Trending Blogs

Hours & Info

+254-773-744-664 / 704-789-392
Monday - Thursday : 09:00 am - 4:30 pm
Friday : 08:00 am - 01:00 pm
P.O. Box 19113 - 00100, Nairobi, Kenya.
E-mail :

Enter your email address to follow this blog and receive notifications of new posts by email.


Diplomatic Lifestyle Journal September 2017 Edition Article Reviews




September 2017 EDITION|



Your security starts with you. If you choose to stay ignorant and happy then be very weary. It is better to stay informed and always alert /cautious for any unexpected eventualities. Moreover, if you are not able to win a battle, then do not fight it.


Security is categorized into three areas:

         * Economic Security

         * Political Security

         * Social Security


Your most serious security threat always emanates from Radicalization. Here, your Assailant or Assailants are made to believe that you are an enemy to an ideology / ideologies that they believe in or have been made to believe in. They are then motivated to defeat their enemy (that is you) as that will be of immense benefit to them. The matter worsens when you are seen as a Social Threat, Economic Threat or Political Threat that needs to be eliminated. Your Killer’s Official Elimination Policy may be based on the principal that the branches of a tree should be cut off instead of the trunk in order for them to succeed. With this principal, they will ensure that every heir to your Social, Economic or Political throne is killed / eliminated to create a hiatus when you die , when they finally kill you or get rid of you.  This principal is always used in situations where there is an Inheritance Policy that passes Wealth or Power down to the First Born, Family Members or Groomed Successors. Such a scenario always results to a security nightmare, as the Eliminator will always aim at solidifying his or her power. After consolidating his or her power, the Eliminator will then embark on a killing spree to eliminate potential competition threats. As a result, any person that is around you will be very afraid as your Eliminator may decide to kill them to weaken you or to pass an indirect message to you. This Guilt by Association always makes you to always aim for success because if you fail, then everyone else dies (including your family). You should therefore be cognizant of the matter and the dangers therein. Once you are aware of the dangers that you and your associates are facing, the need to put in place proper and tight security measures to all the parties involved arises. For instance, when you are with people, women and Foreign Agents may accompany a Male Agent whereas a Male Agent can be escorted by a mix of Male Agents, Female Agents and Foreign Agents to dupe you from suspecting them as being potential security threats to you. When in reality, they are out to harm you.


When evaluating an Elimination Scheme, always ask yourself what eliminating Person X will benefit Person Y. If there are no benefits, then the fight is personal and not territorial. You should also be able to find out on who or what your intended attacker is working for.


Note: You cannot be able to protect other people if you are not able to protect yourself.


If you want  to see the unseen, you must be able to render yourself invisible. This is possible through studying ways that will enable you to hide in plain sight. For example:


    * When you use a route to go somewhere, use a different route when returning.

       Your Ingress (Entry) Route should be different from your Egress (Exit) Route to

       create uncertainty to your Assailants.

    * You can wear a big hat or cap that covers much of your forehead. This is always

       complemented with sunglasses. By dressing this way, you will be able to conceal

       your face to create some form of anonymity.

    * If you are Security Conscious, you can use 2 Female Bodyguards or 2 Guards who

       have Signal Jammers concealed in their clothing to block (wireless) Security


    * You can also make yourself disappear by walking in crowded places while using

       regular clothing that does not have shouting colors such as red clothing.

    * You can also create a hasty disguise by alternating clothing and clothing colors,

       alternating accessories e.g. wristwatch by wrist ankle, alternating messenger bags

       with totes, alternating shoes AND by subtracting or adding reading glasses,

       sunglasses and hats.

       Remember, disguises must be explainable. Fake moustaches etc will result to you

       being convicted and jailed.


Your most important Security Principal is to always protect your own people. This is especially true in your home. Your first line of defense is to build a home that:


    * Incorporates security features and safeguards against natural calamities such as

       hurricanes, typhoons and earthquakes.

    * Is self-sustaining incase of limited Supplies.

    * Is able to sustain the safety of its occupants.

    * Is safeguarded against manmade calamities such as terrorism etc.


Your starting point is to have a Security Guard or Guards at your Gate / Gates or have an Electric Gate that can be remotely opened and closed. This will enable you to avoid dealing with Strangers or Stalkers at your gate. These strangers can be Assassins, Foreign Government Agents, Government Agents, Militia or Mercenaries that have been hired to kill you. Your compound should have a minimum of two Gates and two Compound Divisions. These Compound Divisions include the Outer Perimeter of the Compound and the Inner Perimeter of the Compound. Your Residence is always placed in the Inner Compound Area.


In your Compound, there are 03 Security Measures that must be considered:

     * Structured or Physical Security Measures such as enclosing the residence in a

Wall, use of Razor Wire, use of Electric Fencing etc.

     * Technological Security Measures e.g. use of Closed Circuit Television, Motion

Detectors, Automated Doors and Windows etc.

   * Human Security Measures which essentially involve the use of Human Beings as

Security Guards.


In case the Human Guards are not properly trained, there are staffing problems and there are issues of Cyber Wars where anonymity issues exist, then a breach in V.I.P. Security is always experienced. Cyber Wars Anonymity problems include the Residences Closed Circuit Television being hacked, the Residences Online Automation Systems such as Alarm Activation Systems or Automated Doors and Windows Systems may be breached online etc. Weapons that are being used with Security Personnel should always be with them. On the other hand, Back up Armor should be kept at a secure Armory in an Armory Box from where it cannot be quickly and easily accessed by an Assailant. The first line of defense for a V.I.P.s Residence is the Main Gate. It is advisable to have a minimum of three Guards guarding the Main Gate. This is to enable the Guards to always be two at all times should one Guard be in need of using the toilet, be welcoming / questioning a visitor, be opening the gate etc. Should an Assailant be able to attack one Guard at the Main Gate with a Crude Weapon or even shoot the Guard, then the other two Guards should be able to foil the attack. If there are only two Guards, then the likelihood of the Second Guard being disarmed by an Assailant after the First Guard is attacked is very high. No matter how trained you are, there is always the element of Surprise, Human Element of Laxity and an element of having a Sleeper Cell in your Security Circles that may provide a security flaw in your security undertakings e.g. a Mole or Spy. Should any security flaw be in existence, then your Assailant can use the flaw to fully undertake a Detailed Surveillance of your Property or Residence. He or she can then take a defensive position when attacking. As a result, it will be difficult to neutralize him or her as he/ she will be having a vantage position over you / your Guards as he or she knows:

* What he /she wants.

* Where to get what he /she wants.

* How to get to what he /she wants.

* When to get to what he / she wants.


In the end, you will be caught unawares as you will be playing catch up with the Assailant.


Note: The Security Setting of your Residence can also be replicated on your Office or Company Premises.


Your Residence / Office should be guarded by a Section of at least 09 Officers and their Supervisor/ In Charge, making it a total of 10 Officers who are acting as an Element, Section or Unit. 03 Officers will be Guarding the Main Gate, 02 Officers will be monitoring the C.C.T.V., 01 Officer will be the Guards Deputy Supervisor, 01 Guard will be Guards Supervisor while the other 03 Guards will be patrolling the Premises / will be strategically stationed at Watch Towers as Snipers.


The C.C.T.V. must always be monitored on a 24 hour Basis with its Records Kept / Backed Up at a secure location. The total number of Security Guards will depend on the size of area that they are guarding.


In most cases when you are dealing with a threat of Crowd Attacks, you always do a serious Threat Analysis, Risk Analysis and then determine which Counter Measures or Evasion Techniques shall be put in place. Crowd Attacks can happen in your Residence, While Travelling in between Destinations, During Demonstrations, when at an Event / Specific Location such as your Office or Hotel etc. It is always advisable to note that over relying on Government provided security is never a good idea. Always have your own private Security Detail. Government provided Security Detail could be abruptly withdrawn or recalled to their reporting stations thereby leaving you exposed.


A Diplomatic Passport is also issued at the discretion of the Government of the day and can be withdrawn at will. You should therefore apply for a regular passport by design to let the Government decide if they will issue you with a Diplomatic Passport. Should they withdraw the Passport, you can easily claim to have applied for a regular passport, which they should immediately replace it with. Some people use Dual Nationality to evade such a case where the Government revokes your passport without notice.


Since your private security may not be allowed to be armed, always employ Guards that are well trained in Physical combat e.g. in Karate or Taekwondo. Such Security Guards can be able to use crude and easily available weapons to protect you. For example, a good Darts Man can use kitchen knives as weapons, a Swordsman can use a slasher as an improvised sword, a baseball bat can be used as an improvised baton etc. The Security Guards Supervisor / Commander in Charge always reviews the High Value Personalities Security Plan, Security Situation, Coordinates the Security Detail / Plan and also supervises any crisis that he High Value Personality may find himself or herself in. A Site Plan of the high Value Personalities Residences, Offices or Areas of Operations such as Hotels, Restaurants etc is always created. A High Value Personality Extraction Plan is always engaged should things go awry. For example, a peaceful demonstration can turn out to be violent when hired goons are made to infiltrate the demonstrations or attack the demonstration. This may have been planned intentionally at the knowledge of the Security Forces who may want to use the opportunity as a time of dispersing the demonstrators with brutal force. A long standoff between the Security Officers and Demonstrators may also be expected. You should therefore be always aware of any nebulous connection that is there to deliberately use brute tactics to create chaos, foster discontent among people and to cause disillusions. You may be mistaking peace for quietness when in the real sense there is an evil plan that is taking place in the background.


Always be aware or cognizant on how easy / difficult dealing with a particular situation is. When an attack occurs, what is the appropriate response to undertake? There may be instances where the Security Detail is faced with a Nightmare Scenario where it is difficult for them to defend a High Value Personality.


Even thou a place may be Physically Obstructed, an Assailant / Attacker may manage to breach the Initial Security Perimeter with ease. This may be so if the attack was properly planned.


They may even resort to using a less sophisticated attack approach to prevent the High Value Personality from easily detecting the attack. The Assailant / Attacker can also obtain crucial information from spies or from instructions that may have been given to them by High Level Insider Officials. Always be aware of the fact that your Security Detail may be Used / Hired to kill or eliminate you. Your Security Detail should always have a detailed and continuous security review of your Site Plan. This Site Plan can be the layout of your Residence, Office Location, and Favorite Recreational Facility etc. Ways through which you can be poisoned and the effects of the poisons can be found in the Diplomatic Lifestyle Journal Editions Drug Debunking Articles.


As a Very Important Person, you should always be able to know your security arrangements and patterns. Always employ a mix of security operations or patterns to avoid being predictable and always have a Tactical Retreat Plan should the initial security plan fail. V.I.P. Security Guards and the V.I.P. himself / herself should be able to be highly trained in fighting installation security. As a result, the High Value Personalities Compound / Residence is always divided into several sections in case of a security breach. Each section will then have various security features and high value V.I.P. Surveillance Tools.


In case a V.I.P. Residence, Office etc is attacked, Security Personnel always conduct an overview of the area while using various surveillance methods such as Chopper Patrols, debriefs from Site Personnel / First Responders etc. Remember, your greatest enemy always comes from within. It is therefore imperative that you are aware of the possibility of your security being breached through having insider information being leaked to your enemies. Leaked Security Details, Leaked Top Secret Information and Security Flaws is always a symptom of an essential lack of cohesion between the Parties / Entities involved. Decoy Security Passwords are also good security strategies to use. For example, most Financial Institutions use the Pin Reversal Alert Technique to allow their Clients to call the police in case of distress when withdrawing money from an Automated Teller Machine. In such an instance, the A.T.M. will automatically alert the Financial Institutions Security Team of the A.T.M. Cards security breach and the A.T.M. will dispense the input amount, albeit, it will deliberately withhold the dispensed money in the waiting compartment instead of letting it out to the outside tray ( from where a Client can physically take the money). As a result, the person withdrawing the money will not be able to physically take the money. The A.T.M. Card’s Pin will also be blocked from performing further transactions. At this time, the A.T.M. Camera will be covertly taking pictures of the thief or surrounding for security purposes. The same Pin Reversal Technique can be used in Mobile Money Transfer, Home Security Systems, and Vehicle Security Systems etc.


A Security Guard can also fool his /her Assailants that he / she is in the company of a team of Security Officers by shooting at the Assailants with different ammunitions, from different locations. This can fool someone to think that the shootings are from different people.


In case of a Security Breach or Ambush:

    * The first duty of any V.I.P. Security Officer is to secure the package (High Value

       Individual) in a Safe Haven or Secure Location.

    * The Team will then take Tactical Positions while setting up in war formation.

    * The V.I.P.s Security Detail will then Identify the Level of Attack and the Position or

       Positions of Attack.

    * The Next Step will be for the V.I.P. Security Detail to Identify the weapons of attack

        and if they have a Security Back Up Team or not. Security Backup is usually

        essential especially when you are tactically overwhelmed and there is a need of

        immediate assistance. If the Backup Team is not around, then it is always

        advisable to assume that you are on your own. This is so, because the Backup

        Team can be eliminated while en route to support the V.I.P. Team. The Backup

        Team can also be faced with security obstacles that were deliberately put in place

        by the attacker to stall or delay their response. As a result, the attacker will have

        secured ample time to accomplish his or her mandated mission before the Backup

        Team arrives.

    * The V.I.P. Security Team will then study their terrain, know their terrain or orient

        themselves with the terrain on the go. This is always done in advance but in most

        instances, it is never possible with a surprise attack. The information is always

        crucial in case of a Tactical Retreat or in identifying potential Security Lacunas

       that need to be sealed in advance. No human being is perfect and so, some Security

       Flaws are always expected. Security Flaws may also be deliberately made to fool an

       Assailant into a Security Trap. It is at this moment that the Security Team has to

       consider or decide what will happen in case they find themselves in a Security

       Holdout. This is the worst-case scenario, as the team has to employ Multiple

       Surveillance Techniques and Security Briefings to determine:

           *** How to out-maneuver the enemy.

           *** Whether to surrender.

           *** Whether to employ Security Delay Tactics as the Backup Security arrives, etc.

    It is crucial that you do not always dispatch one Security Backup Team but Multiple

    Teams to avoid having a Single Point of Failure.

