Search Harrold's blog

   only Harrold's Blog
index sitemap advanced
site search by freefind
halfmast US Flag smallLest We Forget...September 11th, The Victims ... and our enemies. Crusader Cross Christian Cross Knights Templar Cross, red on white background Christian Cross animated chess pieces
→ (allies=friends, enemies=treason) ←
War, the Long War: A Just Crusade
"It is a principle incorporated into the settled policy of America, that as peace is better than war, war is better than tribute."
-- James Madison (letter to the [Muslim] Dey of Algiers, August 1816) Reference: Madison, III, page 17
"The sun hangs low on the horizon." -- GB (2009)
Countdown until Obama leaves Office
The 2016 Presidential Election begins in
"Elections Are Not Won by Who Voted.  They are Lost by Who Did Not" ~ rfh
"If you were a liberal 20 years ago, without changing your positions on any issues, today you would be a conservative." -- KD, 2010

"Beware lest in your anxiety to avoid war you obtain a master." -- Demosthenes (384-322 BC)
9.11 fading? Listen: small speaker icon
"Si vis pacem, para bellum." - Publius Flavius Vegetius Renatus (c. 378-395) "If you wish for peace, prepare for war."

Also see: o'quotes and o'related videos

Thursday, August 21, 2014

Using 'BCC' to reduce spam email & spread of PC infections

     Just a reminder to usually use "blind carbon copy" when sending emails.  Normally, emails sent to a group of people doesn't require each recipient to see a list of all others on distribution plus their email addresses. 
     If one of the recipient's PC is infected with a hidden email spam program, it might capture all of the email addresses of everyone listed as recipients in each incoming email message and then secretly send an email back to everyone of those folks' PCs and try to infect them too - in order to further harvest emails to be used to further spread its infection.
     I wrote (copied and pasted) a message on to my blog that explains the use of "blind carbon copy" (BCC.)

small speaker image "I Hate Spam" Click a speaker, the song link, or play button to hear.    Play "The Spam Song" from "", Lyrics .  small speaker image

Monday, August 08, 2011


     This is copy of a message that I sent out a three years ago as a reminder that you usually should use the 'blind carbon copy' (BCC) feature in your email program to conceal email addresses from recipients other than the principal one (the principal one is normally you/your email address.)   
     I usually send email showing only my name/email address as the principal recipient unless it's being sent to a public email address such as government, etc.  ...all other recipients' email addresses, I put in the "blind carbon copy" email field.  (As I did with this message to you.)  
     This helps to reduce exposing email addresses to scammers who "harvest" email addresses from email address books, by installing infections in your PCs or 'break-in' to web-mail accounts, in order to collect email address that they'll then use to generate spam. -- rfh

Original Message From: rfh  Sent: Friday, April 03, 2009 Subject: Use BCC field when addressing mass mail
There are exceptions to this rule, obviously; however, in most emailings using the BCC (blind carbon copy) is best for everyone.
Remember, before forwarding emaildelete prior email recipients addresses/email names and previous senders' names/addresses.

Use BCC field when addressing mass mail
PLEASE READ and become a better E-mail user. 
     This information is intended not only to make you a neater "E-mailer" but one that is more considerate and more thoughtful...  Your friends will be thankful.
     Would you write your friends' phone numbers on the walls of public places?  If you answer no, then why would you share their private E-mail addresses with a group of strangers, many of whom will CARELESSLY forward the same addresses to even more strangers?  Don't do it!  Instead, use the BCC feature of your E-mail program.
     BCC means Blind Carbon Copy.  It is a way of addressing mail to more than one person so that everyone's address is not displayed for all to see.  Every E-mail program (including the free, web-based E-mail services) allow you to address messages using BCC, in other words, to "BCC" one or more recipients.  Some require that you provide at least ONE address in the TO: field. If this is the case, place YOUR OWN address in the TO: field and all your recipients' addresses in the BCC field.
  • Using BCC protects your recipients' E-mail addresses from being spread to strangers.
  • Using BCC helps prevent SPAM (Unsolicited Commercial E-mail)
  • When using BCC, messages will be easier on your readers because they will contain less text to look at. A "cleaner" message is easier to read.
  • Messages will require less bandwidth and will download faster.
  • Using BCC shows your consideration of others by not publishing hundreds of your friends' addresses to strangers and potentially, SPAMMERS or maybe even stalkers.

  • In most email clients, the BCC feature is very apparent and obvious. 
  • While in a new message in AOL's web mail, click BCC. 
  • In Gmail and Yahoo Mail!, click add BCC. 
  • In Hotmail, click Show Cc & Bcc.
  • In Outlook and Outlook express, it's not so obvious but turning it on is a one-time event. 
    To activate the BCC field in Outlook Express, create a new message and choose View, All Headers. 
  • To activate the BCC field in MS-Outlook, create a new message and choose View, BCC.

