How America Could Reduce Fiscal Deficit And Be More Competitive


Globally, people marvel at America’s ingenuity at representing a microcosm of the ability of the human race to team-work while downplaying their diverse ethnicity and creed.

However, the stunning fact that the great Uncle Sam has amassed a whooping deficit of 14.3 trillion dollars in the dawn of the 21st Century has been a shocking revelation to admirers of ‘God’s own country’.

The tone of national political discus has been raised by several notches by rhetorical politicians who seem to be placing ideology and radically entrenched positions over sound economic policies.

But the parochial interests of a few powerful group of lobbyists, politicians and the military-industrial-political complex has now began to erode the framework of America’s economic and socio-political stability. The dope and vice addiction of the underclass has also exacerbated the problem.

Is a wholesome capitalistic system a la Adam Smith the path to choose? Or is there any wisdom in the treatise of Karl Max? Should America be a welfare state?

To be honest with all patriotic Americans who care to read this article, expect a bleak and gloomy economic prognosis if there is no balance between the hawkish ‘no tax’ stand of the Tea Party and the ‘full-speed-welfare-spending’ of the Democrats.

What can be done?

Below are suggestions on what America could do to steer herself out of the current seemingly intractable financial situation.

• Increase or reduce corporate taxes by finding a balance between basic defense spending vis-à-vis government expenditure in time of war and peace.

• Make more peace treaty and less war declaration, rely more on diplomacy than gun-boat ‘us-against-them’ foreign policy.

• Treat deficit, social security fund and other volatile economic issues under National Security, i.e. congress discus on the issue should be done in camera.

• Enforce Trade Laws and encourage CEOs and other Captains of Industry to undergo compulsory continuing education on collective responsibility to America’s economic well-being.

• Continue the march to achieve the Adam Genome Theory which states that racially homogenous societies have no future and are hotbeds for future conflicts.

• Stop the blame game.

• Revamp transportation, electricity and telecommunication systems.

• Intensify the use of the internet for healthcare transactions.

• Circumvent bureaucracy by speeding up procedures and approval of all company formation, contracts and projects on the economy.

• Make the economy more inclusive.

• Reduce dope addiction and food stamp dependency in the society.

• Make cash, equipment lease and loans available for start-ups.

• Re-orientate the Lobbyists-Military-Industrial Complex about the dangers inherent in tax evasion, unholy outsourcing, over profiteering, short selling, inside trading and scams.

• Government and Private establishments should provide free business consultancy for transactions like mergers, takeovers and start-ups.

• Streamline educational curriculum to emerging job opportunities to achieve a balance.

• Encourage the production of generic medicines and patent-expired items or devices the can. outsell US competitors globally.

• Make strong inroad into the global textile market.

• Produce more organic foodstuff and make stricter laws for the introduction of GMO foods into human food chain.

• Use America’s ethnic diversity and multiculturalism to get a larger slice of the world economy.

• Create jobs around graduates who can employ the unskilled.

• Provide easier career switching schemes for the citizenry.

• Find human chores in solely robotic factories to provide employment for people.

• Make peace and economic pacts with at least two-thirds of states worldwide.

• Undertake talent hunt and make fund available to ease the burden of translating ideas into marketable products.

• Look at economic issues from a global and not parochial perspective.

• Encourage Venture Capitalists to fund certain portfolios that could create more jobs.

• Reduce outsourcing of labor.

• Compete in all global markets, i.e. rich, middle-income and developing countries.

• Reduce redundancy, dope peddling, gambling and other unproductive vices among the citizenry by persuasive techniques.

• Ensure zero unemployment i.e. the state and federal government should provide the unemployed with menial jobs rather than giving them food stamps.

• Ensure that food stamps are only issued to poor widows, orphans, tramps and genuinely wretched people.

• Ensure that your economic think-tank forums include contributors from all schools of thought and not limited to graduates from prestigious schools, Wall Street, Politicians, rich people, lobbyists and members of the Military-Industrial Complex.