 * Lastly, the V.I.P. Security Detail will constantly identify and monitor the logistics

     involved in the Counter Attack, the number of Security / Military Assets involved in

     the counter Attack, the ammunition that the Security / Military Assets have, the

     Defense and Attack Limitations or Vantage points etc. This will be considered as a

     way of ensuring that the High Value Person is safely kept out of danger.


Note: As a V.I.P., it is essential that you acquaint yourself with Self Defense Tactics or Techniques, as they will help you to survive an attack. For instance, training on how to jump out of a moving vehicle or onto a moving vehicle.


To create anonymity, an amorphous Team of Security Personnel can be set up to eliminate or neutralize you. This team always consists of newly trained recruits who can be quickly assembled to perform a task. Once the task is accomplished, they will be deployed to their assigned positions (in different postings) to create anonymity and an opportunity of foolproof deniability. Since allegations must be confirmed to be true with shreds of evidence, such an assembled team can never be found.






September 2017 EDITION |


The most disruptive and revolutionary Inventions or Innovations always come from the extremes and not from Corporate Circles. Inventors always view things differently. They always see the big picture. As a result, they end up creating new Products / Services and entire systems that revolutionize the world. It is for these particular reasons that Crypto Currencies and the Block Chain Technology were invented. Crypto Currency is virtual or digital money that is being created, stored and exchanged on networks, which have computers that are connected on the internet. Crypto Currency is digital currency that has been designed to operate in a way that is devoid of the Central Bank, Reserve Bank, Political or Individual Control. The ultimate power of Crypto Currency has been able to be seen through its mainstream adoption and an ever-growing value of its adoption. Crypto Currency was invented as a way disinter-mediating Governments and Banks or Financial Institutions from manipulating money. A detailed Article on how this is done is explored in the Diplomatic Lifestyle Journal December 2016 Edition: Money Skewing Schematics Article.



 A Crypto Currency is an entry on a publicly or privately distributed computer called a Block Chain. The Crypto Currencies Ledger is its Block Chain. A Block Chain is a record of every Crypto Currency that is in existence; including every Crypto Currency Transaction, that has ever taken place on the Crypto Currency Network. The Crypto Currency Chain always balances as no Crypto Currency ever leaves the chain. Banks or Financial Institutions always record Debit and Credit Accounts as a Plus (+) or Minus (-). Banks or Financial Institutions also record their Clients Account as a Digital Wallet. A Crypto Currency is usually sent from one user to another as code. The code that is sent to the new Crypto Currency Owner always acts as his or her new key. As transactions are being constantly processed on the Crypto Currencies Globally shared Network, these transactions are simultaneously synchronized on the one Ledger that is used across the Crypto Currencies Global Network. Each Computer or Crypto Currency minor has a complete and identical copy of the Ledger for referencing purposes. By making the Block Chain to be public, no one person or computer is able to control it.


Owners of any network computer who allow their computers to be used for processing a transaction and for keeping the network secure are automatically rewarded with a fraction of the processed Crypto Currency as Transactional Costs. This enables them to replace Financial Institutions, Banks or Bankers.


The Transactional Cost payments may be capped at a maximum amount. When the capped payment amount has been reached for the day, further transactions processing by the owners network computer may be undertaken for free e.g. Bitcoin initially limits each processing machine to 1800 Bitcoins Per Day. This is what is referred to as Mining in the Crypto Currency world. Crypto Currency payments can be directly sent from one entity to another without having to pass through a Trusted Third Party by a peer-to-peer network. This peer-to-peer network is also used to prevent double spending. Digital Signatures are also used to prevent double spending. In addition, the network automatically timestamps transactions by hashing them into an existing chain of a hash-based proof of work. As a result, a record that cannot be changed without redoing the proof of work is formed. A Hash Function is any function that is used to map an arbitrarily sized data to a fixed size data. Hash functions accelerate searches in tabular data or in databases by detecting duplicated records in a large file.

Hash Function Mapping diagram


Diagram showing a Hash Function that maps Entities to Integers from 0 to 100.


There is a collision between Keys “Diplomatic Lifestyle Journal” and “Sanfordestroe Company”.


A Hash Function needs to be collision resistant, by ensuring that no data is able to generate the same Hash Value as aforementioned.


In Crypto Currency, the Timestamp Server Work automatically Hashes a block of items that need time stamping. All Data must have a Hash and the Hash is widely published across the entire network.






September 2017 EDITION |


It is always amazing at the way society tends to tolerate the Biggest Killers and Gateway Addictions for people just because they love the Addiction. On the other hand, the same Society always tends to act horrified by much Smaller Destructive Behaviors, because they disapprove of them. Addiction Exploiters always take advantage of this by making deals with Pushers or Sellers to flood the Commodity / Service to the Markets. These Pushers or Sellers may be Doctors who prescribe their drugs to Patients who in turn get addicted to it or Politicians who protect the Addiction Exploiters etc. When money is exchanged to make deals with powerful Decision or Policy Makers such as Politicians, Doctors, Drug Companies etc., Action is always taken after the damage is done and not before the damage is done. Such an Action is always a day late, Short of money and At the expense of human life. Addiction Products or Services always come in the form of Obsessions or Radicalizations e.g. Alcoholism, Cigarette Smoking, Usage of Drugs such as Cocaine / Opioid / Heroin etc. People facilitate Addiction Problems, when they are not willing to work in order to have Food, Shelter and a few luxury items.


NB: There is nothing in life that is free as someone else has to pay for it or is paying for it.


Addiction Cartels always create a problem that makes them money. They also come up with a solution to the problem that they had created and in turn make more money out of it.


Addiction Exploitation by Cartels Process Diagram


Addiction Exploiters always get away with their crimes because every Country always has two sets of laws in place:


    * The Law that favors the Rich or The 1%

          * The Law that caters for everyone else or The 99%


Every Political, Economic and Social Spheres of life have been permeated by the Pay to Play Lobbying System. With the right amount, Addiction Exploiters are able to circumnavigate existing systems for personal gain. It is for this reason that Drug Companies are allowed to work on new drugs that will help prevent fatal overdoses when the Users feel like it is okay to overdose themselves. This should not be the case as the Addictive Drug should be completely eliminated. If you did not need the drug before, then why do you need the drug today? Addiction Exploiters always oppose such an action, as they are able to enrichen themselves when more and more people Use or Consume their Products or Services to the point of being addicted to them. This Pay to Play Lobby System enables Politicians and Government Officials to allocate more money to the treatment and cure of a Level 02 Drug instead of a Level 01 Drug. This may be deliberately done, as they profit more from such an arrangement since a Level 01 Drug is actually more dangerous when compared to a Level 02 Drug.






September 2017 EDITION |


Sarin is a poison that can be delivered as a Binary Agent. Binary Agents are delivered as two separate components. When the two components are combined, they form a lethal poison. Sarin is a colorless, organophosphorous liquid, which has almost no odor in its pure state. This Nerve Agent or Gas was developed but was never used by Germany during World War 02. German Researchers at I.G. Farben developed a man made chemical know as Sarin in 1938 for use as a pesticide. The Chemical Weapons Convention banned the use of Sarin Gas in 1993. Sarin is used as a Chemical Weapon due to its extreme potency as a Nerve Agent.


Sarin is made from Methlyphosphonly Difluoride and Isopropyl Alcohol and it easily decomposes into Non Toxic Phosphonic Acids when exposed to high PH Levels. It also has a very high Volatility Level, which means that it can easily vaporize from liquid to gas.



                                                * Carbon ———- 13.043 %

                                                * Hydrogen ——- 1.087 %

                                                * Fluorine ——— 19.565 %

                                                * Phosphorous — 48.913 %

                                                * Oxygen ———- 17.391 %




A Single Droplet of Sarin is absorbed into the bloodstream when it is inhaled or during contact with the skin. It then paralyses the nervous system by preventing nerve endings from allowing muscles to stop contracting. This usually leads to respiratory failure as the muscles that control breathing are rendered ineffective, resulting to asphyxiation or suffocation. Once the victim has been incapacitated, death is always imminent. Sarin’s ability to mix with water usually enables it to be used as a poison. As a result, ingestion of contaminated Food, Water or Liquid, including light skin contact is possible. All you need is a very small amount of Sarin to cause some devastating harm to your victim e.g. death or permanent neurological damage.




Bitcoins and Crypto Currency Bigger Coverpage with name and snf


Diplomatic Lifestyle Journal December 2017 Edition Reviews




December 2017 EDITION|



 Vehicles have an Accepted System of Protection Levels. These Protection Levels indicate a Vehicles ability to resist various Bullets and Ammunition Attacks from penetrating inside the Vehicles Chamber or Compartment. This includes the use of Ballistic Glass and Armor, which has been specifically, designed to Tailor Fit each Vehicle Model. Most V.I.P.s / Diplomats invest in their own Security Systems, as the Government cannot provide the Citizenry with Sufficient and Reliable Security. All High Profile Leaders, Celebrities and Individuals use Armored Vehicles because of the Vehicles ability to save lives and the technology that is installed in them for use in case of attack. When buying an Armored Vehicle, you must Research on the Vehicles Ballistic Protection. The Type of Territory the Vehicle will be used in and the necessary Safety Protection Level are always used to determine an Armored Vehicles Ballistic Plating Specifications. Armored Vehicles are always built in a way that will ensure that the armoring does not alter the vehicles appearance or draw any unwarranted attention as that can compromise the Users Security. Armored Vehicles Basic Features include Evading, Escaping, Engaging in a Counter Attack and Protecting the Occupants at the Point of Attack. Vehicle Armoring is done in different levels. The European Standards EN 1522 / 23 and EN 1063 specified 7 new levels of protection .i.e. B 1 to B 7. New Standards resulted to B 6 becoming VPAM 7 while B 7 became VPAM 9.




Abbreviation BR is defined in the Standard DIN EN 1063 and is used for Protection Levels of Transparent Armor (Bullet Proof or Resistant Glass for Armored Cars).


Abbreviation FB is defined in the Standard DIN EN 1522 and is used to indicate the Protection Level of Opaque (Nontransparent Materials such as Armor Steel, Kevlar, Twaron, Aramid, UHMwPE [Ultra High Molecular Weight Polyethylene e.g. Dyneema or Spectra], Ceramic etc., which are often used in Armored Vehicles.


Abbreviation VR is defined in the Standard BRV 1999 and was replaced with a new edition of BRV 2009. This Standard specifies Protection Levels of a Complete Vehicle.


A European Body VPAM i.e. Vereinigung der Prϋfstellen fϋr Angriffshemmende Materialien und Konstruktionen {Association of Centers for Certification of Bullet Resistant Materials and Constructions} defines 14 Protection Levels. B 6 was marked as VPAM 7 and B 7 was marked as VPAM 9.


Note: All Protection Levels and Standards are always reviewed and updated when the need arises.


Many Armored Vehicles are installed with Environmental Systems that can filter out Nuclear Agents, Biological Agents and Chemical Agents.


STANAG 4569 Standard provides Protection Levels for Occupants of Logistics and Light Armored Vehicles.


Class B 1 and B 2 Protection Levels are barely used in Security Vehicles Armoring. Class B 1 Protection protects the vehicle against Vandals and Blunt Blows with Bricks, Hammers etc. The Armor Glass Thickness is 7 Millimeters. Class B 2 can withstand a 9-Millimeter & a 38 of Special and Lesser Rounds. Any Caliber that is larger than a 9 Millimeter has a greater chance of Penetrating and Striking the Vehicles Interior. A Class B 2 Protection can only slow down Bullets of larger Caliber Weapons. Class B 2 Armoring is used for Anti Theft Protection by stopping Low Power Projectiles e.g., a .25, .32, .38 etc. The Armor Glass thickness is 16 Millimeters. Class B 1 Bullet Speeds are 360 Meters Per Second whereas Class B 2 Bullet Speeds are 400 Meters Per Second.



      * Most Armored Vehicles have Modified Suspensions and Brakes to sustain their

        added Weight.

     * In the United States, The National Institute of Justice rates all Armor in 08

        Protection Levels. These are Classes I, II A, II, III A, III, IV, V and VI.

     * In Europe and many other Parts of the World, Armor is usually Rated from Level

        B 1, B 2, B 3, B 4, B 5, B 6 and B 7.

     * Class N.I.J. 01 maps to Class B 01, Class N.I.J. II A maps to Class B2 and Class N.I.J. II

        maps to Class B 3.

     * Armor Testing is usually done from 05 Meters to 15 Meter Ranges, depending on

        the Class or Rating of the Weapon.


The Driving Characteristics of Armored Vehicles differ from that of Non Armored Vehicles. This is because Armor Plate weighs from 1500 Pounds and above as determined by the Armored Vehicles Protection Level. Sports Utility Vehicles and Light Trucks may not allow for Armored Plating that exceeds 2500 Pounds as it may exceed the Cargo or Carrying Capacity that was predetermined for them by the Vehicle Manufacturer. Most Sedans have a Carrying Capacity of 1000 – 1200 Pounds. This definitely limits their Armor Choices unless Heavy Vehicle Modification is undertaken. An Armored Vehicles Armor Plating Weight may subject the Vehicle to be susceptible to Rolling Over, Reduced Acceleration Speeds and to a severely affected Braking Power. It is therefore important for the Driver to undergo an Armored Vehicle Operation Driving Lesson to orient himself or herself to an Armored Vehicles Driving Challenges. Gun Ports may be installed on an Armored Vehicles Doors and Windows to enable its Occupants to fire weapons from inside without compromising security. The most expensive part of an Armor System is its Armor Glass. Armor Glass is also very heavy and strong. An Armored Vehicles Fire Extinguishing System is usually used on the Vehicles Engine and the Vehicle itself.


Class B 3 Protection can withstand a .357 Magnum Rounds or Lesser Threats. Class B 3 Protection Bullet Speeds are 430 Meters Per Second.


NOTE: The way an Armoring Company Designs and Integrates Independently Certified Materials in an Armored Vehicle for the overall protection of its Occupant’s is the most important factor of any Armored Vehicle. Apart from using the Highest Standards of Materials, one should also ensure that the Highest Quality, Design, Engineering Systems and Processes are used to continuously create Armoring Standards that exceed Internationally Accepted Ballistic Protection Levels.


