Cyborg | Designer-Babies | Futurism | Futurist | Immortality | Longevity | Nanotechnology | Post-Human | Singularity | Transhuman

Fourth Amendment – the Text, Origins, and Meaning

 Fourth Amendment  Comments Off on Fourth Amendment – the Text, Origins, and Meaning
Jul 242015
 

Yellow Dog Productions/The Image Bank/Getty Images

Text of Amendment:

Writs of Assistance:

The Fourth Amendment was written directly in response to British general warrants (called Writs of Assistance), in which the Crown would grant general search powers to British law enforcement official.

These officials could search virtually any home they liked, at any time they liked, for any reason they liked or for no reason at all. Since many of the founding fathers were smugglers, this was an especially unpopular concept in the colonies.

Limited Power:

In practical terms, there is no means by which the government can exercise prior restraint on law enforcement officials. If an officer in Jackson, Mississippi wants to conduct a warrantless search without probable cause, the judiciary is not present at the time and can’t prevent the search. This meant that the Fourth Amendment had little power or relevance until 1914.

The Exclusionary Rule:

In Weeks v. United States (1914), the Supreme Court established what has been known as the exclusionary rule. The exclusionary rule states that evidence obtained through unconstitutional means is inadmissible in court and cannot be used as part of the prosecution’s case. Before Weeks, law enforcement officials could violate the Fourth Amendment without being punished for it, secure the evidence, and use it at trial.

The exclusionary rule establishes consequences for violating a suspect’s Fourth Amendment rights.

The rest is here:
Fourth Amendment – the Text, Origins, and Meaning

BTC Guild – Bitcoin Mining Pool

 Bitcoin  Comments Off on BTC Guild – Bitcoin Mining Pool
Jul 242015
 

BTC Guild will be shutting down its mining servers on June 30th, 2015 at 23:59 UTC. Users will still be able to log in and retrieve their history (CSV exports on the settings page) and request withdrawals until September 30, 2015. Why is BTC Guild Shutting Down? This is the second time BTC Guild has announced closure, but this time the decision will not be reversed. The reasons have not changed much since the original announcement.

As mining has become more centralized, BTC Guild has continuously shrunk in proportion to the network, now being less than 3% of the network hash rate. The costs of running the pool have not changed, and the amount of funds at risk in the event of a compromise is significantly higher than what the pool could ever recover from. When the pool was 20-30% of the network, the amount of funds at risk was slightly higher, but the ability for the pool to recover from that loss was present. At 3% of the network, the pool would not be able to recover from such a loss.

Additionally, the NYDFS BitLicense regulations have now become finalized, and the final regulations have enough gray area that BTC Guild is at risk. The fact that BTC Guild is not in New York does not matter, since it would be doing business with New York residents while they are physically in New York. This fact makes it possible for New York to attempt to claim jurisdiction to enforce regulations. Whether or not BTC Guild could win in defense of such an attempt is irrelevant, since the cost of defending the pool would be greater than any income the pool is expected to generate going forward.

Finally, I have been growing concerned for some time now about attempts to defraud pools. The pool’s luck has been on a decline for over a year. The luck on a few other pools has also shown a negative trend. While it is not impossible that it’s a coincidence, this is something I have been constantly made aware of and am helpless against. There is no way to know whether it’s just bad luck, a small bug in older miners (BTC Guild probably has the highest percentage of first/second generation ASICs) resulting in a few % of block-solving shares to disappear, or a large pool trying to hurt the competition (many of the largest pools have large private mining operations now). It would only take a fraction (1 PH/s or less could do it) to cause significant harm to a competing pool, and that activity could be masked by proxies and multiple accounts to be impossible to catch.

The PPLNS shift length will be steadily reduced starting June 16th. This means that more shifts will likely end with 0 blocks, but shifts that find blocks will receive a larger amount than they would have previously. It is not recommended that users wait until the last minute to change pools.

The minimum balance for a manual withdrawal is reduced to 0.0001, and will not require a transaction fee to be paid in order to request the withdrawal.

Users will have until September 30, 2015 to issue the request for their final withdrawals.

The risk of users being cheated or stolen from as a result of transferring pool ownership is not something I am willing to accept. This is part of the reason the pool is closing in the first place: Risk of users losing funds because the pool would not be able to cover losses in the event of compromise.

I will not be entertaining offers on purchasing the pool this time around. There is no (reasonable) price the pool would be sold for.

Thank you to all the users and the Bitcoin community for making BTC Guild a success for the last four years. It has been hard to finally make this call a second time with the determination to not reverse the decision. You will still be able to find me around the Bitcoin Talk forums (outside of the Pools subsection for once), and on IRC in #btcguild (and probably #bitcoin once the pool winds down).

Read the rest here:
BTC Guild – Bitcoin Mining Pool

Online Marketing Tools and Reporting Software – Raven

 SEO  Comments Off on Online Marketing Tools and Reporting Software – Raven
Jul 222015
 

What if you could reclaim the time that tedious reporting wastes? With intuitive online marketing software, you can stop grinding away at your computer and be home in time for dinner.

Once you’re set up with Raven, you’ll be creating your first campaign in minutes building custom, mobile-ready reports. With automated, interactive marketing reports, Raven will be the time-saving hero to your team and a delight to your clients.

Read more here:
Online Marketing Tools and Reporting Software – Raven

Mannix Marketing – Award-Winning SEO, Optimized Web …

 SEO  Comments Off on Mannix Marketing – Award-Winning SEO, Optimized Web …
Jul 222015
 

Whether you need search engine optimization, a custom website, or anything in between, we’ve got you covered. Discover the latest strategies for helping your business Get Found online and convert more leads today!

SEO is part science, part art. With 17 years of digital marketing experience, we know the art and the science of successfully getting you found on the web.

Responsive websites designed with conversions and SEO in mind not only fit every screen from a mobile to a PC, they also return more traffic, leads and sales.

Inbound marketing solutions from an experienced digital marketing team produce qualified leads that convert to sales.

Unleash the power of regional marketing guides to get found locally: LakeGeorge.com, Saratoga.com, Albany.com, GlensFalls.com, CliftonPark.com and GuideToWilliamsburg.com.

Are you looking for advice, or an experienced team to handle your social media marketing? We know how social media marketing can grow your business.

It takes time and experience to manage Pay-Per-Click (PPC) campaigns in a cost-effective way that provides a return on your investment. Our experienced marketing consultants maximize your time and your ROI, letting you focus on running your business.

Are you being found by your regional customers? Over 70% use online search to find area businesses. Getting found makes a big difference to your bottom line.

What’s the use of a beautiful website and lots of traffic if you can’t convert leads to buyers? With conversion rate optimization (CRO), we’ll help you convert more leads to sales.

Top-of-mind email campaigns convert browsers to buyers. From set-up to delivery, we keep your message in front of your customers and grow your e-list.

