Your Color VIbe for September 11

Wednesday,   September 11:    Light Salmon Pink

So, are you ready for today?  There is a lot in the air right now, and today’s energies are coming on very strong.  You will need to start your day centered and in alignment.  Things will be rocky from the moment that you leave your place of comfort.  That is why the grounding is extremely important.  Watch yourself in traffic and think before you react or speak. Things are shifting today, and that can make you a little crazy.  Yes, that little man in the corner was there.  No, you are not crazy.  The veils are very thin right now, and there are portals that are opening up.  Some of the things you are seeing are related to those opening.  You will know when what you see is real and what is mere a kind of imago asking you, telling you to pay attention to what is going on around you.  This is a kind of pivotal day.  There is nothing written in stone about today, and it is time for you to begin building, continue the construction of, or complete your foundation.  Foundations, strong foundations, are what will give you the basis for being and surviving in the coming energies.  Today can teach you a lot about foundations.

Weekly Color VIbe

September 8-17:

The theme this week is just when you thought it was safe….  You must sometimes wonder why “they” are just not getting it.  Well, this week will give them a run for their money, maybe break a few preconceptions and make “them” take somewhat of a different point of view.

 

Overall Color for the Week:

Okay, personal power is a really, really important thing to be aware of in all you do, how you do it, with whom, and when .  You will get it as the week goes on.  You will be faced by challenges that can test your deepest abilities.  When things get to be too much, remember there is no weakness in turning towards trusted ones for assistance.  But this week, how they respond to you will tell you quite a bit about where the relationship.  There can be some startling moments.  There can be some tears.  There can be surprises as those you took for granted can turn out to be your best friends when things get tough.  Things are changing,  You will need to do some real soul searching in terms of WHO you are and what it is that you are really seeking to realize in this turn of the wheel.   No judgments.  It is all up to the one you look at in the mirror.  Oh, and look for some unexpected developments in areas that perhaps you were worried about.

On the larger sale, there will be many turnabouts this week.  Watch what is being said in the news.  If you are one of the people watchers, then look to see what the stars who are in the forefront are saying and doing.  You may be surprised to see many having regrets over things done and/or said in the past.  The political scene will be rocking as there is an undercurrent of disharmony that is making itself felt in many different ways.  The governmental leaders will be finding themselves challenged more and ore by those politicians who truly represent the people.  This is a also a week in which there will be some secrets revealed in terms of various government agencies and their agendas.  There can be the beginnings of some topplings in areas of power as more and more stuff is brought to the fore. and more and more those in charge are finding themselves like the Emperor with no clothes.  This will be an interesting week on the media and political scenes.  Look to the sky for more activity in terms of both UFO’s and national army maneuvers.  There is something moving within the core of Gaia.  It is responding to a tug from that extra-galactic energy which is now within in our solar system and likewise exerting a pull on the Sun.  Expect there to be new and unusual activity from the Sun. You might even notice yourself, when outside, that it seems as though there is something different about the Sun.  Gaia is rearranging herself, and this week will give evidence to what she is beginning to do.  There will be more storms in areas that have been quiet.  There also can be a barrage of sea storms, one after the other.  Tis is beginning now and will continue for some time.  Watch the birds.  They have messages for everyone.  If you can spend time and meditate on their song, you might even find that they have something to say to you.  Look also at the activities of the animals on the land and the creatures in the sea.  They are taking on new patterns and strategies as these crazy energies come flying through.

Your Color Vibe for September 9

Monday, September 9:     Hazy Blue

There will be a lot of confusion around today.  Some of it will be accidental and some will be on purpose.  It is good to be aware, when things do not seem clear, as to whether this is due to the energetic shifts and changes or rather if it is because of some people not wanting you to be aware of what it really going on.  If you step back from the situation, you will be able to see the difference.  It is well, therefore, to be cautious in word and deed.  There are a lot of agendas out there, and people are trying hard right now to get theirs all taken care of.  You do not want to be a victim of someone else’s ambition or desire.  Again, step back from things today.  Be the observer; see the longer view.  Right now, the pieces are falling ever more into place and there are various people out there who are trying to arrange matters to suit their own ambitions.  If you step back and take a new perspective, you will be able to understand where they are going.  It is time to know from within, to be grounded and centered, and to go forth in your true knowing towards that which you desire.  There is no wrong in this as long as you are strong within your heart center, working from your core, and connected to the Universal Consciousness.

