
We have seen that activities related to transportation and store in the stolen property system (SPS) can be shared by fence and thief. The sharing of responsibility for these functions is not, however, haphazard nor random in nature. Instead it is determined by the degree of control which each is considered to determine by the degree of control which each is considered to exercise over the stolen property at a given point in time. Thus, any storage or transportation activities that are required, pursuant to an agreement reached in the exchange process, are likely to be performed by the thief. Once this exchange agreement has been satisfied any further need for transport or storage becomes the fence’s responsibility. To require the thief to perform such functions beyond those pursuant to the exchange process would be to defeat one’s prime motivation for making an agreement with the fence, which is to divest oneself of the stolen property. Similarly, to require the fence to perform these functions prior to an exchange agreement would force one to exercise control over property which one has not as yet decided to purchase. Both thief and fence recognize that their possession of (id est, effective control over) stolen property requires the performance of certain activities; neither, however, will be willing or likely to assume responsibility for such activities once possession has been relinquished or before it has been undertaken. The final activity area, marketing mode, which includes transportation and storage, demand analysis, packaging, and advertising, of the SPS is the preparation of property resale. #RandolphHarris 1 of 21

This is almost exclusively the province of the criminal receiver who, following the exchange with the thief, becomes the new seller of the merchandise. It is the fence who takes responsibility for decisions relating to modification of the goods prior to sale, in what quantities one will sell the goods, and in what manner one will present the items to potential customers. With some items, such as automobiles, the fence will find it important to remove or disguise identifying numbers while keeping the make and model apparent. In other cases, with fair-traded appliances for example, it may be more important to disguise make and model than identifying numbers. The type of customer which the fence serves, whether retail or wholesale, corporate or individual, knowledgeable or native, will determine the quantities in which the merchandise is sold and the manner in which it is promoted. The planning and coordination of activities in the packaging and promotion area emphasize again the organizational know-how and financial base which a fence needs to operate efficiently. It also serves to explain why one may not be able to “afford” to reward the thief too generously for one’s efforts. There are certain limited cases in which the thief shares responsibility for preparing stolen property resale. One such case is that of the professional thief. ITEM 16: (interview with Greg, professional burglar) “As soon as we finished a job we always went back to my apartment. There I’d remove all the stones from their settings, weight them, appraise them and put them in jeweler’s paper to protect them.” #RandolphHarris 2 of 21

Greg explained that this was done for two reasons: first, as a form of protection. Often the only identity possessed by a gem is its setting. By removing a gem from its setting, then, its identification becomes much more difficult so that even upon apprehension by the police one and one’s associated had a good chance of not being charged with anything. Second, Greg found that he could make better deals with fences with loose stones since he had saved them the trouble of removing the setting. In addition, the origins of the items could remain somewhat obscure protecting both of them. The professional thief is probably one of the few classes of thieves who has sufficient skill or motivation to perform such preparatory activities. It is obvious that one does not perform them as a favor to the fence but out of one’s own self-interest. This activity area in mode 4, then, is similar to the area of transportation and storage where activities are performed by the individual in control of the property. Because of the nature of the packaging and promotion activities and the point in time in which they occur, it is the fence who in nearly all situations is in possession of the merchandise. Responsibility for these activities, therefore, falls primarily on one. From our review of mode 4 activity areas it also becomes quite clear that the fence is the prime mover in the marketing process of the SPS. Nonsequential activity performance—the second axiom of the SPS relates to the nonsequential nature of the functioning modes. #RandolphHarris 3 of 21

In order to demonstrate the sort of variety which this axiom suggests, we will discuss three modal configurations in the SPS: (1) the system beginning at mode 2 (extraction) and proceeding spontaneously; (2) the system beginning at mode 1 (planning), moving to mode 3 (exchange agreement) then to mode 2 (extraction) and finally proceeding to modes 4 and 5; (3) the system beginning at the mode 5 (redistribution) then moving to modes 1, 3, 2, and 4 in that order. Each of these configurations represents not only different degrees of determinateness in the SPS, but also different degrees of integrative control exhibited by the fence. The SPS beginning at extraction mode 2, having eliminated a research and planning phase. This configuration can be termed the “cheapest opportunity” model. It is likely to be initiated by the least killed thief or the addict thief. Because of the lack of planning involved, it will also be the least determinate, least integrated and least efficient model in the SPS for one of two reasons. First, it is unlikely to yield property of great resale valuesince its targets must be those which can be attacked spontaneously and with a minimum effort. For example: ITEM 17: (police radio message item) “B & E at pawnbroker’s shop on____ St. Window broke and two trays of jewelry removed. Assailant believed to be on foot.” In some cases, this model of the SPS will yield nothing at all and instead will serve only to create a disturbance within the environment surrounding the system. #RandolphHarris 4 of 21

