Mark Ralph Rowe

http://jerrykendallisakiller.blogspot.com

http://jerrykendallisakiller2.blogspot.com

http://jerrykendallisakiller3.blogspot.com

http://mrrmath618.com

Monday, November 18, 2013

I feel sorry for you, that is, Edward Snowden. You are a loser. You wil always be remembered as a pathetic little dumb loser who never graduated from High School, and who worked for the CIA, NSA and Booz Allen Hamilton, and was forever never remembered by future history.

I feel sorry for you, that is, Edward Snowden.  You are a loser.  You wil always be remembered as a pathetic little dumb loser who never graduated from High School, and who worked for the CIA, NSA and Booz Allen Hamilton, and was forever never remembered by future history.


Did you know that the NSA can track the location of your phone even when it is turned off and the batteries have been removed?  This admission went largely unnoticed in a Washington Post report entitled NSA growth fueled by need to target terrorists.  In the article, writer Dana Priest details how teams of NSA employees stationed around the globe are dedicated to tracking phones in real time.  By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off. JSOC troops called this “The Find,” and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit.
At the same time, the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets. It also allowed commanders to see, on a screen, every type of surveillance available in a given territory.
     The technique by which the NSA can wiretap cellphones even when they are turned off and powered down is most likely being performed with the complicity of telecommunications companies who have proven friendly to NSA snooping. Trojan horse programs disguised behind routine system updates are the likely method through which the NSA gains direct access to millions of Americans’ cellphones and other devices.
     “You may recall the fact that Verizon and AT&T notably did not sign the collective letter asking the government to allow affected companies to release information on government requests for data,” writes Tim Cushing. “Given this background, it’s not unimaginable that Verizon and AT&T would accommodate the NSA (and FBI) if it wished to use their update systems to push these trojans.”
As we have also previously highlighted, terms of agreement for many of the apps you download to your smartphone now use your microphone to listen to you and your camera to take pictures of you without your knowledge.
     The notion of the federal government tracking your location via your cellphone is particularly prescient given yesterday’s report concerning the DHS-funded mesh network system that Seattle Police eventually intend to roll out across the city, but have temporarily been forced to deactivate due to a privacy outcry.
Aruba Networks, the company behind the system of wi-fi hubs which can record the last 1,000 locations of cellphones belonging to anyone in the coverage area, bragged in their promotional material that the grid could track “rogue” or “unassociated” devices.
     In other words, even if you do not allow your phone to connect to such wi-fi networks, they can still access your device, record its current and historical location, as well as download private information from your apps and other settings.

Facebook @ https://www.facebook.com/paul.j.watson.71

FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlanet

Mark,Rowe,David,Rowe,Nina,Dougherty,Clifford,Dougherty,Anita,Ferguson,Virginia,Ferguson,William,Jones,Frederick,Jones,Charles,Rowe
Jacqueline,Kennedy,Esther,Rowe,Ralph,Rowe,Judy,Garland,Ethel,Kennedy,Robert,Kennedy,John,Kennedy,international,affairs,world,economic,domination,and,control,policy,makers,decisions,for,material,gain,persuasion,of,the,masses

http://youtu.be/Afb8H-1fcYU


This is a list of people who are directly and indirectly related to Mark Ralph Rowe.  Some names on this list are people who had prior association with those people directly or indirectly related to Mark Ralph Rowe and or independent or not independently connected to Mark Ralph Rowe's immediate or extended family of both his maternal mother and paternal father.


Mark Rowe

David Rowe

Nina Dougherty

Clifford Dougherty

Anita Ferguson

Virginia Ferguson

William Jones

Frederick Jones

Charles Rowe

Jacqueline Kennedy

Esther Rowe

Ralph Rowe

Judy Garland

Ethel Kennedy

Robert Kennedy

John Kennedy


http://youtu.be/Afb8H-1fcYU


A LIST OF THE QUANTITY FOR THE AMOUNT OF TIME THAT I HAVE LIKED AND UN-LIKED A COMMENT POST ON FACEBOOK FOR A CONTINUOUS TIME PERIOD.


