to your future online persona.<o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">And remember, the Human Resources Dept. for that job you’re hoping to land is likely conducting background checks within your online identity. With that in mind consider also that all others will also judge you by your online actions, photos, and statements.<o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;">We are a society where appearance is the key to success whether it’s social or business based.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l1 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<span class="Apple-style-span" style="font-size: large;">1.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span>Never post nude, intoxicated, or weird photos of yourself.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .25in;">
<br /></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l0 level1 lfo2; tab-stops: list .5in; text-indent: -.25in;">
<span class="Apple-style-span" style="font-size: large;">2.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span> Don’t post a logo or symbol as your online identity. A <o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"> complementary photo with good body language is a definite <o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"> advantage. It’s estimated that you’ll get 7 times as many views <o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="font-size: large;"> with a warm smile, and a well framed photo.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: -.5in; tab-stops: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l0 level1 lfo2; tab-stops: 0in list .5in; text-indent: -.25in;">
<span class="Apple-style-span" style="font-size: large;">3.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span>Social sites are just that. You are appearing before your peers. You will ultimately be judged by your online image.<o:p></o:p></span></div>
<div class="MsoNormal" style="tab-stops: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l0 level1 lfo2; tab-stops: 0in list .5in; text-indent: -.25in;">
<span class="Apple-style-span" style="font-size: large;">4.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span>Keep your primary photo exclusively of just yourself. People want to see you. Do not distract viewers with cluttered photos. Your accompanying photo gallery is where you may post photos posing with friends and others. <o:p></o:p></span></div>
<div class="MsoNormal" style="tab-stops: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l0 level1 lfo2; tab-stops: 0in list .5in; text-indent: -.25in;">
<span class="Apple-style-span" style="font-size: large;">5.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span>Remember, it’s all about <b>YOU!</b><span style="font-weight: normal;"> So put on a happy face,<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 0in;">
<span class="Apple-style-span" style="font-size: large;">strike a great pose, and overwhelm them with your charm.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 0in;">
<span class="Apple-style-span" style="font-size: large;">You’ll be ultimately recompensed for your effort. <o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535"> </a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-7246010222608856112011-11-04T12:58:00.000-07:002011-11-04T12:58:03.816-07:00Identity theft 101. Know your remedy.<!--StartFragment--> <div class="MsoNormal"><span style="font-family: Times;"> <o:p></o:p></span></div><div class="MsoNormal" style="margin-bottom: 10.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><span style="color: #bb0000; font-family: Arial-BoldMS;"><b> <span class="Apple-style-span" style="font-size: large;">I</span><span class="Apple-style-span" style="font-size: x-large;">dentity theft 101. Know your remedy.<o:p></o:p></span></b></span></div><div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><span style="font-family: ArialMS;"><a href="http://www.personalliberty.com/author/personalliberty/"><span style="color: #265bab; text-decoration: none; text-underline: none;">Personal Liberty News Desk</span></a> <o:p></o:p></span></div><div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><br />
</div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">Federal agencies released a revised guide designed to tackle the ongoing issue of identity fraud.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">The brochure – entitled You Have the Power to Stop Identity Theft – contains a number of steps individuals can take to reduce the chances of an invasion of privacy and possible financial loss.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">For example, people should never disclose their Social Security number or other potential password over the phone or internet unless they initiated the contact, the guidance states.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">"If you are unsure whether a contact is legitimate, go to the company’s website by typing in the site address or using a page you have previously bookmarked, instead of using a link provided by the email," the authorities advise in a reference to so-called phishing attacks.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">If you do fall victim to an identity fraudster, contact your financial institution so that a note can be placed on your file. The guidance also encourages you to inform the Federal Trade Commission of any attempted attack.<o:p></o:p></span></span></div><div class="MsoBodyText"><span class="Apple-style-span" style="font-size: large;">As many as nine million Americans are the subject of identity fraud each year, according to FTC estimates. <o:p></o:p></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">WHAT TO DO IF YOUR PURSE/WALLET IS LOST/STOLEN<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">We've all heard horror stories about fraud that's committed using your name,address, SS#, credit, etc. Unfortunately I <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">(author of this piece) have firsthand knowledge, because my <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">wallet was stolen last month and within a week the thieve(s) <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">ordered an expensive monthly cellphone package, applied for <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">a VISA credit card, had a credit line approved to buy a Gateway <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">computer,received a PIN number from DMV to change my driving <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">record information online, and more.