How to Protect Your Children on the Internet: A Road Map for Parents and Teachers

HOW TO PROTECT YOUR CHILDREN AND STUDENTS FROM THE INTERNET

How to Protect Your Children on the Internet: A Road Map for Parents and Teachers, by Gregory S. Smith; published by Westport: Praeger Publishers, 2007; review by Valdemar W. Setzer

1. Introduction

This paper is a review of the book by Gregory S. Smith How to Protect Your Children on the Internet: A Road Map for Parents and Teachers (Westport: Praeger Publishers, 2007). Upon request of a Brazilian press, I gave an opinion on the convenience of translating and editing it; my opinion was strongly favorable. The resulting Brazilian edition is titled Como Proteger seus Filhos da Internet: Um guia para pais e professores (Ribeirão Preto: Novo Conceito, 2009). As the subject was a pressing educational issue, I decided to write this review before the publication of the Brazilian edition, citing all the points I considered most important in the book, adding at the end my opinions and recommendations regarding this issue. My intention in publishing the original review on my Web site was to make available to the Portuguese speaking public some important information of the book, and encourage its study after its translation. Because of this, I covered the book in many details. This English version has been requested by Jacques Brodeur, who intended to publish it in his Web site Edupax.

Sections 2 to 3 of this review contain an extensive summary of the contents of the book. This summary is presented according to its structure, in a quite objective way, that is, without expressing my opinion. Obviously, the choice of topics presented in this review is subjective, as well as the choice of quotations from the book. The latter represent points of view and data considered relevant. Titles of chapters and sections of the book and the excerpts quoted from it were cited in quotation marks. Section 4 contains some general opinions about the book and additional arguments showing that the Internet should not be used by children and adolescents.

The book is organized into two parts, each with several chapters. Each chapter concludes with a section with recommendations to parents.

2. Part One: “Introduction to Technology and Risks on the Internet”

2.1 Chapter 1: “Welcome to the Internet.”

In this chapter the author describes what is the Internet and its history.

It is worth repeating some of the book’s data to form an idea of the size of the Internet: in 1995, the number of its users was 45 million; in 2000 420 million, in 2005 it surpassed 1 billion and a forecast for 2011 suggested more than 2 billion. According to the Wall Street Journal, as of may 2006 143 million Americans had Internet access from their homes, with 72% connected via broadband. For what concerns us the following data are relevant: 91% of all U.S. children between 3 and 12 years, in kindergartens and elementary schools use computers, and 59% have Internet access.

In the section of recommendations at the end of this chapter the author introduces one of the most important facets of the danger posed by the Internet: “Children between ages 8 and 17 are not growing in an environment similar to the childhood of their parents. Children of past generations couldn’t even fathom the kinds of hard-core pornography available today at the click of a mouse, nor predict the actions of today’s teens while they are online.” (p. 13.) This is followed by recommendations to parents to become quite familiar with the computer and Internet used at home, especially the use of passwords, accounts and restrictions that can be introduced; record all programs used at home with their versions, including email, Web browsers, instant messaging systems, anti-virus and anti-spam programs (spam is unwanted email distributed to a very large list of addresses, containing irrelevant material, advertisements, viruses etc.), and programs for filtering and monitoring accesses; talk to the children and ask them what they are doing on the network; review the sites they are accessing (he gives directions on how to see the history of accesses from browsers); doing searches on computer files; noting all devices that have Internet access, such as telephones, computers, TVs, etc.; ask the children how many email accounts they have, whether they use instant messaging systems etc. “Be prepared for some lies.” (p. 14.)

2.2 Chapter 2: “Back to School”

In this chapter the author defines usual Internet terminology in alphabetical order, such as what are administrator privileges of an operating system, blocking software, blog, modem, DSL, etc.

In the section of recommendations, he calls attention to the fact that Internet technologies and resources are constantly changing, so that parents and educators must constantly update themselves. A very important point is “By the time most children reach the age of 14 or 15 years of age, they have completely surpassed their parents’ knowledge of computers and the Internet. If left unchecked, these may get into some trouble, whether or not they mean it. Parents have an obligation and right to nurture, educate and protect their children from the risks associated with going online. Those that feel they are violating the children’s privacy by keeping ahead of them from a technological and monitoring perspective may actually be contributing to their risk.” (p. 43.) This emphasis on the obligation of parents for the proper upbringing of their children is present in the whole book.

