Home » 2017 » October

Monthly Archives: October 2017

The Voice The Clash

When you see a title of “The Voice”, one immediately thinks of the entertainment industry’s ,The Voice currently playing.

However, this article deals with another form of The Voice. From the book, ‘Hostage to the Devil’ by Malachi Martin, we are provided what The Voice is during a demonic exorcism.

 

The Voice is an inordinately disturbing and humanly distressing babel. The first few 
syllables seem to be those of some word pronounced slowly and thickly — somewhat like
a tape recording played at a subnormal speed. You are just straining to pick up the 
word and a layer of cold fear has already gripped you — you know this sound is alien.
But your concentration is shattered and frustrated by an immediate gamut of echoes, 
of tiny, prickly voices echoing each syllable, screaming it, whispering it, laughing 
it, sneering it, groaning it, following it. They all hit your ear, while the alien 
voice is going on unhurriedly to the next syllable, which you then try to catch, while 
guessing at the first one you lost. By then, the tiny, jabbing voices have caught up
with that second syllable; and the voice has proceeded to 
the third syllable; and so on. (Malachi, 1987)

The first and foremost thing that needs to occur is to silence this voice. The exorcist must get him or herself under control (not an easy feat), and confront the entity to demand silence, then demand its name.

Knowing the name brings power over the entity. While the will of the exorcist is used against the entity, the authority of Jesus Christ is used against it. However, the strength of the exorcist will also be a necessity.

f you have ever seen The Dead Files, many times Amy Allan will indicate to acquire a “strong and intimidating” exorcist to do the exorcism of the home or area. I initially wondered why, but according to Malachi Martin, it would be due to the will of the exorcist must also be very strong. Amy works with Steve DiSchiavi, who researches the locations. The show is rather interesting and in my opinion authentic.

 

You can follow Amy Allan on Facebook or Twitter.

You can follow Steve DiSchiavi on Facebook or Twitter.

Back to the Voice. While there is a need for the collision to occur between the will of the exorcist and demon, the authority is always under Christ. The reality is Jesus defeated these entities on the cross.

Once The Voice is stopped, “a tremendous pressure of an obscure kind affects the exorcist”, per Malachi.  This pressure is then felt as The Clash occurs.

The Clash

This clash is the personal mental contact interaction between the exorcist and entity. This hurts the exorcist, but a necessity to lock wills. Martin then explains this battle of the will is a necessity. The fight is then truly on, between the exorcist and demon. A battle of wills, that does not sound pleasant.

The issue between the two, the exorcist and the possessing spirit, is simple. Will the
totally antihuman invade and take over? Will it, noisome and merciless, seep over that
narrow rim where the exorcist would hold his ground alone, and engulf him? Or will it,
unwillingly, protestingly, under a duress greater than its single-track will, stop,
identify itself, cede, retire, disappear, and be volatilized back into an 
unknown pit of being where no man wants to go ever?

The battle itself appears to be painful for both exorcist and entity. However, once the name is identified, the exorcist acquires as much information as possible. The more information over the entity, the greater the authority grows over it.

 

Once the entity is defeated by will and authority, it is forced to remove itself from the host. The expulsion is then completed during the exorcism.

#AuthorMattCole

References:
Malachi Martin. (1987). Hostage to the Devil. Retrieved from https://archive.org/stream/HostageToTheDevil/HostageToTheDevil_djvu.txt

Segregation of Duties

There is a lot of discussion on segregation of duties and how much power one holds within the Information Technology (IT) department. The book makes mention of the accessibility of data. Based upon organizational policy, access should be granted on a basis of least privilege. No user should have more authority than required to carry out their duties. Where additional authority is granted on a temporary basis, controls must exist to ensure that the authority is removed at the end of the temporary period. (Cascarino 192)

Information Technology

The issue is how does a company divide access? Regulations and laws were introduced to the public in order to push companies in creating and enforcing internal control requirements. Some of those laws were Graham-Leach-Bliley Act of 1999 (i.e., GLB Act), Sarbanes Oxley, Health Insurance Portability and Accountability Act of 1996 (HIPAA). The purpose is to reduce the access to only those areas of necessity in order to complete your work required. Basically, give you enough access to do your job, without un-necessary access. Interesting to me, is these do not provide specifics in how to comply, rather a guideline for the companies to figure it out (to a degree).