Read the rest here:
Mannix Marketing – Award-Winning SEO, Optimized Web …

The Singularity Is Near – Wikipedia, the free encyclopedia

 The Singularity  Comments Off on The Singularity Is Near – Wikipedia, the free encyclopedia
Jul 212015
 

The Singularity Is Near: When Humans Transcend Biology is a 2005 non-fiction book about artificial intelligence and the future of humanity by inventor and futurist Ray Kurzweil.

The book builds on the ideas introduced in Kurzweil’s previous books, The Age of Intelligent Machines (1990) and The Age of Spiritual Machines (1999). This time, however, Kurzweil embraces the term the Singularity, which was popularized by Vernor Vinge in his 1993 essay “The Coming Technological Singularity” more than a decade earlier. The first known use of the term in this context was made in 1958 by the Hungarian born mathematician and physicist John von Neumann.

Kurzweil describes his law of accelerating returns which predicts an exponential increase in technologies like computers, genetics, nanotechnology, robotics and artificial intelligence. He says this will lead to a technological singularity in the year 2045, a point where progress is so rapid it outstrips humans’ ability to comprehend it.

Kurzweil predicts the technological advances will irreversibly transform people as they augment their minds and bodies with genetic alterations, nanotechnology, and artificial intelligence. Once the Singularity has been reached, Kurzweil says that machine intelligence will be infinitely more powerful than all human intelligence combined. Afterwards he predicts intelligence will radiate outward from the planet until it saturates the universe.

Kurzweil characterizes evolution throughout all time as progressing through six epochs, each one building on the one before. He says the four epochs which have occurred so far are Physics and Chemistry, Biology and DNA, Brains, and Technology. Kurzweil predicts the Singularity will coincide with the next epoch, The Merger of Human Technology with Human Intelligence. After the Singularity he says the final epoch will occur, The Universe Wakes Up.

Kurzweil explains that evolutionary progress is exponential because of positive feedback; the results of one stage are used to create the next stage. Exponential growth is deceptive, nearly flat at first until it hits what Kurzweil calls “the knee in the curve” then rises almost vertically. In fact Kurzweil believes evolutionary progress is super-exponential because more resources are deployed to the winning process. As an example of super-exponential growth Kurzweil cites the computer chip business. The overall budget for the whole industry increases over time, since the fruits of exponential growth make it an attractive investment; meanwhile the additional budget fuels more innovation which makes the industry grow even faster, effectively an example of “double” exponential growth.

Kurzweil says evolutionary progress looks smooth, but that really it is divided into paradigms, specific methods of solving problems. Each paradigm starts with slow growth, builds to rapid growth, and then levels off. As one paradigm levels off, pressure builds to find or develop a new paradigm. So what looks like a single smooth curve is really series of smaller S curves. For example Kurzweil notes that when vacuum tubes stopped getting faster and cheaper transistors became popular and continued the overall exponential growth.

Kurzweil calls this exponential growth the law of accelerating returns, and he believes it applies to many human-created technologies such as computer memory, transistors, microprocessors, DNA sequencing, magnetic storage, the number of Internet hosts, Internet traffic, decrease in device size, and nanotech citations and patents. Kurzweil cites two historical examples of exponential growth: the Human Genome Project and the growth of the Internet. Kurzweil claims the whole world economy is in fact growing exponentially, although short term booms and busts tend to hide this trend.

Moore’s Law predicts the capacity of integrated circuits grows exponentially, but not indefinitely. Kurzweil feels the increase in the capacity of integrated circuits will probably slow by the year 2020. He feels confident that a new paradigm will debut at that point to carry on the exponential growth predicted by his law of accelerating returns. Kurzweil describes four paradigms of computing that came before integrated circuits: electromechanical, relay, vacuum tube, and transistors. What technology will follow integrated circuits, to serve as the fifth paradigm, is unknown, but Kurzweil believes nanotubes are the most likely alternative among a number of possibilities:

nanotubes and nanotube circuitry, molecular computing, self-assembly in nanotube circuits, biological systems emulating circuit assembly, computing with DNA, spintronics (computing with the spin of electrons), computing with light, and quantum computing.

Continued here:

The Singularity Is Near – Wikipedia, the free encyclopedia

Eugenics – New World Encyclopedia

 Eugenics  Comments Off on Eugenics – New World Encyclopedia
Jul 212015
 

Eugenics is a social philosophy which advocates the improvement of human hereditary traits through various forms of intervention. The purported goals have variously been to create healthier, more intelligent people, save society’s resources, and lessen human suffering.

Earlier proposed means of achieving these goals focused on selective breeding, while modern ones focus on prenatal testing and screening, genetic counseling, birth control, in vitro fertilization, and genetic engineering. Opponents argue that eugenics is immoral and is based on, or is itself, pseudoscience. Historically, eugenics has been used as a justification for coercive state-sponsored discrimination and human rights violations, such as forced sterilization of persons with genetic defects, the killing of the institutionalized and, in some cases, genocide of races perceived as inferior. Today, however, the ideas developed from eugenics are used to identify genetic disorders that are either fatal or result in severe disabilities. While there is still controversy, some of this research and understanding may prove beneficial.

The word eugenics etymologically derives from the Greek words eu (good) and gen (birth), and was coined by Francis Galton in 1883.

The term eugenics is often used to refer to movements and social policies that were influential during the early twentieth century. In a historical and broader sense, eugenics can also be a study of “improving human genetic qualities.” It is sometimes broadly applied to describe any human action whose goal is to improve the gene pool. Some forms of infanticide in ancient societies, present-day reprogenetics, preemptive abortions, and designer babies have been (sometimes controversially) referred to as eugenic.

Eugenicists advocate specific policies that (if successful) would lead to a perceived improvement of the human gene pool. Since defining what improvements are desired or beneficial is, by many, perceived as a cultural choice rather than a matter that can be determined objectively (by empirical, scientific inquiry), eugenics has often been deemed a pseudoscience. The most disputed aspect of eugenics has been the definition of “improvement” of the human gene pool, such as what comprises a beneficial characteristic and what makes a defect. This aspect of eugenics has historically been tainted with scientific racism.

Early eugenicists were mostly concerned with perceived intelligence factors that often correlated strongly with social class. Many eugenicists took inspiration from the selective breeding of animals (where purebreds are valued) as their analogy for improving human society. The mixing of races (or miscegenation) was usually considered as something to be avoided in the name of racial purity. At the time this concept appeared to have some scientific support, and it remained a contentious issue until the advanced development of genetics led to a scientific consensus that the division of the human species into unequal races is unjustifiable. Some see this as an ideological consensus, since equality, just like inequality, is a cultural choice rather than a matter that can be determined objectively.