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">But here's some critical information to limit the damage in<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">case this happens to you or someone you know. As everyone <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">always advises, cancel your credit cards immediately, but the<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">key is having the toll free numbers and your card numbers handy <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">so you know who to call. Keep those where you can find them easily <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">(having to hunt for them is additional stress you WON'T need at that<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">point!).<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">File a police report immediately in the jurisdiction where it<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">was stolen, this proves to credit providers you were diligent, and<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">is a first step toward an investigation (if there ever is one).<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Also, file a ID theft affidavit with the FTC <o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">But here's what is perhaps most important...I never ever<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">thought to do this:<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Call the three national credit reporting organizations<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">immediately to place a fraud alert on your name and SS#. I had <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">never heard of doing that until advised by a bank that called to <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">tell me an application for credit was made over the Internet in my <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">name. The alert means any company that checks your credit knows your information was stolen and they have to contact you by phone to authorize new credit.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">By the time I was advised to do this - almost 2 weeks after the<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">theft, all the damage had been done (there are records of all the<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">credit checks initiated by the thieves' purchases, none of which I<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">knew about before placing the alert). Since then, no additional <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">damage has been done, and the thieves threw my wallet away this weekend (someone turned it in).<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">It seems to have stopped them in their tracks.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">The numbers are: Equifax 1-800 525-6285.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Experian (formerly TRW) 1-888-397-3742 (main no.)<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Trans Union 1-800-680-7289.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Social Security Administration also has a fraud line at<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">1-800-269-0271.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">We pass along jokes, we pass along just about everything....do<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">think about passing this information along.... it could help someone <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">else.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">For more identity theft info: http://www.techtv.com/cybercrime/privacy/story/0,23008,2103957,00.html<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">FTC identity theft hotline www.consumer.gov/idtheft/victim.htm, or 877/438-4338<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Identity theft resource center www.idtheftcenter.org<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Electronic Privicy Info. Ctr. www.epic.org/privacy<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Privicy rights Center www.privacyrights.org<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">___________________________________________________________<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">A corporate attorney sent the following out to the employees in his<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">company. I pass it along, for your information.<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> The next time you order checks have only your initials (instead of<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">first name) and last name put on them. If someone takes your check book they<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">will not know if you sign your checks with just your initials or your first<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">name but your bank will know how you sign your checks.<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> Put your work phone # on your checks instead of your home phone. If<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">you have a PO Box use that instead of your home address. If you do not have a<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">PO Box use your work address. Never have your SS# printed on your checks --<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">you can add it if it is necessary. But if you have it printed, anyone can get<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">it.<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Place the contents of your wallet on a photocopy machine, do both<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">sides of meach license, credit card, etc. You will know what you had in your<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">wallet and all of the account ~~~~~~s and phone ~~~~~~s to call and cancel.<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Keep the photocopy in a safe place. I also carry a photocopy of my passport<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">when I travel either here or abroad. We've all heard horror stories about<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">fraud that's committed on us in stealing a name, address, Social Security,<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">credit cards, etc.