Lavrov blasts West’s ‘loudspeaker diplomacy’ after Austria claims it has exposed ‘Russian spy’

Lavrov blasts West’s ‘loudspeaker diplomacy’ after Austria claims it has exposed ‘Russian spy’

Sergey Lavrov lashed out at Western “loudspeaker diplomacy” after Austria said it exposed a retired military officer as a “Russian agent” who gathered data on the country’s army for years.

“I’ve learned about it right away … and, frankly speaking, I was unpleasantly surprised by the news,” Russian Foreign Minister said. At any rate, Vienna should have used other ways of delivering the espionage allegations, the top diplomat argued.

However, that is a strategy known to Moscow, as Western powers increasingly tend to use “loudspeaker diplomacy” to publicly blame Russia for “an issue that we know nothing of.”

Russia will now  summon the Austrian Ambassador to tell him “what methods should be used if they have any queries to Russia,” Lavrov concluded.

The case kicked off after Vienna confirmed that a retired Austrian colonel is accused of gathering information on his country’s military (the Bundesheer) since the 1990s. The senior officer, whose name has been withheld, allegedly began working for Russian intelligence in the 1990s, and this cooperation lasted until 2018.

Calling the alleged espionage “unacceptable,” Kurz said Vienna is now looking at all available options. “We will discuss further steps with our European partners,” he explained without elaborating.

Defense Minister Mario Kunasek told the media a tip-off came from a friendly intelligence agency, claiming the Russians provided the agent with spy gear, including encrypted radio communications.

The colonel was detained shortly after being flagged as a “Russian agent,” according to Michael Bauer, a military spokesman. The official said the agent, who has allegedly been transferring intelligence to Russia, was exposed due to “international cooperation. Following the news of the alleged spying, Foreign Minister Karin Kneissl cancelled her planned visit to Russia.

READ MORE: ‘75,000 Russian informants’: UK think tank report mocked after they conduct only 16 interviews

While having confirmed the man was detained on espionage charges, Austrian authorities did not elaborate on the evidence backing up the claims.

Meanwhile, Russia has been bombarded with blunt accusations of having its feet in foreign state’s affairs for quite a while now. On the latest occasion in October, the Netherlands expelled four Russians who allegedly tried to wiretap on Wi-Fi network of the Organization for the Prohibition of Chemical Weapons (OPCW) back in April.

Moscow refuted the accusations describing them as “spy mania.” It also fired back at the claims, saying no solid proof has been presented, while the blame game only gained pace

Youth of China invented Artificial Intellegence weapons

China recruits teenagers to build AI weapons

At a top government-funded research institute, high schoolers are being recruited to develop weaponry operated by AI. The program is China’s latest move in their race against the US to “lead the game of modern wars”.

The Beijing Institute of Technology, a leading government-funded research institute, has selected China’s best and brightest youths to participate in an artificial intelligence based weapon design program which seeks to put China on the cutting-edge of modern warfare.

According to the BIT’s website, 27 boys and 4 girls will be groomed to become the world’s youngest weapons designers. Those chosen were selected from a list of 5,000 candidates, all of whom are under the age of 18 and “patriots,” according to an anonymous professor cited by South China Morning Post.

According to a brochure for the program, each student will be guided by weapons scientists from academic backgrounds and from the defense industry. The students will even get hands-on experience working in actual defense laboratories.

The program lasts four years, at the end of which graduates will be expected to continue in their field of specialization at the Ph.D. level.

Ironically, China was the first superpower to endorse a call for a ban on autonomous lethal weapons at the UN. As of now, automated weapons systems need to employ “meaningful human control”, as required by the Martens Clause, an international law which stipulates that emerging weapons technologies be developed in accordance with the “principles of humanity”.

Both Russia and the US have stated their opposition to the ban on fully automated weaponry.

Eleonore Pauwels of the UN center for policy research in New York expressed her concern over China’s initiative in an interview with Business Insider: “This is the first university programme in the world designed to aggressively and strategically encourage the next generation to think, design and deploy AI for military research and use.”

The program, launched in October of this year, is only the latest in China’s push for  “global domination” in the field of AI, which it aims to achieve by the year 2030. Following Xi Jinping’s call last year for a stronger national focus on AI technology, China mobilized resources from the central government as well as its massive tech companies.

