Saturday, January 5, 2013
EMF Jr carbine review
The JR Carbine is an ambidextrous, straight blowback-operated, semi-automatic, pistol-caliber carbine with telescoping 6-position collapsible buttstock and free-floating quadrail forend.
Semi-automatic pistol-caliber carbine
Simple, reliable, straight blowback operation
Ambidextrous bolt - configurable for left or right-hand ejection
Bolt handle switchable to left or right side
Converts to other pistol-calibers with simple conversion kit (available separately)
Magazine included - Glock or 1911 depending on model
Lightweight 16-1/4" barrel
Free-floating quadrail forend
Picatinny rail machined into top of receiver
Telescoping 6-position collapsible M-4 style buttstock
Receiver, trigger housing and magazine well machined from aerospace grade 6061T-6
aluminum with black hardcoat anodizing for extra protection and durability
Standard M-4 buffer tube, buttstock, and pistol grip
Utilizes standard M-4/AR-15 furniture and trigger components
Lightweight - approximately 6.5 lbs.
Overall length: buttstock extended 33-1/2", collapsed 30-1/4"
Made in the USA, in New York State
Calibers and Models Offered:
9mm Standard, Restricted State (CT, MA, NJ, NY), and California Compliant
.40S&W Standard, Restricted State, and California Compliant
.45ACP - Glock Magazine Based - Standard, Restricted State, and California Compliant
.45 ACP - 1911 Magazine Based - Standard and Restricted State
For a home-defense carbine to complement your handgun, one in a pistol caliber seems to make sense because you can share ammunition and extend your effective range.
They are indeed more accurate and easier to shoot than any handgun.
Caliber Change Instructions
Buttstock-Buffer Assembly Diagram
Glock Magazine Adjustment to Improve Feeding
Gun Review: JR Carbine
Episode-46- The Pistol Caliber Carbine in Survial Planning
Why you should oppose an “assault weapons ban” even if you don’t own any etc LISTEN TO THIS BROADCAST PLEASE
Join Jack Spirko Today As He Respond To On
Why you should oppose an “assault weapons ban” even if you don’t own any
I told you so called “common sense” gun laws were on the way, here comes one
What exactly does “arms” mean in the second amendment
The three primary purposes of the second amendment as it relates to individual citizens
Two success stories of citizens defending themselves the media won’t talk about
Thoughts for young people considering college or any next step
The results when you take a non shooter to the gun range a real world report
A modern lesson on keeping your powder dry
401Ks just got easier to convert to a ROTH account, why it matters
The economy is on life support and the life support is running on back up power
The Survival Podcast RSS Feed
(Jack spirko of the Survival podcast points out the "state run media" is wanting you to focus on their agenda of making it illegal to sell you gun to anybody anywhere.
It is legal to sell the gun you own without any background check to anyone. You can do it at a gun show or an outhouse. The regime comrads know this. They want to ban your ability to sell your gun at will among other things.
Please listen to the survival pod cast it is very informing. Don't believe the state run media which does include fox news and your local news. They just parriot what is said in the national state run media.) Story Reports
Disarmed German Jews and the Holocaust How Hitler lawfully disarmed Germans
I urge you to view this video. Don't say "That would never happen in the good old USA". Instead, be prepared that it could...and this time, instead of the government singling out the Jews, it will be patriots, who have already been labeled "terrorists".
Nazi Holocaust Experiments
The Current TV cable network was sold to Al-Jazeera for about $500 million.
The network’s investors included funds controlled by Los Angeles billionaire Ron Burkle and San Francisco money manager Richard Blum, according to the 2008 filing, when the company unsuccessfully sought to sell stock to the public.
Blum is married to Sen. Dianne Feinstein (D-Calif.) In 1980, Feinstein married Richard C. Blum, an investment banker.
Ron Blum and his wife Dianne Feinstein sold their share of "curret tv" to the terrorist mouthpiece Al-Jazeera.
Dianne Fienstein hold a concealed weapons permit in California.
One U.S. Marine was more than a little displeased with California Sen. Dianne Feinstein’s draconian gun control proposal, which includes an assault weapons ban and provisions on handguns and even “grandfathered weapons.”
