Discover How to Reduce Your Risk, Restore Your Brain Health, and Reverse the Effects of Alzheimer’s & Dementia with this groundbreaking video series.

Brain Health Series

Dr Keith Scott-Mumby writes:

My dear colleague recently put together an absolutely incredible video series where they interviewed 10 of the best minds in brain health.

They’ve created this series to bring you the most groundbreaking, life-changing information that science has to offer – straight from the doctors on the frontlines.

These medical professionals are watching healing happen firsthand in their patients.

They know what works and what doesn’t, and they’re here to spill all the secrets in this new video series. I promise you, you do not want to miss this.

The best part is, as a member of my community, YOU are invited to attend an exclusive online broadcast of this groundbreaking series for FREE!

It’s called Brain Health Breakthroughs, and all you have to do is click the link below to register so you can receive the viewing link when the broadcast begins.

Click here to register FREE for the 10-day online broadcast of Brain Health Breakthroughs!

https://brainhealthbreakthroughs.com/

An Open Letter To The People Of Israel

War Victims

I have just watched a video where three ex-members of the Israeli Defence Force (IDF) express incredulity over the lack of early warning of the Hamas attack on Israelis and the lack of standard procedure applied in the area where Hamas breached border security and the 12 hour delay to respond.

They said the surveillance is so sophisticated that soldiers watching the video screens of the area know when a bird approaches the border, let alone when a group of terrorists blow up part of the fence.

One said there was no way this could have occurred without complicity by senior officials.

Which when you consider that part of the border where Hamas attacked was deliberately left unmanned by a transfer of regular guards from there to the West Bank, the fact that the music festival was moved to that area with two days notice, and the Egyptians warned Israel that something major was coming, all the pieces of the jigsaw puzzle appear to be in place for it to warrant being investigated as a false flag operation to justify the genocide of Palestinians and the seizure of their land.

I have a suggestion of how to repatriate the hostages taken by Hamas.

Tell Hamas you need 30 days to organize a trade. Organise a cease-fire.

In that time convene an impartial, independent, top level investigation into the above data to determine if there was complicity by anyone, from the PM down.

If there was, all the person’s assets should be used to provide reparations to the injured and families of the deceased and they should be traded to Hamas for the hostages.

Once you have removed the persons standing as barriers to peace then look at the actions that would bring about a lasting, equitable resolution to that which stands in the way of peaceful coexistence.

It is shockingly barbaric that this so-called civilization persists in trading an eye for an eye after continually and consistently proving that it does not bring peace.

Sugar Poisoning Season

Sugar Poisoning Season

Stacey DaPrato writes about this, a story with which I can relate due to similar, if slightly less dramatic, episodes with my children:

Today I witnessed firsthand something that I often speak out about, and I really feel the need to share.
To preface, we NEVER have candy. We don’t allow it in the house. I hate holidays like Halloween for this very reason. Candy is given out everywhere, all the time. As someone who understands the ramifications of what candy does to children, it is so hard for me to enforce “no candy” when my 6-year-old sees it being handed out like it’s no big deal.
Today we attended an (otherwise super fun!) event where candy was given out. I hesitated to even allow her to collect it – but, given that I am trying to “loosen up” and take a more balanced approach, I allowed her to select a few pieces to bring home. She had one piece at the event, and I told her she could have 2 small pieces after dinner later. The candy was on a pedestal in her mind all day. She kept begging me to have it. She was like a drug addict. After dinner, she had her two pieces.
Within 30 minutes, my child was no longer acting like herself. She was bouncing off the walls. Jittery, couldn’t sit still. Was bouncing in her seat while we tried to play a game with her. She got up and started jumping and running all over the living room. And the anger when it was time to clean up was something I haven’t seen from her in a very long time. Hitting things, grabbing at things. She was feral, and it was insane.
This. This is why I don’t allow it. And THIS is why so many children have behavioral issues. THIS is why so many children are diagnosed with ADHD – yes, I do understand that a small percentage of people do legitimately have this disorder, but the amount it gets diagnosed today is just so far beyond that. Then parents turn around and medicate them with harmful pharmaceuticals.
And here’s the thing – it’s not just the candy! These dyes, artificial flavors, emulsifiers, high fructose corn syrup/refined sugars in general, and so many other chemical additives are is SO MANY of our “foods”. It’s alarming, yet nobody is talking about it.
Here’s the kicker: in addition to the behavioral issues, all of this processed stuff contributes to sickness – yes, it really does. I challenge you to take a close look at the ingredients of the items in your pantry and fridge. Then ask yourself, how often do your kids get sick? I can tell you mine hardly ever do – even during “flu season” – and it’s largely because we severely limit refined sugar, and don’t allow ANY dyes or junky additives in our home.
Where is the outrage???