  • Lotus Notes - the BCC field is right there. Nothing to "turn on", no hoops to jump through, just use it!

     A new crop of an old telephone & email scam is popping up again. 
     People are again receiving emails that appear to have been sent from the email account of a friend, co-worker, relative, etc. that asks for help for the (fake) sender who's allegedly stranded somewhere and needs money to escape from the 'predicament.' 
     The email will appear to have been legitimately sent from an email account of someone you know.  Usually it appears real; however, it is not.   Below is some information about this type of Internet scam.   Note that it is usually sent via some "web-based" email account  such as Yahoo, AOL, GMail, Hotmail, or via any one of many other remotely hosted email services in which your email password, address book, and personal login name are remotely stored.
     Unlike local PC email programs such as MS Outlook or Outlook Express which require the criminal to hack into your network and then into your PC to obtain addresses from your local email program, many of these fake, scam emails are sent from an online web-based account which has been hacked/broken into by the crook(s).
     Conventional PC based antivirus and PC firewalls are unable to protect your web-based email accounts.
     An excerpt from an FBI article (the complete article is further down):
     "If you have been a victim of this type of scam or any other Cyber crime, you can report it to the IC3 website at The IC3 complaint database links complaints for potential referral to the appropriate law enforcement agency for case consideration.  Complaint information is also used to identity emerging trends and patterns." -- rfh  

1st article source:
Practical Computer Advice
from Martin Kadansky
Volume 5 Issue 5 May 2011
In This Issue
The "mugged in London" scam - Prevent thieves from breaking into your email account [example]
An email claiming [example], "I'm in London, I've been mugged, and I need your help" is not a new scam, but its power to fool other people stems from the thieves sending messages from your address to people you know. Here's my advice on how to deal with it if it's already happened to you (or someone you know), and also how to prevent it from happening in the first place.

The "mugged in London" scam - Prevent thieves from breaking into your email account 

It starts with an email from a friend or colleague asking, "When did you go to London? That's terrible! Are you OK? How can we help?" Since you are not currently on a trip to London, you send a confused reply asking what they're talking about. Over the next few days and weeks you get similar concerned messages from a growing but odd assortment of friends, some of whom forward to you the email they originally received. It's apparently from you, claiming to be stuck in London after being robbed, and asking for money to enable you to get home. Of course, you never sent it.

This is just one example of a wide variety of scams that have been around for a long time. Unfortunately, the internet enables modern thieves to pull this off more efficiently than ever before.

How did this happen?
Email scams aren't new. It's easy for almost anyone to send an email that's been faked to say it's "From" your email address, but that type of scammer sends messages to millions of randomly stolen or made-up addresses.

What's different about this particular "London" scam (and others like it) is that the scammer has broken into your email account, gotten into your online Address Book, and then (if your Address Book isn't empty) sent those fake messages to your friends and colleagues.  Because of their relationship with you, your friends are more likely than random strangers to be tricked by these messages (sent from your actual account, but not written by you) into sending money to the thieves.

And, if some of your friends reply with cautious skepticism, clever scammers may also read through your stored email messages, learn more about you, and use that information to send convincing replies, which may improve their chances of conning more of your friends into sending money.