To compete with Asia, America needs to place emphasis at creating jobs for its citizenry. These effort is seriously undermined by the menace of drugs and widening gap between the haves and have nots.

When Americans put men of wisdom and integrity at the helm of affairs rather than rely on a clique of profit driven hawkish individuals and over hyped advanced technology, then the country would continue to maintain her greatness.

Kindly pass on this article to all politicians and Captains of Industry in America today.

http://27thcentury.wordpress.com

Article Source: http://EzineArticles.com/?expert=Akintunde_M_Lawal

Article Source: http://EzineArticles.com/6532679

free read 20% ebook sample of 27th Century Fiasco


You can peruse about 145pages of the blockbusting 27th Century Fiasco novel thru’ this link http://pdf-ebooks.net/sample/66191/27th-century-fiasco

Road-Map Of Human Organ Transplantation Process


Do you know much about human organ transplantation process and its attendant intricacies? Is your knowledge still rudimentary or are you in need of relevant information that is required to lift you out of the confusion that has been caused by ignorance or misinformation about the subject matter?

Well, this article is purposely written to fill you in and suck you onto the platform of ethical, moral, health, political, scientific and theological soul-searching debate concerning human organ transplantation.

Let’s get the definition straight before we go into the nitty-gritty.

The process of moving human body parts from one individual to another or from one part of an individual to another part of the same person is known as organ transplantation. This surgical procedure has been undertaken by mankind for ages. History recorded a miraculous feat by some Catholic Saints way back in the 4th Century. Modern science has moved on with lightning speed following the invention of cutting-edge electronic devices along with advances in cryonics technology and stem cell research which has turned complex organ transplant surgeries into simple medical operative procedures.

Mankind is now able to perform certain hitherto intractable transplant surgeries using stem cells, tissues and organs from living or deceased donors courtesy of better operative skills.

Presently, many countries around the world have regulatory organizations that approve and monitor harvesting, storage as well as transplantation of human organs within their areas of jurisdiction. There are also organizations that have been approved to keep organ banks or perform transplantation surgeries.

As with all human endeavors, each country on earth has its own way of drafting and interpreting the law that governs human organ transplantation. Because of shortage of suitable organs, an ever reducing official list of suitable donors and elongating official waiting list, many governments have had to bend the rules or amend the strict regulation.

In certain eastern nations, human organ transplantation process has even become a business transaction based on a willing buyer-to-seller basis while the government concerned simply charged a transplant-donor-recipient-tax. Consequently, many criminal cases of forced human organ donations have become rampant in such countries.

Although such a laissez-faire policy may shorten the waiting list of recipients, the risk of outbreak communicable diseases is considerably increased.

Should human body parts become a commodity? That is a pertinent question that every living being should answer.

Despite the highly strict regulation of human organ transplantation process in well organized western countries, the psychological pressure of the fear of death among desperate patients on the waiting list of many organ registries and the shortage of donors have driven people to seek after human organs from unofficial but sometimes fraudulent and unscrupulous human-body-parts-sourcing crime cartels.

What should be done to pacify the growing number of anxious and trickster-gullible patients on the human organs waiting list?

Should organ transplantation process be privatized and the laws liberalized?

Would amending the regulation to a position midway between too much restriction and the laissez faire system of Eastern Europe and Asia be ethically, morally and religiously justifiable?

Would such a policy be acceptable to the Public?

Should donors be allowed to put up their body parts for sale in the print or electronic media?

Should countries legally harvest the organs of executed criminals?

Should commercial trading in human body parts be in the statute books?

Should transplantation tourism be banned or allowed to flourish as long as it follows the free-market principle?

Would anyone prefer that the United Nations pass a multilateral agreement that would oblige all nations on earth to stop human body parts being traded like mutton?