Class B 4 Protection can withstand a .44 Magnum or Lesser threats. It therefore protects against Small Arms with Bullet Velocities or Speeds of 440 Meters Per Second and Impact Energy of 1,510 Joules. B 4 Ballistic Protection is against the following Handguns and Shotguns:


* .38 Special Handgun which has a Soft Core Bullet of approximately 850 – 10.2

Grams or 158 Grams.

* 9 Millimeter Handgun that uses a Full Metal Jacket Round Nose Bullet Soft Core of

Approximately 1400 – 8.0 Grams / 124 Grams.

* .357 Magnum which uses a Full Metal Jacket Coned Bullet Soft Core of

approximately 1395 to 10.2 Grams / 158 Grams.

* 44 Magnum that uses a Full Metal Jacket Flat Nose Bullet Soft Core of

approximately 1400 to 15.55 Grams / 240 Grams.

  * 12 Gauge Shotgun that uses a Shotgun Cartridge of approximately 1575 to

1 1/8 OZ.


Class B 5 Armor Protection is capable of withstanding a .357 Magnum Assault from a distance of 5 Meters.


Class B 6 Armor Protection is capable of withstanding 7.62 x 39 Rounds from a Kalashnikov. Class B 6 Protection also provides Ballistic Protection for Armor Piercing and Penetrator Rounds from High Power Riffles such as:


* 762.30 Carbine, which uses a Full Metal Jacket Round Nose Bullet Soft Core.

* 5.56 x 45 Millimeter (.223) that uses a Full Metal Soft Core Pointed Bullet + Steel

and Lead Penetrator.

  * 7.62 x 39 Millimeter that uses a Full Metal Jacket Pointed Bullet Soft Core.

* 7.62 x 51 Millimeter NATO (.308) that uses a Full Metal Jacket Pointed Bullet Soft


* 7.62 x 54 Millimeter, which uses a Full Metal Jacket Pointed Bullet Soft Core.

  * 7.62 x 63 Millimeter (.30 – 06) that uses a 30.06 Round Nose Bullet Soft Core.


A B 6 Protection Level can shield an Armored Vehicles Parts from an AK 47 Attack or other Artillery, which have Bullet Speeds of 830 Meters Per Second and an Impact Energy of 3,270 Joules.


Note: Armored Vehicle Protection Levels B 5, B 6 and B 7 are very Resistant to Explosions e.g. Roadside Bombs and Suicide Bombs.


Class B 7 Protection is recommended for Presidential Vehicles as its level of Bullet Proofing is designed to Shield Vehicle Occupants from Attackers that are using Powerful Weapons with an Impact Energy of 3,290 Joules and Bullet Speeds of 820 Meters Per Second. B 7 Armoring protects against Armor Piercing Riffles such as:


   * 7.62 x 63 Millimeters (.30.06) which uses a Full Metal Jacket Pointed Bullet Armor


   * 7.62 x 51 Millimeter (.308) which uses a Full Metal Jacket Pointed Bullet Armor

Piercing Hard Core Mass.


In general, Armored Vehicles can be categorized into Lightly Armored Vehicles (VR or BR 1 – 3), Standard Armored Vehicles (VR or BR 4 – 6) and Heavily Armored Vehicles whose ratings vary from between VR or BR 7 – 10.


Lightly Armored Vehicles have a Firewall Protection with an Added Armored Plating around the Vehicles Suspensions, Fuel Tank and Battery. Vehicles are generally Armored using Thin Ballistic Plates that surround the entire Vehicles Exterior to protect its Occupants from Small Arms Fire of up to 9 Millimeters. Larger Calibers have a greater chance of Penetrating and Striking the Vehicles Interior.


Standard Armored Vehicles have all the Standard Features of Lightly Armored Vehicles with an Enhanced Ballistic Protection. The Armor Plates Thickness is increased to withstand shooting from Calibers of up to 7.62 Rounds (which are generally used by AK 47s).


Heavily Armored Vehicles are amongst the most secure Bullet Proof Vehicles. Their Armor Plating protects against .223, .308, 7.62, .50 and 14.5 Caliber Rounds. These Vehicles Protection Features include Floor Blast Protection, Ballistic Glass, Run Flat Tyres, Smoke Screens, an Automated Boot as an Anti Kidnap Function, Emergency Windscreen Exit, Bullet Resistant Glazing, Fire Attack Protection with Extinguishing System, External Intercommunication and additional Driver Aids such as Night Vision, Global Positioning System, Professional Navigation Systems, Parking Distance Control, Xenon Lights, Universal Remote Control etc. The Vehicles Armor Plating is usually thicker and surrounds the Vehicles Exterior & Critical Parts.


Most Body Armor Brands have a ‘+’ Sign added after a Threat Level. The sign implies that the Body Armor has been tested for an additional Caliber other than the respective Protection Levels approved or mentioned Calibers.



A Wireless Closed Circuit Television Camera can have its Signal Jammed. This will result to the Camera Footage at that point not being available as its transmission was interfered with. Wired C.C.T.V. Cameras cannot have their Signal Jammed. It is therefore advisable to have a Hybrid C.C.T.V. Camera Signal Transmission System in place for Backup Purposes. The C.C.T.V. Footage is always stored on Site and its Backup Footage stored in a Remote Location. A C.C.T.V. Cameras Video Capture can also be disrupted or its Quality Video Capture interfered with when:


           * A Person uses a Light Disguise that his or her environment can allow to

              cover His / her Face.

           * By Shinning a Bright Light or Infrared Light on the C.C.T.V. Camera. This

               will result to the Constriction of the Cameras Aperture.       

           * You can also disrupt a Video Feed by Slicing a Razor halfway into the Cable

              and then leaving it in place to bridge the Braided Shield and the Center

              Conductor, causing Static on the Monitors. The Monitor View will be

              returned to normal once the Razor has been removed.


Some Vehicles have Sensors that are used to Activate an Accident Avoidance System once an Emergency is detected. The only thing that is Bullet Proof in an Armored Vehicle is its Glass. The glass usually has Armored Plates Encrypted on its body. In case someone fires at the glass with a Rocket Propelled Moglin Grenade (R.P.M.G.) at close range, there is a high likelihood of the grenade penetrating it.


This is possible as they were designed to withstand bullets that have been shot from a distance. Bullet Resistant Glass is usually made by Layering a Polycarbonate between Ordinary Glass Panes. This Polycarbonate is Transparent but Tough Enough to absorb the Bullets Force. Bullet Proofing usually absorbs a Bullets Energy to stop it. The thickness of the glass usually determines its ability to stop a bullet. A One-Way Bullet Resistant Glass has an Outer Side that will stop a Bullet while the Inner side allows Bullets to pass through without hindrance. Such Glasses are usually made through Laminating a Brittle Sheet with some Flexible Material. An Armored Vehicle should be installed with Ventilations that protects its Occupants against Polluted Air and Tear Gas.






December 2017 EDITION |


Coming Up With and Operating a Successful Business Empire whose Going Concern Concept is very promising is not easy. Nothing good that is of the best quality and that is long lasting comes easy. A lot of hard work, dedication and commitment is required. There is no room for shortcuts as they will cost you in the future and result to your business shutting down. You must take enough time to set up the Foundations of your Business Empire. This Foundation shall act as the Businesses Building Blocks. Your Business Empire always begins as an idea. You then spend some time deliberating over the idea and deciding whether you want to actualize it or not. Once you have decided to actualize the idea, a Detailed Research and Development is undertaken. This is so, as you only want the best. You should also not be so Optimistic or Pessimistic even when your Concept or Idea may seem to be easily and widely acceptable to the Community. Always manage you expectations. More so, remember to always plan for the worst as you expect everything to go on according to plan.


The Next Phase of Actualizing your Business Empire is to Invest your Money in it. When Sourcing for Capital for your Business, you should be prepared to survive with insufficient funding over a long period. Financial Institutions do not lend their money to Start Up’s even if you may be having other Successful Ventures in place. People are also skeptical in Funding a Business Venture that they do not fully comprehend on how they work. The Business Idea may seem to be very Clear and Concise to you but they may not see it in the same way as you do since it is a Completely New Business Idea or Venture. It is therefore recommended that you Start with Business Ventures that you can spend as little money as possible while you set them up or run them.


When your Income Sources Start to increase and the Income Earned Increases, you can then venture into those businesses that require a huge Initial Investment Cost. Running a new business on borrowed money should be avoided, as it is never a good idea. The practice of Operating a Start Up on borrowed money should be avoided whenever possible. This is because you may find yourself defaulting in making payments should the Business Venture not turn out to be as profitable as it was initially anticipated. Learn to live within your means and to be patient at all times. Hurry hurry has no blessings and may result to you making costly mistakes that will come to haunt you and your business in the future.


This Initial Investment is usually followed by an Initial Round of your Products Development or Methodologies Development and Best Practices Development. You will be amazed at how much Effort, Customization, Marketing and Time it takes to turn an idea into reality. The outcome is your First Generation of Products or Services. In most instances, these Products or Services may be highly priced and may require many Customizations if the groundwork was poorly done. Sometimes it may be because of introducing a New Product or Service to the Market. The Customer’s Feedback will then be used to guide you on what should be done or avoided.


Now that you have come up with a Product or Service, the Next Challenge will be on getting the Customer to be aware of its existence and to buy it. As usual, Early Adopters of the Product or Service will start investigating it to determine whether to adopt it or ignore it. You should be aware that when it comes to Marketing a Product or Service, not all people that you shall reach out to will buy the Product or Service. Some of these People may be interested in the Product or Service but may not be in a position of affording it at that instance. They will still come back to buy the Product or Service when they finally get the money. Always treat your Potential Customers as Real Customers. In as much as you may value those Customers that actually buy your Product or Service, the Non-Buyers and Critics are also very valuable. Your Current Customers may be there today but missing in the future due to unavoidable circumstances such as Bankruptcy, Death, Being Dismissed from their Jobs etc. The Potential Customer is the one that you will then resort to when replacing these Missing Customers. If you treated them as trash at their time of first appearance or when you thought that you will never need them, it is very unlikely that they will be responsive to your Products or Services. Even if your Potential Customer may appear as if he or she may not be in a position to buy your Product or Service, do not brush them away. For instance, a 10 year old who has attended a Motor Show Fair for Armored Vehicles. The child may be having too many queries or questions to ask the Motor Vehicle Dealer. As usual, most Sales People always answer such People with Flat Answers, Half Answers or pretend to be busy just to get rid of them. In future, this 10 year old may turn out to be a billionaire in need of Armored Vehicles or in a Position where they have a final say on which Company shall be awarded a Critical Tender for the Supply and Maintenance of Armored Vehicles. Sometimes the Company may be in need of a Financial Boost and this 10 year old may be the only Person who can help the Company Stay Afloat instead of Shutting Down or Declaring Bankruptcy. Other Customers may even engage you in stories after they have made some Basic Product or Service Enquiries / Purchases. Never ignore them or even seem to be in a hurry to get rid of them as they are actually evaluating your Customer Service Skills and Reliability.


Your Responses or Actions will actually help them decide to buy your Products or Service as it may determine your After Sales Customer Skills and Reliability. If you treat your Customers well irrespective of Who they are, What they do or Where they are, the same Customers may volunteer to advise you on Critical Areas that you may need to improve in or rectify to enable your Company to stay afloat for the long run. A detailed analysis on Customer Profiling and Discrimination can be found in the Diplomatic Lifestyle Journal March 2017: Profile Shopping Article.






December 2017 EDITION |


Simple Creative Ideas, Innovations or Inventions will make you a lot of money unlike a Hardworking Individual. These ideas always guarantee you meaningful profits when properly exploited. The 1% never depends on Monthly Pay but on Weekly, Daily or Hourly Pay that will guarantee them their Status. Who you are, What you are and What you do is a full package that will define you as an individual. You should learn how to get  Paid while you sleep if you do not want to work until you die. The Ideologies and Visions that you will adapt or adopt will either Form or Destroy your Life and Business. As an Employee of any Organization, the Value that you will bring to that Organization will determine how much Money you will be Paid. The same applies to any Business Venture.


It is therefore prudent to be more valuable as that will enable you to be able to make a huge fortune for yourself. On the other hand, if you concentrate more on working on your job, then be content with making a living. You should also strive at making growth to be a part of your Lifetime Agenda.  By being better at what you do, you will end up offering more value to the Organization or Market Place. This shall in turn correspond to an increase in your Income Level.


When you start working for someone, never aim at being in that Institution until you Attain Retirement Age. Within your First Five Years of Employment, you should be able to have Strategically Set Up a Side Business by Design. This Side Business should be able to get you by incase you lose your Employment Income.


Most People always have a False Sense of Job Security that hinders them from Diversifying their Income Sources. For instance, a Company’s Controlling Stakeholder may change, forcing a reorganization of the Company’s Staff. Your Seniors may inform you that the New Management is undertaking an Integration Process and that your job has fallen off due to the same. As a result, you have been left with two options and that is for you to be Declared Redundant or to Willing fully Resign from your Job or Position.


Your Net Salary should always be spent on the 10%, 20%, 30%, 40% Rule. Where:

     * 10% is allocated for Extracurricular Activities or Allocation for Social

         Responsibilities such as Money to Lend Friends, Education Fund for Needy Siblings


    * 20% is allocated as Saving Money for Unexpected Incidents, Occasions or Accidents.

    * 30% is allocated as Investment Money for Income Multiplication Instruments such

        as Depositing the Money in a Fund Managers Account, who will then Multiply it

        Several Fold for you. Should the Fund Managers make a Wrong Investment

        Decision and a loss is incurred, then, that loss is never passed to you. The

        agreement is that you give them your Money for them to Multiply it Several Fold

        and then take a Fraction of the Increased Monies as Management or Processing


     * 40% is allocated as Money that you shall use for Administrative Expenses such as

        Paying School Fees, Utility Fees, Transport Money etc


Always be Prepared for any Changes in your Workplace without having to wait until the Last Minute when you are Being Fired, Being Declared Redundant, Being Retrenched etc. If you do not align yourself to the times, then your relevance at any Level of any Organization becomes Obsolete. Since Employment is a Contract, which you must fulfill, if you fail to perform, then you will be automatically kicked out of the Organization. As your Time is Limited, your aim while at work is to Focus on the Job and Avoid Sideshows. You will also have to be able to Push your Time in order for you to be able to Accomplish your Tasks instead of Co-Managing them. You will be able to accomplish more if you Act Proactively unlike when you Act Reactively. By Acting Reactively, you may find yourself Making Irrational Decisions since you are Acting on an Incident that is Taking Place at the Moment.


