Who we are
Our website address is: https://waynenorthey.com.
What personal data we collect and why we collect it
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
Contact Form 7 supports spam-filtering with Akismet. Intelligent reCAPTCHA blocks annoying spambots. Plus, using comment blacklist, we can block messages containing specified keywords or those sent from specified IP addresses.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Like most website operators, MonsterInsights collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. MonsterInsights’s purpose in collecting non-personally identifying information is to better understand how MonsterInsights’s visitors use its website. From time to time, MonsterInsights may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website.
MonsterInsights also collects potentially personally-identifying information like Internet Protocol (IP) addresses for logged in users and for users leaving comments on our blogs. MonsterInsights only discloses logged in user and commenter IP addresses under the same circumstances that it uses and discloses personally-identifying information as described below, except that blog commenter IP addresses are visible and disclosed to the administrators of the blog where the comment was left.
Gathering of Personally-Identifying Information
Certain visitors to MonsterInsights’s websites choose to interact with MonsterInsights in ways that require MonsterInsights to gather personally-identifying information. The amount and type of information that MonsterInsights gathers depends on the nature of the interaction. For example, we ask visitors who comment on our blog to provide a username and email address. Those who wish to receive MonsterInsights updates via email, we collect their emails. In each case, MonsterInsights collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor’s interaction with MonsterInsights. MonsterInsights does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.
MonsterInsights may collect statistics about the behavior of visitors to its websites. For instance, MonsterInsights may monitor the most popular pages on the MonsterInsights.com site or use spam screened by the Akismet service to help identify spam. MonsterInsights may display this information publicly or provide it to others. However, MonsterInsights does not disclose personally-identifying information other than as described below.
Protection of Certain Personally-Identifying Information
MonsterInsightsdiscloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on MonsterInsights’s behalf or to provide services available at MonsterInsights’s websites, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using MonsterInsights’s websites, you consent to the transfer of such information to them. MonsterInsights will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, MonsterInsights discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when MonsterInsights believes in good faith that disclosure is reasonably necessary to protect the property or rights of MonsterInsights, third parties or the public at large. If you are a registered user of an MonsterInsights website and have supplied your email address, MonsterInsights may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what’s going on with MonsterInsights and our products. We primarily use our various product blogs to communicate this type of information, so we expect to keep this type of email to a minimum. If you send us a request (for example via a support email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. MonsterInsights takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.
Comments and other content submitted to Akismet anti-spam service are saved on our servers unless they were marked as false positives, in which case we store them long enough to use them to improve the service to avoid future false positives.
MonsterInsights is the most popular Google Analytics plugin for WordPress. Our goal is to help make analytics easy for users by showing them how visitors find and use their website from inside their WordPress dashboard.
MonsterInsights Google Analytics application uses the Google Analytics Reporting API to gather analytics about your website and present them in an actionable way via charts, graphs and tables inside your WordPress dashboard to any user with administrator level privileges on your website.
MonsterInsights discloses client Google Analytics information with prior user consent only to those of its employees, contractors, and affiliated organizations that (i) need to know that information in order to process it on MonsterInsights behalf or to provide the services available at MonsterInsights websites (ii) and to provide necessary technical support for our services.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
Our website uses plugins from YouTube, which is operated by Google. The operator of the pages is YouTube LLC, 901 Cherry Ave., San Bruno, CA 94066, USA.
If you visit one of our pages featuring a YouTube plugin, a connection to the YouTube servers is established. Here the YouTube server is informed about which of our pages you have visited.
If you’re logged in to your YouTube account, YouTube allows you to associate your browsing behavior directly with your personal profile. You can prevent this by logging out of your YouTube account.
YouTube is used to help make our website appealing. This constitutes a justified interest pursuant to Art. 6 (1) (f) DSGVO.
Further information about handling user data, can be found in the data protection declaration of YouTube under https://www.google.de/intl/de/policies/privacy.
Our website uses features provided by the Vimeo video portal. This service is provided by Vimeo Inc., 555 West 18th Street, New York, New York 10011, USA.
If you visit one of our pages featuring a Vimeo plugin, a connection to the Vimeo servers is established. Here the Vimeo server is informed about which of our pages you have visited. In addition, Vimeo will receive your IP address. This also applies if you are not logged in to Vimeo when you visit our plugin or do not have a Vimeo account. The information is transmitted to a Vimeo server in the US, where it is stored.