<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> Unfortunately I, an attorney, have firsthand knowledge because my<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">wallet was stolen last month. Within a week, the thieve(s) ordered an <o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">expensive monthly cell phone package, applied for a VISA credit card, had </span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">a credit line approved to buy a Gateway computer, received a PIN ~~~~~~ from </span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">DMV to change my driving record information online, and more.<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> But here's some critical information to limit the damage in case this<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> happens to you or someone you know: We have been told we should cancel<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">our credit cards immediately. But the key is having the toll free ~~~~~~s and<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> your card ~~~~~~s handy so you know whom to call. Keep those where you<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">can find them easily. File a police report immediately in the jurisdiction<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">where it was stolen, this proves to credit providers you were diligent,<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">and is a first step toward an investigation (if there ever is one). But here's<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">what is perhaps most important: (I never even thought to do this) Call the<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">three national credit reporting organizations immediately to place a fraud<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">alert on your name and Social Security ~~~~~~. I had never heard of doing<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">that until advised by a bank that called to tell me an application for<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">credit was made over the Internet in my name. The alert means any company </span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">that checks your credit knows your information was stolen and they have to </span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">contact you by phone to authorize new credit.<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> By the time I was advised to do this, almost two weeks after the<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">theft, all the damage had been done. There are records of all the credit checks<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> initiated by the thieves' purchases, none of which I knew about before<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> placing the alert. Since then, no additional damage has been done, and<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">the thieves threw my wallet away this weekend (someone turned it in). It<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">seems to have stopped them in their tracks. The ~~~~~~s are:<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> Equifax: 1-800-525-6285<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> Experian (formerly TRW): 1-888-397-3742<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> Trans Union: 1-800-680-7289<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> Social Security Administration (fraud line): 1-800-269-0271<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;"> We pass along jokes; we pass along just about everything. Do think<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">about passing this information along. It could really help someone you care<o:p></o:p></span></span></div><div class="MsoNormal" style="margin-right: -1.0in;"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">about.<o:p></o:p></span></span></div><div style="border-bottom: solid windowtext 1.5pt; border: none; padding: 0in 0in 1.0pt 0in;"> <div class="MsoNormal" style="border: none; margin-right: -1.0in; mso-border-bottom-alt: solid windowtext 1.5pt; mso-padding-alt: 0in 0in 1.0pt 0in; padding: 0in;"><br />
</div></div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">ID Theft Center http://www.idtheftcenter.org<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">WHAT TO DO IF YOUR PURSE/WALLET IS LOST/STOLEN<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">We've all heard horror stories about fraud that's committed using your name,address, SS#, credit, etc. Unfortunately I <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">(author of this piece) have firsthand knowledge, because my <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">wallet was stolen last month and within a week the thieve(s) <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">ordered an expensive monthly cellphone package, applied for <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">a VISA credit card, had a credit line approved to buy a Gateway <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">computer,received a PIN number from DMV to change my driving <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">record information online, and more.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">But here's some critical information to limit the damage in<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">case this happens to you or someone you know. As everyone <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">always advises, cancel your credit cards immediately, but the<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">key is having the toll free numbers and your card numbers handy <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">so you know who to call. Keep those where you can find them easily <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">(having to hunt for them is additional stress you WON'T need at that point!).<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">File a police report immediately in the jurisdiction where it<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">was stolen, this proves to credit providers you were diligent, and<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">is a first step toward an investigation (if there ever is one). Inquite about a "Identity Theft Victim Passport."<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Close all old accounts and open new one’s<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Post a fraud alert with all credit co’s.