Jobs and Gates: Apple and Microsoft

Steve Jobs - Bill GatesThe late 20th Century became the birth of the Computer Age, and on into the 21st Century, two men stand out in the world of computer technology: Steve Jobs (Apple/Mac) and Bill Gates Microsoft Windows). Both started in humble beginnings, Jobs being a more Hippy like individual, while Gates was a classic Nerd. Both would become one of the wealthiest men in the world. Of course, the 21st Century ushered in the Nano Age and these two pioneers have been a part of that as well.

In a 60 Minutes interview, Jobs was asked about how he fashioned his business model, which he stated:

My model for business is The Beatles: They were four guys that kept each other’s negative tendencies in check; they balanced each other. And the total was greater than the sum of the parts. Great things in business are never done by one person, they are done by a team of people.

Continue reading

Alert: Attempt to Frame Liberty Activists via Child Porn

The IRS scandal investigations is about using government authority to intimidate liberty activists and conservative non-profit groups. There is another dastardly deed playing out against liberty activists being accomplished via email, as relayed to me by Oath Keepers.

Luke Rudkowski, Founder of We Are Change received an email designed to trick him into opening attached jpeg files containing child pornography. The following video shows how he might make enemies by asking important questions about the Bildenburg Group who Alex Jones [Infowars and Prison Planet] has commended for behind the scenes reporting concerning issues like how the Federal Reserve has and is destroying our nation economically.

Continue reading

Reasons For Serious Reformation of the Federal Government

How much scandal, anti-constitutional and anti-United States acts, policies, and agendas does it take for the US Congress and the American citizens to realize that Obama and associates are detrimental to the future of the United States of America? Indeed, considering the past two administrations, how much does it take for the American people to demand that We the People return to control our government as prescribed by the US Constitution and elect individuals who actually believe in the Constitution and respect its limitations of power of the federal government and adherence of state governments to the unionified laws of the Constitution?

Beginning with the most recent:

Continue reading

From My Desk: Info Highway, April 23rd 2013

Button_Newsboy-Extra_animatedhand_point2– What can one say about Americans who support legislation against the Second Amendment AND the First Amendment – the same people who say it is a First Amendment right to burn the United States flag in protest as part of freedom of speech? ABC News

A West Virginia teen arrested and accused of nearly inciting a riot after a confrontation with a teacher over his National Rifle Association t-shirt has inspired dozens of students across his county to wear similar apparel in solidarity. …Marcum had been wearing the shirt without causing any problems from homeroom at the beginning of the school day through fifth period, and was confronted by one of the school’s teachers while getting his lunch. When Jared refused to remove or reverse the shirt, the teacher began to raise his voice, and it caught the attention of students eating their lunch… Marcum was eventually arrested and taken away by police after refusing to remove the shirt. White said that when police told the teen they were going to arrest him, he stuck his hands out and said, “Fine.” … Logan City Police Chief E.K. Harper told ABCNews.com that Marcum was not arrested for wearing a t-shirt, but for “disrupting the school process.”

Continue reading

Michelle Malkin Memorial to Andrew Breitbart and Lauds Citizen Journalism

Michelle Malkin, long a “blogger” – a part of the “New” Media. She gave a speech at the Americans for Prosperity convention at Las Vegas in conjunction with RightOnline.
As demonstrated in this speech, the thing I like best about Ms. Malkin is that she will stand up against RINOs just as quickly as putting down democratic-socialists when it comes to constitutionality and ethical behavior in our government. Her emotions are real when she speaks of the late Andrew Breitbart and a courageous Russian woman who stood up against the tyranny of the Soviet Union and ended up in a government-controlled mental institution for truth in information to the Russian people. Here is the Malkin video YouTube release:

Sarah Palin Praises Bloggers, Tea Party and Wisconsin Voters

Sarah Palin – Tea Party Conservative

Sarah Palin is keynote speaker at Americans for Prosperity and lauds bloggers, Tea Party movement members, and Wisconsin voters who stood up to Big Government politicians and union thugs in the Recall Election recently held and won by Governor Scott Walker.
Of course, the whining political left immediately claimed that is was “big money” that won the recall election – totally ignoring the huge amounts of cash funneled from unions across the United States in order to achieve their victory in Wisconsin.
Those complaining were also short-changing the perseverance of Wisconsin voters in their stance for what is right, as well as giving a message to the unions that our government will not be held ransom by their tactics and parasitic organizations. Indeed, it was revealed that many union members and former union members had voted to retain Governor Scott Walker, as the victory in the last election showed they wanted him to remain as governor to continue work at reformation and improving the economy of Wisconsin.
The following is the YouTube video release of Sarah Palin and her speech as keynote speaker at the recent convention:

