The Danger Nobody Is Talking About

Let’s say you are the president of a country that has been very successfully trading with your major trading partner and built up huge reserves in that country’s currency. This is both an asset, because you can buy things with it and a liability, because that other country can print lots more currency, thus devaluing what you have.

If you stick it in the bank it earns very modest interest and devalues with inflation and has the large downside of dramatic devaluation with dramatic inflation in your trading partner’s currency. And considering your trading partner is spending more than they are earning, that is on the cards.

If you dump that currency it will quickly become worthless. A not-so-attractive option.

If you buy precious metals with it that is some hedge against devaluation but no income stems from it. Also an unattractive option.

Or, if you got bright you could look around the planet and start buying up income producing assets af lasting value. Things like shipping ports, airports, livestock and crop farms, dairies, wineries and now hospitals.

You could also lend it to other countries for them to do with what they wished knowing full well that if they defaulted on their loans you could legally acquire some assets of that country to expiate the debt.

This is all very well if the country about which we are talking has a benign leadership. But if they are a beligerant neighbour, known to invade and subsume their less powerful neighbours by relocating their own citizens to their neighbour’s land and forcefully removing the citizens of their neighbour inside their own borders, to conduct trade espionage and steal tade secrets, suppress minority groups and religions, conduct state sponsored organ harvesting on live citizens then we have a potentially huge problem.

Then I learned that years ago they announced plans to relocate 300 million of their citizens to African countries to which they have loaned money and we start to see the pieces of a world domination plan fall into place.

Gulf War Syndrome: Documents Prove UK and US Military Personnel were Injected with Untested Vaccines


Gulf War Syndrome: Documents Prove UK and US Military Personnel were Injected with Untested Vaccines

As Christina England was writing this expose the past week, Polly Tommey, one of the producers and part of the VAXXED film team, filmed an interview with Sherrie Saunders, a former military medic and now whistleblower regarding military vaccines.

Sherrie discovered that the animal protein in the anthrax vaccine was causing Gulf War syndrome in some soldiers, some who even died. When she reported it to her commander, she got a visit from someone in Washington, D.C. and was told to keep quiet about it.

She is no longer keeping quiet. Listen to this interview which is going viral on the Internet:

Just-Right Personas: How to Choose the Scope of Your Personas

Just-Right Personas: How to Choose the Scope of Your Personas

A “Persona” is a fictional representation of an actual user and is applied in the early stages of product development or product redesign. Personas are vital to the success of a product because they drive design decisions by taking common user needs and bringing them to the forefront of planning before design has actually started. Personas provide the team with a shared understanding of users in terms of goals and capabilities. Once Personas are defined, going through a task analysis exercise with scenarios will offer an inexpensive way to test and prioritize features throughout the development (see lesson #2 in the blog Responsive Design: Getting started).

Narrow and broad-scope personas achieve different goals. Success depends upon knowing the tradeoffs and structuring your personas’ scope based on what you are trying to achieve. (7 min. to read)

How to prevent business email compromise attacks


Business email compromise (BEC) scams are low-tech attacks that use social engineering techniques to exploit natural human tendencies.

While they may not get as much attention from the press as high-profile ransomware attacks, BEC scams are considered one of the biggest threats facing companies today. Between June 2016 and July 2019, there were 32,367 successful BEC scams in the U.S., which cost U.S. businesses more than $3.5 billion, according to figures from the FBI.

Fortunately, there are some very effective and easy-to-implement strategies for stopping BEC attacks. In this post, we’ll show you how you can combine staff training, process implementation and authentication technology to protect your organization from BEC attacks.

Burglars Really Do Use Bluetooth Scanners to Find Laptops and Phones


Law enforcement officials have confirmed that some burglars use Bluetooth scanners to guide certain break-ins. “In our corridor, yes, we have noticed that they are in use,” says Monica Rueda, a crime prevention specialist at the San Jose Police Department in California. “Right now we do know that thieves are utilizing them.” Rueda declined to name specific apps or features that are in use, citing ongoing investigations.

Regardless of the specific method preferred by crooks, though, Rueda says that she and other SJPD crime prevention specialists strongly discourage people from ever leaving valuables unattended in their cars. If you have to do so for some reason, she says, place them on airplane mode or fully power them down rather than leaving them in any type of sleep or standby mode. “Even if you might think the battery is dead, it might not actually be dead, it might still be able to emit a signal,” she says.