Month: May 2017


This article is supplementary to my chapter in The 7 Year Mortgage and Debt Free College Degree published earlier this year.

What does the student loan debt look like on a national scale?

There is $1.3 Trillion, with 44 million borrowers, who have an average debt of $40K each and the default rate is over 11%. What may have caused this debt to become so pervasive? You could say it has been subsidized with the help of the government, just like “Fannie Mac and Sallie Mae” buying up all of the bad mortgages to keep the system afloat, and just like the government health care plan along with health insurance, more subsidies that have caused prices to explode. Anytime you make it easy to go into debt, you get more debt, just like the home appraisal process was abandoned about a hundred years ago, from pricing homes in terms of labor and materials costs together with a builder’s premium, now the home prices have no limits because they are based upon the prices for which other homes are being sold. Student loans are no different.

The United States Government allowed the creation of securities for these student loans, in fact, it went a step further and guaranteed them to investors. They are known as student loan asset backed securities (SLABS – bonds). Because the government guarantees and collects these debts administratively, without having to sue in court (like the IRS), investors are betting on the government’s ability to take or coerce payments from borrowers. These investors are not concerned with people getting an education, they just want a return on their money from this system of usury.

This is not the way to invest in the education of young people for the future, it’s just a way to make money without any moral consideration. What can students do in a situation where they have too much debt or cannot pay (in default)? We can first look at this from the debt collections phase; first, you want to use available procedures, such as settlement or payment options, to mitigate the re-payment. It’s a good idea to be sure you organize your cash flow and property rights so that none of them can simply be taken through an administrative levy. This means cash flows and property titles and other property rights should be held in the names of tax deferred and tax flow-through structures, limited liability companies are the easiest and most effective and least costly. Trusts are also good, but those can be costly and have many restrictions. The same may also be try for C-corporations, it’s important to review these structures yourself, but I am recommending the use of one or more limited liability companies. Once you are finished using them, you can sell them as “shelf corporations” so in the long term, these may cost nothing.

The only risk you have that cannot be eliminated is “W-2/W-4” wage income, if you have this, and cannot change your type of income to self-employed or independent contractor, get into a workout program or use student loan procedures to negotiate. I’m not promoting any service here, but a quick search online showed that a company by the name of Global Bridge Holdings specializes in student loan workout programs. These would be the last efforts if all else fails. As you’ll learn here, you may never have to get into this situation if you follow the other recommendations.

The Department has what it calls “Standardized Compromise and Write-Off Procedures” for use by guaranty agencies. These are for negotiated agreements between borrowers and guaranty agencies to accept less than full payment as full liquidation of the entire debt. To summarize the guidelines, collection costs can be waived and as much as 30% of principal and interest can be waived. If a guaranty agency chooses to compromise more than 30%, it cannot waive the Department’s right to collect the rest. It is possible to change your payment plan to drastically reduce the amount you are paying, even down to nothing, based upon your income.

There are also employer Loan Repayment Assistance Programs (LRAP), either your employer has one or you can negotiate one as part of your compensation)

You can also transfer guaranteed student loans to unsecured credit cards. There are no guarantees and will impact your cash flow the least.

This is probably the most important one but keep in mind that what I’m going to explain here, is something that can and should be done by everyone. In fact, this technique is what the rich people use to pay for their expensive toys. Acquire assets or build a cash flow asset and use that to offset the student loan debt situation, this can be done no matter how much debt you have or what types of debt, even if you have judgments and active levies. Consider buying into a cash flow, or brokering the sale of real estate by taking an interest in the title with an options contract, or buy local assets, like that car wash down the street. You want to buy assets to offset the liabilities of a student loan. This is explained in greater detail in my book.

Additionally, the Federal Ombudsman is “a neutral, informal, and confidential resource to help resolve disputes about your federal student loans.” If you have a loan dispute that you simply can’t resolve in any other fashion, contact the ombudsman. Such disputes could include discrepancies about federal loan balances; issues related to default, bankruptcy, tax offsets and other concerns; and questions about postponement, discharge and forgiveness requirements.

How can students avoid this type of debt in the first place?

Plan ahead to avoid taking on long term student loan debt by leveraging cash flow and assets to offset the costs of tuition.

Parents should never co-sign or show that they are eligible to be guarantor or co-signer for children attending college.

Use an asset to pay for college. Here is an example, it’s not really using an asset, just some equity that you might have in property, even though it is a liability. Use short term debt (real estate with clear title, write a short term note on 25% of the property value and sell it in peer-to-peer lending, pay it off and then do it again in series)

In some professions, you can gain competence without enrolling, sounds crazy, but this might be worth considering. My daughter wanted to attend art school, and it’s not that I’m cheap, but rather, I’m practical. I know that she’s not going to use her degree to qualify for a job, but she will be able to use her qualifications to make money in a business venture. So I explained how she could rent a luxury apartment near campus and let two students room with her for free, the only condition being that they include her in their art lessons and activities.

What alternatives are there for people that want higher education for the advancement of a career that would support their families? You can find apprenticeships or get vocational training, you don’t need a four year college degree to be successful and find a career that will lead you to a prosperous lifestyle.

Consider learning important things so that you can be self-reliant, such as basic home wiring, plumbing, gardening, composting, canning, saving seeds, for food, along with water, sewage and rain filtering. Learn net metering practices to reduce your costs for energy. Learn a useful trade, such as mechanics, carpentry and landscaping.

Don’t plan on going to college for useless degrees in things like “social justice” and public relations or practicing law, etc.

Look for apprenticeships, you can find services (browsers) that can connect you with apprenticeship programs, two I found include and

Do your own research about what qualifications are required in the field you want to work. Example, instead of going to veterinarian school to be an employee veterinarian, contact a business broker and look for veterinarian businesses for sale and buy those assets.