New Types of GMO’s COming

Stealth GMOs Are Coming: Approved & Unlabeled Everywhere

September 6, 2013 by admin

Genetically modified organisms are a terrifying development when we know they exist, but there’s a new system of creating GMOs that’s getting a complete pass. By fiat, our governments are allowing a process that produces genetically modified ‘foods’ for sale with absolutely no oversight. They can be called natural, or simply not labeled. Nothing, absolutely nothing, interferes with their introduction into the food supply.

DNA for Businessby Heidi Stevenson

Genetic engineering means changing the genetic material of a living plant, fungus, or animal. What we’ve been fighting is merely one type, recombinant DNA, in which the gene from one species is transplanted into another. But it isn’t the only way to change genes. Another technique has been developed and patented, technically called oligonucleotide-directed mutagenesis (ODM), but branded Rapid Transit Development System (RTDS) by Cibus, of San Diego, California.

A type of rapeseed has already been developed using this technique. The UK’s  Advisory Committee on Releases to the Environment (ACRE), a part of the Department for Environment, Food and Rural Affairs (Defra), reviewed this product back in 2011 and concluded:

ACRE considers that herbicide tolerant (HT) oilseed rape plants produced by Cibus LLC have been developed using a form of mutagenesis. It considers that this technique does not involve the use of recombinant nucleic acid molecules. Consequently, the HT oilseed rape plants could be excluded from the GMO Deliberate Release legislation in accordance with Annex 1B of Directive 2001/18/EC.

In other words, an organism that’s been genetically mutated by ODM/RTDS is not being treated by the government as a genetically modified organism! This technique is sliding around the concerns of genetically engineered plants and animals by using a technique different from recombinant DNA.

New Zealand has taken an equivalent stance. The US Department of Agriculture (USDA) told Cibus back in 2004 that they could go ahead with no need to go through an approval process and absolutely no oversight!

Cibus has filed for patents from the EU on several crops, including:

  • Glyphosate-tolerant crops, including corn, wheat, rice, barley, soybean, cotton, sugarbeet, oilseed rape, canola, flax, sunflower, potato, tobacco, tomato, alfalfa, poplar, pine, eucalyptus, apple, lettuce, peas, lentils, grape, turf grasses and Brassica species (broccoli, Brussels sprouts, etc.).
  • Sulfonylurea herbicide-tolerant canola/rapeseed.

These crops are being sold as natural! They are even claiming that these genetically engineered crops were developed using a technique that’s been in use since World War II, which is obviously untrue.

What Is Oligonucleotide-Directed Mutagenesis?

First, let’s define some terms:

  • Nucleotide: The basic structural unit of DNA.
  • Oligonucleotide: A molecule that contains a small group of nucleotides. Therefore, an oligonucleotide is a small string of the units that make up DNA.
  • Mutagenesis: Something that can cause a mutation.

ODM involves the use of synthetic oligonucleotides. They call this molecule a Gene Repair Oligonucleotide (GRON). It contains the desired genetic change, which consists of a single nucleotide. This chain of nucleotides is inserted into the DNA of an organism. However, it’s done in such a way that the organism sees an error. So, the organism’s own DNA repair system is enlisted to fix the error. In that error-repairing process, the genetic change is affixed into the organism’s DNA.

