Alert: Attempt to Frame Liberty Activists via Child Porn

The IRS scandal investigations is about using government authority to intimidate liberty activists and conservative non-profit groups. There is another dastardly deed playing out against liberty activists being accomplished via email, as relayed to me by Oath Keepers.

Luke Rudkowski, Founder of We Are Change received an email designed to trick him into opening attached jpeg files containing child pornography. The following video shows how he might make enemies by asking important questions about the Bildenburg Group who Alex Jones [Infowars and Prison Planet] has commended for behind the scenes reporting concerning issues like how the Federal Reserve has and is destroying our nation economically.

Continue reading

Reasons For Serious Reformation of the Federal Government

How much scandal, anti-constitutional and anti-United States acts, policies, and agendas does it take for the US Congress and the American citizens to realize that Obama and associates are detrimental to the future of the United States of America? Indeed, considering the past two administrations, how much does it take for the American people to demand that We the People return to control our government as prescribed by the US Constitution and elect individuals who actually believe in the Constitution and respect its limitations of power of the federal government and adherence of state governments to the unionified laws of the Constitution?

Beginning with the most recent:

Continue reading

Myth Blaster: "No Matter What" by Walter Williams

There is a chain email floating around that is attributed to Dr. Walter Williams, a distinguished economist, advocate for limited government, repealing 16th Amendment, and a syndicated columnist. He has provided good advice to Americans and served on the faculty of George Mason University in Fairfax, Virginia as Professor of Economics since 1980. 
The title of this article attributed to Dr. Williams is entitled “No Matter What”. There are comments from various people passing it on and as usual — “if you disagree, delete this email”.

Myth Blaster Verdict for this one is – FALSE.
It is not necessarily an intentional Hoax by the person who sent it out via chain email. Reason is, a website – RiteOnpublished it with a title of “No Matter What” on April 1st2011, and according to their apology page [PDF], under the column entitled “A Bad Dream” [PDF format] they published it without confirming its source.
You will find a rendition of the hoax column NOT written by Walter Williams and more detail as far a s the hoax by at:
Another example of people sending out chain email in flurries instead of taking the time to make sure it is legitimate.
If folks don’t have the time to research – send it to me at my Email link below:

<A HREF=”http://ws.amazon.com/widgets/q?rt=tf_cw&ServiceVersion=20070822&MarketPlace=US&ID=V20070822%2FUS%2Flighthjourna-20%2F8010%2Ff3e75916-f9f2-45f7-a89e-0faaf7aa07f8&Operation=NoScript”>Amazon.com Widgets</A>

Myth Blaster: Quotes from BH Obama’s Books

Received an email from a regular reader and email correspondent that had alleged Obama quotes.
The Myth Blaster verdict is FALSE, with few exceptions on the list. The email is sent in variations, probably people along the way add more of their own making. You can get a complete list at Truth or Fiction website. 
Here are truthful quotes:

I ceased to advertise my mother’s race at the age of 12 or 13, when I began to suspect that by doing so I was ingratiating myself to whites.

There was something about him that made me wary, a little too sure of himself, maybe, And white – he’d said himself that was a problem.

It remained necessary to prove which side you were on, to show your loyalty to the black masses, to strike our and name names. [Obama is wrestling with his identity while a college student.]

Yes, I’d seen weakness in other men— Gramps and his disappointments, Lolo and his compromise. But these men had become object lessons for me, men I might love but never emulate, white men and brown men whose fates didn’t speak to my own. It was into my father’s image, the black man, son of Africa, that I’d packed all the attributes I sought in myself, the attributes of Martin and Malcolm, DuBois and Mandela. [Dubois was a ruthless dictator in the Caribbean and Malcolm was a racist, assassinated by someone of his own race — email quote was incomplete and out of context] Mandela and Martin would seem to be the best icon for anyone to emulate.

