<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Corrupt Politicians Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/category/truthful-news/tragic/crimes/corrupt-politicians/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/category/truthful-news/tragic/crimes/corrupt-politicians/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Sun, 20 Jul 2025 21:23:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>Corrupt Politicians Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/category/truthful-news/tragic/crimes/corrupt-politicians/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Sen. Nicole Mitchell convicted on burglary charges</title>
		<link>https://goodshepherdmedia.net/sen-nicole-mitchell-convicted-on-burglary-charges/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 20 Jul 2025 21:23:11 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Politicians]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Robbery]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[Sen. Nicole Mitchell convicted on burglary charges]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21337</guid>

					<description><![CDATA[Sen. Nicole Mitchell convicted on burglary charges Minnesota state Sen. Nicole Mitchell (DFL-Woodbury) was found guilty of felony burglary by a Detroit Lakes jury Friday. The latest: The jury delivered the verdict — guilty on charges of first-degree burglary and possession of burglary tools — just hours after closing arguments. Mitchell did not speak to the press following [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="text-soft-black-core h5 md:h3 font-regular" data-cy="story-headline">Sen. Nicole Mitchell convicted on burglary charges</h1>
<p>Minnesota state <a class="gtmContentClick" href="https://www.axios.com/local/twin-cities/2024/04/23/nicole-mitchell-democrat-burglary-resignation" target="_self" data-vars-link-text="Sen. Nicole Mitchell" data-vars-click-url="https://www.axios.com/local/twin-cities/2024/04/23/nicole-mitchell-democrat-burglary-resignation" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">Sen. Nicole Mitchell</a> (DFL-Woodbury) was found guilty of felony burglary by a Detroit Lakes jury Friday.</p>
<p><strong>The latest: </strong>The jury delivered the verdict — guilty on charges of first-degree burglary and possession of burglary tools — just hours after closing arguments.</p>
<ul>
<li>Mitchell did not speak to the press following the verdict, but defense attorney Dane DeKrey told reporters she plans to appeal, <a class="gtmContentClick" href="https://www.startribune.com/sen-nicole-mitchell-burglary-trial-goes-to-jury/601434374" target="_blank" rel="noopener" data-vars-link-text="per the Star Tribune. " data-vars-click-url="https://www.startribune.com/sen-nicole-mitchell-burglary-trial-goes-to-jury/601434374" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">per the Star Tribune.</a></li>
</ul>
<div id="piano-wall">
<div id="piano-container" class="gtmView" data-cy="piano-wall-modal" data-vars-location="banner" data-vars-sub-category="piano" data-vars-experiment="subwall" data-vars-experiment-variant="unknown_variant" data-vars-product="local" data-vars-page-type="story" data-vars-sub-product="twin-cities" data-vars-latitude="34.38" data-vars-longitude="-118.52" data-vars-postal-code="91321" data-vars-event-name="cta_view"></div>
</div>
<p><strong>The big picture: </strong>The fallout over the verdict could upend the balance of power at the State Capitol, where Democrats have a one-seat Senate majority.</p>
<p><strong>Catch up fast: </strong>Mitchell, a first-term Democrat, meteorologist and<strong> </strong>former lieutenant colonel in the Air National Guard, has <a class="gtmContentClick" href="https://www.axios.com/local/twin-cities/2024/04/23/nicole-mitchell-democrat-burglary-resignation" target="_self" data-vars-link-text="faced pressure to resign" data-vars-click-url="https://www.axios.com/local/twin-cities/2024/04/23/nicole-mitchell-democrat-burglary-resignation" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">faced pressure to resign</a> since police arrested her on the morning of April 22, 2024, following a report of a burglary at her stepmother&#8217;s Detroit Lakes home.</p>
<p><strong>Mitchell, </strong>discovered in the basement dressed in black, told officers at the time that she was there to retrieve her late father&#8217;s items, according to a criminal complaint and police body camera footage.</p>
<ul>
<li>But Mitchell later denied that her intent was to steal, saying she was attempting to check on her stepmother amid concerns about Alzheimer&#8217;s and associated &#8220;paranoia.&#8221;</li>
</ul>
<p><strong>What happened: </strong>In her trial testimony, Mitchell <a class="gtmContentClick" href="https://minnesotareformer.com/2025/07/17/sen-nicole-mitchell-says-she-lied-to-police-during-burglary-arrest-to-allay-stepmothers-paranoia/" target="_blank" rel="noopener" data-vars-link-text="admitted to trespassing in the home" data-vars-click-url="https://minnesotareformer.com/2025/07/17/sen-nicole-mitchell-says-she-lied-to-police-during-burglary-arrest-to-allay-stepmothers-paranoia/" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">admitted to trespassing in the home</a> and claimed she lied to police about her reasons for being there, but said she did both things out of concern for her ailing stepmother.</p>
<ul>
<li><a class="gtmContentClick" href="https://www.startribune.com/sen-nicole-mitchell-burglary-trial-goes-to-jury/601434374" target="_blank" rel="noopener" data-vars-link-text="In his closing argument" data-vars-click-url="https://www.startribune.com/sen-nicole-mitchell-burglary-trial-goes-to-jury/601434374" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">In his closing argument</a>, Mitchell&#8217;s attorney had argued there was a distinction between trespassing and burglary, saying the state couldn&#8217;t &#8220;rule out that Nicole Mitchell entered just to check on Carol.&#8221;</li>
</ul>
<p><strong>The other side:</strong> Prosecutors argued Mitchell&#8217;s explanations didn&#8217;t add up to a daughter&#8217;s concern, pointing out the tools she took with her, including latex gloves a small crowbar.</p>
<ul>
<li>&#8220;Who packs a freaking prybar just in case?&#8221; Becker County Attorney Brian McDonald said <a class="gtmContentClick" href="https://youtu.be/XPP8Dp-UOR0?si=nAQ5exsnxHhMJhga&amp;t=582" target="_blank" rel="noopener" data-vars-link-text="during his closing argument" data-vars-click-url="https://youtu.be/XPP8Dp-UOR0?si=nAQ5exsnxHhMJhga&amp;t=582" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">during his closing argument</a>.</li>
</ul>
<p><strong>By the numbers</strong>: The felony burglary charge carries a minimum sentence of six months in jail, per Mitchell&#8217;s attorney, and a maximum sentence of 20 years.</p>
<ul>
<li>A sentencing date has not been set.</li>
</ul>
<p><strong>Between the lines:</strong> Mitchell repeatedly rebuffed Republicans&#8217; calls to resign over the charges in the wake of her arrest.</p>
<ul>
<li>While some top Democrats, including Gov. Tim Walz, have said they <a class="gtmContentClick" href="https://www.axios.com/local/twin-cities/2024/05/30/nicole-mitchell-resign-minnesota-dfl-chair-martin" target="_self" data-vars-link-text="thought she should step down" data-vars-click-url="https://www.axios.com/local/twin-cities/2024/05/30/nicole-mitchell-resign-minnesota-dfl-chair-martin" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">thought she should step down</a>, the Senate DFL Caucus repeatedly blocked GOP efforts to remove her from her seat.</li>
<li>Defenders of Mitchell remaining in the Legislature, including Senate Majority Leader Erin Murphy, acknowledged the serious nature of the allegations, but said Mitchell had a right to due process.</li>
</ul>
<div class="gtmView" data-vars-experiment="mid_story_ad" data-vars-experiment-variant="ad" data-vars-sub-category="non-braze" data-vars-product="local" data-vars-page-type="story" data-vars-sub-product="twin-cities" data-vars-latitude="34.38" data-vars-longitude="-118.52" data-vars-postal-code="91321" data-vars-event-name="cta_view" data-vars-deprecated-category="cta" data-vars-deprecated-experiment="mid_story_ad" data-vars-deprecated-experiment-variant="ad" data-vars-deprecated-label="cta/view/mid_story_ad/ad">
<div class="mt-6 mb-6">
<div class="gtmView midStoryAd grid justify-center items-center py-2 overflow-hidden lg:overflow-visible before:content-['Advertisement'] before:text-caption before:font-sans before:text-soft-black-shade before:mb-1 before:select-none before:text-center before:block" data-cy="mid-story-ad" data-vars-event-name="ad_view" data-vars-product="local" data-vars-page-type="story" data-vars-sub-product="twin-cities" data-vars-latitude="34.38" data-vars-longitude="-118.52" data-vars-postal-code="91321" data-vars-sub-category="mid_story" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges">
<div class="adunitContainer"></div>
</div>
</div>
</div>
<p><strong>Zoom in</strong>: As a result, Mitchell was able to continue to cast what was effectively the deciding vote whenever the narrowly divided chamber split on party lines.</p>
<ul>
<li>Those votes included major pieces of the DFL&#8217;s agenda when Democrats held full control of the Capitol in 2024, budget-related bills and procedural fights and <a class="gtmContentClick" href="https://www.cbsnews.com/minnesota/news/senator-nicole-mitchell-call-for-resignation-fails-in-minnesota-senate/" target="_blank" rel="noopener" data-vars-link-text="resolutions" data-vars-click-url="https://www.cbsnews.com/minnesota/news/senator-nicole-mitchell-call-for-resignation-fails-in-minnesota-senate/" data-vars-content-id="64c0b445-e584-4f4b-a9d1-ae25c753dafa" data-vars-headline="Sen. Nicole Mitchell convicted on burglary charges" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">resolutions</a> related to her own standing in the Senate.</li>
</ul>
<p><strong>What we&#8217;re watching: </strong>What Mitchell — and top Senate Democrats — do next.</p>
<ul>
<li>In a statement issued minutes after the verdict, Murphy said Mitchell &#8220;has told colleagues that she intended to resign if found guilty of this crime, and I expect her to follow through on that pledge.&#8221;</li>
<li>The governor&#8217;s office told Axios that Walz expects Mitchell will resign and will have more information on a special election soon.</li>
</ul>
<p><strong>The bottom line:</strong> The Legislature is scheduled to reconvene in February. If she doesn&#8217;t resign, Walz could call a special session for an expulsion vote.</p>
<ul>
<li>It would take a vote of two-thirds of the chamber to forcibly expel Mitchell from the chamber. <a href="https://www.axios.com/local/twin-cities/2025/07/18/senator-nicole-mitchell-guilty" target="_blank" rel="noopener">source</a></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA Plans to Infect Millions of Computers with Malware using AI</title>
		<link>https://goodshepherdmedia.net/nsa-plans-to-infect-millions-of-computers-with-malware-using-ai/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 25 Jan 2025 19:43:47 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Man Made]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🤖 AI Artificial Intelligence]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA Plans to Infect Millions of Computers with Malware using AI]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18039</guid>

					<description><![CDATA[NSA Plans to Infect Millions of Computers with Malware using AI Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>NSA Plans to Infect Millions of Computers with Malware using AI</h1>
<p>Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.</p>
<p>The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.</p>
<p>The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.</p>
<p>In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.</p>
<p>The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by <em>The Intercept</em> show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”</p>
<p>In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.</p>
<p>Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm <a href="http://home.f-secure.com/en_US/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">F-Secure</a>, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.</p>
<p>“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”</p>
<p>Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”</p>
<p>“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”</p>
<p>The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”</p>
<p>&nbsp;</p>
<h4>“Owning the Net”</h4>
<p>The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret <a href="https://theintercept.com/document/2014/03/12/thousands-implants/">internal records</a>, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.</p>
<p>To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices.</p>
<p>In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations.</p>
<p>But the NSA recognized that managing a massive network of implants is too big a job for humans alone.</p>
<p>“One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).”</p>
<p>The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that <a href="https://theintercept.com/document/2014/03/12/industrial-scale-exploitation/">enables</a> “industrial-scale exploitation.”</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in <a href="https://theintercept.com/document/2014/03/12/nsa-technology-directorate-analysis-converged-data/">one secret document</a> from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”</p>
<p>In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations.</p>
<p>The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)</p>
<p>&nbsp;</p>
<div class="default"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-18041" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1.webp" alt="" width="1024" height="86" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1-400x34.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1-768x65.webp 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></div>
<p>&nbsp;</p>
<p>Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.</p>
<p><a href="http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=1" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Earlier</a> <a href="http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reports</a> based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks <a href="http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">across the world</a>, with plans to keep on scaling up those numbers.</p>
<p>The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”</p>
<p>The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”</p>
<h4>Circumventing Encryption</h4>
<p>The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.</p>
<p>One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.</p>
<p>An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.</p>
<p>The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.</p>
<p>It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.</p>
<p>Previous reports <a href="http://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">have alleged</a> that the NSA worked with Israel to develop the Stuxnet malware, which was used to sabotage Iranian nuclear facilities. The agency also <a href="http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reportedly</a> worked with Israel to deploy malware called Flame to infiltrate computers and spy on communications in countries across the Middle East.</p>
<p>According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.</p>
<p>In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.</p>
<p>The internal post – titled “I hunt sys admins” – makes clear that terrorists aren’t the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any “government official that happens to be using the network some admin takes care of.”</p>
<p>Similar tactics have been adopted by Government Communications Headquarters, the NSA’s British counterpart. As the German newspaper <em>Der Spiegel</em> <a href="http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reported</a> in September, GCHQ hacked computers belonging to network engineers at Belgacom, the Belgian telecommunications provider.</p>
<p>The mission, codenamed “Operation Socialist,” was designed to enable GCHQ to monitor mobile phones connected to Belgacom’s network. The secret files deem the mission a “success,” and indicate that the agency had the ability to covertly access Belgacom’s systems since at least 2010.</p>
<p>Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications.</p>
<p>Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a <a href="http://www.techterms.com/definition/vpn" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Virtual Private Network</a>, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.</p>
<div class="default"><img decoding="async" class="alignnone size-full wp-image-18042" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn.webp" alt="" width="618" height="467" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn.webp 618w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn-400x302.webp 400w" sizes="(max-width: 618px) 100vw, 618px" /></div>
<p>The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted “Real-time Transport Protocol” packets, the implants can covertly record the audio data and then return it to the NSA for analysis.</p>
<div class="default"><img decoding="async" class="alignnone size-full wp-image-18043" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip.webp" alt="" width="621" height="469" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip.webp 621w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip-400x302.webp 400w" sizes="(max-width: 621px) 100vw, 621px" /></div>
<p>But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on <a href="https://theintercept.com/document/2014/03/12/one-way-quantum/">a classified list</a> that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.</p>
<p>&nbsp;</p>
<h4>“Mass exploitation potential”</h4>
<p>Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.</p>
<p>According to <a href="https://theintercept.com/document/2014/03/12/nsa-phishing-tactics-man-middle-attacks/">one top-secret document</a> from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.</p>
<p>There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious.</p>
<p>Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.</p>
<p>To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors <a href="https://theintercept.com/document/2014/03/12/quantum-insert-diagrams/">alert the TURBINE system</a>, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second.</p>