                                     LOG RECORD

FRIDAY NOVEMBER 15, 2013 AT 11:30 AM:  17 MINUTES

FRIDAY NOVEMBER 15, 2013 AT 11:38 AM:   4 MINUTES



Mark,Rowe,David,Rowe,Nina,Dougherty,Clifford,Dougherty,Anita,Ferguson,Virginia,Ferguson,William,Jones,Frederick,Jones,Charles,Rowe,Jacqueline,Kennedy,Esther,Rowe,Ralph,Rowe,Judy,Garland,Ethel,Kennedy,Robert,John,Kennedy,international,affairs,world,economic,domination,and,control,policy,makers,decisions,for,material,gain,persuasion,of,the,masses,Did,you,know,that,the,NSA,can,track,the,location,of,your,phone,even,when,it,is,turned,off,and,the,batteries,have,been,removed,This,admission,went,largely,unnoticed,in,a,Washington,Post,report,entitled,NSA,growth,fueled,by,need,to,target,terrorists,In,the,article,writer,Dana,Priest,details,how,teams,of,NSA,employees,stationed,around,the,globe,are,dedicated,to,tracking,phones,in,real,time,By,September,2004,a,new,NSA,technique,enabled,the,agency,to,find,cellphones,even,when,they,were,turned,off,JSOC,troops,called,this,The,Find,and,it,gave,them,thousands,of,new,targets,including,members,of,a,burgeoning,al,Qaeda,sponsored,insurgency,in,Iraq,according,to,members,of,the,unit,At,the,same,time,the,NSA,developed,a,new,computer,linkup,called,the,Real,Time,Regional,Gateway,into,which,the,military,and,intelligence,officers,could,feed,every,bit,of,data,or,seized,documents,and,get,back,a,phone,number,or,list,of,potential,targets,It,also,allowed,commanders,to,see,on,a,screen,every,type,of,surveillance,available,in,a,given,territory,The,technique,by,which,the,NSA,can,wiretap,cellphones,even,when,they,are,turned,off,and,powered,down,is,most,likely,being,performed,with,the,complicity,of,telecommunications,companies,who,have,proven,friendly,to,NSA,snooping,Trojan,horse,programs,disguised,behind,routine,system,updates,are,the,likely,method,through,which,the,NSA,gains,direct,access,to,millions,of,Americans,cellphones,and,other,devices,you,may,recall,the,fact,that,Verizon,and,ATT,notably,did,not,sign,the,collective,letter,asking,the,government,to,allow,affected,companies,to,release,information,on,government,requests,for,data,writes,Tim,Cushing,given,this,background,its,not,unimaginable,that,Verizon,and,ATT,would,accommodate,the,NSA,and,FBI,if,it,wished,to,use,their,update,systems,to,push,these,trojans,as,we,have,also,previously,highlighted,terms,of,agreement,for,many,of,the,apps,you,download,to,your,smartphone,now,use,your,microphone,to,listen,to,you,and,your,camera,to,take,pictures,of,you,without,your,knowledge,the,notion,of,the,federal,government,tracking,your,location,via,your,cellphone,is,particularly,prescient,given,yesterdays,report,concerning,the,DHS,funded,mesh,network,system,that,seattle,police,eventually,intend,to,roll,out,across,the,city,but,have,temporarily,been,forced,to,deactivate,due,to,a,privacy,outcry,aruba,networks,company,behind,the,system,of,wifi,hubs,which,can,record,the,last,1000,locations,of,cellphones,belonging,to,anyone,in,the,coverage,area,bragged,in,their,promotional,material,that,the,grid,could,track,rogue,or,unassociated,devices,In,other,words,even,if,you,do,not,allow,your,phone,to,connect,to,such,wifi,networks,they,can,still,access,your,device,record,its,current,and,historical,location,as,well,as,download,private,information,from,your,apps,and,other,settings,And,there,appeared,a,great,wonder,in,heaven;,a,woman,clothed,with,the,sun,,and,the,moon,under,her,feet,,and,upon,her,head,a,crown,of,twelve,stars:,And,she,being,with,child,cried,,travailing,in,birth,,and,pained,to,be,delivered.,,And,there,appeared,another,wonder,in,heaven;,and,behold,a,great,red,dragon,,having,seven,heads,and,ten,horns,,and,seven,crowns,upon,his,heads.,,And,his,tail,drew,the,third,part,of,the,stars,of,heaven,,and,did,cast,them,to,the,earth:,and,the,dragon,stood,before,the,woman,which,was,ready,to,be,delivered,,for,to,devour,her,child,as,soon,as,it,was,born.,,And,she,brought,forth,a,man,child,,who,was,to,rule,all,nations,with,a,rod,of,iron:,and,her,child,was,caught,up,unto,God,,and,to,his,throne.,,And,the,woman,fled,into,the,wilderness,,where,she,hath,a,place,prepared,of,God,,that,they,should,feed,her,there,a,thousand,two,hundred,and,threescore,days.,,And,there,was,war,in,heaven:,Michael,and,his,angels,fought,against,the,dragon;,and,the,dragon,fought,and,his,angels,,,And,prevailed,not;,neither,was,their,place,found,any,more,in,heaven.,,,And,the,great,dragon,was,cast,out,,that,old,serpent,,called,the,Devil,,and,Satan,,which,deceiveth,the,whole,world:,he,was,cast,out,into,the,earth,,and,his,angels,were,cast,out,with,him.,,And,I,heard,a,loud,voice,saying,in,heaven,,Now,is,come,salvation,,and,strength,,and,the,kingdom,of,our,God,,and,the,power,of,his,Christ:,for,the,accuser,of,our,brethren,is,cast,down,,which,accused,them,before,our,God,day,and,night.,,And,they,overcame,him,by,the,blood,of,the,Lamb,,and,by,the,word,of,their,testimony;,and,they,loved,not,their,lives,unto,the,death.,,Therefore,rejoice,,ye,heavens,,and,ye,that,dwell,in,them.,Woe,to,the,inhabiters,of,the,earth,and,of,the,sea!,for,the,devil,is,come,down,unto,you,,having,great,wrath,,because,he,knoweth,that,he,hath,but,a,short,time.,,And,when,the,dragon,saw,that,he,was,cast,unto,the,earth,,he,persecuted,the,woman,which,brought,forth,the,man,child.,,And,to,the,woman,were,given,two,wings,of,a,great,eagle,,that,she,might,fly,into,the,wilderness,,into,her,place,,where,she,is,nourished,for,a,time,,and,times,,and,half,a,time,,from,the,face,of,the,serpent.,,And,the,serpent,cast,out,of,his,mouth,water,as,a,flood,after,the,woman,,that,he,might,cause,her,to,be,carried,away,of,the,flood.,,And,the,earth,helped,the,woman,,and,the,earth,opened,her,mouth,,and,swallowed,up,the,flood,which,the,dragon,cast,out,of,his,mouth.,,And,the,dragon,was,witth,the,woman,,and,went,to,make,war,with,the,remnant,of,her,seed,,which,keep,the,commandments,of,God,,and,have,the,testimony,of,Jesus,Christ