Join the debate. Have your say.

http://27thcentury.wordpress.com

Article Source: http://EzineArticles.com/?expert=Akintunde_M_Lawal

Article Source: http://EzineArticles.com/6029328

E-Lab and E-Diagnostics Would Be New Innovative Methods in Cloud Computing Technology


By the time you read through this article, a new Cloud Computing protocol would be born.

Cloud computing is a complex system of data compilation, processing and storage which allows the end-user to easily access information without knowing the physical location of the service provider or configuration of the computer system. The cloud computing set-up along with online Voice and Video streaming facilities are veritable tools that make the birth of e-lab and e-diagnostics protocols the next frontier of internet development.

Here is an interesting snippet on the future of cloud computing.

Firstly, let’s define e-lab. It means an electronic laboratory that operates via the World Wide Web.

Presently, a typical laboratory consists of a room or building where scientific equipment or chemicals are kept. Within the confines of the laboratory, scientists conduct tests, teach or perform experiments and treat illnesses.

The constant use of equipment and chemicals by scientists necessitate costly purchase, transportation and maintenance in order to provide fast-track, competitive and cutting edge services to health-care professionals, scientists, end-users and beneficiaries.

Therefore, there is an urgent need to make laboratory more cost effective by developing the e-lab.

To measure soil acidity for instance, a pH meter is required. The price of this device ranges in tens of dollars. However, rather than purchasing a pH meter, a less costly e-lab biotechnology electrode would be provided to the end-user. When this device is immersed in a solution, it would measure the pH as encrypted information through a microprocessor in any portable computerized device, e.g. cell-phone or laptop. The digital information could then be uploaded onto the internet where the encrypted information would be processed by the e-lab service provider into a visually readable pH data. A disposable or re-usable bio-tech pH electrode might be provided.

The above-mentioned internet compatibility would be ideal for certain scientific tests such as screening of blood fluid components, eye defects, enzyme activity, optical, sonic and temperature measurements.

Secondly, e-diagnostics could be defined as the use of the internet as a source for processing digital diagnostic information by cloud computing.

This innovative technique could be illustrated by re-inventing cutting edge medical equipment such as the CT-Scan or X-ray computed Tomography device which requires a heavy purchase, maintenance and overhead cost.

CT-Scan is used as a veritable tool for prevention-cum-screening of cancers, heart and bone diseases. it is a necessity in any modern hospital setting.

Although the usage of the CT-Scan has increased exponentially over the last three decades in many countries, its use is still highly restricted to affluent neighborhoods and nations.

However, with the coming of e-diagnostics, this expensive machine would be separated into two parts. The first part or ‘in-house component’ would contain the X-ray Tomography reader-cum-data-collector.

An ‘e-diagnostics-cloud-computing component’ which would be controlled by the service provider would be the second part. In this device, the data uploaded from the CT-Scan would be sent through the internet to the network of the service provider where it would be processed for billing, 3-D display of various bodily structures and other user-friendly features.

Separation of the CT-Scan’s mainframe from the data processing unit would allow service providers to charge low rates for each data processed through their cloud computing networks.

Therefore, scientists who study biological and paleontological specimen at remote locations around the globe would be saved the hassle of having to purchase, maintain or move a large and expensive CT-Scan about. All they would require would be a cheaper and lighter ‘in-house component’ that coverts tomography readings of human structures into encrypted digital information. Such digitized data could be sent electronically through the internet to the service provider who in turn uses his e-diagnostics tools within seconds to send back printable pictures, videos or graphics from processed data.

Couldn’t this technology be applied to other expensive scientific techno-behemoths? Of course, it’s possible.

The advent of the e-lab’s and e-diagnostics’ protocol at a yet to be determined future date might bring succor to the countless number of people who are yet to benefit from the versatility of a much awaited but yet to be re-invented e-lab-CT-Scan or any other colossal scientific equipment.

Advantages of e-lab & e-diagnostics

• Less expensive and more light-weight equipment.
• Lesser amount of chemicals required for tests.
• Simplified and reduced maintenance cost.
• Affordable screening procedure.
• Accessibility from remote locations.
• Easy equipment mobility.
• Convenient.
• User friendly.
• Revolutionize the field of bio-informatics and laboratory technology.
• Possibility of designing portable electronic devices that could serve as analytical and diagnostic tools.