You will always know when you are in trouble if your Salary Always Ends with your Monthly Budget or Expenses. Once the Month is Over, the Money is also Over. This becomes worse if you have no Health Insurance and a Stable Monthly Income.


In any Organization, Organizational Politics is always expected. You may be served with Termination Notices due to Witch-Hunt. A Carefully Crafted Disciplinary Action may be deliberately imposed on you by design before you are finally Relieved of your Duties in Gross Violation of Labor Laws and due to Malicious Allegations. Employers may decide to use a Subjective Selection Criterion on Employees that they want to Declare Redundant or Force to Resign as a way of Craftily Reorganizing Company Staff. Other Organizations may decide to get rid of you by abolishing your Job Position and then reintroducing it under a different Job Title. Qualifications for the Reintroduced Job will then be increased to make it impossible for you to reapply for the Position.


In some Institutions, Getting or Retaining a Job is always based on Social, Economic and Political Privileges. This is Institutionalized in the Organization to the extent that if you do not belong to the Preset Criteria, then you will not be able to get the job. Your fate will have been sealed in spite of you having met all the required qualifications for the job. For example, if you belong to a particular Race, Religion or Class, then you fail to get the job.






December 2017 EDITION |


Burundaga is also known as Bunga and is a mixture of Drugs or Narcotics, which include Scopolamine. As such, it tends to not be a drug as is widely anticipated. Hyoscine is synonymous with Scopolamine as they both have the same effects when they are administered on a Person. Burundaga is therefore a Highly Toxic Tropane Alkaloid Drug that is extracted from Solanaceae or the Nightshade Family Plants. These Nightshade Family Plants include Henbane, Devils Snare or Jimson Weed and the Angels Trumpet. Hyoscine came into medicinal use in 1947 after it was first written about in 1881. Scopolamine is derived from a type of Nightshade Family Plant that is known as Scopolia. Hyoscine on the other hand is derived from a type of Nightshade Family Plant that is known as Hyoscyamus Niger. Burundaga can be made from the seeds of a Brugmansia Tree. It is then Packaged in Powder Form to enable Vendors to Sell it on the Streets in Smaller Quantities e.g. in grams.


The Burundaga Drug works through Inhibiting the Transmission of Nerve Impulses in the Victim’s Brain and Muscles. The will of whoever ingests it is therefore disabled, resulting to the Victim being made to be Completely Submissive to the Orders of Others. The Burundaga Drug rapidly absorbs into the Victims Gastro Intestines and its effects are almost instant on a Human Body. After Ingestion, the drug usually takes around 3 – 5 minutes to Start Acting on the Body.


If injected, the effects usually begin after 20 minutes and can last up to 08 Hours depending on the Dose Administered. Scopolamine disappears from the Blood in about 30 minutes after Ingestion, leaving no trace in the Urine after approximately 12 hours of Consuming it.


The Victim usually Experiences a Depressant Effect on his or her Central and Peripheral Nervous Systems within minutes of ingesting it. As a result, the Victim is usually left in a State of Drowsiness and Severe Amnesia. In such a state, you will be able to Execute Orders Without Questioning or Objecting to the Person that is giving you Orders. This Ability to Override the Will of those who Consume the Drug while making it easy for the Victim to be Subdued and Manipulated Without Any Resistance. This has made the drug to be a Perfect Choice for Sex Offenders and Criminals. The drug also causes Sleepiness and Memory loss, which results to the Victim’s Inability to Clearly Remember What Happened When the Drug was in Effect.


In Doses that are less than 300 milligrams, the Drug is used in Medicine:

 * To Treat Motion Sickness, Nausea and Gastrointestinal Cramps.

* Used before Surgery to decrease Saliva.

* Used as a Local Analgesic and Anti Spasmodic.

* Used in the Prevention and Treatment of Vomiting etc.





You cannot be able to maintain or acquire massive Wealth / Poverty over a long time if you do not have the right mentality. Becoming rich is based on how you think. It is and has never been about how much money you have to work with to be rich. When it comes to money, your intelligence or education cannot stop you from getting rich as everyone has the potential to become rich irrespective of his or her intelligence / the highest level of education obtained.


The first and most important thing to start with is to Grow Emotionally: Acquire the mindset of the rich and overcome your obsession with getting other peoples approval. When you are broke and pursuing that which the masses see as a rare thing to achieve or a difficult mission to accomplish, many people will always discourage you from pursuing it. They will even plead with you to be “realistic” and to stop dreaming. The concept of “Realism” is always subjective. One person’s idea of realism may be earning 20,000 shillings a month while another person’s idea of realism may be earning 500,000 Shillings to 1 Million Shillings per Month. When you associate yourself with the rich, you always get exposed to their level of thinking about money. This usually changes your mindset. You should therefore always aim at studying the way rich people think about Money or Create Wealth, and then follow their Lead / Example. The Diplomatic Lifestyle Journal always aims at getting you there through its Articles and Reviews.


The second most important thing is to create a written vision for your life: This vision should last for Five Years. The First Year is always used to set up a solid foundation for your plan including getting your ideas into actual action. You should always be willing to work hard to overcome your obstacles. Avoid shortcuts, as they are usually costly in the end. Patience is key as worthwhile goals always take time to achieve as long as you stay focused and on track. Getting frustrated when you do not get instant results will not help you get rich but will always make you poor. Moreover, as long as you are achieving your goals and ambition, money never runs out. When the economy is doing badly, money is always out there. You can therefore not claim that there is no money as it is you who has not yet figured out how to make money or where to get money during such times. The best investment ideas are those that are found in your daily life or ideas that people make use of in their daily lives. It should however be noted that the rich always do one thing in their life before they move on to another. When they double on what they are doing, it is often done in succession and not simultaneously. This is also done based on a winning instinct.


Your Investment Results always become visible during the Second Year of Investing to make money. The First Year is always used to explore and to perfect your moneymaking skills. Remember to always stick to your goal and to ignore the Nay Sayers or Distracters.


Third, Learn to Self-Correct Yourself: This is done through Continuous Self Assessment. Always analyse yourself to find out if your actions are bringing you closer to achieving your goals or if they are drifting you further away from attaining your goals. Once you have found out the outcome of your actions, you can then use that opportunity to self-correct your course and then get back on track. Your interest should always be on the result of your actions as there are many ways or means of achieving / attaining a result.


Fourth, think about the future: To maintain your lifestyle of being rich, you must always think long term. By being Action Oriented, the rich always seize the now opportunities while investigating any potential threats or opportunities to their wealth. The rich are always on the lookout for new and better ways of doing things since you cannot be able to know everything. Always surround yourself with people who offer different or conflicting approaches as they enable you to know the bad aspects of your Mindset / Ideas. They can also enlighten you on areas that you need to rectify or perfect on as you acquire / safeguard your wealth.


Lastly, focus on the correct perceptions of Wealth Creation or Retention.


* Money should never be equated with stress but with a peace of mind.

* Avoid a Lottery Mentality when Creating or Maintaining your Wealth. Instead, have an Action Mentality as get rich quick schemes never work. Easy come, easy go. Wealth is always created over time.

* Focus on Earning Money instead of Saving Money. Every penny spent must always be Multiplied. Saving your money does not help as the value of Money or Wealth always Depreciates / Devalues over time.

* Instead of thinking about having your money running out, think about how you can make money. You always use money to make money.

* Hard Work does not Create Wealth, but Leveraging does. You should therefore always exploit an Opportunity or system to your advantage at all cost.

* Money is never earned through Labor or Employment but through Smart Thinking. Your Employer will only pay you that which is enough to make you come back again to work for him or her. With the Correct Mindset or Thought, you can easily come up with Ideas or Ways that shall make you or get you to be rich.

* Getting rich is never out of your control but is always an inside job. The Diplomatic Lifestyle Journal corroborates that. The 1% always want money revolving amongst themselves.

Now that you know the reality, it is time to put words into action and to stop complaining out there.

More Random Facts

Oil and the Future of Technology

Mind Mining Education System

Gated Community Exploitation

Diplomatic Lifestyle Journal June 2017 Edition




June 2017 EDITION|

Running for Public or Political Office can be easy or tough depending on the campaign strategy that you are using. Before running for any office, you must:

* Identify your vantage points or links.

* Identify your loose / weak points or links.

* Identify your networks.

* Study your opponent or opponents in detail.

* Study the political system in detail.

* Understand the philosophy behind the formation of a Political Party.


Once you have done the above six points, you are now set to begin vying for office. You should note that campaigns never start on the year of elections or a year before elections. Instead, campaigns always begin immediately after an election has been conducted. This is so because you need ample time to approach your voters or create voter apathy. During this period, you shall be slowly announcing your presence to the electorate through various long term or short-term projects. The actual announcement that you intend to vie for political office shall be made at least a year to the actual elections. The delay in stating that you are running for office is deliberately so in order to give you ample time to study your opponents. You shall also be avoiding incessant criticism or scathing attacks on you by your opponents as you prepare yourself for the actual elections campaign.


                           Silent Campaign Strategies include and are not limited to:

* Setting up a Foundation to assist the Vulnerable and the Poor as a Social Responsibility:  For example, providing Education Scholarships, Building / Repairing Social Infrastructure such as classrooms or public toilets or public hospitals etc. The Foundation can also fund Initiatives such as School Feeding Programs, Institutions against Social Injustices such as Honor Killings or Female Genital Mutilation or Arranged Marriages etc. These high impact projects enable you to be widely known.

* Engaging the Community in sourcing for areas that they require assistance in: This can be used to formulate your Campaign Manifesto. You can also use the Voters request to directly engage relevant Stakeholders for action to be taken. As a result, they shall start to trust you as a person who keeps his / her word. They shall even begin to encourage you to run for Office, as you are better than the current Office Holder. This one on one approach with Voters always makes them know you as being a man / woman of the people. Voters hate Office Holders who never interact with them once they are in Office only to emerge soliciting for votes during the Campaign Period.

* Networking with Individuals that have a massive following or that can rally huge numbers of genuine Crowds to vote for you: By working with such people, they enable you to gain inroads to Voters that you could not be able to reach. You can then exploit this opportunity to amass a huge following of your own. This is always a good idea especially when the person referring you to them decides to ditch you for another Candidate or when they discover your intentions.

* Acquire a Media House i.e. a Radio Station or Newspaper or Television Station: This Media House is to be used to secretly campaign for you through the Stations Viewership or Listeners. Why waste a lot of money on campaign posters when you can reach potential Voters at the comfort of their home or as they undertake their daily chores while reading, listening or viewing their favorite Station or Magazine.

* Acquire a Bank or a majority Share Holding in a Bank / Financial Institution: Campaign Funding shall be Channeled or Funneled through the Bank / Financial Institution without easily raising eyebrows as some people may want to contribute anonymously to your Campaign. Smart Campaign Funding Techniques include having someone contributing anonymously for your Campaigns or Depositing Campaign Money through a second or third Party such as a Hedge Fund / Partner Company etc. The Hedge Fund / Partner Company shall then contribute to your political campaign as proxies. Sometimes, you have to operate using Cash. This requires you to set up properly concealed and secure hiding places (not place) of the monies in case of impromptu raids or thefts to sabotage your Campaign / Campaign Funding.


 NB: Never ever, have a single point of failure that shall destroy you or leave you helpless when the failure actually occurs.


* Be a Created Celebrity: A Created Celebrity is a person that has been turned into a celebrity status especially by Media e.g. Radio, Television, Social Media etc. You can use this status to gain Voters, as you are widely known by them. Such Celebrity Status may include being a News Anchor, being a Journalist, being a Musician etc. You can also gain Celebrity Status when working as a Senior Government Official. A scandal under your docket or purview may catapult you into Power as you fight those accusing you of malpractices, abuse of office or you may exploit the office for Political gains.

* Register a Political Party: During Nominations, you may not be able to be a major Party’s preferred Candidate. Instead of running as an Independent Candidate, you can use your Party to run for Office. Where possible, your Party shall give other losing Candidates a lifeline to run for election instead of also running as Independent Candidates. If a size-able number of these candidates are elected into office, your party may end up being a major player in the Country’s Politics or Legislature. In case, the winning Party failed to attain the required threshold and your Party can provide the missing threshold; you shall find yourself being a powerful individual in the ruling Coalition or Government.


Having laid a firm foundation, it is now time to start your Political Campaign. To attract crowds during your campaign tours, you need an entourage of people and vehicles. Hiring crowds and vehicles to transport them is a common scenario for wealthy politicians. In some instances, you shall be forced to hire sleeping quarters for them during the campaign tours. This may be costly for you so the cheaper alternative is to get your friends and supporters or allies to do so at their own cost. With them incurring much of the cost, you may be able to chip into the kitty to subsidize their expenses. In exchange for all this, you shall be obliged to repay them in kind once you get into office. This may be in the form of giving them Senior Government Jobs, Tenderpreneuring etc. See the Diplomatic Lifestyle journal December 2016 Edition: Network Profitalization Article. This shall enable you to have huge turnouts during your campaign stopovers and to enter campaign rallies in style. This shall be possible, as your mobile crowds will provide you with the initial crowds to address. Passersby will then be attracted to find out what is going on out of curiosity. The vehicle convoy also portrays you as a person of means that is not seeking Political Office to squander Public Funds or Resources.


During your campaigns:

* Use Social Media Platforms to create hype and motivate potential voters to attend your rally.

* Always fact check your opponent instead of being involved into abusive campaigns, which might cost you the vote.

* As a party Head or Political Kingpin, always use your disciples to fight the battle of words while mudslinging the opponent in any way possible. These disciples can be your friends or supporters especially the ones helping you have a campaign convoy or crowd.