Eugenics has also been concerned with the elimination of hereditary diseases such as haemophilia and Huntington’s disease. However, there are several problems with labeling certain factors as “genetic defects.” In many cases there is no scientific consensus on what a “genetic defect” is. It is often argued that this is more a matter of social or individual choice. What appears to be a “genetic defect” in one context or environment may not be so in another. This can be the case for genes with a heterozygote advantage, such as sickle cell anemia or Tay-Sachs disease, which in their heterozygote form may offer an advantage against, respectively, malaria and tuberculosis. Many people can succeed in life with disabilities. Many of the conditions early eugenicists identified as inheritable (pellagra is one such example) are currently considered to be at least partially, if not wholly, attributed to environmental conditions. Similar concerns have been raised when a prenatal diagnosis of a congenital disorder leads to abortion.

Eugenic policies have been conceptually divided into two categories: Positive eugenics, which encourage a designated “most fit” to reproduce more often; and negative eugenics, which discourage or prevent a designated “less fit” from reproducing. Negative eugenics need not be coercive. A state might offer financial rewards to certain people who submit to sterilization, although some critics might reply that this incentive along with social pressure could be perceived as coercion. Positive eugenics can also be coercive. Abortion by “fit” women was illegal in Nazi Germany.

During the twentieth century, many countries enacted various eugenics policies and programs, including:

Most of these policies were later regarded as coercive, restrictive, or genocidal, and now few jurisdictions implement policies that are explicitly labeled as eugenic or unequivocally eugenic in substance (however labeled). However, some private organizations assist people in genetic counseling, and reprogenetics may be considered as a form of non-state-enforced “liberal” eugenics.

See the rest here:

Eugenics – New World Encyclopedia

Eugenics in the United States – Wikipedia, the free …

 Eugenics  Comments Off on Eugenics in the United States – Wikipedia, the free …
Jul 212015
 

Eugenics, the social movement claiming to improve the genetic features of human populations through selective breeding and sterilization,[1] based on the idea that it is possible to distinguish between superior and inferior elements of society,[2] played a significant role in the history and culture of the United States prior to its involvement in World War II.[3]

Eugenics was practised in the United States many years before eugenics programs in Nazi Germany[4] and U.S. programs provided much of the inspiration for the latter.[5][6][7] Stefan Khl has documented the consensus between Nazi race policies and those of eugenicists in other countries, including the United States, and points out that eugenicists understood Nazi policies and measures as the realization of their goals and demands.[5]

During the Progressive Era of the late 19th and early 20th century, eugenics was considered[by whom?] a method of preserving and improving the dominant groups in the population; it is now generally associated with racist and nativist elements[citation needed] (as the movement was to some extent a reaction to a change in emigration from Europe) rather than scientific genetics.

The American eugenics movement was rooted in the biological determinist ideas of Sir Francis Galton, which originated in the 1880s. Galton studied the upper classes of Britain, and arrived at the conclusion that their social positions were due to a superior genetic makeup.[8] Early proponents of eugenics believed that, through selective breeding, the human species should direct its own evolution. They tended to believe in the genetic superiority of Nordic, Germanic and Anglo-Saxon peoples; supported strict immigration and anti-miscegenation laws; and supported the forcible sterilization of the poor, disabled and “immoral”.[9] Eugenics was also supported by African Americans intellectuals such as W. E. B. Du Bois, Thomas Wyatt Turner, and many academics at Tuskegee University, Howard University, and Hampton University; however they believed the best blacks were as good as the best whites and The Talented Tenth” of all races should mix.[10] W. E. B. Du Bois believed only fit blacks should procreate to eradicate the races heritage of moral iniquity.”[10][11]

The American eugenics movement received extensive funding from various corporate foundations including the Carnegie Institution, Rockefeller Foundation, and the Harriman railroad fortune.[6] In 1906 J.H. Kellogg provided funding to help found the Race Betterment Foundation in Battle Creek, Michigan.[8] The Eugenics Record Office (ERO) was founded in Cold Spring Harbor, New York in 1911 by the renowned biologist Charles B. Davenport, using money from both the Harriman railroad fortune and the Carnegie Institution. As late as the 1920s, the ERO was one of the leading organizations in the American eugenics movement.[8][12] In years to come, the ERO collected a mass of family pedigrees and concluded that those who were unfit came from economically and socially poor backgrounds. Eugenicists such as Davenport, the psychologist Henry H. Goddard, Harry H. Laughlin, and the conservationist Madison Grant (all well respected in their time) began to lobby for various solutions to the problem of the “unfit”. Davenport favored immigration restriction and sterilization as primary methods; Goddard favored segregation in his The Kallikak Family; Grant favored all of the above and more, even entertaining the idea of extermination.[13] The Eugenics Record Office later became the Cold Spring Harbor Laboratory.

Eugenics was widely accepted in the U.S. academic community.[6] By 1928 there were 376 separate university courses in some of the United States’ leading schools, enrolling more than 20,000 students, which included eugenics in the curriculum.[14] It did, however, have scientific detractors (notably, Thomas Hunt Morgan, one of the few Mendelians to explicitly criticize eugenics), though most of these focused more on what they considered the crude methodology of eugenicists, and the characterization of almost every human characteristic as being hereditary, rather than the idea of eugenics itself.[15]

By 1910, there was a large and dynamic network of scientists, reformers and professionals engaged in national eugenics projects and actively promoting eugenic legislation. The American Breeders Association was the first eugenic body in the U.S., established in 1906 under the direction of biologist Charles B. Davenport. The ABA was formed specifically to investigate and report on heredity in the human race, and emphasize the value of superior blood and the menace to society of inferior blood.” Membership included Alexander Graham Bell, Stanford president David Starr Jordan and Luther Burbank.[16][17] The American Association for the Study and Prevention of Infant Mortality was one of the first organizations to begin investigating infant mortality rates in terms of eugenics.[18] They promoted government intervention in attempts to promote the health of future citizens.[19][verification needed]

Several feminist reformers advocated an agenda of eugenic legal reform. The National Federation of Womens Clubs, the Womans Christian Temperance Union, and the National League of Women Voters were among the variety of state and local feminist organization that at some point lobbied for eugenic reforms.[20]

One of the most prominent feminists to champion the eugenic agenda was Margaret Sanger, the leader of the American birth control movement. Margaret Sanger saw birth control as a means to prevent unwanted children from being born into a disadvantaged life, and incorporated the language of eugenics to advance the movement.[21][22] Sanger also sought to discourage the reproduction of persons who, it was believed, would pass on mental disease or serious physical defect. She advocated sterilization in cases where the subject was unable to use birth control.[21] Unlike other eugenicists, she rejected euthanasia.[23] For Sanger, it was individual women and not the state who should determine whether or not to have a child.[24][25]

In the Deep South, womens associations played an important role in rallying support for eugenic legal reform. Eugenicists recognized the political and social influence of southern clubwomen in their communities, and used them to help implement eugenics across the region.[26] Between 1915 and 1920, federated womens clubs in every state of the Deep South had a critical role in establishing public eugenic institutions that were segregated by sex.[27] For example, the Legislative Committee of the Florida State Federation of Womens Clubs successfully lobbied to institute a eugenic institution for the mentally retarded that was segregated by sex.[28] Their aim was to separate mentally retarded men and women to prevent them from breeding more feebleminded” individuals.