When it comes to your email account, there are generally two ways you can use it:
  • You can use "email client software" on your computer to compose, send, receive, and store your email messages and manage your Address Book. Common email programs include Outlook Express, Windows Mail, Outlook, Thunderbird, and Eudora on Windows, and Apple Mail, Thunderbird, Eudora, and Entourage on Macintosh. This method stores your messages and Address Book on your computer's hard drive, not on the internet, which means that the only way a thief could get access to this information would be to gain access to your computer.
  • You can use "webmail" (web-based email) to access your email account using your email server's web page, e.g., for a Gmail account, for Comcast, for Verizon, for AOL, etc. In this case you would use a web browser (or special software like America Online or AOL Desktop) to access your email account via the internet. Common web browsers include Internet Explorer, Firefox, and Google Chrome on Windows, and Safari, Firefox, and Chrome on Macintosh. This method stores your messages and Address Book on your email server on the internet, not on your computer, which means that if a thief acquired your email address and account password, they would have full access to your account.
Security Implications Here's what all this means: 
  • If you're using an email client program on your computer (Outlook Express, etc.), since your email messages and Address Book are stored on your computer's hard drive, it's less likely (but not impossible) that this type of scam will affect you.
  • However, if you use webmail, i.e., your email messages and Address Book are stored on your email server on the internet "in the cloud" (i.e., not on your computer). You are at a much higher risk for this type of scam. See below for my advice on reducing this risk.
On the other hand, your friends and colleagues who receive one of these "I'm in London" emails are not at risk of having their accounts broken into just because of the message they received from "you."  If this scam has already occurred, i.e., if your online email account has already been compromised, follow these steps immediately If you have already been targeted by such a scam, here's what you should do right away: 
  • Immediately change your email account password. Choose a new password that you've never used before, and make it a "strong" password, i.e., at least 8 characters long using a combination of uppercase letters, lowercase letters, digits, and (if permitted) punctuation. Avoid using a single word or anything resembling personal information about you, including names, dates, and street addresses. Although passwords like "HEkd83;Bzi3q" technically fit the bill, I recommend the more manageable approach of combining a few words with digits and punctuation, e.g., "Agnostic23!Sprinter47" or "Ag23nostic!Sprint47er" is even better.
  • If you use any other computers (laptops and netbooks) or devices (smartphones, iPads, etc.) to access your email, don't forget to update your email password in those devices as well.
  • Have your computer thoroughly scanned for infections, since one of the many methods they may have used to get your password is a "password-stealing" or "keystroke-logging" infection. You should not only scan for viruses, but alsoscan for other types of infections (worms, trojan horses, spyware, etc.).
  • After that, if any infections were found and removed, change your email password again (and update your other computers and devices, again), since a password-stealing infection may have seen you change your password before that infection was removed.
Check your email account for sabotage In recent weeks I have not only had a number of clients experience this scam, but a few have also had their email accounts sabotaged. Thus, I strongly recommend that you also check all of your online email account settings: 
  • Look for any "reply-to" address the thieves may have set. For example, if your email address is "," the thieves may have set a "reply-to" address in your account, for example "" (note the extra letter in the middle), which cleverly prevents anyone to whom you send an email from successfully replying back to you, further isolating you from your friends.
  • Look for any "alternate email addresses" the thieves may have set, especially ones that will permit them to "reset" your password. I've seen such scammers add their email addresses into compromised accounts, giving them the ability to change your password in the future even after you've changed it to something else, locking you out of your account.
  • Similarly, look for any changes to your "security questions" or any other settings related to changing your password.
  • Review all other settings, looking for anything suspicious.
This should keep the thieves out of your online email account. Also, if they didn't keep a copy of your Address Book then the fake messages will probably stop, but you can't be sure of that. I have also seen malicious destruction of account information, including: 
  • The online email Address Book was completely wiped out. Without a backup copy, it might be possible to partially reconstruct it by "harvesting" the email addresses from the remaining messages in the Inbox and Sent folders.
  • Some or all email messages were deleted from the online Inbox or Sent folders.
No notice of potential breach or suspicious behavior Given this need for security, I find it particularly surprising that most online email systems give you no notice (nor even the option to be notified) when someone: 
  • Tries to log in but uses the wrong password
  • Successfully changes the password
  • Sets a "reply-to" address
  • Changes a security question
  • Deletes the entire Address Book
Any one of these could serve as an "early warning" that someone is trying to break into (or has already broken into) your account. Sadly, many other online systems that are more security-conscious, including many online banking, credit card, and investment house systems also lack the ability to warn you. A few systems (PayPal, Facebook, LogMeIn) do give some notice, but overall the concept is sorely lacking. If this scam has not affected you, follow these steps as soon as you can Even if you haven't been a victim of this type of scam, I strongly suggest that you: 
  • Change your online email account password to a "strong" one as I suggest above. Don't forget to update your email software, web browser, or smartphone with this new password.
  • Have your computer thoroughly scanned for infections (not just viruses, butall types of infections), since today's infection may lead to tomorrow's broken-into email account.
  • If you use webmail, make a backup copy of your online Address Book. Look for an "export" function that will create a text file containing a copy of your Address Book that you can store on your hard drive for safekeeping.
  • Review your email account's "security questions" that permit you (or a thief) to reset your password, and strongly consider changing them to have thewrong answers, so a thief who has researched your life won't be able to break in, even if they find out "the street you grew up on" or "the college you attended." Note these "wrong answers" on your password chart, since you probably won't remember them.
  • If you use a wireless network, make sure it's using the highest level of security. See "Wireless is always better, right?" ( for more info.
I never type a password, so my email account must not have one This is a common myth. All email accounts have passwords. I guarantee you that yours has one. If you aren't required to type it in every time, that is a convenienceprovided to you by the software on your computer: 
  • If you're using email client software, whoever set it up probably typed in your password at the time, and your email software has been using it "behind the scenes" to send and receive your messages ever since.
  • If you're using webmail, your web browser may have been set to remember your password and type it for you when you sign in.
  • When you check your email using your smartphone, the phone probably has your password stored along with your other email settings.
How did they get my email password? There are an ever-increasing number of methods thieves can use to get your password: 
  • You've used the same password for many accounts over many years, and you've accidentally revealed it.
  • You've used a common password like "1234," "password," "1111," etc.
  • You've used a simple password based on personal information like your name, birthday, home address, college, etc.
  • You've used answers to your password-reset security questions that are easily researched online, including your mother's maiden name, the college you attended, etc.
  • You've been tricked into revealing your password via a "phishing" web site, email, Facebook message, etc.
  • You've been tricked you into granting access directly into your online email account to a thief (e.g., "third-party access privileges" on Gmail).
  • Someone looked over your shoulder when you signed into your account in a public place like Starbucks.
  • Someone electronically "observed" you signing in and stole your password when your computer was on an insecure wireless network.
  • Your computer has a password-stealing or keystroke-logging infection, which was either delivered by a virus or which you were tricked into downloading and installing.
  • Your computer has a physical key-logging device plugged into its keyboard or USB port.
  • You've lost or misplaced your password chart, or someone has stolen it.
  • Your employer's corporate email system was broken into.
  • "Slow brute force": Since many online email systems are designed to "lock you out" after a small number of failed password guesses within a given period of time (just like an ATM machine will "eat your card" after a few failed PIN entries), some modern thieves now use "slow brute force," where they try one password guess per day on your account along with millions of other accounts that day. Over time (perhaps after hundreds or thousands of days) they may eventually hit upon your password and get in.
And, since social networking sites like Facebook, Twitter, LinkedIn are growing in popularity and messaging abilities, scammers and thieves are quite active on those sites, too, so all of this advice applies to those passwords as well. Real-world versions of this scam This general type of scam long predates the internet. Imagine receiving a phone call from someone claiming to be a relative in trouble and needing money. They may have researched you in advance to find out that you have a nephew named Charles, or use generic opening ploys like "Hi Auntie, I need your help!" and trick you into revealing information they can use to further manipulate you. The best defense is to remain skeptical, ask questions that only the real person would know that are not public knowledge, and to delay sending any money until you contact other friends or family who are likely to have up-to-date information on the person and their actual whereabouts. Conclusions 
  • Your most valuable password is the one protecting your email account and your Address Book.
  • The power of this scam comes from the real-life relationships you have with the people in your Address book. Ironically, your closest friends and family probably know when you're traveling and when you're at home, so they're presumably less likely to be fooled. It's your other contacts that don't know your travel plans or habits but who care about your safety and well-being who are more likely to be taken in.
  • Any information you store online ("in the cloud") is only as secure as the password protecting it. You should choose a strong password, and take all reasonable measures to keep that password secure.
  • Gently warn your friends and colleagues about this potential scam.
Where to go from here More on this scam: 
More on "strong passwords": 
If you're confused or frustrated by something on your computer, I like to say, "You can do it!" You might just need a little encouragement, or information, or change of perspective, and that's where I come in.
How to contact me:
phone: (617) 484-6657