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">But here's what is perhaps most important...I never ever<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">thought to do this:<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Call the three national credit reporting organizations<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">immediately to place a fraud alert on your name and SS#. I had <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">never heard of doing that until advised by a bank that called to <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">tell me an application for credit was made over the Internet in my <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">name. The alert means any company that checks your credit knows your information was stolen and they have to contact you by phone to authorize new credit.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">By the time I was advised to do this - almost 2 weeks after the<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">theft, all the damage had been done (there are records of all the<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">credit checks initiated by the thieves' purchases, none of which I<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">knew about before placing the alert). Since then, no additional <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">damage has been done, and the thieves threw my wallet away this weekend (someone turned it in).<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">It seems to have stopped them in their tracks.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">The numbers are: Equifax 1-800 525-6285.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Experian (formerly TRW) 1-888-397-3742 (main no.)<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Trans Union 1-800-680-7289.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Social Security Administration also has a fraud line at<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">1-800-269-0271.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Also now, there is a program in place to help victims who are under attack from police, creditors, bounty hunters, etc. You may obtain from the police, a "Identity theft Victim Passport" This document helps you discourage any persuer of the impersonator, to target you by mistake.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">As reported on Dateline 7/17/03<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">We pass along jokes, we pass along just about everything....do<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">think about passing this information along.... it could help someone <o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">else.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">For more identity theft info: http://www.techtv.com/cybercrime/privacy/story/0,23008,2103957,00.html<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">FTC identity theft hotline www.consumer.gov/idtheft/victim.htm, or 877/438-4338<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Identity theft resource center www.idtheftcenter.org<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Electronic Privicy Info. Ctr. www.epic.org/privacy<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Privicy rights Center </span><a href="http://www.privacyrights.org/"><span class="Apple-style-span" style="font-size: large;">www.privacyrights.org</span></a><span class="Apple-style-span" style="font-size: large;"><o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Times;"><span class="Apple-style-span" style="font-size: large;">Federal Trade Comm. 877-382-4357</span><o:p></o:p></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal" style="margin-right: -1.0in;"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><!--EndFragment--> <a href=""> </a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-70567717850355399752011-07-13T10:24:00.000-07:002012-04-11T10:40:59.149-07:00The FDA’s War on Dietary Supplements.<div class="MsoNormal">
<span class="Apple-style-span" style="color: white;"><span style="font-family: 'New York'; font-size: 12pt;">The United States Food and Drug Administration is trying to implement new guidelines that will effectively kill the nation's supplement industry. The guidelines were reviewed by the Alliance for Natural Health, and the alliance determined them to be onerous and punitive</span><span style="font-family: Helvetica; font-size: 12pt;">.</span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 10.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: 15pt;"><b>The FDA’s War on Dietary Supplements<o:p></o:p></b></span></div>
<div class="MsoNormal" style="margin-bottom: 10.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="color: white;"><span style="font-family: ArialMS; font-size: 12pt;">July 13, 2011 by <span style="text-decoration: none;"><a href="http://www.personalliberty.com/author/bob/">Bob Livingston</a> </span></span><span style="font-family: ArialMS; font-size: 9pt;"><o:p></o:p></span><span class="Apple-style-span" style="font-family: 'New York'; font-size: 16px;"> </span><span class="Apple-style-span" style="font-family: 'New York'; font-size: 16px;"><a href="http://www.personalliberty.com/author/bob/">http://www.personalliberty.com/author/bob/</a></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: white; font-size: large;">The United States Food and Drug Administration guidelines will apply to supplements developed since 1994.<o:p></o:p></span></span></div>
<div class="MsoBodyText">
<span class="Apple-style-span" style="color: white; font-size: large;">The United States Food and Drug Administration is trying to implement new guidelines that will effectively kill the nation’s supplement industry.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: white; font-size: large;">A draft of the guidelines was issued July 1 to comply with the New Dietary Ingredient (NDI) notification protocols called for in the 1994 Dietary Supplement Health and Education Act (DSHEA). In the 17-plus years since the act was passed, supplement manufacturers have had little information to help them determine what makes a NDI and when or how to file NDI notification.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: white; font-size: large;">Now, we know the FDA wants to destroy the supplement industry.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: white; font-size: large;">The guidelines were reviewed by the Alliance for Natural Health, and the alliance determined them to be onerous and punitive. For example, any supplement developed since 1994 is now subject to FDA approval under the NDI.