Initial Look at the New Tax Form Schedule 1-A: Four Key Deductions for 2025

Tax Form Schedule 1-AThe IRS has released draft Schedule 1-A, introducing four new temporary deductions within the One Big Beautiful Bill Act. If you are wondering what the new form looks like and how the calculations work, read on as we explore each below.

Modified Adjusted Gross Income (MAGI)

It is important to note that all four deductions require calculating your MAGI first, which determines eligibility and phaseout amounts for each deduction.

The Four New Deductions and How the Calculations Work

These deductions are all referred to on the schedule by their colloquial names, for example: “No Tax on Tips,” “No Tax on Overtime” and “No Tax on Car Loan Interest.” The sole exception, however, is popularly referred to as the “No Tax on Social Security” provision, which is called the “Enhanced Deduction for Seniors” on the form.

1. Tips Deduction

  • Maximum: $25,000 annually
  • Eligibility: Must receive qualified tips in customarily tipped occupations
  • Phaseout: Begins at $150,000 MAGI ($300,000 joint filers)
  • Rate: $100 reduction per $1,000 over threshold
  • Requirements: Valid Social Security number; married couples must file jointly

2. Overtime Deduction

  • Maximum: $12,500 single ($25,000 joint filers)
  • Eligibility: Only the premium portion of overtime pay (the “half” of time-and-a-half)
  • Phaseout: Same as tips deduction – begins at $150,000 MAGI
  • Rate: $100 reduction per $1,000 over threshold

3. Car Interest Deduction

  • Maximum: $10,000 annually
  • Eligibility: Interest on loans for new vehicles under 14,000 pounds and assembled in the United States
  • Phaseout: Begins at $100,000 MAGI ($200,000 joint filers)
  • Rate: $200 reduction per $1,000 over threshold
  • Requirements: Must provide VIN; loan must originate after Dec. 31, 2024

4. Enhanced Deduction for Seniors

  • Amount: $6,000 fixed deduction
  • Eligibility: All taxpayers (replaces “No Tax on Social Security” promise)
  • Phaseout: Begins at $75,000 MAGI ($150,000 joint filers)
  • Rate: 6 percent reduction of excess income over threshold

Key Points to Remember

  • All deductions are available whether you itemize or take the standard deduction
  • All require valid Social Security numbers
  • Married couples must file jointly to claim these benefits
  • Income limits mean higher earners receive reduced or no benefits
  • These are deductions, not exclusions – income is still reportable for state/local taxes

Final Steps

After you have calculated everything applicable for the four possible deductions, you will enter the total on the new line 13b on Form 1040. The total amount of the deductions entered here is removed from your income prior to calculating your tax. Remember, these are deductions and not credits, so they only reduce your taxable income and are not a direct reduction in your tax due.

You can see an example of the new draft Form 1040 illustrating this below.

Screenshot of new Form 1040

Conclusion and Draft from Status – and IRS Warning

The above provides guidance to taxpayers and professionals on how both the deductions calculations work and flow through Form 1040. The IRS warns, however, that the forms and instructions currently released are in draft form at this point. Before any forms or instructions can be released in their final state, they need to be approved by the OMB. It is not unusual for draft releases of instructions and publications to have some changes before their final release, even if only minor.

 

Understanding Contribution Margin After Marketing

Contribution Margin After Marketing (CMAM)Contribution margin after marketing (CMAM) measures how much money is generated per unit retailed after factoring in a company’s variable costs, along with marketing costs.

It’s analogous with contribution margin, however, a business must factor in marketing costs the company experiences when publicizing a good to likely consumers with details on the business’ wares. This metric determines how well net sales can satisfy expense obligations and what percentage of net sales may remain to satisfy fixed expenses.

Comparing Variable Versus Fixed Costs

Variable costs, as the name implies, are expenses that rise and fall according to output quantities. Fixed costs, conversely, are expenses that don’t change despite variation of production quantities. Understanding these concepts is helpful when calculating CMAM to see how both types of expenses impact the different calculations.