See the original post:

Eugenics in the United States – Wikipedia, the free …

What is Bitcoin? Learn everything you need to know. What …

 Bitcoin  Comments Off on What is Bitcoin? Learn everything you need to know. What …
Jul 052015
 

Why Bitcoin Popular Opinion What is Bitcoin?

With the Bitcoin price so volatile everyone is curious. Bitcoin is extremely complicated and no one definition fully encapsulates it. By analogy it is like being able to send a gold coin via email. It is a consensus network that enables a new payment system and a completely digital money.

It is the first decentralized peer-to-peer payment network that is powered by its users with no central authority or middlemen. Bitcoin was the first practical implementation and is currently the most prominent triple entry bookkeeping system in existence.

The first Bitcoin specification and proof of concept was published in 2009 by an unknown individual under the pseudonym Satoshi Nakamoto who revealed little about himself and left the project in late 2010. The Bitcoin community has since grown exponentially.

Satoshi’s anonymity often raises unjustified concerns because of a misunderstanding of the open-source nature of Bitcoin. Everyone has access to all of the source code all of the time and any developer can review or modify the software code. As such, the identity of Bitcoin’s inventor is probably as relevant today as the identity of the person who invented paper.

Nobody owns the Bitcoin network much like no one owns the technology behind email or the Internet. Bitcoin transactions are verified by Bitcoin miners which has an entire industry and Bitcoin cloud mining options. While developers are improving the software they cannot force a change in the Bitcoin protocol because all users are free to choose what software and version they use.

In order to stay compatible with each other, all users need to use software complying with the same rules. Bitcoin can only work correctly with a complete consensus among all users. Therefore, all users and developers have a strong incentive to protect this consensus.

From a user perspective, Bitcoin is nothing more than a mobile app or computer program that provides a personal Bitcoin wallet and enables a user to send and receive bitcoins.

Behind the scenes, the Bitcoin network is sharing a massive public ledger called the “block chain”. This ledger contains every transaction ever processed which enables a user’s computer to verify the validity of each transaction. The authenticity of each transaction is protected by digital signatures corresponding to the sending addresses therefore allowing all users to have full control over sending bitcoins.

Thus, there is no fraud, no chargebacks and no identifying information that could be compromised resulting in identity theft. To learn more about Bitcoin, you can consult the original Bitcoin whitepaper, read through the extremely thorough Frequently Asked Questions, listen to a Bitcoin podcast or read the latest Bitcoin news.

Read the original post:
What is Bitcoin? Learn everything you need to know. What …

Transhuman Treachery – TV Tropes

 Transhuman  Comments Off on Transhuman Treachery – TV Tropes
Jul 022015
 

When given powers or made non-human, characters gladly betray humanity and side with their creator. Part of the Horror of being infected by The Virus is its ability to corrupt the mind of a victim, subordinating them into a Hive Mind or outright making them a sociopathic shell of their former self, intent only on killing or infecting their former loved ones. But then there’s times that a transformation doesn’t brainwash, de-soul, drive insane, or demonically possess the victim. Other times the Viral Transformation causes changes that are purely cosmetic, granting amazing abilities albeit at great cost and (usually) a horrifying appearance. So what do these unwilling tranformees do? Become Phlebotinum Rebels or Vampire Refugees and use their powers to fight these monsters? Nope. They engage in Transhuman Treachery. They sell out humanity and ally with who- or what-ever did this to them, regardless of whether or not they wanted to kill all vampires, robots, mutants, or aliens five minutes ago. There is no shock, only joy at becoming “more” than human and being able to flout society’s rules. If this Face-Heel Turn is too quick, it gives the impression that one of the other things is going, like The Dark Side, or With Great Power Comes Great Insanity. However; this trope may be justified a couple of ways. If The Mind Is a Plaything of the Body it doesn’t matter that vampire Dan doesn’t want to drink human blood, he has to, and trying to be friendly won’t last. Alternately, someone seeking the Curse That Cures may make the painful choice to switch sides to save their life. If the setting has an ongoing “race war” against what the character has become, if they don’t join their new race they’ll quickly face death. However most of the time the switch in alliances comes about with alarming speed and lack of concern. At best you’ll see these Big Bad Friends offer the transformation to a friend or loved one… and kill them if they refuse. The Dark Side, they have cookies. It seems resisting these new biological impulses or avoiding becoming drunk on power is reserved solely for protagonists with Heroic Willpower. A possible cause of Beware the Superman, this is the third sin in the Scale of Scientific Sins. Compare Sheep in Wolf’s Clothing and Species Loyalty. Contrast Monsters Anonymous. May lead to forming an Anti-Human Alliance. Opposite Trope to Pro-Human Transhuman or Humanity Is Infectious, depending on the details.

open/close all folders

Anime

Comic Books

Fanfic

Film

LARP

Literature

Live-Action TV

Tabletop Games

Read this article:
Transhuman Treachery – TV Tropes

Tax Havens

 Tax Havens  Comments Off on Tax Havens
Jun 032015
 

Offshore tax havens were once associated with very wealthy individuals, which is no longer the case nowadays. More than a decade ago we, a group of lawyers and accountants, started using offshore havens for our own investment purposes. The use of offshore entities in tax havens proved to be a wise and rewarding decision. We started off by providing these same services to friends and family, and then in 2002 we expanded our services, which proved to be a success, because we are still offering very personal services for our friends and families and a large customer base and at low-costs.

We have our sister companies or our lawyers licensed to provide offshore services in all tax havens that we offer, so you can be assured that our services are regulated and in all these districts, strict confidentiality is assured by law.

We sell two several types of tax free or low tax company packages. The International Business Corporation, IBC , the Limited Liability Company, LLC, the UK Limited Liability Partnership and US LLCs.

We offer fast, low cost and professional offshore company incorporation services online in Anguilla, Belize, BVI, Dominica, Gibraltar, Nevis, Panama and Seychelles. We also make sure we have the full range of supplementary services, such as bank accounts in well established banks in Europe and the Caribbean.

We offer offshore trust formation services in Belize and Nevis, two places that, in our opinion, offer best legislation for the trust . The trust is well suited for asset protection and wealth planning.

We offer offshore foundations formation, and registration services offshore foundations which have a similar concept to the trust, but have a legal personality on their own and are based on a mixture of civil and common law concepts. Offshore Private Interest Foundations have gained significant popularity among professionals and private investors and have been successfully utilized for asset protection and inheritance planning. We sell foundations from countries that have rewritten modern and attractive laws for the foundation . The following offshore foundations are offered by our company: Anguilla Foundation, Belize International Foundation, Nevis Multiform Foundation and Panama Private Interest Foundation.

