Solution Group @ Zoe Zuniga
The Threat of Rogue Gene Editing and Its Implications on Nature
By Jeffrey Smith
Are the risks really as dangerous as we indicate?
Over the past two decades, we have collected substantial evidence suggesting that GMO foods contribute to rising disease rates. The existential threat to nature, however, goes beyond the health impacts of a single generation. GMOs of all types and all kingdoms, food and non-food, carry unprecedented threats to the future of our planet’s ecosystem. Here is a sampling of a few historic cases that demonstrate widespread risks.
- Back in the 1980s, GMO bacteria were designed to replace their natural counterpart, which causes frost damage on strawberries. Fortunately, commercialization was prevented at the last minute. We now know that the natural bacteria also creates clouds, rain and snow. If the impotent GMO version had been widely released and enjoyed a survival advantage over the natural species, it may have impacted weather patterns.
- In the 1990s, scientists obtained government approval to distribute their alcohol-creating GMO bacteria. Farmers were supposed to mix the organisms in big barrels with crop waste and use the resulting alcohol to run their tractors. The sludge at the bottom of the barrel was to be spread on the fields as fertilizer. Two weeks before an experimental release, a graduate student happened to discover that the fertilizer turned roots and seedlings into alcohol, rendering soil infertile.
- Canadian scientists created GMO salmon equipped with extra growth hormones. When these ravenous fast-growing fish were deprived of adequate food, they became violent and cannibalistic, causing population crashes or extinctions in their tanks.
- GMO medaka fish also grew faster, conferring a mating advantage over natural medaka. The offspring from the GMO fish, however, had a 70% survival rate. Purdue scientists used a computer model to see what would happen if 60 GMO fish were added to a natural population of 60,000. They were shocked to discover that all the fish were wiped out in just 40 generations.
- The UK company Oxitech promised that their GMO mosquito would never persist in the environment. Its sterile offspring would reduce the natural mosquito population and the GMO versions would all die off. Now, after they released hundreds of millions of the insects in four countries, we learn that their trait misfired. The natural gene pool of mosquitoes has become permanently altered, with unknown consequences.
In these and countless other examples, promoters of GMOs willingly risked permanent contamination of nature’s gene pool based on their belief that the technology was predictable and safe. They were wrong. The same misplaced confidence accompanied the introduction of gene editing. Their claims of predictability and safety were soon contradicted by numerous studies confirming the opposite.
Not only can the editing process create hundreds or thousands of mutations, rogue pieces of DNA from the lab environment can be accidentally inserted into the genome. That explains the following near catastrophes.
- The makers of gene edited hornless cows claimed that there were no side effects. They asserted that it was so successful, gene edited animals from then on should not require regulation. Two years later, however, other scientists discovered that the cows’ cells also contained DNA from bacteria, including antibiotic resistant genes. When the surprise finding was announced, the GMO herd that was being bred for sale was killed off. If the bacterial genes had not been discovered, those cows might have spread deadly super diseases.
- The process of gene editing often takes place in a medium of cow or goat serum. When gene edited mice were created, random cow and goat DNA floating in the serum were integrated into the rodents’ genome. The inserted DNA included retroviruses, demonstrating that diseases can be accidentally transferred between species.
It is not important to prove that each of the particular cases listed above would definitely lead to altered weather patterns, vast sterile landscapes, destruction of fish species, dangerous new insects, or the spread of disease. Rather they serve to illustrate the principle of how tiny changes in the DNA of a single organism can have devastating and long-lasting consequences.
Now do the math. Multiply the probability of the combined risks by the number of times these experiments will be conducted. Do we multiply by ten thousand, a million, ten million? Do-it-yourself gene editing kits are sold today as holiday gifts for $159. As their costs drop and their power grows, will we see kits distributed to every child in school?
As the number of experiments grow, the likelihood of a catastrophe approaches certainty. But the ability to correct the problem—or even track its source—is far from certain.
Let us take steps now to prevent a disaster rather than learn our lesson trying to clean one up.
Taking the lead
The Institute for Responsible Technology (IRT) pioneered consumer education about the health dangers of GMOs and Roundup. The purpose was to inspire individuals to eat healthier, and thereby collectively exert market pressure to motivate food companies to replace GMO ingredients.
The behavior-change messaging worked beautifully. In the US alone, 46% of surveyed Americans now say they are seeking non-GMO diets. The tipping point in the marketplace has been started, and major food companies are rushing to become “Non-GMO.”