State of Our Union: A Different Kind of War

Events in the past decade has showed that America’s adversaries, specifically China, have been gaining ground for a myriad of reasons; for example, our foreign policies and allowing China to join the WTO without first cleaning up its human rights act. But that is history – too bad that those that operate our government don’t pay attention to it.

In 1991, the Gulf War was an historical event that changed warfare of now and the future. Desert Storm was definitely a victory in several ways against a military power that was once the top three strongest and well-equipped army (thanks to US and Russia) in the world under the regime of Saddam Hussein. In 42 days (actually about 100 hours of actual offensive warfare), America and the coalition forces demonstrated that aggressive national leadership and its military infrastructure could be decimated in short work by a technologically advance land, air and sea armed forces. With pin-point bombing and satellite imaging, cities did not have to be demolished into ruin or civilians (for the most part) unharmed. The object was to destroy Saddam and his henchmen and thus prevent total destruction as what happened in Europe during World War II.

The victory surprised/shocked the Chinese. They no longer were confident about a direct military confrontation with the United States. So, they began formulating a plan to win the war against free nations and put themselves as a supreme superpower “by other means”.

In 1999, two Chinese colonels: Qiao Liang and Wang Xiangsui, wrote a book entitled Unrestricted Warfarethat was published by the People’s Liberation Army (PLA) Press. It acknowledged what I have written above, as well as formulated a plan to seek a victory against US “by other means” – which some were:

The book has become sort of a PLA manual of operations for worldwide economic warfare/supremacy and the same sort of planning has been found in confiscated printed materials concerning the Chinese infrastructureBill Gertzbeing one of the first to discover and report it.

However, all of this does not override the fact that the United States must continue to be the best technologically advanced armed forces; especially in defense technology. China has continued its continual increase of military capabilities as in the other plans mentioned above.
In The Secret Weapon: How Economic Terrorism Brought Down the US Stock Marketby Kevin D. Freeman he wrote with documentation and reliable sources that the 2008 market crash was an “unofficial” act of war on the United States. He also wrote the the:

al Qaeda’s successful attempt to change the Spanish government by bombing the Madrid train system just before Spain’s 2004 elections. Bloggers asked whether al Qaeda may have reprised the tactic in Washington using a financial attack instead of a bombing. Not incidentally, it wiped out John McCain’s lead in the presidential campaign, facilitating Barack Obama’s November victory.

His suspects in this scenario is not just China, but Russia, Venezuela and terrorist groups operating from several nations. On the suspicious suspect listis leftist George Soroswho profited on the “piggy back” crash; however that is not concrete in speculation. Most are angry at him and consider him “evil” for supporting Barack Obama, and for his $1 million donation to the left progressive group called Media Matters. However interviews show that he sides with leftist views of higher taxes – which doesn’t truly make sense, because he states that it is bad for the economy.
Back to Kevin Freeman, who wrote …
In late 2008, I received a copy of a 1944 letter written by President Franklin D. Roosevelt to Secretary of War Henry L. Stimson. In it, the president asked for a study on how U.S. War-making efforts were impacting the economy, industry and morale in Germany and Japan. This was different from previous studies undertaken by the Economic Defense Board and Board of Economic Warfare, which had focused on procuring economic support for the U.S. War effort. FDR’s letter requested just the opposite: an analysis of how warfare could be used to target economies. Roosevelt understood that to defeat the enemy’s economy was to defeat the enemy. … Along with the letter came a request that I help IWSG “develop the present-day economic warfare threat doctrine and strategic appreciation.” IWSG is a part of Special Operations, Low-Intensity Conflict. …
Having watched the 2008 collapse up close and personal as an investment manager, it was clear to me that something out of the ordinary had happened. …
From Kevin Freeman’s “White Paper” …

Terrorists brought down the World Trade Center both as a symbol and as a direct attack on the U.S. financial system. They accomplished their feat after careful study and several trial runs. … Is it possible that enemies of the United States purposefully attacked our financial markets on or about September 11, 2008? There is some evidence that al-Qaida may have short-sold airline stocks in advance of the September 11, 2001 attacks. Could they have seen this to be a successful weapon to be used against our capitalist system?