To be fair, some of those requirements were specific in nature, by keeping system programmers and functional users from the application code, and development staff do not have access to production data.

This segregation or separation of duties contains two objectives:

  • Prevention of conflict of interest
  • Detection of control failures

The conflict of interest could include relationships in the workplace, financial from worker activities, and if an employee is providing inside information to outside parties.

Detection of control failures could result in findings of fraud, ineffective oversight, inadequate design, ineffective response and environment control.

While these are used and can be seen in the information technology aspect of the companies, we see this idea was used additionally with our founders, setting up the government.

Government

The United States Government was also set up as a segregation of duties, to ensure all power does not reside in one branch or person.

The traditional characterizations of the powers of the branches of the American Federal Government are:

  •  The legislative branch is responsible for enacting the laws of the state and appropriating the money necessary to operate the government.
  •  The executive branch is responsible for implementing and administering the public policy enacted and funded by the legislative branch.
  •  The judicial branch is responsible for interpreting the constitution and laws and applying their interpretations to controversies brought before it. (NCLS, 2017)

Recently my son and I have been taking the freely available courses from Hilldale College.https://online.hillsdale.edu/dashboard/registered

Might want to check that out.

 

 

References:

Cascarino, Richard E. Auditor’s Guide to IT Auditing, + Software Demo, 2nd Edition. John Wiley & Sons P&T, 2012-03-19. VitalBook file.

NCLS. (2017). Separation of Powers-An Overview. Retrieved from http://www.ncsl.org/research/about-state-legislatures/separation-of-powers-an-overview.aspx

 

#AuthorMattCole

Ouija Board

The original ghost board, Ouija,  was actually named by the spirits themselves.

 

The makers of the first talking board asked the board what they should call it; the name “Ouija” came through and, when they asked what that meant, the board replied, “Good luck.” (Robert Murch)
From a novelty shop in Feb 1891, the talking board began appearing as a Pittsburgh toy. A mere novelty described as a magical device for the price of $1.50. The reality is this device hit the 19th century during the same time as Spiritualism came into America.

Most notably were the Fox Sisters, who received messages from spirits via rapping on the walls. The rap would answer questions, inquired by those interested to hear from beyond. Spiritualism swept the nation as a famous past time. Even President Lincoln’s wife, Mary Todd held séances in the White House. She would try to contact her 11 year old son, who died of a fever in 1862.

Those desperate during the Civil War wished to contact their lost love ones, and clung toward Spiritualism as an avenue.

The rapping and knocking was too slow and many grew bored. Hence the Ouija was an answer for a quicker reply from the Spirit World.

The story is, Charles Kennard from Chestertown, Maryland acquired some investors and invented the board. There is some discrepancy indicating E.C. Reiche, a cabinet maker that originally created the board, and Charles stole it from him. Regardless, they were at a loss what to call the device. One of the investor pulled in his sister-in-law Helen Peters, a medium, who used the board and asked what to call the device. The board spelled out “O-U-I-J-A.” Not understanding what that meant they asked the board, and it spelled out “G-O-O-D L-U-C-K.”

Later in 1966 Parker Brothers purchases the Ouija Board and it outsells Monopoly the following year.

Alternative to the Ouija board, due to its danger of opening portals, is a pendulum. Supposedly simply asking questions to the pendulum and answers will occur. The larger the pendulum swing, the more accurate the answer. Some use this as a means to find lost items, or to specific answers. Most probably recall the test of boy or girl on pregnant women. The pendulum is an old practice.

 

Moving forward, would we consider these “Ghost apps” the next phase of Spiritualism?

The idea is the instruments identifying changes in the temperature, magnetism, ect. indicates spiritual entities. How reliable or realistic is this?

Personally, I believe these boards, pendulums and apps are merely tools.

 

The entities are using the individuals, rather than the tools. While the tools are physical indicators, the entities are actually using the individuals.  I have no doubt the “spirits” conveyed the boards name to them. Nor do I doubt the alternative side is communicating. However, I personally see these “sprites” as Lemures.

 

In the book by King James I of England, Daemonologie, “For if they were spirites that haunted some houses, by appearing in diuers and horrible formes, and making greate dinne: they were called Lemures or Spectra.”

These Lemures or Spectras are actually demonic entities acting as ghosts or spirits, in my opinion.

 

#AuthorMattCole

Electronic Fraud

The book,Auditor’s Guide to IT Auditing, + Software Demo, points out 4 things electronic fraud may be used. Electronic fraud, utilizing Internet technology, may come in the form of;
• creating a false identity on the Internet,
• intercepting information sent over the Internet,
• using the Internet to spread false information, or
• using the Internet to access and manipulate information within the corporate information systems. (Cascarino 159)

 

Similar to theft, I view electronic fraud as a cat and mouse game online. As new technology is developed to identify and fight fraud (better mousetraps), the fraudulent parties revise their schemes to circumvent them. It would appear the sheer volume and escalation of threats are more than most companies can manage.

“Threats are escalating more quickly than what banks, or even just other businesses in general, can deploy in terms of defenses against those threats,” says David Albertazzi, a senior analyst with Aite Group, a Boston-based financial sector research and analysis firm.(Geffner, 2014 May 29)

While the old check fraud is on decline the newer electronic fraud increases. To combat this, the Federal Institutions Examination Council has instructed banks to acquire a layered security approach to help combat electronic fraud. This layered approach (I think of it as layers of an onion) applies multiple forms of a security to help combat or slow down fraudulent activity.

While this approach seems obvious, the reality is regardless of what is put into place for security, no institute is 100 percent protected.

References:

Cascarino, Richard E. Auditor’s Guide to IT Auditing, + Software Demo, 2nd Edition. John Wiley & Sons P&T, 2012-03-19. VitalBook file.

Marcie Geffner. (2014 May 29). How banks fight fraud in electronic banking. Retrieved from http://www.bankrate.com/banking/how-banks-fight-fraud-in-electronic-banking/

 

#AuthorMattCole

Ghost Wars

I checked out “Ghost Wars” episode one on SyFy and my reaction is, “meh.” The whole plot is one guy having the ability to see and speak with spirits. He is viewed as an outcast from the whole town and he attempts to leave. He is unable too, due to being trapped, for some reason. Additionally, people start dying in the town and their spirits are also trapped within.

Per IMDB, the summary is, “A remote Alaskan town that has been overrun by paranormal forces and local outcast Roman Mercer (Jogia) must overcome the town’s prejudices and his own personal demons if he’s to harness his repressed psychic powers and save everyone from the mass haunting that’s threatening to destroy them all.”

The main characters is played by Avam Jogia. I recognized him from the show Victorius, when my kids watched it. The main characters ghost girl friend is played by Elise Gatien. I was also surprised to see the singer Meat Loaf in it.

Interestingly, the main character has a female ghost friend that he communicates with. I found some similarities between this story line and my own book I wrote last year, Sight and Sound. Like my book, the character has the ability to interact beyond the veil. Unlike my book the main character can both see and hear the spirits. Within my book, one character can see while the other can hear.
It was a slow start, and began to answer a few questions toward the end. I guess we will see where this goes.

 

#authorMattCole

Wisdom of the Crowd vs Bias

There is a recent show coming out this fall titled Wisdom of the Crowd. Essentially the show captures the idea of crowd-sourcing the public to submit information through their smartphones in the hopes to be part of criminal capture.

 

A tech innovator creates a cutting-edge crowd-sourcing hub to solve his own daughter’s murder, as well as revolutionizing crime solving in San Francisco. (IMDB, 2017)

This idea is not necessary new, as police have utilized social media and other avenues of technology to assist them in their job of hunting bad guys. While I haven’t had time to watch this yet, I suspect it will be more about ‘see something say something’ ideology. Thank you Janet Napolitano.

We continue to spiral in a world where most would flip out their smartphone to record for YouTube over assisting victims.

An interesting article discusses how the average of the wisdom of the crowd guessed the weight of an ox within 10 pounds. The result was the idea of a collection of the whole is better data than the expert of one.

Way back in 1906, the English polymath Francis Galton visited a country fair in which 800 people took part in a contest to guess the weight of a slaughtered ox. After the fair, he collected the guesses and calculated their average which turned out to be 1,208 pounds. To Galton’s surprise, this was within 1 percent of the true weight of 1,198 pounds. (TechnologyReview, 2014 Jul 14)

More fascinating to me is it turns out that if a crowd offers a wide range of independent estimates, then it is more likely to be wise. But if members of the crowd are influenced in the same way, for example by each other or by some external factor, then they tend to converge on a biased estimate.  (TechnologyReview, 2014 Jul 14) This bias climate can be seen recently with the shootings in Las Vegas, when reporters told the witnesses only one shooter, rather than listening to what those on the ground had to say.

Meriam Webster defines crowdsourcing as the practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people and especially from the online community rather than from traditional employees or suppliers.

This is quite effective as most people today would leave their wallet at home, over their smartphone. Again, the new show is merely a reflection of what is already occuring.

  • Hatari project enables citizens of Nairobi to submit and share reports on locations of criminal activity  and corruption. Visitors to the site can openly, or anonymously share their own experiences as victims of crime, in addition to the reporting of incidents and also receive alerts to crimes committed in their area. All information is shared via text messaging, as well as web postings and messages via social media such as Twitter.
  • Police in Bristol, England are using Facebook and the internet to track down the killer of 25 year old architect Joanna Yeates who went missing on Friday 17th December 2010. Joanna’s body was found on Christmas Day. The Avon and Somerset Constabulary’s website and Facebook page contain a map of Joanna’s movements prior to her disappearance.
  • Postacrime.com, Spotcrime.com, and CrimeReports all rely on tips from the public for information on all types of crimes committed, although Postacrime only focuses on instances of property loss and damage.
  • The Seattle Police Department already have their own Twitter account with over 7,000 plus followers keeping track of the goings on in their city as well as tweeting vital information to help police in their investigations. They have now established a new initiative to tackle car crime, called Get Your Car Back.  All reports of stolen cars are posted to this designation, including full details of the vehicle’s registration, colour, make and model. Followers who receive the tweet alerts call 911 when they recognise a stolen vehicle.  Although it is too early to tell just how effective the move is proving to be, Seattle PD’s goal is to reduce the number of thefts between 10 and 20 percent.
  • In 2014 a new app called LEEDIR (Large Emergency Event Digital Information Repository) help police use smartphones as tools to gather evidence. (AP, 2014 May 2)

Those against this type of usage fear all this data is over reach of privatization. Additionally, it subjects innocent people to police scrutiny and does not provide “good evidence”. Personally, I feel Big Brother is getting assistance from it’s slaves.

“There’s a reason that we pay professionals to work in police departments,” said Nate Cardozo, a civil liberties attorney with the Electronic Frontier Foundation.

People are passionate about being in the community , and will willingly contribute and may not realize they are being exploited by the company,” Moffitt explained.

Whats your thoughts on this topic? I would love to hear it.

References:

IMDB. (2017). Wisdom of the Crowd. Retrieved from http://www.imdb.com/title/tt6522758/

TechnologyReview. (2014 Jul 14). Forget Wisdom of Crowds; Neurobiologists reveal the wisdom of the confident. Retrieved from https://www.technologyreview.com/s/528941/forget-the-wisdom-of-crowds-neurobiologists-reveal-the-wisdom-of-the-confident/

AP. (2014 May 2). New app lets police crowd source evidence. Retrieved from http://nypost.com/2014/05/02/new-app-lets-police-crowd-source-evidence/

Categories