Look for vocational training scholarships or simply pay far less for vocational training to get near the profession you want. Here is one website that explains the opportunities, again, I’m not promoting anything in particular,

In summary, a quality or formal education is important at least through the age of 25 and you can get it with little or no debt. Taking on too much debt too early in life may seriously diminish your ability to acquire a size-able net worth. Build upon skills that help you offset liabilities with assets and this will be a skill you will use for your entire life, no matter what your vocation or educational background.












Have you ever called customer service and heard the welcome greeting that says something like “…this call may be recorded for quality assurance”, or “…this call may be recorded for security purposes…”? This is not truthful, your call is being recorded for purposes other than “quality assurance” or “your security”. The recording serves only to indemnify the company against future claims you might make or to waive claims you might have based on what you say during the conversation. This is not the point of my article here, but I wanted to introduce the topic this way because this is when I began questioning these occurrences. I began denying these companies my consent to record my voice without first agreeing to my own “data retention policy” terms, which include paying me a license for the storage and use of my recorded voice. Some disconnected, some agreed, and some decided to send me a letter. That was dating back to the late nineties. This same understanding carried over into the development of smart phones and other new technology.

Don’t confuse security with surveillance, especially when it comes to your home and your family. Video surveillance of your home while you are not there is a very useful tool in allowing you to take action in real time during any invasion of your home; however, it’s important to recognize that surveillance by itself is only good for one thing, surveillance. If something is captured on video, it can be seen by anyone, for many years to come. If you have video surveillance in your home, the signal should be encrypted so that only you have access to that feed and so that no one else can intercept it and collect video images from your home, whether you are there or not, or at anytime. This should be a very easy concept for people to realize, but I think many people mistakenly trust the manufacturers of these devices and incorrectly assume that no strangers are watching them or collecting this data. While the risks are the same for home “security” systems as they are for all other forms of surveillance, I just wanted to focus on these innocent looking fun toy-like devices that people love to buy.

Yes, if you have any video or audio systems in your home, you are under surveillance. This includes a new television, smart phone, computer, surveillance cameras and especially these devices such as “Alexa”, “Scout”, “canary”, “Echo”, “Piper” and others such as OK Google, Google Home, Siri and Cortana. This leads me to the main example of this article. These devices are fun, entertaining, informative and useful, but they are “listening” to you when you don’t need them to, recording what you say, and in some cases, collecting video data, whether through the device itself or by capturing video data from other un-encrypted devices in your home. If you’re going to allow this, then you don’t need locks on your doors, you don’t need doors and you can build walls made of glass.

People spend lots of money for locks, doors, secure windows, security systems, and then completely ignore twenty-four hour video and audio surveillance of their homes by these devices. Most if not all of this data is being transmitted to your SMART meter. Your SMART meter is a node on an international surveillance network and your power company is collecting your data and selling it. Why invest in all of this security and then throw it out the window by allowing this type of surveillance? The SMART meter nodes are not encrypted. The space used for the batter of the computer hardware inside does not also allow for any firewalls or other forms of encryption. What this means is that anyone can collect the data from your SMART meter at any time.

These devices use speech recognition to respond to requests you make verbally. And although the “wake word”, which is usually the name of the device, so that it responds when you say its name. Don’t believe this for one second. The device is “listening” to everything that is audible and recording that information all the time. Anything said, that can be translated into text, is translated into text so that the data can be sold and used by companies that want to sell you things that are consistent with your conversations. But what are the legal implications?

From a legal standpoint, voice tracking isn’t necessarily out of line. “These devices are microphones already installed in people’s homes, transmitting data to third parties,” Joel Reidenberg, director of the Center on Law and Information Policy at Fordham Law School in New York City, told USA Today. “So reasonable privacy doesn’t exist. Under the Fourth Amendment, if you have installed a device that’s listening and is transmitting to a third party, then you’ve waived your privacy rights under the Electronic Communications Privacy Act.” It’s just like being outside, once you’re in the public outside of your private home or vehicle, you have no protections to privacy. There mere fact that you have such surveillance devices in your home or use, begs the question of whether or not you have overtly or implicitly waived your rights and protections guaranteed by the Bill of Rights. And I’m not falling for the promise that pressing a mute button restores any of my privacy or rights.

Read Samsung’s “privacy policy” and the recent changes it had to make, and you have to ask yourself if anything really changed. If you had the ability to listen to other people’s conversations whenever you wanted, and if you had a profit motive, why would you ever abandon that ability? Don’t believe for one moment that these devices are not doing only one thing, logging any and all video and audio data from you, all day, everyday.

It should be obvious that people should not be using these devices. It’s bad enough that smart phones have replaced telephones and have become one of the most useful consumer tools in human history. Those of us who adopt practices to protect our privacy should consider establishing our rights in a written security agreement that is established along with the terms of service and privacy policies of these companies. Who says people or consumers cannot have their own terms of service and privacy policies? If enough people did the following, it would create the changes we want.

Identify proprietary data in a contract that expresses the terms under which that data can be used by the companies collecting it. Serve notice of the terms upon the company or organization collecting your information. The name and address of the company is usually found in its terms of service and privacy policy. Once you send the agreement, record it in your local county with the UCC Financing Statement for the security agreement as its cover page, and it becomes a lien upon the balance sheet of the company as long as the company uses your information, and you build a claim against the company under the terms of the license provisions in the agreement. You are the creditor, the licensor, for the use of your identifying and biometric data and the company using it is the debtor, or the licensee.

It is important to first understand what risks you have to your privacy from the technology you are using, then take steps to mitigate or reduce those risks. And then, to the extent you cannot eliminate them totally, impose license terms for the use of the information that is being collected about yourself on the companies doing it. At that point, collecting your information is no longer an asset or valuable, it now becomes a liability in which you are the creditor.

If you think these are crazy ideas, then answer these questions: Why was Muhammad Ali able to sell his “likeness” for $50,000,000 in 2004? And, why is Marilyn Monroe’s estate still in business? And don’t tell me because they were famous, that only puts a higher price tag on the data. Last question, did you know that the average person’s identifying information alone (his financial data) is worth about $25,000,000 in an average life time?