The crash of 2008 had been a global problem, which made $50 trillion of wealth disappear. In the United States it was about $13 trillion in losses and no one at the time had a clue that it could be an act of warfare or terrorism – or both. It sounded like something from a paranoid schizophrenic blogger. The findings by experts showed that it wasn’t imagination.
Mr. Freeman has been an adviser to several government agencies for sometime: Pentagon, CIA and the Securities and Exchange Commission.
Credible evidence indicated that a global economic war was under way which was following the guidelines of the Chinese colonels in 1999. This type of war has the potential of taking out the largest economy and superpower down to the level of a “second-tier nation” in just ten years. Of course, with leadership like GW Bush and Barack Obama, and members of Congress who think like them – are unknowingly helping the our enemies.
China and Undeclared War
Brett Decker, co-author with William Triplett, in Bowing to Beijing, which also details the horrific human rights abuses in China wrote:
China’s leaders are engaged in a war against America. They view us as a threat to their regime and way of life. Hence, they have embarked on a systematic, long-term program to surpass us militarily, economically and politically. They are willing to do anything – purchase our national debt, steal our intellectual property, spend obscene amounts to buy influence in Washington, engage in extensive espionage in our government and large corporations, and sell sensitive missile and nuclear technology to our mortal enemies – to defeat us.
Espionage
In recent years, the last two decades, we have taken espionage not as seriously as when the Rosenberg Trial found the couple (Juliusand Ethel Rosenberg) guilty of espionage and they were both executed. They thought that the government was being too harsh. But with espionage on the rise and we are losing national secrets in larger amounts – it is only a slap on the hand for what they have done. For example, during Clinton administration an FBI agent sold a list of our spies and contacts – it cost many people their lives. The judge in that trail who sentence them, stated:
I consider your crime worse than murder. … In committing the act of murder, the criminal kills only his victim. … But in your case, I believe your conduct in putting into the hands of the Russians the A-bomb years before our best scientists predicted Russia would perfect the bomb has already caused, in my opinion, the Communist aggression in Korea, with the resultant casualties exceeding 50,000 …
No one has been executed since for treason in the United States, primarily because it was felt that Mrs. Rosenberg should not have been on trial much less executed, and that only Mr. Rosenberg was guilty of actually participating in espionage.
Oil as Blackmail
For several years now, Salafist web sites as well as Islamic fascist organization spoke-persons have called for an “oil jihad against infidel America and its lackeys”. It is evident that OPEC and Middle East sovereign wealth funds have caused the increase in crude oil prices – the latter sentence explains why.
In another phase of economic warfare, there are the big financial services, like Lehman Brothers, who through financial manipulations like short selling and credit default swapping, as well as other complicated documentation; the old and established financial institution got into serious trouble. These have been called “bear raids” – and even George Soros admitted that bear raids had been used as weapons against Lehman Brothers. He should know because he profited in the biggest bear raid in the 20thcentury when the British pound went south in 1992. He is mentioned by name in the Chinese book, Unrestricted Warfare:
We believe that before long ‘financial warfare’ will undoubtedly be an entry in the various types of dictionaries of official military jargon. Moreover, when people revise the history books on 20th-century warfare in the early 21stcentury, the section on financial warfare will command the reader’s utmost attention. The main protagonist in this section of the history book will not be a statesman or a military strategist; rather, it will be George Soros.
And thus, we learn why so many people consider George Soros to be “evil”. 
I guess Glenn Beck isn’t crazy after all.
Available data showed that Lehman Brothers and other major financial companies were killed off by manipulation; most performed in secret, and using any kind of market obscurity they could. The world nearly entered a new Great Depression – but is still in deep recession.
Along with Islamic fundamentalists, other suspects include: Venezuela, Iran, North Korea, Russia, and, of course, China.

