Skip to main content

"HOW TO CREATE A SOCIAL STATE ," by Saul Alinsky

There are 8 levels of control that
must be obtained before you are able to create a social state. The first is the most important.

*1) Healthcare - Control healthcare and you control the people.

2) Poverty - Increase the Poverty
level as high as possible, poor people are easier to control and will not fight
back if you are providing for them everything needed to live.

3) Debt - Increase the debt
to an unsustainable level. That way you are able to increase taxes, and this will
produce more poverty

4) Gun Control - Remove the ability to defend themselves from the Government.
That way you are able to create a police state.

5) Welfare - Take control of every aspect of their lives (Food, Housing, and Income).

6) Education - Take control of what people read and listen to; take control of what
children learn in school.

7) Religion - Remove the belief in God from the Government and schools.

8) Class Warfare - Divide the people into the wealthy and the poor. This
will cause more discontent and it will be easier to take (Tax) the
wealthy with the support of the poor.


Does any of this sound like what
is happening to our country,
The United States of America ?

The Ideal Democratic Country - INDIA

1) HEALTHCARE : Have just enough Government Medical Centers, but refer the real sick patients to neighbouring
expensive Medical Centers because most or all Government Centers have no facilities nor enough stocks of
medicines.

2) Poverty : All politicians can ignore the unmanageable millions of poor and only just before the elections provide
few free doles like clothes, cooking items, T.Vs etc. for getting their votes again.

3) Debt : Retain the high debt level by allowing nexus between Government Officials and Businessmen, wherein
the bribes obtained for most contracts are siphoned of as black money in Swiss Banks and the likes.

4) Religion and Ethnicity : Permanently divide the people on ethnic and religious lines by allowing periodic village
heads and political parties to flare up processional mob violences ( mostly in rural areas of poor people). Then
tell the world that we are the best democratic country in the world.

5) So wake up Indians - Is this what you want!!!!!!!! Consider really well before you vote!!!!!

So my friends,
We Indians have a lot to teach the world about political anarchy!!!!!!!
www.josiahdele.blogspot.com

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...