Inour highly litigated world every business person orwealthy individual has toadopt some kind ofasset protection structure. Properly utilized offshore asset protection strategies will protect your wealth and property inthe best possible manner. Weoffer specially designed bulletproof offshore asset protection packages that include the trust orfoundation, anLLCor anIBC.

Our main clients are businessmen and individual investors who wish toreorganize orexpand their businesses inamore profitable way, save ontax payments orsafeguard their investments inasafe haven environment. Wealso provide services tocorporate clients, some ofwhom are multinational well recognized companies.

Please take your time tobrowse through our website. Wehope that you find the answers toyour questions and chooseus tobecome your offshore service provider.

More here:
Tax Havens

Illuminati Essays

 Illuminati  Comments Off on Illuminati Essays
Jun 032015
 

Views 15

This article is about the secret society. For the film, see Illuminata (film). For the Muslim esoteric school, see Illuminationism. For other uses, see Illuminati (disambiguation).

Adam Weishaupt (17481830), founder of the Bavarian Illuminati

The Illuminati (plural of Latin illuminatus, enlightened) is a name given to several groups, both real and fictitious. Historically, the name refers to the Bavarian Illuminati, anEnlightenment-era secret society founded on May 1, 1776. The societys goals were to oppose superstition, obscurantism, religious influence over public life and abuses ofstate power. The order of the day, they wrote in their general statutes, is to put an end to the machinations of the purveyors of injustice, to control them without dominating them.[1] The Illuminatialong with Freemasonry and other secret societieswere outlawed through Edict, by the Bavarian ruler, Charles Theodore, with the encouragement of the Roman Catholic Church, in 1784, 1785, 1787 and 1790.[2] In the several years following, the group was vilified by conservative and religious critics who claimed that they continued underground and were responsible for the French Revolution.

In subsequent use, Illuminati refers to various organisations which claim or are purported to have links to the original Bavarian Illuminati or similar secret societies, though these links are unsubstantiated. They are often alleged to conspire to control world affairs, by masterminding events and planting agents in government and corporations, in order to gain political power and influence and to establish a New World Order. Central to some of the most widely known and elaborate conspiracy theories, the Illuminati have been depicted as lurking in the shadows and pulling the strings and levers of power in dozens of novels, movies, television shows, comics, video games and music videos.

The Owl of Minerva perched on a book was an emblem used by the Bavarian Illuminati in their Minerval degree.

Adam Weishaupt (1748-1830) was a professor of Canon Law and Practical philosophy at the University of Ingolstadt. He was the only non-clerical professor at an institution run by Jesuits, whose order had been dissolved in 1773. The Jesuits of Ingolstadt, however, still retained the purse strings and some power at the University, which they continued to regard as their own. Constant attempts were made to frustrate and discredit non-clerical staff, especially when course material contained anything they regarded as liberal or Protestant. Weishaupt became deeply anti-clerical, resolving to spread the ideals of the Enlightenment (Aufklrung) through some sort of secret society of like-minded individuals.[3]

Finding Freemasonry to be expensive, and not open to his ideas, he founded his own society which was to have a gradal system based on Freemasonry, but his own agenda.[3] His original name for the new order was Bund der Perfektibilisten, or Covenant of Perfectibility, but quickly changed it because it sounded too strange.[4] On 1 May 1776 Weishaupt and four students formed the Illuminatenorden, or Order of Illuminati, taking the Owl of Minerva as their symbol.[5][6] The members were to use aliases within the society. Weishaupt became Spartacus. Law students Massenhausen, Bauhof, Merz and Sutor became respectively Ajax, Agathon, Tiberius and Erasmus Roterodamus. Weishaupt later expelled Sutor for indolence.[7][8]

Massenhausen was initially the most active in expanding the society. Significantly, while studying in Munich shortly after the formation of the order, he recruited Xavier von Zwack, a former pupil of Weishaupt at the beginning of a significant administrative career. (At the time, he was in charge of the Bavarian National Lottery). Massenhausens enthusiasm soon became a liability in the eyes of Weishaupt, often attempting to recruit unsuitable candidates. Later, his erratic love-life made him neglectful, and as Weishaupt passed control of the Munich group to Zwack, it became clear that Massenhausen had misappropriated subscriptions and intercepted correspondence between Weishaupt and Zwack. In 1778, Massenhausen graduated and took a post outside Bavaria, taking no further interest in the order. At this time, the order had a nominal membership of twelve.[7]

With the departure of Massenhausen, Zwack immediately applied himself to recruiting more mature and important recruits. Most prized by Weishaupt was Hertel, a childhood friend and a canon of the Munich Frauenkirche. By the end of summer 1778 the order had 27 members (still counting Massenhausen) in 5 commands; Munich (Athens), Ingolstadt (Eleusis), Ravensberg (Sparta), Freysingen (Thebes), and Eichstaedt (Erzurum).[7]

Go here to see the original:
Illuminati Essays

Second Amendment | Wex Legal Dictionary / Encyclopedia …

 Second Amendment  Comments Off on Second Amendment | Wex Legal Dictionary / Encyclopedia …
May 282015
 

The Second Amendment of the United States Constitution reads: “A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.” Such language has created considerable debate regarding the Amendment’s intended scope. On the one hand, some believe that the Amendment’s phrase “the right of the people to keep and bear Arms” creates an individual constitutional right for citizens of the United States. Under this “individual right theory,” the United States Constitution restricts legislative bodies from prohibiting firearm possession, or at the very least, the Amendment renders prohibitory and restrictive regulation presumptively unconstitutional. On the other hand, some scholars point to the prefatory language “a well regulated Militia” to argue that the Framers intended only to restrict Congress from legislating away a state’s right to self-defense. Scholars have come to call this theory “the collective rights theory.” A collective rights theory of the Second Amendment asserts that citizens do not have an individual right to possess guns and that local, state, and federal legislative bodies therefore possess the authority to regulate firearms without implicating a constitutional right.

In 1939 the U.S. Supreme Court considered the matter in United States v. Miller. 307 U.S. 174. The Court adopted a collective rights approach in this case, determining that Congress could regulate a sawed-off shotgun that had moved in interstate commerce under the National Firearms Act of 1934 because the evidence did not suggest that the shotgun “has some reasonable relationship to the preservation or efficiency of a well regulated milita . . . .” The Court then explained that the Framers included the Second Amendment to ensure the effectiveness of the military.