Consumer food choices alone, however, will not be sufficient to stop the threat of gene-edited bacteria, fungus, algae, insects, trees, grass, etc.
A Portfolio of Solutions
There are many areas of society that can be used to address this issue.
- International treaties, such as the Convention on Biological Diversity, can establish restrictions on international trade of GMOs.
- Assignment of strict liability for creators of gene edited GMOs can certainly slow down the introduction. Liability can be created through legislation, the court systems, or even the World Trade Organization.
- Sensible laws can limit exposure.
- Scientific organizations can sound the alarm and call for greater caution.
- Institutional Review Boards, which approve studies in universities, can take a significant role in requiring containment of new organisms.
- Academic policies can further restrict certain high-risk experiments.
A key success factor is to engage in mass education via media, social media, films, TV specials, curriculum in schools, and political platforms.
Global Coalition Building
The threat of the replacement of nature is so all-encompassing, many different types of demographics can be engaged, including parents, religions, indigenous communities, nature enthusiasts, gardeners, birdwatchers, animal rights groups, scientists, companies in tourism, and of course the youth.
We can tap into the already vibrant and active infrastructure of activists organizations focusing on climate change, chemical pollution, biodiversity, regeneration, saving the oceans, etc. Ironically, our movement building can take advantage of the fact that more people are focusing on protecting our planet than at any time in history. They are hearing about the devastating collapse of biodiversity — the sixth great extinction, the insect and bird die-off, and how ecosystems are under unprecedented assault. People are realizing that new technologies can have devastating consequences.
If we produce powerful assets with the right messaging, we can motivate existing groups to aid our urgent education efforts through distribution. We won’t have to build a new global movement from scratch.
IRT is pulling together a dream team to pull all this together, sound the alarm, and implement solutions.
Message from Thrive:
We must act now, before it’s too late. Thrive supports the work Jeffrey and his team are doing and hopes you will help spread the message, if you feel called to do so. To get involved in the efforts being made, please use the contacts below.
Donations can be made at www.ResponsibleTechnology.org
The Existential Threat from New GMOs
By Jeffrey Smith
The allure of gene editing is intoxicating. Biohackers set up labs for as little as $2,000, while major companies install buildings full of robots driven by artificial intelligence for massive output. The ability to cheaply customize the genomes of any species promises wealth, health, and the unprecedented opportunity to reshape the natural world to our whims and wishes.
But what happens when countless gene altered species flood our ecosystem?
What we call nature today, the product of billions of years of evolution, would be forever replaced with laboratory creations—forged from a technology whose number one most common outcome is surprise side effects. Tens of thousands of well-intentioned DNA fixes—accompanied by the collateral damage that invariably results—would irreversibly corrupt our gene pool.
We all know how one single invasive species can create chaos in a new environment. What chaos will we unleash when delicately balanced ecosystems are substituted with untested, gene altered varieties?
We have arrived at an inevitable moment in human civilization where we can easily reorder the codes of life and redirect the streams of evolution for all time. One would hope that such unprecedented power would be balanced by a society equipped with far-sighted vision, advanced moral and ethical values, rock solid safety mechanisms, and a profound understanding of how altered DNA functions.
We have none of these.
Instead, we have companies like Monsanto, willing to overlook or cover-up dangers. Industries obsessed with short-term profit. And governments busy eliminating all safety requirements.
In the early days of genetic engineering, thoughtful scientists were deeply concerned about the unpredictable and irreversible impacts. They agreed among themselves to keep it in the lab. If a GMO could reproduce, it was not to be released into the environment.
This prudent measure was soon overturned by profit-seekers who overstated the safety and denied the risks. That same false narrative continues to this day.
Many activists working on climate change believe that the threat to our planet from genetic engineering is even greater. Although debating the point is fruitless, the implications are clear. We are facing a new existential threat that must be addressed.
To learn more about the background of this issue, click this link and please considering sharing this information with your network.
Please join us to sound the alarm and to create assurances that this powerful new technology is handled responsibly. All living beings and all future generations are in the balance.
Visit www.ProtectNatureNow.com for a 3-minute video about this issue.
Message from Thrive:
We must act now, before it’s too late. Thrive supports the work Jeffrey and his team are doing and hopes you will help spread the message, if you feel called to do so. To get involved in the efforts being made, please use the contacts below.
Donations can be made at www.ResponsibleTechnology.org
Rogue Gene Editing
Solution Group @ LISA HILDWINE
(All links are paid affiliate links.)