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: white; font-size: large;">Many important supplements have been developed since 1994. Under the new guidelines, those will have to come off the market for at least 75 days while the FDA decides whether it wants to approve them. On top of that, any supplements that were “grandfathered” in by the DSHEA that have been altered in any way — prepared by a different process, dosage increased, harvested from the plant at a different point in the life cycle, recommended for use by another demographic group, etc. — must also be pulled from the market and sent to the FDA for approval. And the kicker is that the FDA is under no obligation to approve them.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: white; font-size: large;">If any changes are made or unapproved substances are added to a supplement, the FDA considers it adulterated. As a result, the supplement could be confiscated by the FDA, the supplement manufacturer would be subject to severe sanctions and the manufacturing company’s officers could be imprisoned.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: white;"><span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: large;">Additionally, any new supplement being considered for manufacture must have an NDI completed for each ingredient, regardless of whether</span></span><span style="font-family: 'New York';"><span class="Apple-style-span" style="font-size: large;"> those ingredients had been previously approved by the FDA for use in other supplements, or the same substances had been previously approved for manufacture by a different company. This will drown supplement manufacturers in paperwork and result in increased costs and the closure of many supplement companies.<o:p></o:p></span></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'New York';"><span class="Apple-style-span" style="color: white; font-size: large;">It’s obvious the FDA and Big Pharma want to destroy the supplement industry and are not interested in letting Americans make their own health choices.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="color: white; font-family: 'New York';"><span class="Apple-style-span" style="font-size: large;">Call or email your Senators and Representative and tell them the FDA should not be imposing such draconian guidelines on the supplement industry. You can find the contact information for your Senators at </span><a href="http://www.senate.gov/general/contact_information/senators_cfm.cfm"><span style="text-decoration: none;"><span class="Apple-style-span" style="font-size: large;">www.senate.gov</span></span></a><span class="Apple-style-span" style="font-size: large;"> and your Representative at </span><a href="http://www.house.gov/representatives/"><span style="text-decoration: none;"><span class="Apple-style-span" style="font-size: large;">www.house.gov</span></span></a><span class="Apple-style-span" style="font-size: large;">. Or you can call 1-800-333-4636.</span><o:p></o:p></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="font-family: 'New York'; font-size: 16px;"> </span></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535"> </a><br />
<div style="-webkit-transition-duration: 0.3s; -webkit-transition-property: all; background-color: infobackground; font-size: medium; height: auto; left: 508px; position: absolute; top: 44px; visibility: hidden; width: 23px; z-index: 1000;">
</div><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-64019247741450408912011-06-07T13:41:00.000-07:002012-04-11T10:35:20.829-07:00Online photos often give away your location.<div class="MsoNormal" style="margin-bottom: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: Palatino-Roman; font-size: large;"><b>Koeppen: Easy to tracked you via phone pics; Also, how to change your settings to avoid this data collection<o:p></o:p></b></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">(CBS News) If you're one of the millions of smartphone users who post pictures online, you may be putting up more than you think. There's more than meets the eye with photo uploads.<o:p></o:p></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="color: white; font-size: large;"><br /></span></div>
<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">With the touch of a button, you can show the world your photos. However, you can also reveal information you may not want to share - like the exact location of where you live, work, play and go on vacation.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;"><a href="mailto:consumerwatch@cbsnews.com?subject=Question%20for%20Susan%20Koeppen"><span style="text-decoration: none;">E-mail Susan</span></a> <a href="http://twitter.com/susankoeppen"><span style="text-decoration: none;">Susan's Twitter page</span></a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">On "The Early Show" Thursday, CBS News Consumer Correspondent Susan Koeppen reported there are more than 100 billion photos -- of kids and pets, vacations, graduations, etc. -- currently posted online, with thousands more being uploaded every minute.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">But what you see online is only half the story. Tech expert John Rettinger, president of Techno Buffalo, a tech news website, points out most smartphones have a GPS chip built into them. So when you're taking a picture, it actually takes your location and stores it on that photo.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">Rettinger says the same technology that helps people see real-time traffic updates and find directions on their phones also leads to GPS coordinates being attached to pictures.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">Not only can you know exactly what was taken, you know exactly the time that the picture was shot, Rettinger said.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">Koeppen said all it takes to find someone's location based solely on a picture is the right computer program, and just a couple of minutes.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span class="Apple-style-span" style="color: white; font-size: large;"><span style="font-family: ArialMS;"> </span><span class="Apple-style-span" style="font-family: ArialMS;">How easy is it to do this?</span></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">"Extremely easy," Rettinger said. "If you know where to look, it's one button to hit download and you are done."