Search Blog Posts

Thursday, October 23, 2014

Gold and Silver, an Antidote for the Internet of Money?

Denmark's central bank to stop producing money ... The outsourcing of banknote and coin production will result in 100 million kroner in savings, the bank said. With more and more people paying with credit cards and their smartphones, Denmark's central bank Nationalbanken says it no longer pays to print banknotes or mint coins. – Denmark, The Local

Dominant Social Theme: Digital money is all that counts.
Free-Market Analysis: It seems these days that every time we identify a new meme, we see a "fast-track" evolution. The "Internet of Money" is no exception.

We wrote about the Internet of Money on October 20, and now in this article in The Local, we see an apparent furtherance of this dominant social theme.

We are told that physical money is becoming less and less important. Now the Danish central bank is going to outsource its printing and save millions.

"Efficiency" itself is a meme. We ran into this recently when we wrote about how much more efficient it was to grow food using green techniques than organic, small-farm ones. The only trouble with green efficiencies is that it now turns out that such farming has changed the bacterial composition of soil for the worse.

There's nothing efficient about a technique that seems to save money initially but that in the long run is highly destructive. 

And so it would seem when it comes to the outsourcing of physical money. More on that in a minute.

Here's more from the article:

By the end of 2016, Nationalbanken plans to outsource all of its printing and minting services to an external supplier.

"Although the amount of cash circulating in Denmark continues to be high, society's demand for new banknotes and coins has been falling for years, and Nationalbanken has no expectations that the trend will be reversed," the bank wrote in a press release.

In addition to the rise in alternative paying options, the central bank also said that today's banknotes and coins are better recirculated into the economy and made of a better quality that ensures a longer shelf life. When viewed as a whole, the bank has determined that note and coin production is no a longer financially sound option.

The bank said that the move to an external supplier will result in a total savings of 100 million kroner ($17.2 million) through 2020. In its statement, the bank stressed that having notes and coins produced externally would not affect the bank's central role.

"Nationalbanken will continue to be the issuing authority for banknotes and coins and will maintain its expertise in the area of notes and coins. It is only the internal production of the notes and coins that will henceforth by done by external suppliers," it wrote.

Denmark is not a member of the eurozone and thus the Danish central bank can print money without the authorization of the European central bank. In fact, National Bank of Denmark tries to trade in a tight range with the euro but the krone is nonetheless an independent currency.

This means the bank can print more or fewer krones at will. 

The idea that a central bank that can print money at will is concerned with cost savings is predictable but not entirely accurate. Central banking is inherently a ruinous mechanism that is designed to squander a culture's wealth.

The US Federal Reserve system, for instance, often refers to the checks and balances that supposedly moderate its behavior. But in 2009, at the height of the fiscal crisis, those intricate checks and balances didn't stop the bank from issuing up to US$16 trillion in secret short-term loans to banking facilities around the world. Many of these loans have not been paid back, apparently.

Central banking is designed to look as if it is assuring the nation's financial solvency but it is an inflationary mechanism that regularly debases currency. Always, the idea is to emphasize the fiscal responsibility of central banking when, in fact, there is less than meets the eye.

Many elite dominant social themes emphasize efficiency or necessity; in fact, the reason is to further the cause of internationalism. We can see this with the organic meme, as we mentioned above. But now it seems there are going to be all sorts of reasons advanced for doing away with physical currency.

We pointed this out most recently in our article, "Internet of Money Provides More Reasons to Consider Strategic Asset Protection."

The big drama inherent in the Internet of Money is its disintermediation of banks. But in fact, it does no such thing. What it will do, and is already doing, is undermining what's left of monetary privacy.

What does need to change as the Internet of Money takes hold is people's attitude toward asset protection. Whether one wants to buy and hold physical gold or purchase real estate in one or more foreign destinations, the strategy of distributing assets is likely to prove more valuable over time.