One of the hidden parts of our work is the danger involved. Kimberly and I have gratefully avoided any serious problems, despite the fact that we report on extremely disruptive (aka “corrective”) technologies and issues for which many have been persecuted.
Why have we been safe so far? I am sure there are many reasons, but for the first time we are publicly revealing one of the major ones — and that is our world-class security team. William J. (“Billy”) Taylor, Gail Johnson and the rest of the team at the WJT Agency have quietly and skillfully kept us out of trouble for two decades.
This same team provided security in such iconic and successful cases as Iran/Contra, Karen Silkwood, Wounded Knee, and a successful supreme court case against the Ku Klux Klan, with the renowned civil rights attorney Danny Sheehan. As a team, they never lost a case…or a client.
Taylor’s team are not Marvel superheroes or mutant avengers. They are flesh and blood human beings risking their lives to solve real human problems.
On a recent trip to some energy and healing labs that had been under threat, I told Billy I felt a little guilty about being one of the few to get to hear his stories.
“More will have the chance soon,” he said, “I’m writing some novels.”
I was stunned. This is the ultimately private person who doesn’t use three words if two will suffice.
In addition to helping Thrive and our at-risk inventors and holistic doctors, Billy’s team has been rescuing Lakota children who have been kidnapped and sold into illegal drug testing and sex trafficking rings. “It’s one of the most satisfying things we’ve ever done,” Billy told me, “To rescue stolen and abused children and return them to their parents’ arms. There is so much about this that you can’t just say in our work, so I decided a novel is the suitable way to share these stories with the world.”
Stolen Angels is the first of those accounts.
Names have been changed and timelines compressed, but as a long-time fan of good thrillers, I can assure you these novels give whole new meaning to “based on a true story!”
Enjoy an elucidating read while rewarding one of the true heroes of our time.
— Foster Gamble
Solution Group @ Nat Ford
Solution Group @ Jack Sprat
Solution Group @ keith mercer
Effective as of February 10, 2019
- Explain the way we use information that you share with us in order give you a great experience with our Website;
- Ensure that you understand what information we collect with your permission, what we do with it and with whom we share it; and
- Explain your rights under applicable law.
2. Information we collect
The information we collect includes personal identifiers, commercial information, electronic network activity and geolocation data, and can be divided into the following broad categories:
- Technical Data includes internet protocol (IP) address, your login data, device type, device version, browser type and version, browser plug-ins types, time zone setting and location, traffic data, search criteria, weblogs and other communications data, operating system and platform and other technology on the devices you use to access the Website.
- Usage Data includes information about how you use our Website or Service, such as the particular pages you interact with, how often you visit, how long you’re on the Website, surveys, the service you’re looking at and the emails you interact with.
- Verification Data includes proof of identity and proof of address as further detailed in our Subject Access Request Form.
- Financial Data includes details about your payment history and services or products you have purchased from us.
- Identity Data includes full name, address, telephone number, email address, username, password.
- Image Data includes photographs and videos of you that you provide.
More specifically, we may collect and store the following information relating to you:
2.1 Anonymous data
2.2 Direct Interactions
We collect information from you when you voluntarily submit information directly to us or via our Website. For members, this refers to personal data you provide when, for example, you create or join a group, complete a profile, or by corresponding with us via phone, email or live chat. This personal information may include name, age, address, phone and email, as necessary to set up your account. If you connect to the Website using credentials from a third-party application (e.g., Facebook), you authorize us to collect your authentication information, such as your username and encrypted access credentials. We may also collect other information available on or through your third-party application account, including, for example, your name, profile picture, country, hometown, email address, date of birth, gender, friends’ names and profile pictures, and networks.
In addition to the information we may collect upon your initial registration, we may ask you for personal information at other times. We will not share that information in a manner that identifies you as an individual with any other entity unless we have your permission.
2.3 Information submitted by you for inclusion on the Website
2.4 Tracking technologies
2.5 Automated technologies or interactions
As you interact with our Website, we may automatically collect technical and usage data about your device, browsing actions and patterns. For example, we collect information which may include your IP address, browser type, your location, language preferences, device information and access times. While an IP address does not identify an individual by name, it may, with the cooperation of the ISP, be used to locate and identify an individual. Your IP address can reveal what geographic area you are connecting from, or which ISP you are using. Finally, other websites you visit have IP addresses, and we may collect the IP addresses of those websites and their pages. We also collect IP addresses for system administration and to report aggregate information to any sponsors. We may also receive information from our web logs, which automatically record anything a web server sees, which may include email addresses you enter into a form or pages viewed by a user at a particular IP address. We collect this personal data by using cookies, pixel tags and other similar tracking technologies. The sole purpose of passively collecting your information is to improve your experience when using our Website.