<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">Koeppen decided to see just how easy it really is. A producer took pictures of just her face at several locations around Los Angeles. They posted them on my <a href="http://twitter.com/#%21/susankoeppen"><span style="text-decoration: none;">Koeppen's Twitter account</span></a>, and asked Rettinger to figure out where she was.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">Within seconds, Rettinger told Koeppen she was shopping on Rodeo Drive, at Griffith Park and Grauman's Chinese Theater. Just by right-clicking on all of the photos, Rettinger was able to pinpoint her exact locations using GPS coordinates.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">With more than 70 million Americans currently using smartphones, smartphone tracking has become a hot-button issue. Just this month, executives from Apple and Google were questioned about it on Capitol Hill. But the good news for smartphone users is you can turn off the location of your pictures by adjusting the settings on your phone by turning off the location of your pictures.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">Rettinger said, "Oftentimes you just go to settings and it says geolocation and you switch it off. That's all you need to do.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">Koeppen added on "The Early Show," "And it's interesting to note that our expert had never tried to read the location of a picture before but he said it took him a total of 10 minutes to get the right program off the internet, and then learn how to do it. And once we posted our pictures, it took them less than 30 seconds per picture to find my locations."</span></div>
<div class="MsoNormal" style="margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-line-height-alt: 13.0pt; mso-pagination: none; text-autospace: none;">
<span style="color: white; font-family: ArialMS; font-size: large;">Co-anchor Erica Hill said, "That's just creepy to just one word to describe it. We saw briefly in your piece the expert was showing us how to turn off these settings so people can't figure out where you are."<o:p></o:p></span></div>
<span style="color: white; font-family: ArialMS; font-size: large;">Koeppen said, "So we used an iPhone to take our pictures. What you're going to do is find settings, go to settings, then go to general. Then you're going to find location services. And where it says camera you just want to have it turned to 'off.'"</span> <a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535"> </a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-59514445481045941652011-05-25T16:00:00.000-07:002012-04-11T10:32:31.903-07:00Facebook helps find a lost and forlorn dog.<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="color: white;"> </span></span><span class="Apple-style-span" style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="color: white;">A sweet shy pit bull/Doberman mix named Siobhan, part of the largest cruelty case in Georgia history, had found new life at LifeLine Animal Project in Avondale Estates, Georgia. She got up to 40 pounds, regained her health and finally discovered how to play with toys. </span></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="color: white;">Over Easter weekend, this three-year-old's foster parents took her to Beaufort, South Carolina for vacation. But Siobhan ran away, nowhere to be found. When she was spotted in town, the skittish Siobhan fled from help, only to be hit by a car. She then scampered off into the salt marshes surrounding Beaufort. <o:p></o:p></span></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="color: white;">For days a crew from Lifeline and her foster family searched frantically yet fruitlessly for her in the dangerous marshes. So Lifeline turned to Facebook, posting about her plight and offering a $500 reward for her safe return. <o:p></o:p></span></span></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: white;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="color: white;">On Siobhan's fourth day lost in Beaufort, nursing student Faith Wade, who had reposted the original Facebook plea, got a tip from a local business: They spotted Siobhan in a nearby marsh. Wade called Debbie Setzer from Lifeline, and after buying a pair of rubber boots, this wife of a deployed marine joined Setzer, the pair wading through the vine-choked marsh calling Siobhan's name over and over again. And then, a sound that Wade and Setzer may always remember. <o:p></o:p></span></span></span></div>
<div class="MsoNormal">
<span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="color: white;"> "I'll never forget hearing Siobhan answer my calls for her with her beautiful, strong, deep bark, or her pretty eyes, just calmly looking at me through the marsh grass when I first saw her," Wade posted on Lifeline's Facebook page after finding Siobhan on April 27th. "It was a wonderful day." Wade, and the folks at Lifeline, credit Facebook for pointing them to Siobhan. "SHE'S FOUND - THANKS TO YOU, FACEBOOK FRIENDS!!!," Lifeline posted on its page. "You responded to our pleas for help and spread the word. You saved her!"</span></span><span class="Apple-style-span" style="color: #30441b;"><o:p></o:p></span></span></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535"> </a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-77863204807987239212011-05-20T14:31:00.000-07:002012-04-11T10:40:26.355-07:00If you’re not gratified in knowing that Fat People are Harder to Kidnap...<div class="MsoNormal">
<span style="font-family: Arial;"><span class="Apple-style-span" style="color: white; font-size: large;">Weight-loss guru and women’s health advocate Suzanne Somers has a customized new weight-loss program. Suzanne will help you uncover the hidden obstacles preventing you from losing weight. And she’ll give you all the tips and tools you need to lose weight. Click on the banner above, take her free quiz, and learn how to become Sexy Forever!<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<a href="http://www.blogger.com/blogger.g?blogID=7606728989336975535"> </a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-80447032257689035242011-05-15T14:07:00.000-07:002011-05-15T14:07:20.396-07:00Police Spying Backfires As Criminals Use Facebook/Twitter For Surveillance<!--StartFragment--> <div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><span class="Apple-style-span" style="font-family: ArialMS; font-size: 16px;"><br />
</span></div><div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><span class="Apple-style-span" style="font-family: ArialMS; font-size: 16px;"><br />