ITEM 18: (police activity report) “Alarm sounded at warehouse on ____ Avenue. Two w/m seen running from building. Would-be thieves didn’t have time to get anything. Pct 2. will put a patrol car in the area in case they try again.” The second reason why the “cheapest opportunity” model is inefficient is that it fails to predetermine a demand for merchandise. For example, consider the luckless thieves below who managed to steal merchandise of some value but whose lack of planning rendered it not only valueless to them but also incriminating. ITEM 19: (police activity report) “X and Y (thieves) were arrested this AM in the act of trying to peddle meat from the ____ warehouse. They did not have a refrigerated truck so most of it had already started to spoil when recovered.” This model, if it is to be effective at all, requires the existence of the generalist fence who is willing to handle a wide range of items of varying quality and indeterminate quantity. The SPS does of course provide for this sort of individual in the form of owners of secondhand and general merchandise outlets and used furniture and appliance stokes. Fences who engage in this sort of trade do so because they can acquire property very inexpensively from hard-pressed thieves whose lack of planning has put them in precarious possession of stolen property. If, then, the thefts initiated of the least rewarding variety to the thief. For the fence they also represent the “cheapest opportunity” since they comprise the best bargains one can get from any set of thieves. #RandolphHarris 5 of 21

If this model is to have any determinateness, it is the fence who must introduce it by manipulating the rewards offered in the exchange mode. By giving such direction to the thief’s activities, the fence is not generating a planning process but only narrowing the range of products which one is likely to encounter. This can help make the thief a bit more predictable and the system a bit more determinate and efficient. This model of the SPS remains, however, the least integrated configuration. The SPS in the modal sequence of planning (mode 1), exchanging (mode 3), extraction (mode 2), marketing (mode 4), and redistribution (mode 5). This is the “exchange-oriented” model of the system in which thefts are planned but not carried out until the terms of the exchange agreement and the responsibilities for activities pursuant to that agreement are determined. This model is significantly more determinate and efficient than is the “cheapest opportunity” model, although this is only true through the exchange-extraction process. The marketing and redistribution modes retain an indeterminate quality in this model. The degree of integration in the “exchange-oriented” model depends upon who generates and plans the theft and who initiates the terms of the exchange agreement. Two basic situations are possible: the thief-generated pact, and the fence-generated pact. The thief-generated pact is the situation in which the thief assures a market for the theft one envisions by making preliminary arrangements with a fence to buy the product of one’s activities. In some sense, then, t is the thief’s insurance policy which one hopes will prevent one from being caught holding stolen property unnecessarily. #RandolphHarris 6 of 21

ITEM 20: (Robert E. Barnes) “one…must always remain conscious of the fact, it is impracticable for the thief to steal what one cannot sell. What should be of vital importance to law enforcement officials is the fact that semi and professional thieves seldom steal before they sell, thus proving the fact that all major crimes whereas [sic] merchandise is involved would never occur if there were no outlets for this merchandise.” In many cases the professional thief wants more than the assurance of a market, one may also want to make sure that one’s efforts will be sufficiently rewarded before attempting a “big score.” Perhaps the most important element of the above statement is the fence’s “if.” It is clear that the professional thief can succeed in getting binding agreement upon the fence before one has seen the merchandise. Robert E. Barnes, for example, maintains that fences are notorious for promising to pay a certain price prior to the thefts of goods and then defaulting on the agreement later. The thief-generated pact under the exchange-centered model of the SPS, then, does not display very much integration. All it really does is assure the thief of a buyer and notify the fence as to the type of property one is likely to receive and when. The fence-generated pact is somewhat different. Here a high degree of integration can be introduced into the system as the fence has opportunity to specifically direct the activities of the thief and to beneficially determine the products one will acquire. #RandolphHarris 7 of 21