Your car engine is defective if it’s getting less than 100 miles per gallon. There is vacuum and other technology, that is fairly old, which has been excluded from today’s engine manufacturing so that people will need to buy more fuel and pay for more maintenance on their car engines than necessary.

The fuel injection technology was developed by the car manufacturers when people began discovering that the carburetor could be modified to give engines an efficiency of more than 1,000 miles per gallon. In fact, it was the car manufacturers that discovered this through their own research. Yes, that is more than one thousand, not just one hundred. I’m not going to discus this because the vast majority of cars people are using now have fuel injection and the carburetor research is fairly easy to find.

The fuel injection system we use today involves a “throttle body” and this along with the spark plug specifications and the positive crankcase ventilation or “PCV” valve can be modified (upgraded) to give gas engines, at least double the efficiency they are now getting. We should be getting at least 100 miles per gallon by simply correcting what the manufacturer deliberately did not build into the engine.

I’ll bet you never thought that your car engine was manufactured defectively, but I’ll bet it will really set your head spinning when you realize that it was deliberate. I’m not technically inclined on this subject, so I must include a detailed explanation from one of the inventors himself, Ron Hatton. Here is how he explains it.

In March of 2009, while speaking with a pilot who holds several records for fuel efficiency in flight who was describing the turbulence over his wings, I had an idea. If I could make that kind of action occur inside an engine, something good would happen. Almost immediately, the shape and location popped inside my head, accompanied by an energy that made it impossible for me to do anything but apply this modification.

Beginning with a 2000 Land Rover, we began to find it working to enhance combustion characteristics across all gasoline engines. Now, more than three years later, this technology has spread to more than 20 nations and is in almost every state in the union.

Basically, what we have discovered is the shape or a “groove” that I call “The Gadgetman Groove”. It has a profound effect on the naturally occurring pressure curve inside the intake manifold in such a way as to reduce the pressure available as the fuel is delivered to the cylinder. This reduction in pressure has the added effect of increasing the quantity of fuel that is in vapor state at the point of ignition.

Fuel that is normally burned in the exhaust (so-called “Waste Fuel”) is given what it needs to burn inside the engine, enabling tremendous increases in fuel efficiency and all that means to an engine AND the environment.

The normal process of the intake cycle generates a condition of reduced pressure inside the intake manifold. This is called “Vacuum” and represents anything below normal atmospheric pressure and is measured in Inches of Mercury (Hg). As an engine ages, the seals that create this vacuum deteriorate (ring wear, broken lines, dried and cracking diaphragms). As the vacuum drops, so does the efficiency of your engine.

This is because of a little considered scientific law called The Law of Standard Temperature and Pressure” or “The Ideal Gas Lawwhich, simply stated, is “At a standard pressure and a standard temperature, fluid X requires Y amount of BTU’s to change states.” As it applies to us here in the world of fuel efficiency, if you reduce the pressure on a liquid, it will vaporize at a lower relative temperature.

Why is Pressure Important?

Gasoline is a liquid. Oxygen is a vapor. You cannot mix the two under normal conditions. They must both be in the same state to blend (liquid to liquid, vapor to vapor). As you will never see the amount of pressure inside an engine necessary to liquefy oxygen, you can forget that approach. BUT! Since there is already a vacuum present, you CAN enhance the wave already present, providing the conditions appropriate for blending the fuel with the oxygen, a prerequisite for combustion.

What’s a “Normal” Vacuum?

Normal engine vacuum is considered “ideal” at about 17” Hg. But, as we discussed earlier, this is just a figure, and all engines will have different values here, as will the temperature-to a greater or lesser degree. It is the vacuum (in conjunction with the manifold temperature) that causes some of the fuel vaporization, enabling the fuel to burn faster at the point of ignition. These vapors, when ignited, then supply the BTU’s the rest of the fuel compounds require to vaporize, so they may complete the combustion process. Combustion will continue until either the fuel or the oxygen is depleted to the point it will not support further combustion. Unfortunately, the fuel we are given today to run our engines burns so slowly that most of it is consumed in the catalytic converter.

The raw (un-combusted) fuel is held up there, coming into contact with certain heavy metals which, when heated, allows the fuel to burn (or catalyze) leaving compounds less harmful to the environment than the raw fuel. In summary, the catalytic converter burns what is considered to be “Waste Fuel” (the fuel the engine can not consume -under “normal” conditions.)

Therefore, if you want to increase the rate of combustion (and clean up your emissions!) you have to be able to reduce the amount of fuel in the exhaust. The best way to do this is to change the conditions on which the computer bases its fuel delivery. Simply, burn more of the fuel (and the oxygen!) in the combustion chamber. The only way to do that is to get it to mix better with the oxygen, and the BEST way to do that: vaporize more of the fuel!

The core problem is that liquid fuel must evaporate to burn completely. Combustion happens so fast that the fuel cannot evaporate completely, resulting in un-combusted fuel being sent to the catalytic converter. This is where the emissions are processed, and where the computer takes most of the information which it uses as the basis for its calculations to determine the fuel requirements.

He is not specific here, but this involves modifying the throttle body. The throttle body is the part of the air intake system that controls the amount of air flowing into the engine, it looks something like this:

Once you’ve modified the throttle body, you will want to further increase your engine’s efficiency by capping off the positive crankcase ventilation (PCV) valve and then modifying your spark plug gaps beyond the manufacturer’s specifications.

I’m going going to get into all of that detail, you can read it for yourself via this link:

My point is writing this article is to explain that the corporations that are supposed to serve people, have instead by serving their owners at our expense. We can stop this, and we can do it in a way that everyone benefits, even the owners and their customers (us).