Those who want to amass easily located cash and securities will likely face increasingly invasive audits of their personal worth as the Internet of Money matures. As purely digital money becomes increasingly accepted, the possibilities of state confiscation rise as well.

It's relatively easy to remove digital currency, after all; cash and precious metals are more difficult. This goes for non-state – criminal – activities as well.

We focused on Africa, predicting that this was where the Internet of Money would move most quickly. But this announcement by Denmark's central bank shows us that this campaign to eliminate physical money may be moving on several fronts at once. True, the bank is not doing away with currency but it is certainly de-emphasizing it as part of the larger monetary process.

Central banks, controlled by the BIS, operate in policy consortiums. You can bet that other banks may adopt Denmark's position sooner or later. Central banks have the power to do what they want with money. They can abolish paper money entirely if they wish to and perhaps over time will do so.

The only money at least partially beyond their control is, perhaps, gold and silver. In our previous article we emphasized asset protection to combat the expanding Internet of Money. But let us also re-emphasize gold and silver as well. If the idea is to create a fully digital currency over time, then owning gold and silver will be one alternative that may ensure increased privacy.

Central banks will probably act aggressively to implement the Internet of Money because it offers so many advantages. It allows the authorities to track sources of funds as well as taxpayers. It also further disguises the source of money-stuff, which remains money printing by a tiny handful of elites.

Perhaps this is the most important point of all: The Internet of Money further conceals the source of money generation. The Internet of Money can be presented as a radical breakthrough when it is merely a digital elaboration of an age-old monopoly money-printing process.


But gold and silver may serve as an antidote, along with forms of barter that do not use a distributed ledger.

via Thedailybell

Wednesday, October 22, 2014

US Govt Terrorist Group - National Endowment for Democracy (NED) - Created under President Reagan

The NED being a US agency and the largest sponsor of terrorism in the world, why aren't the American people deserving of knowing its real mission - the destabilization, subversion and destruction of foreign sovereignties under the false banner of "democracy"? Why hasn't the Republican 'conservative' congress investigated its terrorist activities?

Who is Carl Gershman (CFR), where did he come from?

Carl Gershman (pictured, second from left) has been
the President of the National Endowment for Democracy
since its beginning in 1984. In this picture, he presents
the 2011 Oxi Day Award to Jamel Bettaieb for his
leadership in Tunisia's Arab Spring.(Isn't that Chris Mathews?)
Carl Gershman (wikipedia) (born July 20, 1943) has been the President of the National Endowment for Democracy since its 1984 founding. He had served as the U.S. Representative to the U.N.'s Committee on human rights during the first Reagan Administration.


Published by Charleston Voice, February 22, 2013

 US TAXPAYER FUNDING OF THE LEFT, Extensive List of  1,100+ Groups & How You Pay for Them
This is a remarkable site with an extensive database of groups, people, categories, and their sources of income which we pay for. It is a searchable site also. Highly recommend you save this most informative source on your hard drive or bookmark for ready reference. I have already spent several hours reviewing it! 

Also read:  The NED - A US Congress & State Dept  Conduit for Funding Subversion & Violence in Foreign Nations

US Congress & State Dept Use IRS Tax Shelters to Fund Terrorist Attacks Against Foreign Nations

Posted by Charleston Voice, staff report

The NED - A US Congress & State Dept Conduit for Funding Subversion & Violence in Foreign Nations

This betrayal of friendly nations by our own Government is disgusting.


by Michel Chossudovsky 
The cooperation of the leaders of major opposition parties and civil society organizations in anticipation of the collapse of an authoritarian puppet government is part of Washington’s design, applied in different regions of the World. link to Anarchitext

Entrepreneur Creates Super Low Cost, Cashless Grocery

This can work, but only if the government is blocked from any regulation, direct or indirectly through surrogates. We await patiently for the corporate lobbyists to get the government to come down hard on GoodWill stores. We are not optimistic state legislatures will nullify federal intrusion laws. We still have many, many miles to go before we sleep.