The third phase of this 21stcentury warfare has to do with America’s “Triple-A” credit rating and the drop of the US dollar in the world’s primary reserve currency. This type of attack would put the United States into what Greece and Italy are experiencing today.

Out of this bad news, there is some good news.
Representative Mac Thornberry, R-Texas, of the House Armed Services Committee included Mr. Freeman’s White Paper from 2009 required a review and response to the information he provided. A little slow on the response, but a good step toward defending America against its enemies.
Now, the big question is – will leaders who are elected this year and who are in Congress now, as well as the President of the United States going to be wise enough to react in a manner that will defend America from such adversaries?
Yes, a big question and scary thought, indeed.
Warfare has changed dramatically – and we must change with it. Afghanistan and Iraqi veterans can tell you that; and we must also look at the iceberg below the waterline – as outlined in that 1999 book.
Obama is certainly not up to this – and Romney, the GOP establishment poster boy, doesn’t raise any confidence in my direction – how about yours?
Now you see why YOUR vote is important – and never, ever think that your vote doesn’t count. For lack of five votes, we are stuck with the SAE system of measurement instead of the global, more efficient (tens instead of twelve measurement) metric weights and measures that the morons in Congress are responsible for as stated in the Constitution of the United States.
I guess they are too busy funding bridges to nowhere and passing legislation that takes away liberties and freedom of choice from the very people that put them in office, as well as paying heed to special interests, et cetera.
As of January 2012, we owe (foreign held govt debt)  $1,159.2 billion to China – more than any other nation owed. US owes $1,079 billion to Japan. The total debt to all foreign nations is $14 trillion. 
If you can find much of any product that isn’t – try not to buy “Made in China”. US and other nations make better quality anyway – without slave labor.
I still won’t give up, however.

No Romney either.

Myth Blaster: "No Matter What" by Walter Williams

There is a chain email floating around that is attributed to Dr. Walter Williams, a distinguished economist, advocate for limited government, repealing 16th Amendment, and a syndicated columnist. He has provided good advice to Americans and served on the faculty of George Mason University in Fairfax, Virginia as Professor of Economics since 1980. 
The title of this article attributed to Dr. Williams is entitled “No Matter What”. There are comments from various people passing it on and as usual — “if you disagree, delete this email”.

Myth Blaster Verdict for this one is – FALSE.
It is not necessarily an intentional Hoax by the person who sent it out via chain email. Reason is, a website – RiteOnpublished it with a title of “No Matter What” on April 1st2011, and according to their apology page [PDF], under the column entitled “A Bad Dream” [PDF format] they published it without confirming its source.
You will find a rendition of the hoax column NOT written by Walter Williams and more detail as far a s the hoax by at:
Another example of people sending out chain email in flurries instead of taking the time to make sure it is legitimate.
If folks don’t have the time to research – send it to me at my Email link below:

<A HREF=”http://ws.amazon.com/widgets/q?rt=tf_cw&ServiceVersion=20070822&MarketPlace=US&ID=V20070822%2FUS%2Flighthjourna-20%2F8010%2Ff3e75916-f9f2-45f7-a89e-0faaf7aa07f8&Operation=NoScript”>Amazon.com Widgets</A>

Myth Blaster: Quotes from BH Obama’s Books

Received an email from a regular reader and email correspondent that had alleged Obama quotes.
The Myth Blaster verdict is FALSE, with few exceptions on the list. The email is sent in variations, probably people along the way add more of their own making. You can get a complete list at Truth or Fiction website. 
Here are truthful quotes:

I ceased to advertise my mother’s race at the age of 12 or 13, when I began to suspect that by doing so I was ingratiating myself to whites.

There was something about him that made me wary, a little too sure of himself, maybe, And white – he’d said himself that was a problem.

It remained necessary to prove which side you were on, to show your loyalty to the black masses, to strike our and name names. [Obama is wrestling with his identity while a college student.]

Yes, I’d seen weakness in other men— Gramps and his disappointments, Lolo and his compromise. But these men had become object lessons for me, men I might love but never emulate, white men and brown men whose fates didn’t speak to my own. It was into my father’s image, the black man, son of Africa, that I’d packed all the attributes I sought in myself, the attributes of Martin and Malcolm, DuBois and Mandela. [Dubois was a ruthless dictator in the Caribbean and Malcolm was a racist, assassinated by someone of his own race — email quote was incomplete and out of context] Mandela and Martin would seem to be the best icon for anyone to emulate.

In comments about Muslims, here is the real quote from his book, The Audacity of Hope:

Of course, not all my conversations in immigrant communities follow this easy pattern. In the wake of 9/11, my meetings with Arab and Pakistani Americans, for example, have a more urgent quality, for the stories of detentions and FBI questioning and hard stares from neighbors have shaken their sense of security and belonging.  They have been reminded that the history of immigration in this country has a dark underbelly; they need specific assurances that their citizenship really means something, that America has learned the right lessons from the Japanese internments during World War II, and that I will stand with them should the political winds shift in an ugly direction.

Conservatives and those against liberal-socialists and generally hypocritical politically correct crowd, complain about the way they take things out of context or just plain make things up, especially if they cannot find factual data to back them up … here we have the same thing, which in my opinion is just as bad, if not worse.
When it comes to finding and revealing the Truth and the true character of someone – we don’t need to make things up to make a point, for the facts speak for itself. 
If you want to reduce such biased, untruthful, mean-spirited passing of “information” – be your own censor. If the statement or email does not have a verifiable source, although this one stated it came from Obama’s two books, than it must be followed up upon. The point is if you are not SURE it is truth – don’t be so quick to pass it along as if it were. This is the way to fight against Chain Mail, at least that which is false and unfairly criticizing someone.
How can anyone say they have better character than someone else if they themselves show bad character in presenting false statements or accusations against that person?
Help fight misinformation, folks. Don’t forward something like what is mentioned above. I didn’t publish the ones that were false, wouldn’t give the moron, low-life who made this up the satisfaction. 
 Support Lighthouse Journal by shopping at Amazon for your Valentine — and SAVE! 

History of Chain Mail

The US Post Office was established officially as a government entity in 1775, the same year the US Army was officially established. But the earliest documented chain mail dates to 1795, a letter entitled Letter from Heaven, and although the actual date of that letter is uncertain, text of a letter with an established date was printed circa 1795.
Apocryphal letters claiming divine origin circulated for centuries in Europe. Around 1900 shorter and more secular letters appeared that demanded the reader distribute copies. Billions of these “luck chain letters” have circulated since then. … Using a sample of over 600 dated letters, predominant types are identified and analyzed for their replicative advantage. Key events in chain letter history are examined in detail, including the puzzling origin of money chain letters. A reconstruction of uncollected intermediate forms suggests that around 1932 a luck chain letter actually brought unexpected money in the mail to some who lived in small towns. In 1935 the first money chain letter appeared, the infamous “Send-a-Dime,” which was copied over a billion times worldwide within a few months. Newly discovered sources are used to argue that the unknown author of Send-a-Dime was a Denver woman motivated by charity. … Until the 1970’s most paper luck chain letters were copied by hand or typed. When photocopiers became more common there was some debate if one could use them for chain letters and still receive good luck.[1] One chain letter innovator declared “may Xerox” in a footnote.[2] … The Paper Chain Letter Archive provides overwhelming evidence that chain letters inherit text from their ancestors. From a “Luck of London” letter we read “It has been around the world four times”[3] Over 50 years later we read on an Australian letter “It has been around the world nine times”.[4] From a letter mailed in 1959 from Bloomsbury, New Jersey we read about money won but life lost in the Philippines,[5] just as we do on the 1997 Australian letter. … For over 65 years, humorous texts have circulated from office to office and person to person[6]. One such item, which we call “Play Golf,” lists the illustrious positions of several tycoons at the height of their careers in 1923; the same year that golfer Gene Sarazen won the PGA tournament. Sarazen died in 1999 at age 97.

Snopes also covers the fad of chain letters[7] –
…Our modern world sees chains letters of a variety of descriptions circulated by surface mail, fax machines, and in e-mail. While folk cures and accompanying prayers have dropped from favor (as medical information and resources became easier to access, such intelligences became less vital), other sorts of “Send this to five of your friends!” mailings emerged to fill this gap.
Snopes puts chain letters into five categories: (1) Money-generating (aka pyramid or Ponzi schemes); (2) Luck-generation (or ill-luck avoidance); (3) Altruistic; (4) Something for nothing; (5) Humor.
A typical chain letter consists of a message that attempts to induce the recipient to make a number of copies of the letter and then pass them on to one or more new recipients. A chain letter can be considered a type of meme.[8]Common methods used by chain letters include emotionally manipulative stories, get-rich-quick pyramid schemes, and the exploitation of superstitution to threaten the recipient with bad luck or even physical violence if he or she “breaks the chain” and refuses to adhere by the conditions set out by the letter. Chain letters are capable of evolution, generally improving their ability to convince their hosts to replicate them over time.[9] … With the development of e-mail and the Internet, chain letters have become much more common and quick to spread than when they were transmitted purely by physical mail … Some e-mail providers prohibit users from sending chain e-mails in their terms of service.[10] There have been Himmeslbriefe (“Heaven letters”) since at least the Middle Ages. And one could look to the Egyptian Book of the Dead as a meme that promised resurrection to those intombed with a copy. In the United States it is illegal to mail chain letters that involve pyramid schemes or other such financial inducements under Title 18, United States Code, Section 1302, the Postal Lottery Statute, through Chain letters that ask for items of minor value such as business cards or recipes are not covered by this law.[11] Chain letters have become popular in theMySpace community, many of which are in the form of MySpace bulletins. MySpace chain letters often have intimating hoaxes. Their popularity has surged on video sharing sites such as YouTube, via video comments.
And while chain letters and e-mails are usually just annoying, it also has a hidden agenda for some – making money by selling those addresses on the chain email and making even more money by insisting that the reader send to at least “ten friends”.
Almost every day I am bombarded by Spam and other devious or dangerous email. Recently an unscrupulous blogger who runs a “dating service” site (with no means to contact him at the site), tried to Spam LPJ comment section – something not acceptable, and thus the reason why I had to resort to moderating the comments, which before I did not require to do (except cleaning up some language that a particularly crude commentator had written – yet didn’t want to “censor” it either, because LPJ readers need to see the negative as well as the positive comments, and usually the writer reveals their bias and hypocrisy without me pointing it out.
So, if your comments are delayed, this is the reason, and as I have done so before, I apologize to scrupulous readers. Spammers and the bad hackers have ruined the pleasures of email and the Internet in general, and although I am for prosecuting those individuals – I am against general government regulation of the Internet. Cyberspace is, to me, the last bastion of freedom and liberties, especially under the 1st Amendment of the US Constitution. But a line must be drawn between malicious and harmful practices and freedom of speech. And remember this, the law given above applies to folks who not just initiate scheme chain mail, but also who pass it on. This means that public outcry may lead to more prosecutions, and because you are one that passes them on – you may find yourself involved. Generally speaking, there is no real purpose or usefulness in chain mail – whatever medium or form it is disseminated.
While I encourage readers to send alerts to chain mail, to be published here under Myth Blaster, I highly discourage practicing the chain mail thing – and that is a major action that will make it go away. And if you have information that you think others should know, by all means, pass it on – but make sure it is backed up with factual sources. You do no benefit to anyone otherwise.
So, now you know one of my “pet peeves” is chain mail in whatever form it arrives in. And now you know the brief history of the social phenomenon called “chain mail” and the reason why there are websites in cyberspace totally dedicated to the subject of chain mail and hoaxes. I hope that Myth Blaster has provided some kind of service to educate and inform readers, we well as inspiring folks to spread the word that chain mail is “uncool” and too often malicious. Besides, why allow someone to make money with it and the possibility of getting Spam bombarded in your in box? I will never understand why there are those who create computer virus/worms and other malicious Internet phenomenon to people they don’t know or never did them any harm. It has created a computer security industry, as well as adding the cost of computing and other private and business operations. The law must be strict and unforgiving against the culprits who enjoy doing such things. And, as a side note – Snopes incorrect date (1888) of the first (dated) letter (1795) considered chain mail is an example why I do not rely on solitary sources when doing research for my articles. 


[1] New York Times, 1968.

[2] 1975.

[3] 1944.

[4] 1997.

[5] 1959.

[6] 1935.

[7] According to them the first “full-fledged” chain letter recorded is dated 1888, contradictory to Daniel W. VanArsdale’s paper on the subject; therefore the date provided by VanArsdale is the one that I have written in this chain mail history.