On a regular basis I write about real issues faced by typical computer users. To subscribe to this newsletter, please send an email to and I'll add you to the list, or visit

Did you miss a previous issue? You can find it in my newsletter archive:

Your privacy is important to me. I do not share my newsletter mailing list with anyone else, nor do I rent it out.

Copyright (C) 2011 Kadansky Consulting, Inc. All rights reserved.

I love helping people learn how to use their computers better! Like a "computer driving instructor," I work 1-on-1 with small business owners and individuals to help them find a more productive and successful relationship with their computers and other high-tech gadgets.

Claims of Being Stranded Swindle Consumers Out of Thousands of Dollars
07/01/10—The IC3 continues to receive reports of individuals' e-mail or social networking accounts being compromised and used in a social engineering scam to swindle consumers out of thousands of dollars. Portraying to be the victim, the hacker uses the victim's account to send a notice to their contacts. The notice claims the victim is in immediate need of money due to being robbed of their credit cards, passport, money, and cell phone; leaving them stranded in London or some other location. Some claim they only have a few days to pay their hotel bill and promise to reimburse upon their return home. A sense of urgency to help their friend/contact may cause the recipient to fail to validate the claim, increasing the likelihood of them falling for this scam.
If you receive a similar notice and are not sure it is a scam, you should always verify the information before sending any money.
If you have been a victim of this type of scam or any other Cyber crime, you can report it to the IC3 website at The IC3 complaint database links complaints for potential referral to the appropriate law enforcement agency for case consideration. Complaint information is also used to identity emerging trends and patterns.