In comments about Muslims, here is the real quote from his book, The Audacity of Hope:

Of course, not all my conversations in immigrant communities follow this easy pattern. In the wake of 9/11, my meetings with Arab and Pakistani Americans, for example, have a more urgent quality, for the stories of detentions and FBI questioning and hard stares from neighbors have shaken their sense of security and belonging.  They have been reminded that the history of immigration in this country has a dark underbelly; they need specific assurances that their citizenship really means something, that America has learned the right lessons from the Japanese internments during World War II, and that I will stand with them should the political winds shift in an ugly direction.

Conservatives and those against liberal-socialists and generally hypocritical politically correct crowd, complain about the way they take things out of context or just plain make things up, especially if they cannot find factual data to back them up … here we have the same thing, which in my opinion is just as bad, if not worse.
When it comes to finding and revealing the Truth and the true character of someone – we don’t need to make things up to make a point, for the facts speak for itself. 
If you want to reduce such biased, untruthful, mean-spirited passing of “information” – be your own censor. If the statement or email does not have a verifiable source, although this one stated it came from Obama’s two books, than it must be followed up upon. The point is if you are not SURE it is truth – don’t be so quick to pass it along as if it were. This is the way to fight against Chain Mail, at least that which is false and unfairly criticizing someone.
How can anyone say they have better character than someone else if they themselves show bad character in presenting false statements or accusations against that person?
Help fight misinformation, folks. Don’t forward something like what is mentioned above. I didn’t publish the ones that were false, wouldn’t give the moron, low-life who made this up the satisfaction. 
 Support Lighthouse Journal by shopping at Amazon for your Valentine — and SAVE! 

History of Chain Mail

The US Post Office was established officially as a government entity in 1775, the same year the US Army was officially established. But the earliest documented chain mail dates to 1795, a letter entitled Letter from Heaven, and although the actual date of that letter is uncertain, text of a letter with an established date was printed circa 1795.
Apocryphal letters claiming divine origin circulated for centuries in Europe. Around 1900 shorter and more secular letters appeared that demanded the reader distribute copies. Billions of these “luck chain letters” have circulated since then. … Using a sample of over 600 dated letters, predominant types are identified and analyzed for their replicative advantage. Key events in chain letter history are examined in detail, including the puzzling origin of money chain letters. A reconstruction of uncollected intermediate forms suggests that around 1932 a luck chain letter actually brought unexpected money in the mail to some who lived in small towns. In 1935 the first money chain letter appeared, the infamous “Send-a-Dime,” which was copied over a billion times worldwide within a few months. Newly discovered sources are used to argue that the unknown author of Send-a-Dime was a Denver woman motivated by charity. … Until the 1970’s most paper luck chain letters were copied by hand or typed. When photocopiers became more common there was some debate if one could use them for chain letters and still receive good luck.[1] One chain letter innovator declared “may Xerox” in a footnote.[2] … The Paper Chain Letter Archive provides overwhelming evidence that chain letters inherit text from their ancestors. From a “Luck of London” letter we read “It has been around the world four times”[3] Over 50 years later we read on an Australian letter “It has been around the world nine times”.[4] From a letter mailed in 1959 from Bloomsbury, New Jersey we read about money won but life lost in the Philippines,[5] just as we do on the 1997 Australian letter. … For over 65 years, humorous texts have circulated from office to office and person to person[6]. One such item, which we call “Play Golf,” lists the illustrious positions of several tycoons at the height of their careers in 1923; the same year that golfer Gene Sarazen won the PGA tournament. Sarazen died in 1999 at age 97.