The fence who plans the theft and who provides information important to its commission is also in a position to extract from the thief a specific exchange agreement. This makes for a highly rationalized extraction process which has been preplanned with an exchange phase that is predetermined. The integrative control of the fence over the exchange-extraction process produces a more efficient and determinate model of SPS behavior. The SPS beginning at the redistribution phase (mode 5) and proceeding through mode 1 (planning), mode 3 (exchange), mode 2 (exchange), and mode 4 (marketing). This final modal configuration of the SPS is by far most complex and sophisticated sequence. The most apt term for this configuration s the “production to order” mode. What happens in this case is that no activities relating to theft are initiated until and order for the merchandise has been received. Once this order is received, the theft is planned; an exchange agreement decided upon; the extraction carries out; and the marketing activities completed. And all of the above processes are coordinated and directed by the fence. The “production to order” model is an accommodation made in the legitimate marketplace to avoid the stacking up of inventory surpluses and gluts in the marketing process. The fence uses the model for similar reasons but has the advantage over the legitimate marketer that one’s suppliers (thieves) are likely to produce goods quicker than is the legitimate manufacturer who supplies the legitimate businessman. The model, then, is likely to be much more effective within the SPS than it has been found to be in the legitimate marketplace. #RandolphHarris 8 of 21

The most frequent cited example of the “production to order” model in the SPS is the auto theft ring. Instances have been reported of automobiles being stolen to meet the exact specifications of buyers, with color and bogus engine numbers added before resale. Robert Earl Barnes suggests that the “production to order” model is not limited to the stolen auto area, being particularly prevalent in the hijacking and cargo theft arena: “Prior to any hijacking, the merchandise has already been sold to underworld sources, and once the crime has been set-up, and carried out by the thieves, the merchandise is extremely difficult to recover, as it may go out for resale on the legitimate market to as many as 50 to 100 middle men.” Both the “cheapest opportunity” and “exchange-centered” models of the SPS require the fence to have increasing amounts of control over the forces of supply in the system. The “production to order” model requires of one the ability to generate the forces of demand as well. Demand control by the fence is somewhat more amorphous than is supply control. It will depend on such things as one’s individual abilities to forecast the desire of disparate customers: the kinds of contacts one has been able to cultivate at the wholesale and retail levels of the legitimate marketplace; and often upon one’s particular occupation. For example, the individual described blow pursues a legitimate occupation of which generating orders for merchandise is an integral part. Their additional abilities to initiate an illegitimate supply process, allows them to operate a tight and effective stolen property distribution system. #RandolphHarris 9 of 21

ITEM 23: (police activity report) “Mr. S who owns a jewelry manufacturing company is alleged to be fencing for some of our better burglars. He supposedly has nationwide customers and contacts. Should be kept in mind whenever jewelry is taken in residence jobs.” The control which the fence has over the sequencing of events in the SPS under the “production to order” model makes it possible for one to bring the forces of demand and supply into a fairly stable equilibrium. This makes the model highly efficient and determinate. It also serves to protect all of the persons involved since by insuring that all aspects of the system are coordinated beforehand, stolen property can move swiftly to its final destination, minimizing the risk of either thief or fence being found in possession of it. The limits upon the “production to order” model are of two orders. The model is limited, first, by the individual ability of the fence to generate demand (id est, contacts and outlets to do business with one.) Second, the model hinges upon the amount of organizational and financial resources at the fence’s disposal which can facilitate the completion of all activities based in mode 4, the marketing mode. This is perhaps the more important limitation since it defines the size and scope of one’s operation. If one cannot command the use of storage and transportation, or cannot finance the performance of such activities by others, no matter how organizationally skilled the fence is his business volume will remain small. The “production order” model need not, then be characterized by large scale operations. Instead this model describes a highly integrated, tightly controlled and finely precisioned model of the SPS in which the fence is both the orchestrator and the central character. #RandolphHarris 10 of 21

The Powershift Era has only begun and already, it would appear, the future is up for grabs. With the “East” in upheaval, the “South” increasingly divided, and the leading powers of the “West”—Europe, Japan, and America—on a collision course, we face a frantic, endless round of summits, conferences, treaties, and missions as diplomats meets to construct a new global order. No matter how much hammering, sawing and wordsmithing they do, however, the new architecture of World power will depend less on their words than on the quantity and quality of power each brings to the table. Are the United States of America and the Soviet Union both now global has-beens? If so, how many new “superpowers” will arise to take their place? Some speak of a World organized around Europe, Japan, and the United States of America. Others see the World broken into six or eight regional blocs. Still others believe the bipolar World is turning into a five-sided star, with China at one of the points, India at another. Will the new Europe stretch from the Atlantic to the Soviet border—or beyond? No one can solve these puzzles with certainty. However, the powershift principle can help. It reminds us that while many other factors—from political stability to population growth—all count, violence, wealth, and knowledge are the three main rivers from which most other power resources flow, and each is now in the process of being revolutionized. Take violence. #RandolphHarris 11 of 21