2.6 Promotions & surveys
2.7 Information received from our service providers and partners
We may also receive information about you from our service providers and partners, which we use to personalize our Service, to measure ad quality and responses to ads, to display ads that are more likely to be relevant to you, and to offer you opportunities to purchase products or services that we believe may be of interest to you.
3. How we use the information we collect
We have set out below, in a table format, a description of all the ways we process your personal data, and the legal basis we rely on to do so.
|Purpose/Activity||Type of Data||Legal Basis|
|To allow you to visit the Website||Technical Data
|To allow you to create a Solutions Group||Identity Data
|To manage our relationship with you. For example general enquiries such as how the Website works, complaints and payment queries||Any data you choose to share with us or request us to view||Consent|
|To administer and protect the Website (including troubleshooting, fraud prevention, spam prevention, security incident prevention and correction, data analysis, testing, system maintenance, support, reporting and hosting of data), operate the Website (including notifying you of any changes), optimize your user experience, and send you service and support messages such as updates, patches and security alerts||Financial Data
|To send you promotional messages, marketing, advertising and other such information we think may be of interest to you, either directly or through one of our partners; you may opt out from receiving certain messages, as described in Section 7||Financial Data
|To enable you to partake in a prize draw, competition, referral scheme, rewards program, promotional activities, events, complete a survey or invite you to participate in Website testing||Financial Data
|To analyze your use of the Website and deliver relevant website content and third-party advertisements, for example by providing customized, personalized, or localized content, recommendations, features, and advertising.||Usage Data||Consent|
|For purposes of legitimate interests|
|To maintain and retain records in connection with actual and potential legal claims and regulatory investigations; and for governance & compliance purposes||Financial Data
|Necessary for the compliance with a legal obligation to which we are subject|
We will only use your personal data for the purposes for which we collected it, unless we reasonably consider that we need to use it for another reason, and that reason is compatible with the original purpose. If you wish to get an explanation as to how the processing for the new purpose is compatible with the original purpose, please email us at firstname.lastname@example.org.
Please note that we may process your personal data without your knowledge or consent, in compliance with the above rules, where this is required or permitted by law.
4. How we share the information we collect
This section describes how the information collected or generated through your use of the Website may be shared by us with third parties. The information we may disclose for a business purpose includes personal identifiers, commercial information, electronic network activity and geolocation data. We have never sold our users’ personal information and in no event will we ever sell your personal information.
4.1 Marketing and advertising
We may send you promotional communications about our Website or our advertising partners, including relevant advertising for third-party products and services that may be of interest to you. We may also share aggregate user information in a non-personally identifiable manner with advertisers and other third parties in order to present to users more targeted advertising, products and services. We do not provide any personally identifiable information to third-party advertising companies.
4.2 Service providers
To provide you with the best experience on our Website, we may use third parties who automatically process your Usage Data on our behalf. Where possible, we will make sure this data is anonymized.
For your information, click here to view some examples of how third parties process your personal data.
4.3 Promotions and surveys
When one or more of our business partners co-sponsor a service, promotion, contest/sweepstakes, or survey, we may share some or all of the information collected in connection with such service, promotion, contest/sweepstakes, or survey with the co-sponsor(s). If we intend to share such information, you will be notified prior to the collection of that information. If you do not want your information to be shared, you will be able to choose not to allow the transfer by not using or signing up for that particular service, promotion, contest/sweepstakes, or survey.
5. Cookies and other tracking technologies
A cookie is a small text file that is placed on your computer, mobile phone, or other device when you visit a website. The cookie will help website providers to recognize your device the next time you visit their website. There are other similar technologies such as pixel tags (transparent graphic images placed on a web page or in an email, which indicate that a page or email has been viewed), web bugs (similar to pixel tags), and web storage, which are used in desktop software or mobile devices.
There are also technologies such as mobile device identifiers and SDK integrations to help companies recognize your device when you return to an app or otherwise use a service.
Our policy regarding cookies can be found here.
6. Information collected by third parties
Please read these third parties’ privacy policies to find out how they collect and process your personal information.
7. Email Opt-out
Users who no longer wish to receive email updates or other notifications may opt out of receiving these communications by following the instructions contained in the applicable email. Please know that such a decision will not stop advertising or content that is generated prior to the time when we can accomplish the removal of your information.
8. Credit Card Processing
Credit card transactions are handled by a third-party processor that receives credit card numbers and other personally identifying information only to verify credit card accounts and process transactions.
We have put in place appropriate security measures to prevent your personal data from being accidentally lost, altered or disclosed, used or accessed in an unauthorized way. In addition, we limit access to your personal data to those employees, agents, contractors and other third parties who have a business need to know it. They will only process your personal data on our instructions and they are subject to a duty of confidentiality. However, the transmission of data via the internet is not completely secure and we cannot guarantee that unauthorized parties will not be able to defeat those measures: unauthorized entry or use, hardware or software failure, and other factors may compromise the security of our user information at any time.
We have put in place procedures to deal with any suspected personal data breach and will notify you and any applicable regulator of a breach where we are legally required to do so.
10. Children and COPPA compliance
We believe that parents should supervise their children’s online activities and consider using parental control tools available from online services and software manufacturers that help provide a child-friendly online environment. These tools can also prevent children from otherwise disclosing online their name, address and other personal information without parental permission.
11. Business transitions
12. California user consumer rights
California residents may choose to opt out of our disclosure of personal information about them to third parties for direct marketing purposes. As detailed above, our policy is not to disclose personal information collected online to a third party for direct marketing purposes without your approval. If you choose to opt-out at any time after granting approval, email email@example.com.
If you are a California resident, you also have the right to:
- request that we disclose to you the categories of personal information we collected about you, including the categories we disclosed to a third party for a business purpose; the categories of sources from which the personal information is collected; the business or commercial purpose for collecting that information; the categories of third parties with whom we share that information; the actual personal information we collected from you. This enables you to receive a copy of the personal data we hold about you.
- request that we delete any personal information we have collected from you. Note, however, that we may not always be able to comply with your request of erasure for specific legal reasons and our need to keep appropriate archives for our business operations.
- not be discriminated against for exercising any of the rights granted to you under the California Consumer Privacy Act of 2018.
If you wish to exercise any of the rights set out above, please email us at firstname.lastname@example.org. You may also call this toll-free number: 844-445-6877. We will respond to you within 45 days of receipt of your request. We may need to request specific information from you to help us confirm your identity. This is a security measure to ensure that your personal data is not disclosed to any person who does not have the right to receive it. We may also contact you to ask you for further information, in relation to your request, to speed up our response.
California residents may file grievances and complaints with California Department of Consumer Affairs, 400 R Street, STE1080, Sacramento, CA 95814; or by phone at 916-445-1254 or 800-952-5210; or by email to email@example.com. We would, however, appreciate the chance to deal with your concerns before you approach the DCA, so please email us at firstname.lastname@example.org in the first instance.
13. Users located outside of the United States
14. EU users’ rights under the GDPR
If you are located in the European Union, or if the EU’s General Data Protection Regulation (“GDPR”) otherwise applies to your data as processed by us, you have the right to:
- request access to your personal data. This enables you to receive a copy of the personal data we hold about you and our full list of third parties who process your data, and to check that we are lawfully processing it.
- request confirmation as to whether or not your personal data is being processed.
- request the correction of your personal data that you consider to be inaccurate. This enables you to have any incomplete or inaccurate data we hold about you corrected. However, we may need to verify your identity and the accuracy of the new data you provide to us.
- request erasure of your personal data. This enables you to ask us to delete or remove personal data, for example: i) where there is no good reason for us continuing to process it; ii) where you have successfully exercised your right to object to processing (see below); iii) where we may have processed your information unlawfully; iv) where we are required to erase your personal data to comply with local law. Note, however, that we may not always be able to comply with your request of erasure for specific legal reasons and our need to keep appropriate archives for our business operations. These reasons will be notified to you at the time of your request. In addition, as explained in Section 2.3, certain information may always be publicly available to others and other information is made publicly available to others by default.
- object to processing of your personal data. This enables you to object to the processing of your personal data if you feel it impacts on your fundamental rights and freedoms. For example, this can be where we are processing your personal data for direct marketing purposes. In some cases, we may have compelling legitimate grounds to process your information which can override your right to object.
- request restriction of processing of your personal data. This gives you the option to ask us to suspend the processing of your personal data in the following scenarios: i) if you want us to establish the data’s accuracy; ii) where our use of the data is unlawful but you do not want us to erase it; iii) where you need us to hold the data, even if we no longer require it e.g. to establish or defend legal claims; or iv) you have objected to our use of your data but we need to verify whether we have overriding legitimate ground to use it.