This precedent stood for nearly 70 years when in 2008 the U.S. Supreme Court revisited the issue in the case of District of Columbia v. Heller (07-290). The plaintiff in Heller challenged the constitutionality of the Washington D.C. handgun ban, a statute that had stood for 32 years. Many considered the statute the most stringent in the nation. In a 5-4 decision, the Court, meticulously detailing the history and tradition of the Second Amendment at the time of the Constitutional Convention, proclaimed that the Second Amendment established an individual right for U.S. citizens to possess firearms and struck down the D.C. handgun ban as violative of that right. The majority carved out Miller as an exception to the general rule that Americans may possess firearms, claiming that law-abiding citizens cannot use sawed-off shotguns for any law-abiding purpose. Similarly, the Court in its dicta found regulations of similar weaponry that cannot be used for law-abiding purposes as laws that would not implicate the Second Amendment. Further, the Court suggested that the United States Constitution would not disallow regulations prohibiting criminals and the mentally ill from firearm possession.

Thus, the Supreme Court has revitalized the Second Amendment. The Court continued to strengthen the Second Amendment through the 2010 decision inMcDonald v. City of Chicago(08-1521). The plaintiff inMcDonaldchallenged the constitutionally of the Chicago handgun ban, which prohibited handgun possession by almost all private citizens. In a 5-4 decisions, the Court, citing the intentions of the framers and ratifiers of the Fourteenth Amendment, held that the Second Amendment applies to the states through theincorporation doctrine.However, the Court did not have a majority on which clause of the Fourteenth Amendment incorporates the fundamental right to keep and bear arms for the purpose of self-defense. While Justice Alito and his supporters looked to the Due Process Clause, Justice Thomas in his concurrence stated that the Privileges and Immunities Clause should justify incorporation.

However, several questions still remain unanswered, such as whether regulations less stringent than the D.C. statute implicate the Second Amendment, whether lower courts will apply their dicta regarding permissible restrictions, andwhat level of scrutiny the courts should apply when analyzing a statute that infringes on the Second Amendment.

Recent case law since Heller suggests that courts are willing to, for example, uphold

See constitutional amendment.

Read the original here:
Second Amendment | Wex Legal Dictionary / Encyclopedia …

Cosmic Heaven: Sun, Moon and Flat Earth – A Living School

 Cosmic  Comments Off on Cosmic Heaven: Sun, Moon and Flat Earth – A Living School
May 102015
 

Of all the beings in the Universe, only Man is given an experience like this, only Man striving for creation and co-creation under the great impulsion of love.

Humanity is not bad, but the devices of the dark forces obscure spirituality preventing him from experiencing God-given grace.

(Music: Toni Castells & Lyrics: Anastasia & Vladimir Megr)

https://youtu.be/hSL0Z-eru4E

Or go to Rome, which is the sepulchre, Oh, not of him, but of our joy: ’tis nought That ages, empires, and religions, there Lie buried in the ravage they have wrought; For such as he can lend, – they borrow not Glory from those who made the world their prey; And he is gathered to the kings of thought Who waged contention with their time’s decay, And of the past are all that cannot pass away.

XLVIII, Adonais, Percy Bysshe Shelley, spring 1821 (An elegy on the death of John Keats)

Sun, Moon and Flat Earth:

Knowing this, that of a religious image called the “ball Earth” that has been sold children for over fifty years from early ages (and even for five centuries at least), how can we know that we are not just trapped in a thirteenth century virtual reality deprives us of all native orientation to our land and cosmos (to each other, though the cells of our bodies and the people of the world, poisoning the well of all cellular and super-cellular communication through a psychopathic world-brain) but for a level of daily utility married to a proportional loss of native brain function accepts this, depends upon this and even protects this as normal with our very lives; or that any science, from nuclear physics to genetic biology, is any more “real” (or as useful) than the corporate fiction of any religious cult, much after the cultural microprocessor of Rome?

“Then let us throw caution to the wind and abbreviate a def. of fascism as a monopoly (through force and faith, often the same thing) on all of the means and resources of production and subsequently money and power. That is the microprocessor of all economies and ideologies today. Then you can spread whatever kind of fertilizer (or bullshit) you want on top of it. Capisce?

“State fascism (the corporate articulation amidst in order to gain the corporate human animation of systemic disorientation and tax farming of man, woman and child, based on a tacit monopoly on force and faith)” – Axiom 283 – Fascist Microprocessor

View original post here:
Cosmic Heaven: Sun, Moon and Flat Earth – A Living School

The NSA wants front door access to your encrypted data

 NSA  Comments Off on The NSA wants front door access to your encrypted data
Apr 142015
 

Last December, I had the opportunity to travel to the Netherlands to meet with multiple European tech companies, web hosts, and other infrastructure providers. The topic of intelligence agency backdoors and US corporate involvement with such policies came up more than once, often in not-entirely-friendly ways. Its therefore refreshing to see the head of the NSA, Admiral Michael S. Rogers, state up front that the NSA isnt interested in a backdoor solution to digital surveillance. Instead, he wants a so-called front-door solution which could be even worse.

Instead of handing the NSA a unilateral window into encrypted communications taking place at Google or Apple, Rogers suggested a future in which the encryption keys to access such information would be divided between at least two groups possibly more. In the simplest example, Google would retain half the key, while the NSA held the other half. Thus, the agency wouldnt be able to unilaterally snoop inside anyones files it would need Googles support.

I dont want a back door, Rogers, the director of the nations top electronic spy agency, said during a speech at Princeton University, according to the Washington Post. I want a front door. And I want the front door to have multiple locks. Big locks.

The first problem with Rogers proposed front-door solution is that its a meaningless feel-good measure given the current regulatory structure of our national security system. Before the Snowden leaks, Google, Microsoft, and other digital providers were forbidden from disclosing that theyd received national security letters, even in aggregate. Thanks to Snowden, we now know that Yahoo went to bat for users, challenging the legality and authority of the NSA and lost, every time.

Giving half a key to Google or Yahoo would be meaningless unless the company possesses the authority to refuse to use it. In theory, the court system offers robust oversight of how such capabilities are used. In practice, the FISA court has operated more like a rubber stamp body than an organization devoted to judicial oversight. The government, as a whole, doesnt currently have a great track record of respecting suspects rights the FBI is on record as ordering local police departments to drop cases rather than disclose how secret stingray hardware may have been used in ways that fundamentally violate those suspects Fourth Amendment rights.

The other systemic problem with Rogers suggestion is that it assumes a degree of trust between corporations and government at a time when such good feelings are at an all-time low. The NSA has demonstrated no practical ability to differentiate between friend and foe. Its decision to hoover up data running across Googles transatlantic cables may have been legal, but it illustrated a total lack of respect for Google and a willingness to resort to extrajudicial methods when it was convenient.

The NSA could avoid this problem by sharing the key with government-appointed escrows rather than corporations, but this simply hides the process from public view. Thats already extremely problematic.

The technological problems with the NSAs front-door policy are formidable. The divide the key among trusted parties, approach isnt new the NSA proposed exactly this method of securing its ill-fated Clipper Chip in the early 1990s. At the time, the newly-formed EFF and other consumer advocacy agencies battled the NSAs proposed system, noting that it exposed citizens to increased surveillance while providing no assurance that the cryptographic standard, dubbed Skipjack, was actually secure.