Don’t Text And Drive!

Don't Text And Drive!

The Honda crotch rocket rider was traveling at approximately 85 mph.

The VW driver was talking on a cell phone when she pulled out from a side street, apparently not seeing the motorcycle. The rider’s reaction time was not sufficient enough to avoid this accident.

The car had two passengers and the bike rider was found INSIDE the car with them.

The Volkswagen actually flipped over from the force of impact and landed 20 feet from where the collision took place.

All three involved (two in the car and the bike rider) were killed instantly. This graphic demonstration was placed at the Motorcycle Fair by the Police and Road Safety Department.

Pass this on to car drivers or soon to be new drivers, or new motorcycle owners and especially everyone you know who has a MOBILE phone!!!

A picture is worth a thousand words.

Save a life. Stop talking on mobile phones and Texting while trying to drive.

The life you save may be your own….. Or mine…

Keep passing this on so everyone will see what can happen by using a mobile PHONE while driving.

China’s “shaking down” tech companies to steal your data

(Tom: I received this in an emailed newsletter. No shortage of risks in a digital world. Seems the old saw “knowledge is power” cuts both ways. [Pardon the pun.])

ByteDance is a China-based tech company. They own several smartphone apps but are best known as the parent company of TikTok.

Now, I don’t have to tell you about the dangers of TikTok, there has been plenty written and recorded about that.

Yet, ByteDance and any tech company operating in China have to face new challenges in the way they handle cyber security.

China has imposed a law that requires tech companies to report software flaws to the government.

Companies must report the flaw within 48 hours, and it has to be reported before it’s fixed (there is an obvious sinister intent to this law, which I’ll talk about in a moment).

In the case of ByteDance, the company provided the government with “super user” credentials, giving the government unlimited access to user data.

Which means, the Chinese government was able to collect the data of any and all U.S.-based users, estimated at over 150 million U.S. TikTok users.

There is a lot more to this law than meets the eye. So, here are a few reasons why this law could affect users in the U.S.

State-sponsored hacking:

There is (obviously) a reason the government wants the information on the flaw before it’s fixed…

It allows government hackers to get into the database and extract data. This is especially scary for foreign-made software.

And as you’ve already seen, it’s not just Chinese citizens that will be compromised.

The Chinese government could infiltrate the software and its users who could be anywhere in the U.S.

So, if you use any software that is made in China you should pay close attention if the company is ever hacked.

If there is a security flaw it’s not just hackers you need to worry about, you have to assume the Chinese government has the data as well.

Collected vulnerabilities:

It’s no secret that the Chinese government has massive cyber hacking operations.

While the Chinese hackers are good at what they do they aren’t perfect.

But now they’ll have access to the latest security flaws from tech companies around the world.

By getting information on security issues that tech companies are facing, the hackers are essentially being given blueprints for hacking operations in the future.

So, if there was a hacking method the Chinese hackers missed or overlooked, they would learn about it from the tech companies being forced to self-report.

Foreign companies also comply:

There are plenty of U.S. companies that have offices and operations in China.

But even though these companies are not based in China they are still required to follow the law – it’s the cost of doing business there.

There have been reports that some foreign tech companies have already started complying with the law.

They’ve had to open their software to the Chinese government and its hackers, these companies have no choice unless they want to leave China.

Which means, even if a company is based in the U.S, it still may be forced to share security flaws with the Chinese government or be shut out of doing business there.

This intrusive Chinese law, and forced compliance, requires you to be even more vigilant when it comes to your security online.

That’s why I continue to use a simple, proven method to keep my personal and private information shielded from prying eyes and hackers.

Jason Hanson

Editor, Black Bag Confidential