It’s not enough that, for example, the throttle body isn’t made properly, but there are mechanisms in your car that deliberately help to waste fuel, such as the O2 sensors. These sensors prevent you from improving the gas mileage using a technique such as modifying the throttle body, or changing your spark plug gaps. In fact, the specifications for spark plug gaps also keep your spark plugs from operating in the most efficient way possible. Of course I’m not a mechanic and people will criticize what I’m saying here, but at least check it out for yourself and don’t take my word for it.


Suppose that the USD price of a Bitcoin (XBT) was $2,000, just suppose. As it turns out, today it is nearing $2,100 and is the reason I’m writing this article. In this case, 1/1000th of a Bitcoin would be, using international nomenclature, a “milli-Bitcoin”. The abbreviation of “milli” is “m”, so one-thousandth of a Bitcoin would be 1 mXBT. It should be noted that sometimes XBT is expressed as “BTC” but I’m using the former in this article as I believe it will be adopted by the International Standards Organization (I.S.O.).

It’s not part of our common experience, even if we are only using cash, to deal in $1,000 or $2,000 notes, so it may become important to start talking about Bitcoins in terms of what we use everyday. 1/1,000th of a $2,000 Bitcoin therefore is worth $2, this is an “mXBT” (milli-Bitcoin).

What happens when 1 Bitcoin becomes $10,000? That would be 10 mXBT. We don’t have any language for this, so let’s consider what we’re talking about; a tenth of a thousandth of a Bitcoin is 100 micro-Bitcoins. A micro-Bitcoin is a millionth of a Bitcoin. Who wants to say that?  We need some language for this. We have a Bitcoin, milli-Bitcoin and micro-Bitcoin. One micro-Bitcoin (µXBT) just happens to be the smallest unit of Bitcoin, and it’s already named after the founder of Bitcoin, a “Satoshi”. Maybe we can talk about that someday when Bitcoins are a million USD each, not sure how soon that will be, but for now, we need two new words, one for 1/10th of an mXBT and one for 1/100th of an mXBT.

If it takes 1,000 micro-Bitcoins for 1 mXBT, it would take 10,000 micro-Bitcoins for 10 mXBT. In other words a “micro-Bitcoin” = 1 millionth of a Bitcoin or “1 Satoshi”, which using standard metric system abbreviations, could be “µXBT”. This chart demonstrates the relation between factors of ten, assuming 1 XBT is $2,000:

.001 XBT = 1 mXBT = 1,000 micro-Bitcoins = $2

.0001 XBT = 10 mXBT = 10,000 micro-Bitcoins = $20

.00001 XBT = 100 mXBT = 100,000 micro-Bitcoins = $200

the same as,

.001 XBT = 1 mXBT = 1,000 Satoshis = $2

.0001 XBT = 10 mXBT = 10,000 Satoshis = $20

.00001 XBT = 100 mXBT = 100,000 Satoshis = $200

which would be the same as

.001 XBT = 1 mXBT = 1,000 µXBT = $2 “mBit”

.0001 XBT = 10 mXBT = 10,000 µXBT = $20 “penny”

.00001 XBT = 100 mXBT = 100,000 µXBT = $200 “dime”

The term “mBit” would represent 1/1,000th of a Bitcoin.

The term “penny” would represent 1/10,000th of a Bitcoin or ten mBits.

The term “dime” would represent 1/100,000th of a Bitcoin or one hundred mBits.

I think the language will develop very soon, I just wanted to add in “my two cents” as part of the conversation. I’m sure others have already proposed similar terminology. This may solve the problem of naming the quantities while we are talking to each other, and computers don’t care, they just calculate numbers, but we don’t speak like computers.  The real usefulness of this understanding is when Bitcoin is priced in grams or ounces of gold and silver, without using the dollar as a conversion factor.

Even though it’s priced in the dollar, we can look at the U.S. Debt Clock to help get some idea of the conversion rates. But like I just stated, eventually, no one will care about Bitcoins and USD, and the conversion will be defined by free markets in terms of purely how many Bitcoins I can get for a gram of gold.

The USD / gold ratio as stated on the U.S. Debt Clock as of today is $6,975 to 1 ounce of gold. Dividing the current USD price of Bitcoin (which I’m suggesting that soon we won’t have to do that) by this amount, gives us $2,737 / $6,975 = 0.3924 ounces of gold for 1 Bitcoin. Let’s look at this in terms of grams of gold. A troy ounce of gold is 31.1034807 grams. This would give us $6,975 / 31.1034807 USD / g Au or $224.25 dollars per gram of gold. At this rate, how many grams of gold would it take to buy one Bitcoin? Dividing $2,737 by $224.24 gives us 12.2051282 g Au/XBT. I believe the exchanges should begin to set this pricing, just like they set the exchange rates for Bitcoin and local currencies now. We should not have a centralized “price fixing” authority.



What if the government passed a law requiring everyone to wear blue uniforms in the same style, and you had to buy the uniform from the government, or a single business designated by the government, and no one was permitted to sell any uniforms in competition with the government?

What if the government could tell you who your friends could be and how you could interact with those “friends” and that unauthorized friends and unauthorized interactions would be a crime?

What if the government forced you to use only one currency that always lost its buying power and denied you any ability to question it?

These are three questions that have recently come into light, at least since I’ve been researching them. When I traveled to Europe, at least before 2008, I was seen as some kind of rock star or a rich guy, even though I may not have been rich.. I was spending U.S. Dollars, I was associated with “Americanism”, you know, blue jeans and Coca-Cola. Using dollars gave me a social status, a means of expressing myself and associating with others. I could have just as easily exchanged my money for Canadian Dollars and claimed to be a Canadian, or even an Australian. These would have been different expressions of myself and created entirely different associations with others.