</span></div><div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><span class="Apple-style-span" style="font-family: ArialMS; font-size: 16px;">May 11, 2011 by </span><span class="Apple-style-span" style="font-family: ArialMS; font-size: 16px;"><a href="http://www.personalliberty.com/author/marcy/"><span style="color: #1d3ca0; text-decoration: none; text-underline: none;">Marcy Bonebright, Staff Writer</span></a></span><span class="Apple-style-span" style="font-family: ArialMS; font-size: 16px;"> </span></div><div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><span style="font-family: ArialMS; font-size: 12.0pt;"><br />
</span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">Recently, there has been a lot of public outcry against police officers using social networking sites like Facebook and Twitter to spy on supposed criminals. Now, it looks like the criminals are giving the police a taste of their own medicine.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><br />
</span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">According to a </span><i><span class="Apple-style-span" style="font-size: large;">Foxnews.com</span></i></span><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"> </span><a href="http://www.foxnews.com/scitech/2011/05/10/officials-warn-facebook-twitter-increase-police-vulnerability/?test=latestnews"><span style="color: #1d3ca0; text-decoration: none; text-underline: none;"><span class="Apple-style-span" style="font-size: large;">article</span></span></a><span class="Apple-style-span" style="font-size: large;">, police officials are worried that social networking is putting officers at risk.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">The article stated: “Criminals are using [social networking] sites to identify and investigate law-enforcement officers, including undercover police. In addition, hostage-takers and suspects who barricade themselves in buildings are monitoring social media to track police movements in real time, and gang members are launching their own surveillance operations targeting police.”<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">The criminals likely got the idea to use social networking to this end from police, though.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><br />
</span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">According to </span><i><span class="Apple-style-span" style="font-size: large;">iNews880.com</span></i></span><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">, this practice is extremely commonplace, and police from different precincts are sharing the secrets of online surveillance with other officers. “Gang expert George Chavez, a police detective in Wisconsin, said today in an interview that gang members feel secure in putting up information on the Web. But he says police are using tactics to gain access to their sites to gather pictures of suspected gang members and find out about proposed meeting places and activities.”<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><br />
</span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">But an </span><a href="http://www.pcmag.com/article2/0,2817,2384832,00.asp"><span style="color: #1d3ca0; text-decoration: none; text-underline: none;"><span class="Apple-style-span" style="font-size: large;">editorial</span></span></a><span class="Apple-style-span" style="font-size: large;"> on </span><i><span class="Apple-style-span" style="font-size: large;">PCMag.com</span></i></span><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"> argues that social network spying has become commonplace — not just for police and criminals, but for everyone.<o:p></o:p></span></span></div><div class="MsoNormal"><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;">“To get the details you want, you can look over people’s Facebook pages and LinkedIn pages to get a reasonable amount of background info. You can then check if they have a Twitter account. If so, what do they harp on? Do they use a goofy name? If they have a blog, they’ll probably link it on one of these services. If they do, what is it about?” the editorial said.<o:p></o:p></span></span></div><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><div><span style="font-family: ArialMS;"><span class="Apple-style-span" style="font-size: large;"><br />
</span></span></div>“But people should at least be aware that they might be scrutinized based on their online information, even when it is supposedly ‘private.’ While I cannot view people’s private postings, you can be sure the government can.”</span></span><!--EndFragment--> <a href=""> </a><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-39641529429650903172011-05-07T10:21:00.000-07:002011-05-07T10:21:01.436-07:00Every move you make online is being tracked.<!--StartFragment--> <div class="MsoNormal"><span style="color: #262626; font-family: TrebuchetMS; font-size: 12.0pt;">Every move you make online is being tracked.<o:p></o:p></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">Identity thieves are not the only prying eyes on the internet. Mainstream Web sites and their advertising partners track your cyber moves as well. Some is innocent, and some is beneficial. However, online tracking often crosses the line with a worrisome invasion of our privacy. </span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">Sites routinely sell information about you to other companies and entities, all of which they eagerly gather simply by installing tracking files onto our computer, without our permission. This allows tracking companies to lurk unseen on their sites, gathering scads of information about us.<o:p></o:p></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">Not only are the shopping sites guilty, but also Media companies who then sell information on what articles we read, as do some Charities about what interests us. And, then there is the ever hungry government agencies that are compiling files of all sorts of information about us.<o:p></o:p></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">It's just a fact that there are many many eyes associated with these online sites including such Gov't. agencies as, IRS, FBI, CIA, Homeland Security, ATF, INS, and including unions, neighbors, friends, enemies, con-artists, etc. </span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">All are super thrilled that they have uncovered an authenticated stream of personal information on most Americans, and including a recent photo, birth date, friends, relatives, likes, dislikes. All foolishly but innocently volunteered by us on social sites spread out all over cyber space.