© Art Wager
Beware of scam emails that falsely claim that a friend is stranded in a foreign country and needs your help
Imagine that you receive an email from a friend or colleague claiming that he or she is stranded in a foreign country and desperately needs your help to get home. The email originates from the friend's real webmail account and may even include the same email signature that your friend usually uses when emailing you. Thus, you might be inclined to believe that the email was legitimate, at least at first glance. However, the emails are a clever scheme by Internet criminals designed to trick people into sending them money. This scam has two distinct steps. The first step requires the scammers to hack into a random webmail account. There are various ways that the scammers manage to achieve this, including using a webmail phishing scam attack. In such attacks, the scammers will send out large numbers of bogus emails that try to fool users into providing their webmail account login details. Unfortunately, at least a few of the recipients of such phishing emails will fall for the ruse and submit their webmail details to the scammers. Armed with these details, the scammers can then login to the compromised accounts and begin part two of their nefarious scheme. Once they have hacked into an account, the scammers can then send an email with the false claims about being stranded and in need of money to all the email addresses included in the account's address book. Since the messages are being sent from the hacking victim's own webmail address and are likely to include his or her real name and email signature, at least a few recipients are likely to believe the claims in the email. Of course, many will quickly realize that something is not right. They may know for a fact that their friend has not travelled overseas as claimed or they may suspect a fraud attempt. But even if only one contact in a large address book falls for the ruse and sends money in the belief that he is helping a friend in dire need, the scheme will well and truly pay off for the scammers. I have seen many different versions of these scam attempts. Names and other details differ depending on who's webmail account the scammers have hijacked, as do the countries where the "friend" is supposedly stranded. The amounts of money requested in the messages may also differ. But, in spite of such superficial differences, all such messages are versions of the same basic scam. Sadly, many people have become victims of this scam and lost money to these criminals. Be wary of any email that you receive that asks you to wire money, even if the message appears to come from a friend. Moreover, users of webmail should make sure that their account details are as secure as possible, and be wary of possible phishing scams designed to steal their webmail account details. Many people may have several webmail accounts, some of which are not often used. Thus it is a good idea to check all webmail accounts regularly to ensure that they have not been compromised.

Status: Emails are designed to trick recipients into sending money to Internet criminals Example:(Submitted, June 2009)
Dear Friend, How are you doing? Hope all is well with you and everybody?  I am sorry I didn't inform you about my traveling to England for a business trip and right now, i am stranded here and need to get back to Australia without delay. I need a favor from you because I was robbed on my way back to my hotel suite' The robbers carted away with my bag containing my wallet,phone,flight ticket and other valuables. I will like you to lend me the sum of $3,500 US Dollars or any amount you can afford as half bread is better than none so that i can sort out my hotel bills and get myself back to Australia. I promise to pay you back with an extra $1,000 US Dollars as soon as i return home in a few days time so kindly let me know if you can be of help. I was told the fastest and safest way to receive money in seconds is through western union {since that is what works here}.So if you can be of help,you can send the money using the details below: Reciever Name: [Removed] Address : [Removed] To get a list of western union money transfer agents close to you,go to the link below and enter your full address: Please,as soon as you send the money, i will like you to send an email with the transaction code i will need to pick up the money. I will be back here in couples of hours to get the transfer details, please do it without delay so I can get back to Australia. After I receive the money, i will email you on the arrangements to get back home. Thanks once again and i will really appreciate if you can be of help. Love [Name removed]
What else am I missing? Submissions are requested. Of course your email address is safe with me. I'm the anti-spammer!
Related Links

Actual Stories (yeah, right!):

Resources/The Truth - (there's help out there; SEEK IT.)

Some self help information/reference pages --
eMail Rumors, Chain Letter Fraud, Electronic Ephemera, Hoaxes, Jokes, Myths, Urban Legends:
What's spam & how to reduce it:
Some free utilities to help keep PCs clean from infections:  


No comments:

Post a Comment

Please, avoid posting advertisements. Content comments are welcomed, including anonymous. Posts with profanity will not be published.

25 Most Recent Posts

Blog Archive

o'quotes & related videos

Mar 11, 2008 - "My friends, we live in the greatest nation in the history of the world.  I hope you'll join with me as we try to change it." -- B. Hussein Obama

animated burning question

sound or narration
Pledge of Allegiance

Gov't Off Our Backs
o'KGB?: "Remember..comrade, one day it will be your mission to destroy those bourgeoisie capitalist freedoms." small video camera image
o'mam: 'The Prettiest Sound On Earth At Sunset' is the Muslim call to prayer. small video camera image
o'anti-colonialist: imperfect..flawed..colonial small video camera image
o'Marxist: 'I sought out..the Marxist professors..' small video camera image
o'cap'n tax: 'Under my plan, energy costs will necessarily skyrocket..'
2008: o'bamacide's 'Culture of Death' "The first thing I'd do as President is sign the Freedom of Choice Act."
o'who?: 'We do not consider ourselves a Christian nation..' small video camera image
ø'commie: 'It's not surprising..they get bitter, they cling to guns or religion..' small video camera image
o'bamacide: 'doesn't want his daughters punished with a baby..mistake' (773)
2008: '..5 days away..fundamentally transforming the U.S. of America..' small video camera image
2008: 'Judge me by..whom I surround myself.'
2009: "Islam has a proud tradition of tolerance." Hussein Obama, Cairo, Egypt, June 4, 2009 small video camera image
2010: 'I am a muslim."
2012: 'If I had a son, he'd look like..' small video camera image
2012: o'stand down 'What difference does it make?, phony scandals, real dead peoplesmall symbol of a sound speaker
2013: 'Catholics and Protestants are divisive..'
o'der führer: '..reject..'voices' that warn of tyranny.'
2014: o'der leader 'That's the Good Thing as a President, I Can Do Whatever I Want.'