CMAM = Sales Revenue – Variable Costs – Marketing Expense

It can also be determined on a per-unit basis to help a business understand how a single product unit contributes to the company’s comprehensive profits. One can calculate the CMPU (contribution margin per unit) as follows to provide a more granular analysis:

CMAM/Unit = Sales Revenue/Unit – Variable Expenses/Unit – Marketing Expense/Unit

What separates variable costs (including marketing expenses) from the sales revenue is CMAM. The balance is profit along with fixed costs. To calculate if a business saw a net loss or profit, the formula is:

Net Operating Profit = CMAM – fixed costs

If a profit is reported after subtracting variable costs, costs to market, plus fixed costs, it means a business or specific department is profitable. If it’s negative, the business sees a loss that won’t enable it to pay its bills.

Illustrating CMAM

When it comes to a company producing widgets, the following is already known. Variable costs for production for a single widget are detailed below:

  • $2.25 for unprocessed inputs
  • $1.80 firsthand production expenses
  • $0.50 power
  • $0.40 freight expenses
  • $4,500 business equipment rentals
  • $6,000 factory rent
  • $30,000 management salary
  • $10,000 marketing costs

Each widget costs $10, and the business sold 30,000 last year. Therefore, it’s calculated as follows:

CMAM = Sales Revenue – Variable Costs – Marketing Expense

Sales Revenue = $10 x 30,000 = $300,000

Variable Costs = ($2.25 + $1.80 + $0.50+ $0.40) x 30,000 = $4.95 x 30,000 = $148,500

CMAM = $300,000 = $148,500

The next step is to calculate net operating loss or profit: we take CMAM ($148,500), then subtract fixed costs:

$148,500 – ($4,500 + $6,000 + $30,000)

$148,500 – $40,500 = $108,000

Based on that calculation, the company producing widgets realized $108,000 for its net operating profit last year. The next section will discuss how businesses can use this information to improve their operations.

Using CMAM for Business Analysis

Managers use this metric to determine the viability of a product. If there are multiple iterations or options of a product, it can help managers determine which product sells the best and rank them if there are multiple versions of a widget. Businesses can analyze each unit’s contribution margin for each version of a widget to determine which versions provide the greatest option for profitability. Depending on the outcome, the company may choose to produce only the most profitable one or two widgets.  

When it comes to the CMAM, businesses that use it for analysis can increase their sales efficiency for the present and future.

Ideas for Small Business Succession Planning

Small Business Succession PlanningIt can be hard to build up your own business, but it can be harder to sell it for what it’s worth. In fact, only around three in 10 family-owned businesses survive for the next generation. Whether family-owned or in a partnership of non-family owners, business succession is no easy feat.

Succession Planning

It is very important to have a succession plan, even if the business is fairly new. That’s because it gives heirs a roadmap for what to do if the owner dies unexpectedly. The first step is to figure out who you want to run the business after you. If you want to pass it on to one or more family members, be sure to ask if they’d like to own it. Note that the family route may need to be considered a year or more before the transfer to ensure the successive owner has time to learn the ropes.

If you decide to sell the business to a third party, consider if you want to sell it outright or retain partial ownership and continue to get a share of the profits. Also, think about whether or not you want to participate in running the business once ownership changes hands.

Business Owner Partners

In the case of a shared business, a succession plan can help clarify the intent of both owners and provide a legal path of succession if one owner dies. In a worst-case scenario, instead of the surviving partner taking the reins to run the business on his own, he may end up having to run it alongside the deceased owner’s spouse, who might not possess the skills, experience, or proclivity for the business. Or maybe the surviving spouse decides not to sell the business but receive a share of the profits without doing any work.