China’s boldness in the field of weapons technology has expectedly become a serious concern for the US, inciting President Trump to increasingly confrontational responses. Last September, the US Defense Advanced Research Projects Agency (DARPA) announced its own $2.7 bn initiative in weaponized AI research, assuring that China will have serious competition.

 

Casino Slot Machine; Cat Queen game

 

“Cat Queen: Game by “PlayTech”

payline

Cat Queen Game ,by PlayTech started in 1999, Playtech is one of the most papular gambling software suppliers that focus on casino games (i.e. Slot Machine, Card Games, etc.) Its casino content is one of the best in the market, giving the customers and players a chance to enjoy games featuring the latest technologies while playing it online. Some prefer playing online so they wouldn’t travel to their local casino. It is playable on both online and mobile platforms and over 500 casino games to enjoy.


How to play ‘Cat Queen Game’

This is one of the most popular games that you can play for real, called ‘Cat Queen’ by ‘Playtech’. Basically, there are 40 line combinations. You can either increase the number of lines or raise the line bet amount. The game is easy and can be played automatically.

Game Modes:

By selecting, ‘Autoplay’, the player will mark on a number of spins, and after choosing, the game will automaticaly initiate the roulette and will end after the desired spin numbers. The player also has control over selecting ‘Turbo Mode’. Whilst turbo mode is enabled, The player has to spin the roulette manually and decide to review each round of the game.  Note that the ‘Wild” icon is a substitute for all other symbols except for “Scatter”

Game Mechanics:

Depending on the machine, paylines begin left to right or right to left and can sometimes even be diagonal. For starters, when you hit 3 or more Scatter Symbols you will trigger 15 Free Games. Players have to take into account that if you hit the same winning combination again you receive an additional 15 Free Games. This means that you could potentially have infinite Free Games on Cat Queen, by Playtech.

Cat Queen Symbols:

  • Anubis and Maahes
  • The Scarab and the Bird Hieroglyph
  • The Ankh and the Eye of Horus
  • The Pharaoh Symbol
  • Scatter
  • Wild

Cat Queen Payline:

payline

 


Gambling in Casino; Slot Machines

download.jpgIn Casino, Gambling is one of the most exciting past time nowadays. Whether it’s betting on your favorite sports team, buying tickets for the lottery, or even playing a slot machine at your local casino. Who doesn’t like to earn extra cash without having to break a sweat!? But what is the one thing that keeps people motivated to keep pushing their luck despite hitting consecutive loses in the casino? How do people fantasize with their fortune?

Since the slot machine has been famous in the casino, many gamblers try to explain a strategic advice, The problem with slot rules is that when trying to explain them to someone new to casino games, the advice means nothing more than a sympathetic smile.

While the age-old game of slots has some basic rules that anyone can understand, each game has its out unique payout structure, bonuses, minimum bets, number of pay lines and return to player rates which we will get into their hype in playing moreover. In most instance, Gamblers in the Casino does not think of losing at all. They sense the venture and joy every game. Later that time, gamblers often raise their wager to take a leap of faith whilst the others are afraid of uncertainty.

There are many reasons why people gamble

  • Exciting Risks – People love to take risks, and quite obviously gambling has its own thrill. The sense of anticipation “will I win” or “will I end up empty” A natural high, an adrenaline rush that many want to keep seeking can be experienced in gambling
  • Escapism –  The gambling environment provides an escape from everyday life. we are surrounded by different people, different sounds and emotions, all of which stimulate and arouse our senses. Some people go to their local Casino to escape bursting an unwanted anger in life.
  • Glamour – media and advertising agencies understand the psychology of gambling and often portray a stylish, sexy, fashionable image of gambling which attracts many people. In this way, the gambler in the casino tends to socialize.
  • Social – Gambling is a part of the culture in many countries and is widely anticipated by the majority of the population. Some do gambling to support their favorite team, either in NFL, Basketball, Soccer and other sports team.

 

 


 

 

The CIA’s communications suffered a catastrophic compromise. It started in Iran.

Flares v tear gas: Students clash with police over education reform in Athens

In 2013, hundreds of CIA officers — many working nonstop for weeks — scrambled to contain a disaster of global proportions: a compromise of the agency’s internet-based covert communications system used to interact with its informants in dark corners around the world. Teams of CIA experts worked feverishly to take down and reconfigure the websites secretly used for these communications; others managed operations to quickly spirit assets to safety and oversaw other forms of triage.

“When this was going on, it was all that mattered,” said one former intelligence community official. The situation was “catastrophic,” said another former senior intelligence official.

From around 2009 to 2013, the U.S. intelligence community experienced crippling intelligence failures related to the secret internet-based communications system, a key means for remote messaging between CIA officers and their sources on the ground worldwide. The previously unreported global problem originated in Iran and spiderwebbed to other countries, and was left unrepaired — despite warnings about what was happening — until more than two dozen sources died in China in 2011 and 2012 as a result, according to 11 former intelligence and national security officials.

The disaster ensnared every corner of the national security bureaucracy — from multiple intelligence agencies, congressional intelligence committees and independent contractors to internal government watchdogs — forcing a slow-moving, complex government machine to grapple with the deadly dangers of emerging technologies.

In a world where dependence on advanced technology may be a necessary evil for modern espionage, particularly in hostile regions where American officials can’t operate freely, such technical failures are an ever present danger and will only become more acute with time.

“When these types of compromises happen, it’s so dark and bad,” said one former official. “They can burrow in. It never really ends.”

A former senior intelligence official with direct knowledge of the compromise said it had global implications for the CIA.  “You start thinking twice about people, from China to Russia to Iran to North Korea,” said the former official.  The CIA was worried about its network “totally unwinding worldwide.”

Yahoo News’ reporting on this global communications failure is based on conversations with eleven former U.S. intelligence and government officials directly familiar with the matter who requested anonymity to discuss sensitive operations. Multiple former intelligence officials said that the damage from the potential global compromise was serious — even catastrophic — and will persist for years.


More than just a question of a single failure, the fiasco illustrates a breakdown that was never properly addressed. The government’s inability to address the communication system’s insecurities until after sources were rolled up in China was disastrous. “We’re still dealing with the fallout,” said one former national security official. “Dozens of people around the world were killed because of this.”

*****

One of the largest intelligence failures of the past decade started in Iran in 2009, when the Obama administration announced the discovery of a secret Iranian underground enrichment facility — part of Iran’s headlong drive for nuclear weapons. Angered about the breach, the Iranians went on a mole hunt, looking for foreign spies, said one former senior intelligence official.

The mole hunt wasn’t hard, in large part, because the communications system the CIA was using to communicate with agents was flawed. Former U.S. officials said the internet-based platform, which was first used in war zones in the Middle East, was not built to withstand the sophisticated counterintelligence efforts of a state actor like China or Iran. “It was never meant to be used long term for people to talk to sources,” said one former official. “The issue was that it was working well for too long, with too many people. But it was an elementary system.”

“Everyone was using it far beyond its intention,” said another former official.

The risks posed by the system appeared to have been overlooked in part because of it was easy to use, said the former intelligence officials. There is no foolproof way to communicate — especially with expediency and urgency — with sources in hostile environments like Iran and China, noted the former officials. But a sense of confidence in the system kept it in operation far longer than was safe or advisable, said former officials. The CIA’s directorate of science and technology, which is responsible for the secure communications system, “says, ‘our s***’s impregnable,’ but it’s obviously not,” said one former official.

By 2010, however, it appears that Iran had begun to identify CIA agents. And by 2011,  Iranian authorities dismantled a CIA spy network in that country, said seven former U.S. intelligence officials. (Indeed, in May 2011, Iranian intelligence officials announced publicly that they had broken up a ring of 30 CIA spies; U.S. officials later confirmed the breach to ABC News, which also reported on a potential compromise to the communications system.)

Iran executed some of the CIA informants and imprisoned others in an intelligence setback that one of the former officials described as “incredibly damaging.” The CIA successfully exfiltrated some of its Iranian sources, said former officials.


The Iranian compromise led to significantly fewer CIA agents being killed than in China, according to former officials. Still, the events there hampered the CIA’s capacity to collect intelligence in Iran at a critical time, just as Tehran was forging ahead with its nuclear program.

U.S. authorities believe Iran probably unwound the CIA’s asset network analytically — meaning they deduced what Washington knew about Tehran’s own operations, then identified Iranians who held that information, and eventually zeroed in on possible sources. This hunt for CIA sources eventually bore fruit — including the identification of the covert communications system.

A 2011 Iranian television broadcast that touted the government’s destruction of the CIA network said U.S. intelligence operatives had created websites for fake companies to recruit agents in Iran by promising them jobs, visas and education abroad. Iranians who initially thought they were responding to legitimate opportunities would end up meeting with CIA officers in places like Dubai or Istanbul for recruitment, according to the broadcast.

Though the Iranians didn’t say precisely how they infiltrated the network, two former U.S. intelligence officials said that the Iranians cultivated a double agent who led them to the secret CIA communications system. This online system allowed CIA officers and their sources to communicate remotely in difficult operational environments like China and Iran, where in-person meetings are often dangerous.

A lack of proper vetting of sources may have led to the CIA inadvertently running a double agent, said one former senior official — a consequence of the CIA’s pressing need at the time to develop highly placed agents inside the Islamic Republic. After this betrayal, Israeli intelligence tipped off the CIA that Iran had likely identified some of its assets, said the same former official.

The losses could have stopped there. But U.S. officials believe Iranian intelligence was then able to compromise the covert communications system. At the CIA, there was “shock and awe” about the simplicity of the technique the Iranians used to successfully compromise the system, said one former official.

In fact, the Iranians used Google to identify the website the CIA was were using to communicate with agents. Because Google is continuously scraping the internet for information about all the world’s websites, it can function as a tremendous investigative tool — even for counter-espionage purposes. And Google’s search functions allow users to employ advanced operators — like “AND,” “OR,” and other, much more sophisticated ones — that weed out and isolate websites and online data with extreme specificity.

According to the former intelligence official, once the Iranian double agent showed Iranian intelligence the website used to communicate with his or her CIA handlers, they began to scour the internet for websites with similar digital signifiers or components — eventually hitting on the right string of advanced search terms to locate other secret CIA websites. From there, Iranian intelligence tracked who was visiting these sites, and from where, and began to unravel the wider CIA network.

U.S. intelligence officials were well aware of Iran’s formidable cyber-espionage capabilities. But they were flabbergasted that Iran managed to extirpate an entire CIA spy network using a technique that one official described as rudimentary — something found in basic how-to books.

But the events in Iran were not self-contained; they coincided roughly with a similar debacle in China in 2011 and 2012, where authorities rounded up and executed around 30 agents working for the U.S. (the New York Times first reported the extirpation of the CIA’s China sources in May 2017). Some U.S. intelligence officials also believe that former Beijing-based CIA officer Jerry Lee, who was charged with spying on behalf of the Chinese government in May 2018, was partially responsible for the destruction of the CIA’s China-based source network. But Lee’s betrayal does not explain the extent of the damage, or the rapidity with which Chinese intelligence was able to identify destroy the network, said former officials.

U.S. officials believe that Chinese intelligence obtained physical access to the transitional, or temporary, secret communications system used by the CIA to correspond with new, unvetted sources — and broke through the firewall separating it from the main covert communications system, compromising the CIA’s entire asset network in that country, Foreign Policy reported earlier this year.

It’s not clear whether China and Iran cooperated, but the former officials said the communications systems used in both countries were similar. The two governments may have broken the system independently. But Iranian, Chinese and Russian officials were engaged in senior-level communications on cyber issues around this time, recalled one former senior intelligence official —interactions that were “very suspicious in hindsight.”

The CIA declined to comment. The Iranian Mission to the UN did not respond to requests for comment.

Some U.S. intel officials took the interactions as an indicator of enhanced open coordination among these countries, and even a nascent alliance against the U.S. and its Five Eyes intelligence partners, this person said. (U.S. officials also believe Chinese officials subsequently shared information about its penetration of the secret CIA system with their Russian counterparts.)

“Our adversaries dramatically upped their game” in their offensive hacking operations, including those geared toward cracking the U.S. covert communications platforms, during this period, said another former senior intelligence official. This almost certainly included information sharing between these countries on U.S. covert communications techniques, said multiple former officials — the makings of a real-life “axis of evil.”

There were discrete signs of potential cooperation. Around the time of the purges of CIA informants in Iran and China, senior counter-espionage officials from China’s Ministry of State Security visited their counterparts in Tehran, said four former U.S. officials.

Some officials believe the two countries engaged in a trade — perhaps with Iran providing China with the technical information needed to pinpoint signs of online activity on the communications system, in exchange for military hardware, speculated one former official. “That’s the spy service way,” said another former official.

With dawning horror, U.S. officials realized that once Iranian or Chinese intelligence officials were able to pinpoint CIA assets within their own borders, they were almost certainly capable of zeroing in on similar digital signatures in other countries, former officials said.