- request transfer of your personal data. If you request us to do so, we will provide to you, or a third party of your choice, your personal data in a commonly used, machine-readable format. Note that this right only applies to automated information which you initially provided consent for us to use, or where we have used the information to perform a contract with you.
- withdraw consent to the processing of your data. If you request us to do so, we will no longer process your data. However, this will not affect the lawfulness of any processing carried out before you withdraw your consent. If you withdraw your consent, we may not be able to provide our Service for you. Also, we will advise you of this at the time you withdraw your consent.
- not have a decision made about you based solely on automated processing.
If you wish to exercise any of the rights set out above or request details about the specific legal basis we are relying on to process your personal data, please email us at email@example.com using the Subject Access Request Form.
We will respond to you within 30 days of receipt of your request. Occasionally it may take us longer than 30 days if your request is particularly complex or you have made a number of requests. In this case, we will notify you and keep you updated.
We may need to request specific information from you to help us confirm your identity and ensure your right to access your personal data (or to exercise your other legal rights). This is a security measure to ensure that your personal data is not disclosed to any person who does not have the right to receive it. We may also contact you to ask you for further information, in relation to your request, to speed up our response.
You will not have to pay a fee to access your personal data (or to exercise any of your other legal rights). However, we may charge a reasonable fee (or refuse to comply) if your request is clearly unfounded, repetitive or excessive.
You have the right to make a complaint at any time to the Information Commissioner’s Office (ICO), the UK supervisory authority for data protection issues (www.ico.org.uk). We would, however, appreciate the chance to deal with your concerns before you approach the ICO so please email us at firstname.lastname@example.org in the first instance.
15. Data retention
If you are located in the European Union, or if the GDPR otherwise applies to your data as processed by us, we will only retain your personal data for as long as necessary to fulfil the purposes for which we collected it, including for the purposes of satisfying any legal, accounting, or internal reporting requirements. To determine the appropriate retention period for personal data, we consider the amount, nature, and sensitivity of the personal data, the potential risk of harm from unauthorized use or disclosure of your personal data, the purposes for which we process your personal data and whether we can achieve those purposes through other means, and the applicable legal requirements.
In some circumstances we may anonymize your personal data (so that it can no longer be associated with you) for compliance, governance, legal and/or regulatory purposes in which case we may use this information indefinitely without further notice to you.
16. Cooperation with law enforcement; fraud protection
We fully cooperate with law enforcement agencies in identifying those who use our Website or Service for illegal activities. We reserve the right to disclose information about users who we believe are in violation of applicable laws or regulations, or as required to respond to a subpoena, court orders or other legal process requiring such disclosure. We also reserve the right to report to law enforcement agencies any activities that we reasonably believe to be unlawful and to exchange information with other companies and organizations for fraud protection.
Please note that if you opt out of receiving notices from us, change notices will still govern your use of the Website, and you are responsible for reviewing such legal notices for changes, as posted on the Website.
18. Who we are
For the purposes of the GDPR, Thrive Movement International, Inc., located at PO Box 40, Capitola CA 95010 USA is the Data Controller and is responsible for your personal data. This means that we determine the purposes and ways of the processing of your personal data.
Solution Group @ Kevin Barrett
Solution Group @ Mike Brandridge
Solution Group @ Amanda Raymaker
Solution Group @ Alex Landry
Solution Group @ Matthew Koren
Watch PGS — Intuition is your Personal Guidance System
The THRIVE team is 8 months into the production of our sequel. It’s going very well and we are super busy. That’s why you haven’t heard more from us recently. I did want to take a moment to alert you to a fascinating and inspiring opportunity…
There’s a remarkable new film just out on intuition which I can highly recommend, called PGS - Intuition is your Personal Guidance System.
It was created by a friend of ours, and an enthusiastic THRIVE supporter, named Bill Bennett. Bill is a very accomplished Hollywood Director/Writer who recently ventured into independent exploratory truth media after a startling inner voice told him to slam on the brakes — saving his life from being wiped out by a tractor-trailer careening out from behind the corner of a building against a red light.
This film is the story of his global quest to figure out what that was that saved him. It features some of the world’s leading experts on intuition — and Kimberly and I also offer our reflections. It’s been having sellout screenings in cinemas across the US, and it’s now available online. If you have any interest in inner life, survival, thriving and the nature of our true self…we highly recommend you see this film.
Get some popcorn, set aside an evening with some dear ones and WATCH THIS FILM.