Key Man Insurance

If the surviving owner would simply like to buy out the deceased owner’s interest in the business, there are certain financial strategies available in the event he doesn’t have the assets to do so. One vehicle is called key man insurance, which refers to policies paid for by the business to cover the death of the business owner. Death proceeds are specifically earmarked to keep the business operating upon the death of the owner.

Buy-Sell Agreement with Life Insurance

A succession plan that includes a Buy-Sell Agreement contract specifies what will happen to the business shares of the owner upon his death. In most cases, the surviving business partner will use the life insurance proceeds to buy the shares at a predetermined value, which ensures that the deceased’s family is adequately paid for his share of the business upon his death.

Family-Owned Business

In the case of a family-owned business, a family member who is active in the business may take out an insurance policy on the owner and use the proceeds to buy out the interests of the non-active family members after the owner dies.

Private Annuity

Another option is a private annuity, in which the owner sells his business to his children in exchange for a fixed annuity income, based on IRS interest rates, for the rest of the owner’s life and, if elected, that of his spouse. If the owner outlives his life expectancy, the children may end up paying him more than the business is worth. However, if the owner dies sooner, they may pay less than the business is worth.

Family Limited Partnership

With a family limited partnership, the business owner transfers some or all of his business to individual family members while he is alive. When the owner dies, the portion of the business that has been transferred is no longer considered a part of the owner’s estate and is therefore not subject to estate taxes.

Seller Financing

If the owner has trouble selling the business to a third party, including perhaps a valuable employee who would like to take over, consider a seller financing agreement. Instead of paying the owner a lump sum, the buyer pays him a fixed, regular payment over a set number of years. Future business revenue secures the note, and the current owner would be qualified to know how well business revenues might hold up under the new ownership. Some sellers set up a finance agreement for just five years or so, after which time the buyer is expected to qualify to refinance with a conventional loan. It’s also possible for the financier to sell the new owner’s note if he decides down the road to get out of the financing role. The good news is that, should the buyer default on the loan, the seller would still own the company.

How to Save Money with the Half Rule

What is the Half Rule?What if you could lower your grocery bill without giving up the things you love, fight inflation, and have some money left at the end of the month? Sounds too good to be true? It’s not. It’s the Half Rule. This means cutting the amount of product you use in half and seeing what happens.

Truth is, most of us probably use too much of the things we love. Here are several reasons why:

  • Manufacturers often ask you to use more of the product than you need.
  • You’ve probably gotten used to using a certain amount of a product;
  • And finally, product inflation. Specifically, you might think that if you get pleasure out of something, you might need to use more of it. For instance, why get a tall vanilla latte when you can get a grande, right? But ask yourself: Is it really that much better?

To this end, here are some things you can easily use half of and never miss the other half:

  • Shampoo. Try using half the amount and adding more water, especially if it’s concentrated.
  • Laundry detergent. Try a half cup. A little goes a long way, especially if it’s a small load.
  • Dryer sheets. These are so easy to tear in half.
  • Cooking oil. Use an oil mister instead of pouring it into your pan or skillet.  
  • Restaurant meals. Eat half or a third and save the rest for another meal. Or better yet, split a meal with your partner, friend or work colleague. Bonus: you’ll also save calories.
  • Bagels. Just eat half! Save the other half for your next snack or breakfast.
  • Starbucks order. Try a tall. Or if you get a vente, try a grande. Give it a whirl. See what happens.
  • Glass stovetop cleaner. If you use less, you might have fewer streaks.
  • Tape. When you’re wrapping gifts, give string a try.

When you change a few things here and there, over time, you’ll really see the difference in your bank account. Also, imagine how nice it’ll feel not to have to buy these items so often. That’s a big change in spending.

The Half Rule is not for everything. While it works on so many things, there are some things you cannot to apply it to – like filling up your gas tank or cutting a prescription in half. Never do that.

Overall, it’s a good rule. And when you’re persistent over time, you’ll start to develop a habit – one that will help you see a difference quickly and save you money in the long run. It’s a ripple effect that might expand into other areas of your life. In sum, the Half Rule is so effective, you just might go all in – and stay there.