How does this actually happen? In fact, no one knows! The technique works, but the Senior Vice President of Cibus, Peter Beetham, has admitted that the means by which the repair occurs is “elusive”. The Institute of Science in Society tells us:

Mismatch repair is ordinarily used by the cell following mistakes in DNA replication or recombination as well as in DNA damage. It relies on enzymes that recognise the mismatch by comparing the strand to a template strand’s homologous region … after which the DNA mismatched sequence is cleaved out, the correct bases synthesised and the DNA re-ligated back together. This is a highly complex process essential to the integrity of the DNA and the cell. However, this remains a speculation, and others have suggested that homologous recombination, transcription as well as DNA replication processes are involved.

So, this absolutely critical process is, essentially, a mystery. Whether it could create serious damage to DNA is unknown. Whether it might affect other parts of the DNA is unknown. Whether it has the potential of causing changes that might prove harmful to anyone who eats the resultant produce is unknown! In other words, the only thing that’s known about this process is that the desired change is made in a species. Whether other changes are made or that change might prove harmful in some as-yet unknown way is unknown.

Yet, our governing agencies have seen fit to not only rubber stamp the ODM process, but to give it a complete pass. Cibus is allowed to sell obviously genetically engineered products as “natural”. They are not required to submit to any oversight of any sort. They can churn out stuff with no labeling of any sort and leave the public entirely in the dark about the fact that they are, indeed, eating genetically engineered foods that haven’t even undergone the pathetically limited oversight of governmental agencies for GMOs produced by Monsanto and other corporations.

You thought that Monsanto was scary? Welcome to Cibus, Monsanto on steroids!

from:    http://gaia-health.com/gaia-blog/2013-09-06/stealth-gmos-are-coming-approved-unlabeled-everywhere/

Latest NSA Leak

Why the Latest NSA Leak Is the Scariest of All

Paul Wagenseil, TechNewsDaily Senior Editor   |   September 06, 2013
woman's cold blue eyes staring out through mesh of binary code
Credit: Juergen Faelchle/Shutterstock.com

The National Security Agency programs revealed yesterday (Sept. 5) in three media reports were perhaps the most important revelations yet this summer, and have profound implications for everyone who uses the Internet.

The reports make clear that the NSA and its British counterpart Government Communications Headquarters (GCHQ), have been methodically undermining the vast encryption-based “web of trust” that makes possible secure online financial transactions, communications and other sensitive transmissions.

The spy agencies’ activities have gone on for more than a decade. Like a silent but pervasive cancer, they have penetrated and weakened every corner of the Internet.

“Not only does the worst possible hypothetical … appear to be true,” wrote Johns Hopkins cryptographer Matthew Green on his blog last night, “but it’s true on a scale I couldn’t even imagine.”

“The companies that build and manage our Internet infrastructure, the companies that create and sell us our hardware and software, or the companies that host our data: We can no longer trust them,” wrote American encryption expert Bruce Schneier on the website of the British newspaper The Guardian.

MORE: 13 Security and Privacy Tips for the Truly Paranoid

Subterfuge by any means necessary

The surveillance programs, named “Manassas,” “Bullrun” and “Edgehill” after battles in the American and English civil wars, not only built powerful computers to crack encryption protocols.

They also coerced technology companies into handing over encryption keys, infiltrated NSA and GCHQ personnel onto corporate staffs, broke into the computer servers of uncooperative companies to steal information and ensured that some companies built “backdoors” into their technology so that the spy agencies would always have access.

Perhaps most egregiously of all, the NSA and GCHQ deliberately poisoned publicly distributed encryption standards, used by hundreds of millions of people across the world every day, so that the standards would be secretly — but fatally — flawed.

“The (actually substantial) goodwill that NSA built up in the public crypto community over the last two decades was wiped out today,” tweeted University of Pennsylvania cryptography expert Matt Blaze.

The implications are that, if they wanted to, the spy agencies could access nearly every Internet-based purchase, money transfer, email, Internet phone call, instant message or file transfer made by anyone, anywhere.

Early hints of secret tampering

The programs were revealed by documents provided in June to The Guardian by former NSA contractor Edward Snowden, who has since taken refuge in Russia.

The Guardian, which has come under pressure from GCHQ to stop publishing Snowden material, shared the documents with The New York Times and the American nonprofit online outlet Pro Publica.