<p>In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.</p>
<p><iframe id="vimeo-3998515" class="social-iframe social-iframe--vimeo" src="https://player.vimeo.com/video/88822483?title=0&amp;byline=0&amp;portrait=0&amp;badge=0&amp;color=8280FF" width="100%" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<p>The documents show that QUANTUMHAND became operational in October 2010, after being successfully tested by the NSA against about a dozen targets.</p>
<p>According to Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, it appears that the QUANTUMHAND technique is aimed at targeting specific individuals. But he expresses concerns about how it has been covertly integrated within Internet networks as part of the NSA’s automated TURBINE system.</p>
<p>“As soon as you put this capability in the backbone infrastructure, the software and security engineer in me says that’s terrifying,” Blaze says.</p>
<p>“Forget about how the NSA is intending to use it. How do we know it is working correctly and only targeting who the NSA wants? And even if it does work correctly, which is itself a really dubious assumption, how is it controlled?”</p>
<p>In an email statement to <em>The Intercept</em>, Facebook spokesman Jay Nancarrow said the company had “no evidence of this alleged activity.” He added that Facebook implemented HTTPS encryption for users last year, making browsing sessions less vulnerable to malware attacks.</p>
<p>Nancarrow also pointed out that other services besides Facebook could have been compromised by the NSA. “If government agencies indeed have privileged access to network service providers,” he said, “any site running only [unencrypted] HTTP could conceivably have its traffic misdirected.”</p>
<p>A man-in-the-middle attack is a similar but slightly more aggressive method that can be used by the NSA to deploy its malware. It refers to a hacking technique in which the agency covertly places itself between computers as they are communicating with each other.</p>
<p>This allows the NSA not only to observe and redirect browsing sessions, but to modify the content of data packets that are passing between computers.</p>
<p>The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is <a href="https://blogs.rsa.com/man-in-the-middle-standing-between-you-and-your-cash/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">sometimes used by criminal hackers</a> to defraud people.</p>
<p>A top-secret NSA presentation from 2012 reveals that the agency developed a man-in-the-middle capability called SECONDDATE to “influence real-time communications between client and server” and to “quietly redirect web-browsers” to NSA malware servers called FOXACID. In October, details about the FOXACID system were <a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reported by the <em>Guardian</em></a>, which revealed its links to attacks against users of the Internet anonymity service Tor.</p>
<p>But SECONDDATE is tailored not only for “surgical” surveillance attacks on individual suspects. It can also be used to launch bulk malware attacks against computers.</p>
<p>According to the 2012 presentation, the tactic has “mass exploitation potential for clients passing through network choke points.”</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/tao-2-1024x768.png" alt="" /></div>
<p>Blaze, the University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale “seems very disturbing.” Such an approach would involve indiscriminately monitoring entire networks as opposed to targeting individual suspects.</p>
<p>“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”</p>
<p>To deploy some of its malware implants, the NSA exploits security vulnerabilities in commonly used Internet browsers such as Mozilla Firefox and Internet Explorer.</p>
<p>The agency’s hackers also exploit security weaknesses in network routers and in popular software plugins such as Flash and Java to deliver malicious code onto targeted machines.</p>
<p>The implants can circumvent anti-virus programs, and the NSA has gone to extreme lengths to ensure that its clandestine technology is extremely difficult to detect. An implant named VALIDATOR, used by the NSA to upload and download data to and from an infected machine, can be set to self-destruct – deleting itself from an infected computer after a set time expires.</p>
<p>In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”</p>
<p>&nbsp;</p>
<h4>Covert Infrastructure</h4>
<p>The TURBINE implants system does not operate in isolation.</p>
<p>It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has <a href="https://theintercept.com/document/2014/03/12/turbine-turmoil/">installed at locations across the world</a>.</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/turbine_turmoil_maps-1-1024x768.png" alt="" /></div>
<p>The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.</p>
<p>The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.</p>
<p>When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack.</p>
<p>The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter.</p>
<p>Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/selectors-1024x768.png" alt="" /></div>
<p>What’s more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.</p>
<p>Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.</p>
<p>GCHQ, the British agency, has taken on a particularly important role in helping to develop the malware tactics. The Menwith Hill satellite eavesdropping base that is part of the TURMOIL network, located in a rural part of Northern England, is operated by the NSA in close cooperation with GCHQ.</p>
<p><a href="https://theintercept.com/document/2014/03/12/turbine-turmoil/">Top-secret documents</a> show that the British base – referred to by the NSA as “MHS” for Menwith Hill Station – is an integral component of the TURBINE malware infrastructure and has been used to <a href="https://theintercept.com/document/2014/03/12/menwith-hill-station-leverages-xkeyscore-quantum-yahoo-hotmail/">experiment</a> with implant “exploitation” attacks against users of Yahoo and Hotmail.</p>
<p>In <a href="https://theintercept.com/document/2014/03/12/nsa-gchqs-quantumtheory-hacking-tactics/">one document</a> dated 2010, at least five variants of the QUANTUM hacking method were listed as being “operational” at Menwith Hill. The same document also reveals that GCHQ helped integrate three of the QUANTUM malware capabilities – and test two others – as part of a surveillance system it operates codenamed INSENSER.</p>
<p>GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, <a href="https://www.documentcloud.org/documents/894386-legal-issues-uk-regarding-sweden-and-quantum.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">previously disclosed</a> by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately <a href="https://www.documentcloud.org/documents/1077367-uk-perspective-on-mikey-ibake.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">voiced concerns</a> that performing “active” hacking attacks for surveillance “may be illegal” under British law.</p>
<p>In response to questions from <em>The Intercept</em>, GCHQ refused to comment on its involvement in the covert hacking operations. Citing its boilerplate response to inquiries, the agency said in a statement that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”</p>
<p>Whatever the legalities of the United Kingdom and United States infiltrating computer networks, the Snowden files bring into sharp focus the broader implications. Under cover of secrecy and without public debate, there has been an unprecedented proliferation of aggressive surveillance techniques. One of the NSA’s primary concerns, in fact, appears to be that its clandestine tactics are now being adopted by foreign rivals, too.</p>
<p>“Hacking routers has been good business for us and our 5-eyes partners for some time,” notes one NSA analyst in <a href="https://theintercept.com/document/2014/03/12/five-eyes-hacking-large-routers/">a top-secret document</a> dated December 2012. “But it is becoming more apparent that other nation states are honing their skillz [sic] and joining the scene.” <a href="https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-malware/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>George Soros Buys  227 US Radio Stations Going Into 2024 Election</title>
		<link>https://goodshepherdmedia.net/george-soros-buys-227-us-radio-stations-going-into-2024-election/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 27 Sep 2024 08:52:01 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[2024 Election]]></category>
		<category><![CDATA[Biden Corruption]]></category>
		<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Laws]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Money / Finances]]></category>
		<category><![CDATA[Politicians]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Presidential Elections]]></category>
		<category><![CDATA[Rights]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18754</guid>

					<description><![CDATA[George Soros Fund Buys $400 Million Stake In 227 US Radio Stations Going Into 2024 Election FCC FAST-TRACKS SOROS&#8217; BID TO DOMINATE THE AIRWAVES Last week, the FCC adopted an order to approve his purchase of more than 200 radio stations in 40 markets just weeks before the presidential election. The stations reach more than [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="cover-title yf-1o8srm2">George Soros Fund Buys $400 Million Stake In 227 US Radio Stations Going Into 2024 Election</h1>
<p><iframe title="The FCC is HELPING George Soros buy up radio stations?!" width="640" height="360" src="https://www.youtube.com/embed/L1JYvO5801A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><em><span class="r-b88u0q">FCC FAST-TRACKS SOROS&#8217; BID TO DOMINATE THE AIRWAVES</span> Last week, the FCC adopted an order to approve his purchase of more than 200 radio stations in 40 markets just weeks before the presidential election. The stations reach more than 165 million Americans, and staff at the FCC are concerned that the move is politically motivated. The commission&#8217;s three democrats voted for the move, while the two republicans voted against it. Under existing FCC rules, foreign company ownership of U.S radio stations is not supposed to exceed 25%.  Soros took foreign investment to make his bid and then filed a request for the commission to make an exception to the usual review process. The decision to fast-track the approval process bypassed a national security review, which could have taken up to a year to complete. </em></p>
<p class="yf-1pe5jgt">Billionaire hedge fund manager George Soros has been the target of controversy recently after a recent move to become a controlling shareholder in the second-largest owner of radio stations in the U.S.</p>
<p class="yf-1pe5jgt">This isn&#8217;t the first media brand Soros has bought a substantial stake in, but it worries some people going into the 2024 election. Last year, Soros bought a substantial stake in Vice Media Group. Vice was once worth nearly $6 billion, but Soros bought a stake in the company for pennies on the dollar following its surprise bankruptcy in 2023. The deal valued Vice at roughly $350 million with Soros owning an undisclosed stake in the company.</p>
<p class="yf-1pe5jgt">Audacy, the No. 2 U.S. radio broadcaster behind iHeartMedia, recently filed for bankruptcy. The company owns 227 major radio stations in 27 states and 45 cities across the U.S. These include some of the biggest channels in New York; Memphis and Chattanooga, Tennessee; Denver; Washington D.C., Miami and Orlando, Florida; Atlanta; Baltimore, Maryland; Wichita, Kansas; Austin, Dallas and Houston, Texas; Richmond, Virginia; and many major cities across California as well as several other prominent markets across the U.S.</p>
<p class="yf-1pe5jgt">The bankruptcy plan, which would convert debt purchases into equity ownership, saw Soros purchase roughly 40% of Audacy&#8217;s debt, according to The New York Post. While that isn&#8217;t a true 51% controlling stake, it&#8217;s likely to be one of the largest, if not the largest, stakes in the company potentially giving the Soros Fund effective control of Audacy, The Post reported in February.</p>
<p class="yf-1pe5jgt">Some have voiced concerns about this purchase going into the 2024 election. Soros is a well-known political advocate for left-leaning politicians and is often one of the largest donors to such politicians in countries around the world. Soros donated over $140 million to political causes in 2021 and $170 million to the 2022 mid-term elections.</p>
<div id="sda-INBODYLDRB2-c7586455-78b6-3fa0-83ec-30d824f5ff641727254298321-INBODYLDRB2-2,INBODYMAST2-2" class="sdaContainer allowOverflow inArticleAds dv-all sda-INBODYLDRB2-c7586455-78b6-3fa0-83ec-30d824f5ff641727254298321-INBODYLDRB2-2,INBODYMAST2-2 yf-re2ijb visible" data-testid="in-article-ads" data-ad-unit="/22888152279/us/yfin/ros/dt/us_yfin_ros_dt_mid_center" data-ad-size="728x90,970x250" data-google-query-id="COiPle3b3YgDFV46RAgdh-06aQ">
<p class="yf-1pe5jgt">This influence on the U.S. political system has caused speculation about his control over politicians and elections for many years. Some fear this acquisition could be used as a campaign tool at the local and regional levels or to influence the upcoming 2024 election. The New York Post&#8217;s article details one conservative voice close to the deal describing the transaction as &#8220;scary.&#8221;</p>
<div class="read-more-wrapper">
<p class="yf-1pe5jgt">While there are several other entities involved in this transaction, it&#8217;s unclear who will have effective control or whether there will be a noticeable impact on any of the radio stations. Soros has conducted hundreds of billions of dollars in business deals and acquisitions over the decades, with many of them to provide a return on investment (ROI) to his investors.</p>
<p class="yf-1pe5jgt">Some brands have shown the ability to be owned by interested parties while still maintaining a semblance of journalistic integrity. Amazon.com Inc. Founder Jeff Bezos bought The Washington Post when it was in decline in 2013. After an infusion of capital and a much-needed bailout, the company has continued to thrive in recent years. Despite being owned by Bezos, The Washington Post has, on occasion, not shied away from criticizing its billionaire owner.</p>
<p class="yf-1pe5jgt">While it&#8217;s unclear what implications this will have on radio stations across the U.S. or the 2024 election, it&#8217;s likely to draw continued speculation and controversy going into the election this November. <a href="https://finance.yahoo.com/news/george-soros-fund-buys-400-165211641.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAALBjXQFF__3h86kRcwMyHmU4RdqmMUEDoZ3LjDUB2RF-sJJTvRxcwEWfGzYkfLFwOoyLBqREmYGLp8xOv0_ynTOBuIjwiiRv6QpCThGJeNaGN_zsjKYJYjEZZFaDBGk087m1AnYzn-aI0WIXxBXj-ASN-AD7Lmo6p-5CmlNkMR2F" target="_blank" rel="noopener">source</a></p>
<hr />
</div>
</div>
<blockquote>
<h2 class="index-module_storyHeadlineText__X9VP" role="heading" aria-level="2" data-uw-rm-heading="level"><span style="color: #ff0000;"><em>George Soros taking &#8216;shortcut&#8217; to buy 200+ US radio stations, FCC commissioner says</em></span></h2>
<p>https://youtu.be/L1JYvO5801A?si=yiS7xV1q7X6Ur2M3</p></blockquote>
<p>Commissioner Brendan Carr of theFederal Communications Commission is sounding the alarm over a pending purchase which would allow billionaire Democratic donor George Soros to purchase hundreds of U.S. radio stations.</p>
<p>During a House Oversight Committee hearing last week, Carr objected to a deal that would allow a Soros-backed group to take ownership of 200 stations across 40 markets. He claimed the FCC was deviating from its normal procedure by allowing the purchase to take place.</p>
<p><strong><em>“I think what’s interesting about it is that the FCC is not following its normal process for reviewing transactions that it has established over a number of years,” Carr warned. “It seems to me the FCC is poised, for the first time, to create an entirely new shortcut.”</em></strong></p>
<p>The transaction, which was <a class="themeColorForLinks" title="https://thenationaldesk.com/news/americas-news-now/liberal-donor-george-soros-expected-to-become-audacys-biggest-shareholder-report" href="https://thenationaldesk.com/news/americas-news-now/liberal-donor-george-soros-expected-to-become-audacys-biggest-shareholder-report" target="_blank" rel="noopener" data-uw-rm-brl="PR" data-uw-original-href="https://thenationaldesk.com/news/americas-news-now/liberal-donor-george-soros-expected-to-become-audacys-biggest-shareholder-report" aria-label="reported - open in a new tab" data-uw-rm-ext-link="">reported </a>by The National Desk in February, would break a rule preventing more than 25% foreign ownership of U.S. radio stations, Carr alleges. Despite this, Carr claimed the agency was expediting its review process.</p>
<p>“What we usually do is require people to file a petition with us, bring in the National Security Agency to review the foreign ownership—it’s probably no big deal here—but we review that foreign ownership and then we vote,” Carr said. “Here, they’re trying to do something that’s never been done before at a commission level.”</p>
<p>Rep. Nick Langworthy, R-N.Y., said during the hearing he was “extremely alarmed” by the purchase.</p>
<p>“Looking at the facts, it seems the administration is giving a left-wing billionaire, who is a major donor, a close ally, one of the chief funders of all of their efforts and their dark money, a free pass to take control of hundreds of local radio stations, flooding the airwaves with leftist propaganda and I think it’s blatant,” he said.</p>
<p>The FCC did not respond to a request for comment from The National Desk Tuesday. <a href="https://www.foxbaltimore.com/station/share/george-soros-taking-shortcut-to-buy-200-us-radio-stations-fcc-commissioner-says-commissioner-brendan-carr-of-the-federal-communications-commission-democratic-dem-influence-billionaire-foreign-money-transaction-nick-langworthy-house-committee-media" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="headline speakable">George Soros closer to controlling 200 radio stations despite objection from Trump-nominated FCC commissioner</h1>
<h2 class="sub-headline speakable">Trump-nominated Commissioner Nathan Simington blasted the process</h2>