Friday, November 15, 2013

ILLUMINATI [ilu’mine’tai; ilu’mina’ti], a name given by the Ante-Nicene Church Fathers to those who submitted to Christian baptism (Greek; phi omega tau o’ s, “illumination”). They were called “Illuminati” (phi omega tau o’ s), or “illuminated ones,” on the assumption that those who were instructed for baptism in the Apostolic faith had received the grace of illumination in an enlightened understanding. Clement of Alexandria speaks thus of such baptismal light: “This is the one grace of illumination, that our characters are not the same as before our washing. And since knowledge springs up with illumination, shedding its beams around the mind, the moment we hear, we who were untaught become disciples. . . . This work is called . . . illumination by which that holy light of salvation is beheld, that is, by which we see God clearly.” Among the societies subsequently adoption the name “illuminati” were the Alumbrados or Alombrados, a mystical sect existing in Spain from the early sixteenth century and appearing in France as the Gue’rinets during the period by a secret society founded by Adam Weishaupt, professor of canon law at Ingolstadt, on May 1, 1776, with the aim of combating religion and fostering rationalism.

     ILLUMINATI [ilu’mine’tai; ilu’mina’ti], a name given by the Ante-Nicene Church Fathers to those who submitted to Christian baptism (Greek; phi omega tau o’ s, “illumination”).  They were called “Illuminati” (phi omega tau o’ s), or “illuminated ones,” on the assumption that those who were instructed for baptism in the Apostolic faith had received the grace of illumination in an enlightened understanding.  Clement of Alexandria speaks thus of such baptismal light:  “This is the one grace of illumination, that our characters are not the same as before our washing.  And since knowledge springs up with illumination, shedding its beams around the mind, the moment we hear, we who were untaught become disciples. . . . This work is called . . . illumination by which that holy light of salvation is beheld, that is, by which we see God clearly.”
     Among the societies subsequently adoption the name “illuminati” were the Alumbrados or Alombrados, a mystical sect existing in Spain from the early sixteenth century and appearing in France as the Gue’rinets during the period by a secret society founded by Adam Weishaupt, professor of canon law at Ingolstadt, on May 1, 1776, with the aim of combating religion and fostering rationalism.
                                                           -Frederick Bronkema