The “money” we use today, or currency as it is correctly named, is not mined with human labor and ingenuity, it’s fabricated in a counterfeiting scheme in which only a certain, small group of people reap the benefits and the vast majority of people who are forced to use it, must do so at their own peril. The currency we use today, it’s not the “dollar”, it’s a Federal Reserve Note, a bank note, an “I.O.U.”, or technically, a “perpetual bond”. The holder of a unit of this currency is not holding money or an asset, he is holding a liability, a debt. The “creditor” is the Federal Reserve Bank. Merely holding “FRNs”, as they have come to be called, is a tax. As the government borrows these notes into existence and spends them, the buying power of the people forced to use them diminishes, it’s a tax. The value of their labor is diminished. The value (not to be confused with price) of their goods is diminished, and these people are forever forced to “hop” from one situation to another in order to avoid the adverse effects of this diminishing value, or the “taking of their property”. How can this diminishing value be distinguished from the taking of property? It cannot.

Money, or even currency, has always been one of the means by which people associate with others, express themselves and protect their wealth. Forcing people to use a certain currency, especially the Federal Reserve Note, violates our rights to free speech, freedom of association and due process of law regarding the taking of property without due process of law and the right to redress of grievances. It is important to note that people do not derive these rights from a written document, the First Amendment or any series of written words anywhere. They derive these rights from their creator, whoever they individually believe that to be. People had these rights long before words were written anywhere. Therefore, no individual or group of individuals (corporation, church, government, etc.) may deprive the people of these rights and remain in the right, or in good standing with them.

It’s time for people to reclaim their rights as we now have the means and the urgency. Adopt cryptographic currency and use it with precious metals in private vault services and boycott bank notes. It’s that simple.


Is it a felony to bring a video camera into the public restroom or locker room?

Isn’t it interesting how we have laws regarding stalking and voyeurism, and regulations regarding harmful radiation, but those seem to be ignored with the mobile smart phones today? What is worse is that people have no clue, they are innocently enjoying their phones everyday, taking them wherever they go, even into locker rooms.


I’ve even seen people caressing and holding their mobile phones for no apparent reason; and reading and texting on them while driving. I’ve even seen a couple of people watching a video while driving. Many people have them mounted on their dash board, what kind of stupid is that, especially driving at night? Everyday I see people reading them while they walk or ride a bicycle, and just carrying them as they move about like you would a drink at a party. People stand in public entrance ways, motionless as if in suspended animation, while staring at their phones and obstructing other pedestrians. I’ve seen parents at their children’s soccer games, like pipes sticking out of the ground, also motionless in that same shape, head down–hands cupped out in front, as they read and text on their phones, entirely divorced from the world around them. People go to restaurants, two or four or more sometimes, sitting at the same table, all reading and texting on smart phones, not speaking to each other.

I’ve been in two rear-end car collisions because of people texting while driving and I’ve seen about seven wrecks on the side of the road, just in the last year, even where several cars were involved, most likely from drivers texting and then ramming into the car in front. How many times have you been waiting in traffic only to discover you were waiting behind the driver in front of you for no other reason than he was texting on his phone and didn’t see the traffic ahead of him move forward.

Did you know that a driver license is legally considered “evidence of incompetence”? That is very fitting under the current circumstances when so many people think it’s their free time when waiting at a stop light or in traffic, to read their phones (text) or watch videos. This doesn’t even begin to cover the other problems with our “friendly” technology.


Each mobile phone has its own unique frequency and the longer it’s used, the more data is stored in that frequency. Don’t believe me? Watch this short video:

And for those of you with a greater technical vocabulary, buckle up when you watch this:

The pattern of movement, where you travel, with that phone is stored in an NSA/CIA database. All of your data is captured, stored forever and in many cases, sold for profit. This doesn’t even consider the fact that no one is using any type of encryption, which means that anywhere you go and use free Wi-Fi, someone with another phone or device may be sitting on the network waiting for you, and just grab your data without you ever knowing. You probably pay money for ID theft protection, but you’re not really getting it as these systems are antiquated. Must of the encryption security you can get on your phone is free, and while it’s not absolute encryption, it’s very close. While the NSA/CIA, for example, could grab your encrypted data, it might take 100,000 years to decrypt, if it could be decrypted. People are concerned about privacy risks that are nothing compared to what their mobiles phones expose them to, without adequate encryption.

What about our personal and home, safety and security? We have smoke detectors, locks on the doors, alarm systems, but a huge gateway into our entire lives is just walking around with us, totally unguarded against the most sinister people there are.

Why are people taking their phones into the gymnasium and then reading them during a workout? I don’t think people yet realize that the cameras and microphones are activated continuously, or at least intermittently. Worse still, I see people walking around, reading their phones in the locker room. I wonder if it’s still a crime to be ignorant of a crime while you’re committing it and I wonder if the other people who are showering and changing would appreciate sociopaths at the NSA/CIA watching them. I wonder what liabilities the property owner has for allowing people to knowingly or unknowingly make video recordings of people in the bathrooms and locker rooms. What if children are involved? It’s gets ugly to say the least.

I really don’t like exercising next to someone who is watching his phone, because I’m probably being video recorded. I don’t bring my phone to the gym for this reason, but if three other people around me are staring at their phones while exercising, well then it’s likely I’m under surveillance, both with video and audio. Why does anyone need to bring a phone to the gym anyway. Do you think Arnold ever did that?

Did you know that with each photo taken on your mobile phone, it is time and location stamped with the exact coordinates of where the image was taken, and when that photo is uploaded to any Internet website, that data is included? How many times have you taken your friendly, harmless smart phone in with yourself to use the toilet? Yeah, let that one sink in for a moment.

I’ll bet you didn’t know that having your mobile phone “on your person” at a traffic stop allows the police to legally collect all of your mobile phone data from your carrier in about a minute just by scanning it? This habit waives protections you would normally have because of the Fourth Amendment prohibitions against unlawful searches and seizures. But why would you care? You’re not doing anything illegal; however, I’ll bet you didn’t know that your babysitter is under investigation for drug use and her name and number are in your contact list. Maybe a simple traffic stop for speeding ends up with you as a suspect in a criminal investigation, just because you waived your rights from lack of knowledge. Have you ever heard what happens because of the forfeiture laws? In this case, you could lose your house, car, job, freedom and even your children. Sounds unlikely, right? Yeah, and the government would never spy on you.