<p class="speakable">The Federal Communications Commission (FCC) seemingly approved a deal that would &#8220;fast-track&#8221; <a href="https://www.foxbusiness.com/media/liberal-billionaire-george-soros-spent-80-million-silence-americans-media-research-center-says" target="_blank" rel="noopener">left-wing billionaire George Soros’</a> acquisition of more than 200 Audacy radio stations across America, irking a Republican commissioner who &#8220;objected.&#8221;</p>
<p class="speakable">The <a href="https://nypost.com/2024/09/23/business/fcc-delay-to-internet-in-rural-areas-worst-abuse-commissioner/" target="_blank" rel="noopener">New York Post first reported</a> that the FCC last week &#8220;adopted an order to approve Soros’ purchase of more than 200 radio stations in 40 markets just weeks before the presidential election,&#8221; potentially allowing the far-left kingmaker to reach more than 165 million Americans at a critical time.</p>
<p>&#8220;The FCC decision came after a partisan vote with the commission’s three Democrats voting for the move while the two Republicans voted against it, sources added,&#8221; Post reporter Lydia Moynihan wrote.</p>
<p>&#8220;Under existing FCC rules, foreign company ownership of US radio stations is not supposed to exceed 25%. Soros took foreign investment to make his bid and then made a filing asking the commission to make an exception to the usual review process, according to public documents,&#8221; Moynihan added. &#8220;The FCC decision to fast-track his deal is the first time in modern history such a deal has been approved by the full Commission without first running the national security review process—a process that could take up to a year or more.&#8221;</p>
<p>The Soros group told the Post they would circle back to the FCC in the near future to run that process. If the deal goes through, Soros would be considered a &#8220;major shareholder,&#8221; but not necessarily the &#8220;owner&#8221; of the stations.</p>
<p>An FCC spokesperson told  us that &#8220;no decision is final until the Commission releases it, which we have not.&#8221;</p>
<p>&#8220;The Commission has a long-standing process for reviewing transactions that involve emergence from bankruptcy,&#8221; the spokesperson added, noting that the application before the Commission pertains to a transfer from Audacy in bankruptcy, to Audacy post-bankruptcy.</p>
<p>Some inside the FCC object to the notion the move was some sort of shortcut or &#8220;fast-tracked&#8221; for Soros, pointing to a similar process used to under the previous administration in the bankruptcy proceedings of Cumulus Media in 2018, iHeart Media in 2019, Liberman Television in 2019, Fusion Connect in 2019, Windstream Holdings in 2020, America-CV Station Group in 2021, and Alpha Media in 2021.</p>
<p>However, Trump-nominated Commissioner Nathan Simington blasted the process and said it was, indeed, fast-tracked.</p>
<p>&#8220;The FCC has a practice of permitting entities temporarily to exceed foreign ownership caps when emerging from bankruptcy—and the majority, over my objection, did so here. But that wasn’t the only way in which this item was ‘fast-tracked,’&#8221; Simington told Fox News Digital.</p>
<p>&#8220;Commission leadership tried to approve the item at the staff level, with nothing but a 48-hour notice to Commissioners on a summer Friday. There is almost no factual record on the item because there was almost no attempt to do a real public interest analysis,&#8221; Simington continued. &#8220;Not a single Commissioner outside of the Chairwoman was invited to even think about the issue until staff was directed to handle it on our behalf without our votes. That’s the true ‘fast-track.’&#8221;</p>
<p>Commissioner Brendan Carr, the senior Republican on the Federal Communications Commission, previously expressed concern about a Soros-backed group taking control of Audacy.</p>
<p>&#8220;This Soros-backed group is looking to buy the second-largest radio station group in the country… some of them are in Pennsylvania, Virginia, and Florida. The vast majority are probably music or sports, but there are a handful in those states that carry conservative talk radio,&#8221; Carr said on Fox News Channel’s &#8220;The Ingraham Angle.&#8221;</p>
<p>&#8220;There is a concern,&#8221; Carr added. &#8220;The FCC should not be creating this special Soros shortcut.&#8221;</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div id="desktop_desk-art-media-lb4" class="ad gam" data-iu="lb4" data-ad-size="728x90,300x250,320x50,300x50,1x1,fluid" data-ad-lz="1" data-hot-unit="" data-ad-init="1" data-google-query-id="CK7UzuDd3YgDFVSlOgUd6psF9g" data-ad-slot-rendered="1" data-rendered-size="1x1">Soros handed control of his political empire last year to his son, Alex, and his various organizations have continued to exert significant financial influence, including millions of dollars aimed at flipping Texas to Democrats. <a href="https://www.foxnews.com/media/george-soros-closer-controlling-200-radio-despite-objection-trump-nominated-fcc-commissioner" target="_blank" rel="noopener">source</a></div>
</div>
<hr />
<h1 class="css-vv67jv esq9qwi0">The FCC is HELPING George Soros buy up radio stations?!</h1>
<p>&nbsp;</p>
<p><iframe title="&#x1f6a8;CHEATER! The Left Wants Trump GONE so BAD They Did THIS! (MUST SEE &amp; SHARE!)" width="640" height="360" src="https://www.youtube.com/embed/eDO9MW9yuEQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>A group backed by George Soros is buying up more than 200 Audacy radio stations in the U.S. and FCC Commissioner Brendan Carr confirms to Glenn that the FCC is helping fast-track the acquisition! Carr joins Glenn to expose this never-before-seen move by the FCC, which he objected to. He also weighs in on just how suspicious this acquisition is, especially since most investors are taking money OUT of the radio industry. So, does this purchase have anything to do with influencing the 2024 election?</p>
<p>Transcript</p>
<p><em>Below is a rush transcript that may contain errors</em></p>
<p>GLENN: I want to tell you what happened with the FCC yesterday. So last week, this just came out. Last week, the FCC adopted an order to approve the purchase of more than 200 radio stations, in 40 markets.</p>
<p>Just a couple of weeks, before the presidential election. Now, I don&#8217;t think this is going to affect the presidential election.</p>
<p>But he&#8217;s &#8212; the one who is behind this is George Soros.</p>
<p>George Soros just bought 200 radio stations, in 40 different markets. Now, the vote came down in the FCC, it was partisan. Three Democrats voting for it.</p>
<p>Two Republicans voting against it.</p>
<p>But here&#8217;s &#8212; here&#8217;s the real problem.</p>
<p>According to existing FCC rules. Foreign company ownership of US radio stations is not supposed to exceed 25 percent. But Soros took foreign investment money to make his bid.</p>
<p>And then he asked the FCC to make an exception, to the usual review process.</p>
<p>So they &#8212; the FCC fast tracked this.</p>
<p>Why? Why would they that do?</p>
<p>There&#8217;s something else, that is really important. You know the &#8212; the &#8212; the left has been saying, we&#8217;ve got to get off of dial-up. We&#8217;ve got to get off of dial-up.</p>
<p>We need high-speed Internet for the rural areas. Well, for some reason, the FCC has delayed the rollout of the internet, to rural communities.</p>
<p>Again, why are they doing that?</p>
<p>Maybe the guy who has the answer is the FCC commissioner.</p>
<p>He&#8217;s Brendan Carr.</p>
<p>Brendan, how are you, sir?</p>
<p>BRENDAN: I&#8217;m doing great. Wonderful to join you again.</p>
<p>GLENN: I wish we could talk on good things.</p>
<p>You know, call me sometimes when something &#8212; when something great would happen.</p>
<p>Brendan, tell me, do I have this right, first of all, about the George Soros takeover of radio stations? And if so, why was there an exception made and fast tracked?</p>
<p>BRENDAN: Well, you note &#8212; you had the story out last week. Or actually yesterday.</p>
<p>That says, that the FCC, last week, adopted an order. That effectively fast tracked Soros&#8217; purchase of a 200 radio station.</p>
<p>But I haven&#8217;t commented on that publicly. Because the fact is the FCC hasn&#8217;t released a final decision to the public. The reporting is that we adopted it, last week in a three-two vote.</p>
<p>I didn&#8217;t &#8212; outspoken on this particular issue. The reasons you talked about. We have a very clear process that we set up. It could take six months to a year that we&#8217;re going through.</p>
<p>But for reasons that are not sort of plain to me. The FCC commission, for the very first time ever, has skipped that process. For the benefit of this Soros-backed group. It sort of lets people draw their own conclusions about it.</p>
<p>But, again, it&#8217;s an unprecedented decision for the commission.</p>
<p>GLENN: Never happened before.</p>
<p>BRENDAN: That&#8217;s right. We at the commission level, adopted one way. That you can buy radio stations, if you have accepted foreign ownership, which they do.</p>
<p>And that one process is the lengthy six to one year national security review.</p>
<p>And it&#8217;s been &#8212; now, a lot of these stations are probably just classic rock or news.</p>
<p>But not all of them.</p>
<p>GLENN: And they don&#8217;t have to be.</p>
<p>BRENDAN: Yeah.</p>
<p>Conversations &#8212; there&#8217;s at least three stations that you&#8217;re on, that are part of this deal thing with Sean Hannity, same with Dana Lash. Same with Mark Levin. And so there are at least subtleties that are conservative news and talk outlets.</p>
<p>GLENN: I&#8217;ve got to tell you, if this was a conservative doing this, I doubt the FCC would have okayed it. Any ramifications? Go ahead.</p>
<p>BRENDAN: Yeah. Well &#8212; yeah, Glenn, we actually have that example.</p>
<p>So not too long ago. A year ago. There was a group of conservative buyers.</p>
<p>That wanted to purchase some south Florida radio station. And a number of Democrats spoke up very loudly and said the FCC cannot allow these conservative outlets to buy these radio stations.</p>
<p>Because in the Democrat&#8217;s view, it can cost them an election in south Florida. And I missed that pressure campaign. The conservative buyers abandoned the deal. So we&#8217;ve seen across-the-board conservative efforts by Democrats. To sort of weaponize the government, to go against conservative speech. There was California Democrats in Congress, that wrote letters to cable companies, telling them to drop Fox News, Newsmax, and OAN because of the editorial decisions, that their news room information &#8212; we had a Baltimore resident call on the FCC, to investigate a local TV station that was exposing her own corruption.</p>
<p>And so this is sort of the reverse side of a pattern, that we&#8217;ve been living under the last couple of years, of weaponization of government power.</p>
<p>In my view, frankly against free speech.</p>
<p>GLENN: Now, we are told, everywhere, that radio is a dying medium. Why would George Soros want to invest this kind of money?</p>
<p>What did he say in his request?</p>
<p>BRENDAN: It&#8217;s a good question. Look, I don&#8217;t know a lot of billionaires right now. That with all the options with where they&#8217;re going to place their money. To sit around and say, you know what kicks off like cash right now.</p>
<p>Is the local radio station.</p>
<p>Maybe. Maybe. But if any reason, we&#8217;re seeing the opposite.</p>
<p>We&#8217;re seeing a flight of capital from local broadcasting, because it&#8217;s so challenged right now with competitions from social media companies and over the top providers. So maybe there&#8217;s a business there, that they&#8217;re smart enough to see. That everyone else doesn&#8217;t see.</p>
<p>That&#8217;s really not the direction can of the Capitol, we&#8217;re seeing right now.</p>
<p>GLENN: And the foreign investment.</p>
<p>Do we know who these people are?</p>
<p>BRENDAN: No, we don&#8217;t. So the Audacy stations win the bankruptcies. And the Soros group put together a bunch of investors to buy it out, and they have come forward and said, you know, there&#8217;s in essence, 25 percent, which is the threshold, of foreign entities.</p>
<p>That are investing.</p>
<p>It&#8217;s more likely than not, there&#8217;s no big deal there at all.</p>
<p>But the fact is, we usually run a national security group to identify whose those are, and whether they&#8217;re fine or not.</p>
<p>And what Soros has said, that is in the near term, to wall off those foreign stakeholders, and then come back to the FCC down the road. To run that longer, sort of six-month to one-year process.</p>
<p>So I do think we need to stay vigilant here.</p>
<p>This is an issue. At least that portion of it, that we&#8217;ll come back here before the FCC in the coming months.</p>
<p>GLENN: Any idea how long it will take, before he has control?</p>
<p>BRENDAN: I think it will be almost instantaneous.</p>
<p>You know, after the FCC releases a final decision, that approves it.</p>
<p>You know, they&#8217;ve already been hardly getting them out of bankruptcy.</p>
<p>But I think it will be a near instantaneous ability to take the reins of all these 200 stations. The FCC&#8217;s decision if this reporting is right.</p>
<p>GLENN: Such a game we&#8217;re playing here.</p>
<p>When &#8212; when do you suppose, if this reporting is right, they will report on the vote that you were involved in?</p>
<p>BRENDAN: I think the reporting that I see, Jeff said, it could within the next week or so.</p>
<p>GLENN: Okay. So this could actually take place before the election.</p>
<p>BRENDAN: Oh, yeah. I would expect that for sure. Well ahead of it.</p>
<p>GLENN: Talk to me about the other really weird, that happened. With the high-speed Internet. In rural areas.</p>
<p>BRENDAN: Well, this is interesting. There seems to be a pattern emerging within the Biden Harris administration, of this fight, investing billions and billions of everybody. Taxpayer dollars. Leaving rural America behind, when it comes to connectivity. Back in 2019, or 2020, we cut a deal, with EchoStar with Dish. To guarantee, that they would provide 5G high-speed internet to rural America. It was part of a DOJ settlement. It was actually litigated in court.</p>
<p>It was adopted by the full commission. Then in a Friday afternoon news dump last week, the FCC&#8217;s leadership, any public input being sought, relieved Dish/EchoStar of the obligation. It was just a one-sentence entry. You know, licensing database.</p>
<p>And frankly, I have been at the FCC for 12 years. I have never seen anything like that.</p>
<p>It&#8217;s sort of the worse abuse of process that I&#8217;ve seen in the agents. You know, we have rural Americans guaranteed to get this service. It was a June 2025, build-out obligation.</p>
<p>And Dish/EchoStar came in and asked for relief and on Wednesday &#8212; sorry, Tuesday night, last week. And by Friday, this massive, you know, relief was provided without any input from me or I&#8217;m assuming at least the Republican commissioner that I&#8217;m with.</p>
<p>GLENN: I&#8217;m trying to piece this together. Why &#8212; why would that happen?</p>
<p>BRENDAN: Well, I think there are still a lot of questions to be answered. You know, there was some sort of deal that was cut here.</p>
<p>The features of which, have not been publicly disclosed.</p>
<p>You know, and I just think, there&#8217;s one way we still have to ask a lot of questions.</p>
<p>This was a rumor, a lot earlier over the weekend. That a company. Dish Echo could potentially go bankrupt before the election, if they didn&#8217;t get this relief. That&#8217;s just a rumor. I don&#8217;t know if it&#8217;s true. But, certainly, I think there&#8217;s a lot more to this.</p>
<p>Because, again, the only thing the FCC did was enter a one-sentence line, licensing, database, granting its extension.</p>
<p>So I think the agency has a lot more explaining to do, to justify this decision.</p>
<p>GLENN: I &#8212; thank you very much for your courage, for speaking out and being the guy you are.</p>
<p>I mean, I&#8217;ve been in this business for, you know, almost 50 years.</p>
<p>And I&#8217;ve never even thought of an FCC commissioner.</p>
<p>Because they weren&#8217;t &#8212; you know, they just didn&#8217;t &#8212; I don&#8217;t know.</p>
<p>They didn&#8217;t have that much affect, on, you know, every day life.</p>
<p>And the things that are come out of the FCC now. Are truly, I think frightening.</p>
<p>Especially if you&#8217;re on my end of the microphone.</p>
<p>It is &#8212; it&#8217;s stuff I&#8217;ve never seen before.</p>
<p>As you say, you&#8217;ve been a commissioner for 12 years. You&#8217;ve never seen it before.</p>
<p>And it doesn&#8217;t make a lot of sense.</p>
<p>Unless you start to think like a &#8212; you know, like a thriller writer, then it becomes more terrifying.</p>
<p>Brendan, thank you.</p>
<p>BRENDAN: Enjoy it. And one day I&#8217;ll come back on, and we&#8217;ll have some good news and stuff. I&#8217;m sure, it will happen at some point. <a href="https://www.iheart.com/content/glenn-beck-blog-the-fcc-is-helping-george-soros-buy-up-radio-stations/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Galatians 6:7-8 &#8211; Don’t be misled! You cannot mock the justice of God.</title>
		<link>https://goodshepherdmedia.net/galatians-67-8-dont-be-misled-you-cannot-mock-the-justice-of-god/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 02 Aug 2024 17:12:46 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[✝️Religion✝️]]></category>
		<category><![CDATA[Bible Verses]]></category>
		<category><![CDATA[Christian Problems]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Guidelines and help]]></category>
		<category><![CDATA[Guilty Parties & Co-Conspirators]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18476</guid>

					<description><![CDATA[Galatians 6:7-8 &#8211; Don’t be misled! You cannot mock the justice of God. Don’t be misled: No one makes a fool of God. What a person plants, he will harvest. The person who plants selfishness, ignoring the needs of others—ignoring God!—harvests a crop of weeds. All he’ll have to show for his life is weeds! [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Galatians 6:7-8 &#8211; Don’t be misled! You cannot mock the justice of God.</h1>
<blockquote>
<h2 class="dark:text-text-dark font-regular text-15 font-aktiv-grotesk leading-loose text-gray-50"><span style="color: #3366ff;"><strong><em>Don’t be misled: No one makes a fool of God. What a person plants, he will harvest. The person who plants selfishness, ignoring the needs of others—ignoring God!—harvests a crop of weeds. All he’ll have to show for his life is weeds! But the one who plants in response to God, letting God’s Spirit do the growth work in him, harvests a crop of real life, eternal life.</em></strong></span></h2>