Letter, written by U.S. Marine Joshua Boston, titled “No ma’am”
Senator Dianne Feinstein,
I will not register my weapons should this bill be passed, as I do not believe it is the government’s right to know what I own. Nor do I think it prudent to tell you what I own so that it may be taken from me by a group of people who enjoy armed protection yet decry me having the same a crime. You ma’am have overstepped a line that is not your domain. I am a Marine Corps Veteran of 8 years, and I will not have some woman who proclaims the evil of an inanimate object, yet carries one, tell me I may not have one.
I am not your subject. I am the man who keeps you free. I am not your servant. I am the person whom you serve. I am not your peasant. I am the flesh and blood of America.
I am the man who fought for my country. I am the man who learned. I am an American. You will not tell me that I must register my semi-automatic AR-15 because of the actions of some evil man.
I will not be disarmed to suit the fear that has been established by the media and your misinformation campaign against the American public.
We, the people, deserve better than you.
Joshua Boston Cpl,
United States Marine Corps
(Marine Joshua Boston overstepped a line when he called Ms feinstein/blum a maam. She is unrespectful to the US Constitution 2nd Amendment. She is unrespectful to the gun owners in America which includes me. She and her comrades only want to disarm Americans so the regime in control will have complete control.
I suggest all citizens who not criminals or have mental problems go out and purchase a gun or guns before the traitors in congress ban them all.) Story Reports
"The beauty of the 2nd amendment is that we shall never need it unil they come to take it."
Thursday, January 3, 2013
Obama Teaching Saul Alinsky Tactics
(Obama has made the destruction of the economy "painless" for those who support him.
This is how he is was able to get reelected along with voter fraud.
The welfare state is expanding and collapsing at the same time.
Too many people in this society are being protected and subsidized by obama.
The obama regime will not be able to do this forever. The dollar will collapse.
This is obama's goal. He only wants to spread the wealth around to make the destruction of the economy less painless for those who live off the government.
Corporations have also sold out to the obama regime and are in effect on his payroll.
Obama's goal is to destroy the middle class of Americans.) Story reports
Obama Taught “Destroy Middle Class”
Obama had two doggedly radical mentors that shaped both his ideology and his current policies. One was a committed hardcore Communist and the other was renowned as a hardcore Socialist. Neither man stressed American values, but taught the opposite—that America with its free enterprise, republic based, God-worshipping system is the enemy of the people.
Frank Marshall Davis, obama's real father, a reported pedophile, race mongerer and strident Communist, was recruited by Obama’s grandfather to educate young Barry in the ways of the world. It was, however, Obama’s educational mentor, that stressed that if “real power” is to be gained, it must be done at the expense of the American people and the economy.
The late Harvard Professor Saul Alinsky wrote that the key to weaken—then take over America, its economy and its people—is to “destroy the middle class.”
Alinsky advocated use of class and race warfare. He believed that “wealth redistribution,” taking from those who work and giving it to those who don’t, is the catalyst to bring down the U.S. economy and free-market capitalism. After four years in office, Obama is well on his way to doing just that. Alinsky’s socialist guidebook is embedded in Obama’s record of economic policies that he has visited upon all Americans and their families—specifically the “middle class.”
It should be noted that Alinsky began his book, Rules for Radicals, with a tribute to: “…the first radical known to man who rebelled against the establishment and did it so effectively that he at least won his own kingdom – Lucifer.” Alinsky championed and sought to emulate Lucifer, otherwise known as Satan. Alinsky’s game plan was to lie, cheat and steal elections in order to control the American people and bring American commerce to its knees. Excerpt from my April 2010 article: Power At Any Cost: The Training of Barack Obama:
“Alinsky clearly recognized that Lucifer or Satan is also the king of deception. It is upon deception that Alinsky built his political strategy. Deception, he taught his followers, is the Trojan horse that gets you inside the gates where you can then access power and retain it by any means available – no matter the costs to the people, the government or the nation. Again, it is upon deception that Alinsky built his political strategy.
It is Alinsky’s strategy that Barack Obama wrote on a blackboard and can be seen teaching to ACORN members during his days as a Chicago Community Organizer. Obama’s educational-mentor Alinsky also worked as a Chicago Community Organizer before him.