Some highlights of the recommendations: when the children are young and in intermediate classes (5th to 8th grades), “place your Internet-enabled computers in a common space that is viewable. Don’t allow them to have unfettered access to the Internet, especially from their rooms. ” (p. 43.); learn how a firewall works and install one in each machine; make a survey of filters and programs to block access to certain sites — “No computer or device that is used by a child should be without some type of protection or monitoring. As a parent, you are responsible for what your child has access to or is doing online.” (p. 43); install individual accounts for the children on each computer — “When appropriate, restrict those accounts from installing new software or applications. […] No child needs to install software without a parent’s consent, unless of course there is a stealth software installed.” (p. 44.); find out what security measures your child’s school has taken to protect him while using computers in the classroom. “Don’t settle for generic answers. […] Engage your child’s teacher in a conversation on Internet safety. You may be surprised how little they know.” (p. 44.) Most children use an Internet search engine such as Google, Alta Vista, etc. for their school projects, “Where appropriate, help your child perform the search and approve each results page to ensure that they are not being exposed to inappropriate content.” (p. 44.) Maintain a dialogue with the children about the dangers of Internet use.

2.3 Chapter 3: “Risks Overview: Are Parents Making the Grade?”

This chapter describes and details the dangers that children and adolescents risk when using the Internet, and challenges parents to verify if they got the proper information about them.

Right at the beginning, the author puts himself firmly against “privacy advocates that pontificate about how wrong it is for parents to spy on their kids’ activities, some online, in an attempt to keep them safe […]. I have every right as a parent to do what it takes to keep them safe. My house is not a democracy and is far cry from a dictatorship […]. The Internet is definitely an interesting place, especially for parents trying to protect their children from adult content, harmful adult predators, and others intending to physically or emotionally harm children.” (p. 45.)

Attention: at this point I cease to literally quote from the book, unless for chapter and section titles. Due to a request from the author, who menaced of suing me because of plagiarism (in spite of my having put the citations in quotes and specifying the pages they were copied from). He allowed me to quote only 300 words, so from now on I replace his own phrases by my own. I maintain his page numbers, thus making it possible for the reader to locate his own phrases, which are certainly much better written and clear than my limited English permits. If someone would like to receive my original with all his quotations, please write me an e-mail; my address may be found at the top of my home page at http://www.ime.usp.br/~vwsetzer. I excuse myself for the poor result of trying to change his words and phrases. Let it be clear that I did not change this text because of Smith’s menace, but in respect to his wishes.

The author points to the fact that children and adolescents have four major sites of Internet access: the home, school, friends’ homes and Internet cafés or shared Wi-Fi sites (p. 46.). He enumerates the dangers of such use, such as having access to sexual content, being subjected to menaces — eventually from predators with sexual intent; viruses and spyware (software that transmits to others via the Internet personal information like usernames, account numbers, passwords etc.); obtaining personal data; playing games for money and addiction; buying or distributing drugs; viewing acts of violence and mutilation; racism and insensitiveness, fraud and identity theft; injuries inflicted to people. (p. 47.) More specifically, he lists five main dangers for children and youth between 8 and 17 years of age:

  1. Images of pornography and adult content;
  2. Viruses, and software that collect data;
  3. Predators in search of sex;
  4. Grown-ups desiring to kidnap, sexual abuse or kill children;
  1. Propagating crimes due to hate, promoting arms and incentive harm to other people (pp. 46-7).

The author presents the various ways in which these dangers can occur, such as chat rooms, cell phones/PDAs, instant messaging, browsing/searching, blogging and email (p. 47). Then he details the dangers of surfing the Internet or using search engines, and shows how content filters are insufficient. He acknowledges that the intent of search companies could be good, but youngsters may circumvent the parameters by altering them, eliminating cookies [local files with data associated with any site, in this case with filtering parameters] or changing to another browser and specifying their own look-up parameters. (p. 48.) The author found that the so-called “family filters” (a class of filters provided by browsers), were not effective in their majority (p. 48) and gives a table of search results. For example, using Google with an activated filter, a search using adult terms provided 146 million pages, and the same search without the filter provided 599 million.