By: Joshua Cook Oct 22, 2014


An entrepreneur in Great Britain is creating the first cashless supermarket, appealing to people on government aid and in poorly-paid jobs.

Stelios Haji-Ioannou is the creator of easyFoodstore budget supermarket. He also created bargain airline easyJet and windowless rooms at easyHotel.

The no-frills food and service will also eventually not take cash. A spokesperson for the store told the Daily Mail that its easier to process card payments than to cash up every day and pay a security firm to bank it.

The company also said that to compete with stores like ALDI the wages will be low.

‘We are aiming to be a low-cost supermarket so we need to keep costs low, property rent has got to be low, stock prices have got to be low and, inevitably, we will be looking towards the bottom end of the salary scale for employees,” said a spokesman.

And the cost will be incredibly low.

All goods will be unbranded ‘with white labels’ and will cost an average of 50p per item.

It will sell frozen and dried food, and only a few fresh items such as milk, bread and possibly fruit.

Do you think America could use a store like this? Please comment below.

via benswann

Faith Without Works

Faith Without Works
by R. J. Rushdoony

James, the brother of our Lord, tells us very emphatically that "faith without works is dead" (James 2:26). I thought of this recently when I heard an older man speak of the "old days" when silver dollars were the only kind of money in circulation in this area, and good men refused to take paper dollars in change. Such paper money was despised as "funny money" and as likely sooner or later to lose value. This attitude was commonplace when I was a boy farmers, ranchers, and miners carried deep leather pouch purses in their jeans to hold "decent" money, silver change and silver dollars.

Then I asked my one and only question of the old man: did you save some of those silver dollars? His answer was brief: 

"Nope. Sure wish I had. They're worth a lot of money these days." 

He went on to say that he had known all along that silver dollars were real money, and paper money would "belly up." 

But did he? I thought of him two nights later, as I read James 2:26. His "faith" in silver was worthless, and his paper assets are steadily depreciating; he was grumbling about how much harder it is to make ends meet financially. Scripture is right: faith without works is dead and worthless.

To say we believe in the Lord, and to continue living as though the world is governed by statism, money, or evil, is to profess a dead faith. Too many people who profess to believe in the Lord act as though the living God does not govern the world, or that He is not both Savior and Lord.

A faith with works moves in terms of Joshua 1:2-9. In the confidence of God's word and victory, it moves out to possess the land for the Lord, in the bold confidence that His word is true, when He says, "I will never leave thee, nor forsake thee. So that we may boldly say, The Lord is my helper, and I will not fear what man shall do unto me" (Heb. 13:5-6). (May, 1981)

Taken from Roots of Reconstruction, p. 106.

Teaching Is a Dialogue Not a Monologue

Andrea Schwartz

October 20, 2014

Everyone is a teacher in some capacity in life, whether or not you get paid for your services. Whether it is parenting, tech support, customer service, counseling, medicine, law, sales, or preaching, there is some element of instruction that takes place as we interact with each other. Two-way communication is a necessity to ensure that what we want to convey is received and understood.

Whereas very few would disagree with my premise, when it comes to practice and application, people tend to engage in monologue rather than dialogue. By placing more emphasis on what they have to say, rather than striving to make sure they are understood, two-way exchange often is sacrificed. What results can be a false sense of satisfaction that our point has been made. In order to have true instruction occur, feedback from the listener is vital.

Let’s say you are eager to have some parents change their perspective when it comes to the education of their children. You could approach them armed with all the data that shows that students from Christian day schools or homeschools achieve higher test scores. Or, you could cite the crimes and anti-social behaviors that are prevalent in the state schools. After delivering your “speech” you might be dumbfounded that these parents continue to send their children to state schools. The problem, of course, is the monologue approach. Without making use of perceptive questions and listening to the answers given, it is easy to “miss the boat” when it comes to unearthing parents’ biases and presuppositions.