Sources

“The Half Rule” – A Frugal Hack I Live By

The Silent Threat: How Simple Misconfigurations Are Fueling 2025 Worst Cyberattacks

Simple Misconfigurations Are Fueling 2025 Worst CyberattacksAs organizations invest heavily in next-gen firewalls, AI detection, and threat intelligence, grave cyberattacks have been reported as a result of overlooked misconfigurations. According to the latest statistics, about 23 percent of cloud security incidents are directly connected to misconfigurations. These missteps create easy entry points for cybercriminals that may lead to data breaches, ransomware demands, and financial loss.

What are Misconfigurations?

Misconfigurations are overlooked errors in system setups that create vulnerabilities without the need for hackers to apply advanced hacking techniques. These silent threats are human-driven oversights when configuring software, hardware, or cloud services. Good examples include improperly set permissions in cloud storage, insecure API keys left in code repositories, inadequate security monitoring, and unsecured access points like IoT devices with default passwords.

These issues arise from human error, which accounts for 82 percent of misconfigurations. This is also compounded by today’s cloud era, where businesses depend on cloud platforms, software as a service stacks (SaaS), and AI-driven infrastructure. Many organizations now use multiple providers, and this makes configurations challenging. Rushed deployment also adds to the misconfiguration problem, especially when a thorough audit is not conducted. Unlike malware or phishing scams, misconfigurations remain undetected until exploited.

2025’s Worst Cyberattacks Fueled by Misconfigurations

This year alone, there has been a surge in incidents related to misconfiguration, which is alarming. There were more than 9.5 million cyberattacks in the first half of the year. A good example is the Coinbase breach of May 2025, in which data from more than 70,000 customer records was stolen. This breach is attributed to insider threats exploiting misconfigured permissions.

Recently, cybersecurity researchers revealed a botnet campaign that exploited misconfigured DNS sender policy framework (SPF) records across 20,000 domains and compromised more than 13,000 MikroTik routers. This enabled large-scale spam and spoofing attacks.

In many regions, misconfigured VPN gateways and remote access tools have also contributed to ransomware campaigns. This is through attackers bypassing perimeter defenses by exploiting a misconfigured VPN portal.

IoT weaknesses have also seen entire networks of smart devices compromised, simply because administrators did not change the default login credentials. The entry points ranged from security cameras to industrial sensors, allowing attackers to access more sensitive corporate systems.

Why Organizations Keep Making the Same Mistakes

  • Talent shortage – Many IT teams are stretched and lack sufficient experts to catch every misstep.
  • False confidence in automation – While automated tools are a great help, they are not foolproof. Overreliance on these tools and having a set-and-forget mindset can leave room for security breaches.
  • Velocity over security – This happens when rapid delivery of product features overshadows the slower discipline of security reviews.
  • Siloed responsibility – In many organizations, security is delegated to a separate team instead of being embedded across different units like the development, operations, and business units.
  • Awareness gap – Many teams underestimate how a single overlooked setting, like an open test environment, can escalate into a full-scale breach.

Prevention Strategies and Best Practices

Fortunately, misconfigurations are one of the preventable causes of security breaches. Preventing misconfigurations requires proactive measures that include:

  • Continuous auditing and testing – It is crucial to ensure regular audits and testing of automated tools for configuration management to detect and reduce the window of exposure.
  • Adopt zero-trust models – No device or user should be trusted by default; grant only minimum access where required.
  • Strengthen access controls – Always change default device credentials, partition networks, and enforce MFA across all accounts.
  • Automated detection tools – Use cloud security posture management, compliance-as-code, and drift detection to catch misconfigurations in real time.
  • Cross-functional training and culture – Employee training is vital, as human error accounts for 82 percent of incidents. Security literacy should extend to both technical and non-technical teams.
  • Follow industry guidelines – Align with recognized security frameworks (NIST, ISO, CIS) and CISA’s published guidance on the Top Ten Cybersecurity Misconfigurations. For example, avoid using default configurations, enforce patch management, and properly segment networks.
  • Incident response readiness – Have a well-drilled response playbook to ensure minor disruption in case the defenses fail.