Further dangers in using email, instant messaging and chat rooms are detailed. Then he details what are network predators, and says that the internet predator is in general middle-aged, male, married and has his own children. (p. 52.) In general terms (i.e. not just through the Internet), 25% of sexual abuse are committed by women. According to a citation, sexual predators are smart, have a good knowledge of the Web and how to disguise their files. (p. 52.) The author expresses an opinion based on his personal experiences, that teenagers have more on other people while using the Internet, and they don’t grasp the intentions of a predator, nor the dangers of giving information about themselves for everybody to see. This applies in particular to things they would not tell some friends. The author calls the attention to the fact that parents and teachers should control what children they care about do, in order to avoid their being subjected to risks they don’t understand or decide to ignore. (p. 54.) In the sequel he presents six pages of chat room conversation between a 38-year old predator and a young girl who had inserted photos and personal data on a social networking site (from now on, simply called “social networking”). The predator asked to change the conversation from a public forum to a more private one, where there was no recording of the conversation; he pretended to be a more mature young boy trying to lead the girl to more adventurous situations. They end up making a date, the last sentences of chat being: “(Predator) don’t forget to wear something hot! everyone that sees us will want to be me to be with the hottie, who is also a nice person … (Cutegirl666) really? (Predator) sure. Can’t wait to see you for our first meeting. Remember “don’t tell anyone … can’t wait to see you, chow!” (p. 60).

The author also deals with cases such as blogs and social networking sites, message exchange via cell phones and PDAs (personal digital assistants) – handheld computers that work as cell phones.

This chapter also provides statistics on Internet use by children and adolescents, provided by organizations that deal with exploited and missing children. Some data from a USA national survey made by the University of New Hampshire in 2003 are cited, involving 10-17 year old 796 boys and 705 girls, and also those responsible for them. At least one undesired access to sexual pictures in the previous year were reported by 25% of the youngsters. Moreover, 73% while using a browser and 27% while using email or instant messaging. The places were such incidents happened were 67% at home, 15% in school, 13% at homes of friends, and 3 % in a library. 32% of the pictures showed people in sexual intercourse, and 7% had scenes of violence; of e-mails, 92% came from unknown people. Undesired material was found more by boys (57%) than girls (42%). Furthermore, the exposition 15-year or older youngsters was greater (60%) than younger ones; there was more exposition by troubled youths (p. 64).

It is also worth mentioning a survey conducted by three organizations with 503 parents and youths aged between the ages of 13 and 17 in February 2005, who had Internet access from home: 34% computers with access to the Internet were placed in the living room, 30% in the bedroom. Moreover, 51% of parents don’t know if they have programs installed to monitor what their children do with the computer. Of those who had such programs, 87% used this software to control what their children were doing; 23% did it daily and 33% monthly; teenagers use of instant messaging was reported by 61% of parents; parents who did not control what their children were doing were 42%. In general, parents ignored the acronyms used by their children. For example, 96% of them did not know that P911 meant parent alert, and 92% did not know what A/S/L (age/sex/location) meant (pp. 64-65).

The author shows a questionnaire he prepared and passed to 100 anonymous parents in the U.S. with children between the ages of 8 and 17, showing the percentages of responses. He says that he expanded the ages of those surveyed to children below age 10, because of his experience in seeing users of that age using computers at school and at home. He says that he was surprised with the results, which show that parents are ignorant of the dangers the Internet presents to young children (p. 65).

Here are some of the questions and results, using the number of each question as it is in the book.

Q1: If you have children under 18, do they access the Internet? Yes: 96%, no 4%.

Q3: Does the Internet present any dangers to children? Yes: 98%, no: 2%.

Q6: Specify at what ages that you allowed your children to use the following (pp. 66-8):

  1. Using a browser: 4 years
  2. Using e-mail: 4 years
  3. Phones without instant messaging: 7 years
  4. Cell phones with messaging: 10 years
  5. Accounts of instant messaging: 8 years
  6. Use of social networking sites: 10 years.

Q7. Why did you give your children access to the Internet?