When discussing risky issues, the rule is to always discuss them orally and not in meetings where you can be easily recorded or the issue is recorded in minutes of board meetings etc. This is deliberately so, to create an evidence firewall. Your opponents shall always be on the lookout for anything that shall taint your integrity and character in order to get you out of the way. With the correct strategy, you can give yourself a political lifeline by using the malignment to your own advantage. When campaigning, most Politicians tend to be empty on issues that rally the Community. They instead give up emotions and distort facts. The best solution is for you to identify common problems that affect the Community and then identify solutions for them. You should then put implementing periods for the solutions once you get into office. By coming out of your comfort zone, you will be able to give Voters a plan that can benefit them once it is implemented.  This in turn, gets them to vote for you. When communicating to Voters, always come clear in terms of communication to be able to reach more numbers. Sharpen your message and make it simple in a way that a normal Citizen can easily digest or understand. When your opponent attacks, always find a way of besieging him or her. Once surrounded, attack your opponent and keep them on the defensive as you continue to move your front forward. This always leaves your opponent with no option but to surrender. The key point being that you should be able to see eight moves ahead of your competitor. This should be so because; the place that you are used to is not where you should be.


There is more than one way to control your subjects.

* Introduce an element of doubt by discouraging a debate or by introducing a debate to delay Action / the momentum to pass legislation that may inhibit you from getting voted into Office.

* Introduce conspiratorial elements to sway the Voters to your point of view.

* Form a belief or encode information into Voter’s memory such that it becomes  difficult for them to dislodge it, as they believe it to be true even when it is false.


You cannot make news from media. This is because they choose what to write as they have an audience to please and are in business. Set up Watchdog Groups within your Campaign Team to keep track on what most Publishers write or Broadcaster’s air. In case they broadcast or write a maligning piece on you, then your team shall apply their own counter attack and skirmish the Broadcaster or Publisher. The team ensures that the Broadcaster or Publisher is subjected to intense criticism. By doing so, you ensure that the only thing that they have to say (be it Print Media or Television or Radio) is what you want them to say else you will not let them speak. In Media Houses, there are only Facts and Spins or Alternative Facts. To have an escape route, always create a story out of an issue that you can exploit in the future . When cornered by Media Houses, you can always use the incidence as clear evidence. Learn the art of using your position to suppress others without them knowing. If push comes to shove, you may be forced to prepare a significant propaganda material to sell to the people; which in reality is nonexistent. The trick is to make people look the other way at your distraction while you undertake your duties on the other end (where they are not looking). Creating big distractions may help you stop or stall investigations or negative news as you recover. If you want something, you fight for it, you go for it and you search for it.


You always fight for what you know is right even if it means that you have to die for it. Taking a last minute decision is never a very good idea especially if you have to make a desperation move. Know what you are doing, know how you are doing it and obtain a consensus on the result or outcome. A case to ponder about is when someone leaks your campaign emails to the public two days to the elections or a list of all your private and public contributors to your campaign with the amount each contributed.


Politicians are always trying to get or figure out new ideas and packages to create a narrative for themselves. In most instances, they always exploit existing ideas and packages to create that narrative. The Political Class usually represents this narrative to get the Voter to always be at their mercy. Always remember to have a Backup Plan or Strategy in case your narrative fails. A narrative can also be initiated through a change-making forum from where the next generation of actors and ideas are addressed / deliberated upon. It should however be noted that in politics, a new generation of voters with new voting narratives or ideas always emerges every 20 – 25 years with 30 years being at the extreme end. The proliferation of social media and the widespread use of social media has also made it difficult for anyone to suppress the release / access to information. Politicians always get behind media campaigns as it acts as a charm offensive to Potential Voters.

When the going gets tough, you may be forced to come up with a fabrication that does not serve State Interests but other interests. This fabrication may be used as a strategy to target the emotional part of the voter or to create voter apathy. A dossier can be produced to support the fabrication, which may be true or false. As long as no information has been collected to indicate the lie to be fact, then by default it is considered a lie. In your defense, you can spin the lie as Alternative Fact. Campaign pressure can force you to deliberately create a clear and strategic relation with the people in power. Your collusion with them may eventually turn into cooperation. You may finally end up enthusiastically complying with them as you look for and come up with ideas that the public wants to hear. A dossier that you may have tactically presented may be verified and proven as false. Since it is the campaign period and this may cost you the vote, you may be forced to ignore the Verification Report. As a Politician, you can blame the Intelligence Agency or Investigating Institutions for doing a shoddy job at verifying the dossier. The lie has to be defended to the latter. This can be done by instigating an official inquiry to have the report investigated. You usually use this investigation to come up with a Staged Decision. A fictitious fact-finding information office can be created. This office shall bypass actual set Intelligence Institutions or Investigating Institutions to translate mere allegations into official policy. Pressure is then put on the Intelligence / Investigative Agency or Institution to come up with a conclusion / decision that you and other politicians had already reached and/or through cutting corners. The resulting cleverly sanitized version of the document can then be used to make official the spinned allegations that have been taking place for a while. This documentation is then used to create headlines that will sway the thinking or opinion of the Populous / Voters. The original document will then be ignored, as it shall be deliberately made to come out as a conflicting report. Conflicting in the sense that, there shall be numerous alternative opinions and a lot of questioning opinions due to doubt. This doubt can be instigated when questionable evidence is presented during the dossier investigation / verification in order to influence crucial decisions for political gain. Public opinion is then rallied with the dossier, which is conveniently revealed and circulated to so called clients as an explosive document. The aforementioned is a typical example of an Aggressive Deception Technique.


NB: Peace is bad for business while war is good for business as there are People or Entities that benefit immensely from such an endless conflict.


During Aggressive Deception, plausible theories and possible eyewitnesses are always ignored. In the aggressor’s world, his or her word scenario rules while their / your word runs second. If you give in to a Politician’s manipulation, the same Politician will willingly kick you out into the cold once he or she is through with using you for personal gain.


Fighting media wars will be a normal part of your political campaign. Always be on the lookout for any signs of maligning media campaigns that are currently existing or emerging. All you need is to be able to see the smear campaign in advance and never ignoring it; including any possible warning that it is / was in the horizon. You can then begin by characterizing the press on how honest or dishonest their media was / is on covering your election campaigns. As previously alluded to, some Politicians do own Media Stations / Houses. Some campaign information must always be kept in a Tight Hole. A Tight Hole occurs when you decide to deliberately not disclose what your campaign investigations has found out or is finding out during its investigations. This information is made to be highly classified as it may give your competitors crucial information that may cost you the vote. In fact, it is always advisable to dodge commenting on unsubstantiated and explosive allegations.


Media Stations either report the news or influence the news depending on whether they are liberal or biased. When you believe that, it is your religious duty to correct a mistake or wrongful news reporting on your political campaign, widespread media criticism should be expected. By making the criticism to be so liberal and blanketed, your possibility of succeeding in discrediting Media Houses remains high. You can even launch a scathing assault on the truth by destroying the Voters or Society’s critical capability of determining what is true by legitimizing falsehood. It should however be noted that Media Readers or Listeners or Viewers are smart enough to understand what You / The Writer/ The Reporter is saying without calling a spade a spade / having to push back on getting dragged into the politicians war. There is no strategy without a fail-safe. With the correct media campaign strategy, you can easily rise from tactful smear campaign challenges and emerge victorious, as the stakes can never be higher. Always practice the art of winning a debate and the major narrative around the debate by making a story or producing a story in a way that you want it propelled. When the press is busy sourcing and pestering you for news articles or footage, you can exploit this opportunity through creating a blur between prime time news and entertainment. This can be done by making major announcements during prime time thereby making news irrespective of how Media Stations work. Media Stations will not mind that as long as your dramatic altercations are bringing viewers back to the screens while you set up a story where you are the hero while others are villains. You can also make the press to not be about information but to be there to be seen by making direct announcements to the Population or Voters through other means such as Social Media or State Media. To manipulate the way stories are being released or revealed to the media, you can decide to be an Authentic Fake. This Authentic Fake may be used by you to play media rules to the real you (which you shall conceal from the media at all cost). When the media tries to catch up with the real you, diversionary measures can be undertaken through surprise reveals or changes in persona or persona redirects / misdirects. This tactic is good as it enables you to protect those who are closer to you, by protecting yourself and getting or staying out of troublous distractions.




June 2017 EDITION |

The Pharisees were the original propagators of wealth. They used to be numbered 6,000 at any moment in time. They exploited theology by highly esteeming material wealth as a way of showing off, how Holy / Spiritual they were. Modern day Politicians / the 1% have mastered the art of the Pharisees and taken it to greater levels. The whole Country or World is being held at ransom by an Elite that refuses to see bigger National or Public Interests. These interests need to be put in place so as to embetter the lives of the Citizenry. Just as the Pharisees, Politicians are very good at playing the game of wanting to impress everyone. This is not what they practice internally as they tend to be egocentric.


Famines are caused by people who can prevent them if they want. You may experience bad weather; especially in the tropics where heat is balanced by monsoon winds (which bring rain). When the monsoon winds fails, then you have a drought. Drought is always a constant problem and famine should never be a problem. This is because; food can be obtained from those areas within the Country with plentiful supply to be redistributed to those areas that lack. Famines also take time to develop. The Government therefore has ample time to put in place proper food security measures to alleviate its side effects. The occurrence of a drought can never be a disaster when stakeholders acquire the proper knowledge, the right resources and means to counter famine. Moreover, the price of food always tends to escalate when its demand outstrips its supply. Governments were therefore forced to intervene during famine when the markets of demand verses supply started to deteriorate the famine situation. As a result, the Government was forced to take over food distribution.


This food distribution can be Good / Worse depending on:

        * The instruments that the Government is using to distribute food.

* Where the Government is sourcing for food.

* How the Government is sourcing for food.


There is a lot of money at stake during times of natural disasters and Politicians exploit this opportunity to the maximum. They always put in place machinations that hinder negotiations on means of plugging the disaster menace due to egocentric reasons.


The Diplomatic Lifestyle Journal is a publication of the Sanfordestroe Company.

Copyright all rights reserved. Errors and Omissions Exempted.

 So how are these failures orchestrated?

* Politicians may deliberately put in place policies that lead to the unnecessary suffering and pain of People. For example, by encouraging Citizens to grow Crops for Export instead of growing Food Crops and then exporting the surplus. This goes along with the issue of Marginalization. The Government may be in possession of land that has been reverted to it Or Leased Land whose lease is expiring. Instead of leasing it to Squatters / Landless Citizens to farm Food Crops, it decides to lease it to Ranchers or the 1%. You then end up a Scenario where the Ranchers own 90% of the land while the rest are struggling over the remaining 10%. The Administration will then pretend to be issuing Title Deeds to a select few individuals to show that they are also allocating land to deserving locals. The only problem being that a majority of the Citizens will still be Squatters or Landless.

* Officials from the Local Level or On the Ground may conceal disaster information from their Seniors, Other Citizens / Outsiders. This may be because of the Bad Policies / Choices that they had instigated and that are now causing famine or an increase in food prices. When the crisis becomes known (albeit too late), Politicians always shift the blame. The National Government will blame the Devolved or Local Government for not performing and vice versa. Such a tactic is always explored so as to confuse / fool the Voter or Citizen.

*   The Government or Politicians may instigate a tactful response to a Disaster / Problem. They will therefore keep quiet while expecting to put  the situation under control. If the Hunger or Disaster is in the areas of the Politician’s Opponents, then they may take that as a blessing in disguise.

A blessing because:

 ++ In cases of war, then it will help you win the war.

++ During elections, the incumbent will use the food aid as a way of creating Voter apathy at the expense of his or her opponents.


In reality, it will be the Government’s policy that deliberately caused the famine. If not, then the failures of the Government to curb the famine may have resulted to a famine that could have been averted.

NB: Keep your plans firmly to yourself until you have the winning plan.




June 2017 EDITION |

A Financial Engineer always builds Logical Dreams for his or her Clients. When these dreams turn into a physical nightmare, the Client and Public will pay for it. A Financial Engineers Agenda is to privatize profits to the 1% while socializing losses to the 99%. Politicians in power, always collude with Senior Government Officials to create a Country’s Financial Stability or Instability. All this is possible through Physical or Virtual Currency Manipulation. When the Country’s economy is stable, financial malpractices are hardly noticed by the ordinary Citizen. However, when the Country’s finance becomes unstable, the ordinary Citizen instantly realizes that something is amiss. This is because his or her purchasing power reduces and tax increases are effected. In some instances, the tax bracket is widened to capture low-income Citizens that are exempt from paying taxes such as Income Tax. This exemption is needed to enable them meet the most basic of needs. Politicians always collude with the 1% to put in place tax policies that favor them. The 99% on the other hand, are forced to work for longer hours and are encouraged to acquire debt as wealth disparities increase.


Politicians always collude with the 1% while seeing the rest of the Citizens as numbers and not people. After all, its big money that always influences the swing of the election. The voice of the Voter is mostly never heard but that of the Rich Person as most Voters do not know how to vote based on issues. This is worsened when the Voter is not bothered by the mistakes that are made by Politicians. The Voter may decide to ignore these mistakes and then vote for the Politician based on the wrong reasons, ethnicity, racism etc. Some Politicians and the 1% may become ingenious enough to engage themselves in Tax Evasion. When added with Financial Mismanagement and a Skewed Public Policy that favors the 1%, the Country’s Economy or Currency can rapidly collapse. As usual, Politicians may not grasp the gravity of the situation. They will instead claim to be having ample time to deal with the collapse. Instead, they will prioritize the agenda of fulfilling their Election Mandate or Promises over the Looming Financial Crisis.


The Finance Ministry or Department will then be tasked with the mandate of dealing with the Financial Instability. To maintain the Status Quo, Politicians usually begin a spending spree on Paid Publications. They pay Writers, Scholars, and Financial Experts etc to write a Review, Report or Article etc in favor of the Country’s Financial Stability. A series of meetings then take place at the Finance Ministry or Department to create a manipulated economic deficit. The Government’s budget can even be manipulated with figures that greatly deviate from actual budget figures. This is done to cover up the extent at which the Country’s financial instability is actually headed to. Government Officials and Politicians may decide to propagate repeated fraud in Government Accounts, a systemic deception on the financial ability of the Country and to avail unrealistic statistics to support their claims. When this matter is finally discovered, nothing that emanates from these Government Officials / Politicians will be trustworthy as their previous figures or statistics were false or wrong. When the Public is finally made aware that the Finance Department, Ministry or Government at large was doing something fishy, borrowing costs automatically sky rocket and cheap sources of borrowing tend to dry up (as Lenders safeguard their money from risky borrowers). At such times, the Country’s Economy always begins to struggle while endangering the entire Country’s Economy.