Or, suppose you want to convey to your children the necessity of knowing God’s law and how to apply it in their lives. You could teach or lecture them on what you want them to learn, but if they are not asking questions and discussing the material with you, you haven’t succeeded in penetrating past the most superficial layers of their understanding.

For those of us who teach as a major aspect of our daily lives, it can be a temptation to say what we wish to say and assume we have done our jobs. However, a teacher who is not open to questions will diminish the potential success of the learning experience. Some are hesitant because they might not know the answer to a specific question. Trust me, this is a good thing. You can always say in honesty, “I don’t really know, but I will do my best to find out.” This elevates the teacher in the eyes of the student rather than demeaning him.

No one knows everything, but we do know the Source who does. When we presuppose that God’s law-word speaks to every area of life and thought, there is no reason to shy away from questions or challenges. What’s more, as we grow in our sanctification, earnestly pursuing the understanding and application of God’s law, we ensure that there will be fewer times that the answers to questions posed will evade us.

Christ engaged in this kind of interchange with His disciples, being willing to receive their questions. His method of discipleship involved a steady dialogue in order to train them to be useful in His Kingdom. Even the Word of God tells us to ask, seek, and knock, inviting us to interact with the triune God. We’d do well to imitate Him as we interact with others.

via thekingdomdrivenfamily

Tuesday, October 21, 2014

If You Are Sick of Surveillance, Safeguard Your Systems

Tuesday, 21 October 2014

Written by  Mitchell Shaw

Thanks to the Snowden leaks, most people don't need to be convinced that data-mining by government agencies and irresponsible corporations is a real problem that threatens our liberties in the digital age.  Fortunately, technology is an equal-opportunity tool. Remember that Snowden was able to keep himself and his communications from prying eyes while making not just one, but a series of revelations to journalists. The technologies he used are used by millions every day. They are easily available and largely free to download. Obviously, addressing all that needs to be done and how to do it is beyond the scope of any one article. This article will give you a good place to begin closing the door on those who would violate your online privacy, but it is up to you to learn more. Do an Internet search for the tools listed here, and you will find a trove of tutorials and YouTube videos to help you along the way. Using these tools may involve an uncomfortable learning curve, but the payoff is worth the effort.

Before addressing those technologies, a look at the nature of “Open-Source” software may be helpful.  In simple terms, open-source software is licensed in such a way that its source code is available for anyone to view, audit, modify, and redistribute. Because the open-source community is so large and diverse, the likelihood of anything nefarious being hidden in the code is at or near zero. Another benefit of open-source software is that where vulnerabilities exist, they are more quickly discovered and patched as a community of thousands of people works to solve problems. That is why viruses, which are such a problem for Windows and, to a lesser degree, Mac, are unheard of for Linux.

Linux is a great alternative to Windows for those seeking a more secure and liberty-friendly "Operating System." Because it is open-source, there are many different “flavors” (called distributions) available.  Two of the most popular distributions are Ubuntu and Fedora. They can be downloaded for free from and A fairly complete list of Linux distributions can be found at

While replacing Windows (or Mac) with Linux is the first step in securing your information, it is by no means sufficient in itself. Encrypting your hard drive should be the next step. Encryption turns the data on your hard drive into an unintelligible string of random characters until the correct password is entered. The protection offered by encrypting your hard drive is only as strong as your password, and though the encryption cannot be broken, a weak password can be broken within minutes using a brute force attack. A good password should be long and include uppercase and lowercase letters, numbers, and symbols. All encryption is not equal, as we now know that many encryption software companies have been pressured by the NSA to provide backdoors. Because of this and the closed-source nature of many of these programs, you should only use open-source encryption. Luckily, most Linux distributions include encryption as part of the installation process.