Conclusion

Simple misconfiguration remains a silent enabler of devastating cyberattacks through avoidable errors. Business owners must prioritize configuration hygiene to build resilient digital infrastructures and protect against future threats.

It is a clear lesson that cybersecurity doesn’t always depend on battling sophisticated hackers but rather ensuring they don’t get an easy way in.

Enhancing Homebuyer Protections, Wildfire Risks, 911 Response and Domestic Manufacturing

HR 2808, HR 2483, HR 3400, S 306, S 725, S 433Homebuyers Privacy Protection Act (HR 2808) – Introduced by Rep. John Rose (R-TN) on April 10, the House passed this bill on June 23, and the Senate passed it on Aug. 2. Signed into law on Sept. 5, this bipartisan bill prohibits a consumer reporting agency from selling a mortgage applicant’s personal information to other lenders without their explicit consent. The legislation is designed to safeguard homebuyers’ personal financial information and eliminate the frequent bombardment of other lender marketing offers during the financing process underway with the applicant’s existing lender.

SUPPORT for Patients and Communities Reauthorization Act of 2025 (HR 2483) – This bill renews billions of dollars in federal funding for programs responsible for preventing overdoses and further strengthening treatment and recovery services. The renewal of funds to nationwide county programs is timely, given the current behavioral health and substance abuse disorder crises. The bill was introduced by Rep. Brett Guthrie (R-KY) on March 31, passed in the House on June 4 and in the Senate on Sept. 18; it currently awaits signature by the president.

TRAVEL Act of 2025 (HR 3400) – Also known as the Territorial Response and Access to Veterans’ Essential Lifecare Act, the purpose of this bill is to enable VA physicians and specialists to travel to hard-to-reach areas in U.S. territories for up to one year. The Act is designed to help fill critical gaps in VA medical services across the Pacific territories by compensating providers with travel bonuses. The legislation was introduced by Representative Kimberlyn King-Hinds (R-Northern Mariana Islands) on May 14. It passed in the House on Sept. 15 and currently lies with the Senate.

Fire Ready Nation Act of 2025 (S 306) – Introduced by Sen. Maria Cantwell (D-WA) on Jan. 29, this legislation would establish a fire weather program at the National Oceanic and Atmospheric Administration (NOAA). The new program would enable scientists to better predict wildfires, fire weather, and fire risk via forecasting, detection, and modeling, as well as respond quickly to prevent devastation to families, homes, and businesses due to wildfires. The legislation was passed in the Senate on Sept. 10 and is now under review in the House.

Enhancing First Response Act (S 725) – This bill was introduced on Feb. 25 by Sen. Amy Klobuchar (D-MN) and passed in the Senate on Sept. 10. The law would reclassify 911 dispatchers as public safety workers from their current role as office and administrative support in the federal Standard Occupational Classification system. In addition, the bill contains provisions to improve access to the 911 call system during major disasters and make the system more resilient against outages and disruptions. The fate of this bipartisan bill now rests in the House.

National Manufacturing Advisory Council Act (S 433) – This Act was introduced by Sen. Gary Peters (D-MI) on Feb. 5. It seeks to establish a working group of representatives from industry, labor, and academia to advise Congress on policies and programs to enhance domestic manufacturing despite the challenges of global competition, U.S. supply chain issues, and the current tariff solution. The bipartisan legislationwas  passed unanimously in the Senate on July 14 and is currently under review in the House.