All three publications simultaneously posted stories on their websites yesterday afternoon.

The media outlets, wary of undermining national security in both countries, did not specify which encryption protocols have been compromised. (The spy agencies had asked that the stories not be published at all.)

But at least one has already been identified: Dual Elliptic Curve Deterministic Random Bit Generator, or Dual_EC_DRBG, a random-number generator developed by the NSA and endorsed by the U.S. federal government’s National Institute of Standards and Technology (NIST) in 2007. (Random-number generators are essential to the operation of many encryption protocols.)

That same year, Schneier noted that Dual_EC_DRBG was subtly flawed in a way that permitted the holder of a secret key — an unknown numerical constant — to completely undermine encryption protocols based on it.

“Not only is [Dual_EC_DRBG] a mouthful to say, it’s also three orders of magnitude slower than its peers. It’s in the standard only because it’s been championed by the NSA,” Schneier wrote in a November 2007 Wired article. “We have no way of knowing whether an NSA employee working on his own came up with the constants — and has the secret numbers.”

Schneier, a source for some Tom’s Guide articles, revealed yesterday that he has been helping The Guardian analyze the Snowden documents, and for that purpose had even bought a new computer that “has never been connected to the Internet.”

“What I took away from reading the Snowden documents was that if the NSA wants in to your computer, it’s in. Period,” Schneier wrote in an opinion piece published on the Guardian website yesterday.

How to protect yourself — maybe

On the Guardian site, Schneier offered advice to readers seeking to keep their data private: Use the anonymizing Internet service Tor, encrypt emails and other communications and use open-source encryption software instead of commercial encryption products.

“My guess is that most encryption products from large US companies have NSA-friendly backdoors,” Schneier wrote, “and many foreign ones probably do as well.”

Yet even Schneier’s informed recommendations may be only hopeful guesses. Because the Snowden documents did not name all the encryption protocols, pieces of software and technology companies compromised by the NSA and GCHQ, few people know what’s safe and what’s not.

Tor only offers partial security, and the Times’ story implied that the Secure Sockets Layer (SSL) open-source security standard, which underlies nearly all secure Web transactions, had been compromised.

Likewise, the Pretty Good Privacy (PGP) open-source encryption standard, which Schneier also recommended, is so old, so widely used and was once such an irritant to the U.S. government that it would be first on a list of things for the NSA to crack.

However, just because the NSA and GCHQ could be watching you, it doesn’t mean they are.

“Assume that while your computer can be compromised, it would take work and risk on the part of the NSA — so it probably isn’t,” wrote Schneier.

If everyone sees it, no one can lie

It’s likely some of the newer open-source technology, such as the Transport Layer Security (TLS) 1.2 Web-security standard (meant to replace SSL but not yet widely adopted), or the free RedPhone and Secure Text Android apps, are not compromised. Their code is openly available for expert review and revision.

It’s also likely that closed-source technology developed by major U.S. or British corporations has been compromised. The paranoid rants dating back to the 1990s about NSA backdoors in Microsoft software or Intel chips suddenly make sense.

Even the story published last month by the German magazine Die Zeit, which suspected that Microsoft’s Trusted Computing chips were secret NSA backdoors, and which we dismissed as exaggerated, no longer seems unreasonable.

“I’m no longer the crank,” wrote Green on his blog yesterday, referring to his own speculation about NSA activities. “I wasn’t even close to cranky enough.”

MORE: Beat the FBI: How to Send Anonymous Email Without Getting Caught

Undermining your security to keep you secure

The NSA and GCHQ will argue that undermining every possible piece of encryption and security is necessary for the greater good of keeping the U.S. and Britain free from terrorism, and that their adversaries in Russia and China are trying to do the same thing. (Some intelligence experts think Snowden has been a Russian agent all along.)

“Throughout history, nations have used encryption to protect their secrets, and today, terrorists, cybercriminals, human traffickers and others also use code to hide their activities,” the Office of the Director of National Intelligence, James Clapper, said in a statement today (Sept. 6) and posted on Pro Publica’s website. “Our intelligence community would not be doing its job if we did not try to counter that. … The fact that NSA’s mission includes deciphering enciphered communications is not a secret, and is not news.”

“The stories published yesterday, however, reveal specific and classified details about how we conduct this critical intelligence activity,” the statement said. “Anything that yesterday’s disclosures add to the ongoing public debate is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.”

But the collateral damage from these programs may be worse than a terrorist attack. From now on, suspicion will be cast on all products from major U.S. technology companies — the key players in an industrial sector in which the U.S. is trying to maintain dominance.

Why should consumers, business or foreign governments trust software from Microsoft or McAfee, hardware from Intel or Cisco, or anything from Apple? Why buy American when cheaper Chinese products are no less secure?

A statement made a month ago by Ladar Levison, founder of the small secure email provider Lavabit, which shut down in response to government pressure, has even more resonance today.

“I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States,”

Levison said in a note explaining the Lavabit closure.

from:     http://www.livescience.com/39477-most-important-nsa-leak.html

 

 

 

A SParrow’s Tale

I Found A Blind Baby Sparrow Below My Balcony After A Storm

We usually write about other people, but today I want to share my own story. It all began after one stormy night, when my girlfriend saw what we thought was a dead sparrow below our balcony. He was barely breathing, covered in ants and completely blind.

We brought him home and put him in a box. After spending a night in our bedroom, he woke us up with high-pitched tweeting. We tried feeding him, but without any luck, so we placed him in our balcony. He continued tweeting non-stop for 3 hours. Finally, his father found him and started feeding him. He brought his chick huge bugs and bread every 10-15 minutes all day long for two weeks straight.

He was getting bigger every day, but he was still blind. I called a vet, and he told me to try simple eye drops. It worked like a charm! He even started hiding from us behind our flowers. Soon, his father started showing him how to fly trough the window. One day he just left – we knew this day would come eventually. We became really worried because that same night, and for the next few days, there was really stormy weather. However, 3 days later, he came back and fell asleep in one of our pots.

He was barely breathing, and was completely blind

The next day, I placed him in our balcony where he started tweeting non-stop for 3 hours

Finally his father found him and started feeding him

He brought him huge bugs and bread every 10-15 minutes all day long

He was getting bigger each day, but he was still blind

I called a vet, and he told me to try simple eye drops

It worked like a charm! He even started hiding from us behind the flowers

He stayed in my balcony for about two weeks and his father never stopped feeding him

We knew one day he would leave us. I think this is one of the last shots before he flew away

We were really worried as it soon started raining, and there was lightning and thunder all night

However, 3 days later, he came back and fell asleep in a flower pot!

 

from:    http://www.boredpanda.com/found-blind-baby-sparrow-below-my-balcony/

Vortex Based Math

Marko Rodin has discovered the source of the non-decaying spin of the electron. Although scientists know that all electrons in the universe spin, they have never discovered the source of this spin. Rodin has. He has discovered the underpinning geometry of the universe, the fabric of time itself. He has done this by reducing all higher mathematics – calculus, geometry, scalar math – to discrete-number mathematics.

With the introduction of Vortex-Based Mathematics you will be able to see how energy is expressing itself mathematically. This math has no anomalies and shows the dimensional shape and function of the universe as being a toroid or donut-shaped black hole. This is the template for the universe and it is all within our base ten decimal system!

The potential scope and breadth of the Rodin Solution is staggering; it is universally applicable in mathematics, science, biology, medicine, genetics, astronomy, chemistry, physics and computer science. The Rodin Solution will revolutionize computer hardware by creating a crucial gap space, or equi-potential major groove, in processors. This gap space generates underpinning nested vortices resulting in far higher efficiency with no heat build-up. The Rodin Solution replaces the binary code with a new code called the binary triplet which will revolutionize computer operating systems. It will transform physics and astrophysics by finally answering how black holes and pulsars work. Space travel will be revolutionized by reactionless drives that are unaffected by the weight they pull, making the present day combustion engine obsolete. The revolution brought on by reactionless drives will far surpass the societal changes wrought by the shift from steam engines to the present day combustion engine. The Rodin Solution can even be applied to ending pollution and drought by creating an inexhaustible, nonpolluting energy source. Because Rodin´s Vortex-Based Mathematics enables him to condense a trillion-fold calculation to only a few integer steps and because he is able to solve all the mathematical enigmas, the Rodin Solution will revolutionize computer information compression.

Rudimentary versions of the Rodin Coil, or Rodin Torus, have been created and tested by leading scientists and are presently being used by the U.S. Government in antennas that protect the four corners of the continental U.S.. Life-saving medical devices based on crude approximations of the Rodin Coil Torus are being manufactured and used in the treatment of cancer patients. Microsoft´s former senior researcher is using the Rodin Coil to research, develop and patent new computer information-compression schemes.

Although many people are applying aspects of the Rodin Solution, on the basis of private consultations and a Rodin monograph published 20 years ago, Marko Rodin has never explained key concepts such as the phasing and energization of the Rodin Coil. Although there has been a virtual stampede to get at this work, Rodin has remained silent or uncooperative, preferring to continue his work and research in isolation. He is now ready to reveal publicly the true power and scope of the Rodin Solution.

– source: www.markorodin.com

from:    nhttp://vortexmath.webs.com/

Eat Your Mushrooms!

 

The Health Benefits of Mushroom Consumption

May 13, 2013

By Dr. Mercola

Mushrooms contain some of the most potent natural medicines on the planet. Of the 140,000 species of mushroom-forming fungi, science is familiar with only 10 percent, according to world-renown mycologist Paul Stamets, who has written six books on the topic.

About 100 species of mushrooms are being studied for their health-promoting benefits. Of those hundred, about a half dozen really stand out for their ability to deliver a tremendous boost to your immune system.

Story at-a-glance

  • Mushrooms contain some of the most powerful natural medicines on the planet. About 100 species are being studied for their health-promoting benefits, and about a half dozen really stand out for their ability to deliver a tremendous boost to your immune system
  • Nine recently presented studies on mushrooms detail a wide variety of health benefits, including: improved weight management, improved nutrition, increased vitamin D levels, and improved immune system function
  • One of the active medicinal compounds found in Cordyceps has been identified as a potential cancer drug. More recent studies suggest it also has potent anti-inflammatory characteristics that may be helpful for those suffering from: asthma, rheumatoid arthritis, renal failure, and stroke damage
  • It’s important to eat ONLY organically grown mushrooms because they absorb and concentrate whatever they grow in. Mushrooms are known to concentrate heavy metals, as well as air and water pollutants, so healthy growing conditions is a critical factor
  • Mushrooms that can help boost the nutrient content of your diet include: shiitake, reishi, cordyceps, turkey tail, and Himematsutake

to read more, go to:    http://articles.mercola.com/sites/articles/archive/2013/05/13/mushroom-benefits.aspx

Dannion Brinkley on NDE’s & the Future

 

Dannion Brinkley - Secrets of an NDE Survivor
Dannion Brinkley – Secrets of an NDE Survivor

Last updated on September 7, 2013 at 12:00 am EDT by in5d Alternative News

 

 

 

Russell Scott puts Dannion Brinkley on the spot with direct questions regarding the legitimacy of his (Dannion’s) claims.

Dannion responds to:

* The 2008 British TV documentary “Reverend Death” that claims he was only ‘dead’ for 5 minutes…not 28 minutes

* Why his doctor saw him shortly after the incident and claimed he was totally lucid making no mention of his NDE

Dannion sets the record straight on:

– His first near death experience
– Dr. Raymond Moody
– His military service
– The ‘morgue’ story

Dannion Brinkley also discusses his visions of the future for The United States.

from:    http://in5d.com/dannion-brinkley-secrets-of-an-nde-survivor.html