<o:p></o:p></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">Singles, and dating sites are chocked full of all sorts of intimate statistics you are required to submit when signing up for membership. Nowhere else could this information be gathered regarding your most personal and intimate details that we trustingly post online for so many abusers to view, and possibly exploit.<o:p></o:p></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">This unauthorized sharing of your personal information targets your weaknesses, your passions, your reading agenda, your sexual preferences, and on, and on , and on.<o:p></o:p></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">What can you do?<o:p></o:p></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">1. Use an ad-tracker tracker: These programs don’t stop the spying process but do alert you that you are being watched and then decide if you choose to visit those sites in the future.<o:p></o:p></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">2. Opt out of tracking: Many online advertisers and companies that sell information allow internet users to opt-out of internet tracking by signing up with an opt-out service. Some Opt-out services include: www.AboutAds.info …. www.PrivacyChoice.org …..and www.NetworkAdvertising.org<o:p></o:p></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">Several web browsers such as Mozilla Firefox and Google Chrome are starting to offer ways to permanently otp-out of ad tracking. However, less ethical advertisers do not participate in these opt-out programs. <o:p></o:p></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-size: large;">Other suggestions are, to clear your cookie cache from your computer. If you do, you will however have to replace some information to those sites that you want to access quickly such as online-banking, and sites that recognize your cyber-cookie-footprint when you visit them. Other options include: Adjusting your browser settings for greater privacy, and by avoiding sites that do a poor job of protecting user privacy.</span><o:p></o:p></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><!--EndFragment--><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-37643635407289617612011-05-02T10:44:00.000-07:002011-05-02T10:44:02.944-07:00SMOKING HABIT ERASED by famed scientist, Dr. Linus Pauling. And, it’s a Delightful, Enjoyable Natural Cure.<!--StartFragment--> <div class="MsoBodyText"><span style="color: #060604; font-family: Arial;"><span class="Apple-style-span" style="font-size: large;">Nobel Prize winner Dr. Linus Pauling came up with this odd-sounding natural remedy, and it was soundly retested by a British research group. In just 3 short weeks, the folks who used </span><i><span class="Apple-style-span" style="font-size: large;">oranges</span></i></span><span style="color: #060604; font-family: Arial;"><span class="Apple-style-span" style="font-size: large;"> were smoking an average of 79% less — and many had kicked the habit completely! </span></span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: large;">Incidentally, when you take a piece of orange instead of smoking a cigarette, first suck the juice out and then eat the pulp.<o:p></o:p></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #262626;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: large;">For a more detailed regime to follow, and how-to prepare your juice cure go to:</span> </span></span><span style="color: blue;"><b><a href="http://www.ehow.com/how_5568485_stop-smoking-using-oranges.html"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-weight: normal;">http://www.ehow.com/how_5568485_stop-smoking-using-oranges.htm</span>l</span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></b></span><span style="color: #262626;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: large;"><o:p></o:p></span></span></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #262626;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: large;">As a bonus, click on this site for a whimsical, & musical smoking cessation greeting card you can send to a friends and loved ones.</span></span></span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: large;"> <o:p></o:p></span></span></div><div class="MsoNormal"><a href="http://www.alighthouse.com/quitsmoking.htm"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">http://www.alighthouse.com/quitsmoking.htm</span></a> <o:p></o:p></div><!--EndFragment--> <a href=""> </a><br />
<div style="background-attachment: initial; background-clip: initial; background-color: #ffffbf; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; direction: ltr; font-family: arial, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; height: auto; line-height: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; width: auto; z-index: 99995;"></div><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0tag:blogger.com,1999:blog-7606728989336975535.post-145647846502580382011-04-29T15:08:00.000-07:002011-04-29T15:08:29.105-07:00HOW TO FIGHT FAT AFTER FORTY<!--StartFragment--> <div class="MsoNormal"><span style="color: #343434; font-family: Arial;"><span class="Apple-style-span" style="font-size: large;">Weight-loss guru and women’s health advocate Suzanne Somers has a customized new weight-loss program. Suzanne will help you uncover the hidden obstacles preventing you from losing weight. </span></span><span style="color: #454545; font-family: Arial;"><span class="Apple-style-span" style="font-size: large;">Sexy Forever Online will give you all the tips and tools you need to lose weight and feel sexy. Suzanne will help you uncover the hidden obstacle preventing you from losing weight. Get started by taking Suzanne's FREE quiz right now!</span></span><span style="color: #343434; font-family: Arial;"><o:p></o:p></span></div><!--EndFragment--> <a href=""> </a><br />
<div style="background-attachment: initial; background-clip: initial; background-color: #ffffbf; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; direction: ltr; font-family: arial, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; height: auto; line-height: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; width: auto; z-index: 99995;"></div><div class="blogger-post-footer"><a >
<!-- NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click-*" - NetBlockade - "*/click --></a></div>LifeWorksNewshttp://www.blogger.com/profile/17990645651484674685noreply@blogger.com0