Your mobile phone is transmitting all of the surveillance data it has collected from you everyday to the SMART meter on your house. If you don’t know what a SMART meter is, you may want to take a look for yourself; but it’s a node on an international network of SMART meters that collects and relays data about yourself and everyone else. It’s not the data you might think; in addition to your name and address, it’s transmitting at least your financial information, Internet connection (e.g. browsing habits and movies you watch), and use habits for each of your appliances. It’s also downloading data from your car while it’s sitting in the driveway at night. This data describes which appliances you own and when you use them. Why, you might ask?

This data is more valuable to the power company than what you are paying for energy and it’s being sold, at least to other companies so that it can be used to market other products and services to you, among other nefarious purposes. As your data is being collected and transmitted by the SMART meter network, it has no level of encryption. Anyone can get that information with a simple phone app. What might we surmise about our data and the SMART meters being used for energy on the buildings we visit throughout the day, such as the grocery store, doctor’s office, school, etc.? Look closely at the video cameras set up around different intersections in your city and while those are obvious, what you might not have noticed is the square, flat box-like gadget somewhere nearby, usually at the same height. This is a Wi-Fi scanner and it’s collecting the signals from your car and mobile phones, even if you’re not using the phone.

Did you know that wi-fi signals can be used to form images and enable people to see through walls and into your home?

And you should know that your mobile phones are broadcasting data to collection centers at certain places around the world, where certain globalist type creatures are watching all of your financial transactions, Internet habits, telephone communications, your dishwasher and other appliances, and predicting the future and your every move, and they are betting against you.  See for yourself,

And if this is not friendly enough, what about the adverse health consequences of your phone’s radiation?


Did you know that 4G and 5G (gigahertz or billion cycles per second of radiation) of energy penetrates human tissue and changes the way your cells function. If it can cause the embryo cell wall to harden and prevent fertilization and sterilize the human reproductive system; what else can mobile phone radiation do?  Preliminary studies have also revealed that cell phone radiation may decrease sperm count, sperm motility and viability.

Our bodies are 70% water.  What does microwave radiation do to water?  What is this radiation doing to our brain, cardiac and neural tissues? Studies have shown adverse effects to the blood-brain barrier and flow of cerebral fluid caused by EMF radiation, along with the optic nerve and cornea. What are other peoples’ phones doing to the rest of us (kind of like second-hand cigarette smoke)? I see people holding their phones to their chests, in their laps and some people even have them strapped to their bodies, which leads me to another point.

Why do we have pacemaker warnings because of microwave radiation in convenience stores, but nothing about four and five billion hertz of tissue penetrating energy that surrounds us all the time?  Maybe there is so much money involved with this technology that the producers of it have paid off our lawmakers so that they can get away without notifying us of the harmful effects this technology has on the human body.

If you don’t think there is any harm in using a mobile phone, watch these short videos;, and,

and, and

and how about using your iPad to cook eggs or pancakes:


and how about this exploding phone from reflected radiation?

Don’t think for one second that a new phone has less radiation than an older phone. Can you imagine what this does to children?

If there is a questionable health risk to the smart phone technology, why not err on the side of caution and wait for further, real scientific research? That’s what rational people do.

A senior science fellow at Environmental Health Trust, L. Lloyd Morgan, published a review in July of 2015, in that Journal of Microscopy and Ultrastructure; wherein, a review of the current literature showing that children face a higher health risk than adults was undertaken. He and his team looked at peer-reviewed cell phone exposure studies from 2009 to 2014, along with cell phone radiation data, government documents, manufacturers’ manuals, and similar publications and have concluded that children and unborn babies do face a greater risk for bodily damage that results from MWR given off by wireless devices, according to Morgan and colleagues.

The review reported that the rate of MWR absorption is higher in children than adults because their brain tissues are more absorbent, their skulls are thinner, and their relative size is smaller. Fetuses are particularly vulnerable, because MWR exposure can lead to degeneration of the protective sheath that surrounds brain neurons.

Women who use mobile phones when pregnant are more likely to give birth to children with behavioral problems, according to authoritative research.

A comprehensive study, which surveyed more than 13,000 children, found that using the handsets just two or three times a day was enough to raise the risk of their babies developing hyperactivity and difficulties with conduct, emotions and relationships by the time they reached school age. And it adds that the likelihood is even greater if the children themselves used the phones before the age of seven. Part of my motivation for writing this article was my observation of children waiting at bus stops before school, most of which with heads down, hands under their faces and texting or reading mobile devices. I’ve been to soccer games where two-thirds of the parents are staring at their phones and the others are caressing them in their laps while they watch the game. This is neglectful. If you are a parent and this describes yourself or your children, you are neglecting your children, but the state wants you to do this because it wants to injure you so you will need medical care, cancer treatment and pharmaceuticals and it wants to collect all of your data all the time. Why are you allowing this? Why don’t you let your children play with mercury and x-ray machines as they did in the fifties?

Microwave Invented by Nazis and Banned to Soviets

Did you know that it was the Nazis who actually invented the microwave oven?  They were used in their mobile support calling them the “radiomissor”. These ovens were to be used for the invasion of Russia.  By using electronic equipment for preparation of meals on a mass scale, the logistical problem of cooking fuels would have been eliminated, as well as the convenience of producing edible products in a greatly reduced time-factor.

After the war, the Allies discovered medical research done by the Germans on microwave ovens. These documents, along with some working microwave ovens, were transferred to the United States War Department and classified for reference and “further scientific investigation”. The Russians had also retrieved some microwave ovens and now have thorough research on their biological effects. As a result, their use was outlawed in the Soviet Union (for a year or two). The Soviets issued an international warning on the health hazards, both biological and environmental, of microwave ovens and similar frequency electronic devices.  It’s the same frequency range used in mobile phones today, but on the higher side of the spectrum.