Mark,Rowe,David,Rowe,Nina,Dougherty,Clifford,Dougherty,Anita,Ferguson,Virginia,Ferguson,William,Jones,Frederick,Jones,Charles,Rowe,Jacqueline,Kennedy,Esther,Rowe,Ralph,Rowe,Judy,Garland,Ethel,Kennedy,Robert,John,Kennedy,international,affairs,world,economic,domination,and,control,policy,makers,decisions,for,material,gain,persuasion,of,the,masses,Did,you,know,that,the,NSA,can,track,the,location,of,your,phone,even,when,it,is,turned,off,and,the,batteries,have,been,removed,This,admission,went,largely,unnoticed,in,a,Washington,Post,report,entitled,NSA,growth,fueled,by,need,to,target,terrorists,In,the,article,writer,Dana,Priest,details,how,teams,of,NSA,employees,stationed,around,the,globe,are,dedicated,to,tracking,phones,in,real,time,By,September,2004,a,new,NSA,technique,enabled,the,agency,to,find,cellphones,even,when,they,were,turned,off,JSOC,troops,called,this,The,Find,and,it,gave,them,thousands,of,new,targets,including,members,of,a,burgeoning,al,Qaeda,sponsored,insurgency,in,Iraq,according,to,members,of,the,unit,At,the,same,time,the,NSA,developed,a,new,computer,linkup,called,the,Real,Time,Regional,Gateway,into,which,the,military,and,intelligence,officers,could,feed,every,bit,of,data,or,seized,documents,and,get,back,a,phone,number,or,list,of,potential,targets,It,also,allowed,commanders,to,see,on,a,screen,every,type,of,surveillance,available,in,a,given,territory,The,technique,by,which,the,NSA,can,wiretap,cellphones,even,when,they,are,turned,off,and,powered,down,is,most,likely,being,performed,with,the,complicity,of,telecommunications,companies,who,have,proven,friendly,to,NSA,snooping,Trojan,horse,programs,disguised,behind,routine,system,updates,are,the,likely,method,through,which,the,NSA,gains,direct,access,to,millions,of,Americans,cellphones,and,other,devices,you,may,recall,the,fact,that,Verizon,and,ATT,notably,did,not,sign,the,collective,letter,asking,the,government,to,allow,affected,companies,to,release,information,on,government,requests,for,data,writes,Tim,Cushing,given,this,background,its,not,unimaginable,that,Verizon,and,ATT,would,accommodate,the,NSA,and,FBI,if,it,wished,to,use,their,update,systems,to,push,these,trojans,as,we,have,also,previously,highlighted,terms,of,agreement,for,many,of,the,apps,you,download,to,your,smartphone,now,use,your,microphone,to,listen,to,you,and,your,camera,to,take,pictures,of,you,without,your,knowledge,the,notion,of,the,federal,government,tracking,your,location,via,your,cellphone,is,particularly,prescient,given,yesterdays,report,concerning,the,DHS,funded,mesh,network,system,that,seattle,police,eventually,intend,to,roll,out,across,the,city,but,have,temporarily,been,forced,to,deactivate,due,to,a,privacy,outcry,aruba,networks,company,behind,the,system,of,wifi,hubs,which,can,record,the,last,1000,locations,of,cellphones,belonging,to,anyone,in,the,coverage,area,bragged,in,their,promotional,material,that,the,grid,could,track,rogue,or,unassociated,devices,In,other,words,even,if,you,do,not,allow,your,phone,to,connect,to,such,wifi,networks,they,can,still,access,your,device,record,its,current,and,historical,location,as,well,as,download,private,information,from,your,apps,and,other,settings