Many of these questions would remain in any escrow system the government dreamed up today. The basic question is, is it possible to design a completely secure system to hold a master key available to the U.S. government but not adversaries, said Donna Dodson, chief cybersecurity adviser at the Commerce Departments National Institute of Standards and Technologies. Theres no way to do this where you dont have unintentional vulnerabilities.

Hackers, generally speaking, dont go after the code itself or attempt to brute-force it instead, they work to compromise the organizations that hold the keys, or find other avenues of attack. Splitting the key into parts is only an advantage if the parts cant be combined or analyzed for clues to the final key structure. In order to function properly, every escrow needs to be secure, and every one-time access key needs to be destroyed.

Read more here:
The NSA wants front door access to your encrypted data

Twenty-second Amendment to the United States Constitution

 Second Amendment  Comments Off on Twenty-second Amendment to the United States Constitution
Apr 142015
 

The Twenty-second Amendment of the United States Constitution sets a term limit for election to the office of President of the United States. Congress passed the amendment on March 21, 1947. It was ratified by the requisite number of states on February 27, 1951.

Section 1. No person shall be elected to the office of the President more than twice, and no person who has held the office of President, or acted as President, for more than two years of a term to which some other person was elected President shall be elected to the office of the President more than once. But this article shall not apply to any person holding the office of President when this article was proposed by the Congress, and shall not prevent any person who may be holding the office of President, or acting as President, during the term within which this article becomes operative from holding the office of President or acting as President during the remainder of such term.

Section 2. This article shall be inoperative unless it shall have been ratified as an amendment to the Constitution by the legislatures of three-fourths of the several states within seven years from the date of its submission to the states by the Congress.

Historians point to George Washington’s decision not to seek a third term as evidence that the founders saw a two-term limit as a bulwark against a monarchy, although his Farewell Address suggests that he was not seeking re-election because of his age. Thomas Jefferson also contributed to the convention of a two-term limit when he wrote in 1807, “if some termination to the services of the chief Magistrate be not fixed by the Constitution, or supplied by practice, his office, nominally four years, will in fact become for life.”[1] Jeffersons immediate successors, James Madison and James Monroe, adhered to the two-term principle as well. In a new political atmosphere several years later, Andrew Jackson continued the precedent.

Prior to Franklin D. Roosevelt, few Presidents attempted to serve for more than two terms. Ulysses S. Grant sought a third term in 1880 after serving from 1869 to 1877, but narrowly lost his party’s nomination to James Garfield. Grover Cleveland tried to serve a third term (and second consecutive term) in 1896, but did not have enough support in the wake of the Panic of 1893. Cleveland lost support to the Silverites led by William Jennings Bryan, and declined to head the Gold Democrat ticket, though he did endorse the Gold Democrats. Theodore Roosevelt succeeded to the presidency upon William McKinley’s assassination and was himself elected in 1904 to a full term, serving from 1901 to 1909. He sought to be elected to a (non-consecutive) term in 1912 but lost to Woodrow Wilson. Wilson himself tried to get a third term in 1920,[citation needed] by deadlocking the convention. Wilson deliberately blocked the nomination of his Secretary of the Treasury and son-in-law, William Gibbs McAdoo. However, Wilson was too unpopular even within his own party at the time, and James M. Cox was nominated. In 1940, Franklin D. Roosevelt became the only president to be elected to a third term; supporters cited the war in Europe as a reason for breaking with precedent.

In the 1944 election, during World War II, Roosevelt won a fourth term but suffered a cerebral hemorrhage and died in office the following year. Thus, Franklin Roosevelt was the only President to have served more than two terms. Near the end of the 1944 campaign, Republican nominee Thomas E. Dewey, the governor of New York, announced support of an amendment that would limit future presidents to two terms. According to Dewey, “Four terms, or sixteen years, is the most dangerous threat to our freedom ever proposed.”[2]

The Republican-controlled 80th Congress approved a 22nd Amendment in March 1947;[3] it was signed by Speaker of the House Joseph W. Martin and acting President pro tempore of the Senate William F. Knowland.[4] Nearly four years later, in February 1951, enough states ratified the amendment for its adoption. While excluded from the amendment’s restrictions, then-President Harry S. Truman ultimately decided not to seek another term in 1952.[3]

The Congress proposed the Twenty-second Amendment on March 24, 1947.[5] The proposed amendment was adopted on February 27, 1951. The following states ratified the amendment:

Ratification was completed on February 27, 1951. The amendment was subsequently ratified by the following states:

In addition, the following states voted to reject the amendment:

Read more here:
Twenty-second Amendment to the United States Constitution

5 SEO Tactics You Can Stop Using

 SEO  Comments Off on 5 SEO Tactics You Can Stop Using
Apr 142015
 

Are you still using outdated, ineffective SEO strategies? Im not talking about black hat SEO strategies that will destroy your site; I hope by this point most business owners have left those behind. Im talking about strategies that used to be effective, and that many webmasters still do out of habit but that dont actually do anything to improve our rankings.

Stop wasting your time on strategies that are ineffective (at best) and harmful (at worst). This article will examine five strategies you can stop using immediately.

1.Targeting single keywords

Its long past time to stop chasing after highly-competitive, highly-generalized keywords. The mindset used to be that more search traffic was always better even if that traffic was largely irrelevant to your business or website. For instance, ranking for a keyword like dogs would send you hundreds of thousands of visitors, but if your goal was to sell your dog training services, most visitors would be unlikely to convert.

Today, were much more concerned with driving highly-relevant, highly-targeted traffic. Visitors who are actually looking for what we offer and who are likely to buy what were selling. This is why its so important to focus on long-tail keywords.

Long-tail phrases are less popular and thus easier to rank for; and the best part is that they more closely match the intent of the user. For instance, using the example above, it would be far more lucrative to rank highly for dog training Seattle than dogs, even though ranking for dogs would send much more traffic. In 2015, its better to focus on the quality of the search traffic youll receive rather than the quantity.

2.Using keyword-rich anchor text

Using diverse yet descriptive anchor text is good; using the same anchor text again and again isnt. Google needs to see a natural link profile, not one thats been carefully planned and built solely as a means of ranking for certain keywords.

View original post here:
5 SEO Tactics You Can Stop Using

Tolerance is as vital as free speech

 Free Speech  Comments Off on Tolerance is as vital as free speech
Apr 142015
 

In her book “The Friends of Voltaire,” Evelyn Beatrice Hall wrote, I do not agree with a word you say, but I will defend to the death your right to say it. Unfortunately, free speech is again under attack. The recent debacle with the French magazine Charlie Hebdo is but the most recent in a line of assaults. In this struggle, the enemy is the culture of political correctness.