Snopes also covers the fad of chain letters[7] –
…Our modern world sees chains letters of a variety of descriptions circulated by surface mail, fax machines, and in e-mail. While folk cures and accompanying prayers have dropped from favor (as medical information and resources became easier to access, such intelligences became less vital), other sorts of “Send this to five of your friends!” mailings emerged to fill this gap.
Snopes puts chain letters into five categories: (1) Money-generating (aka pyramid or Ponzi schemes); (2) Luck-generation (or ill-luck avoidance); (3) Altruistic; (4) Something for nothing; (5) Humor.
A typical chain letter consists of a message that attempts to induce the recipient to make a number of copies of the letter and then pass them on to one or more new recipients. A chain letter can be considered a type of meme.[8]Common methods used by chain letters include emotionally manipulative stories, get-rich-quick pyramid schemes, and the exploitation of superstitution to threaten the recipient with bad luck or even physical violence if he or she “breaks the chain” and refuses to adhere by the conditions set out by the letter. Chain letters are capable of evolution, generally improving their ability to convince their hosts to replicate them over time.[9] … With the development of e-mail and the Internet, chain letters have become much more common and quick to spread than when they were transmitted purely by physical mail … Some e-mail providers prohibit users from sending chain e-mails in their terms of service.[10] There have been Himmeslbriefe (“Heaven letters”) since at least the Middle Ages. And one could look to the Egyptian Book of the Dead as a meme that promised resurrection to those intombed with a copy. In the United States it is illegal to mail chain letters that involve pyramid schemes or other such financial inducements under Title 18, United States Code, Section 1302, the Postal Lottery Statute, through Chain letters that ask for items of minor value such as business cards or recipes are not covered by this law.[11] Chain letters have become popular in theMySpace community, many of which are in the form of MySpace bulletins. MySpace chain letters often have intimating hoaxes. Their popularity has surged on video sharing sites such as YouTube, via video comments.
And while chain letters and e-mails are usually just annoying, it also has a hidden agenda for some – making money by selling those addresses on the chain email and making even more money by insisting that the reader send to at least “ten friends”.
Almost every day I am bombarded by Spam and other devious or dangerous email. Recently an unscrupulous blogger who runs a “dating service” site (with no means to contact him at the site), tried to Spam LPJ comment section – something not acceptable, and thus the reason why I had to resort to moderating the comments, which before I did not require to do (except cleaning up some language that a particularly crude commentator had written – yet didn’t want to “censor” it either, because LPJ readers need to see the negative as well as the positive comments, and usually the writer reveals their bias and hypocrisy without me pointing it out.
So, if your comments are delayed, this is the reason, and as I have done so before, I apologize to scrupulous readers. Spammers and the bad hackers have ruined the pleasures of email and the Internet in general, and although I am for prosecuting those individuals – I am against general government regulation of the Internet. Cyberspace is, to me, the last bastion of freedom and liberties, especially under the 1st Amendment of the US Constitution. But a line must be drawn between malicious and harmful practices and freedom of speech. And remember this, the law given above applies to folks who not just initiate scheme chain mail, but also who pass it on. This means that public outcry may lead to more prosecutions, and because you are one that passes them on – you may find yourself involved. Generally speaking, there is no real purpose or usefulness in chain mail – whatever medium or form it is disseminated.
While I encourage readers to send alerts to chain mail, to be published here under Myth Blaster, I highly discourage practicing the chain mail thing – and that is a major action that will make it go away. And if you have information that you think others should know, by all means, pass it on – but make sure it is backed up with factual sources. You do no benefit to anyone otherwise.
So, now you know one of my “pet peeves” is chain mail in whatever form it arrives in. And now you know the brief history of the social phenomenon called “chain mail” and the reason why there are websites in cyberspace totally dedicated to the subject of chain mail and hoaxes. I hope that Myth Blaster has provided some kind of service to educate and inform readers, we well as inspiring folks to spread the word that chain mail is “uncool” and too often malicious. Besides, why allow someone to make money with it and the possibility of getting Spam bombarded in your in box? I will never understand why there are those who create computer virus/worms and other malicious Internet phenomenon to people they don’t know or never did them any harm. It has created a computer security industry, as well as adding the cost of computing and other private and business operations. The law must be strict and unforgiving against the culprits who enjoy doing such things. And, as a side note – Snopes incorrect date (1888) of the first (dated) letter (1795) considered chain mail is an example why I do not rely on solitary sources when doing research for my articles. 