Former officials said the fallout from the compromises was likely global in scope — potentially endangering all CIA sources that used some version of this internet-based system worldwide.

“You establish these networks that are obviously critical to our ability to really understand what our adversaries are up to — there’s a pride in that — and when something that valuable starts to fall apart, the concern is, ‘Are we developing a house of cards?’” said one former senior official. “A lot of bells went off” during this time, said this person, because “whatever methods and procedures we were using were in jeopardy because of what the Chinese and Iranians had determined. You find that you’re blind.”

These multiple, overlapping failures of the communication system created systemic problems for the agency. “There was a cascade of effects that flowed outward” from the initial breaches, said another former intelligence official. “Part of the problem was trying to figure out the second and third order of effects.”

Repairing this breach had to be approached with extraordinary delicacy because attempted fixes can expose sources. Iran or China could then target and flip those CIA sources, or use information about them as bargaining chips with other intelligence services, former officials said. Around this time, Iranian intelligence officials also began aggressively pitching CIA officers to become double agents —meaning that they had somehow identified agency personnel, potentially through this wider compromise, said one former intel official.

One country where the impact appears to have been contained is Russia. CIA officials who focus on Russia knew about the China ordeal and quickly adjusted their communications with sources accordingly, some of the former officials said. Aspects of the CIA’s Russia operations have historically been walled off from the rest of the agency, which likely helped minimize the damage. But the issue was so acute in the Middle East that the CIA was forced to suspend its use of internet-based covert communications systems there several times.

The problems were exacerbated by increasingly aggressive Iranian cyber-espionage. The Iranians “were very good tactically,” one former official said, and were adept at “breaking into low-level communications in the field, such as between Iraqi forces and their American counterparts.”

Starting around 2013, Iranian cyber experts seemed to be tracking CIA agents outside their own borders, including in Yemen, where Iran eventually compromised the internet-based covert communications system there, said one of the former officials. During this time, emergency meetings had to be scheduled at the agency because the Iranians had “hacked into systems outright that had nothing to do with them,” said this person — that is, those beyond Iran itself.

“Iran was aggressively going out to hunt systems down,” the former official said. “They weren’t just protecting themselves anymore.”

*****

As Iran was making fast inroads into the CIA’s covert communications system, back in Washington an internal complaint by a government contractor warning officials about precisely what was happening was winding its way through a Kafka-esque appeals system.

In 2008 — well before the Iranians had arrested any agents — a defense contractor named John Reidy, whose job it was to identify, contact and manage human sources for the CIA in Iran, had already sounded an alarm about a “massive intelligence failure” having to do with “communications” with sources. According to Reidy’s publicly available but heavily redacted whistleblower disclosure, by 2010 he said he was told that the “nightmare scenario” he had warned about regarding the secret communications platform had, in fact, occurred.

Reidy refused to discuss his case with Yahoo News. But two former government officials directly familiar with his disclosure and the investigation into the compromises in China and Iran tell Yahoo News that Reidy had identified the weaknesses — and early compromise — that eventually befell the entire the covert communications platform.

Reidy’s case was complicated. After he blew the whistle, he was moved off of his subcontract with SAIC, a Virginia company that works on government information technology products and support. According to the public disclosure, he contacted the CIA inspector general and congressional investigators about his employment status but was met with resistance, partially because whistleblower protections are complicated for federal contractors, and he remained employed.

Meanwhile, throughout 2010 and 2011, the compromise continued to spread, and Reidy provided details to investigators. But by November 2011, Reidy was fired because of what his superiors said were conflicts of interest, as Reidy maintained his own side business. Reidy believed the real reason was retaliation.

In his 2014 appeal to the intelligence community inspector general, first published by McClatchy News, Reidy describes the first signs of compromise in stunning detail — though it was unclear at the time, because of what was redacted, what issue he was addressing. “As our efforts increased, we started to notice anomalies in our operations … sources abruptly and without reason ceasing all communications with us,” he wrote.

Something, he realized, was deeply wrong with the agency’s human sources network. The “U.S. communications infrastructure was under siege,” he wrote. Reidy warned that the problem wasn’t limited to a single country — it extended to everywhere the CIA operates. Close to 70 percent of operations at the time were potentially compromised, he noted. In other words, an entire class of CIA agents — those using some iteration of the online system — was in danger. “CIA is aware of this,” he wrote. “The design and maintenance of the system is flawed.”

Reidy’s complaint wasn’t fully addressed for many years. But when the wide-scale arrest of sources in Iran happened, the CIA eventually launched an investigation. The deaths in China sent investigators into overdrive. Teams from the CIA, the FBI and the House Permanent Select Committee on Intelligence scrambled to try to figure out what had happened — and how to stem the damage.

“Can you imagine how different this whole story would’ve turned out if the CIA [inspector general] had acted on Reidy’s warnings instead of going after him?” said Kel McClanahan, Reidy’s attorney. “Can you imagine how different this whole story would’ve turned out if the congressional oversight committees had done oversight instead of taking CIA’s word that he was just a troublemaker?”

Irvin McCullough, a national security analyst with the Government Accountability Project, a nonprofit that works with whistleblowers, put the issue in even starker terms. “This is one of the most catastrophic intelligence failures since September 11th,” he said. “And the CIA punished the person who brought the problem to light.”

The roll-up of the CIA’s networks reignited debates within the U.S. intelligence community about the merits of high-tech versus low-tech methods of communicating with sources. Within some corners of the intelligence world, “there was widely held belief that technology was the solution to all communications problems,” according to one of the former officials. Proponents of older methods — such as chalk marks, burst communications, brush passes and one-time pads — were seen as “troglodytes,” said this official.

The failure of the communication system was discussed extensively in closed-door hearings at the House and Senate Intelligence committees, according to several former officials. “Some of the senators and congressman went nuts about this, and they should have,” one of them said.

A spokesperson for the Senate Intelligence Committee declined to comment. The House Intelligence Committee did not respond to requests for comments.

One of the central concerns among those familiar with the scope of the breakdown is the institutions responsible for it were never held accountable. Doing a comprehensive investigation isn’t easy, “but you have an absolute obligation to do that, because if you don’t, all you’re doing is rolling the dice with future lives,” said one former senior official.

Even several years after the breach, the concern within the intelligence community is accountability.

“When we continuously allow things like this to happen, and Congress doesn’t do anything, and the institutions don’t do anything, you’re going to have worse issues,” said another former official.

“People will say, ‘I went to the inspector general and it didn’t work; I went elsewhere and it didn’t work.’ People will see it as a game. It will lead to corruption, and it will lead to espionage. When people see that the system is corrupt, it affects everything.”

Zach Dorfman & Jenna McLaughlin


What is ‘All Saints’ Day’

Image result for all souls day

All Saints Day, also known as All Hallows’ Day, or Hallowmas, is a Christian celebration in honor of all the saints from Christian history. In Western Christianity, it is observed on November 1st by the Roman Catholic Church, the Methodist Church, the Lutheran Church, and other Protestant denominations. The Eastern Orthodox Church and associated Eastern Catholic churches observe All Saints Day on the first Sunday following Pentecost.

The Christian festival of All Saints Day comes from a conviction that there is a spiritual connection between those in Heaven and on Earth. In Catholic tradition, the holiday honors all those who have passed on to the Kingdom of Heaven. It is a national holiday in numerous historically Catholic countries. In Methodist tradition, All Saints Day relates to giving God earnest gratitude for the lives and deaths of his saints, remembering those who were well-known and not. Additionally, individuals throughout Christian history are celebrated, such as Peter the Apostle and Charles Wesley, as well as people who have personally guided one to faith in Jesus, such as one’s relative or friend.

In addition to weekly worship gatherings, “All Saints Day” annually reminds us of our connectedness as Christians. It’s commemorated every November 1st. Perhaps, you were taught to think of saints as statues in a church building. But the Bible teaches something completely different. Who is a saint? You are. That is if you’re a follower of Jesus. God calls a “saint” anyone who trusts in Christ alone for salvation. See (Acts 9;13; 26:10, Romans 8:27, 1Corinthians 1:2,)

Sainthood isn’t given by a group of religious leaders. It’s granted by God Himself to any common, salt-of-the-earth person who simply trusts Christ (1Corinthians 1:2). Words matter. And sowing confusion about good, biblical words like “saint” is not from God. The gospel message is that God the Son came to earth, lived a perfectly obedient life, died on the cross to pay for our sins (Romans 5:1), and rose again proving His atoning work was complete (Romans 4:22-25). Saints are those who give up the anti-faith alternative of trying to please God by their good deeds and, instead, trust Christ alone. Scripture says that the person of faith actually becomes the very righteousness of God (2 Cor. 5:21)!

Through the channel of human faith (the means of salvation) we become united to Christ (the source of salvation) and we are saved from God’s judgment as well as from the futile way of life that we naturally follow (1Peter 3:18). In other words, we are granted sainthood! Skeptical? Think about this: if God calls the worldly, sinning believers in Corinth “saints”—and He does in 1Corinthians 1:2—couldn’t He call you a saint as well? Friend, anyone who trusts in Christ alone for salvation is a saint in God’s sight.


Relation to Halloween

Image result for halloween party

Dressed as Dracula or as devils, neighborhood children were happily “trick or treating” last night in the United States and some other countries. But would it surprise you to know that “Halloween” (by that name) started out as a holy Christian celebration?

Hallow, in Old English, means “holy” or “sacred.” Therefore, “Hallows’ Eve,” or “Halloween” simply means “the evening of holy persons” and refers to the evening before All Saints Day, which is this day, November 1 on both Anglican and Catholic calendars. Halloween is a mixture of Celtic religious ideas and Christian martyrology.

Pictured below is a traditional Hallows’ Eve Ceremony.

All Saint's Day Ceremony


Meaning and Origin of All Saints Day

In the early years when the Roman Empire persecuted Christians, so many martyrs died for their faith, that the Church set aside special days to honor them. For example, in 607 Emperor Phocas presented to the pope the beautiful Roman Pantheon temple. The pope removed the statues of Jupiter and the pagan gods and consecrated the Pantheon to “all saints” who had died from Roman persecution in the first three hundred years after Christ. Many bones were brought from other graves and placed in the rededicated Pantheon church. Since there were too many martyrs for each to be given a day, they were lumped together into one day. In the next century, All Saints Day was changed by Pope Gregory III to today’s date–November l. People prepared for their celebration with a night of vigil on Hallows’ Eve — Halloween (possibly because of the strong holdover influence of the Celtic Samhain festival which many Christians in Ireland, Britain Scotland and Wales had continued to observe).

In the 10th century, Abbot Odela of the Cluny monastery added the next day–November 2nd–as “All Souls” Day” to honor not just the martyrs, but all Christians who had died. People prayed for the dead, but many unchristian superstitions continued. People in Christian lands offered food to the dead–as it had been in pagan times. The superstitious also believed that on these two days, souls in purgatory would take the form of witches, toads, or demons and haunt persons who had wronged them during their lifetime. As happens so often in Church history, sacred Christian festivals can absorb so many pagan customs that they lose their significance as Christian holidays.

But think of it positively. Who are your favorite heroes in Christian History? Can you think of any whose example has inspired you? Why not use All Saints Day to think of and give thanks for as many Christians from the past as you can remember, whether they are famous or not, especially if their lives and teaching contributed something to yours.

Pictured below: The interior of All Saints Margaret Street Church in London, England

The interior of All Saints Margaret Street Church in London, England.

Photo by DAVID ILIFF. License: CC-BY-SA 3.0


How to Celebrate All Saints Day

So, how should we think of All Saints Day? Well, the 1662 Book of Common Prayer says that the holiday stands for “the unity of Christians of all ages, countries, and races in Christ, and the perfection of that unity in heaven.” It dates the holiday back to about A.D. 610 when the Pantheon in Rome, turned into a Christian Church, was dedicated to all saints. Sounds like the prayer book has the right idea.

The Bible doesn’t tell us to pray to the saints (Matt. 6:6) or through the saints (1 Tim. 2:5). Instead, we think of our connectedness to past saints and find inspiration in their stories of God’s faithfulness. Hebrews 11 gives many examples of the great cloud of witnesses whose lives tell of God’s unfailing love and grace. These saints speak from the past and are whispering at this moment…

“God is faithful.”

“The Lord is good. Trust Him.”

“His grace was sufficient for me in my trials and is sufficient for you today.”

There’s a hymn that’s traditionally sung around this holiday called “For All the Saints.” It encourages believers to look back through the years of Christian history and think of the millions now enjoying rest and salvation in the presence of God. It’s also meant to provide encouragement to believers here and now to press on, looking forward to the glorious day…

“…when the strife is fierce, the warfare long,
Steals on the ear the distant triumph song,
And hearts are brave again, and arms are strong.
Alleluia, Alleluia!”

 


 

Blog Created By : Christianity.com