Earlier this year, Islamic terrorists carried out an atrocious attack on Charlie Hebdos Parisian headquarters. This attack claimed the lives of 12 people and injured 11 more. The source of the terrorists motives dwelled with the magazines history of publishing cartoons that they claimed were offensive in its portrayals of the prophet Muhammad.

In the wake of the attack, many expressed solidarity for Charlie Hebdo by rallying behind the slogan, Je suis Charlie [I am Charlie]. Inspired by a defiant spirit of freedom, the magazine published what has been dubbed a survivors issue. The cover of this issue unapologetically depicts Muhammad on the cover holding a sign that reads, Je suis Charlie, as a single tear trickles from his eye. And yet, many news companies refused to either print or show the cover, citing a desire not to offend.

Political correctness in American society holds that some topics may not be discussed for fear of being impertinent. There is merit in this doctrine. Harvard psychology professor Steven Pinker has spoken about how this politically correct culture arose as a response to some very big problems. During the early to mid-19th century, many doctrinesparticularly in regard to racewere simply rude, insensitive and unacceptable.

Profanity, vulgarity, tastelessness, racism and discrimination (amongst other things) should not have a place in a civilized and enlightened society. British author Alfred George Gardiner captured this quite well when he wrote, A reasonable consideration for the rights or feelings of others is the foundation of social conduct.

From this, it would follow that speech that is detrimental to order and coexistence should be discouraged. The question is whether the caricature of Muhammad in Charlie Hebdo was indeed harmful to either individual persons or society as a whole. It is very hard to point to an injury in fact resulting from this harmless cartoon. Many people feel that these cartoons are insulting, and they are entitled to feel this way. But one does not have a right not to be insulted.

The English philosopher John Stuart Mill discussed free speech extensively in his famous essay On Liberty. He said that the benefits of free speech are not for the one speaking, but rather for society as a whole. This sounds counterintuitive, but Mill has a strong argument.

The only way that truth may be discovered is through free and open discourse. If a new idea is correct, then society benefits through a replacement or augmentation of previous opinions. And if a new idea is wrong, then society benefits from an exercise in understanding why the received opinion is right. No truth is so firmly situated that it cannot be questioned. Bertrand Russell once said that, In all affairs, love, religion, politics or business, its a healthy idea, now and then, to hang a question mark on things you have long taken for granted.

Truth is not a democracy, as truth exists regardless of whether one believes in it. Yet the way that truth is uncovered is democratic. And through this democratic process, ones perceptions of reality can be made better to reflect reality as it is. Truth does not always win out in the marketplace of ideas, but in the end, it will triumph. As Freud said, The voice of reason is small but persistent.

Political correctness can be seen as a barrier to free speech, as it prevents certain claims from being made. Many of the greatest ideas that the human mind has conceived must have seemed revolutionary and insulting in their time. Copernicus, Darwin, Marx and Einstein all broke with the status quo and insulted a great many people. Yet humanity would be the worse without their contributions.

More:
Tolerance is as vital as free speech

Thailand Vlogs| Beaches | Room Tour (5/5) – Video

 Beaches  Comments Off on Thailand Vlogs| Beaches | Room Tour (5/5) – Video
Apr 122015
 



Thailand Vlogs| Beaches | Room Tour (5/5)
Hey guys! Hubby and I decided to head to Thailand for our 1 year anniversary. I thought this would be a great start to vlogging and decided to share our time in Bangkok along with a bit of…

By: Melissa Perkins

See the rest here:
Thailand Vlogs| Beaches | Room Tour (5/5) – Video

Ben Carson Speaks on Second Amendment at NRA Leadership Forum – Video

 Second Amendment  Comments Off on Ben Carson Speaks on Second Amendment at NRA Leadership Forum – Video
Apr 122015
 



Ben Carson Speaks on Second Amendment at NRA Leadership Forum
Ben Carson addresses the 144th annual NRA Annual Leadership Meeting. The potential GOP presidential candidate used his time to clarify his stance on the Second Amendment. “For the record let…

By: Lord Rothschild

Read more here:
Ben Carson Speaks on Second Amendment at NRA Leadership Forum – Video

Religious Liberty Becomes the Byword Among Iowas Social Conservatives

 Liberty  Comments Off on Religious Liberty Becomes the Byword Among Iowas Social Conservatives
Apr 112015
 

TIME Politics 2016 Election Andrea MoralesGetty Images Demonstrators protest during a press conference by the Human Rights Campaign on the steps of the Arkansas State Capital in Little Rock, Ark. on April 1, 2015.

Conservative activist Bob Vander Plaats had just one question for the four presidential hopefuls gathered in the chapel at Iowa Wesleyan University: How would they preserve religious liberty?

Its an idea as old as the country, but for the 600 people in the audience and social conservatives elsewhere in Iowa, religious liberty is fast becoming a new litmus test for Republican presidential candidates, thanks to a recent uproar over religious freedom legislation in Indiana and Arkansas.

Hosted by Vander Plaats Family Leader organization, the event Thursday was designed to make Iowa ground zero on the issue. For their part, the candidates responses showed broad agreement that religious freedom in general and Christianity in particular are under assault from the federal government.

It is wrong for our government to discriminate against Christians, Louisiana Gov. Bobby Jindal told the crowd at Iowa Wesleyan, listing off a litany of alleged sins, from requirements that employer healthcare plans include contraceptive coverage to anti-discrimination laws that dont allow businesses to reject work on same-sex weddings. It is wrong for our government to force these businesses to choose between going out of business or violating our sincere beliefs.

The event, which also featured former Texas Gov. Rick Perry, former Arkansas Gov. Mike Huckabee and former Pennsylvania Sen. Rick Santorum, capped a day of GOP candidates scurrying to drive up their support with evangelical voters. Earlier in the day theyalong with Texas Sen. Ted Cruzattended a homeschooler conference hosted by the Network of Iowa Christian Home Educators in the state capital.

The last few weeks have been heartbreaking with what weve seen in Indiana and Arkansas, Cruz told the roomful of about 1,000 homeschooling parents and children. Weve seen religious liberty under assault.

Religious liberty, Vander Plaats said, will be the key issue of the 2016 campaign in Iowa.

The gatherings drew little in the way of disagreement. I look at them not as opponents, but as colleagues, Huckabee said of his fellow contenders at the evening summit. Perry opened his speech at the Family Leader praising Santorum as a national leader of the pro-life movement and Jindal for his efforts on job promotion at home.

But beneath the agreement was the hard reality that all five hopefuls are depending on the same united social conservative bloc to bring them over the finish line, and right now it is split between all of them as well as Wisconsin Gov. Scott Walker.

Originally posted here:
Religious Liberty Becomes the Byword Among Iowas Social Conservatives




Pierre Teilhard De Chardin | Designer Children | Prometheism | Euvolution | Transhumanism