It is true that Saul Alinsky preferred the teachings of Lenin, who murdered millions, to the teachings of Mao, who also murdered millions. Mao advocated obtaining power by the barrel of the gun. Lenin was more subtle by first advocating working the system and obtaining power by the vote, then using the barrel of the gun to keep it. Alinsky had no qualms about stealing the vote as a means to reach his end result – power. For Saul Alinsky, deception is the key to everything. Say one thing, do another, even change the meanings of words. Pretend to be bi-partisan in order to get the upper hand. For Alinsky, the means don’t matter – destroy whomever or whatever gets in your way. Alinsky made it clear that what his followers want “is power.”
(This is exactly how the fraud obama operates. Total deception for total power.) Story Reports
The late Harvard Professor Saul Alinsky wrote that the key to weaken — then take over America, its economy and its people — is to “destroy the middle class.” Alinsky advocated use of class and race warfare. He believed that “wealth redistribution,” taking from those who work and giving it to those who don’t, is the catalyst to bring down the U.S. economy and free-market capitalism. After four years in office, Obama is well on his way to doing just that. Alinsky’s socialist guidebook is embedded in Obama’s record of economic policies that he has visited upon all Americans and their families — specifically the “middle class.”
Ed Blumenfeld wrote in The New American: “One of Obama’s advisors during his 2008 election campaign was Peter Dreier. …Stanley Kurtz, in Radical-in-Chief, credits Dreier with formulating the stealth plan to destroy capitalism.
His plan is to gradually expand government spending until the country nears fiscal collapse. At that point, a public accustomed to entitlements will presumably turn on its capitalist masters when they propose cutbacks to restore fiscal balance.”
“Obama learned his lesson well,” David Alinsky [Saul Alinsky's son] reportedly stated, “I am proud to see that my father’s model for organizing is being applied successfully beyond local community organizing.” Alinsky taught that the key to destroying the middle class is to create a failed economy that destroys private sector jobs which leads to a powerless, but growing subset of laid-off workers who become reliant on and controlled by the government. It is Alinsky’s dream come to life at the destructive hands of Barack Obama, President of the United States.
Wednesday, January 2, 2013
Who is Listening to Your Cell Phone?
By: Tuquyen Mach
Cell phones long ago ceased to be a luxury and became something we can't leave home without. But even when your device is idle or turned off, it's sending information about your location to a cell phone tower every seven seconds.
One thing most of us don't consider is access to that information isn't limited to your cell phone carrier.
"Police and the government can use that ping to track your whereabouts. There is no expectation of privacy in carrying that cell phone," said Savannah attorney Bates Lovett of Hunter Maclean. Lovett said carriers can give out this information without your knowledge or permission, and in some cases without a court order.
"They can pull your text messages. They can pull your search history. Those are the types of data and information that they're being able to pull off now that they don't always need a warrant for," said Lovett.
"They're going after one person but get information on anyone who was around a cell phone tower at a certain time. Even though they're investigating one person, they have information on hundreds or thousands of people," said Trevor Timm of the Electronic Frontier Foundation.
Who is Listening to Your Cell Phone?
Your Cell Phone Makes You A Prisoner Of A Digital World Where Virtually Anyone Can Hack You
If you own a cell phone, you might as well kiss your privacy goodbye. Cell phone companies know more about us than most of us would ever dare to imagine. Your cell phone company is tracking everywhere that you go and it is making a record of everything that you do with your phone.
Much worse, there is a good chance that your cell phone company has been selling this information to anyone that is willing to pay the price – including local law enforcement.
In addition, it is an open secret that the federal government monitors and records all cell phone calls. The “private conversation” that you are having with a friend today will be kept in federal government databanks for many years to come.
The truth is that by using a cell phone, you willingly make yourself a prisoner of a digital world where every move that you make and every conversation that you have is permanently recorded.
But it is not just cell phone companies and government agencies that you have to worry about.
As you will see at the end of this article, it is incredibly easy for any would-be stalker to hack you and track your every movement using your cell phone. In fact, many spyware programs allow hackers to listen to you through your cell phone even when your cell phone is turned off. Sadly, most cell phone users have absolutely no idea about any of this stuff.
