Phillip Schneider, Staff
Monsanto is quite possibly the world’s most hated company, but few know much of the history of this multi-national giant.
“When a company claims its product improves on nature, many consumers happily declare the product an example of scientific progress. Equally powerful, though, is the inclination toward skepticism.” – Jesse Hicks
This skepticism is the reason millions now understand the shady and insidious nature of corporations like Monsanto. In fact, in a 2013 poll Monsanto was declared the “most evil corporation” in the world, beating McDonald’s and even the Federal Reserve by a wide margin. However, not everybody knows just how far back this corruption truly goes.
Here are five things you may not have known about Monsanto, but should.
by Susan Boskey
As posted at The Daily Sheeple
“100% of what is collected is absorbed solely by interest on the Federal Debt … all individual income tax revenues are gone before one nickel is spent on the services taxpayers expect from government.” ~The Grace Commission Report, 1984
As April 15 nears…thought you would find this research on taxation in America timely if not interesting.
No one living before the Constitution of 1787 could have believed the seven ways to Sunday Americans are now taxed. Under the Declaration of Independence and the first American constitution of 1777, The Articles of Confederation and Perpetual Union, association among the confederate states and a state’s interaction with federal authorities was 100% voluntary.
Though paying taxes was a voluntary act, the federal legislature (never referred to as government), did have legitimate operating expenses, and depended on property taxes collected from and given by the states voluntarily in varying amounts. It was this inconsistent funding that historians thereafter have considered the deal-breaker issue for what has been called the “failure” of this first American union.
By Paul Craig Roberts
An address delivered to the Libertarian Party of Florida on March 23, 2016 in Destin, Florida
To answer the question that is the title, we have to know of what the US consists. Is it an ethnic group, a collection of buildings and resources, a land mass with boundaries, or is it the Constitution. Clearly what differentiates the US from other countries is the US Constitution. The Constitution defines us as a people. Without the Constitution, we would be a different country. Therefore, to lose the Constitution is to lose the country.
Does the Constitution still exist? Let us examine the document and come to a conclusion.
Steven Macmillan, Guest
Edward Bernays was the master of influencing and shaping public opinion who developed upon the ideas of earlier social psychologists and the work of his uncle, Sigmund Freud, in order to create techniques to manipulate the subconscious desires of the masses.
Throughout his 103-year lifespan, the “father of public relations” was at the pinnacle of his field advising US Presidents Coolidge, Eisenhower, Hoover and Wilson, as well as inventor Thomas Edison, US industrialist Henry Ford and First Lady Eleanor Roosevelt. He also reportedly refused invitations by Hitler and Franco to work on fascist propaganda campaigns in Europe.
As posted at Soul of the East
There are two different understandings of the state and politics: the mechanistic and the organic. The mechanistic asserts instinctive man and his private interests; it measures life quantitatively and formalistically. The organic derives from the human spirit and ascends to national unity and its common interests; it is qualitative, searching out spiritual roots and solutions.
We shall first examine the mechanistic view.
It sees in man first and foremost the instinctive individual with its “desires” and “needs”: every person wishes to work less, enjoy himself more and relax; procreate and accumulate; maintain his irresponsible opinions and express them without hindrance; to find the like-minded and associate with them wherever they may be; to depend upon no-one and wield as much power and influence as possible. After all, men are born “equal”, and hence each of them must be provided equal rights for the assertion of their desires and needs: these are the inalienable rights of liberty which cannot abide restriction. Therefore every person should have an equal voice in affairs of state. For so many people there will be so many equal voices. Whatever a man may fancy is to be affirmed, and let there be no interference in this. Allow like-minded men of all nations to unite freely; let the votes be counted; the majority will decide…
By Susan Duclos
All News PipeLine
What started out as research into the all-out final push for a completely “cashless society” to the point where they are now going after our nations children with the announcement of the new “cashless Monopoly” game, brought me so far down the rabbit hole that I started calling myself a “conspiracy theorist,” but the information is out there and I suggest readers click all the links and follow the information.
So, how do we get from the cashless society push to ‘Skynet’? Come on “Alice” jump in and lets explore.
As posted on MassprivateI
According to Courthouse News (CN) article, DHS Secretary Jeh Johnson warned law enforcement of a new breed of terrorism that sees people “self-radicalize.”
“As I have said many times, we are in a new phase of the global terrorist threat, requiring a whole new type of response,” Johnson said. “We have moved from a world of terrorist-directed attacks to a world that includes the threat of terrorist-inspired attacks.”
DHS propaganda is so unbelievable, they even have a guide book called “Terminology To Define Terrorists” which instructs them on how to use appropriate terminology when describing the latest terrorist threat.
Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.
In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.
The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.
By Edward S. Herman
Aggression is arguably the highest form of terrorism as it invariably includes the frightening of the target populations and their leaders as well as killing and destruction on a large scale.. The U.S. invaders of Iraq in 2003 proudly announced a “shock and awe” purpose in their opening assault, clearly designed to instill fear; that is, to terrorize the victim population along with the target security forces. And millions of Iraqis suffered in this massive enterprise. Benjamin Netanyahu himself defined terrorism as “the deliberate and systematic murder, maiming and menacing of the innocent to inspire fear for political ends.” This would seem to make both the Iraq war (2003 onward) and the serial Israeli wars on Gaza (2008-2009; 2012; 2014) cases of serious terrorism.
How do the responsible U.S. and Israeli leaders escape this designation? One trick is the disclaiming of any “deliberateness” in the killing of civilians. It is “collateral damage” in the pursuit of proper targets (Iraqi soldiers, Hamas, etc.). .This is a factual lie, as there is overwhelming evidence that in both the Iraq and Gaza wars the killing of civilians was on a large scale and often not comprehensible in terms of genuine military objectives. (I give many illustrations in “’They kill reporters, don’t they?” Yes–as Part of a System of Information Control That Will Allow the Mass Killing of Civilians,” Z Magazine, December 2004. That this goes back a long way is well documented in Nick Turse’s Kill Anything That Moves: The Real American War in Vietnam [Metropolitan, 2014]).
By Greg Miller and Adam Goldman
Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information about operations and sources overseas, according to current and former U.S. officials who said the practice is known by the term “eyewash.”
Agency veterans described the tactic as an infrequent but important security measure, a means of protecting vital secrets by inserting fake communications into routine cable traffic while using separate channels to convey accurate information to cleared recipients.
But others cited a significant potential for abuse. Beyond the internal distrust implied by the practice, officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIA’s inspector general, turned over to Congress or declassified for historians.