Everything will be gone in an instant as Companies shut down and Financial Institutions decide to shut people out to safeguard their Capital Base, Asset Base or Capital Reserves ( to stop them from Collapsing / Declaring Bankruptcy). Politicians and the 1% usually get worried at such times, as they know that Financial Institutions are shutting people out for other reasons and not because of the Country’s Currency being at stake. The real reason being that they want to avoid having a system, which will trigger a thorough scrutiny of their Assets and Liquidity. This therefore makes it necessary to have everything remaining afloat or else these Financial Institutions shall be forced to declare bankruptcy. However, Financial Institutions always collude with Politicians and Senior Government Officials to ensure they do no fail (as they claim that they are too big to fail).




June 2017 EDITION |

To build an empire, you need information. You then use this information to become the mechanism that moves the Economics, Financial Machines or Wealth Creation Machines. If you choose to play safe because you think opportunities are closing up on you, then those opportunities will actually be closed.

To be able to create Wealth or maintain your Wealth Status:

 * Focus on what you are doing, work hard and stay out of trouble: When you are using yourself as a brand to make money, avoid making bad luck choices. This is because Organizations will have nothing to do with you once they see your imperfections as you are no longer valuable to them. They are in the game of making money and so they spend money on you to make more.

* Avoid Distractions or Sideshows: Always be Contrite, learn from experience and do all that you have to do for the betterment of your job or investment. Nobody cares about you when you are poor, miserable and trending in the wrong direction. Act like a Professional in whatever that it is that you do. Monetize your Friendships by constantly checking your Social Media, Friends, Leisure Activities etc to avoid being involved in a Scandal or being broke. Remember, great deals are always done in funerals as people always get to think more about life when they are faced with the reality of death.

* Avoid Activities or People that are bleeding you dry: No matter how much money you give such people or spend in such activities, they will always want more or will require you to spend more. If you want to take care of your family and friends, you must start by taking care of yourself first.




June 2017 EDITION |

When you make a Deal or Decision, be very careful as it can get you killed. Roving Agents may be sent to kill you by Injecting or Smearing Poison into your Body. These Agents or Operatives are usually Highly Trained, Elite Police or Military Agents who are currently working or Have Previously worked for the Government. One of the most potent chemicals that can be used to poison you is the VX Agent. This poison has the capability of being delivered in its binary form. Two Agents can be used to administer the poison to your skin. Each Agent shall be given one component of the poison, which they will apply, on predetermined areas of the target victim such as your Face or Hand (for example when they greet you). The components of the poison or the poison itself can also be applied through spraying or by wiping it on your body. When the two components combine, they make a deadly VX Agent poison. Once the mission is complete, the hit squad always disappears into oblivion while the poison slowly takes effect on the intended victim.


It should be noted that the VX Agent evaporates very slowly. This makes it possible for you to be duped into spraying pure VX into your body if the spray bottle contents are switched or combined with the VX Agent e.g. Body Spray or Deodorant


A Binary Agent consists of 2 Chemicals. When these chemicals are on their own, they are relatively non-toxic, but when they are mixed, they form a Chemical Agent. The VX Agent can be split into a binary form that consists of QL Agent and Elemental Sulfur. On their own, both components are non-toxic but when they mix, they react to form a deadly VX Agent. The VX Agent is usually found as a viscous liquid similar in texture to honey. It is also colorless, odorless and tasteless.


The VX Agent is highly toxic when it is exposed to the skin and you only need a microscopic amount of the VX Agent to kill a person.

NB: A single drop of VX Agent can kill you in seconds.

The origins of the VX Agent date back to the early 1950s when a British Scientist (Ranajit Ghosh) developed the V Series of Nerve Agents while researching pesticides. The V stands for Venom.

******************* READ MORE ON THESE ARTICLES INSIDE ******************




While travelling, security en route / at your preferred destination is paramount. Terror Alert shall be one of your major security scares. Terrorists operate in the same way as Cartels (see Cartelization Article in the Diplomatic Lifestyle Journal September 2016 Edition). They always target places where the impact shall be high and widely felt. As a result, they are able to get very many people killed and injured or cause massive structural damage on areas that they need to sabotage with minimal effort. Such places include but are not limited to: Stadia Events, Spectator Routes for events such as Marathons / Car Rallies / Air Shows etc, Congressional Meeting areas such as Church Events / Parliamentary Sessions / National or State Events e.g. Celebrity Weddings / Funerals / Political Rallies, Public Services / Products access areas e.g. Shopping Areas / Passenger Pick Up or Drop Off Terminals / Passenger Service Vehicles or Public Means of Transport.


Terrorists attack because of extreme Religious / Social / Political beliefs, which unite them and motivate them to strike without care. In their world, you are either with them or against them.


An example of terrorists attacking due to social and political reasons may be because their geographical region has been annihilated. Dissidents in the area shall then seek for secession / independence from the wider state / region/ locality. If diplomatic ways of resolving the conflict fail / is deemed to be slow or produces unwanted results, then the dissidents shall result to violence. As usual, violence begets violence. The ruling government shall ensure that dissident violence is countered with brutal force and law enforcement techniques. The outcome being a fueled violence and dissidents bombarding or attacking national monuments such as Government Offices, National Embassies, National Police Stations, Killing Senior Government Officials / Celebrity Sympathizers etc.


You should be aware of areas that have long-term outstanding conflicts as they put in place strict security surveillance or enforcement techniques, which are prone to proxy wars. These proxy wars can result to terrorism related activities or incidents.


When an incident takes place, do not stop by just to add up to the spectators that are crowding up the area. Unless you are going to be of help, move on and inform relevant authorities to follow up / investigate the scene. Lingering about may cost you, as a second explosion / shooting incident etc may take place once the crowds are deemed to be sufficient by the terrorist. This as was earlier alluded to, is due to terrorists operating with numbers of fatalities. Crowds as usual, provide excellent numbers for them to take full advantage off.

To detect a terrorist, you use a Suspicious Person / Luggage / Movement Observation Technique abbreviated as SPOT, SLOT and SMOT respectively. This therefore enables you to identify a person whose behavior warranties keen attention. They may be behaving suspiciously because they are suicide bombers or are carrying a bomb-activating device. In case of shooting, these are the people concealing guns in their clothing as they wait for the opportune time to strike or grab an armed guard’s weapon and then shoot aimlessly to kill.


Scan your surroundings for any suspicious luggage, especially Unattended Luggage/ luggage that is deliberately concealed from plain sight with no one claiming responsibility for it. While on the road, be on the lookout for suspicious movement of transportation vehicles e.g. Planes / Personal Cars / Motorcycles etc. Cases of vehicles being hijacked / stolen/ hired and then being used for terrorism activities such as ramming them into crowds of people / buildings exist. These vehicles can be driven / flown by terrorists at unusual speeds / routes that deviate from the norm e.g. ramming into pedestrians footpaths / promenades.


In most cases, terror attacks occur during special holidays such as Easter or Idd/ Anniversaries that the terrorists want people to be aware of. You should always be on the lookout for intelligence reports on terror attacks. When used more intelligently, better intelligence can assist you in quashing / avoiding being involved in a terror attack.


As a human being, you can never be perfect all the time. You should therefore plan for the worst while hoping for the best.




hit and run 2

When walking on the streets, always use designated pedestrian crossing points when crossing a road. If such designated pedestrian crossing points are not provided for, then take your time to cross the road.


If you do not consider this, you may end up being knocked down by a speeding vehicle and the driver may leave you there for dead. In case the driver decides to stop, he or she may decide to take his or her time before taking you to hospital. In the mean time, you will be lying there injured and may even end up dying at the scene as people take their time to take you to hospital. In as much as you may be in need of immediate medical attention, the driver may never bother about that.


In the case of a hit and run, other drivers may not bother helping you, as they will be in a hurry to undertake their chores. An example can be given of an incident where a person was hit by a vehicle that sped off, leaving the person there for dead. The person could not be rushed to hospital because other drivers did not want to have a bleeding person in their vehicles.


This was so as they did not want to incur extra expenses / time of having their vehicles seats being cleaned of the blood stains that the accident victim will have bled in their vehicle.


The victim ended up dying due to massive bleeding as onlookers waited for the first responders to arrive at the scene.


If you value your life, then take your time to use appropriate crossing points. Shortcuts may help you attain quick results but the consequences are cataclysmic. It is better to be safe than to be sorry.








The use of Oil as a major source of energy shall end. In place of Oil, use of Electrical / Solar Energy shall take over. We shall therefore be driving Electric Cars / Vehicles / Planes and Ships. Electric Planes shall aid in airplane safety as the plane shall no longer be bursting into flames when it crash lands. The hull of the plane shall also be better reinforced as the extra weight that used to be occupied by fuel shall no longer exist. These extra lightweights shall be used to also increase the luggage capacity of the plane. In other instances, the plane shall also be able to fly for longer distances as their flight distance shall no longer be limited by its fuel capacity.

Electric Cars shall also be the norm of the day. As a result, carbon emissions shall be reduced. The Iron or Metals that shall have been used to come up with engines that use oil in Vehicles, Ships and Planes shall be redirected to other uses/ it shall also be possible to use old vehicle bodies to come up with Electric Engine Cars. This business venture shall generate a lot of money for those that shall venture into it as early as possible. Oil shall therefore be used to make Plastic Poles, Plastic Housing Materials, Plastic Tarmac etcetera.

Manually driven cars shall be outdated. Just as Automatic Gear Boxes started to overtake Manual Gearboxes, so shall Self-Driving Cars. Self-Driven Cars will help reduce those accidents that are caused due to human driver errors. This is because they shall be more intelligent and smart. Self-Driving Cars shall also be susceptible to errors, which shall require the human driver to manually override the self-drive mode to tackle them. These may be errors such as the self-driving system crashing or encountering a scenario that it cannot solve / has never been programmed to tackle. The good thing is that the self-drive system shall also be able to learn on the go.

Such a scenario can be seen when driving an Automatic Gearbox Vehicle where the driver may speed the vehicle without knowing. This is because the car engine is able to automatically increase speed depending on the drive terrain requirements. As a result, the driver has to constantly check the speedometer when driving. This problem with the Automatic Gearbox can be sorted by using preset automatic gear level speeds limits and gear level change / speed alerts. This alert can be placed on the accelerator pedal for the driver to physically feel while driving.

The good thing with a Manual Gearbox is that should you find yourself driving the vehicle at a speed bracket that is pre-set for a specific gear level, then the car informs you. The information may be in the form of the car body shaking uncontrollably or the engine sound being weird. These signs immediately make you aware of a problem with the vehicle speed that needs immediate correction.


With the advent of Self-Driving Electric Cars, the possibility of having the same car flying shall also be real. There shall therefore be a need for flying cars regulations. These regulations shall include the need to fly the car in designated coordinates, periods and in stipulated situations. There shall also be a need of having accident mitigations and safety standards for the flying car occupants and the public at large. Some of these accident mitigation measures shall have already been incorporated in Self-Driving Cars. Additional regulations shall include flying car drivers training and licensing requirements, Automatic flying car stop/ refusal to fly in unstipulated car flying coordinates. The relevant standardization body shall also have to ensure that the Flying Car meets Minimum / Set Standards.

Quantum Webmatics shall be the norm of the day. This is where one can be able to share a File / Access a Webpage using a Virtual Server. This Virtual Server shall be Individual User’s Computers where any computer can act as a Server instead of having a single Server being accessed by many computers. Individuals Computers shall act as Servers if they agree so and a copy of the Files / Web Pages stored there. These copies shall be automatically updated on the computer. The same copy of Files / Web Pages shall also be duplicated on other user’s machines. The User that wants to Share / Access the Web Page shall be able to randomly do so. This scenario shall turn out to be a nightmare to Web User Resource Locator / Internet Protocol tracking / blocking. The reason is that, it shall be difficult to block the file sharing / website as you cannot shut down the millions or billions of computers that shall have duplicates of the Webpage / File Sharing or Hosting worldwide.

Astronauts / Space Orbital Machinery / Equipment will also be able to not just operate on Solar Power but shall also be operating using Electric Power. This shall enhance space exploration, as equipment shall be able to venture into areas in space where there is no Solar Power. They shall also be able to travel further into the universe and be able to land in planets such as Mars or Exoplanets or Stars like Pluto. Space Orbital Houses shall now be able to position themselves in orbit at will.

These Astronauts / Space Orbital Machinery / Equipment shall be strategically spaced out from the Moon to Pluto / Exoplanets so that Staff / Food Supplies can be freely interchanged within short distances.

With the advent of Quantum Power Generators, widespread electrical outages will be outdated. This is because Power Substations shall be interconnected.

Each Power Substation shall be an independent power generator. In case of a disaster that may result to the shutting down of a particular Station / Substation, power shall be distributed to the power grid of that particular Station / Substation through alternative grid routes. During disasters, it shall also be easy to set up an Emergency Command Center while using Quantum Power Generators that do not use oil as their source of energy. This shall also make use of Water Desalination Plants to be cheap to operate / use.

Electric Ships / Trains will also be able to operate without having to connect / reconnect to the National Power Grid. This shall be possible, as they shall be using the previously mentioned Quantum Power Generators. As a result, Ships shall be able to sail further and to carry more cargo (as there is no need of having oil tanks).

Water Desalination Plants shall be easily set up as the cost implications of powering them shall be low. Quantum Power Generators that are not dependent on fossil fuels, as a major source of energy shall make this possible. This shall also make Electric Space Travel Stations possible. Introduction of Nano Quantum Power Generators shall be used to power devices such as Mobile Phones, Wristwatches etc. An increase in Flying Ships shall also arise thereby posing a challenge in maritime management.







Diplomatic Lifestyle Journal March 2017 Edition Reviews




March 2017 EDITION|

When you go out to shop for a Product / Service, you always expect the person selling the Product or Service to treat you with courtesy. This is because they expect you to come back again / refer more people to come and shop with them. Unfortunately, this is not always the case. Some Luxury Fashion Labels / Shops / Retail Stores usually decide to stereotype people and generalize the way that they are portrayed. For instance, a Luxury Fashion Label / Shop / Retail Store may use secret code to alert employees when a specified person of Color or Race or Dress Code enters the store. Employees are then trained to stereotype customers by generalizing them on how they should be portrayed.

