Monday, February 29, 2016

As we shift - The Love you Make


The Beatles said it beautifully.  “And in the end, the love you take is equal to the love you make.”

There are coming to you choices.  Choices of circumstance.  Choices of focus.  Choices of emotion.  Choices of location.

These are not multiple choice and standardized as if in a test and able to be assessed.  All choices are correct ones.  Your options are infinite; all of them held in the field you occupy.

Today I ran across some “Love Quest” writing from 2014.  Some of this post includes those words and raises the possibility of holding those events again.  This journey to agape, it turns out, is the one we came for and are still on now.

Here’s how it works.  It is the focus of your consciousness. Those choices create the field you occupy. As you choose compassion – compassion is demonstrated either visibly or as an opportunity to be shown, in your field. As you choose forgiveness – more options to forgive and to be forgiven show up in your field.  As you choose foods that are alive and supportive – options for supporting your physical life become visible. As you choose anger – you will witness it in your field as an option to be expressed or feel the brunt of.  As you choose lonely – you will see evidence that you are alone.  As you choose unity you will witness your inability to separate and thus experience oneness.  As you choose agape – everywhere you’ll see a chance to love.

We do not rest in an infinite field, but one that is defined and limited by our focus/belief/choices. 

AS WE EXPAND OUR CONSCIOUSNESS – SO TOO DOES OUR WORLD.  THIS THEN BECOMES THE SHIFT. A MASS GROUPING OF BEINGS IN A FIELD DEFINED BY EXPANSIVE BELIEFS, INCLUSIVE ACCEPTANCE AND UNCONDITIONAL LOVE.

The entrance to this field is not hidden.  It is found in self-love.  This does not mean the things you imagine.  It means to honor the ground you walk on.

And what of the “other”? Regardless of question asked or reason given – when you speak about loving another it is always an illusion.  For “other” does not exist.  All is one.  Other is a reflection.  Relationships are played out versions of self-love.  You are creator gods.

Become (in your illusion) a positive force for every “other”. Gently absorb them as if they were your final breath – not gasping and clawing for them, but breathe them in quietly for the gift that they are.

Love does not hurt.  It does not have an opinion. You imagine there is a way for some other to hurt you.  Your imaginings cause you real pain.  You say you are lonely or (fill in the blank).  This field you are in can only demonstrate options that you consciousness holds as truth. You must love yourself first. We’ve come here to help each other.  To teach each other.  About love.

Your journey is mine and is ours.  This is what we came to see if we could do.  Love ourselves despite discomfort.  Love while we are not “getting what we want”. The discomfort  brings up our resistance, our self-loathing, our opinions, our judgment, our distrust, our hatred.

Resistance to any aspect of love in your life is resistance to love.  Period. This is something you don’t want to look at.  Why? The reasons all begin with because. Throw out that word. At its root is blame, accusation, division, hatred.  There is only love.

What’s at stake is everything.  This Shift only happens with agape.  All love is self-love.  Gaze into your mirror with new eyes.  Your beliefs create your field.  Your intentions created your life. Intend to love.  You may have to let go to get there.

What will you have to release? Control. Expectation. Opinion. Judgment. Blame. This Shift doesn’t require anyone’s response to you before it can be felt. 

To love is to give the world all that you are. The field created in this consciousness includes the choice to shift as One.  We’ll see that option when we get to Agape. 

Trust and let go.  You know what to do. Without exception love yourself.  That’s all there is to it.  You are the one we’ve been waiting for.

With so much love,


PS – Each day I connect with all sorts of beings (Non-earth-surface-human type).  These conversations are shared in my newsletter. The free version is sent once, sometimes twice, a month.  You can sign up here.


No One Has To Cry


By The Fixx

As I wake today, same as yesterday
I get in my car, poor turn my wheels
So much to say, who's got time to listen
Fulfill our dreams, shame is left unseen

Why should someone lose so that I get by?
Why should someone pay just to send me high?

No one has to cry while I can smile
No one owns the sky, so blue above you
But somewhere in this world is a field where we all play

Secrets in your eyes, no one has to cry
There's no self-control as we play our roles
It's all dog eat dog, we're all dressed for show
As we plot and scheme full of American dreams
Who says it's fair who gets the opportunities?

There are some who live without so that I get by
They pay the price for doubtin' just to send me high

No one has to cry while I can smile
No one owns the sky, so blue above you
'Cause somewhere in this world is a field where we all play

Secrets in your eyes, no one has to cry
No one has to, oh, no
Why should someone lose so that I get by?
Or pay the price for doubting just to send me high?

No one has to cry while I can smile
No one owns the sky, so blue above you
'Cause somewhere in this world is a field where we all play

Secrets in your eyes no one has to cry
No one, no one, no one has to cry

'Cause somewhere in this world is a feeling we possess

Secrets in your eyes no one has to cry
No one, no one, no one has to cry
No one, no one, no one has to cry, no one has to cry

Songwriters

CUTLER, SCOTT/CURNIN, CYRIL JOHN

Published By
Lyrics © Sony/ATV Music Publishing LLC


JOHN MCAFEE: The NSA's back door has given every US secret to our enemies


John McAfeeReuters/William GularteJohn McAfee, U.S. anti-virus software guru, addresses a news conference outside the Supreme Court of Justice in Guatemala City.