  1. Other children have access: 3%
  2. Homework for the school: 68%
  3. I want to stay in touch with my children: 0%
  4. My children will not use it badly: 18%
  5. Other: 11%

Q8: Do you use software to filter or block pages for your children? Yes: 39%; no: 61%.

Q10: Do you know people who have children who have been harmed while using the Internet? Yes: 22%; no: 78%.

The author comments that he was surprised by the use of the Internet parents allowed their very young children. He guesses that either these parents are too permissive or they don’t comprehend the dangers (p. 68). He also comments that he was surprised with the result of Q10, because he expected much less, and adds that this may indicate a much higher percentage of children that may have been harmed by their Internet use, and he advocates that national surveys should be done in this direction (pp. 68-9).

More »

Travels with My Father: Life, Death, and a Psychic Detective

Travels with My Father: Life, Death, and a Psychic Detective, by Nancy Myer, was published in 2013 by GoodKnight Books, Imprint of Paladin Communications, Pittsburgh, Pennsylvania.

“Life is full of wonderful mysteries that no one understands, one in particular being what happens after death,” writes Nancy Myer (formerly Nancy Czetli) in the Prologue of her book. “I help to locate missing wills – and missing people’s bodies. Sometimes, this incredible help from the other side of death reveals murderers to me. This is how life unfolds for me. Through my job, my experiences, and the many accounts I’ve heard from others of loved ones reaching back across the divide, I have become certain that love survives death.”

An earlier 1993 book by Nancy Myer-Czetli and Steve Czetli, Silent Witness, details her experiences working with law enforcement as a psychic detective. In addition, the program and internet site, Unsolved Mysteries, disclose the fact that she had consulted with the police on more than 300 criminal cases. These and numerous other sources, including YouTube videos, leave little doubt about her psychic abilities. Travels with My Father is a more personal account of her life and the extraordinary, ongoing communications and direct guidance she has received from her father after his death. In the Prologue she writes that this should not come as a surprise to anyone any longer. “If you have experienced incredible visits from the other side, you are not alone. You and I and many others can celebrate this part of life with the joyful awareness that death does not stop love.” 

Her father, Fredric Myer, died unexpectedly of a heart attack at the age of 54. He had been with the U.S. Foreign Service (USAID, founded by John F. Kennedy), and Nancy and her mother and sister travelled extensively with him to Brazil, Chile, Ecuador, Afghanistan and Lebanon. Later, her father became head of vocational agriculture for the State of Delaware.

In Chapter Four, regarding her father’s “ghostly visits,” which she experiences initially as coldness, she explains that the visits begin with his voice, “strong and clear right beside me.” Then she sees him as he appeared in life.

“Over there, thoughts are things,” he explains. “Where I am, what you create in your imagination you can make real… I wanted to seem real to you so that you wouldn’t be afraid of me.”

“We’re all linked by our love and the Light of Life,” he later says. “I know it must sound strange to you, but it is very real. I feel different from when I was alive on your plane, because I no longer have a body to deal with. That part of it is freeing. As I explained to you before, thoughts are things, and that concept would not work if I were still in a body. In this form – as light – I can be anywhere that I am needed, sometimes in more than one place at a time, just by thinking about it.”

“So, for you, mind travel is a reality?” she asks.

“What’s hardest to understand – at least I think it is – is that time is not linear. Everything exists together, at once. That mystery will take me a while to fully understand. Being in this light doesn’t automatically mean I know everything. I’m still learning on this plane, too. Sorry, I can’t explain better …” He slowly vanished.

And through the years her father continues with his appearances, teaching, guiding, and warning of imminent dangers. More »

The Blue Sense, Psychic Detectives and Crime

The Blue Sense, Psychic Detectives and Crime, by Arthur Lyons and Marcello Truzzi, was published by The Mysterious Press, Warner Books, in 1991 and 1992.

The Blue Sense has 377 pages of exhaustive research that thoroughly covers the subjects of psychism and psychic crime detection at the end of the twentieth century. It is important to acquire some understanding of the two authors who took on this enormous task.

Arthur Lyons (1946-2008) was a successful crime novelist. His books featured an investigative reporter named Jacob Asch. From a blog site (referenced below), Lyons described Asch: “You’ll never find Asch doing anything unlikely. He will not usually find stuff through coincidence. He’s a plodder. That’s what private detection is, going through papers. All of Asch’s cases come out of paper. He works with paper more than he does people…”

Marcello Truzzi (1935-2003) was a sociology professor at Eastern Michigan University. His work confirms that the science of sociology is an integral component in understanding The Blue Sense. Truzzi had been a founding co-chairman of CSICOP (Committee for the Scientific Investigation of Psychic Claims) but left this organization because positive paranormal research was excluded. When he began his independent work, he started a journal that he called The Zetetic Scholar, with zetetic (related to the ancient Pyrrhonist philosophy) offered as a substitute for the word skeptic. He later established The Center for Scientific Anomalies Research (CSAR), and according to a paragraph preceding the Notes section of The Blue Sense, the CSAR “began its psychic sleuths project in 1980.”    

Perhaps the best answer as to why the authors of The Blue Sense decided to take on the task of determining the value of psychic detection for law enforcement can be found in Chapter One of the book, titled Blue Sense or Nonsense? The first chapter opens with an account of the assistance that psychic Greta Alexander gives to Alton Illinois Detective William Fitzgerald, as a “last-ditch desperation effort” in a frustrating case for which the time allowed by state law for trial was nearing expiration. This case involved the disappearance of a woman in her late twenties who was last seen in the company of her boyfriend. “Alexander, who claims to have received her powers of second sight after being struck by lightning,” was successful, and Detective Fitzgerald cited twenty-two hits Alexander had made concerning the finding of the victim’s body.

Later in the opening chapter, the authors explain the use of the term Blue Sense. “The ‘blue sense,’ named after the common color of police uniforms, is that hunch that sends a cop back to that gas station or alley; that feeling of impending danger … that unknown quantity in the policeman’s decision-making process, the heightened sense of intuition that goes beyond what he can see and hear and smell. Because the blue sense specifically relates to the practical application of this unknown faculty to law enforcement, we have chosen to extend the term to cover all those persons – police or non-police – who use psychic powers to solve crimes.”

Some of the chapters that follow are titled: Psychic Sleuths in History; Science Fact or Science Fiction? The Search for Legitimacy; Lies, Fraud, and Videotape: Lessons from the Pseudo-Psychics; Psychic Success Stories; The Spook Circuit: Psychic Espionage; The Blue Sense and the Law: What Lies Ahead? Two chapters detail the cases of Gerard Croiset (Gerard Croiset: The Scrying Dutchman) and Peter Hurkos (Peter Hurkos: The Clown Prince?) offering substantial evidence that both these psychics were fraudulent, while they did have some “hits” that worked to their advantage. More »

The Counselor . . . as if Soul and Spirit Matter

The Counselor . . . as if Soul and Spirit Matter

 

Inspirations from Anthroposophy

 

by William Bento, Edmund Knighton and Roberta Nelson

Edited by David Tresemer

 

Paperback $35.00 Published by Steiner Books, March 2015 ISBN 978-1-62148-127-0 369 pages
http://www.amazon.com/Counselor-Soul-Spirit-Matter-Anthroposophy/dp/1621481271

 

The Counselor

Click to Buy

Psychology continually awakens to new dimensions of mental health; this book explains that there are many more rungs on the ladder. At the center of every chapter is the recognition that every human being has the capacity for self-generation and self-healing.

Importantly, the authors recognize that the Counselor can be anyone who listens to another person describing their difficulties. In this regard, this book is important reading for everyone.

I am not a Counselor but have worked with people all my life in medical sales, recruitment and in my own business which is recruitment based. I have also studied and written about the work of Rudolf Steiner for over thirty years. I know the importance of understanding that we are not just physical beings but rather beings of soul and spirit who have a body. Until we approach all areas of human knowledge on this premise we will never understand who we are, much less be able to be of assistance to those experiencing difficulties.

This book is not a text book, it comes from presentations at seminars, transcribed, edited and amended. This may not suit some people but for me these presentations gave the book life. This is in keeping with the whole philosophy of Anthroposophy; to be human is a living activity, humanity continually evolves through different stages of conscious awareness.

The word Anthroposophy itself can be challenging for those not familiar with this philosophy, yet the way this word is described in this book gives a wonderful sense of freedom – “the possible and becoming human” as part of the whole creation. To see ourselves as a work in progress is most liberating and this book reveals that the stumbling blocks are just that. “We are all entangled in the pathos (suffering) of life to some extent or another. Too much pathos makes us dysfunctional; too little means we are not prodded to grow.”

The fact that human consciousness evolves forms the scaffolding on which the ideas in this book are supported, and the current mental health crisis can be explained in the light of this idea. Describing the evolution of consciousness to those who see the physical world as the only reality can be challenging because the present stage in this evolution involves crossing the threshold between the physical and spiritual worlds. When we ask ourselves what this might mean we immediately lose our footing and want to slide down the ladder and feel our feet firmly on the ground.

As this book explains, to understand what it means to be mentally healthy means to understand the true nature of our human being. When we are able to catch a glimpse of this true nature, we become aware of times when we cross a threshold in our consciousness expanding our consciousness beyond our everyday understanding. Crossing the threshold does not mean a change in location, nor does it mean an altered state of consciousness, it simply means that the current boundaries of our awareness are dissolving. More »

Life Before Life: Children’s Memories of Previous Lives

Life Before Life: A Scientific Investigation of Children's Memories of Previous Lives

Click to Buy Book.

By Jim B. Tucker, M.D., Foreword by Ian Stevenson, M.D.
Published by St. Martin’s Griffin Press, New York, N.Y., 2005. Buy this Book!

In the Foreword of Life Before Life, Ian Stevenson (1918 – 2007), whose work became well-known after the 1966 publication of Twenty Cases Suggestive of Reincarnation, informs the readers that Jim Tucker writes so well that “he may beguile a casual reader into thinking he or she has no work to do. Read on, and learn that evidence may answer – sooner than you expected – the most important question we can ask ourselves: What happens after death?” Author Jim Tucker, a child psychiatrist at the University of Virginia, has taken on the task of continuing the monumental work that Ian Stevenson began in the 1960s. He writes in the Introduction: “More than 2,500 cases are registered in the files of the Division of Personality Studies at the University of Virginia… Previously, we have only written for a scientific audience, but now that we have forty years’ worth of data, the general public deserves the opportunity to evaluate the evidence as well. I will try to present it in as fair a way as possible so that you can judge for yourself.” For example, in the third chapter, titled “Explanations to Consider,” numerous other possibilities by way of understanding the cases described in Life Before Life are carefully considered, such as fraud, fantasy, genetic memory and possession, but these are generally ruled out through deductive reasoning, with the reader led back to serious consideration of reincarnation. Through the end of this chapter and in the four that follow, Dr. Tucker continues the substantiation of reincarnation by presenting remarkably similar data for more than 40 cases that involve children’s memories of previous lives. In Chapter 8, “Divine Intermission,” he achieves a tentative transition from emphasis on the mysteries of the soul to considerations for the existence of higher causative factors: spirit. In the ninth chapter he presents “Opposing Points of View,” and in the tenth and final chapter he at last allows for some “Conclusions and Speculations,” including “The Question of Karma.”

Near the end of the 1960s, financial support in the amount of one million dollars for Ian Stevenson’s work came from the will of Chester F. Carlson (1906 – 1968), who invented the photocopying process for the Xerox Corporation. Although the unusual nature of the research made some people uneasy, “Universities are not in the habit of turning down million-dollar gifts…The university eventually did decide to accept the money since it had been given to support scholarly work, and the work continued.”

In the cases presented the children first begin talking about the previous life around the age of two, and the median age when the talking stops is 72 months or 6 years. The children generally describe events near the end of the previous life and rarely remember more than one life. However, in the case of Bobby Hodges from North Carolina, which opens Chapter 8, memories from lives other than the most recent are described: in one life Bobby describes a death that resulted from a gunshot wound, and in another from a motor vehicle accident. What stands out in the cases presented in Dr. Tucker’s book is the fact that the amount of time in-between lives is surprisingly short, ranging from six months to fifty years, with most rebirths occurring from eighteen months to five years after the previous deaths. Most of the cases occurred in Asia or India — Sri Lanka, Thailand, Myanmar and Turkey — with the rebirths almost always occurring within the same region or nation, and sometimes within the same family. However, a significant number of cases are given that originated in England, Europe and the United States. A two-year-old boy in Britain recalled the life of a German WWII pilot, stating “I crashed a plane through a window.”  Later, he drew swastikas and eagles and demonstrated the Nazi salute and the goose-step march of German soldiers. (This has similarities to the case of James Leininger, in the book Soul Survivor: The Reincarnation of a World War II Fighter Pilot, which is reviewed on this bLog.)  Some two dozen international cases involved a change from Japanese to Burmese lives, with the children recalling lives of Japanese soldiers who had been killed in Burma in WWII. These statistics do appear to be pointing to certain causative factors in quick returns: violent and sudden deaths in WWII, as well as in many other circumstances, such as in crimes or fatal accidents. In such circumstances the potential for spiritual development within the individual may be far better served in earthly life rather than in the spiritual world between death and rebirth.

An extraordinary case is described on page 114, at the beginning of Chapter 6, which is titled “Unusual Behaviors.” This relates the disturbing memories of a four-year-old girl who resided in Florida. The child, Kendra Carter, developed a loving attachment to her swimming instructor, named Ginger. The child talked about Ginger all the time and then began saying that she had been a baby in Ginger’s tummy, but that Ginger “had allowed a bad man to pull her out and that she had tried to hang on but could not. She described being scared in a dark and cold place afterwards. Kendra’s mother eventually found out from Ginger that she had in fact had an abortion nine years before Kendra was born when she was unmarried, sick, and dealing with anorexia nervosa… This case presents us with a number of perplexing questions. Why would a four-year-old girl think that she had been involved in an abortion? What caused her to develop the idea of reincarnation when she was being raised by a mother who could not even consider the possibility?” The mother attended a conservative Christian church and “did not accept the idea that reincarnation is a process that normally occurs.”

How does Jim Tucker achieve the transition from soul to spirit in the final chapters of the book? Concisely and admirably: challenging the assumption that the areas of physics and paranormal phenomena are incompatible; discussing how consciousness can be regarded as separate from the physical brain; mind-matter interactions; pointing out how mainstream science, while necessarily conservative, favors the status quo far longer than is productive; addressing the arguments of the population explosion; and pointing out that religious beliefs are not part of scientific objectivity, although deserving of consideration. The author quotes Matthew 11:10-14 and 17:10-13, from the New Testament: “Jesus says that John the Baptist is the prophet Elijah who had lived centuries before, and he does not appear to be speaking metaphorically.” In the chapter titled “Conclusions and Speculations” he addresses such difficult questions as: Does Everybody Reincarnate?, In Cases of Reincarnation, What Reincarnates?, The When and Where of Reincarnation, The Question of Karma, Enduring Emotions, Advice for Parents, Spiritual Speculations, Future Research, and Final Thoughts (Out of the mouth of babes …)

But it seems that this book and the extensive studies and research from which it draws, as totally admirable and necessary as it is, can only partly answer the question pointed out by Ian Stevenson in the Foreword: What happens after death? For the memories recounted can almost entirely be attributed to the causative factor of the “quick return.” This may be more than enough for many readers. Yet others may ask: what occurs in-between death and rebirth when the individual has led a long and fulfilling life, resplendent with good deeds and the continuous quest to develop higher or spiritual consciousness, and who then experiences a natural death, such as someone like Mother Teresa? What occurs within the soul and spirit when there are hundreds of years in-between lives? And what is required to be brought from earthly life in order to make such long, fruitful interludes possible? – Review by Martha Keltz

Recommended:

Life Between Death and Rebirth, Sixteen Lectures by Rudolf Steiner, 1912 – 1913; Karmic Relationships, Volumes I through VIII, Lectures by Rudolf Steiner, 1924; At the Gates of Spiritual Science, Lectures I through XIV, by Rudolf Steiner, 1906; Knowledge of the Higher Worlds and Its Attainment (one of the “basic books” of Spiritual Science), by Rudolf Steiner, 1904.

 

Buy this Book!

//

Copyright © All Rights Reserved · Green Hope Theme by Sivan & schiy · Proudly powered by WordPress