So much has been written about “peace breaking out” that World attention has drifted away from the menacing fact that as the two former superpowers scale down their arms, other nations are racing to fill the gap. India, for example, despite its image as a backward, peace-loving land, has been the World’s biggest arms buyer since 1986, purchasing in 1987 more weapons than warring Iran and Iraq combined. This policy had drawn fire from the Japanese and a sharp riposte from New Delhi. India already possesses nuclear weapons and is party to the Missile Technology Control Regime (MTCR), which allows the country to develop a missile with a range of over 300 km weighing more than 500 kg but not to export it to other countries. This is true even in the case of the supersonic BrahMos missile, the latest variant of which has a range of 500 km. The export version is capped at 290 km to comply with the MTCR restrictions of 300 km. The BrahMos-II is expected to be capable of travelling at speeds of up to Mach 7 and had a range of over 300 miles. It is being designed to be launched from multiple platforms, including land, air, and sea. Hypersonic weapon systems are advanced military technologies that can trave at extremely high speeds, typically defined as Mach 5 or higher (five times the speed of sound). These weapons are designed to be extremely maneuverable, able to change course quickly and evade enemy defence, an dcan travel long distances in a very short time. #RandolphHarris 12 of 21

Furthermore, HWS are capable of carrying out launches from a variety of platforms, including ground-based systems, aircraft, and submarines. They are typically designed to carry conventional or nuclear warheads and are seen as a potential game-changer in military operations, particularly in terms of their speed, range, and ability to penetrate enemy defence. Pakistan continues to expand its nuclear arsenal with more warheads, more delivery systems, and a growing fissile materials production industry. Analysis of a large number of commercial satellite images of Pakistani army garrisons and air force bases shows that appear to be launchers and facilities that might be related to the nuclear forces. We estimate that Pakistan now has a nuclear weapon stockpile of approximately 165 warheads. The U.S.A. Defence Intelligence Agency projected in 1999 that Pakistan would have 60 to 80 warheads by 2020, but several new weapon systems have been fielded and developed since then, which leads us to the higher estimate. Pakistan may become the World’s third-largest nuclear weapon state—with a stockpile of some 350 warheads by 2030. If the trend continues, their stockpile could more realistically grow to around 200 warheads by 2025. According to William Webster of the CIA, fully fifteen countries are known to produce ballistic missiles: the United States of America, France, Russian, China, North Korea, South Korea, Taiwan, India, Pakistan, Iran, Israel, Egypt, Syria, Ukraine, and Argentina. #RandolphHarris 13 of 21

Beyond this lie a number of terrifying scenarios. Soviet nukes are located in Azerbaijan and other Muslim republics where ethnic fighting has broken out, leading some experts to speculate on the nightmarish possibility that a breakaway republic might seize some of these weapons. Asks one alarmed U.S.A. official: “Will the fourth-biggest nuclear power be Kazakhstan?” So serious are the risks that Moscow had reportedly begun withdrawing nuclear arms from the tense Baltic region, and a top Soviet official, speaking privately to the author, has said: “I used to be against SDI [Washington’s Strategic Defense Initiative whose goal is to intercept and destroy income nuclear missiles]. But now I’m for SDI. If the U.S.S.R. splits apart, the World could suddenly find itself confronted with ten more nuclear-armed countries.” In fact, a civil war in the Soviet Union—or any other nuclear power-raises the possibility that rebel forces might seize the weapons, or that rebel and loyalist forces might each seize part of the nuclear arsenal. Even more ominously, some “developing countries”—Iraq and Libya are not alone—are designing plans to manufacture chemical and bacteriological weapons as well. The present distribution of weapons in the World, and especially nuclear weapons, neither fixed nor stable. A key source of state power, therefore, the capacity for hyper-violence that was once concentrated in a few nations, is now becoming democratically but dangerously dispersed. #RandolphHarris 14 of 21

At the very same time, the nature of violence itself is undergoing profound change, becoming increasingly dependent on such knowledge-intensive technologies as microelectronics, advanced materials, optics, artificial intelligence, satellites, telecommunications, and advanced simulation and software. Thus, whereas the first F-16 fighters needed 135,000 lines of computer programming, the Advanced Tactical Fighter now on the drawing boards will require 1,000,000 lines. These changes in World military systems do more than merely shift power from here to there; they revolutionize the nature of the global game. Shintaro Ishihara, a former Cabinet member in Japan, blew up a storm in Washington recently with a brief book called The Japan That Can Say No, which consisted of speeches he and Akio Mortia, co-founder of Sony, had made on various occasions. In it Ishihara pointed out that to radically improve the accuracy of their nuclear weapons to the United States of America and the U.S.S.R. alike would need extremely advanced Japanese-made semiconductor technology. Referring to the United States of America, he said, “It has come to the point that no matter how much they continue military expansion, if Japan stopped selling them the chips, there would be nothing more they could do. If, for example, Japan sold ships to the Soviet Union and stopped selling them to the U.S.A., this would upset the entire military balance. Some Americans say that is Japan were thinking of doing that, it would be occupied. Certainly, this is an age where things could come to that.” Mr. Ishihara’s remarks underscore the growing dependence of violence on knowledge, a reflection of today’s historic powershift. #RandolphHarris 15 of 21

Meanwhile, when it comes to powershifts, China has become the largest international lender for developing countries, and it rapidly emerging as one of the World’s leading lender nations. China’s overseas development finance is almost as sizable as the World Bank’s, though more intermittent in nature. From 2008-2019, Chinese overseas development finance amounted to nearly half a trillion dollars–$462 billion. In the same time period, the World bank (through its sovereign lending windows, the International Bank for Reconstruction and Development and International Development Association), barely exceeded this amount, extending $467 billion. China has also become a global infrastructure powerhouse, reflecting the goals of the Belt and Road Initiative. Over half of the finance commitments listed in the dataset–$249 billion—went to construction of infrastructure projects, particularly in the sectors of transportation and power generation and distribution. In terms of assets, Chinese commercial banks, especially the Big Four (Industrial and Commercial Bank of China, Bank of China, China Construction Bank, and Agricultural Bank of China), are rapidly approaching the World’s top 10. Industrial and Commercial Bank of China is the sixth largest bank in the World, and has total assets for the quarter ending September 30, 22 of $5,774.397 billion, a 19.3 percent increase year-over-year. CITIGROUP INC $2.4 trillion, BNP $2.67 trillion. Chinese commercial banks are becoming increasingly important lenders for Western companies. #RandolphHarris 16 of 21

When the self-actualized first hear of the possibility of counterfeits in the hierarchy and sacred things, they almost invariably ask, “How are we to know which is which?” It is enough, first of all, for them to know that such counterfeits are possible. Then, as they mature and seek light from the ultimate concern, they shall learn to know for themselves, in a way that no human being can explain to them. However, they cry, “We do not know, and how can we know?” Well, they should remain neutral to all forms of enlightenment. There is among many self-actualized a wrong anxiety to know, as if that knowledge alone would extricate them. They think that they must be solidly for or against certain things, things which they cannot decide are from the ultimate concern or an unenlightened source. They desire to know infallibly which is which, that they may declare their position. However, self-actualized should take only a tentative attitude of “for” or “against” while uncertain whether the things in doubt are sacred or of the unenlightened nature—maintaining the wisdom and safety of the neutral position. In time, by a means which cannot be fully described, they will know what they have wanted to understand. Over-eagerness in desiring certitude can result in mental suffering, restless anxiety, worry and grief, which can cause a loss of moral poise and power. #RandolphHarris 17 of 21

It is important in seeking one source of knowledge not to destroy another. In seeking certainty in these matters of the ultimate concern, let not the self-actualized lose patience, and calm, quiet restfulness and assurance. Let one watch oneself, lest the offenders gain advantage, and rob one of moral power even while one is keen to get light regarding the way of victory. The battle for truth may keep us awake at night. The source of expression can sometimes be a mystery. One’s thoughts and feelings come, not from any attempt to force change, but from an intense and compelling desire to live and respond fully to life. One’s communication may be strong and intense, a response to indifference, to purely self-centered interests, to sleep in the face of tragic searching and suffering. Perhaps these intense feelings are potent enough to break into one’s own detachment, isolation, and loneliness. In the face of human struggles met with complacency and indifference, one may begin to feel deeply the tragic nature of the life before one. One may begin to experience once more an involvement and intoxication with life. The mystery of what it is all about remains to be unsolved for some. The metaphysical solution one seeks may never come to one but that is not the ultimate concern. Once one is in touch with people of like-mind, fully awake, with all of one’s sense, a search for communal values is underway. This is essential beginning. Everything is moving toward this reality. People will appear in the dawn of the new day. Everything has to recrystallize. #RandolphHarris 18 of 21

Ambiguity is a characteristic not of the structure of being, but of the process of life, according to which positive and negative elements are mixed in such a way that definite separation of the negative from the positive is impossible. The positive elements are essential elements, and the negative ones are existential; however, they cannot be separated simply into good and evil, for in all life processes an essential and an existential element, created goodness and estrangement, are merged in such a way that neither one nor the other is exclusively effective. For example, one of the ambiguities of being self-actualized, is that, on the one hand, it is self-transcendent—it points beyond itself to the ultimate concern, on the other hand, it is profanized—it becomes a finite institution, a sociological unit subject to the same laws that govern secular groups. Life basically consists in a going-out and a return-to-self. Against this movement of life there is always a counter-movement, so that the life process of self-integration struggles against disintegration; self-creativity struggles against destruction; and self-transcendence struggles against profanization. This struggle of tendencies—one positive, one negative—is ambiguity. The sacred is ambiguous because it embraces the clean (the positive) and the unclean (the negative), both of which produce “numinous awe.” However, this ambiguity is merely an instance of the more radical ambiguity of the scared which embraces bot divine and the demonic. #RandolphHarris 19 of 21

The sacred manifests itself in consecrated objects, for without the finite bearer of the revered, the sanctified would remain unknowable. These objects are not sacred in themselves, but they become consecrated only by negating themselves in pointing to the sanctified which they are the medium. If their sacredness is considered inherent, they become demonic. They are still sacred, but their sacredness is anticonsecrated. These sacred objects, whose function is to represent man’s ultimate concern, usurp the place of the hallowed and establish themselves as his ultimate concern. They are transformed into idols. Sacredness provokes idolatry. As an example of demonic, we can consider the Roman empire which became demonically possessed in compelling men to worship itself. Both the sacred and the demonic appear n the concrete as ecstatic, overpowering, and awe-inspiring. However, the demonic refuses to bow to the unconditioned, and, in fact, elevates itself to the same level. If the ambiguity of the divine-demonic loses its tension and the two elements are separated, the result is a religious dualism such as Manichaeism. Religious dualism concentrates divine holiness in one realm and demonic holiness in another realm. Reality is then partitioned between the two realms, and what belongs to the demonic realm is essentially evil. The concern is to keep the divine and the demonic, the clean and the unclean, ambiguously united, as they re in the primitive notion of the holy. One never ceases to remind us that the demonic’s favored place is the holy. #RandolphHarris 20 of 21

This analysis of the experience of the holy lays bare the root of faith. The unconditionality of ultimate concern springs from an encounter with the mysterium tremendum et fascinans, the ground and abyss of being and meaning. The total demand of ultimate concern is explained by the stern “ought-to-be” of the holy, while ultimate concern’s promise of total fulfilment arises from the majestic presence of the holy. The ambiguity of faith, the possibility of its deterioration into idolatrous faith, is accounted for by the ambiguity of the holy itself which is open to invasion by the demonic. A systematic analysis inevitably dilutes the intensity of a religious experience. As a gesture to offset this loss, we conclude the exposition of faith with the poetic description of the moment of faith. It is only in a concrete situation that the ultimate power of being, the ground of reality appears and reveals the infinite depth and meaning of the present moment. Yet, in the light of the ultimate the concrete present is shown in all its shallowness. Thus it affirms and negates; it is transparent for its ground which is also its abyss. The experience is like a blinding flash of lightning at night. Reality is seen as something new, for in the ecstasy of faith its ground is glimpsed. Nor do we remain as detached subjects staring at an object, for we are seized in the very center of our personality. We are grasped, in the experience of faith, by the unapproachably holy which is the ground of our being and breaks into our existence and which judges us and heals us. #RandolphHarris 21 of 21