A Look at the Nonaccrual Experience Method

Nonaccrual Experience MethodWhen it comes to running a business, having outstanding invoices that turn into uncollectible receivables or simply bad debt is a fact of life. The Internal Revenue Service (IRS) has a safe harbor that permits businesses to reduce consideration of such bad debt from taxation if it qualifies. However, understanding how to determine if a business is eligible is essential to making the most of it when a business files its taxes.

Defining the Nonaccrual Experience Method (NAE)

When businesses perform a service, they expect to be paid. However, they sometimes have unpaid invoices that are uncollectible. One provision within the IRS’s Internal Revenue Code (IRC) is that of the nonaccrual experience method (NAE) and how it intersects with bad debts.

How It Works      

Once a company sees bad debt in its system after customers fail to pay their invoices, it calculates the amounts it projects it won’t be able to collect. Projecting bad debt is accomplished by the company looking at previous experiences with its payees. It’s important to note that this accounting is used by businesses for only a portion of their projected uncollectable customer bad debt; businesses similarly project the remaining percentage they expect to collect from outstanding invoices in the future.   

One important step for businesses to determine their eligibility for relief from the accrual segment of uncollectible revenue, per the U.S. Securities & Exchange Commission (SEC), is by determining their industry classification. Sample industries include legal professionals, engineers, performance art professionals, architects, and actuaries.

It’s important to note that if businesses don’t use this method, they may charge off such debts. Charge-offs are when a company writes the debt off its balance sheet and expenses the uncollectible funds on the income statement. Companies must also adhere to the following criteria to take advantage of the safe harbor:

  • The company must currently use the accrual method of accounting when recording revenues, and not the cash method to account for revenue.
  • The company, in a single year, within the past 36 months, has earned up to, but no more than $5 million in gross receipts.

IRS Guidance

Beginning in September 2011, the Internal Revenue Service permitted taxpayers to use the NAE method to determine applicability by applying a factor of 95 percent to their allowance for bad debts via their past 60 months of financial documents. This permits businesses to exclude qualifying uncollectible revenues from their taxable income, which is beneficial for lowering the amount of taxes owed. It is often easier for NAE-specific designated industries to qualify; however, only companies with the appropriate amount of historical information to substantiate are eligible.

Further Considerations and Conclusion

One example of this safe harbor includes having financial information that’s expertly tracked for the past 60 months via financial statements. If the company can’t substantiate it, they won’t be able to qualify. Similarly, eligible services provided or the resulting receivables that have interest and/or financial penalties attached are ineligible.

When it comes to navigating the IRS code, the NAE can provide another way for eligible companies to maximize filings and tax obligations.

Supporting Veteran Careers, Protecting the Food Supply, and Reducing Wasted Government Spending

Supporting Veterans in STEM Careers Act (S 153) – This bill encourages veterans to participate in STEM (science, technology, engineering and mathematics) fields in a variety of ways, including making veterans eligible for certain National Science Foundation (NSF) programs. The Act directs the Office of Science and Technology Policy to establish an interagency working group to improve veteran and military spouse representation in STEM fields, and authorizes funding for the Government Accountability Office to study 1) the academic success rates of student veterans pursuing an undergraduate degree in STEM and related fields; and 2) the barriers faced by such students in pursuing such degrees. This legislation was sponsored by Sen. Marco Rubio (D-FL) on Jan. 16, 2019. It was passed in the Senate in December, the House in January, and was signed into law by the president on Feb. 11.

Protecting America’s Food and Agriculture Act of 2019 (S 2107) – This legislation directs U.S. Customs and Border Protection to hire and train more agricultural inspectors at land, air and sea ports to prevent African swine fever and other foreign animal diseases from entering the United States. The legislation was sponsored by Sen. Gary Peters (D-MI). It was introduced on July 11, 2019, passed the Senate (October) and then House (February) and is currently waiting to be signed by the president.