Disadvantages of the proposal

• Hosts and service providers might have control over the medical records or research data of patients and scientists respectively.

• Health-care statistics or research data of developing countries may be monitored or tinkered with by web-hosts or service providers in the developed world.

• It may cause capital flight and under-utilization of laboratory technicians in many parts of the world as many Do-It-Yourself screening and test kits become ubiquitous.

To allay the fears of governments, service providers and end-users, a new internet protocol might have to be drafted and endorsed by all member states of the United Nations.
Let the race of developing the e-lab & e-diagnostics program’s application, platform, storage and infrastructure begin. Then servers and clients can enjoy a new era of the internet.

That’s the future of cloud computing.

In conclusion, let’s hope that this article would spur the world’s cybernetics movers and shakers to action.

http://27thcentury.webs.com/elabandediagnostics.htm

Article Source: http://EzineArticles.com/?expert=Akintunde_M_Lawal

Article Source: http://EzineArticles.com/6076046

 

How To Prevent And Respond To Cyber-Crime Globally


This article provides readers with a brief overview of cyber-crime, a topic that has gripped the world of cybernetics, law enforcement agencies and Justice Departments of late in the wake of hacking of high profile websites across the globe.

A friend of mine once dubbed the internet as the ‘1st wonder of modern civilization’ and its obvious he is not far from the truth.

The internet has come to stay and as mankind evolves through his evolutionary pathway, it is going to play a crucial role in all facets of human endeavor.

Presently the internet is mainly used for issues of commerce and communication.
In future, the healthcare sector is likely to take a bigger share of internet activities as ‘e-lab and e-diagnostics protocols’ allow DIY screening of illnesses through portable communication gadgets such as the cell-phone or electronic tablets.

As the use of the internet becomes ubiquitous so would the prevalence of cyber-crime increase exponentially!

Before we get down to the nitty-gritty of the topic, let’s define cyber-crime.
Cyber-crime includes all crimes committed in any computer network infrastructures or environments.

Let’s have a roller coaster ride through types, motives, culprits and victims of cyber-crime. How would you report issues pertaining to cyber-crime, where to report cyber-crime and how to prevent cyber-crime?

Types of cyber-crime

• Computer intrusion or Hacking, Password trafficking.
• Counterfeiting of currency.
• Child Exploitation and Internet Pornography.
• Internet fraud and Spam mailing.
• Internet harassment.
• Internet bomb threats and terrorism.
• Trafficking in explosive or incendiary devices or firearms over the Internet.
• Pyramid schemes.
• Fake lotto and gambling sites.
• Fake immigration assistance sites.
• Fake foreign employment sites.
• Phony online dating partners.
• Copyright piracy.
• Trademark Counterfeiting.
• Theft of Trade Secrets.
• Hacker-maniacs, Pranksters.
• Connection disruption by uploading and sending worms, viruses and botnets.
• Extortion and International Money Laundering, Identity Theft.
• Committing fraud on security funds, inside trading via the web.
• Unauthorized hacking into computer systems, selling counterfeit computer equipment.
• Uploading, running or hosting phony domain websites.
• Phishing and identity theft.
• Online impersonation of individuals or business firms(identity theft)
• Computer programmer in unauthorized computer access.
• Creating and disseminating fake documents, selling counterfeit goods.
• Illegally accessing government computer or bringing it down.
• Domain name theft, illegal gambling offences, sending international botnet to create massive breakdown of computer systems or paralyzing computer networks
• Copyright infringement, trafficking in counterfeit goods or human beings
• Selling counterfeit software.
• Using malicious advertisement to lure people into disclosing their personal information,
• illegal access, illegal interception, data interference, system interference, misuse of devices, computer-related forgery, computer-related fraud, offences related to child pornography and offences related to copyright and neighboring rights.
• Fraud on social networking sites relating with use of false identity.