Your phone company knows where you live, what websites you visit, what apps you download, what videos you like to watch, and even where you are. Now, some have begun selling that valuable information to the highest bidder.
“Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight.”
“Cell carriers, staffed with special law enforcement liaison teams, charge police departments from a few hundred dollars for locating a phone to more than $2,200 for a full-scale wiretap of a suspect.”
So if you are breaking the law, your cell phone may be used to gather evidence and to track you down. In the United States, cell phone companies are required by law to be able to pinpoint the locations of their customers to within 100 meters.
Sometimes the police don’t even use the cell phone companies. Recently, the Wall Street Journal ran an article that discussed the capabilities of the “stingray devices” that many local law enforcement agencies are using now.
A “stingray device” acts like a cell phone tower and it can gather any information that a normal cell phone tower can.
You make a call on your cellphone thinking the only thing standing between you and the recipient of your call is your carrier’s cellphone tower. In fact, that tower your phone is connecting to just might be a boobytrap set up by law enforcement to ensnare your phone signals and maybe even the content of your calls.
So-called stingrays are one of the new high-tech tools that authorities are using to track and identify you. The devices, about the size of a suitcase, spoof a legitimate cellphone tower in order to trick nearby cellphones and other wireless communication devices into connecting to the tower, as they would to a real cellphone tower.
The government maintains that the stingrays don’t violate Fourth Amendment rights, since Americans don’t have a legitimate expectation of privacy for data sent from their mobile phones and other wireless devices to a cell tower.
The attitude that law enforcement agencies seem to have is that once we use a cell phone we are essentially willingly throwing our Fourth Amendment rights out the window.
In some areas of the United States, police are physically extracting data from cell phones any time they want as well. According to the ACLU, state police in Michigan have been using “extraction devices” to download data from the cell phones of motorists that they pull over. This is taking place even if the motorists that are pulled over are not accused of doing anything wrong.
The devices, sold by a company called Cellebrite, can download text messages, photos, video, and even GPS data from most brands of cell phones. The handheld machines have various interfaces to work with different models and can even bypass security passwords and access some information.
In April 2011, the Michigan chapter of the American Civil Liberties Union questioned whether Michigan State Police (MSP) troopers were using Cellebrite UFEDs to conduct unlawful searches of citizens' cell phones.
Following its refusal to grant the MCLU's 2008 Freedom of Information Act request unless the organization paid $544,000 to retrieve the reports, MSP issued a statement claiming that it honored the Fourth Amendment in searching mobile devices.
The FBI claims that it can demand to see your cell phone data whenever it would like to.
Not only that, the FBI has also been remotely activating the microphones on the cell phones of suspects that they want to listen to. This can be done even when the cell phone is turned off.
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations.
The technique is called a “roving bug,” and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.
Could the FBI be listening to you right now?
If there is a cell phone in the room they could be.
But some other federal agencies listen to a lot more cell phone calls than the FBI does.
It has been an open secret for a long time that the federal government monitors and records all cell phone calls that are made for national security reasons.
In fact, the federal government is even trying to collect records for calls that have been made in the distant past. Accordingto USA Today, the goal is “to create a database of every call ever made”
The National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY.
n addition, the federal government has been constructing the largest data center in the history of the world out in the Utah desert.
This data center will be used to house an almost unimaginable amount of digital data (including your cell phone calls.
Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade.
To intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. (666?)
Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.”
But isn’t it illegal for the federal government to intercept our phone calls?
Well, the cold, hard reality of the matter is that they use all kinds of loopholes and legal technicalities to get around that.
For example, if a call is “intercepted” outside of the United States and then routed to a government building inside the United States that is considered to be okay.
Increasingly, governments around the world are using cell phones to hunt down people that they do not like and haul them off to prison.
Most Americans don’t need to worry about getting hauled off to prison for political or religious reasons at this point, but there is another aspect of cell phone security that could potentially affect all of us.
Most Americans are completely unaware of what stalkers can potentially do if they are able to hack into a cell phone. For example, did you know that spyware can make it possible for a stalker to monitor where you are 24 hours a day and listen to everything that you say even when your cell phone is turned off?