"The Rise and The Fall of Great Civilizations - From Apathy to Dependence to Slavery"
by 'The Corsons', John and Janice Corson (John is a member of the American Conservative Union and the Federalist Society.)

2nd Amendment: Safety and Training small books icons movie or video sound or narration Games/Diversions Reference and Reading small books icons movie or video
"Arm your self with the ballot, while you still have arms." -- rfh
773The 2012 Presidential Election:but not for many children! Read Facts as to Why not? & See contributor$ who benefit.
3 Images of Change: Hitler, Obama, Lenin Communism What is it?

Undercover FBI
View more.
Alan Keyes:

Right Then,
Right Now

au contraire

Return to this blog's 1st Page


Judica me, Deus, et discerne causam meam de gente non sancta.
Do me justice, O God, and distinguish my cause from the nation that is not holy.
- Psalms 43 KJV, 42 Douay Rheims

Stay up to date on Harrold's blog:

2nd Amendment TV (videos)
"The American Revolution would never have happened with gun control."
E.W. Jackson (R-Va)

May 18, 2013
    Alan Keyes, "He must be stopped or the United States will cease to exist."..."We are in the midst of the greatest crisis this nation has ever seen...chaos, and civil alleged usurper...destroying our borders...infanticide...this is insanity...we are claiming that a bankrupt government can save a bankrupt banking system...this is insanity.." (19Feb09)    
Alan Keyes:
video: source
Right Then & Right Now

Quotes |

BE HEARD: Contact Congress & the President -- Phone & Fax Numbers

Obamacare equals abortion and euthanasia
Ronald Reagan on We the people declare Independence from obama
"It is much more important to kill bad bills than to pass good ones."
-- Calvin Coolidge (1873-1933) 30th US President

Find Elected Officials
Enter ZIP Code: or Search by State
See Issues & Action
Select An Issue Area:
Contact The Media
Enter ZIP Code: or Search by State

Senators: State (.xml) (.htm) Senators: Name (.xml) (.htm) source: Effective Advocacy
image of man inside the Capital looking up at the rotunda Legislation Pending in Congress
Instant Congress Phone Number Lookup
Street number and name only:
Zip Code, 5 digits:
Call or fax your members of Congress today. small image of a telephone Just submit your street address and 5 digit zip above to get all their phone numbers. Get this free lookup for your site
(note: Any above political action questions are posed by the author of the "Instant .. Lookup" script.)
Contact the U.S. government and the Media
SENATORS: (toll) 202-225-3121

PRESIDENT: 202-456-1111 & 202-456-1414 & FAX: 202-456-2461
WH Legislative Affairs: 202-456-2230
All Federal Agencies via

Legislative status: Abortion updated information
Legislative status: Gun Owners
Legislative status of the Health Care bills: in the Senate & House
Live Debates: Senate & House + CSpan Congress, POTUS, other FED, BookTV & Wash. Journal
More Phone Numbers links:
Fax numbers & eMail Addresses: (facsimile/email)
Fax & phone #s to '' Congressional list:
• email Congress & W.H.: (
• write your Congressional representative:
All Governors, Senators, Representatives, Committees + Citizen Action Resources source: & alt: Elected Officials at email, call, write CongressTalk ShowsNewspapersNetworksLobbying GuideCurrent Action Items

Some Gov't News sources: PresidentialCabinetCongressSupreme CrtOther US Govt

Life - Susan B. Anthony List: SBA HomeElected OfficialsIssuesElectionMediaLegislative Alerts and UpdatesCurrent LegislationKey VotesCapitol Hill BasicsPolling: Electoral StrengthThe Other SidePolling: Pro-life TrendsPolling: Electoral StrengthLegislationOur PrioritiesTake ActionPollingPro-Life Women LeadersWinning [Endorsed] CandidatesNewsroom

From: | Current Legislation | Write Your Representative | Get Involved Locally | Write the Media | Register To Vote
Find your Congressman -
Find your Senator -
trust no one...not even yourself We're from the government and are here to help you. ...not even yourself
A Speaker GIF Image. My Sentiments: Soon, What We All (Are?) Will Be Doing. (benddown.wav, 47kb) A Speaker GIF Image.
Badges? speaker gif  (89kb) Voice of: Alfonso Bedoya Evans Law of Inadequate Paranoia: "No matter how bad you think something is, when you look into it, it's always worse." -- M. Stanton Evans, author "Black Listed by History, The Untold Story of Senator Joseph McCarthy" (published 2007) source: Glenn Beck TV show, Th.24Jun10 interview ( of Occupy protesters arrested counter
Tea Party Arrests=0

Now the U.S. Owes $175+ Trillion Dollars! (25Sep17) Up daily since o'tax'n spend was elected!

"The American Republic will endure, until politicians realize they can bribe the people with their own money."
-- Alexis de Tocqueville [Alexis Charles Henri Maurice Clerel, le Comte de Tocqueville] (1805-1859) French historian
The U.S. Deficit in 2007 was $9,007,653,372,262.48
The federal government has accumulated more new debt -- $3.22 trillion ($3,220,103,625,307.29) — during the tenure of the 111th Congress than it did during the first 100 Congresses combined, according to official debt figures published by the U.S. Treasury." -- By Terence P. Jeffrey, (Read The Full Story)
Click Here for videos, graphs, movie & U.S. National Debt totals.
3 years ago: The Debt ~ $125T+! Then Obama:  Up $22T+ in only 3 years! $22T to $26T+ by 2015!  Since November 2011 to January 2013 he has added $2 Trillion to the deficit!  States' Unfunded: $3.2T+! • (Dec10) From Jan'09 the deficit: $10.2T→$14.6T up $4.3T/42%! -- Federal unfunded liabilities total $84 trillion .. equal to 5.7 percent of the present value of all future GDP, which translates into about 31 percent of the long run federal revenue estimate,” the report states.  “Thus federal revenues would have to rise immediately and permanently to 24.1 percent of GDP to cover the fiscal imbalance.” (source:
Federal obligations exceed world GDP! Is the US Gov't Bankrupt?Unfunded a myth?
Deficit: $ national debt Totals Source: http://www.usdebtclock.orgUnfunded Liabilities: $ 107,599,889,000,000 (25Sep17)
Many Americans actually pay $1 out of ever $2 earned to some form of tax while ~50% of people pay no taxes!  Do you pay your bills?  The Fed takes $3 in and spends $5.  Debt per citizen: $51,985 - Debt per taxpayer: $142,513! (13Dec12)
Also, see the blog videos below at
What were you doing in the last hour while the U.S. Gov't spent $188 Million Dollars of our money!  (Every Hour, Every Day!) (Apr11)   In 8 years, President Bush added $5 trillion to the national debt; President Obama, according to a revised Dec11 GAO report, added $4T+ to the U.S. deficit in 2011 alone!  The GAO estimates the deficit, including o'scamcare & mandates, may grow from $15T+ to over $26T+!  UPDATE: A little-noticed event occurred at approximately midnight on Monday, October 31, 2011.  The National Debt exceeded the GDP!  Imagine what these numbers are going to be now that Obama is reelected! (src)
A trillion seconds pass in 31,688 years.  At $1/sec it would take 41,194 years just to pay off o'tax'n spend's new Feb12-Feb13 added debt - 538,696 years to pay only the national debt or 4,404,632 years to settle the debt+unfunded liabilities!

"Over the last four years our national debt has risen nearly $6 trillion, and just last week the debt topped an astounding $16 trillion.  To put that in perspective, $16 trillion is enough money to fund the US military, along with the military of every NATO country combined… for the next sixteen years!  Government spending is projected to hit $3.8 trillion this year alone.  Even after every tax dollar paid by Americans has been counted, the government will still overspend by another $1.13 trillion.  Every single second of the day our government spends over $12,000.  So in the time it takes you to read this article, roughly five minutes, our government has spent $3.6 million.  It take four seconds for the government to spend what the average American earns in an entire year."  (source: by Tim Phillips 17Sep12 at
    "Firearms stand next in importance to the Constitution itself.  They are the American people's liberty teeth and keystone under independence … From the hour the Pilgrims landed, to the present day, events, occurrences, and tendencies prove that to insure peace, security and happiness, the rifle and pistol are equally indispensable . . . the very atmosphere of firearms everywhere restrains evil interference – they deserve a place of honor with all that is good." -- George Washington
"The heart of the wise inclines to the right, but the heart of the fool to the left." (Ecclesiastes 10:2)
Bishop Sheen Audio Library small animated speaker "For ye suffer fools gladly, seeing ye yourselves are wise." [2 Cor 11:19] Psalm 109:8
"[W]e ought to deprecate the hazard attending ardent and susceptible minds, from being too strongly, and too early prepossessed in favor of other political systems, before they are capable of appreciating their own." -- George Washington, letter to the Commissioners of the District of Columbia, 1795
small animated speaker Fulton Sheen's "Talk to American Soldiers - The Centurions of Rome 'West Point' (alt src)
Bishop Sheen Radio small animated speaker
President Obama Job disapproval/approval (daily, interactive)
ElectionProjection dot com election results
+ Pre-6Nov12 Polls
Who Won Who Lost
(punctuation optional)
Thousands of Deadly Islamic Terror Attacks Since 9/11
     It has been suggested that o'who?, the clown, and 'those who surround him' are not the bumbling fools they appear to be.  Nor are they one of the 'Three Stooges' but rather are shrewd implementation/drivers and fellow-travelers of policies designed to disarm the citizenry & collapse the American economy.  Why?  o'nocchio's grandiose scheme to "fundamentally transform America" is more than simple campaign rhetoric as can be seen by his use of "enabling acts" to circumvent the Constitution of the United States.  As Ollie used to say, "Well, here's another nice mess you've gotten me into."