If you are logged in to your Vimeo account, Vimeo allows you to associate your browsing behavior directly with your personal profile. You can prevent this by logging out of your Vimeo account.
Google Web Fonts
For uniform representation of fonts, this page uses web fonts provided by Google. When you open a page, your browser loads the required web fonts into your browser cache to display texts and fonts correctly.
For this purpose your browser has to establish a direct connection to Google servers. Google thus becomes aware that our web page was accessed via your IP address. The use of Google Web fonts is done in the interest of a uniform and attractive presentation of our plugin. This constitutes a justified interest pursuant to Art. 6 (1) (f) DSGVO.
If your browser does not support web fonts, a standard font is used by your computer.
On our pages, plugins of the SoundCloud social network (SoundCloud Limited, Berners House, 47-48 Berners Street, London W1T 3NF, UK) may be integrated. The SoundCloud plugins can be recognized by the SoundCloud logo on our site.
If you do not want SoundCloud to associate your visit to our site with your SoundCloud account, please log out of your SoundCloud account.
This feature is only accessible to users logged in to WordPress.com.
Data Used: In order to process a comment like, the following information is used: WordPress.com user ID/username (you must be logged in to use this feature), the local site-specific user ID (if the user is signed in to the site on which the like occurred), and a true/false data point that tells us if the user liked a specific comment. If you perform a like action from one of our mobile apps, some additional information is used to track the activity: IP address, user agent, timestamp of event, blog ID, browser language, country code, and device info.
Activity Tracked: Comment likes.
Data Used: If Akismet is enabled on the site, the contact form submission data — IP address, user agent, name, email address, website, and message — is submitted to the Akismet service (also owned by Automattic) for the sole purpose of spam checking. The actual submission data is stored in the database of the site on which it was submitted and is emailed directly to the owner of the form (i.e. the site author who published the page on which the contact form resides). This email will include the submitter’s IP address, timestamp, name, email address, website, and message.
Data Synced (?): Post and post meta data associated with a user’s contact form submission. If Akismet is enabled on the site, the IP address and user agent originally submitted with the comment are synced, as well, as they are stored in post meta.
Data Used: Commenter’s name, email address, and site URL (if provided via the comment form), timestamp, and IP address. Additionally, a jetpack.wordpress.com IFrame receives the following data: WordPress.com blog ID attached to the site, ID of the post on which the comment is being submitted, commenter’s local user ID (if available), commenter’s local username (if available), commenter’s site URL (if available), MD5 hash of the commenter’s email address (if available), and the comment content. If Akismet (also owned by Automattic) is enabled on the site, the following information is sent to the service for the sole purpose of spam checking: commenter’s name, email address, site URL, IP address, and user agent.
Activity Tracked: The comment author’s name, email address, and site URL (if provided during the comment submission) are stored in cookies. Learn more about these cookies.
Data Synced (?): All data and metadata (see above) associated with comments. This includes the status of the comment and, if Akismet is enabled on the site, whether or not it was classified as spam by Akismet.
This feature is only accessible to users logged in to WordPress.com.
Data Used: In order to process a post like action, the following information is used: IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID (on which the post was liked), post ID (of the post that was liked), user agent, timestamp of event, browser language, country code.
Activity Tracked: Post likes.
Data Used: A visitor’s preference on viewing the mobile version of a site.
Activity Tracked: A cookie (
akm_mobile) is stored for 3.5 days to remember whether or not a visitor of the site wishes to view its mobile version. Learn more about this cookie.
Data Used: In order to check login activity and potentially block fraudulent attempts, the following information is used: attempting user’s IP address, attempting user’s email address/username (i.e. according to the value they were attempting to use during the login process), and all IP-related HTTP headers attached to the attempting user.
Activity Tracked: Failed login attempts (these include IP address and user agent). We also set a cookie (
jpp_math_pass) for 1 day to remember if/when a user has successfully completed a math captcha to prove that they’re a real human. Learn more about this cookie.
Data Synced (?): Failed login attempts, which contain the user’s IP address, attempted username or email address, and user agent information.
- Please look at several articles as well on American/Western will to world domination by clicking on "Selected Articles: Western Aggression Backed by Western Media”. The series of articles is introduced thus:
The Western allies never run dry of resources to support their global war of terror and aggression, ostensibly an integral part of their foreign policy. They dynamically legislate laws lest the people awaken. They have the unbending support of the corporate media, which skilfully distorts reality. When will they ever back down from their destructive quest for colonies? Read our selection below.↩
- It continued:
‘For seven months, Tiger Force soldiers moved across the Central Highlands, killing scores of unarmed civilians – in some cases torturing and mutilating them - in a spate of violence never revealed to the American public,’ the newspaper said, at other points describing the killing of hundreds of unarmed civilians. ‘Women and children were intentionally blown up in underground bunkers,’ The Blade said. ‘Elderly farmers were shot as they toiled in the fields. Prisoners were tortured and executed - their ears and scalps severed for souvenirs. One soldier kicked out the teeth of executed civilians for their gold fillings.” The New York Times confirmed the claimed accuracy of the stories by contacting several of those interviewed. It reported: “But they wanted to make another point: that Tiger Force had not been a ‘rogue’ unit. Its members had done only what they were told, and their superiors knew what they were doing. “Burning huts and villages, shooting civilians and throwing grenades into protective shelters were common tactics for American ground forces throughout Vietnam, they said. That contention is backed up by accounts of journalists, historians and disillusioned troops… ‘Vietnam was an atrocity from the get-go,’ [one veteran] said in a recent telephone interview. ‘It was that kind of war, a frontless war of great frustration. There were hundreds of My Lais. You got your card punched by the numbers of bodies you counted.’ Current likely Democratic Presidential candidate John Kerry was also quoted giving evidence before the Senate Foreign Relations Committee in 1971. He reported that American soldiers in Vietnam had “raped, cut off heads, taped wires from portable telephones to human genitals and turned up the power, cut off limbs, blown up bodies, randomly shot at civilians, razed villages in fashion reminiscent of Genghis Khan, shot cattle and dogs for fun, poisoned food stocks and generally ravaged the countryside of South Vietnam in addition to the normal ravage of war, and the normal and very particular ravaging which is done by the applied bombing power of this country. Nicholas Turse [later author of: Kill Anything That Moves: The Real American War in Vietnam], a doctoral candidate at Columbia University, has been studying government archives and said they were filled with accounts of similar atrocities. ''I stumbled across the incidents The Blade reported,'' Mr. Turse said by telephone. ''I read through that case a year, year and a half ago, and it really didn't stand out. There was nothing that made it stand out from anything else. That's the scary thing. It was just one of hundreds.'' Yet there were few prosecutions.↩
- Historian John Coatsworth in The Cambridge History of the Cold War noted:
Between 1960, by which time the Soviets had dismantled Stalin's gulags, and the Soviet collapse in 1990, the numbers of political prisoners, torture victims, and executions of nonviolent political dissenters in Latin America vastly exceeded those of the Soviet Union and its East European satellites. In other words, from 1960 to 1990, the Soviet bloc as a whole was less repressive, measured in terms of human victims, than many individual Latin American countries [under direct sway of US Empire] ("The Cold War in Central America", pp. 216 - 221).What was true for Latin America was true for around the world: massive human rights abuses, assassinations, regime changes of democratically elected governments, etc., etc., etc. orchestrated by US Empire. Yet Americans invariably have wanted it both ways: to be seen as the exemplary "City on A Hill" that upholds universal human rights and democracy, while operating a brutal Empire directly contrary to all such elevated values, and a concomitant rapacious Empire market economy that takes no prisoners. This began of course even before the founding of the United States of America and continued apace, in its mass slaughter and dispossession of indigenous peoples, in its brutal system of slavery on which its obscene wealth in the textile industry in the first place was built. "The Land of the Free" conceit was a sustained con job on the part of America's leaders. It was also apotheosis of hypocrisy. American exceptionalism was/is true in one respect only: it was brutal like no other Empire in its eventual global reach.↩
-  The highlighted article about renowned whistle-blower Daniel Ellsberg points to again what is utterly chilling, horror-filled, exponentially beyond immoral, American (hence the world's) reality: "Daniel Ellsberg: U.S. Military Planned First Strike On Every City In Russia and China … and Gave Many Low-Level Field Commanders the Power to Push the Button". He has since written The Doomsday Machine: Confessions of a Nuclear War Planner. Of it we read:
Shortlisted for the 2018 Andrew Carnegie Medal for Excellence in Nonfiction Finalist for the California Book Award in Nonfiction The San Francisco Chronicle's Best of 2017 List In These Times “Best Books of 2017” Huffington Post's Ten Excellent December Books List LitHub's “Five Books Making News This Week” From the legendary whistle-blower who revealed the Pentagon Papers, an eyewitness exposé of the dangers of America's Top Secret, seventy-year-long nuclear policy that continues to this day. Here, for the first time, former high-level defense analyst Daniel Ellsberg reveals his shocking firsthand account of America's nuclear program in the 1960s. From the remotest air bases in the Pacific Command, where he discovered that the authority to initiate use of nuclear weapons was widely delegated, to the secret plans for general nuclear war under Eisenhower, which, if executed, would cause the near-extinction of humanity, Ellsberg shows that the legacy of this most dangerous arms buildup in the history of civilization--and its proposed renewal under the Trump administration--threatens our very survival. No other insider with high-level access has written so candidly of the nuclear strategy of the late Eisenhower and early Kennedy years, and nothing has fundamentally changed since that era.↩
- A classic instance of this aligning with "just war" is the United States' "war on drugs" as subset of "war on crime", while at the same time the CIA was a major worldwide drug dealer in league with other drug cartels -- all done to enhance American Empire during the Cold War -- and continues to the present. The four-part series mentioned below connects American Empire drug dealing to the current War on Terror, in particular in Afghanistan. This of course is colossal hypocrisy as well. Worse: the series posits American federal government administrations over many decades as the Ultimate Drug Cartel, with Blacks, Latinos, and generally the poor directly being knowingly poisoned en masse. Then they have been primary targets of the Drug Enforcement Agency, and thereby become victims of America's too often savage prison system that oppresses and brutalizes them all over again... See: "The War on Drugs Is a Failure, So [Attorney General] Jeff Sessions Is All for It". A citation from the article reads:
In June , the History Channel aired a four-part documentary series called America’s War on Drugs.” The series asserts that the war on drugs was actually a war of drugs—and that the CIA was essentially a partner in spreading drugs and drug use. The series follows how the U.S. intelligence agency, in an obsession with fighting communism, allied itself with U.S. organized crime and foreign drug traffickers and includes firsthand accounts from many involved. In an interview with Truthdig columnist Sonali Kolhatkar on her radio program “Rising Up With Sonali,” the series’ executive producer, Anthony Lappé, explains why the CIA got involved:
It’s actually a pretty mind-blowing story when you look at the extent to which the CIA was involved with drug traffickers and drug trafficking throughout the Cold War. … If you look at Cold War policy against the Soviet Union, we were locked in a global battle for supremacy, where we have lots of proxy wars going on. … We needed to team up with local allies, and often the local allies we were teaming up with were people who had access to guns, who had access to underground networks, to help us fight the perceived threat of communism. There are actually a lot of similarities between what drug traffickers do and what the CIA does.Lappé elaborates by saying the hypocrisy of the war on drugs has been evident from the start: Secret CIA experiments with LSD helped fuel the counterculture movement, leading to President Richard Nixon’s crackdown and declaration of the war on drugs. The series also explores the CIA’s role in the rise of crack cocaine in poor black communities and a secret island “cocaine base.” In addition the documentary makes the connection between the war on drugs, the war on terror and the transformation of Afghanistan into a narco state and contends that American intervention in Mexico helped give clout to Joaquín “El Chapo” Guzmán and the super cartels, making it easier to send drugs across American borders. Watch Kolhatkar’s full interview with Lappé by clicking here. Please also see the now classic: The Politics of Heroin: CIA Complicity in the Global Drug Trade, by noted American historian Alfred McCoy. Of it we read:
The first book to prove CIA and U.S. government complicity in global drug trafficking, The Politics of Heroin includes meticulous documentation of dishonesty and dirty dealings at the highest levels from the Cold War until today. Maintaining a global perspective, this groundbreaking study details the mechanics of drug trafficking in Asia, Europe, the Middle East, and South and Central America. New chapters detail U.S. involvement in the narcotics trade in Afghanistan and Pakistan before and after the fall of the Taliban, and how U.S. drug policy in Central America and Colombia has increased the global supply of illicit drugs.To be noted as well is Johann Hari's Chasing The Scream, which tells the tragic tale of America's long-standing offensive against drugs, and the way to end such a war worldwide -- that several nations are successfully embracing.↩