Mark Rowe David Rowe Nina Dougherty Clifford Dougherty Anita Ferguson Virginia Ferguson William Jones Frederick Jones Charles Rowe Jacqueline Kennedy Esther Rowe Ralph Rowe Judy Garland Ethel Kennedy Robert John Kennedy international affairs world economic domination and control policy makers decisions for material gain persuasion of the masses Did you know that the NSA can track the location of your phone even when it is turned off and the batteries have been removed This admission went largely unnoticed in a Washington Post report entitled NSA growth fueled by need to target terrorists In the article writer Dana Priest details how teams of NSA employees stationed around the globe are dedicated to tracking phones in real time By September 2004 a new NSA technique enabled the agency to find cellphones even when they were turned off JSOC troops called this The Find and it gave them thousands of new targets including members of a burgeoning al Qaeda sponsored insurgency in Iraq according to members of the unit At the same time the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets It also allowed commanders to see on a screen every type of surveillance available in a given territory The technique by which the NSA can wiretap cellphones even when they are turned off and powered down is most likely being performed with the complicity of telecommunications companies who have proven friendly to NSA snooping Trojan horse programs disguised behind routine system updates are the likely method through which the NSA gains direct access to millions of Americans cellphones and other devices you may recall the fact that Verizon and ATT notably did not sign the collective letter asking the government to allow affected companies to release information on government requests for data writes Tim Cushing given this background its not unimaginable that Verizon and ATT would accommodate the NSA and FBI if it wished to use their update systems to push these trojans as we have also previously highlighted terms of agreement for many of the apps you download to your smartphone now use your microphone to listen to you and your camera to take pictures of you without your knowledge the notion of the federal government tracking your location via your cellphone is particularly prescient given yesterdays report concerning the DHS funded mesh network system that seattle police eventually intend to roll out across the city but have temporarily been forced to deactivate due to a privacy outcry aruba networks company behind the system of wifi hubs which can record the last 1000 locations of cellphones belonging to anyone in the coverage area bragged in their promotional material that the grid could track rogue or unassociated devices In other words even if you do not allow your phone to connect to such wifi networks they can still access your device record its current and historical location as well as download private information from your apps and other settings

Wednesday, November 13, 2013

Based on the genetic knowledge available in the early 1900s, this approach to changing the human gene pool seemed reasonable. After all, Mendel's,