Motives for cyber-crime

• Staff disgruntled due to low remuneration, infighting within rank and file of work force because of parochial interests.
• Identity thieves and cyber-stalkers trying to make some money.
• Hacking activists or advocacy groups hoping to score political points.
• Hacker-maniacs, pranksters, erring dilettante, malicious users sending viruses, worms or botnet to infect people’s computer for the fun and adrenaline boost.
• Cybernetic expert wishing to cash in on vulnerable and lucrative computer networks.
• International cyber-spymasters engaged in espionage and cyber-wars.
• Troubleshooting cybernetic gurus or staff belonging to the Intelligence community.
• Renegade law enforcement staff wishing to cash in on a loophole or sabotage the database for capricious reasons.
• Pranksters and deranged individuals (hacker-maniacs) who love destabilizing any vulnerable computer network.
• Fraudsters who steal money from gullible individuals.
• Inquisitive and adventurous computer nerds wishing to try something new.
• Unemployed techno geek trying to make a living.

The culprits

• Cyber-hoodlums Hackers, fraudsters, cyber-bully, cyber-hypnotist, Internet Pedophiles, cyber-dissidents, disseminators of racists and xenophobic materials, cyber-gangsters and homicide criminals, internet human organ racketeers, internet dating sites scammers, unemployed youth and pranksters.

• Cybernetic insider, phishing group, cyber-extortionist, cyber-blackmailer, cyber-defamer, cyber-stalker and spammers.

• Spymasters, renegade computer experts.

The victims

• Unemployed people.
• Institutions with vulnerable computer networks.
• Lonely individuals who live reclusively.
• Internet dilettante.
• Individuals wishing to get involved in pyramid schemes.
• Public or Private firms that are engaged in eCommerce.
• Public or Private firms with a treasure trove of vital information.
• Governments running databanks with priceless sensitive information.

How to report cyber-crime

• Track, locate and identify culprits by doing a Whois.com search of the IP address
• Contact the Internet Service Provider for detailed information
• Contact your attorney, local sheriff or Police Department, Secret Service and Justice Department
• Contact cyber-detectives or Webmasters

Where to report cyber-crime

Depending on the type of cyber-crime committed, you can report the matter to any of the following agencies,
• The Federal Bureau of Investigation (FBI)
• The United States Secret Service
• The Internet Crime Complaint Center (IC3)
• The United States Immigration and Customs Enforcement (ICE)
• The United States Postal Inspection Service
• The Bureau of Alcohol, Tobacco and Firearms (ATF)
• Internet Crime Complaint Center
• The National White Collar Crime Center (NW3C)
• United States Department of Justice
• Stopfakes.gov
• DMCA agents of various firms and institutions
• Department of Homeland Security’s National Infrastructure Coordinating Center
• Attorney’s of firms and institutions
• U.S. Computer Emergency Readiness Team (U.S. CERT)
• Your individual government bureau or its appropriate law enforcement agencies and Justice Departments

How to prevent cyber-crime

Governments and citizens must be proactive in the quest to prevent the underworld from taking over the internet to create the same chaos and anarchy they have wrecked on civilization in the real world. This could be achieved by implementing the following suggestions.
• Elucidate international strategies aimed at combating computer and intellectual property crimes worldwide.
• Create a name and shame cyber-crime map website, follow UK example.
• Monitor all ISP transmitting audio-visual messages via the web.
• Remunerate your staff well but snoop on them.
• Form an alliance with national or foreign competitors to share anti-cyber-crime information.
• Conventions and Agreements should have a global outreach and not limited by the parochial interest of a few affluent nations.
• Need for a global attempt at archiving all information of the internet by ISPs so that data could easily be traced. Such services rendered by the ISPs should be paid for by the secret service of the nation under whose jurisdiction the activity took place or where the cloud computing workstation is located.
• Verify identity of internet users before they embark on any financial transaction.
• Harmonize the domestic criminal substantive law elements of offences and connected provisions in the area of cyber-crime
• Clarify code of conduct for internet users and write the penalty in the statute books without any form of ambiguity.
• Involve the United Nations on all internet Agreements and Conventions.
• Need for international co-operation pursue a common criminal policy aimed at the protection of society against cyber-crime, especially by adopting appropriate legislation and fostering international cooperation? No country can curb cyber-crime alone.
• Need to train more cyber-detectives
• Need to sensitize the public about the dangers of not reporting or conniving with cyber-criminals

Internet-related crimes, like any other crime, should be reported to appropriate law enforcement and investigative authorities at the local, state, federal, or international levels, depending on the scope and enormity of the crime. Citizens who are aware of federal crimes should be compelled to report them to local offices of federal law enforcement agencies.

It has been rightly observed that crimes committed over the Internet pose special challenges for law enforcement. Hence, there is a great need for large number of specially trained cyber-detectives and criminologists.

There is also a need to design new and fair rule of engagement for everyone; otherwise the World Wide Web might be in for a futuristic mutually assured destruction apocalypse.

We should all ensure that there is freedom on the internet in line with all democratic principles. However, we should clamor for the setting up of internet crime prevention and busting organizations to curb the activities of the few miscreants that are sabotaging the World Wide Web rather than advocating censorship.

Massive hacking of high profile website usually create furor in the media and congress. But is censorship necessary in order to curb the scams, thefts, frauds, pranks and cyber attack incidences on the internet?
Should governments censor or democratize the internet?

In conclusion, it would be disingenuous for any cybernetic expert to claim that cyber-crime has no border or the culprits are anonymous. Cyber-crime differs from real time crime because all electronic activities can be traced easily if they are decentralized, enrolled, verified, monitored and archived when any internet transaction occur. If all countries are persuaded to ratify IP Agreements and Conventions, all activities would be traceable.

Then, cyber-crime prevention and busting tactics would be workable.

I hope the internet policy moderators and formulators are listening.

http://www.smashwords.com/books/view/66191
http://www.27thcentury.webs.com

Article Source: http://EzineArticles.com/?expert=Akintunde_M_Lawal

Article Source: http://EzineArticles.com/6383754

Danger Posed by Internet-Linked Biometrics and DNA-Genome Databanks


In this information age, a computerized system recognizing each individual human being based on their fingerprints, iris, hair, body shape, voice, behavioral pattern, DNA, genome, anatomical and blood statistics was developed by scientists. This databank is known as Biometrics archives.

For the information of all readers of this article, every nation on modern day planet earth is currently striving hard to achieve a continually updated, complete and comprehensive Biometrics databank.

As you peruse this information, new biometric data of many people are being enrolled into the Biometrics archives or verified whenever they are ferried unconsciously into a casualty ward, commit any crime, when relatives request for a death certificate, visit a healthcare facility, open an account for any financial transaction or enroll in any law enforcement agency.

Pretty soon, many governments the world over would request that all legal citizens and migrants in the respective countries should have their Biometrics and genome enrolled before they are eligible to partake in any transaction within the countries’ borders. Then, people would soon get used to continually having to get their data identified and verified as often as required by some law that is not yet promulgated.

Already, your national identity card, credit or debit card and international passport contain a link to your biometrics information.

Note that the complexity of accessing, updating and processing this vital personal information of people necessitates a link to the World Wide Web. This enables relevant Public and Private Agencies’ Networks that need to identify and verify people in far flung or remote regions on earth to have access to the archives.

However, it is this internet linkage that presents an underbelly of a rather strong, dragon-like and fraud-proof personal identification scheme. Hacking of government-ran Biometrics databanks, Cyber-criminals most coveted treasure chest may become the Information Age’s Achilles heel.

In future, the inclusion of human hereditary information or genome details might increase the danger of the archives being hacked by several notches. How safe is your personal information? Since the website wouldn’t be absolutely impregnable to hackers, what happens if such a nightmarish hacking scenario occurs and many personal information of a country’s citizenry are lost to cyber-criminals?

That unthinkable situation where a chunk of the Biometrics Archives is dangerously denuded would pose a serious security risk. Just think about it. There would be wanton cases of Identity theft, financial scams and all manner of criminal mayhem.

Should the Biometrics Archives be linked to the internet for faster and easy accessibility for enrollment and authentication processes? Are there ways and means of minimizing the risks posed by such a dastardly crime?

I would pleasantly appreciate your feedback.

http://27thcentury.wordpress.com

http://www.outskirtspress.com/27thcenturyfiasco

Article Source: http://EzineArticles.com/5965865

Book Review: 27th Century Fiasco


BOOK REVIEW: 27th Century Fiasco (Future Century Fiasco)

By Lawrence Atkins , Brandon, Florida, USA.

*****Rating

To get your copy of this book Click Here!

It’s a believable but fictional apocalyptic future event.
Date of review: 17th February 2011
Title: 27th Century Fiasco (Future Century Fiasco)
Name of Author: Akintunde M Lawal
Name of the Publisher: Outskirts Press Inc.
Place of Publication: United States of America
Year of Publication: 2010
ISBN (13): 9781432744984

This is a compelling fictional future event. It will ignite your curiosity as to the impact of contemporary stem cell research and human organ transplantation on the trajectory of human evolution! What are the implications for humanity? Would more beautiful and intelligent humans emerge from such experimentation or will it end in a catastrophe? Those are the pertinent questions which this novel attempts to answer. The story is set in 2665 to 2666 A.D.

Leslie Foy, employee of the American Biometrics and Genome Data-bank archiving firm is murdered in London. Few days later, the Biometrics archive is hacked by cyber-criminals. This brings to mind the danger of the internet accessibility of several Biometric and genome data-banks which are being run by governments across the globe. How safe is our personal information?

That horrific scenario led a CIA-FBI investigative team to prod Sacramento Police Chief, Robert Conrad to solve the hacking and murder cases whose perpetrators are thought to be hole up somewhere in his district.

To get your copy of this book Click Here!

Then, you get to know Pablo Maldini’s diabolic and insatiable quest for wealth, power and political clout. His confidant and business partner, Professor Guy Sullivan assists him in running the dastardly trade of unethical transplant surgeries and human organ rustling. What would happen if the world allows private organ transplant firms to trade in human organs and stem cells? Is this a giant progressive scientific and evolutionary leap or a journey to a chaotic apocalypse?

As you get engrossed in Robert Conrad’s effort to unravel the ghoulish crime, a high-profile woman is abducted in Sacramento. Later, the woman was able to surmount all the stressful problems caused by the incident with great endurance and stoicism.

Perusing this book might give you goose pimples and get your adrenalin going as you read through the gory details.

All the characters are portrayed as if they exist in a contemporary true-life story.

By the time you approach the end of this believable fictional story, the unending conflict between good and evil on one part or science and religion on another part stares you in the face with haunting poignancy. The endgame of Maldini’s satanic Ponzi scheme necessitates an intervention from future US President, Queen of England, The Pope, European leaders and several intelligence agencies. Was the matter actually resolved eventually? Find out.

You’re guaranteed a roller coaster experience as the author deftly guides you through the twists and turns of a fantastic and mind boggling plot.

It’s a novel that you read and won’t forget quickly. Get set to ponder on questions that have daunted humanity for ages. Should humanity rely on science and evolution to pull through the pitfalls inherent in his existence or is there a role for religion and spirituality?

It’s undoubtedly the best book you’ve missed reading since 2010.

Beware; this is a future event that is waiting to happen under your watch!

Like other great books, this novel is a must read for every living soul.

ORDER FOR YOUR COPY NOW! To get your copy of this book shipped to you anywhere Click Here!

Previous Older Entries

Follow

Get every new post delivered to your Inbox.