Payment Integrity Information Act of 2019 (S 375) – This bipartisan bill is designed to reduce federal government waste in the form of overpayments, underpayments, payments made to ineligible recipients or payments that are not properly documented. It authorizes the Office of Management and Budget (OMB) to establish pilot programs to test potential accountability mechanisms for compliance requirements, such as updating a plan to improve the integrity and usage of Social Security death data. The Act was introduced on Feb. 7, 2019, by Sen. Thomas Carper (D-DE); it passed the Senate in July, the House in February and is currently waiting to be enacted.

Presidential Transition Enhancement Act of 2019 (S 394) – This law requires eligible presidential candidates (as of September of an election year) to develop and release transition team ethics plans, including how they will address their own conflicts of interest, prior to election day. It also is designed to focus a transitioning government on ongoing issues in the public interest during the changeover so that priorities are not shifted to solely address those of special interest lobbyists. The bipartisan bill, introduced by Sen. Ron Johnson (R-WI) on Feb.7, 2019, was passed by the Senate in August and the House in February. It is awaiting signature by the president.

United States-Mexico-Canada Agreement Implementation Act (HR 5340) – Introduced by Rep. Steny Hoyer (D-MD), this legislation represents the new trade agreement between the United States, Mexico and Canada to replace the North American Free Trade Agreement. This bill passed in both the House and Senate and was signed by the president on Jan. 29. Mexico has also signed the agreement. However, Canada is still in the process of getting it ratified through Parliamentary procedures.

PIRATE Act (HR 583) – This bill dramatically increases the fine for operating a “Pirate Radio” station, in which people set up their own stations outside the official Federal Communications Commission (FCC) system. The maximum fine increases from $19,639 to $100,000 per day, with a maximum total fine capped at $2 million, up from $147,290. The legislation was introduced by Rep. Paul Tonko (D-NY) in January 2019. It passed in the House in February 2019 and in Senate in January 2020. The bill was signed into law on Jan. 24.

6506148 B2 Patent: Nervous System Manipulation – Is it Real or Just Paranoia?

Imagine someone manipulating how you feel. Of course, no one wants that. But how about being manipulated unknowingly? This is exactly what is happening to your nervous system every time you switch on your TV or computer.

Well, at least according to the 6506148 B2 Patent.

The patent named “Nervous System Manipulation By Electromagnetic Fields From Monitors” was filed in 2001 and published in 2003. The patent was filed by one Hendricus G. Loss (perceived to be a fictitious person as no information about who he really is can be traced).

Is it Worth Any Attention?

We already know that the content displayed on TVs or even on the internet is created in such a way as to influence decisions, such as when making a purchase or standing behind certain beliefs.

The mind control subject has been a topic of discussion for a long time. Although initially considered a conspiracy theory, its reality has been observed in the content displayed by mainstream media.

But how about manipulation through the nervous system?

Science teaches us that the work of the nervous system is to carry messages throughout the body and control your senses. The nervous system, according to neuroscientists, is controlled by the brain.

Now, the brain is said to be a complex bioelectrical organ that produces electric fields.

That’s why it’s believed that you can rewire your brain through techniques such as listening to binaural beats. Scientists also claim to control brain functions with a technique that uses powerful electromagnetic radiation. This technique, known as Transcranial magnetic stimulation (TMS), can jam or excite particular brain circuits.

Think of how you are not allowed to use cell phones in some areas of a hospital or in an airplane (where some only allow use in airplane mode). This is so that the electromagnetic transmission of the phone does not interfere with critical electrical devices.

So if a brain is a bioelectrical organ, is there a possibility of manipulating it?

How it Happens, According to 6506148 B2 Patent

Here is a short excerpt from the patent abstract:

“Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near ½ Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation.

It is, therefore, possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be embedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity.”

The US Patent 6506148 B2 is a confirmation of the possibility to manipulate the nervous system. The patent includes 14 claims including how video can be used to manipulate the nervous system.

Is it just a conspiracy theory?

Well, it’s not easy to tell. But we can’t ignore the concerns raised in regards to electromagnetic fields (EMF). The EMF issue has raised so much concern that in May 2015, 190 scientists from 39 nations submitted an Appeal to the United Nations requesting the World Health Organization (WHO) adopt more EMF exposure protective guidelines.

Such concerns are an indication that the patent should not be ignored. It also goes to show that apart from your electronic devices recording, monitoring and watching everything you are doing, they can also influence living organisms’ feelings, perceptions, thoughts and behavior.

Switch off that Screen

Well, this is practically not possible. The dependence on these electronic devices is so high that we are practically immobilized if they were to be turned off. Electronics have become part of human attachment.

The age of the Internet of Things (IoT) doesn’t make it any better. Now that we are surrounded by electromagnetic emitting devices, the patent serves as an alert to the public of the possibility of what could happen if these technologies were used unethically.

Unfortunately, the technology is here to stay. The only option is to minimize the exposure from your EMF emitting devices. Therefore it’s not a bad idea to try something different: read a book, go hiking, take a walk or simply switch off that screen when you can.

7 Ways to Avoid Investment Fraud

These days, you can’t be too careful when it comes to investments. And if you’re older, you’re a prime target for fraudsters. That said, anyone of any age is vulnerable. Here are a few key things to keep in mind when you’re considering investing.

Ask Lots of Questions

Of course, you’re going to ask questions, but make sure you ask the right ones. Is the product registered with the SEC or state securities agencies? What are the fees? How does the company make money? What things might affect the value of the investment? Are my investment goals aligned with the investment? How liquid is this investment? For more ideas about what questions to ask, check out this comprehensive resource from the U.S. Securities and Exchange Commission.

Do Your Research

And we don’t mean simply Googling them. If you’re thinking about investing in a publicly traded company, go immediately to the SEC’s EDGAR database. You can look up the prospective company to see if it’s legitimate.

Beware of Unbelievable Returns

If something sounds too good to be true, chances are it is. If you hear that the investment will make “incredible gains,” is a “breakout stock pick” or has a “huge upside and almost no risk,” these are big red flags of fraud. Further, if the salesperson promises a guaranteed return, you know this isn’t true; every equity investment has a modicum of risk.

Resist ‘Act Now’ Offers

If someone tells you that this investment is a once-in-a-lifetime offer and it will be gone tomorrow, walk away. Another scam tactic is one that claims “everyone is investing in X stock, and so should you.” As irresistible as this might sound, don’t succumb to the pressure. It’s a trick.

Avoid Reciprocity

One of the most common lures that tricksters use are free seminars that include lunch. They play on your guilt and figure that if they do something for you, you’ll return the favor and invest. It’s never a good idea to invest on the spot. Take the materials home and do your research. With that said, not every free seminar is bogus. Just follow through with your due diligence and protect yourself.

Know Your Salesperson

We’re not talking “know,” as in you follow them on social media or you have a number of mutual friends and they come highly recommended. But even if you’re connected with them through a seemingly respected company and you “feel” like they’re trustworthy, don’t trust blindly. Check them out at BrokerCheck, an online database maintained by the Financial Industry Regulatory Authority (FINRA). This is a nongovernmental group that watches over securities firms and dealers. Remember: credibility can be faked. Don’t be duped.

Stay Away from Robocalls, Emails and Late Night TV ads

Let’s be honest, legitimate companies don’t reach people this way. However, swindlers can be very persuasive. But stand your ground. Don’t budge. When it comes to seniors, crooks view them as “more trusting” and less likely to say no. The truth is that older people are more often targeted because the supposition is that they have more assets to tap into – aka steal. Don’t let these buggers woo you. Hang up, hit delete or change the TV channel.

If you’ve taken every precaution and you still feel like you need help before you make an investment decision, consult your accountant or financial planner. When it comes to your hard-earned money, it’s worth all the time in the world.

Sources

https://www.investor.gov/protect-your-investments/fraud/how-avoid-fraud/what-you-can-do-avoid-investment-fraud