Spyware marketers claim you can tap into someone’s calls, read their text messages and track their movements “anywhere, anytime.” They say you can “catch a cheating spouse”, protect your children from an evil babysitter and “hear what your boss is saying about you.” And while you’re spying on others, the Spyware companies say “no one will ever know” because it’s supposed to be “completely invisible” with “absolutely no trace.”
Security experts say it’s no internet hoax.
“It’s real, and it is pretty creepy,” said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University’s Department of Computer and Information Technology.
Mislan has examined thousands of cell phones inside Purdue’s Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable.
Tapping your cell phone, how anyone can do it. What stalkers can do to your cell phone/ US gov etc. Watch Video, Click Link Here
Are you starting to see how your cell phone makes you a prisoner of a digital world?
The police can listen to you and track you any time that they want to.
The federal government can listen to you and track you any time that they want to.
Big corporations can buy all of the personal information that cell phones gather any time that they want to from certain cell phone companies.
Stalkers can listen to you and track you 24 hours a day if they are able to hack in to your cell phone somehow.
If you own a cell phone and you still want to have some privacy, then you need to take the battery completely out of the cell phone when you are not using it.
Unfortunately, as our world becomes even more interconnected and even more dependent on technology, the amount of privacy we all have is likely to continue to decrease.
A digital Big Brother control grid is being constructed all around us, and in the future that control grid could potentially be used for very malevolent purposes.
So let us be as wise as serpents and innocent as doves.
Your Cell Phone Makes You A Prisoner Of A Digital World Where Virtually Anyone Can Hack You
(When it comes to personal survival you need to be aware of the "cell phone enemy". This device along with various other mobile devices constantly tracks your every move. These devices can be turned on at will to record your conversations. These devices read your email and text messages. These devices send info to anyone about your purchases etc. These devices can be used to listen in to what you are saying when you are not using them. These devices can be used to watch what you are doing when you are not using them. These devices can be used to watch what you are doing when you are using them. They monitor you as you move from place to place.
Mobile devices are mobile spys. You are "wired" into the "skynet" grid and your don't know it.
The only way to keep the spy from knowing what you are doing is to take the battery out of the phone and go off grid.
Also the same spy is listening/trasmitting info from your desktop about what you are doing.
I am thinking about only using my cell phone to make less calls and then take the battery out so less information is being transmitted about where I am, what I am saying and doing.
I think it would even be a good idea to tell certain people about certain times when my cell phone will be on so they can call me. If its off they can just leave me a message that I will listen to along with everybody else.
Less "grid ie skynet" time is better.
It is starting to be humans vs the mobile device sky net machines for real!
Use the US mail as much as possible. Its slower but the contents of your letter is not transmitted to everyone. Only where the letter originated and its path to its destination are. The postal service tracks its every move.
My advice is also TAKE THE BATTERY OUT OF THE CELL PHONE/MOBILE DEVICE WHEN NOT IN USE!
DO NOT LEAVE YOU MOBILE DEVICE ON ALL THE TIME!
ERASE DATE ON YOUR PHONE BY DOING A FACTORY REST TO WIPE OUT SPYWARE INSTALLED BY HACKERS.
(This will not erase the built in spyware written into the andriod or iphone operating systems.)
It will just mean LESS DATA ABOUT WHERE YOU HAVE BEEN and what you are doing will be sent to the "sky net" data base.
Seems unreal I know but this article is true. Become aware and get off the grid as much as possible. Break the habit of relying on the "skynet" grid for everything!
IF YOU DON'T WANT TO BE TRACKED AND SPYED ON YOU MUST TAKE THE BATTERIES OUT OF YOUR MOBILE DEVICE> IT IS NOT ENOUGH TO TURN IT OFF!) Story Reports
(I recently got a small dynamo flashlight. It has no batteries. By using your hand to move the small dynamo electical power is stored in the small flashlight to keep 2 leds burning for an hour.
I can see a small dynamo being incorporated into mobile devices to gereate a small amount of power to be stored within the mobile device even though it has no batteries installed!!!!
JUST THE MOVEMENT on your hip etc could generated small amounts of power, enough to allow the government or a hacker to spy on you even though you had removed the batteries.
This would allow for your mobile device to be turned on remotely even though IT HAD NO BATTERIES INSTALLED!
A real possibility!) Story Reports