</blockquote>
<p>Paul has been encouraging Christians to live a life marked by the fruit of the Spirit (<a class="BRST_a" href="https://www.bibleref.com/Galatians/5/Galatians-5-19.html" target="_blank" rel="ESV.Galatians.5.19-25 noopener">Galatians 5:19–25</a>), and to support each other in the struggles of life (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-1.html" target="_blank" rel="ESV.Galatians.6.1-5 noopener">Galatians 6:1–5</a>). Christianity is all about the grace of God. He gives us good things which we could never have earned on our own. In our sin, we deserve death and suffering. Instead, in Christ, God gives us life and purpose.</p>
<p>Still, as Paul states clearly in this verse, the grace of God does not eliminate the principles of choice and consequence. In this life, our decisions will bring with them natural results. We must not lie to ourselves, that because of God&#8217;s grace and forgiveness of our sins, we will not suffer any harm if we continue to choose sin. To believe such a thing is to mock God, to make light of Jesus&#8217; sacrifice for our sin on the cross.</p>
<p>What we do in this life does matter, beyond even the question of whether or not we will see heaven. In eternity, our choices will be reflected in our heavenly rewards, for those who are saved (<a class="BRST_a" href="https://www.bibleref.com/1-Corinthians/3/1-Corinthians-3-12.html" target="_blank" rel="Corinthians.3.12-15 ESV.1 noopener">1 Corinthians 3:12–15</a>; <a class="BRST_a" href="https://www.bibleref.com/2-Corinthians/5/2-Corinthians-5-10.html" target="_blank" rel="Corinthians.5.10 ESV.2 noopener">2 Corinthians 5:10</a>), or our eternal punishment, for those who are not (<a class="BRST_a" href="https://www.bibleref.com/Revelation/20/Revelation-20-11.html" target="_blank" rel="ESV.Revelation.20.11-14 noopener">Revelation 20:11–14</a>).</p>
<p>Until then, the &#8220;crop&#8221; we produce between now and the moment of our death is also determined by the &#8220;seeds&#8221; we plant along the way. God&#8217;s natural laws of cause and effect still apply, to believers and unbelievers alike. Paul will expand on this idea in the following verses. <a href="https://www.bibleref.com/Galatians/6/Galatians-6-7.html" target="_blank" rel="noopener">source</a></p>
<div style="width: 576px;" class="wp-video"><video class="wp-video-shortcode" id="video-18476-1" width="576" height="1024" autoplay preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2024/08/galatians-6-7.mp4?_=1" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2024/08/galatians-6-7.mp4">https://goodshepherdmedia.net/wp-content/uploads/2024/08/galatians-6-7.mp4</a></video></div>
<h1>What does it mean that a man reaps what he sows (Galatians 6:7)?</h1>
<p><img loading="lazy" decoding="async" class="wp-image-18479 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2024/08/fpostersmallwall_textureproduct750x1000.jpg" alt="" width="386" height="515" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/08/fpostersmallwall_textureproduct750x1000.jpg 750w, https://goodshepherdmedia.net/wp-content/uploads/2024/08/fpostersmallwall_textureproduct750x1000-300x400.jpg 300w" sizes="(max-width: 386px) 100vw, 386px" />In the first few verses of <a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-chapter-6.html" target="_blank" rel="ESV.Galatians.6 noopener">Galatians 6</a>, Paul emphasizes that individuals are responsible for their actions and should be gentle when others fail (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-1.html" target="_blank" rel="ESV.Galatians.6.1 noopener">Galatians 6:1</a>). Besides gentleness being an expression of love and a fulfillment of the law of Christ (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-2.html" target="_blank" rel="ESV.Galatians.6.2 noopener">Galatians 6:2</a>), a gentle response to others is one way we can keep ourselves out of trouble, because it can help us to avoid being <a href="https://www.gotquestions.org/critical-spirit.html">hyper-critical</a>. Even as the passage encourages readers to be considerate of others, the truth remains that whatever a man sows that he also reaps (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-7.html" target="_blank" rel="ESV.Galatians.6.7 noopener">Galatians 6:7</a>). So, while we should bear each other’s burdens (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-2.html" target="_blank" rel="ESV.Galatians.6.2 noopener">Galatians 6:2</a>), we are still accountable to carry our own load (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-5.html" target="_blank" rel="ESV.Galatians.6.5 noopener">Galatians 6:5</a>).</p>
<p>In <a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-7.html" target="_blank" rel="ESV.Galatians.6.7 noopener">Galatians 6:7</a> Paul reminds readers that “whatever a man sows, that he will also reap” (NKJV). God is a just God and has instituted throughout human experience the concept of sowing and reaping. When a farmer plants seeds and cares for those seeds, they will usually sprout and produce growth. In the same way, whatever a person “plants” in his own thinking and behavior will later bear fruit—either good or bad. If a person is focused on fulfilling the desires of the flesh, and that is what he invests in, then that person will reap fruit of that investment. Paul describes this fruit in <a class="BRST_a" href="https://www.bibleref.com/Galatians/5/Galatians-5-19.html" target="_blank" rel="ESV.Galatians.5.19-21 noopener">Galatians 5:19–21</a>, and the list is not pretty. On the other hand, if one invests in spiritual things, then the “fruit” in his life will be spiritual and wholesome (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-8.html" target="_blank" rel="ESV.Galatians.6.8 noopener">Galatians 6:8</a>). Paul explains how the Holy Spirit produces <a href="https://www.gotquestions.org/fruit-of-the-Holy-Spirit.html">fruit</a> in people and what it looks like (<a class="BRST_a" href="https://www.bibleref.com/Galatians/5/Galatians-5-22.html" target="_blank" rel="ESV.Galatians.5.22-23 noopener">Galatians 5:22–23</a>).</p>
<p>Paul introduces the truth that a what a man sows that he also reaps with a somber warning: “Do not be deceived: God cannot be mocked” (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-7.html" target="_blank" rel="ESV.Galatians.6.7 noopener">Galatians 6:7</a>). Wise readers will take heed to their own lives and take steps to ensure they live according to this principle. Let no one entertain the idea that he or she is the exception to the rule. Reaping follows sowing, and it matters what you sow. God searches the heart and knows every circumstance, and His decree that the harvest will match the planting will not be set aside.</p>
<p>Elsewhere, Paul further explains the concept that whatever a man sows that he also reaps. In <a class="BRST_a" href="https://www.bibleref.com/1-Corinthians/3/1-Corinthians-3-8.html" target="_blank" rel="Corinthians.3.8 ESV.1 noopener">1 Corinthians 3:8</a> he asserts that each person will be rewarded according to his or her own work. Neither the one who plants nor the one who waters are the most significant factors in the equation, because God causes the growth (<a class="BRST_a" href="https://www.bibleref.com/1-Corinthians/3/1-Corinthians-3-7.html" target="_blank" rel="Corinthians.3.7-8 ESV.1 noopener">1 Corinthians 3:7–8</a>). So, even when we are planting and watering well—focusing on the things related to our new life in Christ—it is still God who causes the growth. And even though God rewards the one who works, we understand that even our opportunity to work is a gift from God. In other words, the principle that whatever a man sows that he also reaps teaches both God’s justice and His mercy.</p>
<p>We can apply the principle of reaping what we sow to the matter of salvation. If we do not know Jesus Christ as our Savior, then we are still dead in our sin, or separated from having a right relationship with God (see <a class="BRST_a" href="https://www.bibleref.com/Ephesians/2/Ephesians-2-1.html" target="_blank" rel="ESV.Ephesians.2.1-5 noopener">Ephesians 2:1–5</a>). If we are in that state, then even our righteous deeds are as <a href="https://www.gotquestions.org/filthy-rags.html">unclean rags</a> in comparison with God’s standard of righteousness (<a class="BRST_a" href="https://www.bibleref.com/Isaiah/64/Isaiah-64-6.html" target="_blank" rel="ESV.Isaiah.64.6 noopener">Isaiah 64:6</a>). If we are in that condition, then the truth that whatever a man sows that he also reaps (<a class="BRST_a" href="https://www.bibleref.com/Galatians/6/Galatians-6-7.html" target="_blank" rel="ESV.Galatians.6.7 noopener">Galatians 6:7</a>) is actually terrifying because we are sowing according to sin and death, and the fruit will reflect that. On the other hand, if in His mercy God has made us alive together with Christ by grace through faith (<a class="BRST_a" href="https://www.bibleref.com/Ephesians/2/Ephesians-2-8.html" target="_blank" rel="ESV.Ephesians.2.8-10 noopener">Ephesians 2:8–10</a>), then we have the opportunity to sow according to newness of life. Because of His grace we can now invest in things that have eternal value and see fruit that also has eternal value. The fact that whatever a man sows that he also reaps is not only about justice, but about God’s magnificent mercy. God hasn’t given us what we deserved; in His amazing grace God has given us what we did not deserve—the opportunity to sow the seed of righteousness so that we can see the fruit of His righteousness in our lives. <a href="https://www.gotquestions.org/a-man-reaps-what-he-sows.html" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-18478 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2024/08/Galatians-6.7-10.-impatient-farmer.jpg" alt="" width="528" height="676" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/08/Galatians-6.7-10.-impatient-farmer.jpg 1396w, https://goodshepherdmedia.net/wp-content/uploads/2024/08/Galatians-6.7-10.-impatient-farmer-312x400.jpg 312w, https://goodshepherdmedia.net/wp-content/uploads/2024/08/Galatians-6.7-10.-impatient-farmer-800x1024.jpg 800w, https://goodshepherdmedia.net/wp-content/uploads/2024/08/Galatians-6.7-10.-impatient-farmer-768x983.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/08/Galatians-6.7-10.-impatient-farmer-1200x1536.jpg 1200w" sizes="(max-width: 528px) 100vw, 528px" /></p>
<p><em>Theme: We should keep fervent in doing good, because God promises a harvest in due time.</em></p>
<p>&nbsp;</p>
<p><em>(Unless otherwise noted, all Scripture references are taken from The Holy Bible, New King James Version; copyright 1982, Thomas Nelson, Inc.)</em></p>
<p><a href="http://bethanybible.org/new/sermon/sermons_2011/2011-04-10/harvest-time-galatians/attachment/galatians-6-7-10-impatient-farmer" rel="attachment wp-att-1393"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-1393" title="Galatians 6.7-10. impatient farmer" src="http://bethanybible.org/new/wp-content/uploads/2011/04/Galatians-6.7-10.-impatient-farmer-234x300.jpg" alt="" width="234" height="300" /></a>One of the most fiery letters in all of the New Testament is the little book of Galatians. In it, the apostle Paul throws all his authority, logical force, and emotional power into defending the vital doctrine of ‘justification by faith’—that is, that fallen people are not made righteous in the sight of God on the basis of their good works, but on the basis of God’s grace through faith in the sacrifice of Jesus Christ alone. Because of the importance of what it was Paul was defending, it’s a letter that contains some of his strongest words of rebuke toward those who were relying on their own good works to make them right before God.</p>
<p>But the letter isn’t all harsh. After stressing that good works are not to be seen as <em>the basis of </em>our salvation in Christ, Paul also goes on to stress that good works are to be seen as <em>the natural outflow</em> of our salvation in Christ. And so, it’s also a letter that’s filled with great encouragement to us as followers of Jesus.</p>
<p>One of those very important ‘encouraging’ portions of Paul’s letter of the Galatians—a portion that seems to start off harshly, but that definitely ends on a high note—is found in 6:7-10. The apostle Paul wrote to his brothers and sisters in Christ and told them;</p>
<blockquote><p><em>Do not be deceived, God is not mocked; for whatever a man sows, that he will also reap. For he who sows to his flesh will of the flesh reap corruption, but he who sows to the Spirit will of the Spirit reap everlasting life. And let us not grow weary while doing good, for in due season we shall reap if we do not lose heart. Therefore, as we have opportunity, let us do good to all, especially to those who are of the household of faith (Galatians 6:7-10)</em></p></blockquote>
<p>I’ve been thinking much about this passage lately. I’ve grown increasingly impressed with the wonderful people God has brought into our church family. I never cease to be delighted with the talent and skills that are represented in this place. And I’ve been thrilled to discover ways that the individual members of our church are serving one another behind the scenes.</p>
<p>The Bible tells us, in another of Paul’s letters, that we are a “body” for whom Jesus Christ Himself serves as the “head”. It tells us that Jesus himself—through the ministry of the Holy Spirit—has formed us together as individual members of a body that, “joined and knit together by what every joint supplies, according to the effective working by which every part does its share, causes growth of the body for the edifying of itself in love” (Ephesians 4:16). The <em>body</em> causes the growth of the <em>body</em>—when every part of the body does its share. And I want you to know that I see increasing numbers of us rising up within this church family, and serving together in the ways that He has gifted us. It’s truly exciting; and I pray that more and more of us will do so at the Holy Spirit’s call.</p>
<p>And it’s in the spirit of protecting that wonderful increase of happy service to the Lord Jesus that I’m calling your attention to this morning’s passage.</p>
<p>* * * * * * * * * *</p>
<p>There is a danger—if we’re not careful to protect ourselves from it—of becoming discouraged and disheartened in our work in the body <em>today</em> by losing our focus on the results that come <em>in the future</em>. Perhaps you’ve felt a little of that discouragement at some point or another.</p>
<p>Perhaps you yourself have said things like, “Nobody seems to notice what it is that I do around here. Nobody seems to care if it gets done or not. I have to do all the work by myself. And why do I keep doing it? It doesn’t seem to make any difference anyway. It doesn’t seem to change anything. Maybe I’ve made a mistake in thinking this was God’s will for me. Maybe He doesn’t even notice. Maybe He doesn’t even care. Maybe I should just quit. Maybe I should just leave.” And I want you to know, dear brother or sister, that if you have ever felt that way—or if you’re feeling that way right now—it’s not a small matter. It’s something that I believe should be taken very seriously; because it has the potential of robbing us of your vital part in the body.</p>
<p>I believe that, in this morning’s passage, the apostle Paul—writing under the influence of the Holy Spirit—has given us something very important to remember; something that will help us through those times of discouragement; and will keep us serving joyfully and faithfully for the advancement of Jesus’ kingdom.</p>
<p>Let’s look, first, at . . .</p>
<p><strong>1. THE PRINCIPLE.</strong></p>
<p>It’s a very basic principle—one that we see in operation in lots of different areas of everyday life. It’s something that every farmer and every gardener knows. Paul describes it in verse 7 in these words: that “whatever a man sows, that he will also reap.”</p>
<p>When we think a little more deeply about that principle, we discover three important ‘laws’ of sowing and reaping that have to do with our ministry in the body of Christ. First, because it tells us of a man who “sows”, we can see a law that has to do with the initiative of taking action: <em>Someone cannot justifiably expect to reap anything when they have not sown anything.</em> No farmer stands around and expects a crop to grow on its own. He must first take initiative and sow. No gardener stands around and expects beautiful flowers to grow in her garden by themselves. She must first take action and plant seeds or bulbs. And, of course, in the body of Christ, we cannot expect good things to happen unless—as Paul said elsewhere—we put forth “the effective working by which every part does its share”.</p>
<p>A second ‘law’ that we derive from this principle has to do with the nature of what is sown: <em>Someone cannot expect to reap anything other than what has been sown.</em> “Whatever” a man sows “that” he will also reap. Someone should not expect to reap anything other than what has been sown. A farmer doesn’t plant grass-seed and expect to grow corn. A gardener doesn’t plant tomatoes and expect to grow tulips. An bird lover doesn’t even plant bird-seed and expect to grow birds; because it’s not really in the nature of bird-seed to produce birds. (I found that out as a very little boy.) And when it comes to the body of Christ, we not only shouldn’t expect something to happen unless we put forth the effort, but we also shouldn’t expect to “reap” what is good in the church unless we “sow” what is good.</p>
<p>And a third ‘law’ of this principle has to do with expectations for the future; because it tells us that whatever a man sows, that “he will also reap”: <em>If someone sows, they will reap.</em> There’s a cause-and-effect relationship between sowing and reaping. Reaping follows after sowing as surely as day follows night. If a farmer sows seed, he <em>will</em> reap at the time of harvest. If a gardener plants bulbs, she <em>will </em>have beautiful flowers in her garden in springtime. And if we faithfully sow what is good in the church and in our personal lives, we <em>will</em> eventually reap what is good for the body of Christ and for ourselves.</p>
<p>This extremely important principle—that “whatever a man sows, that he will also reap”—is something that the apostle Paul reaffirms once again in verse eight. He embraces it as an important principle of the spiritual life. And if you pay close attention, you’ll find those three ‘laws’ once again represented in what he says.</p>
<p>He writes,</p>
<blockquote><p><em>For he who sows to his flesh will of the flesh reap corruption, but he who sows to the Spirit will of the Spirit reap everlasting life (v. 8).</em></p></blockquote>
<p>There’s the ‘law’ that has to do with the initiative taken in sowing: “For he who sows . . . , but he who sows . . .” A deliberate decision to sow something occurs. And there’s the ‘law’ that has to do with the nature of what is sown: “For he who sows to his flesh . . . , but he who sows to the Spirit . . .” The nature of what is reaped is connected to the nature of what is sown. And finally, there is the ‘law’ that has to do with expectation: “For he who sows to his flesh will of the flesh reap corruption, but he who sows to the Spirit will of the Spirit reap everlasting life.”</p>
<p>* * * * * * * * * *</p>
<p>Now; let’s take things a bit further. There are two opposing dynamics being described to us in this passage. One is called “the flesh”—or, “the sinful nature”, as it’s translated in the New International Version; and the other is called “the Spirit”. These two dynamics were described in this letter by Paul back in Galatians 5:16-26; and we need to take a moment to consider what he tells us there.</p>
<p>In a way, it’s easy to tell what the “flesh” is by what Paul describes as its opposite. In Galatians 5:16-18, he writes;</p>
<blockquote><p><em>I say then: Walk in the Spirit, and you shall not fulfill the lust of the flesh. For the flesh lusts against the Spirit, and the Spirit against the flesh; and these are contrary to one another, so that you do not do the things that you wish. But if you are led by the Spirit, you are not under the law (Galatians 5:16-18).</em></p></blockquote>
<p>The “flesh”, then, is the opposite of walking under the power and leading of the Holy Spirit. It’s that dynamic in us that seeks to do things from out of a selfish motive—according to our own will and in our own power—apart from submission and reliance on the Holy Spirit.</p>
<p>And it’s a dynamic in us that is sure to fail. As Paul went on to write;</p>
<blockquote><p><em>Now the works of the flesh are evident, which are: adultery, fornication, uncleanness, lewdness, idolatry, sorcery, hatred, contentions, jealousies, outbursts of wrath, selfish ambitions, dissensions, heresies, envy, murders, drunkenness, revelries, and the like; of which I tell you beforehand, just as I also told you in time past, that those who practice such things will not inherit the kingdom of God (vv. 19-21).</em></p></blockquote>
<p>As we’ve already learned from the principle of sowing and reaping, “he who sows to his flesh will of the flesh reap corruption.” The active, intentional decision to sow to the flesh—that is, to gratify our selfish, sinful passions, that dynamic in us that sets itself up against the leading of the Holy Spirit in our lives—will, as a natural and certain consequence, result in our reaping the sorts of “works of the flesh” that Paul described.</p>
<p>Every time, dear brothers and sisters, that we make the choice to gratify the “flesh”—every time we choose to nurse a grudge against another, or to engage in gossip or falsehood; every time we choose to gaze at something on television, or in a magazine, or on the Internet, that God’s word tells us not to see; every time we choose to neglect our duty before God, or to cheat on a business deal, or to lust after what belongs to someone else—we are sowing to the “flesh”. And eventually—as surely as night follows day—we will, of the flesh, reap “corruption”.</p>
<p>But note that Paul goes on to write that, by contrast,</p>
<blockquote><p><em>. . . the fruit of the Spirit is love, joy, peace, longsuffering, kindness, goodness, faithfulness, gentleness, self-control. Against such there is no law. And those who are Christ’s have crucified the flesh with its passions and desires. If we live in the Spirit, let us also walk in the Spirit. Let us not become conceited, provoking one another, envying one another (vv. 22-26).</em></p></blockquote>
<p>If, instead of “sowing to the flesh”, we actively choose to ‘crucify the flesh with its passions and desires’, and ‘walk in the Spirit’, we will—of the Spirit—reap the fruit of the Spirit: “love, joy, peace, longsuffering, kindness, goodness, faithfulness, gentleness, self-control”; all of which are pleasing to God and in keeping with His law.</p>
<p>* * * * * * * * * *</p>
<p>All of this stands behind that important principle in our passage this morning—that “whatever a man sows, that he will also reap.” And I’d like to point out another thing we need to notice from that passage; and that is . . .</p>
<p><strong>2. THE DANGER (v. 7a).</strong></p>
<p>The danger we face is that of being fooled into believing that the spiritual principle of sowing and reaping isn’t really true. As Paul says in verse 7, “Do not be deceived, God is not mocked; for whatever a man sows, that he will also reap.” To say that “God is not mocked” is, essentially, to say that no one turns their nose up at Him. No one will ever be able to say, “Ha! I cheated You, God! I got away with wrong-doing! I ‘sowed’, but did not ‘reap’!” That will never happen! But Paul warns that there is the danger of our being deceived into thinking it will.</p>
<p>How might that deception come? I certainly believe it can come from the devil himself. I believe one of the greatest deceptions that the devil seeks to foist on the world is that the spiritual principle of sowing and reaping really isn’t true. I believe he is actively and aggressively engaged in a campaign to convince people that you can ‘sow to the flesh’—and do what God says not to do—and <em>not </em>reap the consequences. He brings about terrible destruction in people’s lives through that deception. But another way that deception can come is through our own hearts. In the Bible, the Lord Himself tells us,</p>
<blockquote><p><em>“The heart is deceitful above all things, and desperately wicked; who can know it? I, the LORD, search the heart, I test the mind, even to give every man according to his ways, according to the fruit of his doings” (Jeremiah 17:9-10).</em></p></blockquote>
<p>Quite often, the devil doesn’t have to do much at all to deceive us about “sowing and reaping”. He just simply takes advantage of the self-deceiving bent that already exists in our own hearts.</p>
<p>But another way that the devil might deceive us about the principle of sowing and reaping—or that we might deceive ourselves—is through the other side of the coin. He does a great deal of damage in the church, and greatly hinders the faithful service of God’s people, by getting them to believe that it doesn’t do any good to serve the Lord. He gets Christians to believe that “he who sows to the Spirit” will <em>NOT</em> “of the Spirit reap everlasting life.” And that’s why we easily grow weary in the service of the Lord, and begin to lose heart. That’s why we begin to think, “Why keep giving myself to all this labor and heartache? What good does it do?” That’s why we freeze-up, and quit, and—sadly—lose the opportunities to see God do great things in and through us.</p>
<p>* * * * * * * * * *</p>
<p>Now; the Bible makes this “warning” a matter of command! Grammatically, the idea is that we are to “stop being deceived” about the spiritual principle of sowing and reaping. We need to disregard the lies of the devil—and of our own fallen and unbelieving hearts. We need to seize hold this principle as a revealed truth from God, and act upon it as something that He—by His sovereign rule—ensures is absolutely, unfailingly true and certain.</p>
<p>And that lead us, next, to consider . . .</p>
<p><strong>3. THE PROMISE (v. 9).</strong></p>
<p>Paul writes, “And let us not grow weary while doing good, for in due season we shall reap if we do not lose heart.”</p>
<p>We don’t always see the fruit of what we’ve sown right away. We have to be patient—just as “the farmer waits for the precious fruit of the earth” (James 5:7). It comes in the time that God has appointed for it—that is, “in due season”; or as the New International Version has it, “in the proper time. And sometimes, that “due season” may be years later than we expect. Some fruit may not even appear in our lifetime. But the promise is that, eventually—at the proper time—”we shall reap”.</p>
<p>I’ll never something I heard once in a church that my wife and I attended in Seattle. An dear elderly couple was sharing a matter of rejoicing to the church family. “Praise God with us,” they said. “A relative of ours that we’ve been praying for has finally come to know the Lord Jesus Christ and trust Him as their Savior. They had been resisting the Lord for a long time, and we’ve been praying for them for years and years. And now, they’ve finally given their lives to Jesus!” We all rejoiced with them; and asked how long they’d been praying for this family member. And then, we all gasped when they said, “We’d been praying for them for over fifty years!” Think of that! Fifty years! Most of us get discouraged and quit after fifty days! But they didn’t lose heart and quit. They kept on praying; and, in due season, they reaped!</p>
<p>The other day, I read a story about an unbelieving man named Luke Short. He lived in the 1700s; and grow to be a very old man. When he was 103 years old, he was sitting around outdoors—just thinking. And as he sat in thought, he remembered a sermon that he had heard long ago by the famous Puritan preacher John Flavel. As he thought through the sermon he heard long ago, he asked God—right then and there—to forgive him for his sins through Jesus Christ. He became a Christian, and he lived for another three years in happy faith in Jesus until he died at the age of 106. And here’s the remarkable thing: That sermon that he thought back on and remembered—that led him to repentance, and that changed his life—was a sermon that he heard eighty-five years prior! The old pastor John Flavel preached a sermon—faithfully sowing to the Spirit; and he reaped the fruit of it almost a hundred years later!<sup><a href="https://bethanybible.org/dev/harvest-time-galatians/#f1">1</a></sup></p>
<p>Dear brothers and sisters in Christ; let’s not you or me grow weary in doing good. We have a promise from God—that “in due season we <em>shall</em> reap if we do not lose heart.”</p>
<p>* * * * * * * * * *</p>
<p>And that leads us to . . .</p>
<p><strong>4. THE CALL (v. 10).</strong></p>
<p>It’s a natural consequence of all that we’ve studied so far from this passage: “Therefore, as we have opportunity, let us do good to all, especially to those who are of the household of faith” (v. 10)</p>
<p>Do you have an opportunity to serve? Do you see a need in the body of Christ? Is the Holy Spirit leading you to give of your time and energy to minister to those in need around you—and especially to others in the body of Christ? Or, are you already serving? Are you already giving of your talents and skills to minister in Jesus’ name?</p>
<p>And do you, at times, find it hard to keep going? Are you ministering to children and teaching them about Jesus’ love—and wondering if anything is sinking in? Are you serving in the kitchen or meeting some needs in the building—doing ‘thankless’ little chores, and feeling like no one seems to notice or care? Are you pulling along side someone who is hurting—trying to counsel them to do the right thing, but feeling like it’s going in one ear and out the other? Are you praying for someone’s salvation; but feeling like God’s not hearing you?</p>
<p>Then don’t let yourself be deceived. God will never be proven wrong. He has established a principle in His moral universe—that whatever we sow, that we will also reap. And if we keep on faithfully sowing good things under the leading of the Holy Spirit, we will—in due season—reap if we do lose heart.</p>
<p>So; let’s not grow weary. Praise God—harvest time is coming! <a href="https://bethanybible.org/dev/harvest-time-galatians/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<blockquote><p><span style="color: #3366ff;"><em><b>Galatians 6:7-8 NLT</b></em></span><br />
<span style="color: #3366ff;"><em><sup>7 </sup>Don’t be misled—you cannot mock the justice of God. You will always harvest what you plant. <sup>8 </sup>Those who live only to satisfy their own sinful nature will harvest decay and death from that sinful nature. But those who live to please the Spirit will harvest everlasting life from the Spirit. </em></span></p></blockquote>
<p><img loading="lazy" decoding="async" class="size-full wp-image-18481 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2024/08/heaven.jpg" alt="" width="1384" height="1237" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/08/heaven.jpg 1384w, https://goodshepherdmedia.net/wp-content/uploads/2024/08/heaven-400x358.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/08/heaven-1024x915.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/08/heaven-768x686.jpg 768w" sizes="(max-width: 1384px) 100vw, 1384px" /></p>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2024/08/galatians-6-7.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>Biden Lies Fact Checked Fact Checker</title>
		<link>https://goodshepherdmedia.net/biden-lies-fact-checked-fact-checker/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 22 Jun 2024 20:48:56 +0000</pubDate>
				<category><![CDATA[2024 Election]]></category>
		<category><![CDATA[Biden Corruption]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Man Made]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politicians]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Presidential Elections]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🇺🇸👨‍💼Past Presidents👨‍💼🇺🇸]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[Biden Lies]]></category>
		<category><![CDATA[Fact Checked]]></category>
		<category><![CDATA[Fact Checked Biden Lies]]></category>
		<category><![CDATA[Fact Checker]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18251</guid>

					<description><![CDATA[Biden Lies Fact Checked Fact Checker CHECK THE FACTS I ended cancer as we know it. Fact Check: #240 https://thefederalist.com/2022/03/08/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-three/ &#160; I almost lost my wife and corvette in a fire (alternate version- I almost lost my wife in a house fire). Fact Check: #258 https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/ &#160; My son died in Iraq. Fact Check: #264 https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/ &#160; I [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Biden Lies Fact Checked Fact Checker</h1>
<div class="section__title section__title--desc section__title--center home-rich-text__title">
<h2 class="section__title-text">CHECK THE FACTS</h2>
</div>
<div class="home-rich-text__content u-text-center rte">
<p><strong>I ended cancer as we know it.</strong></p>
<p>Fact Check: #240 <a href="https://thefederalist.com/2022/03/08/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-three/">https://thefederalist.com/2022/03/08/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-three/</a></p>
<p>&nbsp;</p>
<p><strong>I almost lost my wife and corvette in a fire (alternate version- I almost lost my wife in a house fire).</strong></p>
<p>Fact Check: #258 <a href="https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/">https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/</a></p>
<p>&nbsp;</p>
<p><strong>My son died in Iraq.</strong></p>
<p>Fact Check: #264 <a href="https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/">https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/</a></p>
<p>&nbsp;</p>
<p><strong>I was arrested trying to meet Nelson Mandela.</strong></p>
<p>Fact Check: <a href="https://www.washingtonpost.com/politics/2020/02/25/bidens-ridiculous-claim-he-was-arrested-trying-see-mandela/">https://www.washingtonpost.com/politics/2020/02/25/bidens-ridiculous-claim-he-was-arrested-trying-see-mandela/</a></p>
<p>&nbsp;</p>
<p><strong>I used to drive an 18 wheeler.</strong></p>
<p>Fact Check: #351 <a href="https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/">https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/</a></p>
<p>&nbsp;</p>
<p><strong>I grew up in black churches.</strong></p>
<p>Fact Check: <a href="https://www.youtube.com/watch?v=-dBd6jZ437c">https://www.youtube.com/watch?v=-dBd6jZ437c</a></p>
<p>&nbsp;</p>
<p><strong>I was raised in a synagogue.</strong></p>
<p>Fact Check: #250 <a href="https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/">https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/</a></p>
<p>&nbsp;</p>
<p><strong>I was raised in the Puerto Rican community.</strong></p>
<p>Fact Check: <a href="https://www.washingtonpost.com/politics/2022/10/05/biden-jewish-greek-puerto-rican/">https://www.washingtonpost.com/politics/2022/10/05/biden-jewish-greek-puerto-rican/</a></p>
<p>&nbsp;</p>
<p><strong>My Uncle Bosie was eaten by cannibals.</strong></p>
<p>Fact Check: #346 <a href="https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/">https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/</a></p>
<p>&nbsp;</p>
<p><strong>I never discussed Hunter’s business.</strong></p>
<p>Fact Check: #256 <a href="https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/">https://thefederalist.com/2023/09/19/heres-the-full-list-of-every-lie-joe-biden-has-told-as-president-part-four/</a></p>
<p>&nbsp;</p>
</div>
<p>BUY YOU OWN BIDEN LIES TSHIRT BY CLICKING THE TSHIRT AND PURCHASING</p>
<p><a href="https://www.theofficertatumstore.com/collections/new-releases/products/biden-lies-t-shirt" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-18253" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/BIDEN-LIES-Fact-Checked.webp" alt="" width="319" height="319" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/06/BIDEN-LIES-Fact-Checked.webp 720w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/BIDEN-LIES-Fact-Checked-400x400.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/BIDEN-LIES-Fact-Checked-150x150.webp 150w" sizes="(max-width: 319px) 100vw, 319px" /></a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Historic Chiquita trials — and verdict — bear a big South Florida imprint</title>
		<link>https://goodshepherdmedia.net/historic-chiquita-trials-and-verdict-bear-a-big-south-florida-imprint/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 21 Jun 2024 19:54:12 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[Guilty Parties & Co-Conspirators]]></category>
		<category><![CDATA[Homicide]]></category>
		<category><![CDATA[Laws]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politicians]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[Chiquita]]></category>
		<category><![CDATA[Chiquita Banana]]></category>
		<category><![CDATA[Chiquita Banana trials]]></category>
		<category><![CDATA[Chiquita trials]]></category>
		<category><![CDATA[Chiquita trials Banana]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18241</guid>

					<description><![CDATA[Historic Chiquita trials — and verdict — bear a big South Florida imprint This month a federal jury in West Palm Beach handed down a historic verdict. In what’s believed to be a first, a major U.S. corporation was found liable in a U.S. civil court for actions that helped lead to murder and other [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="ArtP-headline">Historic Chiquita trials — and verdict — bear a big South Florida imprint</h1>
<p><iframe title="Chiquita found liable for funding paramilitary group during Colombia civil war" width="640" height="360" src="https://www.youtube.com/embed/WDFhVkH2Vus?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>This month a federal jury in West Palm Beach handed down a historic verdict. In what’s believed to be a first, a major U.S. corporation was found liable in a U.S. civil court for actions that helped lead to murder and other human rights abuses against non-Americans in a foreign country.</p>
<p>The corporation is Chiquita Brands; the country is Colombia. And the $38.3 million judgment against Chiquita may be only the start — because a second bellwether trial against the company is set to begin in West Palm Beach on July 15.</p>
<p>Either way, the pioneering proceedings bear a big South Florida imprint, starting with West Palm Beach attorney Jack Scarola, who&#8217;s co-leading the case against Chiquita.</p>
<p>&#8220;You cannot trade human lives for profits,&#8221; Scarola told WLRN in summing up the argument for the plaintiffs, the almost 20 Colombian victims&#8217; families — eight of whom were awarded the almost $40 million verdict issued on June 10. Ten more are expected to be included in next month&#8217;s trial.</p>
<p><iframe title="Bananas and Blood: Chiquita Ordered to Pay Colombian Families $38 Million for Backing Death Squads" width="640" height="360" src="https://www.youtube.com/embed/obzLl82cnrM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Chiquita, the U.S. fruit giant that has a long and controversial history in Latin America, is accused of aiding and abetting the killing of thousands of Colombians two decades ago by a right-wing paramilitary army, the United Self-Defense Forces of Colombia, or AUC.</p>
<p>Chiquita paid that group — designated by the U.S. as terrorists — almost $2 million in extortion money from 1997 to 2004 to protect the company&#8217;s lucrative Colombian banana operation. Scarola says the jury concluded that money helped fund the AUC’s death squads.</p>
<p>“We have unfortunately often seen this pattern of conduct from U.S. corporations, in Colombia or Central America or Africa, because they think they simply aren’t going to be watched as carefully,&#8221; Scarola says.</p>
<p>&#8220;This verdict demonstrates they will be watched.”</p>
<p><iframe title="How Chiquita Banana Overthrew the Government (FARM CRIME)" width="640" height="360" src="https://www.youtube.com/embed/cHvOXAk9tB4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Chiquita says it will appeal the verdict. In statements, it emphasizes that it deplores the AUC’s terrorism, which targeted many banana labor activists. But it insists it had no choice but to pay the AUC to keep its business and employees safe during the civil war raging in Colombia at that time.</p>
<p>That question was central to this month&#8217;s trial. But jurors unanimously concluded not only that Chiquita did have a moral alternative to paying the extortion money, but that by playing ball with the AUC — as well as leftist guerrillas known as the FARC, who were also a designated terrorist group — the company simply helped exacerbate the horrors of Colombia&#8217;s conflict.</p>
<p>When the AUC victims&#8217; spouses and other relatives began fleeing to Florida at the turn of the century, human rights advocates began taking notice of their stories. Among them was human rights attorney James Green of West Palm Beach, who played a large role in getting the Chiquita plaintiffs represented here by litigation firms like Scarola&#8217;s Searcy Law.</p>
<p>Another was a Roman Catholic priest in Palm Beach County, Father Frank O&#8217;Laughlin, who heads the nonprofit Guatemalan-Maya Center in Lake Worth Beach. He helped spearhead an effort to publicize the Colombians&#8217; cases — such as the horrific 2001 kidnapping murder of a teenager in Urabá, Colombia — and Chiquita’s alleged role.</p>
<blockquote><p><em><strong>“The realities of Colombia had come to Florida, and there was no walking away from it,&#8221; O&#8217;Laughlin says. “The only one way to tackle it was to take on the evil of the reality in court.”</strong></em></p></blockquote>
<div class="Enh" data-align-center="">
<div class="Quote-wrapper">
<blockquote>
<div class="Quote">
<blockquote><p><em><strong>&#8220;Many U.S. corporations, in Colombia or Central America or Africa, think they won&#8217;t be watched as carefully. This verdict demonstrates they will be.&#8221;</strong></em></p>
<div class="Quote-attribution"><em><strong>Jack Scarola</strong></em></div>
</blockquote>
</div>
</blockquote>
</div>
</div>
<p>In 2007, the U.S. Justice Department did in fact charge Chiquita with doing business with a terrorist organization. In its guilty plea, Chiquita paid a $25 million fine.</p>
<p>That — and the reams of documented admissions of guilt the corporation left in its wake — led the Colombian victims’ families to seek civil damages as well. After 17 years of legal wrangling, cases were finally funneled to the federal court in West Palm Beach this year. And, once again, with notable South Florida involvement, including the University of Miami School of Law and its Human Rights Clinic.</p>
<p>“It definitely taught me a lot of what has been useful for this case,&#8221; says Gabriela Valentin Diaz, a staff attorney for the human rights nonprofit EarthRights International, which has helped build plaintiffs’ cases in the Chiquita trial.</p>
<p><iframe title="Chiquita  An Association With Corporate Terrorism Gone Bananas" width="640" height="360" src="https://www.youtube.com/embed/AwFpV2zAApI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><b>No small feat</b></p>
<p>Before joining EarthRights, Valentin Diaz was a University of Miami law student and alumna working with the school’s human rights clinic to assist those plaintiffs in Colombia.</p>
<p>“They’re coming to a different country to testify in front of a court, which can be a really intimidating environment,&#8221; Valentin Diaz says. &#8220;But they’re seeing their claims and their stories told in a U.S. court – and a jury deciding in their favor.</p>
<p>&#8220;And that’s no small feat.”</p>
<div class="Enh" data-align-right="">
<figure class="Figure"><picture><source srcset="https://npr.brightspotcdn.com/dims4/default/4866589/2147483647/strip/true/crop/2000x1333+0+0/resize/840x560!/format/webp/quality/90/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F8a%2F90%2F8ca6e0e34abf8ef4963d38ec0b8b%2Fcolombian-paramilitaries-2004.jpg 2x" type="image/webp" media="(max-width: 768px)" data-size="fallbackImageSizeMobile" /><source srcset="https://npr.brightspotcdn.com/dims4/default/51767ae/2147483647/strip/true/crop/2000x1333+0+0/resize/420x280!/quality/90/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F8a%2F90%2F8ca6e0e34abf8ef4963d38ec0b8b%2Fcolombian-paramilitaries-2004.jpg" media="(max-width: 768px)" data-size="fallbackImageSizeMobile" /><source srcset="https://npr.brightspotcdn.com/dims4/default/3f57a84/2147483647/strip/true/crop/2000x1333+0+0/resize/1760x1174!/format/webp/quality/90/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F8a%2F90%2F8ca6e0e34abf8ef4963d38ec0b8b%2Fcolombian-paramilitaries-2004.jpg 2x" type="image/webp" data-size="fallbackImageSize" /><source srcset="https://npr.brightspotcdn.com/dims4/default/02a100e/2147483647/strip/true/crop/2000x1333+0+0/resize/880x587!/quality/90/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F8a%2F90%2F8ca6e0e34abf8ef4963d38ec0b8b%2Fcolombian-paramilitaries-2004.jpg" data-size="fallbackImageSize" /><img loading="lazy" decoding="async" class="Image" src="https://npr.brightspotcdn.com/dims4/default/02a100e/2147483647/strip/true/crop/2000x1333+0+0/resize/880x587!/quality/90/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F8a%2F90%2F8ca6e0e34abf8ef4963d38ec0b8b%2Fcolombian-paramilitaries-2004.jpg" srcset="https://npr.brightspotcdn.com/dims4/default/66221a6/2147483647/strip/true/crop/2000x1333+0+0/resize/1760x1174!/quality/90/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F8a%2F90%2F8ca6e0e34abf8ef4963d38ec0b8b%2Fcolombian-paramilitaries-2004.jpg 2x" alt="Right-wing Colombian paramilitary enforcers stop campesinos at a roadblock in Santa Fe de Ralito, Colombia, in 2004." width="880" height="587" /></picture>
<div class="Figure-content">
<div class="Figure-content">
<div class="Figure-credit-container">
<div class="Figure-credit">JAVIER GALEANO</div>
<div class="Figure-divider">/</div>
<div class="Figure-source">AP</div>
</div>
</div>
</div><figcaption class="Figure-caption">Right-wing Colombian paramilitary enforcers stop campesinos at a roadblock in Santa Fe de Ralito, Colombia, in 2004.</figcaption></figure>
</div>
<p>The Chiquita trials are being held in a U.S. court because Chiquita is based in the U.S. — but also because holding them in Colombia risked putting the plaintiffs in danger.</p>
<p>Still, the AUC crimes were committed in Colombia, so Colombian law predominates in the trials. As a result, University of Miami law professor Pablo Rueda Saiz, a Colombia native, is serving as an expert witness on how to blend U.S. and Colombian tort procedure.</p>
<p>And U Miami is playing a role beyond the trials: law professor and corporate accountability expert Marcia Narine Weldon advises other U.S. companies on how to avoid the kind of tragic mess Chiquita got itself into in Colombia.</p>
<p>“This [Chiquita verdict], I think, is the wake-up call that companies needed to have,&#8221; says Narine Weldon, who teaches a business and human rights course.</p>
<p>&#8220;If you are dealing with Latin America, you have to know that [what happened to Chiquita] is not an acceptable cost of doing business — because, actually, it can cost you your business.”</p>
<p>Narine Weldons says that&#8217;s an especially important message in South Florida, where so many businesses do have ties to Latin America.</p>
<p>Chiquita could face other civil trials after next month&#8217;s. In the end, it may not cost Chiquita its business — but experts like Narine Weldon point out that what it could cost Chiquita could far surpass the profits it made in Colombia while it was paying off a terrorist group. <a href="https://www.wlrn.org/americas/2024-06-21/chiquita-trial-colombia-terrorist-lawsuit-verdict-auc" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Trump Vs Biden &#8211; Social Media Black Ball of Trump</title>
		<link>https://goodshepherdmedia.net/trump-vs-biden-social-media-black-ball-of-trump/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 10 Jun 2024 20:34:31 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[2024 Election]]></category>
		<category><![CDATA[Biden Corruption]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Entertainers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Guilty Parties & Co-Conspirators]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Money / Finances]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Presidential Elections]]></category>
		<category><![CDATA[Retaliatory Arrests & Prosecution]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🇺🇸👨‍💼Past Presidents👨‍💼🇺🇸]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[TRUMP JOINS TIKTOK]]></category>
		<category><![CDATA[Trump Vs Biden]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18181</guid>

					<description><![CDATA[Trump Vs Biden &#8211; Social Media Black Ball of Trump TRUMP JOINS TIKTOK AND CALLS IT ‘AN HONOR.’ AS PRESIDENT HE ONCE TRIED TO BAN THE VIDEO-SHARING APP Donald Trump has joined the popular video-sharing app TikTok, a platform he once tried to ban while in the White House, and posted from a UFC fight [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Trump Vs Biden &#8211; Social Media Black Ball of Trump</h1>
<h2>TRUMP JOINS TIKTOK AND CALLS IT ‘AN HONOR.’ AS PRESIDENT HE ONCE TRIED TO BAN THE VIDEO-SHARING APP</h2>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-18181-2" width="640" height="360" loop autoplay preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/Trump-Vs-Biden-Social-Media-Black-Ball-of-Trump.mp4?_=2" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2024/06/Trump-Vs-Biden-Social-Media-Black-Ball-of-Trump.mp4">https://goodshepherdmedia.net/wp-content/uploads/2024/06/Trump-Vs-Biden-Social-Media-Black-Ball-of-Trump.mp4</a></video></div>
<p>Donald Trump has joined the popular video-sharing app TikTok, a platform he once tried to ban while in the White House, and posted from a UFC fight two days after he became the first former president and presumptive major party nominee in U.S. history to be found guilty on felony charges.</p>
<p>“It’s an honor,” Trump said in the TikTok video, which features footage of him waving to fans and posing for selfies at the Ultimate Fighting Championship fight in Newark, New Jersey, on Saturday night. The video ends with Trump telling the camera: “That was a good walk-on, right?”</p>
<p>By Sunday morning, Trump had amassed more than 1.1 million followers on the platform and the post had garnered more than 1 million likes and 24 million views.</p>
<p>“We will leave no front undefended and this represents the continued outreach to a younger audience consuming pro-Trump and anti-Biden content,” Trump spokesman Steven Cheung said in a statement about the campaign’s decision to join the platform.</p>
<p>“There’s no place better than a UFC event to launch President Trump’s Tik Tok, where he received a hero’s welcome and thousands of fans cheered him on,” he added.</p>
<p>Democratic President Joe Biden signed legislation in April that could ban TikTok in the U.S., even as his campaign joined in February and has tried to work with influencers.</p>
<p>Trump received an enthusiastic welcome at the fight at Newark’s Prudential Center, where the crowd broke into chants of “We love Trump!” and another insulting Biden with an expletive.</p>
<p>It was Trump’s first public outing since a jury in New York found him guilty Thursday on 34 charges of falsifying business records as part of a scheme to illegally influence the 2016 election by covering up hush money payments made to a porn actor who claimed she and Trump had sex. Trump has maintained he did nothing wrong and plans to appeal the verdict. He will be sentenced on July 11.</p>
<p>Throughout his campaign, Trump has used appearances at UFC fights to project an image of strength and to try to appeal to potential voters who may not closely follow politics or engage with traditional news sources. It’s also part of a broader effort to connect with young people and minority voters, particularly Latino and Black men.</p>
<p>TikTok, owned by Beijing-based ByteDance, is another opportunity to reach those potential voters. The platform has about 170 million users in the U.S., most of whom skew younger — a demographic that is especially hard for campaigns to reach because they shun television.</p>
<p>As president, Trump tried to ban TikTok through an executive order that said “the spread in the United States of mobile applications developed and owned” by Chinese companies was a national security threat. The courts blocked the action after TikTok sued.</p>
<p>Both the FBI and the Federal Communications Commission have warned that ByteDance could share user data such as browsing history, location and biometric identifiers with China’s government. TikTok said it has never done that and would not, if asked.</p>
<p>The platform was a hot topic of debate during the 2024 GOP primary campaign, with most candidates shunning its use. Many, including former Vice President Mike Pence, called for TikTok to be banned in the U.S. due to its connections with China</p>
<p>Trump said earlier this year that he still believes TikTok posed a national security risk, but was opposed to banning it because that would help its rival, Facebook, which he continues to criticize over his 2020 election loss to Biden.</p>
<p>“Frankly, there are a lot of people on TikTok that love it. There are a lot of young kids on TikTok who will go crazy without it,” Trump told CNBC.</p>
<p>The legislation signed by Biden gives ByteDance nine months to sell the company, with a possible additional three months if a sale is in progress. If it doesn’t, TikTok will be banned. Biden barred the app on most government devices in December 2022.</p>
<p>His reelection campaign nonetheless uses the app, which it joined the night of the Super Bowl in February. Aides argue that in an increasingly fragmented modern media environment, the campaign must get its message out to voters via as many platforms as possible, including TikTok as well as WhatsApp, Facebook, Instagram and YouTube.</p>
<p>Biden’s “bidenhq” account currently has more than 330,000 followers and 4.5 million likes.</p>
<p>Trump’s appearance at Saturday’s fight came after he had sat down for an interview with Fox News Channel’s “Fox &amp; Friends Weekend” that aired Sunday.</p>
<p>In that appearance, Trump said he was “OK” with the prospect of potential jail time or house arrest, saying it was “the way it is.’’’</p>
<p>But he again suggested the public might not accept such a punishment for a former president now running to return to the White House.</p>
<p>“I don’t know that the public would stand it, you know. I’m not sure the public would stand for it,” he said. “I think it would be tough for the public to take. You know, at a certain point there’s a breaking point.”</p>
<p>Trump, as he has throughout the trial, maintained his innocence, saying he “did absolutely nothing wrong.”</p>
<p>He was asked how his wife, former first lady Melania Trump, has taken the news.</p>
<p>“She’s fine. But I think it’s very hard for her. I mean, she’s fine. But, you know, she has to read all this crap,” he said.</p>
<p>She did not appear with Trump in court at any point during his seven-week trial. <a href="https://www.ap.org/news-highlights/elections/2024/trump-joins-tiktok-and-calls-it-an-honor-as-president-he-once-tried-to-ban-the-video-sharing-app/" target="_blank" rel="noopener">source</a></p>
<blockquote class="tiktok-embed" style="max-width: 605px; min-width: 325px;" cite="https://www.tiktok.com/@realdonaldtrump/video/7375744699140721963" data-video-id="7375744699140721963">
<section><a title="@realdonaldtrump" href="https://www.tiktok.com/@realdonaldtrump?refer=embed" target="_blank" rel="noopener">@realdonaldtrump</a> Launching my TikTok at @UFC <a title="♬ original sound - President Donald J Trump" href="https://www.tiktok.com/music/original-sound-7375744708456287018?refer=embed" target="_blank" rel="noopener">♬ original sound &#8211; President Donald J Trump</a></section>
</blockquote>
<p><script async src="https://www.tiktok.com/embed.js"></script></p>
<p><iframe title="Trump Vs Biden   Social Media Black Ball of Trump" width="640" height="360" src="https://www.youtube.com/embed/k1dD_1V_ANs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2024/06/Trump-Vs-Biden-Social-Media-Black-Ball-of-Trump.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>Progressive Democrat scolds party for &#8216;protecting&#8217; child sex trafficking criminals</title>
		<link>https://goodshepherdmedia.net/progressive-democrat-scolds-party-for-protecting-child-sex-trafficking-criminals/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Wed, 05 Jun 2024 09:11:30 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Biden Corruption]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politicians]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Women's Health]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🧠Psychology / Mental Health🧠]]></category>
		<category><![CDATA[Democrat scolds party]]></category>
		<category><![CDATA[protecting child]]></category>
		<category><![CDATA[protecting child sex trafficking criminals]]></category>
		<category><![CDATA[sex trafficking criminals]]></category>
		<category><![CDATA[Susan Talamantes Eggman]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18115</guid>

					<description><![CDATA[Progressive Democrat scolds party for &#8216;protecting&#8217; child sex trafficking criminals California progressive says she&#8217;s &#8216;done&#8217; with Democratic Party before voting to make child sex solicitation a felony. California Democratic state Sen. Susan Talamantes Eggman urged her progressive colleagues to pass a Republican-led bill that would make it a felony to solicit a child for sex SACRAMENTO, Calif. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="title">Progressive Democrat scolds party for &#8216;protecting&#8217; child sex trafficking criminals</h1>
<p>California progressive says she&#8217;s &#8216;done&#8217; with Democratic Party before voting to make child sex solicitation a felony. <span tabindex="0" role="tooltip"><span class="c5aZPb" tabindex="0" role="button" data-enable-toggle-animation="true" data-extra-container-classes="ZLo7Eb" data-hover-hide-delay="1000" data-hover-open-delay="500" data-send-open-event="true" data-theme="0" data-width="250" data-ved="2ahUKEwjS0qbojsSGAxXK58kDHT_1AdIQmpgGegQIHBAD"><span class="JPfdse" data-bubble-link="" data-segment-text="California Democratic">California Democratic</span></span></span> state Sen. Susan Talamantes Eggman urged her progressive colleagues to pass a Republican-led bill that would make it a felony to solicit a child for sex</p>
<p><iframe title="I&#039;m Done With Us Protecting Child Abusers - California Senator Susan Talamantes Eggman" width="640" height="360" src="https://www.youtube.com/embed/GECX1uYWcQM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><span class="dateline">SACRAMENTO, Calif. (TND) — </span>A Democratic California state senator criticized members of her party last week while trying to advance a bill targeting solicitation of minors.</p>
<p><span style="color: #0000ff;"><strong>State Sen.</strong></span> <strong>Susan Talamantes Eggman</strong>, D-Stockton, urged other Democratic senators to support a bill increasing penalties for soliciting minors. The bill, <a class="themeColorForLinks" title="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB1414" href="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB1414" target="_blank" rel="noopener" aria-label="SB 1414 - open in a new tab" data-uw-rm-ext-link="" data-uw-rm-brl="PR" data-uw-original-href="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB1414">SB 1414</a>, would make soliciting a child less than 16 years old punishable by a jail term of up to three years. Anyone convicted of solicitation a second time would have to register as a sex offender if they were more than 10 years older than the minor.</p>
<p data-uw-rm-sr="">Currently, anyone convicted of soliciting a child in California faces up to a year in prison and a fine up to $10,000.</p>
<blockquote><p><em><strong>“A lot of these kids can be throwaway kids – they’re poor kids, they’re kids of color,” Sen. Eggman said. “But they shouldn’t have to live a life determined by what happens to them by others at a very young age and by having the Democratic Party of California say it’s okay. It’s not okay.”</strong></em></p></blockquote>
<p>SB 1414 was previously amended by some Democrats to only classify solicitation of minors under 16 as a felony. Sen. Eggman, who will reach her term limit in the California State Legislature in November, told left-wing lawmakers they would look like “fools” and “laughing stocks” if they didn’t move back toward the &#8220;center&#8221; politically.</p>
<div id="interstory_first_ddb_0" data-google-query-id="COq1_62LxIYDFZmH7gEd3G47DQ">
<div id="google_ads_iframe_/4756/KEYE/Web/news/nation-world_2__container__"></div>
</div>
<blockquote><p>I’m leaving, but the rest of you who are gonna be here for a while, let’s get our stuff together and really start focusing on some of the important things,” the state senator said. “We talk about learning, and we talk about being safe. This is like at the core of it.”<strong><em>“I am not arguing that we open the gates to flood our prisons with people, but I am arguing that we have a moral responsibility to say enough,” she continued. “We have given away enough on this area.”</em></strong></p></blockquote>
<h3><span style="color: #ff0000;"><strong>SB 1414 passed the California Senate unanimously, and its counterpart in the Assembly was introduced Friday.</strong></span></h3>
<p>California has a history of high human trafficking numbers. In 2021, nearly 13% of all trafficked U.S. people were in the state, according to the <a class="themeColorForLinks" title="https://www.ppic.org/blog/human-trafficking-in-california/" href="https://www.ppic.org/blog/human-trafficking-in-california/" target="_blank" rel="noopener" aria-label="Public Policy Institute of California - open in a new tab" data-uw-rm-ext-link="" data-uw-rm-brl="PR" data-uw-original-href="https://www.ppic.org/blog/human-trafficking-in-california/">Public Policy Institute of California</a>.</p>
<blockquote>
<h3><strong><em><span style="color: #0000ff;">“As a progressive, proud member of this body for the last 12 years, I’m done. I’m done with us protecting people who would buy and abuse our children,” Sen. Eggman said. “I don’t want people buying little girls anymore, and I’m tired of saying it’s okay and that we have to protect the men who do it.”</span></em></strong></h3>
</blockquote>
<p>&nbsp;</p>
<p><a href="https://cbsaustin.com/news/nation-world/california-dem-slams-party-members-over-child-solicitation-bill-im-done-democrat-sen-susan-talamantes-eggman-d-stockton-california-senate-sb-1414-democratic-party" target="_blank" rel="noopener">source</a></p>
<h1 class="headline speakable">California progressive chides fellow Democrats before voting to make child solicitation a felony: &#8216;I&#8217;m done&#8217;</h1>
<h2 class="sub-headline speakable">&#8216;I&#8217;m done with us protecting people who would buy and abuse our children,&#8217; said California State Sen. Susan Talamantes Eggman</h2>
<div class="featured featured-video video-ct" data-v-b8a95802="">
<div class="contain" data-v-b8a95802="">
<div class="info" data-v-b8a95802="">
<div class="caption" data-v-b8a95802="">
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-18115-3" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/Senator-Susan-Talamantes-Eggman-Im-Done-With-Us-Protecting-Child-Abusers-California.mp4?_=3" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2024/06/Senator-Susan-Talamantes-Eggman-Im-Done-With-Us-Protecting-Child-Abusers-California.mp4">https://goodshepherdmedia.net/wp-content/uploads/2024/06/Senator-Susan-Talamantes-Eggman-Im-Done-With-Us-Protecting-Child-Abusers-California.mp4</a></video></div>
<p data-v-b8a95802="">Democratic state Sen. Susan Talamantes Eggman urges her progressive colleagues to vote for Republican-led bill that makes soliciting children for sex a felony. (Credit: California State Senate)</p>
</div>
</div>
</div>
</div>
<p class="speakable"><a href="https://www.foxnews.com/category/us/us-regions/west/california" target="_blank" rel="noopener">California Democratic </a>state Sen. Susan Talamantes Eggman urged her progressive colleagues to pass a Republican-led bill that would make it a felony to solicit a child for sex.</p>
<p class="speakable">&#8220;I&#8217;d like to say as a progressive, proud member of this body for the last 12 years, I&#8217;m done,&#8221; Eggman said on the Senate floor before voting for the bill last week. &#8220;I&#8217;m done with us protecting people who would buy and abuse our children. I&#8217;m done. I don&#8217;t want to send more Black and brown men to prison. I don&#8217;t want more people in prison, but I don&#8217;t want people buying girls.</p>
<p>&#8220;I don&#8217;t want people buying little girls anymore, and I&#8217;m tired of saying it&#8217;s OK and that we have to protect the men who do it.&#8221;</p>
<p><a href="https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=202320240SB1414" target="_blank" rel="nofollow noopener">Senate Bill 1414</a>, introduced by Republican state Sen. Shannon Grove along with Democratic state senators Anna Caballero and Susan Rubio, classifies soliciting or purchasing sex from children 15 and under as either a misdemeanor or felony with the possibility of jail time.</p>
<p>For those aged 16-17, it&#8217;s considered a misdemeanor. While a felony charge entails prison time, repeat offenders with a substantial age gap with the victim must register as tier one sex offenders on their second offense.</p>
<p>&#8220;As a <a href="https://www.foxnews.com/category/health/mental-health" target="_blank" rel="noopener">mental health</a> professional and as a social worker, I can tell you I&#8217;ve spent my entire career working with people who have been wounded,&#8221; Eggman added. &#8220;I&#8217;m not gonna say beyond repair, but they have been wounded to their core by the abuse that&#8217;s been heaped on them oftentimes by those that they love and look to protect them.&#8221;</p>
<p>Grove&#8217;s bill toughens the punishment for <a href="https://www.foxnews.com/category/us/crime/sex-crimes" target="_blank" rel="noopener">child trafficking</a> and increased it from a misdemeanor charge to a felony, carrying a maximum penalty of four years in prison and a $25,000 fine. Unlike current law, the penalties would apply regardless of whether the adult was aware of the child&#8217;s age.</p>
<p>Last month, Democrats on the Public Safety Committee &#8220;mutilated&#8221; portions of Grove&#8217;s bill and added several amendments that only made proposed charges applicable if the child is younger than 15. The bill cleared the state Senate last week without Grove&#8217;s original language in a 36-0 vote. Democratic Gov. Gavin Newsom also signaled his support for the bill, which now heads to the Assembly, where Grove hopes to reinsert a few of the bill&#8217;s original proposals.</p>
<p>Grove had also proposed amendments to classify <a href="https://www.foxnews.com/category/us/crime/sex-crimes" target="_blank" rel="noopener">solicitation or purchasing sex</a> from a child of any age as a prison felony and eliminate the 10-year age gap requirement for the sex offender registry.</p>
<div class="image-ct inline">
<div class="m"><picture><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/343/192/shannon-grove.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/686/384/shannon-grove.jpg?ve=1&amp;tl=1 2x" media="(max-width: 767px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/672/378/shannon-grove.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/1344/756/shannon-grove.jpg?ve=1&amp;tl=1 2x" media="(min-width: 768px) and (max-width: 1023px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/931/523/shannon-grove.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/1862/1046/shannon-grove.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1024px) and (max-width: 1279px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/720/405/shannon-grove.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/1440/810/shannon-grove.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1280px)" /><img loading="lazy" decoding="async" src="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2024/04/1200/675/shannon-grove.jpg?ve=1&amp;tl=1" alt="California State Sen. Sharon Grove poses with girl for picture on chamber floor" width="1200" height="675" /></picture></div>
<div class="info">
<div class="caption">
<p>Sen. Shannon Grove introduced SB 1414 this year. (Kelly Sullivan)</p>
</div>
</div>
</div>
<p>&#8220;<a href="https://www.foxnews.com/category/us/crime" target="_blank" rel="noopener">The crime of purchasing a child</a> of any age for sex in the state of California should be a prison felony. I am incredibly disappointed in the Senate Pro Tem and Senate leadership for, once again, passing on an opportunity to restore amendments to the bill and stand up for all of California’s children,&#8221; Grove said in a statement.</p>
<p>&#8220;This outcome is a failure on the part of legislative leadership who caved to political pressure and did not prioritize the safety of our children. We must restore this bill in the Assembly to protect every child in the state of California from the horrific crime of sex trafficking.&#8221; <a href="https://www.foxnews.com/politics/ca-progressive-chides-fellow-democrats-before-voting-make-child-solicitation-felony-im-done" target="_blank" rel="noopener">source</a></p>
<p><iframe title="Senator Susan Talamantes Eggman   I&#039;m Done With Us Protecting Child Abusers  California" width="640" height="360" src="https://www.youtube.com/embed/gn1GQnyQc3M?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2024/06/Senator-Susan-Talamantes-Eggman-Im-Done-With-Us-Protecting-Child-Abusers-California.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>Trump highlights Biden admin authorizing ‘deadly use of force’ in Mar-a-Lago raid</title>
		<link>https://goodshepherdmedia.net/trump-highlights-biden-admin-authorizing-deadly-use-of-force-in-mar-a-lago-raid/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 23 May 2024 21:41:09 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[2024 Election]]></category>
		<category><![CDATA[Biden Corruption]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corrupted Family Law / Criminal]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politicians]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Presidential Elections]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🇺🇸👨‍💼Past Presidents👨‍💼🇺🇸]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🔫Guns Rights / Gun News🔫]]></category>
		<category><![CDATA[authorizing ‘deadly use of force’]]></category>
		<category><![CDATA[Deadly Use Of Force]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Mar-a-Lago raid]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[use of force]]></category>
		<category><![CDATA[use of force against Trump]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=17969</guid>

					<description><![CDATA[Trump highlights Biden admin authorizing ‘deadly use of force’ in Mar-a-Lago raid FBI said it followed standard protocol in its August 2022 raid on Trump&#8217;s Mar-a-Lago estate in Florida &#8216;Deadly force&#8217; authorized during FBI&#8217;s 2022 raid on Trump&#8217;s Mar-a-Lago estate: Court docs Former Florida Attorney General Pam Bondi joined &#8216;Fox &#38; Friends First&#8217; to discuss [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline speakable">Trump highlights Biden admin authorizing ‘deadly use of force’ in Mar-a-Lago raid</h1>
<h2 class="sub-headline speakable">FBI said it followed standard protocol in its August 2022 raid on Trump&#8217;s Mar-a-Lago estate in Florida</h2>
<p><iframe title="Deadly Force Authorized in FBI&#039;s Mar-a-Lago Raid: A Controversial Revelation" width="640" height="360" src="https://www.youtube.com/embed/5qF0ZIMzRF4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="featured featured-video video-ct" data-v-b8a95802="">
<div class="contain" data-v-b8a95802="">
<div class="info" data-v-b8a95802="">
<div class="caption" data-v-b8a95802="">
<h4 class="title" data-v-b8a95802="">&#8216;Deadly force&#8217; authorized during FBI&#8217;s 2022 raid on Trump&#8217;s Mar-a-Lago estate: Court docs</h4>
<p data-v-b8a95802="">Former Florida Attorney General Pam Bondi joined &#8216;Fox &amp; Friends First&#8217; to discuss her reaction to the newly unveiled court documents and the latest on the NY v. Trump trial in Manhattan.</p>
</div>
</div>
</div>
</div>
<p class="speakable">The Biden administration authorized the use of deadly force during the FBI’s raid on former President Trump’s Mar-a-Lago estate in Florida in August 2022 as part of its investigation into classified records, court documents revealed.</p>
<p><iframe title="Bombshell court docs reveal Biden&#039;s DOJ authorized &#039;deadly force&#039; in Mar-a-Lago raid" width="640" height="360" src="https://www.youtube.com/embed/5jIgGmGydmE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p class="speakable">&#8220;The FBI followed standard protocol in this search as we do for all search warrants, which includes a standard policy statement limiting the use of deadly force. No one ordered additional steps to be taken and there was no departure from the norm in this matter,&#8221; the FBI told Fox News in a statement Tuesday.</p>
<p><iframe title="Documents reveal FBI was authorised to use ‘deadly force’ in Trump&#039;s Mar a Lago estate raid" width="640" height="360" src="https://www.youtube.com/embed/KTQ-8CDZ8pQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>An &#8220;Operations Order&#8221; produced in discovery as part of Special Counsel Jack Smith’s investigation into Trump’s alleged improper retention of classified records revealed that the &#8220;FBI believed its objective for the Mar-a-Lago raid was to seize ‘classified information, NDI, and US Government records,’&#8221; as described in the search warrant.</p>
<p>The order, according to a court filing, contained a &#8220;Policy Statement&#8221; regarding &#8220;Use of Deadly Force,&#8221; which stated, for example, &#8220;Law Enforcement officers of the Department of Justice may use deadly force when necessary.&#8221;\</p>
<p><strong>FLASHBACK: TRUMP SAYS MAR-A-LAGO HOME IN FLORIDA &#8216;UNDER SIEGE&#8217; BY FBI AGENTS</strong></p>
<div class="image-ct inline">
<div class="m"><picture><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/343/192/GettyImages-1242414293.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/686/384/GettyImages-1242414293.jpg?ve=1&amp;tl=1 2x" media="(max-width: 767px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/672/378/GettyImages-1242414293.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1344/756/GettyImages-1242414293.jpg?ve=1&amp;tl=1 2x" media="(min-width: 768px) and (max-width: 1023px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/931/523/GettyImages-1242414293.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1862/1046/GettyImages-1242414293.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1024px) and (max-width: 1279px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/720/405/GettyImages-1242414293.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1440/810/GettyImages-1242414293.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1280px)" /><img loading="lazy" decoding="async" class="" src="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1200/675/GettyImages-1242414293.jpg?ve=1&amp;tl=1" alt="Donald Trump's Mar-a-Lago" width="516" height="290" /></picture></div>
<div class="info">
<div class="caption">
<p>This view shows the Mar-a-Lago resort in Palm Beach, Florida. (Charles Trainor Jr./Miami Herald/Tribune News Service via Getty Images/File)</p>
</div>
</div>
</div>
<p>According to the filing, the DOJ and FBI agents &#8220;planned to bring ‘Standard Issue Weapons,&#8217; ‘Ammo,’ ‘Handcuffs,’ and ‘medium and large sized bolt cutters,’ but they were instructed to wear ‘unmarked polo or collared shirts’ and to keep ‘law enforcement equipment concealed.&#8221;</p>
<p><iframe title="FBI was authorized to use ‘deadly force’ in classified docs search at Trump’s Mar-a-Lago" width="640" height="360" src="https://www.youtube.com/embed/XUk8Vnx47qU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Trump, who spent another day in a New York City courtroom for his unprecedented criminal trial stemming from Manhattan District Attorney Alvin Bragg’s investigation into Trump allegedly falsifying business records, reacted to the revelations Tuesday afternoon.</p>
<div class="image-ct inline">
<div class="m"><picture><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/343/192/BT-thumb-raid.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/686/384/BT-thumb-raid.jpg?ve=1&amp;tl=1 2x" media="(max-width: 767px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/672/378/BT-thumb-raid.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1344/756/BT-thumb-raid.jpg?ve=1&amp;tl=1 2x" media="(min-width: 768px) and (max-width: 1023px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/931/523/BT-thumb-raid.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1862/1046/BT-thumb-raid.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1024px) and (max-width: 1279px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/720/405/BT-thumb-raid.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1440/810/BT-thumb-raid.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1280px)" /><img loading="lazy" decoding="async" class="" src="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1200/675/BT-thumb-raid.jpg?ve=1&amp;tl=1" alt="FBI Mar-a-Lago raid" width="613" height="345" /></picture></div>
<div class="info">
<div class="caption">
<p>The FBI has been criticized for raiding former President Trump&#8217;s Mar-a-Lago home. (Fox News)</p>
</div>
</div>
</div>
<p>&#8220;WOW! I just came out of the Biden Witch Hunt Trial in Manhattan, the ‘Icebox,’ and was shown Reports that Crooked Joe Biden’s DOJ, in their Illegal and UnConstitutional Raid of Mar-a-Lago, AUTHORIZED THE FBI TO USE DEADLY (LETHAL) FORCE,&#8221; Trump posted on his Truth Social. &#8220;NOW WE KNOW, FOR SURE, THAT JOE BIDEN IS A SERIOUS THREAT TO DEMOCRACY.&#8221;</p>
<p><iframe title="Trump calls out Biden after learning FBI cleared to use deadly force during raid" width="640" height="360" src="https://www.youtube.com/embed/EcbBQFQ0k8I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>FEDERAL JUDGE POSTPONES TRUMP&#8217;S CLASSIFIED RECORDS TRIAL WITH NO NEW DATE</strong></p>
<p>Trump added, &#8220;HE IS MENTALLY UNFIT TO HOLD OFFICE — 25TH AMENDMENT!&#8221;</p>
<div class="image-ct inline">
<div class="m"><picture><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/343/192/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/686/384/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1 2x" media="(max-width: 767px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/672/378/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1344/756/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1 2x" media="(min-width: 768px) and (max-width: 1023px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/931/523/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1862/1046/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1024px) and (max-width: 1279px)" /><source srcset="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/720/405/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1440/810/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1280px)" /><img loading="lazy" decoding="async" class="" src="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2022/08/1200/675/fbi-maralago-search-docs.jpg?ve=1&amp;tl=1" alt="Documents seized by FBI at Ma-a-Lago" width="594" height="334" /></picture></div>
<div class="info">
<div class="caption">
<p>This image contained in a DOJ court filing on Aug. 30, 2022, and redacted in part by the FBI, shows a photo of documents seized during the Aug. 8, 2022, search by the FBI of former President Trump&#8217;s Mar-a-Lago estate in Florida. (Department of Justice via AP)</p>
</div>
</div>
</div>
<p>Trump was charged out of Smith’s investigation into his retention of classified materials. Trump pleaded not guilty to all 37 felony charges from Smith’s probe, including willful retention of national defense information, conspiracy to obstruct justice, and false statements.</p>
<p>Trump was also charged with an additional three counts as part of a superseding indictment out of the investigation: a count of willful retention of national defense information and two obstruction counts.</p>
<p>Trump pleaded <u>not guilty</u>.</p>
<p>The federal judge presiding over the case, Judge Aileen Cannon of the U.S. District Court for the Southern District of Florida, postponed the trial stemming from Smith&#8217;s case indefinitely. The trial was set to begin May 20. <a href="https://www.foxnews.com/politics/biden-administration-authorized-use-of-deadly-force-mar-a-lago-raid" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>LASD Warns Consumers of Package Thefts</title>
		<link>https://goodshepherdmedia.net/lasd-warns-consumers-of-package-thefts/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 06:47:26 +0000</pubDate>
				<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Laws]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[how to Protect Packages From ‘Porch Pirates]]></category>
		<category><![CDATA[package theft]]></category>
		<category><![CDATA[people stealing off front porch]]></category>
		<category><![CDATA[porch pirates]]></category>
		<category><![CDATA[Protect Packages From ‘Porch Pirates]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=17357</guid>

					<description><![CDATA[LASD Warns Consumers of Package Thefts The Los Angeles Sheriff’s Department and the Santa Clarita Valley Sheriff’s Station issued a warning for holiday season shoppers who have purchased goods online during CyberMonday sales to be aware their packages may be targeted by mail theives. CyberMonday means the future delivery of several packages. Although you may [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>LASD Warns Consumers of Package Thefts</h1>
<p>The Los Angeles Sheriff’s Department and the Santa Clarita Valley Sheriff’s Station issued a warning for holiday season shoppers who have purchased goods online during CyberMonday sales to be aware their packages may be targeted by mail theives.</p>
<p>CyberMonday means the future delivery of several packages. Although you may be anxiously awaiting their arrival, remember thieves are also on the look out for delivered packages left unattended, especially during the holiday season.</p>
<p>Follow these tips to help keep your packages safe:</p>
<p>–Follow tracking numbers and sign up for delivery notifications so you know the current whereabouts of your package.</p>
<p>–Not going to be home? Ask a trusted family member or neighbor to be on the lookout for your delivery.</p>
<p>–Request the package be left out of view, perhaps behind a pillar, bench, or alongside the house.</p>
<p>–If available, request signature confirmation upon delivery.</p>
<p>–Ordered from Amazon? Secure Amazon lockers are available at various locations throughout the Santa Clarita Valley including Whole Foods and the Valencia Town Center Mall, among other locations.<a title="Permanent Link to LASD Warns Consumers of Package Thefts" href="https://scvnews.com/lasd-warns-consumers-of-package-thefts/" target="_blank" rel="bookmark noopener">source</a></p>
<h1 class="name post-title entry-title">SCV Sheriff’s Station Offers Tips On Avoiding Package Theft</h1>
<div class="entry">
<h3>With the past weekend marking the biggest online shopping time of the year for presents, the Santa Clarita Valley Sheriff’s Station is sharing tips on how to avoid packages being stolen this holiday season.</h3>
<p>“Although you may be anxiously awaiting their arrival, remember thieves are also on the lookout for delivered packages left unattended,” advised the SCV Sheriff’s Station.</p>
<p>The sheriff’s station offered the following tips for people buying online this year:</p>
<p>Follow tracking numbers and sign up for delivery notifications to be aware of the package’s whereabouts as it makes it’s way to your doorstep.</p>
<p>Ask a trusted family member or neighbor to be on the lookout for a delivery if you plan on not being home.</p>
<p>Request the package be left out of view, behind a pillar, bench or alongside the house to throw off any thieves.</p>
<p>If available, request signature confirmation upon delivery.</p>
<p>If ordering from Amazon, secure Amazon lockers are available at locations including Whole Foods and the Westfield Town Center Mall. Packages can be delivered there and picked up later.</p>
<p>By following these tips, shoppers can avoid package theft and have a happy holiday.</p>
<p><a href="https://www.hometownstation.com/santa-clarita-news/public-safety-2/scv-sheriffs-station-offers-tips-on-avoiding-package-theft-this-holiday-season-441082" target="_blank" rel="noopener">source</a></p>
</div>
<p>&nbsp;</p>
<h1 class="name post-title entry-title">Protect Packages From ‘Porch Pirates</h1>
<h3>Two “porch pirates” wanted in connection to a string of package thefts were taken into custody early Tuesday evening by an off-duty officer in Valencia, who was assaulted while making the arrest.</h3>
<p>Around 5:30 p.m. Tuesday, deputies responded to Sunset Hills and McBean Parkway in Valencia regarding a theft call, said Deputy Natalie Arriaga, spokesperson for the Santa Clarita Valley Sheriff’s Station.</p>
<p>“Upon arrival, deputies learned an off-duty officer with an outside agency observed a known vehicle from past porch thefts driving on Brookdale Court and Springtree Place in Valencia,” Arriaga said.</p>
<p>The officer began following the vehicle and identified the occupants of the vehicle as the suspects wanted for past thefts that had been seen in Ring doorbell footage near the end of November, according to Arriaga.</p>
<p>“The officer initiated a traffic stop on Sunset Hills and McBean Parkway in Valencia and notified the Santa Clarita (Sheriff’s) Station,” Arriaga said.</p>
<p>While contacting the occupants of the vehicle, the male adult driver attempted to flee in the vehicle while the officer was attempting to detain him, according to officials.</p>
<p>See Related: Deputies Cracking Down On Porch Pirates As Holidays Approach</p>
<p>However, the officer was able to remove the keys from the vehicle, according to officials. Deputies then arrived on scene and took the suspects into custody.</p>
<p>Upon searching the vehicle, deputies recovered several packages believed to be stolen from at least 10 different locations in Santa Clarita, according to Arriaga.</p>
<p>Tobia Gonzalez Sandoval, 25, from Van Nuys, was arrested for assault with a deadly weapon on a peace officer, a felony, as well as misdemeanor petty theft, Arriaga added.</p>
<p>The passenger, Yelin Lopez, 28, also from Van Nuys was arrested for misdemeanor petty theft.</p>
<p>The duo was transported to the Santa Clarita Valley Sheriff’s Station’s jail, with bail set at $70,000 for Sandoval and $0 for Lopez, according to arrest records. <a href="https://www.hometownstation.com/santa-clarita-news/crime/two-wanted-porch-pirates-taken-into-custody-by-off-duty-officer-in-valencia-360880" target="_blank" rel="noopener">source</a></p>
<p><img loading="lazy" decoding="async" class="wp-image-17358 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2024/03/Package-theif.jpg" alt="" width="517" height="506" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/03/Package-theif.jpg 1080w, https://goodshepherdmedia.net/wp-content/uploads/2024/03/Package-theif-400x391.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/03/Package-theif-1024x1002.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/03/Package-theif-768x752.jpg 768w" sizes="(max-width: 517px) 100vw, 517px" /></p>
<h3>Santa Clarita Valley Sheriff’s Station officials are warning of “porch pirates” ahead of the holidays and offering tips on how to keep packages safe.</h3>
<p>“Porch pirates” are thieves who steal packages from doorsteps, which increase during the holiday season, especially in a year when more residents are avoiding the shopping crowds.</p>
<p>“Did you get a chance to enjoy Cyber Monday?  Just waiting on those packages to arrive?  With all the excitement, we sometimes forget to be aware of ‘porch pirates,’” wrote Deputy Natalie Arriaga, spokesperson for the station in a public service announcement.</p>
<p>The threat of porch pirates is all too real, as the Los Angeles metro area was found to have the ninth-highest rate of porch theft in the nation, according to a study by security company Safewise.</p>
<p>To prevent package theft, Arriaga offers tips to make sure the holiday goes on without a hitch.</p>
<p>Deputies advise residents to consider delivering your package to your place of work if you can’t be home for daytime delivery.</p>
<p>In addition, it is recommended to follow tracking numbers, sign up for delivery notifications so residents know the current whereabouts of the package.</p>
<p>If the recipient is not going to be home, it is advised to ask a trusted family member or neighbor to be on the lookout for the delivery.</p>
<p>Request the package be left out of view, perhaps behind a pillar, behind a bench, or alongside the house.</p>
<p>Amazon also offers secure locker provided at various locations including Whole Foods, the Westfield Town Center Mall, among other locations.</p>
<p>“We will continue to do our part and conduct crime suppressions and extra patrol checks, but we ask for your help in being on the lookout for suspicious activity in your neighborhood,” Arriaga wrote. “Always report suspicious activity.”</p>
<p>&nbsp;</p>
<h1 class="name post-title entry-title">Deputies Cracking Down On Porch Pirates</h1>
<h3>Santa Clarita residents purchasing more gifts online this year due to the pandemic, Sheriff’s officials are offering tips to prevent packages from being stolen.</h3>
<p>With the newest stay at home orders in place, more individuals are purchasing holiday gifts online, according to a social post from the Santa Clarita Valley Sheriff’s Station.</p>
<p>Now with most sellers providing tracking on most packages, residents are being encouraged to not leave delivered items out for too long.</p>
<p>“Be aware of delivery dates and remove packages from your porch as quickly as possible,” Santa Clarita Valley Sheriff’s officials. “If you’re not home, ask a neighbor if they can retrieve your items.”</p>
<p>With most mail being delivered during daytime hours, officials recommend having packages delivered to your workplace. Other options include utilizing secure locker pickup locations offered by some companies.</p>
<p>Residents are also able to sign up for Informed Delivery, a program that allows residents to see what mail is being delivered even before making a trip to the mailbox.</p>
<p>The postal service takes pictures of mail as it is scanned at their facilities, and then shares those digital images with residents for free in a daily email.</p>
<p>This way, residents can be aware of important mail that is being delivered, and avoid leaving important items in the mailbox or on their porches.</p>
<p>For residents who may be a victim of a package theft, are encouraged to make a police report, according to officials.</p>
<p>For Santa Clarita Valley residents who own a video surveillance system that captures images of a “porch pirate,” Santa Clarita deputies urge residents to contact the Santa Clarita Valley</p>
<p>Sheriff’s Station, and resist the urge to immediately share on social media community groups, as it may hinder detectives’ investigations.</p>
<p>In some cases, it has been found that video capturing possible criminal activity is being shared on social media, but yet has not been officially reported.</p>
<p>Deputies from the Santa Clarita Valley Sheriff’s Station have also been conducting undercover investigations, placing packages near doors and having undercover units waiting by for an arrest if the package is stolen, Sheriff’s officials said in a tweet. <a href="https://www.hometownstation.com/santa-clarita-news/crime/deputies-cracking-down-on-porch-pirates-as-holidays-approach-359500" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