The Russian scientists discovered that Microwaving prepared meats sufficiently to ensure sanitary ingestion caused formation of d-Nitrosodiethanolamines, a well-known carcinogen.  Their research found that, icrowaving milk and cereal grains converted some of their amino acids into carcinogens, that thawing frozen fruits converted their glucoside and galactoside containing fractions into carcinogenic substances, that extremely short exposure of raw, cooked or frozen vegetables converted their plant alkaloids into carcinogens, and that carcinogenic free radicals were formed in microwaved plants, especially root vegetables.

Why don’t we at least require this type of disclosure for our electronic devices?  We have Materials Safety Data Sheets (MSDS) for nearly every compound, why not electronic devices?


What about the physiological effects of looking at your mobile device throughout the day? Millions of people do it throughout the day and are totally unaware that cell phone use can be detrimental to the back. Did you know that cell phone use can double or triple the weight of your head and can strain your neck? If you are reading this article on a cell phone or tablet, you are probably doing it right now, tilting your head forward and down in order to look at your device.

Typically, an adult human head weighs between 10 and 12 pounds. As the head tilts or angles forward, the cervical spine’s (neck) muscles, tendons, and ligaments support the head during movement and when static; such as holding the head in a forward tilted position. Even the neck’s inter-vertebral discs are involved and help absorb and distribute the forces exerted on the neck. The Chief of Spine Surgery at New York Spine Surgery and Rehabilitation Medicine, Kenneth K. Hansraj, MD, created a computer model of the cervical spine. In an article published in Surgical Technology International, he reported that this model showed that the strain on your neck rises as the forward angle of your head increases: at 15 degrees of forward tilt may equate to a head weighing 27 pounds, at 30 degrees forward, the strain on the neck equals a 40 pound head. The greater the angle, the greater the strain: 45 degrees forward equals 49 pounds of strain, and 60 degrees forward equals 60 pounds.

Now consider the fact that the average person is holding his or her head forward to look at a phone or read a tablet for 2 to 4 hours a day, according to Dr. Hansraj. teenagers spend even more time each day looking down at their devices. As you tilt your head, you also move your shoulders forward into a rounded position, which is another aspect of poor posture. All this excess strain creates extra wear and tear on the structures of the neck, upper spine and back, and contributes to spinal degeneration that may require surgery.


If you’re one of those people who glances at his smartphone 150 times a day, chances are your eyes are paying the price for your screen addiction. Staring at your smartphone — or tablet, e-reader or laptop, while we’re at it — for too long can lead to tired, itchy, dry eyes, and even blurred vision and headaches.

Digital eye strain or asthenopia, sometimes referred to as computer vision syndrome, is well documented. If you’ve ever experienced dry or irritable eyes, blurred vision, eye fatigue, or head, neck and back pain after using a computer or smartphone, then you’re familiar with it.

A 2015 report from The Vision Council, Hindsight Is 20/20/20: Protect Your Eyes from Digital Devices, found that 61 percent of Americans have experienced eye strain after prolonged use of electronic devices — nearly 2 out of every 3 people. Long-term damage or not, we have an outbreak of eye strain on our hands.

Mobile phones emit HEV light (also called blue light), so staring at phone and tablet screens may actually harm our eyes permanently. HEV light is that portion of the visible light spectrum that comprises light with the shortest wavelengths, which carry the greatest potential to damage living tissue.

Reading your mobile phone within an hour of going to sleep may impair your natural sleep cycle that normally responds to the cycle of the sun setting and the onset of darkness. By stimulating your optic nerve with this type of light, it causes your brain to act as if the time is in the middle of the day. This interferes with the different phases of your brain waves and sleep cycles. It’s no wonder why the inventor of this technology, Steve Jobs, refused to allow his children to use an iPad or iPhone.


Some of this may be redundant because different references I’ve used in this article have arrived at the same conclusions from different research. The recent explosion of smartphone use has provided people with the ability to access limitless information and instant communications at any given moment. Ninety percent of adults in America own a cell phone, and while this may not be a problem for many people, some individuals develop an addiction to their mobile devices. Mobile phones are constantly being improved by expanding upon their functionalities, which in turn increases the likelihood of overuse and addiction. According to the PEW Research Center, 67% of smartphone owners have admitted to checking their phone for calls or messages when their phone didn’t vibrate or ring. This is one major sign of cell phone dependence and should serve as a warning to cell phone owners. A more sinister discovery is that applications such as Facebook are purposes designed so that when the subscriber checks for messages, a slight delay is programmed into the response so that it creates a elevated degree of anxiousness and when the messages finally load and display, the sensation of satisfaction becomes addicting. This type of addiction has symptoms.

Although cell phone addiction is not yet listed in the Diagnostic and Statistical Manual of Mental Disorders, 5th Edition (DSM-5), research has compared it to gambling addiction, which has clearer diagnostic criteria and is included in the DSM-5.

At least 4 of the following signs and symptoms are thought to comprise criteria for cell phone addiction, and the problematic cell phone overuse must cause significant harm in the individual’s life:

A need to use the cell phone more and more often in order to achieve the same desired effect.

The compulsion to ignore dangerous or awkward situations in order to read phone, such as texting and driving, or texting while standing in the middle of the parking lot or a public walkway and being oblivious to obstructing others, such as texting or read one’s phone in a doorway or hallway in a crowded movie theater.

Persistent failed attempts to use cell phone less often.

Preoccupation with smartphone use.

Turns to cell phone when experiencing unwanted feelings such as anxiety or depression.

Excessive use characterized by loss of sense of time.

Has put a relationship or job at risk due to excessive cell phone use.

Need for newest cell phone, more applications, or increased use.

Feelings of withdrawal, when cell phone or network is unreachable or after forgetting your phone.

Feelings of anger, tension, depression, irritability, restlessness.