Deng Xiaoping, in 1979 - his second year as supreme leader of China - perceived a fundamental truth that has yet to be fully grasped by most Western leaders: Software, if properly weaponized, could be far more destructive than any nuclear arsenal.

Under Deng’s leadership, China began one of the most ambitious and sophisticated meta- software development programs ever undertaken.

And what is meta-software? It's the one science that the entire Western World has entirely overlooked. It is a high level set of principles for developing software that are imperative if a nation is to survive in a cyberwar.

For example, programmers must constantly be audited. Every line of code written by every programmer is audited by two senior programmers, and these auditors are rotated each month and the same two are never paired more than once. You will see very clearly, later in this article, why such a principle is vital to a society’s survival.

Another principal is that back doors into software can never, under any circumstances, be allowed. Under Deng Xiaoping, the penalty for back doors, and for violating any of the meta- software principles, was death.

I will give an example of what happens in the real world when back doors are put into software. On December 17th of last year, Juniper Networks - a major provider of secure network systems, who's customers include nearly every US government agency, announced that it had discovered two “unauthorized” back doors in its systems.

For those of my readers who do not understand how back doors are created - they can only be created by the manufacturers of the software. There is, absolutely, no other way.

So, the company had to have a rogue employee in the software development department. This much is clear.

It will also be clear, if you continue reading, who placed the rogue employee within Juniper Networks and why.

First, a little background: Juniper Networks has operations in more than 100 countries. Around 50% of its revenue is from the United States, 30% are from EMEA and 20% are from Asia. Over half of Juniper’s customers are in parts of the world in which the NSA has extreme interest.

A woman walks past a banner with the logo of Juniper Networks Inc. covering the facade of the New York Stock Exchange, October 29, 2009. REUTERS/Brendan McDermid   Thomson ReutersA woman walks past a banner with the logo of Juniper Networks Inc. covering the facade of the New York Stock Exchange

Now, a legitimate TOP-SECRET document. Released by Anonymous and dated February 2011 reveals that the British spy agency GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by Juniper Networks.

I hope we all understand now what “acquired the capability” means. The NSA planted a programmer within Jupiter Networks. The was no other way to “acquire" this capability.

Nothing new in this. Black hat hackers have been planting themselves in target agencies for years. It was just such a plant that brought down Ashley Madison last year. So it's no surprise that the NSA uses this technique as well.

Of interest here is that Juniper announced that two back back doors were discovered in its system. One of the back doors was code verifiable written by the NSA prior to 2011.

Wired magazine wrote:

But what makes the Juniper backdoor even more interesting and notable is the fact that it appears to be based on another backdoor the NSA allegedly created years ago in the Dual_EC algorithm for its own secret use.

So, in 2011 he NSA surreptitiously got their back door into a powerful piece of security software used by many enemies of the US. They could now monitor these enemies easily.

The Internet underground knew of these back doors within weeks of their release, and so did the Chinese, and so did the Russians. An so did every hacker on the planet. Monitoring changes within major software systems is the simplest if all things. Every hacker toolkit contains a compare program that will outline all changes made to a piece of software by the manufacturer. Disassembly tools tell the hacker what each change does.

hackers america cyberattacks black hatREUTERS/Steve MarcusAttendees listen to a keynote address by Dan Greer, chief information security officer for In-Q-Tel, during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014.

So, while the NSA was monitoring our perceived Middle Eastern enemies, the Chinese and Russians, and god knows who else, were making off with every important secret in the US, courtesy of the NSA’s back door. The NSA failed to notice that 50% of Jupiter Network users were American, and the majority of those were within the US Government.

Last year alone, the Defense Department was hacked. Using the NSA’s back door the Chinese walked off with 5.6 million fingerprints of critical personnel. The same back door was used to hack the Treasury Department on May 27th of last year in which millions of tax returns were stolen. And again, our most devastating hack as a nation was the Office of Personnel Management hack, in which 22 million sensitive files were stolen. The Chinese gained access through the Defense Department’s Juniper Systems and then using inter-operability with the Personnel Office, took what they wanted. Again, courtesy if the NSA’s back door.

Whatever gains the NSA has made through the use of their back door, it cannot possibly counterbalance the harm done to our nation by everyone else’s use of that same back door.

Now, consider this: if Juniper Networks had the foresight to follow the same procedures that the Chinese have been using for 35 years, none of this could have happened. The programmer planted within Juniper by the NSA would have been audited by two senior coders. They each would have read the code and immediately recognized the back door. Management would be notified and the employee charged with a felony, where he would undoubtedly had snitched on the NSA. The NSA could not possibly have engaged the assistance of the auditors because they would be randomly rotated.

Clever, these Chinese

The moral is this: we are at the very least, 20 years behind the Chinese, and by association with the Chinese and by copying them, the Russians as well.

We have to get our act together, and soon. We can no longer act like children in a playground playing with real guns. We have to grow up. Our technology has outgrown us, because we have failed to grasp it's subtle implications.

This blog is supported by ads and donations. If you enjoy this blog please consider supporting it with a contribution via PayPal.