[1] New York Times, 1968.

[2] 1975.

[3] 1944.

[4] 1997.

[5] 1959.

[6] 1935.

[7] According to them the first “full-fledged” chain letter recorded is dated 1888, contradictory to Daniel W. VanArsdale’s paper on the subject; therefore the date provided by VanArsdale is the one that I have written in this chain mail history.

Myth Blaster: "Life is Beautiful" E-Mail Virus

Chain Email transcribed warning [edited] …

Anyone using Internet mail such as Yahoo, Hotmail, AOL, and so on. This information arrived this morning, Direct from both Microsoft and Norton. …
You may receive an apparently harmless e-mail with a Power Point presentation “Life is Beautiful”. If you receive it DO NOT OPEN THE FILE under any circumstances, and delete it immediately. If you open this file, a message will appear on your screen saying: “It is too late now, your life is no longer beautiful.” Subsequently you will lose everything in your PC, and the person who sent it to you will gain access to your name, e-mail and password. This is a new virus which started to circulate on Saturday afternoon. AOL has already confirmed the severity and the anti-virus software are not capable of destroying it. The virus has been created by a hacker who calls himself “life owner”. … This has been confirmed by SNOPES.

Myth Blaster Verdict: HOAX
The part of being confirmed by “Snopes” is a lie. In fact, this particular e-mail is an updated version of a Portuguese email hoax in the e-mail chain system. Urban Legends (Snopes) writes:

This warning about a Microsoft PowerPoint file named “Life is Beautiful” carrying a computer-destroying virus is a hoax, one that has been with us since at least January 2002. It originally circulated in Portuguese but was later translated into English and a host of other languages. Although this particular example is a hoax, PowerPoint presentations can contain viruses, so prudent computer users should always check downloaded or e-mailed PowerPoint presentations (and all other non-text attachments) before opening them.

See McAfee and Symantec (Norton) links.  
Avast! – a the security program I use would have caught this virus attempt immediately. Avast, an appropriate name for a security program for Lighthouse Journal use has never failed me – not like Symantec software that caused a major breakdown in my wife’s computer awhile back because it failed to do its job. And we paid for the software and an annual fee, while home versions are free via Avast.
I don’t know which is worse – hoaxers or the evil hackers (not to be confused with the good guys who check software for bugs, et cetera) who create destructive virus programs. Don’t be part of the problem – check out such e-mail you receive and then reply with the facts – or just email me (lpj_editor@earthlink.net) and I will check it out for you.
Further Sources:
Thanks Tara for sending this for verification.

Myth Blaster: Pacific Northwest Tree Octopus

Well, here is an odd Myth Blaster entry that Kritter Girl (Kritter Girl’s Korner – the original of that name, others are copycats ) received from one of her readers. It is a website dedicated to saving the “Pacific Northwest Tree Octopus”. 
Pacific Northwest “Tree Octopus

Myth Blaster Verdict: HOAX. No such animal. The person who sent it according to Wikipedia:

The Pacific Northwest Tree Octopus, is also known as “Octopus paxarbolis” (which means, roughly, “Pacific tree octopus”), is a fictitious endangered species first published on the Web in 1998 by Lyle Zapato. It is supposed to be able to live both on land and water and is said to live in the Olympic National Forest and nearby rivers, spawning in water where eggs are laid. Its major predator is the Sasquatch.
The
Pacific Northwest Tree Octopus website is among a number of sites commonly used in Internet literacy classes in schools that are real, although it was not created for that purpose. Despite falsehoods shown on the sit, such as its support by “GreenPeas.org,” the mentioning of other hoax species such as the Rock Nest Monster, and its affiliation with People for the Ethical Treatment of Pumpkins (P.E.T.P.U), …

The website is actually a “spoof” as the St. Joseph School Library Web Evaluation Site calls it.
The following is a list of hoax sites, mostly just spoof for humor: