Shadow Government

December 15th, 2009

It is time for a FIRST Wild Card Tour book review! If you wish to join the FIRST blog alliance, just click the button. We are a group of reviewers who tour Christian books. A Wild Card post includes a brief bio of the author and a full chapter from each book toured. The reason it is called a FIRST Wild Card Tour is that you never know if the book will be fiction, non~fiction, for young, or for old…or for somewhere in between! Enjoy your free peek into the book!

You never know when I might play a wild card on you!

Today’s Wild Card author is:
Grant Jeffrey

and the book:

Shadow Government

WaterBrook Press (October 6, 2009)

***Special thanks to Staci Carmichael of WaterBrook Multnomah Publishing Group for sending me a review copy.***

ABOUT THE AUTHOR:

Grant R. Jeffrey is the internationally known prophecy researcher, Mideast expert, and author of Countdown to the Apocalypse, The New Temple and the Second Coming, The Next World War, and twenty other best-selling books. He is also the editor of the Prophecy Study Bible. His popular television program, Bible Prophecy Revealed, airs weekly on TBN. Jeffrey earned his master’s and PhD degrees from Louisiana Baptist University. He and his wife, Kaye, live in Toronto.

Visit the author’s website.

Product Details:

List Price: $13.99
Paperback: 240 pages
Publisher: WaterBrook Press (October 6, 2009)
Language: English
ISBN-10: 1400074428
ISBN-13: 978-1400074426

ISLAND BREEZES

The book scared me.  I’ve read about this technology, but I had no idea just how extensively it’s being used world wide.

If you are a U.S. citizen, you probably think you have the right to privacy.  It’s guaranteed in the constitution or something, isn’t it?

WRONG!  Your privacy is already being sucked away.

The National health care debate leaves one little detail out.  That health care card may just end up being your national ID card.

Be afraid, people.  Be very afraid.  Big Brother really is watching you.

AND NOW…THE FIRST CHAPTER:

Part 1

TECHNOLOGY

THAT DESTROYS

YOUR PRIVACY

Chapter 1

YOU HAVE NO MORE PRIVACY

In the War Against Privacy, You Are the Target

An undeclared but very real war is being waged on your privacy and freedom. Your movements, personal communications, preferences, loyalties, habits—all these things are no longer private. And in spite of the fact that our privacy and liberty are under attack on multiple fronts, the average citizen in the Western world seems blissfully unaware of the threat.

We assume that our privacy, “the right to be left alone,” is secure. We couldn’t be more wrong. High-tech surveillance methods used by governments responding to the threats of terrorism, drug trafficking, tax evasion, and organized crime are stealing one of your most basic human rights—the right to privacy, the right to be left alone.

THE ALL-SEEING EYES

An interesting metaphor for the invasive surveillance society is found in a fascinating proposal for eighteenth-century prison reform. In 1785 philosopher and legal reformer Jeremy Bentham advocated that the English government build a state-of-the-art prison to more efficiently observe and guard dangerous prisoners with twenty-four-hour surveillance. Bentham’s proposed Panopticon prison called for the use of optical instruments and mirrors to allow a very small team of guards stationed in a central tower to observe hundreds of prisoners. Bentham’s system was designed in such a way that prisoners would never know when they were under active surveillance.

The idea was that the fear of continuous surveillance would motivate inmates to police their own behavior. Tragically, the practical application of Bentham’s nightmare vision is becoming reality in the twenty-first century. Advanced surveillance technologies available to government, corporations, and even your neighbors have created a twenty-four-hour, 365-day, total-surveillance society—the same system that would have violated the privacy of British prison inmates in 1785.

The current British home secretary, Jacqui Smith, exercises political control over all UK counterintelligence operations. This includes Scotland Yard’s

Counter Terrorism Command, the Security Service (MI5), and Government Communications Headquarters (GCHQ), the British government’s global eavesdropping operation. Smith is working to establish an enormous computer database that would collect for analysis every telephone call, all Internet searches, and all e-mails being transmitted within or outside of the United Kingdom.1

Your Life on Camera

Smith’s plans are but one manifestation of the all-seeing, all-hearing surveillance. The installation of closed-circuit television (CCTV) cameras in public places makes our daily activities, including our private interactions, a matter for close examination by unseen observers. My wife, Kaye, and I conducted a research trip in the United Kingdom in 2008. Although I had previously documented the massive adoption of CCTV by local councils and national authorities in the UK, I was stunned to see the extraordinary expansion of that type of surveillance. By the end of 2008, millions of CCTV cameras were monitoring the activities of every citizen and visitor in the country. The United Kingdom, the mother of Western political freedom and democracy, is now the most obsessively watched society in the West.

Surveillance cameras followed us during every step of our passage through UK customs and British immigration at Heathrow Airport. And it didn’t stop there. We were on camera as we acquired a car at the rental car agency office and as we proceeded out of the airport parking garage. As we entered the main highway, we noticed traffic-control cameras monitoring virtually every mile and covering every road, even in small towns. More than two thousand car-recognition cameras capture photos of cars, license plates, and drivers along with their passengers. Cameras recorded us as we purchased gas and food. Recent estimates by British authorities suggest that citizens and tourists alike will be captured on camera an average of five hundred times every day. Even London’s city buses are outfitted with an astonishing sixty thousand cameras, in addition to the ten thousand CCTV cameras on subway cars and trains.

But despite the almost universal presence of CCTV, even in back alleys, law enforcement authorities report that the cameras have not suppressed violent crime as much as they have displaced it. Surveillance cameras motivate criminals to move their activities a few blocks away—to a location with less-active CCTV surveillance.

A few years ago a million CCTV systems were operating in the United Kingdom. However, a 2008 article in the Guardian stated that an astounding 4.2 million CCTV cameras were being used in the surveillance of UK citizens and tourists.2

Cameras That Hear

It now goes far beyond simple cameras mounted on utility poles. Scientists have developed “listening” cameras that, paired with artificial intelligence software, recognize particular sounds such as gunshots, car crashes, and breaking glass. In response to certain sounds, the camera rotates and captures what could be a criminal or terrorist act. Despite the enormous financial cost and the invasiveness of the CCTV system, a report by the UK Home Office concluded that better street lighting is seven times more effective in preventing crime.

If watching you and listening to what you are saying is not enough, some new versions of CCTV technology enable police supervisors to confront you verbally through a speaker system. Law enforcement personnel can issue an immediate warning if they feel you are engaging in illegal behavior. And just in case all of this has not been disturbing enough for you, some UK municipalities are broadcasting local CCTV coverage on television. They ask citizens to tune in and watch so they can inform on the activities of their neighbors. Welcome to the world of block informers, a system you thought was limited to the horrors committed by the Nazis, the Soviets, and Communist China.

CCTV surveillance doesn’t end with cameras posted in public places. Miniature security cameras designed to promote safety and control crime on private property are now used for vastly expanded purposes. Companies use CCTV for the continual surveillance of employees during work-hours. They are observed at their desks, in washrooms, and throughout the office area. Employers justify the spying operations against employees, vendors, clients, customers, and visitors as a way to combat theft and industrial espionage. No matter what reasons are used to justify the surveillance, you are losing your privacy in just about every setting imaginable.

We live in a total surveillance environment that closely resembles the horror described by George Orwell in his famous novel 1984. Orwell described a future global regime composed of three totalitarian governments. In comparison to his horrific vision, computer technologies developed in the last few decades have created a daily environment far more threatening than any faced by the character Winston in 1984.

THEY KNOW EVERYTHING ABOUT YOU

The loss of privacy goes far beyond having your public activities monitored on camera. Scott McNealy, CEO of Sun Microsystems, declared some time ago that “privacy is dead, deal with it.”3

There are legal means that individuals and businesses can use to acquire and store information about you, obtained from your use of the Internet and even from such ordinary activities as shopping for groceries, buying a movie ticket, or ordering items online. You might think that you don’t provide information to governments, law enforcement agencies, and marketers. However, you are dispensing vast amounts of personal information every time you use a check, credit card, or debit card. Every time you make a purchase using these forms of payment, you supply information on your bank account, financial history, buying habits, and product preferences.

It seems that no information about you is insignificant. Your Internet searches, your online shopping, the e-mails you send, and the Web sites you access—all of these are of interest to someone. The subjects that attract you, the causes you support, your brand preferences, the topics you research on the Web, your reading habits online—all of these are important to Web site operators. Everything you do on the Internet, including visiting Web sites and chat rooms, sending and receiving e-mail, researching health issues and medical questions, and shopping is permanently recorded in a computer database. Google, the most popular Internet search engine, has admitted that it gathers and stores information on every one of the more than 330 million Internet searches completed every day.

What’s more, every e-mail you’ve ever sent or received and all the online searches you have completed are available to police and intelligence agencies. Who is so careful in what they say in private e-mails that they would never include a statement that might someday be considered suspicious to certain government authorities? And who considers the potential damage to their future career plans or credit rating that could result from research they have done using the Internet? For example, an innocent medical search to gain information about a disease such as Alzheimer’s, even if you are doing the research for a relative or friend, could be accessed by an investigator during a background check when you apply for a job. Even the possibility of a link between a prospective employee and a devastating disease could be sufficient cause to reject your employment application.4

Your Entire History on Exhibit

Attacks on privacy are not new. Beginning in 1917, after destroying the first elected government of Russia, the new communist dictatorship of Lenin began a process of secret police surveillance of its entire society. Even in the democratic nations of the West, government intelligence and police agencies created a surveillance system to monitor citizens’ activities. Prior to this war on privacy, only the few individuals suspected of criminal activity, sabotage, or sedition were considered worthy of police surveillance. But now, with rapid advances in sophisticated surveillance devices and computer technologies, most national governments have developed an intense interest in every citizen. Governments gather enormous amounts of previously private information on the assets, activities, communications, financial transactions, health, and political and religious activities of virtually every person on earth—and with relative ease.

Many military intelligence agencies, government agencies, and large corporations have introduced sophisticated security systems requiring employees to wear a badge containing a radio frequency identification microchip. This RFID chip enables companies, agencies, and organizations to monitor the location and activity of every worker during every moment he or she is on the premises. When an employee enters the office, a computer records the exact time and begins monitoring his or her every move throughout the day. Security sensors at strategic locations throughout the office complex record the location and duration of the activities of the badge wearer.

Many office phone systems monitor all private phone calls made by employees while at work. Computerized phone systems maintain a permanent record of all known phone numbers of clients, customers, and vendors. If an employee places a personal call, the phone system records the unauthorized number and produces a report of the employee’s private calls, along with the duration of such calls. This data can be used against the employee at the next performance evaluation.5

It’s interesting that U.S. corporations are using secret employee surveillance more than businesses in any other nation. The American Civil Liberties Union has warned, “Criminals have more privacy rights than employees. Police have to get a court order [to eavesdrop on suspected criminals], whereas in the workplace, surveillance can be conducted without safeguards.”6 Computer network security supervisors in many companies go as far as to monitor the keystrokes and productivity of all employees who use a computer in their work. Employees often complain about the stress they experience knowing they are being monitored constantly throughout the day. In many companies, computer spy ware monitors an employee’s Internet activities. Add to this the growing use of random drug testing, secret cameras in washrooms, and intrusive psychological questionnaires. The bottom line is that companies are creating an adversarial and unhealthy psychological environment for workers.

You should be appalled to know that your local and state police, federal intelligence agencies, government officials, employers, and even curious neighbors and business competitors can acquire virtually all of your private information. A record of your travel destinations, the newspapers and books you read, your video rentals, your pay-TV choices, your traffic tickets, your medical tests, as well as your private purchases are recorded in computer files. Anyone with enough computer knowledge can access your information, legally or not.

There is a growing public awareness and concern about the numerous attacks on our privacy through the misuse of computer records. However, the United States Congress and Canada’s Parliament have failed to enact serious laws to protect the privacy of citizens’ medical, criminal, and financial records.

Your Secret Life Now on Camera

Security companies that work under contract for large corporations have found ways to make use of advances in surveillance devices. Virtually invisible pinhole cameras can be placed behind a wall to monitor everything that goes on in an adjacent room, both visually and audibly. The tiny lens, which is the size of a pinhead, is unnoticeable. Infrared cameras can record images silently and in near-total darkness. Another type of surveillance camera can be concealed in a mobile telephone, recording events through the tiny hole normally used for the microphone. This tool often is used for industrial espionage, stealing trade secrets from a competitor. It is also useful in gaining the upper hand in business negotiations. For example, during a face-to-face meeting in a protracted negotiation, the user of the cell phone can leave the phone in the boardroom when he exits to take a break. As the other team discusses their strategy, supposedly in private, the cell phone is recording the conversation.

Surveillance devices are also being used much more widely by individuals. For several hundred dollars, you can obtain a device that enables you to monitor every conversation that takes place in your home or office while you are away. A remote monitoring device known as the XPS-1000 allows you to listen to conversations in your office or home by using the telephone. From a remote location, you dial your phone number using a secret activation code. The phone will not ring, but from that moment on, you can monitor every sound in the room where the phone is located. Another tiny device, a micro transmitter powered for three months by a miniature battery, can be left in any room and will broadcast for a distance of up to one thousand yards to a hidden radio receiver–tape recorder.

While fascinating, the miniaturization of cameras, microphones, and recording devices has stolen what was left of our privacy. If a person is determined to monitor your activities, you can’t prevent it. You can try to guard your privacy by using a software program or device designed to protect your communications. But in doing so, you will have inadvertently alerted intelligence agencies and private investigators that you have something worth keeping private. This may cause them to increase the level of surveillance in an attempt to discover why you want to avoid it.

Abuse of Legitimate Data

All U.S. intelligence agencies, including the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) and the Federal Bureau of Investigation (FBI), can access data from the National Identification Center to identify and monitor every registered gun owner in the United States. However, we have to ask this question: what else will government agencies pursue using legitimate and legally acquired data?

Two of America’s most secretive agencies, the National Reconnaissance Office (NRO) and the National Security Agency (NSA), maintain a massive global surveillance system known as Project Echelon. This system can monitor every telephone call, fax, Internet search, and e-mail transmission worldwide. (We will look more closely at the remarkable capabilities of this massive surveillance system in chapter 5.) We need to face the sobering truth that we can’t escape the growing surveillance capabilities of all governments, both East and West. These developments turn our attention to the last-days prophecy from the book of Revelation about a coming totalitarian police system. John warned that a person’s every activity will be controlled: “That no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name”

(Revelation 13:17). Remarkably, John was describing a universal population control system that would impose some kind of numerical identification on every person in order to monitor his or her financial transactions, trade, business, and ability to buy and sell. This system will enable law enforcement authorities working for the Antichrist and his partner, the False Prophet (see Revelation 13:16), to control the world’s population through a unique ID, based on the number 666, on everyone’s right hand or forehead. The recent subcutaneous pet identification chips could easily be inserted in each human being.

WHO WANTS TO CONTROL YOU?

Government authorities, national security agencies, and businesses that market and sell consumer products know far more about you than most of your friends and family will ever know. People you will never meet have compiled personal information about the details of your daily life, place of residence, type of residence, spending habits, and financial assets. Government agencies justify the invasion of your privacy by reminding us of the threats posed by international terrorism, organized crime, the influx of illegal immigrants, and citizens who defraud the government as welfare cheats or tax evaders.

The NSA possesses detailed records of millions of U.S. citizens, including your communications, health status, medical treatments, employment status, vehicle ownership, driving record, criminal record, and real-estate holdings. In addition, all of your credit records, banking and financial transactions, credit rating, educational transcripts, and travel records are available to many major corporations and government research institutes.

Your life is also of great interest to foreign governments. Most of the Western democratic governments, as well as the governments of China and Russia, are thought to maintain enormous computer databases filled with details about millions of U.S. citizens. Data storage is just the first step. Next will be the most effective ways to organize, categorize, and use this private information. This hurdle will be removed when the government assigns a unique identification number to each citizen. Once that is accomplished, the staggering number of separate files on individual citizens in various databases can be combined into a single massive intelligence file. (We will talk more about this process in chapter 3.)

A confirmation of the consolidation of citizen data was publicized in the Canadian press on May 19, 2000. The Canadian government reluctantly confirmed that up to two thousand significant pieces of information had been assembled on virtually every Canadian citizen in a massive database known as the Longitudinal Labor Force File. As a result of strident public criticism following these revelations, the Canadian government promised to destroy the computer program that linked these files. However, the federal government admitted they still will retain computer data on more than thirty million Canadians— data that are retained in separate computer files held by a variety of government departments, including the Canadian Security Intelligence Service (CSIS), Royal Canadian Mounted Police (RCMP), Immigration, and provincial police forces.7

A SECRET CHIP IN YOUR CREDIT CARDS

Your credit and debit cards are much more than a convenient way to pay for goods and services. The magnetic strip on a credit card or debit card holds electronic data verifying your identity, as well as information validating your right to access particular computer databases, such as your bank accounts. More and more, these cards are being replaced by higher-security smart cards that contain even more information about you. A smart card contains an embedded RFID chip capable of holding millions of times more digital information than is contained in a card’s magnetic strip.

Smart cards provide high levels of security, since they are capable of storing biometric information, such as the iris pattern in the eye of the authorized user. These new cards will document the user’s identity by measuring 173 distinct characteristics from the rings, burrows, and filaments within the iris. The stored data is compared with an iris scan made by a surveillance camera that can read your iris pattern from a distance of several yards.

Other identifying data include your precise hand geometry, which involves identifying you by measuring the length of your fingers and the translucence and thickness of your skin. Infrared scanners can reveal and record the patterns of veins on your palm or the back of your hand. Voice-recognition software can confirm your identity through digital measurement of your voice tone and timbre. Incredibly, a new machine can puff air over the back of your hand, analyze your subtle body odors, and detect as many as thirty separate trace chemical elements that supply a positive identification reading.8 All of this data, and more, can be stored in an RFID chip.

Soon you will be able to replace your credit and debit cards with one very secure smart card that is virtually immune to counterfeiting and attacks by hackers. The data will be encrypted, and your unique passwords—including biometric information—will be required for you to use the card. More than two and a half billion radio frequency smart cards now in use worldwide can perform these functions:

cash transactions such as rechargeable stored-value cards that carry a predetermined monetary value
confidential transferring of medical data to paramedics and hospital in the event of a medical crisis
control of entry into high-security workplaces and computer systems
access to air travel as well as to trains, subways, and buses

These are some of the benefits of the smart card.9However, the growing use of RFID cards will make it possible for government, police, and intelligence agencies to track the activities, location, communications, and financial transactions of every citizen from cradle to grave.

AN INTERNATIONAL STANDARD FOR PRIVACY

Growing concerns over privacy have motivated representatives of member nations of the European Union (EU) to create an international standard for privacy. The basic rules are as follows:

All privacy regulations apply to both government and private organizations.
Data collection should be limited to that which can be obtained legally and with the knowledge and consent of the citizen subject, except where this is impossible or inappropriate (e.g., criminals).
Data sought on individuals should be limited to the original purpose and kept up to date. The purpose of data collection should be specified, and subsequent use of data should be limited to the original purpose.
No personal data should be disclosed to others without the consent of the subject or without a court order.
All personal data must be kept secure using all reasonable precautions.
All citizens should be able to access, review, and challenge inaccurate data held in databases.
The government agency controller of the database should be legally and criminally accountable for abiding by these privacy principles.
The policies and practices of organizations holding databases on individuals should reveal the information to those who legally inquire.
Private data collected by EU member corporations and states may not be transmitted to organizations in nations that do not have privacy regulations equal to those of the European Union.10

The introduction of similar legislation in America, Canada, and other democratic nations could provide significant protection against the abuse of our privacy. The Organization of Economic Cooperation and Development (OECD) is an international group of twenty-nine developed nations from North America, Europe, and Asia that has suggested the creation of powerful, binding privacy standards for both governments and businesses.11

The reality is that the growing attacks on our personal security are rapidly overwhelming the proposed defenses. One potential solution is to use a smart stored-value card that would allow a person to make a payment while the card restricts the merchant from accessing the purchaser’s identity. The card would also prevent merchants and anyone receiving an electronic funds transfer from tracking previous purchases made by that customer. For example, a smart card developed by Mondex International allows customers to transfer funds from their card to a merchant’s account to make a purchase. However, when the merchant’s bank accepts the transfer of funds to cover purchases made using Mondex cards, the bank is not able to identify the actual purchasers. A similar system is used by Visa International in its Visa cash card. The disposable card does not permit merchants to identify the person who used the card.

WHAT YOU CAN DO

There are hopeful signs that, after years of indifference to the threats to our privacy and financial security, the public is awakening to the heightened dangers posed by new surveillance technologies.

When it was revealed that Intel Corporation had embedded in every Pentium III chip a secret serial number that would allow the person using the computer to be identified, customers and privacy groups launched a protest.12 Additionally, Microsoft had embedded a hidden identification number in all documents produced by any computer using Microsoft software. The protests that followed forced the company to provide a free software program that eliminated the identifying number.13 However, the vast majority of computer users of Microsoft software are unaware of the privacy problem, and most lack the expertise to fix it.

If we are to protect what little privacy we still have, we should encourage a healthy debate about the relative advantages and disadvantages of each new technological development. Citizen involvement and thoughtful protest against the governmental and corporate threats to our privacy can slow down this relentless attack. We need to defend our right to maintain a personal life that is free from outside interference and intrusion.

Still, in violation of constitutional guarantees to the contrary, our society continues to move toward an all-encompassing surveillance society, which is described in the prophecies of the book of Revelation. We will live to see the time when our right to privacy and the freedom to be left alone are nothing more than distant memories.

Samech – God’s Law: a Hiding Place

December 13th, 2009

                                I hate the double-minded, but I love your law.

You are my hiding place and my shield’ I hope in your word.

Go away from me, you evildoers, that I may keep the commandments of my God.

Uphold me according to your promise, that I may live, and let me not be put to shame in my hope.

Hold me up, that I may be safe and have regard for your statutes continually.

You spurn all who go astray from your statutes; for their cunning is in vain.

All the wicked of the earth you count as dross; therefore I love your decrees.

My flesh trembles for fear of you, and I am afraid of your judgments.

Psalm 119:113-120

Bouncing Back

December 10th, 2009

                                                            I’m finally bouncing back.  I’ve been under the weather, fighting a case of bronchitis.  Last night was the first time I left the island since Friday night.  My supervisor was bouncing off the walls along with the clients.  The other night nurse in my unit quit Saturday morning and she was pulling out all stops for replacements for the two of us.

I promised I would drive back across the bridge last night.  I actually didn’t feel too bad, but would have liked to just blow off the entire week and get my oomp all back together.  Right now I’m falling asleep at the computer.  I’ve already taken my medication and am ready to snuggle in.

I’ll be dreaming sweet dreams of Consumer Man.  He’ll be back on the island Friday night, and I’m really looking forward to some quality time with my sweetie.

Nun – God’s Law a Lamp to the Feet

December 6th, 2009

                                                     Your word is a lamp to my feet and a light to my path.

I have sworn an oath and confirmed it, to observe your righteous ordinances.

I am severely afflicted; give me life, O Lord, according to your word.

Accept my offerings of praise, O Lord, and teach me your ordinances.

I hold my life in my hand continually, but I do not forget your law.

The wicked have laid a snare for me, but I do not stray from your precepts.

Your decrees are my heritage forever; they are the joy of my heart.

I incline my heart to perform your statutes forever, to the end.

Psalm 119:105-112

Essie in Progress Review

December 6th, 2009

Essie has her hands full.  Even though I no longer have small children at home I can identify with her.  It’s so easy to lose your focus when life is busy crashing in all around you.

Essie definitely has “interesting” family members and friends.  One of them lives on a boat, so you know he grabbed my attention right away.  Another one collects disciples and apostles. 

While being entertained by this cast of characters, you are actually on a journey with Essie.  She, like all of us, is a project in progress, and she makes us chuckle while viewing her progress. 

Grab a copy of Essie in Progress, and find out why I love all these people.

Essie in Progress

December 4th, 2009

It is time for a FIRST Wild Card Tour book review! If you wish to join the FIRST blog alliance, just click the button. We are a group of reviewers who tour Christian books. A Wild Card post includes a brief bio of the author and a full chapter from each book toured. The reason it is called a FIRST Wild Card Tour is that you never know if the book will be fiction, non~fiction, for young, or for old…or for somewhere in between! Enjoy your free peek into the book!

You never know when I might play a wild card on you!

Today’s Wild Card author is:
Marjorie Presten

and the book:

Essie in Progress

Kregel Publications (April 1, 2009)

***Special thanks to Marjorie Presten for sending me a review copy.***

ABOUT THE AUTHOR:

Marjorie Presten is a native Georgian who has her own fair share of experience juggling career and motherhood. She lives outside of Atlanta with her husband, Tom, and their three children.

Listen to a radio interview about the book HERE.

Product Details:

List Price: $13.99
Paperback: 320 pages
Publisher: Kregel Publications (April 1, 2009)
Language: English
ISBN-10: 082543565X
ISBN-13: 978-0825435652

AND NOW…THE FIRST CHAPTER:

Prologue

1972

In a thirty-second phone call, Hamilton Wells would make a decision that would earn him more money than he could spend in his lifetime. Everything was on the line, but he was not nervous, euphoric, or eager with anticipation. In Hamilton’s mind, the matter was not speculative, debatable, or anything less than a sure thing. Hamilton had the gift, and it had never let him down. Yet even before he made the call, he knew money wouldn’t cure the unrelenting pain of his grief. He sat at his desk with only a single orange banker’s lamp for illumination and cried silently.

Her death had been inevitable, but feelings of helplessness still overwhelmed him. His young son’s dependency on him only multiplied his grief and anger. Six-year-old Jack Wells had insisted his father do something to help Mama, but the only thing Hamilton could do was sit at her bedside and try not to cry. Now it was six weeks after her death, and Hamilton knew his son needed him to be strong, to return life to normal. A neighbor had enrolled Jack in the local church baseball league. They played a game every Wednesday afternoon. It will be good for him, they’d said. Life has to go on.

Hamilton cradled his head in his hands and groaned. The enormity of the risk he was about to take didn’t concern him. It was purely mechanical. He would surrender all he owned for just one more blissful afternoon at the lake he and his wife both loved, but now that was impossible. His wife was dead. Nothing he could do would change that.

He remembered the book of Job. Would a loving and caring God do this to the love of my life? Well, he did, Hamilton thought bitterly. Earline had lingered for months. The doctors said it was miraculous that she had endured as long as she had. Be grateful for these last days to say goodbye, they’d said. But for Hamilton, the prolonged end only added anger to his bottomless sorrow. Standing alongside his son as a helpless witness to her slow deterioration and suffering in the final weeks was more than he could bear. It was the worst time of Hamilton’s life. Nothing really mattered anymore, and it seemed he had nothing left to lose.

Under different circumstances, he might have played it safe and put the proceeds away for his son’s education, bought a new house, or perhaps invested in a bit of lake property. He could have become like the rest of the players and worn monograms on his starched cuffs so everyone could remember whose hand they were shaking. Instead, he had gone it alone. His brokerage business had few clients. He was the only big player left. Now he planned to risk everything on something happening on the other side of the world.

Ham couldn’t remember exactly when he had recognized his innate ability to pick the winner out of a crowd. It had always been there, ever since he was conscious of being alive. The talent had blossomed in the military when the card games occasionally got serious. Now, with every dollar he had to his name, Hamilton approached wheat futures with that same instinct. The Russian harvest had been a disaster, and the United States was coming to the rescue. The price of wheat was going to go through the roof, and then through the floor. He was going to make a fortune on both ends.

He picked up the phone and dialed a number on the Chicago Mercantile exchange. He listened for a few moments as the connection was made. Young Jack tugged at his father’s shirtsleeve. “Pop? Can we go now?” Jack held a baseball in his hand and a glove under his arm. Hamilton swiveled his chair, turning his back to his son.

A familiar voice announced his name. “How can I help you?”

“It’s Ham,” he said. “Short the entire position.”

“What? Everything?” the voice asked.

“Everything.” No emotion colored his voice.

Young Jack crept gingerly around the chair to face his father. “Pop,” he whispered, “come on, the game is about to start.” Hamilton shook his head and looked away.

The voice on the phone was still talking. “Most folks are still enjoying the ride, Ham. You could get hurt.”

“It’s not going a penny higher. Short it all.”

“Don’t say I didn’t warn you.”

“Warn me? My wife is dead. What else matters?”

The voice mumbled something about her passing.

“She didn’t pass. She’s dead. Just do what I ask.”

“OK, Ham.” The phone disconnected.

Jack was standing there in front of him, shoulders slumped. The ball hung loose at the end of his fingers, and the glove had fallen on the carpet. “Pop, can we go now?”

“Sorry, Son. Not today.”

“It’s not fair!” Jack erupted. Hot tears sprang up in his eyes. “What am I supposed to do now?”

Ham looked down, silent.

Jack hurled the ball to the floor, wiped his tears angrily, and stormed out of the house.

Ten minutes later on the futures board, wheat ticked down.

It ticked down again.

And so it would continue. Ham would be richer than he’d ever imagined. He’d never experience another financial challenge for the rest of his life. It was not really important, though. Scripture came back to him: “what good is it for a man to gain the whole world, yet forfeit his soul?”

He would trade it all to have his love, his life, back again.

But that was not an option.

Out his window, Ham could see young Jack riding his bicycle furiously down the street. He watched with a passive surrender as his son’s small frame shrank into the distance.

The Unfinished Gift

December 1st, 2009

Well, we started out good with this one.  A grumpy old man.  I’ve read fourteen chapters already and he’s still a grump. 

The chapters aren’t that long, so they are going rather quickly.  I am enjoying this book.  I’m starting to see things that might happen if my imagination is going in the right direction. 

I need to get back to my book.  I just thought that I would go ahead and post this excerpt now.  I’ll give you an update before the week is out to let you know just what I really think about Ian Collins.  I’m not sure he’s going to shape up quite as well as Betty in The Christmas Dog.

UPDATE

I finished the book.  The possible endings I had imagined didn’t happen, although they could happen in the future.  It was a surprise that was even better. 

As to what I think about Ian Collins.  I’m not going to tell you.  You know the drill.  Go out and buy the book. 

Also, have that box of tissues handy.  I needed a bunch.

***Special thanks to Donna Hausler of Revell, a division of  Baker Publishing Group for sending me a review copy.***

The Unfinished Gift

Available at your favorite bookseller from Revell, a division of Baker Publishing Group

Finding Christmas

December 1st, 2009

  Here’s an excerpt from another Christmas book.       

 

 Finding Christmas

You can find out more about this book at Revell.  Available at your favorite bookseller from Revell, a division of Baker Publishing Group.

The Christmas Dog

November 30th, 2009

  I didn’t like Betty. I really didn’t like Betty. Then there was that mangy mutt. Also, that questionable person who moved into the neighborhood and started turning his yard into a dump site.

Yeah. Happy Holidays and Merry Christmas to you, too.

I wasn’t sure how that was all going to work together so that I would like Betty by the end of the book, but it did.

I still haven’t read a book by Melody Carlson that I don’t like. This one will warm your heart and make you smile.  It will make a terrific gift (one you’ll want to read before you wrap).  Check it out.

***Special thanks to Donna Hausler of Revell, a division of  Baker Publishing Group for sending me a review copy.***

The Christmas Dog

Available at your favorite bookseller from Revell, a division of Baker Publishing Group

Mem – The Love of God’s Law

November 29th, 2009

View Image  Oh, how I love your law!  It is my meditation all day long.

Your commandment makes me wiser than my enemies, for it is always with me.

I have more understanding than all my teachers, for your decrees are my meditation.

I understand more than the aged, for I keep your precepts.

I hold back my feet from every evil way, in order to keep your word.

I do not turn away from your ordinances, for you have taught me.

How sweet are your words to my taste, sweeter than honey to my mouth!

Through your precepts I get understanding; therefore I hate every false way.

Psalm 119:97-104