 Based on the genetic knowledge available in the early 1900s, this approach to changing the human gene pool seemed reasonable. After all, Mendel's beautiful demonstration of dominant and recessive inheritance in plants allowed for the prediction of phenotype among theoffspring of parents with known genotypes. Moreover, animal breeders had been applying disassortative mating to successfully improve their livestock for centuries.
     Couldn't these same principles be applied to improve the human population? Eugenics researchers thought so, and they therefore believed that by carefully controlling human matings, conditions such as mental retardation, psychiatric illnesses, and physical disabilities could be eradicated. Eugenics quickly became an issue of public health that was advocated not only by scientists, but also by physicians and lawmakers. All that was needed were data to verify these assumptions. Such data, however, would never emerge.
     Despite its popularity, the eugenics movement was doomed from the start because most of the traits studied by eugenicists had little genetic basis. Among those characteristics targeted for elimination from the human population were such complex and subjectively defined traits as "criminality," epilepsy, bipolar disorder, alcoholism, and "feeblemindedness," a catchall term used to describe varying degrees of mental retardation and learning disabilities. The possibility that environmental factors (such as poor housing, poor nutrition, and inadequate education) might influence the development of these traits was dismissed.
Over the course of 29 years, the ERO collected hundreds of thousands of pedigrees that documented the heritability of the aforementioned undesirable traits. When direct interviews were not possible, family members were categorized in absentia as either affected or unaffected based on hearsay evidence or on records kept by prisons and psychiatric hospitals.
     In addition, familial data was sometimes collected by untrained individuals or by researchers who projected their own prejudices onto their work, forcing certain traits to seem more heritable than they actually were. Furthermore, some conditions were so subjectively quantified (e.g., "criminality"), with so much ambiguity in their description (e.g., "feeblemindedness"), that almost any member of any family could be categorized in such a way as to make the data fit a Mendelian mold.  Ultimately, families and individuals were deemed either "fit" or "unfit" based on the eugenic belief that complex human traits were controlled by single genes and therefore inherited in a predictable pattern, just like the seed coat color of Mendel's peas. What eugenicists did not know, however, was that Mendel also observed many other traits in his plants that simply did not fit into defined categories and were therefore omitted from his famous study.
     These researchers were also unaware that most of the traits they were interested in actually result from interactions between genetic and environmental factors, something that confounds predictions of complex disease even today. So, oblivious to the actual nature of complex human traits, the eugenics movement pressed on, providing "scientific" evidence that undesirable human traits were predictably inherited and could be selected against by curbing reproduction in "unfit" individuals.  Studies showing that American prisons, psychiatric hospitals, and other charitable institutions commonly housed people who were related to each other provided additional evidence for supporters of eugenics that mental illness, poverty, "criminality," and other undesirable traits were hereditary. When eugenicists calculated and publicized the costs of maintaining these supposedly "genetically inferior" families in such facilities, they were able to gain public support for their efforts.
     Moreover, during the late 1800s and early 1900s, widespread economic and social unrest was being fueled throughout the country by the rising tide of immigrants who were arriving in American cities. Many city governments of the time were overwhelmed by issues of crime and poverty, and they thus embraced the principles of eugenics, which placed the blame for a city's social dilemmas on the victims themselves, rather than on inadequate approaches to solving the problems of the urban poor.  With support from citizens and medical professionals, the ideas of the eugenics movement quickly made their way into American public policy.
     For instance, the ERO proposed that laws be enacted to authorize the sterilization of so-called "socially inadequate" individuals, or people who were maintained wholly or in part at public expense. The costs of caring for such individuals could be saved, eugenicists argued, by preventing their birth in the first place. Indeed, because eugenics research had shown that the mental and physical conditions of many institutionalized people were inherited, sterilization of one "defective" adult could save future generations thousands of dollars.
     Ultimately, 30 states adopted eugenic sterilization laws, which together accounted for the forced sterilization of approximately 60,000 Americans. In addition to targeting U.S. citizens, the eugenics movement was also one basis of the ethnic bias that led to the passage of the Immigration Act of 1924, which severely limited the number of southern and eastern Europeans who could enter the U.S. each year and almost completely barred all immigrants from Asia. These immigration policies remained in effect until the 1960s.  By the 1930s, eugenics had been scientifically discredited in the United States due to the aforementioned difficulties in defining inherited characteristics, as well as poor sampling and statistical methods.
     In Germany, however, the eugenics movement was just gaining momentum. For instance, in 1933, the Nazi-controlled government issued the so-called "Law for the Prevention of Progeny with Hereditary Diseases," under which at least 400,000 Germans were involuntarily sterilized for having hereditary conditions such as mental illness, epilepsy, "feeblemindedness," or physical deformities (Kennedy Institute of Ethics, 2002). The passage of such measures continued over the course of the decade, and by the late 1930s, Hitler's eugenic-based national program of "race hygiene" had escalated into a program of euthanasia targeting both children and adults with various mental and physical disorders. This policy eventually culminated in the ghastly deaths of millions of Jews during the Holocaust.
     In the 1940s, the judges who presided over the Nuremberg trials of the Nazi doctors who performed experiments on concentration camp prisoners wisely recognized a need for oversight of medical experiments involving human subjects. As a result, the Nuremberg Code was formulated in 1947, and it provided guidelines for research that are still adhered to today.
     Other more recent protocols for research involving human subjects require such things as informed consent and adherence to strict policies aimed at protecting the welfare of subjects. Moreover, within the United States, any research program involving human trials must now be scrutinized by an impartialinstitutional review board (IRB) before the program can begin, and any adverse events that occur during experimentation must be reported and reviewed.
     Despite the events of the past, there are still many individuals yet today who support eugenic arguments against the decision to knowingly give birth to a child with a genetic disorder, cognitive impairment, or physical disability. Society, however, must accept that one person's definition of "disabled" or "impaired" may be drastically different from another person's. Deafness, for example, is seen by some as a disability and by others as merely a different way of living.
     Consider the case of a deaf lesbian couple in the U.S. who, in 2002, revealed that they had specifically sought out a hearing-impaired sperm donor to conceive their two children, who were indeed born deaf (Spriggs, 2002). Now, consider those parents who are either affected by or carriers of a genetic disorder who turn to modern techniques such as preimplantation genetic diagnosis to select for embryos that will be born without the genetic condition in question. Stories such as these have refueled the ethical debate over "designer babies" and whether society has a right to choose what types of children are born.
     Of course, there are numerous other conditions that can be viewed as either disabling or empowering, depending on one's point of view. For example, bipolar disorder is a condition in which an individual alternates between periods of euphoric creativity and activity and periods of debilitating depression. Because this disorder has a genetic component and tends to run in families, it would have been a likely target of the U.S. eugenics movement of the early twentieth century. Today, however, bipolar suffers have access to treatments that allow most of them to lead normal lives; furthermore, some people would argue that eliminating bipolar disorder as a disease would also meaneliminating a positive intellectual force in society. Indeed, the Internet is rife with lists of well-respected intellectuals and artists who are rumored to have suffered from bipolar disorder. The decision to treat, rather than eliminate, bipolar disorder seems obvious when considering the societal contributions made by some of these individuals.
     Western geneticists and genetic counselors now make great efforts to avoid projecting their opinions and philosophies onto their patients, and they instead strive to educate their patients so that these individuals can make their own decisions regarding their genetic health. Although this concept of nondirective counseling is widely accepted in the West, it may never become standard in other parts of the world. In China, for example, moral values are strongly influenced by the Buddhist and Taoist religions and by Marxism. There is a strong ideology that regards each person as a small component of society, as well as widespread sentiment that an individual's interests should be subordinate to the interests of the nation. Therefore, it is not surprising that many Chinese geneticists strive to improve population quality and further eugenic principles, a goal clearly at odds with Western ideology (Mao, 1997). Indeed, it is examples such as this that highlight the importance of remembering the eugenic mistakes of the past so that they do not occur again in the future.

http://infowars.com : NSA Can Track Your Location Even When Your Phone is Turned Off

NSA Can Track Your Location Even When Your Phone is Turned Off

  •  The Alex Jones ChannelAlex Jones Show podcastInfowars.com TwitterAlex Jones' FacebookInfowars store
Feds have had technology for at least 10 years
Paul Joseph Watson
Infowars.com
November 13, 2013
Did you know that the NSA can track the location of your phone even when it is turned off and the batteries have been removed?
Image: Wikimedia Commons.
This admission went largely unnoticed in a Washington Post report entitled NSA growth fueled by need to target terrorists.
In the article, writer Dana Priest details how teams of NSA employees stationed around the globe are dedicated to tracking phones in real time.
By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off. JSOC troops called this “The Find,” and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit.
At the same time, the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets. It also allowed commanders to see, on a screen, every type of surveillance available in a given territory.
The technique by which the NSA can wiretap cellphones even when they are turned off and powered down is most likely being performed with the complicity of telecommunications companies who have proven friendly to NSA snooping. Trojan horse programs disguised behind routine system updates are the likely method through which the NSA gains direct access to millions of Americans’ cellphones and other devices.
“You may recall the fact that Verizon and AT&T notably did not sign the collective letter asking the government to allow affected companies to release information on government requests for data,” writes Tim Cushing. “Given this background, it’s not unimaginable that Verizon and AT&T would accommodate the NSA (and FBI) if it wished to use their update systems to push these trojans.”
As we have also previously highlighted, terms of agreement for many of the apps you download to your smartphone now use your microphone to listen to you and your camera to take pictures of you without your knowledge.
The notion of the federal government tracking your location via your cellphone is particularly prescient given yesterday’s report concerning the DHS-funded mesh network system that Seattle Police eventually intend to roll out across the city, but have temporarily been forced to deactivate due to a privacy outcry.
Aruba Networks, the company behind the system of wi-fi hubs which can record the last 1,000 locations of cellphones belonging to anyone in the coverage area, bragged in their promotional material that the grid could track “rogue” or “unassociated” devices.
In other words, even if you do not allow your phone to connect to such wi-fi networks, they can still access your device, record its current and historical location, as well as download private information from your apps and other settings.
*********************
Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.
This article was posted: Wednesday, November 13, 2013 at 10:42 am


  • Share This Article

  • facebook
  • twitter
  • digg
  • reddit
  • email



INFOWARS.COM VIDEOS:

COMMENT ON THIS ARTICLE

FEATURED VIDEOS
Selena Gomez Loves TSA Groping See the rest on the Alex Jones YouTube channel.

Reporter Uncovers Massive Fraud in ObamacareSee the rest on the Alex Jones YouTube channel.
© 2013 Infowars.com is a Free Speech Systems, LLC company. All rights reserved. Digital Millennium Copyright Act Notice.