News Briefs: 2nd Amendment, Values, Life, & Muslim Terrorism Shooting Sports News » Gun Rights News Shooting Sports News » Ammunition News Shooting Sports News » Firearm News

It's a race against time.

"You need only reflect that one of the best ways to get yourself a reputation as a dangerous citizen these days is to go about repeating the very phrases which our founding fathers used in the great struggle for independence." -- Charles Austin Beard (1874-1948)

2nd, Founding, Traditional American Values, & ProLife Quotes:

Federalist and Anti-Federalist Papers

"If men were angels, no government would be necessary. If angels were to govern men, neither external nor internal controls on government would be necessary." -- James Madison, The Federalist No. 51, Independent Journal, Wednesday, February 6, 1788
Anti-Federalists and Federalists Papers
The Federalist Papers
Maintained by "Silent Calvin"
The Constitution Society
The Anti-Federalists' Papers
Maintained by Jon Roland of the Constitution Society at:
Search or the web -- Powered by FreeFind

Anti-Federalist Papers Entire site Entire web

When Men Were

When Men Were Men - "Scots Wha Hae" Battle of Bannockburn in 1314 Listen to the poem A Speaker GIF Image. "Scots Wha Hae"

Values:   "Scots Wha Hae"  1] poem lyrics..text of "Bruce before Bannockburn" also known as "Scots wha hae", written by Robert Burns
Robert Burns b.1759-d.1796, 8May1794, The Morning Chronicle)  1] "Supposed to be addressed by Bruce to his soldiers before the Battle of Bannockburn against Edward II."
Listen A Speaker GIF Image. to the poem "Scots Wha Hae" read by Doug Robertson [3m55s],  Music by Steve McDonald from 'Bannockburn' [Stone of Destiny]" (.mp3, 3.7MB)
• alternate A Speaker GIF Image. ScotWha2.ram Stream in Real Audio (rm, 3m55s) re [ Robert Bruce's March to Bannockburn, Robert I, the Bruce (1274-1329) also know as Robert the Bruce, "The Hammer of the Scots" ] plus A Speaker GIF Image. "Scots, wha hae Wi' Wallace Bled," (midi, Scottish Songs) & .midi sequenced with lyrics [src] ***
and A Speaker GIF Image. Scots Wha Hae (bagpipes) by the 48th Highlanders of Canada (7MB, .mp3, 3m14s)
and A Speaker GIF Image. Scots Wha Hae, bagpipes solo (1.3MB, .mp3, 1m22s)
and A Speaker GIF Image. Scots Wha Hae (2.7MB, .mp3, 3m4s; 'The Corries' ["Battle songs of Scotland", sung by Ronnie Browne solo] & A Speaker GIF Image. Scots Wha Hae with pipes (4.3MB, .mp3, 4m29s)
Material published on Harrold's blog is collected from email forwards, public articles, and my opines or those submitted by users.  I try to avoid copyrighted material.  If anything on this site has been copyrighted by you, please contact me so it can be removed or give you credit. -- Robert Harrold small envelope • cite info:
"As a nation we have been asleep for years.  Lulled by affluence and self-indulgent apathy, our collective awareness has grown dim.  This has created an opening for our enemies, one that may ultimately prove fatal.  This is the truth and what we do, or don't do, will determine the consequences, for better or worse.  It is time to decide." --
The Manhattan Declaration

Recent Visitors:

About Me

My photo
El Centro, California, United States
mailto: Robert Harrold formerly dba AERC, El Centro, CA, US 92243

Judica me, Deus, et discerne causam meam de gente non sancta, ab homine iniquo et doloso erue me.
Do me justice, O God, and distinguish my cause from the nation that is not holy; rescue me from the deceitful and unjust man.
- Psalm 43 KJV, 42 Douay Rheims  (

There are certain universal truths.  There is right and wrong.  Life is, choice Isn't.  The 2nd Amendment is for you and me, not the government.

"We failed to react appropriately to them and, instead, displayed weakness.  And, the weak are always beaten."  ~~ Vladimir Putin

"We sleep safe in our beds because rough men stand ready in the night to visit violence on those who would do us harm." - George Orwell on a BBC broadcast, April 4, 1942

"An armed society is a polite society." -- Robert A. Heinlein (1907-1988) American writer

Before you sign anything, ask an Indian first.
Powered by Blogger.