For example, some customers may be walking to a hotel that they are staying in for some time. The day may turn out to be hot and humid. They therefore decide to stop at a nearby Café to cool down as they are tired, hangover and sweaty. To get to the Café, they pass through a certain malls corridors, past a Mortgage Center (which was opposite the Café). The Mortgage Center clerks encircled the customers asking if they could be of any assistance etcetera. The customers politely decline and head to the Café. Within a short period, two well dressed persons who obviously have money to spend walk into the Mortgage Center. The clerks ignored them. The reason behind the former customers hounding is that they looked homeless and were out of their buyer demographics. They were the ones being profiled and the well-dressed customers were their target demographic. That is why the clerks did not bother to keep an eye on them.

People are stereotyped based on what they can be able to afford / what most people of that demography buy; instead of just focusing on their Race / Skin Color / Dress Code. Most sales agents are on a commission-based salary. They always want to sell to anyone, but also take precautions to avoid selling to non-willing / uninterested customers. In real sense, one should not have to dress in business casual in order for him / her to get a service.

The Diplomatic Lifestyle Journal and Sanfordestroe Company do not sell their Products / Services through Acclamation, Obstruction or Appearance Profiling.

* When your company sells through Acclamation, you usually find yourself placing noisy

speakers at the entrance of your premises to market your products. Such noise usually

brings attention to the store but most customers are usually irritated by it.

* When your company sells through Obstruction, you usually place your products on the

pathway that customers are supposed to be walking on. This is usually done to

physically alert the customer of the product and it really irritates a majority of

customers. This is because they have to maneuver their way on the walkway to pass

through as they head to their destinations.



Diplomatic Lifestyle Journal December 2016 Edition

Diplomatic Lifestyle Journal September 2016 Edition



March 2017 EDITION |

Building wealth is a process that takes time to accomplish. For you to be able to multiply your income sources, one of the areas that you will find yourself being involved in is Trading / Investing. You may find yourself being involved in Forex Trading, Commodities Trading, and Futures Trading etcetera.

Wealthy people always want to develop relationships with other successful / wealthy individuals. This therefore makes them to be very particular with the people that they associate with. Since wealthy people have excess money that they are not using, they always endeavor to multiply the money to have enough money to:

* Cater for the unknowns.

* Invest in the stock market as strategic savings.

* Launch a side business.

* Invest in profit yielding real estate / properties.

In order for you to be able to increase the amount of money that you are saving, you need to:

* Track how you spend your money. This will enable you to be aware of instances where you

are spending your money badly or instances where a vendor may have erroneously

charged you for a Product / Service.

* Minimize your spending.

* Buy quality Products / Services.

* Maximize on your income generating sources.

Surround yourself with people that will encourage you to follow your own goals. Encouraging yourself to be with people that give you negative energy shall only worsen your situation. We have three kinds of people that you should be able to identify. These are C+ People, C People and C- People.

* C+ People are people that bring out the positivity in you or people that encourage you to

follow your own goals in spite of how ridiculous the goals may seem to them. These are

people that you should See (C) More (+).

* C People are people that you meet or interact with as you undertake your daily chores.

They are more or less like your acquaintances. These are people that you just C (See) but

do not usually spend most of your time with.

* C – People are people that give you negative energy. You should always avoid these

people as they do not add / give any value to your life. They are therefore people that

you should See (C) Less (-).


Diplomatic Lifestyle Journal December 2016 Edition

Diplomatic Lifestyle Journal September 2016 Edition

Always aim to learn new skills. These new skills shall help you to grow as an individual. You can be able to learn these new skills by:

* Learning them in an Educational Institution.

* By joining Groups / Clubs that are enthusiastic of a new Skill / Technique that you want to


* Through Self-Improvement etcetera.

You cannot be able to save until you have paid off your debts. Carrying debts that have compound interests is bad. Such debts should be avoided at all costs. Financial Stress always changes people for the worse. Do not let financial stress ruin your life since life is too short for you to live it as a spectator.

Investing / Trading requires hard work / effort. You need to spend quality time researching on stocks of instruments that suit your style of investing. Copying other people’s style of investment is not acceptable as everyone has a different risk appetite. It is recommended that you stick to the basics when trading. You can start by finding Non-Correlated quality Stocks or Exchange Traded Funds. Non-Correlated Stocks / Asset Classes are Stock / Asset Classes that tend to not move along with the wider stock market for example Gold and Silver. Exchange Traded Funds on the other hand are a pooled investment instrument that you can use to access a diversified exposure to a particular area of the market. These areas can be in Stocks, Bonds, Commodities, Currencies or a blend of assets.

In Exchange Traded Funds, investors buy shares that represent a proportional interest in the pooled assets. These shares can be bought directly from any Brokerage Accountant. Exchange Traded Funds can take place any time the markets are open, you can sell short, place a stop loss or limit orders and can buy them on margin. Always remember to not trade Exchange-Traded Funds in the first and last minutes of the trading day.

Exchange Traded Funds Risks include:

* Exchange Traded Fund Shut Down. In such an instance, the fund is always liquidated

and Shareholders paid in cash. You should always sell out of an Exchange-Traded Fund as

soon as it announces that it is closing. Remember to avoid rushing to trade with an

Exchange-Traded Fund just because it is trending.

Always apply due diligence and make an extensive research on a fund as it may be on the

verge of shutting down / may be at risk of shutting down / may be shutting down.

* Broken Exchange Traded Funds occurs when a country experiences a Revolution / Crisis

that forces the country’s stock exchange to shut down for a period that may last for days

or weeks. During the closure, investors may expect it to open from where the market was

before the Revolution / Crisis. However, when the stock exchange opens back again, the

market may be flat thereby forcing the Exchange Traded Fund to plummet in value.





March 2017 EDITION |

Living in a Gated Community is the envy of many homeowners. It makes them feel as if they are living in an exclusive and secure residence. If the amenities and alternative access roads are properly Designed, Managed and Catered for, then you have no need to worry / be troubled. However, in some instances, this may never be the case especially when unscrupulous residents with egocentric ideas decide to influence or manipulate the Residential Area Decision-Making Process / Organs.

To give you an idea of what may happen; we are going to use a Virtual Community Estate / Residence. You may have desired to own your own home with a nice garden instead of renting one. You happen to get a place where you can set up your dream home. At the time of buying land, the place happens to be having few residents since many people have not yet bought the allocated pieces of land.

The design of the location is strictly residential to provide residents with a serene, quiet and lush green environment to live in. Soon, the place is substantially occupied. Cases of houses being broken into and thieves getting an easy way out without being caught started to arise. Some of these thieves had the courage to carjack residents. They then had them driving all over the estate while harassing them. Residents came up with a unanimous resolution in their estate meeting to have each Estate Zone Boundary Streets / Routes gated. The initial Estate Master Plan had the estate designed with open zones that allow for the mutual flow of people and cars. To cater for this initial master plan, estate residents decided that all Second Avenues / Access Roads were to be accessible to vehicles in case there is restricted access on the Estate Main Avenue due to cases such as vehicle accidents. They were therefore reserved as Alternative Vehicle Access Routes during emergency cases. The introduction of gates actually helped to curb estate carjacking and to restrict the easy movement / access by thieves.

Residents further decided to introduce Zonal Security Guards. This was done because of some residents had their family members being killed within the estate / being killed elsewhere and their bodies dumped within the estate. Robberies also became violent as robbers began stealing while armed due to restricted escape routes. It should be noted that most of these killings were predetermined as some spouses ordered the killing of their partners for monetary purposes. In other instances, these residents were being killed because of the underhand dealings that they were involved in such as drug trafficking, money laundering, tenderpreneuring etcetera. Some homes were also robbed because of the friends that the family members welcomed into their homes. These friends could see the lavish lifestyle that they were living in or be privy to inside information such as where the house keys are hidden for other family members to access when there is no one around. They could then tell other people, some of whom will turn out to be robbers. Sometimes even these friends could be robbers. In other instances, the people making the gates colluded with robbers to have an increase in their gate sales.



Diplomatic Lifestyle Journal December 2016 Edition

Diplomatic Lifestyle Journal September 2016 Edition



March 2017 EDITION |

You may decide to go and acquire a loan that shall enable you to cater for crucial ventures. I would like to discourage you from taking a loan to cater for emergencies. Emergencies are planned for by saving. If you know the time value of money, then you know that when you borrow money, the returns must be magnified. You must always outperform your invested money to obtain an Exponential Return of Value. Whatever you do with borrowed money, your Rate of Return should always be better than your Borrowing Rate. Lending institutions know this very well and so should you.


                       A loan is comprised of two components:

* The Principal Amount (This is the amount of money you are loaned).

* The Interest Amount (This is the amount institutions charge you for lending you their


A loan also comes with Fees / Extra charges such as : Application Fees, Risk Premium / Insurance Fees, Negotiation Fees / Staff Commission Payments, Commitment Fees etcetera. Lending institutions get rich at the misery of others / from the misery of others. These institutions are in the business of making profits and self-gain is all that matters. You should therefore do proper research before taking any loan. You may be thinking that you have taken a superb loan when in the real sense, the person that offered you the loan did not fully disclose to you the loans terms and conditions.

This article is going to show you how to calculate interest on a Reducing Balance Interest Loan and Flat Rate Interest Based Loans.


Lending Organizations fix their Interest Rate to a Standard Rate that is determined by an external entity such as the Government, the Federal Reserve or the Central Bank. The external entity determines the Maximum Index Interest Rate that lenders can levy on their customers as determined by law. Lenders shall then base their loans on a Fixed Interest Rate that is determined by them and the Index Rate that was determined by the external entity. This index rate may vary over time, implying that your loan shall be constantly reviewed to reflect the new interest. When creating the product, the lender always ensures that, they incorporate the frequency at which the interest rate is reviewed.

Loans that are using an Index Rate are always updated anytime there is a new Index Rate. The interest rates quoted for such loans become the effective interest rate.

Interest Payable Per Installment = Interest Rate Per Installment * Remaining Loan Amount

For example:

If you borrowed a loan of 100,000 shillings and that loan was disbursed on the 15th day of the month with an interest review to be undertaken on a monthly basis. The loans Interest Spread as determined by the bank shall be reserved at a rate of 2% per month during the term of the loan.

At the time of taking the loan, the Index Rate shall be at 5%.

Loan Amount : 100,000

Interest : 5% (Index Rate) + 2% (Spread as determined by the bank).

Installment Payment Rate : Monthly

Loan Interest Rate Review : Monthly

Loan Disbursal Date : 15th / Month /Year

Suppose the external entity keeps the Interest Rate at 5% on the next month that you are supposed to pay the Loan, then the Interest payable shall be:

First Installment Interest Rate of 7% that is 5% Index Rate + 2% Spread as determined by the bank.

Interest Rate Payable = 7/100 * 100,000 = 7,000

NB: The loans Principal Amount of 100,000 may not be the amount that you shall actually get in your account  when the loan is disbursed. For instance, the loan amount may be less after bank charges have been deducted. Charges such as 3% Processing Fee = 3,000 Shillings and 0.6% Insurance Fee per Year = 600 Shillings. Hence, Amount shall be 100,000 – 3,600 = 96,400 Shillings. Other lenders may even decide to withhold money that equates to certain number (s) of loan monthly repayment amount to cater for loan payment delays. This amount shall then be deducted from the amount that   the client is supposed to receive in the account.

If the Index Rate is increased to 6%. The change will affect the loan repayment schedule as follows :  6% (Index) + 2% (Spread) = 8 %

If your Monthly Installment is 10,000 Shillings then you will have paid 7,000 Shillings as the Interest Amount and 3,000 Shillings shall have been used as payment for the Principal Amount.

The Second Months Interest Payment shall be :

100,000 – 3,000 = 97,000 as the New Principal Amount

97,000 * 8/100 = 7,760 as Interest Rate payable for that month.

Lenders using the Reducing Balance Method of loan payment always ensure that you spend the first two years offsetting the loans interest as opposed to the Principal Amount. If you go to the bank to request for a loan statement, that will help you to confirm that. You can also confirm if you are paying more of the loan interest as opposed to the Principal Amount is when you request to settle the debt / have the loan bought off.

If you are using your salary to calculate your loan ability,  the formula usually uses Gross Pay and not Basic Pay.


If you are borrowing for a long period, then a Flat Rate Interest Loan is recommended. When borrowing for a short period, then a Reducing Balance Interest Rate Loan is recommended.

Some institutions utilize a true Reducing Balance Loan where you have a constant Interest Rate for the duration of the loan. The Interest Amount is also calculated after the Principal Amount paid has been deducted. The advantage of borrowing from institutions where you own shares is that you end up getting paid dividends when they make profits.




March 2017 EDITION |

Nicotine is a poisonous chemical that contains Nitrogen. Nicotine is produced synthetically or made by the tobacco plant as a means of protecting itself from being eaten by insects.

The tobacco plant is native to the Americas and Native Americans initially used it during sacred rituals and as medicine. Nicotine is extracted from tobacco leaves through solvent treatment or by steam. Nicotine was first used as an agricultural insecticide in 1763 when it was sprayed on vegetation to kill / deter insects.

Nicotine either killed / deterred insects as its effects are lethal to the nervous system. There have been reports of gardeners dying from handling nicotine in a matter of minutes due to respiratory failure.

In 1828, Nicotine was extracted from tobacco Leaves.

In 1614, Beggars in Seville, Spain invented cigarettes. These beggars used to collect scraps of cigars and then rolled the tobacco into small pieces of paper. Before then, tobacco consumption used to be limited to either chewing tobacco OR smoking tobacco / cigar.


After a smoker inhales, nicotine is absorbed by your body through the Mucosal Linings of the Mouth , Lungs and Nose while the rest is absorbed through the Skin. This nicotine then travels through the bloodstream to the brain. Smokeless tobacco products such as Skin Patches, Gum and Chewing Tobacco deliver their Nicotine Fix when it is absorbed through the Gastrointestinal Tract or Skin. Once nicotine has entered the body, it is immediately absorbed into the bloodstream. From the bloodstream, it has access to all the major organs of your body e.g. the brain. Nicotine shall then stimulate Adrenaline Glands to produce Epinephrine. This increases your heart rate and blood pressure while constricting your blood vessels, making you alert. Epinephrine also triggers Glucose to be released in your body. This Glucose then gives you a short-term energy boost.