Now that you have a secure operating system and an encrypted hard drive, it's time to look at the way you use the Internet. Never put anything on the Internet that you would not want to see on the front page of your newspaper. That applies not just to social media, but also to online backup and storage. As the recent hacking and subsequent leaking of intimate celebrity photos stored on Apple's iCloud service demonstrate, once it leaves your hands, it leaves your control. Regardless of the privacy agreements or security promises of these providers, it is up to you to protect your data. Besides, most social media and online backup and storage companies are more than willing to cooperate with government snooping.  Dropbox recently announced Condoleezza Rice as the newest member of its board. It also keeps backups of files months after you delete them and even after you close your account. One way around this is to encrypt any file you backup or store online. A good tool for this is 7zip, which is available as a free download in most any Linux distribution. Another solution is to switch your online backups to a service that offers “zero knowledge” storage. One such service is SpiderOak, which offers encryption for which only you have the password. They cannot even see your data, not to mention allow anyone else, including government agencies, to see it. If required to turn your data over to a government agency, all they would be able to turn over would be the encrypted files and folders.

E-mail is a very insecure form of communication, as it can be intercepted quite easily. It is like sending a postcard through the mail. Anyone, anywhere along the way that intercepts it can read it. The ultimate solution is to encrypt your e-mail. Open-source GPG e-mail encryption is easily installed and is fairly easy to set up. Once you have it set up and get used to using it, the process is fairly transparent. Soon enough, you will forget you are even doing it, and your e-mail becomes inaccessible to snoopers, government and otherwise. Encourage your friends and family to begin encrypting their e-mails, as well.  The more normal it becomes, the more people will do it and the more privacy we will all have.

As far as browsing the Internet, the bare minimum security would be to use a browser such as Firefox, which can be downloaded for free at It is much more secure than Internet Explorer right out of the box, but there are some things you can do to make it even more secure. Download and install the HTTPS Everywhere plugin. This will force a secure connection on all sites that offer it. It is not perfect, but it is the same level of security/encryption used by banking websites. Disable third-party cookies and set up Flash to only run on sites you approve (a process called whitelisting). Flash is notoriously insecure and should only be used with caution.

For the ultimate security while surfing the web, you want to be completely anonymous. For that, there is Tor, which stands for The Onion Router. This service uses layers (like an onion) of security and encryption, routing your Internet traffic through a series of servers (called nodes) and creating a fake IP address at each point along the way. The result is that, when used properly, Tor creates real Internet anonymity. The websites you visit have no idea who you are and you cannot be tracked. This is the method Snowden used to contact The Guardian and leak the information on NSA spying. Tor is also available as part of a complete Linux distribution called T.A.I.L.S. (The Amnesic Incognito Live System), which runs only from a disc or USB drive. It leaves no trace of having been used and shuts down immediately if the disc or USB drive is removed.

Mobile devices are becoming easier to secure, as well. For many Android devices there are several after-market versions of Android available for those willing to root their devices. Cyanogenmod is perhaps the most popular and certainly one of the most secure. It is free to download at There are risks to rooting your device, however,  and if it is not done correctly, it can make the device unusable. In the security settings of all Android devices there is the option of full encryption. For encrypted phone calls and texts on Android, there are applications available. TextSecure and RedPhone, both by Whisper Systems, are two of the best. Apple has claimed that new iPhones are able to be encrypted in a way that puts total control in the hands of the user. Since their software is closed-source, then believing this claim is a matter of trust, and Apple does not have the best record for being trustworthy. There are applications that claim to provide encrypted calls and texts for iPhone, as well, such as Babel, iCrypter, and CoverMe. Again, it's a matter of trust as to whether these tools are effective. There is one open-source solution for encrypted calls on iPhones. It is Signal, by Whisper Systems, the developers of TextSecure and RedPhone for Android.

There are many more tools available, but if you use those listed here properly, you will go a long way toward making yourself much harder for the NSA or irresponsible corporations to track and monitor. Unless you are a specific target, the tools outlined here are probably sufficient to shut the door in their faces and regain your privacy and security.

via TNA