Overuse of your cell phone or smartphone can result in a number of different physical problems that may cause permanent damage or be difficult to treat, including:

Digital eye strain, you have pain and discomfort associated with viewing a digital screen for over 2 hours. Your eyes begin to burn and itch or you have blurred vision, eye fatigue or headaches, or a combination of these. You may also suffer from neck pain, also known as “text neck,” which refers to neck pain resulting from looking down at cell phone or tablet for too long.

There is also an Increased illnesses due to germs. Did you know that 1 1 in 6 cell phones has fecal matter on it? E. coli bacteria, which can cause fever, vomiting, and diarrhea, is found on many phones. Phones have been found to be contaminated with MRSA. Phones have also been discovered to cause painful abscesses and life-threatening infections in bones, joints, surgical wounds, bloodstream, heart valves, and lungs.

Car Collisions

There are no “car accidents” from texting while driving as the term “accident” implies it could not have been avoided. These are car collisions resulting from negligence and deliberately choosing to put your life and the lives of others at risk by texting while driving, or viewing your phone while driving. Again, waiting in traffic is not free time to read your phone to resume a texting conversation. Many people mistakenly believe that they can multitask and use their phones while driving, but this causes significant impairment and puts the driver and others on the road in danger. Research has revealed that texting and driving can be just as dangerous as drinking and driving.

In addition to these, there are important adverse psychological effects of cell phone addiction. It can be the cause of sleep loss. Mobile phone addiction has been linked to an increase in sleep disorders and fatigue in users. Using your cell phone before bed increases the likelihood of insomnia. Bright light may decrease sleep quality. Smartphone use could increase amount of time it takes to fall asleep. Light emitted from the cell phone may activate the brain and interrupt the sleep cycle.

Other symptoms include depression, obsessive/compulsive disorder, relationship problems, real world relationships may suffer as a result of neglect in favor of excessive mobile phone and social media use. You may suffer from anxiety. Research has found that college students who use their cell phones the most are more likely to feel anxious during downtime.

Are you addicted to your smartphone? Consider these questions:

Do you find yourself spending more time on your smartphone than you realize?

Do you find yourself mindlessly passing time on a regular basis by staring at your smartphone even though there might be better or more productive things to do?

Do you seem to lose track of time when on your cell phone?

Do you find yourself spending more time texting, tweeting, or emailing as opposed to talking to real-time people?

Has the amount of time you spend on your cell phone been increasing?

Do you secretly wish you could be a little less wired or connected to your cell phone?

Do you sleep with your smartphone on or under your pillow or next to your bed regularly?

Do you take your phone into the bathroom or while exercising in the gym?

Do you find yourself viewing and answering texts, tweets, and emails at all hours of the day and night, even when it means interrupting other things you are doing?

Do you text, email, tweet, or surf the internet while driving or doing other similar activities that require your focused attention and concentration?

Do you feel your use of your cell phone actually decreases your productivity at times?

Do you feel reluctant to be without your smartphone, even for a short time?

When you leave the house, do you ALWAYS have your smartphone with you and you feel anxious or uncomfortable when you accidentally leave your smartphone in the car or at home, or you have no service, or it is broken?

When you eat meals, is your cell phone always part of the table place setting?

When your phone rings, beeps, buzzes, do you feel an intense urge to check for texts, tweets, or emails, updates, etc.?

Do you find yourself mindlessly checking your phone many times a day even when you know there is likely nothing new or important to see?

Believe it or not, you could be suffering from an un-diagnosed mental disorder by the manner in which you use your mobile phone, and there are actual treatments for it, just like any other mental disorder.

There has to be ways to counteract the security and safety problems I’ve described here, and there are.

Safe Conduct, Encryption and EMF Shielding

The easiest and most obvious is, stop using your phone while you’re driving, or sitting in traffic. Have the self discipline to wait and use your phone when you are not behind the wheel. Waiting in traffic is not your free time to resume a chat session.

If you’re going into a public restroom, or any bathroom or locker room, be sure to conceal your phone so that no part of it can be seen, and of course, don’t use it while in those locations. There are new devices you can buy to encase your phone and block, at least the camera, and some block the microphone. I can envision a day when businesses provide a wall of key-lock boxes insulated into Faraday cages so that customers can place their phones safely and securely into them and eliminate all or most of the EMF radiation from so many phones in one building.

How do you limit your exposure to the radiation and surveillance from your phone? Carry it in a specially designed EMF shielded pocket (usually about $20) and use the speaker phone or ear buds when you can during conversations, and avoid using your phone to answer email or read websites. Instead of using the factory installed chat or text function, download the free app “Signal” and use that instead, it’s end to end encryption. Replace your Wi-Fi router with an Ethernet only router (careful not to choose one with both features). Keep your router in a Faraday cage, you can buy these and they are actually kind of stylish.  Double-wrap all your power transformers with aluminum foil and keep them at least a meter away from your body when you’re using your computer. When you can, store your phone in a double foil-lined shoe box (makeshift Faraday cage) stored in the microwave, and don’t get me started on microwaves; I’ll just tell you that I unplugged and replaced mine with a really nice toaster oven, and use it only to store my mobile phone. A microwave is a Faraday cage, but you can now buy a real Faraday cage for your Internet router and other electronic devices. It’s worth researching and you don’t need to spend lots of money to protect yourself within reason.

You can also consider using EMF shielding and absorbing fabrics and materials in your home and look at the different versions of a “chem buster” online and see if that might be something you’d want to use to absorb these frequencies to prevent them from being absorbed by your body.

Don’t let your children hold or carry these devices close to their bodies or charge them at night within the room in which they are sleeping, and especially, don’t leave them under the pillows where your children are sleeping. Basically, children should not have mobile phones, especially at school.


The CIA is Spying on Your with Your Own Devices

International Commission on Non-Ionizing Radiation Protection

The Human Body and Millimeter-Wave Wireless Communication Systems

Is Your Cell Phone Killing Your Back?

Your Phone Camera and Microphone are Spying on You and Everyone Around You