Nicotine binds to specific receptors on the Presynaptic Neuron. Nicotine binds to Nicotine Receptors on the Dopamine containing Axon Terminal (found in the Nucleus Accumbens) resulting in the release of more Dopamine. This then makes the smoker to enjoy the pleasure of smoking and to have the desire of using it repeatedly.





Whenever you set up a Company, always ensure that you have put in place proper Company Policies and Guidelines / Procedures. A Company that is selling high-end vehicles had a Client requesting to view three vehicles to fully decide on the vehicle that he shall buy. The Company Director then called one of the employees to have the vehicles delivered to the client’s offices for viewing. The employee decided to get two of his friends to drive the other two vehicles as there was no one else to drive them. En route, armed robbers waylaid the vehicles convoy and forced the drivers to drive to a nearby forest. The drivers were left stranded in the forest and the robbers drove off with the vehicles.

The company employee then reported the matter to the police at the nearest police station. In the mean time, the Company Security Guard together with the employee’s two friends decided to go into hiding. The employee was then arrested and charged before court for conspiring with others (who were not in court) to rob the company of three vehicles. In court, the employee was tried and the charges were dismissed due to insufficient evidence and shoddy investigations.

This was possible because:

  * The Telephone instructions that the Director gave the employee were unsubstantiated, as

they were not recorded.

* When the Vehicles were leaving the Show Room, there was no Documentation signed by

the Drivers to acknowledge the same.

* When the Vehicles left the Company premises, the Security Guard was not given any

Dispatch Documentation to log the same in a Register.

The company ended up losing the Vehicles at their own expense as the Cars had no Insurance. The element of mutual trust between the employee and the employer is good but in cases where proper documentation must be done, no compromises are acceptable.



Diplomatic Lifestyle Journal December 2016 Edition

Diplomatic Lifestyle Journal September 2016 Edition

Mind Mining Education System

Gated Community Exploitation





March 2017 EDITION |


Living in a Gated Community is the envy of many homeowners. It makes them feel as if they are living in an exclusive and secure residence. If the amenities and alternative access roads are properly Designed, Managed and Catered for, then you have no need to worry / be troubled. However, in some instances, this may never be the case especially when unscrupulous residents with egocentric ideas decide to influence or manipulate the Residential Area Decision-Making Process / Organs.


To give you an idea of what may happen; we are going to use a Virtual Community Estate / Residence. You may have desired to own your own home with a nice garden instead of renting one. You happen to get a place where you can set up your dream home. At the time of buying land, the place happens to be having few residents since many people have not yet bought the allocated pieces of land.

This Diplomatic Lifestyle Journal March 2017 Article is provided as a free annual article for readers to sample Articles from one of our four yearly Diplomatic Lifestyle Journals  at :

The design of the location is strictly residential to provide residents with a serene, quiet and lush green environment to live in. Soon, the place is substantially occupied. Cases of houses being broken into and thieves getting an easy way out without being caught started to arise. Some of these thieves had the courage to carjack residents. They then had them driving all over the estate while harassing them. Residents came up with a unanimous resolution in their estate meeting to have each Estate Zone Boundary Streets / Routes gated. The initial Estate Master Plan had the estate designed with open zones that allow for the mutual flow of people and cars. To cater for this initial master plan, estate residents decided that all Second Avenues / Access Roads were to be accessible to vehicles in case there is restricted access on the Estate Main Avenue due to cases such as vehicle accidents. They were therefore reserved as Alternative Vehicle Access Routes during emergency cases. The introduction of gates actually helped to curb estate carjacking and to restrict the easy movement / access by thieves.


Residents further decided to introduce Zonal Security Guards. This was done because of some residents had their family members being killed within the estate / being killed elsewhere and their bodies dumped within the estate. Robberies also became violent as robbers began stealing while armed due to restricted escape routes. It should be noted that most of these killings were predetermined as some spouses ordered the killing of their partners for monetary purposes. In other instances, these residents were being killed because of the underhand dealings that they were involved in such as drug trafficking, money laundering, tenderpreneuring etcetera. Some homes were also robbed because of the friends that the family members welcomed into their homes. These friends could see the lavish lifestyle that they were living in or be privy to inside information such as where the house keys are hidden for other family members to access when there is no one around. They could then tell other people, some of whom will turn out to be robbers. Sometimes even these friends could be robbers. In other instances, the people making the gates colluded with robbers to have an increase in their gate sales.


The master plan for the Zonal Security Guards was to have each Zonal Avenue / Street paying for the Zonal / Street Security Guards by having each Plot / Homestead contributing an equal amount to the security kitty. The zone had a Main Entrance Access Route from the Estate Main Avenue, which also needed to have a security guard at night and during daytime. To cater for this, two Guards were to be selected by having one Guard being obtained from each Zonal Street / Avenue in planned successions. One Guard was to operate the gate during the day while the other at night.


Due to greed and malicious intent, some residents then decided to scrap the idea and introduced independent Guards to operate the Main Zonal Gate. These guards were to be externally sourced and each homestead that had a vehicle required to pay extra charges at the main avenue gate. These monies were to be used to pay the security guards salaries / allowances. Assuming that each Zonal Avenue has 25 Homesteads and that the Zone has five ( 5 ) Avenues. Then the Total Number of Homesteads shall be 25 * 5 = 125 Homesteads. At the entrance street of the Main Zonal Entrance Avenue street, we have an additional 15 Homesteads thereby making a total of 140 Homesteads. The sample layout of the zone shall be as shown in the diagram below.



Diagram ILLUSTRATED BY MBATI V A for the Diplomatic Lifestyle Journal.

Assuming that each Household pays 500 Shillings per month for Zonal Entry Gate Security Charges. The total money collected per month shall be : 500 Shillings * 140 Households = 70,000 Shillings.


Annual Gate Security Charges Collection will be  : 70,000 Shillings * 12 Months = 840,000 Shillings.


The gate can be manned by two (2) Guards at daytime and another two (2) at night. Each Guard shall be paid 10,000 Shillings. The total Monthly Security Guards salaries shall be 4 Guards * 10,000 Shillings = 40,000 Shillings.


Annual Guard Salaries shall be 40,000 Shillings * 12 Months = 480,000 Shillings.


Actual Gate Collections = 840,000 Shillings – Actual Security Guard Salary payments (480,000 Shillings) = 360,000 Shillings in excess for the Project Schemers’ to use as dubious payments to line their pockets.

As for the residents, they will find themselves making double security payments when in real sense they are only supposed to be making only one payment. Other residents may even go a step further by manipulating the Zonal Street / Avenue Residents to gate their Zonal Street / Avenue to Residents only. This further curtails free movement of people within the zone due to an individual’s self-centered interests.

This Diplomatic Lifestyle Journal March 2017 Article is provided as a free annual article for readers to sample Articles from one of our four yearly Diplomatic Lifestyle Journals  at :

To avoid being questioned as to where the excess security money is spent. The schemers usually come up with innovative self enriching projects such as Zonal Avenues public spaces cleaning, Zonal Avenues road maintenance fees (even if this is a government project or power service providers initiative to safeguard their transformers from being vandalized ), Zonal open drainage repair and maintenance fees etcetera. In reality, the Project Schemers exploited these zonal projects as conduits to enrich themselves. With time, other residents decided to have their Zonal Avenues totally closed from other Zonal Areas until whole zones were excised from other Zones. In as much as this was beneficial to them, it is actually not beneficial for the estate at large. This is because residents who wanted to walk to the main Shopping Center at the entrance of the estate could not do so while using the estate alternative routes. They were forced to go to the Main Avenue, which exposed them to incessant traffic flow.


Residents who exercise within the estate could not do so as their movement was curtailed or restricted. As a resident, it is always advisable to have an alternative route that you can use in case of the unexpected for example when running away from contract killers that have been hired to kill you. The same-gated community restrictions always act as emergency response delay obstacles. This is so because, if the first responders take a wrong turn, they will have to go back to the main entrance before going to the actual area of response. Police patrols are also hindered, as they cannot move freely within the Estate Zones / Avenues. You therefore end up not having an alternative access or response route in case of an emergency. In some instances, when you enquire from the residents as to why they had their Region / Zone totally closed from other residents, you will be amazed by the ridiculous reasons that they give in the name of Comfort / Security.


Given the high stake of private money involved that officials could pocket through Project Prices Inflation; being an official meant that you had to ease on your ethics. If you decided to be a whistle-blower on the underhand dealings of the officials, then all the officials had no option but to defend their secret. They will even intimidate you so that you do not reveal their secret.


Should you become adamant, then they had no option but to have you killed. When they decide so, they will ensure that it is done irrespective of whether you are Armed, Have Armed Security / Guards or are trained in Paramilitary / Military tactics.


Another public amenity that these officials may use is to request residents to contribute money so that they could supply each Homestead / Plot with Piped Water or Alternative Piped Water. They can therefore use the Water Project to source for armatures to undertake the Water Piping Services and to provide Expert Consultancy Services as well. In reality, they will cut corners and then pocket the extra money for themselves.


These schemes do not just take place in Residential Estates but in most places that have / use shared amenities such as Apartments / Condors. We hope that you are now aware on what may happen when egocentric residents decide to use the residential security system for their own gain.

This Diplomatic Lifestyle Journal March 2017 Article is provided as a free annual article for readers to sample Articles from one of our four yearly Diplomatic Lifestyle Journals  at :



Diplomatic Lifestyle Journal March 2017 Edition

Diplomatic Lifestyle Journal December 2016 Edition

Diplomatic Lifestyle Journal September 2016 Edition

Mind Mining Education System




September 2016 EDITION |



One of the most important phases in a person’s life is pursuing a good education. Your parents always ensure that you go to the best schools to acquire quality knowledge from the time you attain school going age till you reach the highest possible level of academia. In most instances, you never knew that education systems as we currently know them; actually came into being after the 19th century. It was at this time that industrialization had just started to flourish and so education was predicated to cater for industrialism. Subjects that were deemed as being the most useful in coming up with employees to work in this industries were given top priority in the education system.

You should by now have known that every education system on earth has the same hierarchy of subjects. At the top of these educational subjects hierarchy are Mathematics and Language subjects whereas Humanities subjects are always ranked at the bottom. This is simply because you are required to be able to listen to and to respond to whatever instruction that is being given to you. You are also required to know arithmetic so that you can be able to know how many hours of work your employer needs you to work and to account for money that you will incur or generate for your employer (this includes counting the wages that you will be paid after doing a satisfactory job at work).

In the Arts subjects for instance, emphasis is placed on the Art and Music subjects whereas Drama and Dance subjects are lowly ranked. This is because with Art, you can be able to decorate the workplace or draw signage to be used at the workplace to give instructions or show directions. Music subjects could be used to make you entertain employees at work so that they do not get bored or fall asleep on the job while working.


Drama and Dance subjects are discouraged because they distract you from working as you have to concentrate on watching the actors involved. They were therefore deemed as important for home entertainment.

The education system is predicated on the idea of academic ability where the more exams you pass with extremely good grades, the highly likely you are to get employed or to advance to the next level of education. As a result, this education system is designed to filter out extremely excellent students to have the opportunity to work as trainers. The system also lets the best employees to also be trainers. This closes the education loop by creating a continuous training of entrants into the system while solving trainer attrition as shown in the diagram below.


Diagram ILLUSTRATED BY MBATI V A for the Diplomatic Lifestyle Journal.

This Diplomatic Lifestyle Journal September 2016 Article is provided as a free annual article for readers to sample Articles from one of our four yearly Diplomatic Lifestyle Journals  at :

Universities also distorted the academic system by designing their own institutionalized custom made mode of training students that suited their Image. This customization process has protracted to date.

As time progresses, more and more people worldwide are graduating in education, and this is as a result of advancements in technology (from where one can be able to undertake distance learning) and the effect of work transformation (which has resulted to employers increasing need of educated employees and especially those who have been trained in those fields of work that they have in their industries instead of having to train them afresh while on the job).

More people are also graduating worldwide because of Demography and the huge explosion of the population as the average lifespan of a human being to live on earth increases, while infant mortality decreases. The process of Academic Inflation has come into being as a result of this many people that are currently graduating. This is because we have too many people graduating at the same time with the same academic qualifications. They then flood the job market seeking for employment thereby leaving the employer with no choice but to filter out the number by employing only those applicants that have added qualifications.

 It should be noted that at this day and age, having a degree is not worth anything. Sooner or later, even having masters will be worth nothing unless you have other qualifications to supplement it.

The kind of education that you need is one that is customized for you, with creativity and literacy being treated on equal status. Such a kind of education encourages you to concentrate on things that you like or on things that you are good at in school instead of stigmatizing or devaluing them. Creativity in itself is achieved by being prepared to fail when you take a chance while delving into the unknown; since you have no idea of what will play out in the future. It is in these uncertainties that you become ready to take chances even thou you do not know anything. This may necessarily not equate to being creative.

On the other hand, the same people that came up with a need for education to create employees (servants) also had another system of education that was meant to create employers (masters). This other educational system has fundamentally rethought principals in which students are taught. They have also been made to be too costly beyond the reach of many so as to create fewer masters and plenty of slaves at their disposal.

This elevated educational system hierarchy has adopted a new concept of human ecology to that of a rich human capacity  and that which makes you to be able to know how highly talented , highly  creative and brilliant you are.


As for the employee customized education system aforementioned , the students mind is stripped to its basic capacity and then customized to cater for either the current employment or future employment requirements more or less the way we strip mine the earth for a particular mineral or commodity.

The elevated educational system has radically reviewed fundamental principles of teaching a child including the way in which intelligence is perceived. Intelligence being the intellectual capacity of humans which is in itself a complex topic but is basically the ability to learn, present problems and to solve problems.

The human brain has different parts, each with its own special properties that mutually interact in spite of the different ways that they perceive things. As a good student, you should be able to have the ability to operate the way your brain works.

With that insight, I now hope that you have been enlightened as to how the education system works and can now comfortably know if you are designed to come out of it as a slave or as a master.

This Diplomatic Lifestyle Journal September 2016 Article is provided as a free annual article for readers to sample Articles from one of our four yearly Diplomatic Lifestyle Journals  at



Diplomatic Lifestyle Journal March 2017 Edition

Diplomatic Lifestyle Journal December 2016 Edition

Diplomatic Lifestyle Journal September 2016 Edition

Gated Community Exploitation

%d bloggers like this: